Login / Signup
How to Secure Matchings Against Edge Failures.
Felix Hommelsheim
Moritz Mühlenthaler
Oliver Schaudt
Published in:
STACS (2019)
Keyphrases
</>
edge detection
edge information
weighted graph
database
security issues
image segmentation
spanning tree
identity management
authentication scheme
root cause
standard model
security protocols
security analysis
edge map
quality of service
wireless sensor networks
data sets