СТ |
Effective Web-Related Resource Security Using Distributed role Hierarchy |
2004 |
Lee G., Kim W., Kim D. -K., Yeh H. |
Lecture Notes in Computer Science |
|
|
Lecture Notes in Computer Science |
15.09.2004 |
СТ |
Setting a Framework for Trusted Component Trading |
2003 |
Mirris J., Lam C. P., Bundell G. A., Lee G., Parker K. |
|
|
|
Lecture Notes in Computer Science |
19.09.2003 |
СТ |
Chapter 7. Interprocedural Analysis Based on Guarded Array Regions |
2001 |
Li Z., Gu J., Lee G. |
|
|
|
Lecture Notes in Computer Science |
02.06.2001 |
СТ |
Efficient Graph-Based Algorithm for Discovering and Maintaining Knowledge in Large Databases |
1999 |
Lee K. L., Lee G., Chen A.L. P. |
|
|
|
Lecture Notes in Artificial Intelligence |
21.05.1999 |
СТ |
Experience with Efficient Array Data Flow Analysis for Array Privatization |
1997 |
Gu J., Li Z., Lee G. |
|
|
|
SIGPLAN Notices |
30.09.1997 |