Login / Signup

Protecting an Invaluable and Ever-Widening Infrastructure.

Stephen J. LukasikLawrence T. GreenbergSeymour E. Goodman
Published in: Commun. ACM (1998)
Keyphrases
  • information exchange
  • access control
  • multimedia
  • multiscale
  • privacy issues
  • real time
  • search algorithm
  • data analysis
  • information technology
  • evolutionary algorithm
  • computing environments