Show simple item record

dc.contributor.authorKelarev, A.
dc.contributor.authorearwood, J.
dc.contributor.authorWatters, P.
dc.contributor.authorWu, X.
dc.contributor.authorAbawajy, J.
dc.contributor.authorPan, L.
dc.date.accessioned2017-05-03T15:50:43Z
dc.date.available2017-05-03T15:50:43Z
dc.date.issued2010
dc.date.modified2011-09-27T06:56:44Z
dc.identifier.issn00371912
dc.identifier.doi10.1007/s00233-010-9242-1
dc.identifier.urihttp://hdl.handle.net/10072/36982
dc.description.abstractEffective multiple clustering systems, or clusterers, have important applications in information security. The aim of the present article is to introduce a new method of designing multiple clusterers based on theMunn rings and describe a class of optimal clusterers which can be obtained in this construction.
dc.description.peerreviewedYes
dc.description.publicationstatusYes
dc.format.extent142271 bytes
dc.format.mimetypeapplication/pdf
dc.languageEnglish
dc.language.isoeng
dc.publisherSpringer New York LLC
dc.publisher.placeUnited States
dc.relation.ispartofstudentpublicationN
dc.relation.ispartofpagefrom162
dc.relation.ispartofpageto171
dc.relation.ispartofissue1
dc.relation.ispartofjournalSemigroup Forum
dc.relation.ispartofvolume81
dc.rights.retentionY
dc.subject.fieldofresearchPure Mathematics
dc.subject.fieldofresearchcode0101
dc.titleInternet Security Applications of the Munn Rings
dc.typeJournal article
dc.type.descriptionC1 - Articles
dc.type.codeC - Journal Articles
gro.rights.copyright© 2010 Springer New York. This is an electronic version of an article published in Semigroup Forum, Vol. 81(1), pp. 162-171, 2010. Semigroup Forum is available online at: http://www.springerlink.com/ with the open URL of your article.
gro.date.issued2010
gro.hasfulltextFull Text
gro.griffith.authorWu, Xin-Wen


Files in this item

This item appears in the following Collection(s)

  • Journal articles
    Contains articles published by Griffith authors in scholarly journals.

Show simple item record