|
Search the dblp DataBase
Siu-Ming Yiu:
[Publications]
[Author Rank by year]
[Co-authors]
[Prefers]
[Cites]
[Cited by]
Publications of Author
- H. W. Go, P. Y. Chan, Y. Dong, Ai Fen Sui, Siu-Ming Yiu, Lucas Chi Kwong Hui, Victor O. K. Li
Performance evaluation on CRL distribution using flooding in mobile ad hoc networks (MANETs). [Citation Graph (0, 0)][DBLP] ACM Southeast Regional Conference (2), 2005, pp:75-80 [Conf]
- Man Ho Au, Willy Susilo, Siu-Ming Yiu
Event-Oriented k-Times Revocable-iff-Linked Group Signatures. [Citation Graph (0, 0)][DBLP] ACISP, 2006, pp:223-234 [Conf]
- Sherman S. M. Chow, Lucas Chi Kwong Hui, Siu-Ming Yiu, K. P. Chow
Two Improved Partially Blind Signature Schemes from Bilinear Pairings. [Citation Graph (0, 0)][DBLP] ACISP, 2005, pp:316-328 [Conf]
- Richard W. C. Lui, Sherman S. M. Chow, Lucas Chi Kwong Hui, Siu-Ming Yiu
Role Activation Management in Role Based Access Control. [Citation Graph (0, 0)][DBLP] ACISP, 2005, pp:358-369 [Conf]
- Sherman S. M. Chow, Siu-Ming Yiu, Lucas Chi Kwong Hui
Efficient Identity Based Ring Signature. [Citation Graph (0, 0)][DBLP] ACNS, 2005, pp:499-512 [Conf]
- Wing-Kai Hon, Tak Wah Lam, Wing-Kin Sung, Wai-Leuk Tse, Chi-Kwong Wong, Siu-Ming Yiu
Practical aspects of Compressed Suffix Arrays and FM-Index in Searching DNA Sequences. [Citation Graph (0, 0)][DBLP] ALENEX/ANALC, 2004, pp:31-38 [Conf]
- Prudence W. H. Wong, Tak Wah Lam, Y. C. Mui, Siu-Ming Yiu, H. F. Kung, Marie Lin, Y. T. Cheung
Filtering of Ineffective siRNAs and Improved siRNA Design Tool. [Citation Graph (0, 0)][DBLP] APBC, 2004, pp:247-255 [Conf]
- P. Y. Chan, Tak Wah Lam, Siu-Ming Yiu
A More Accurate and Efficient Whole Genome Phylogeny. [Citation Graph (0, 0)][DBLP] APBC, 2006, pp:337-352 [Conf]
- Siu-Ming Yiu, P. Y. Chan, Tak Wah Lam, Wing-Kin Sung, Hing-Fung Ting, Prudence W. H. Wong
Allowing mismatches in anchors for wholw genome alignment: Generation and effectiveness. [Citation Graph (0, 0)][DBLP] APBC, 2005, pp:1-10 [Conf]
- Ho-Leung Chan, Tak Wah Lam, Wing-Kin Sung, Prudence W. H. Wong, Siu-Ming Yiu
A Mutation-Sensitive Approach for Locating Conserved Gene Pairs between Related Species. [Citation Graph (0, 0)][DBLP] BIBE, 2004, pp:545-552 [Conf]
- Samuel Ieong, Ming-Yang Kao, Tak Wah Lam, Wing-Kin Sung, Siu-Ming Yiu
Predicting RNA Secondary Structures with Arbitrary Pseudoknots by Maximizing the Number of Stacking Pairs. [Citation Graph (0, 0)][DBLP] BIBE, 2001, pp:183-190 [Conf]
- Siu-Ming Yiu, A. Choi
Edge Guards on a Fortress. [Citation Graph (0, 0)][DBLP] CCCG, 1994, pp:296-301 [Conf]
- Tak Wah Lam, Kunihiko Sadakane, Wing-Kin Sung, Siu-Ming Yiu
A Space and Time Efficient Algorithm for Constructing Compressed Suffix Arrays. [Citation Graph (0, 0)][DBLP] COCOON, 2002, pp:401-410 [Conf]
- F. T. Chan, K. P. Chan, T. Y. Chen, Siu-Ming Yiu
Adaptive Random Testing with CG Constraint. [Citation Graph (0, 0)][DBLP] COMPSAC Workshops, 2004, pp:96-99 [Conf]
- Lucas Chi Kwong Hui, K. P. Chow, Kevin K. H. Pun, Siu-Ming Yiu, Wai Wan Tsang, C. F. Chong, H. W. Chan
Risk Management of Corporate Confidential Information in Digital Form. [Citation Graph (0, 0)][DBLP] COMPSAC, 2004, pp:88-89 [Conf]
- Karl R. P. H. Leung, Lucas Chi Kwong Hui, Siu-Ming Yiu, Ricky W. M. Tang
Modeling Web Navigation by Statechart. [Citation Graph (0, 0)][DBLP] COMPSAC, 2000, pp:41-47 [Conf]
- Pierre K. Y. Lai, Siu-Ming Yiu, K. P. Chow, C. F. Chong, Lucas Chi Kwong Hui
An Efficient Bloom Filter Based Solution for Multiparty Private Matching. [Citation Graph (0, 0)][DBLP] Security and Management, 2006, pp:286-292 [Conf]
- Richard W. C. Lui, Lucas Chi Kwong Hui, Siu-Ming Yiu, Yan Woo
A model to support fine-grained delegation of authorization. [Citation Graph (0, 0)][DBLP] Security and Management, 2005, pp:208-212 [Conf]
- Yan Woo, Lucas Chi Kwong Hui, K. P. Chow, Siu-Ming Yiu
Dynamic Integrity Verification for Software Self-defense. [Citation Graph (0, 0)][DBLP] Security and Management, 2005, pp:327-333 [Conf]
- Lok-Lam Cheng, David Wai-Lok Cheung, Siu-Ming Yiu
Approximate String Matching in DNA Sequences. [Citation Graph (0, 0)][DBLP] DASFAA, 2003, pp:303-310 [Conf]
- Wing-Kai Hon, Tak Wah Lam, Kunihiko Sadakane, Wing-Kin Sung, Siu-Ming Yiu
Compressed Index for Dynamic Text. [Citation Graph (0, 0)][DBLP] Data Compression Conference, 2004, pp:102-111 [Conf]
- Wing-Kin Sung, David Yang, Siu-Ming Yiu, Wai-Shing Ho, David Wai-Lok Cheung, Tak Wah Lam
Automatic Construction of Online Catalog Topologies. [Citation Graph (0, 0)][DBLP] EC-Web, 2001, pp:216-225 [Conf]
- Joe C. K. Yau, Lucas Chi Kwong Hui, Bruce S. N. Cheung, Siu-Ming Yiu, Yan Woo, K. W. Lau, Eric H. M. Li
Trustworthy Browsing - A Secure Web Accessing Model. [Citation Graph (0, 0)][DBLP] EEE, 2005, pp:542-547 [Conf]
- Sherman S. M. Chow, Richard W. C. Lui, Lucas Chi Kwong Hui, Siu-Ming Yiu
Identity Based Ring Signature: Why, How and What Next. [Citation Graph (0, 0)][DBLP] EuroPKI, 2005, pp:144-161 [Conf]
- Richard W. C. Lui, Lucas Chi Kwong Hui, Siu-Ming Yiu
Secure Role Activation and Authorization in the Enterprise Environment. [Citation Graph (0, 0)][DBLP] EuroPKI, 2005, pp:22-35 [Conf]
- Venus L. S. Cheung, Lucas Chi Kwong Hui, Siu-Ming Yiu, K. P. Chow, Kevin K. H. Pun, Wai Wan Tsang, H. W. Chan, C. F. Chong
Delegation of signing and decryption rights using pki proxy memo. [Citation Graph (0, 0)][DBLP] IASTED Conf. on Software Engineering, 2004, pp:281-285 [Conf]
- Sherman S. M. Chow, Lucas Chi Kwong Hui, Siu-Ming Yiu, K. P. Chow
An e-Lottery Scheme Using Verifiable Random Function. [Citation Graph (0, 0)][DBLP] ICCSA (3), 2005, pp:651-660 [Conf]
- Venus L. S. Cheung, Lucas Chi Kwong Hui, Siu-Ming Yiu
The Delegation Problem and Practical PKI-Based Solutions. [Citation Graph (0, 0)][DBLP] ICEIS (3), 2004, pp:73-84 [Conf]
- Sherman S. M. Chow, Lucas Chi Kwong Hui, Siu-Ming Yiu, K. P. Chow
Secure Hierarchical Identity Based Signature and Its Application. [Citation Graph (0, 0)][DBLP] ICICS, 2004, pp:480-494 [Conf]
- Sherman S. M. Chow, Lucas Chi Kwong Hui, Siu-Ming Yiu
Identity Based Threshold Ring Signature. [Citation Graph (0, 0)][DBLP] ICISC, 2004, pp:218-232 [Conf]
- Sherman S. M. Chow, Siu-Ming Yiu, Lucas Chi Kwong Hui, K. P. Chow
Efficient Forward and Provably Secure ID-Based Signcryption Scheme with Public Verifiability and Public Ciphertext Authenticity. [Citation Graph (0, 0)][DBLP] ICISC, 2003, pp:352-369 [Conf]
- Richard W. C. Lui, Sherman S. M. Chow, Lucas Chi Kwong Hui, Siu-Ming Yiu
Supporting Efficient Authorization in Delegation with Supervision. [Citation Graph (0, 0)][DBLP] ICPADS (2), 2005, pp:240-244 [Conf]
- Ai Fen Sui, Sherman S. M. Chow, Lucas Chi Kwong Hui, Siu-Ming Yiu, K. P. Chow, Wai Wan Tsang, C. F. Chong, Kevin K. H. Pun, H. W. Chan
Separable and Anonymous Identity-Based Key Issuing. [Citation Graph (0, 0)][DBLP] ICPADS (2), 2005, pp:275-279 [Conf]
- H. W. Go, Y. Dong, Lucas Chi Kwong Hui, Siu-Ming Yiu, Victor O. K. Li
Applying Forward Security and Threshold Cryptography in Ad Hoc Networks. [Citation Graph (0, 0)][DBLP] International Conference on Wireless Networks, 2004, pp:202-209 [Conf]
- Tak Wah Lam, N. Lu, Hing-Fung Ting, Prudence W. H. Wong, Siu-Ming Yiu
Efficient Algorithms for Optimizing Whole Genome Alignment with Noise. [Citation Graph (0, 0)][DBLP] ISAAC, 2003, pp:364-374 [Conf]
- Lucas Chi Kwong Hui, K. P. Chow, Siu-Ming Yiu
Tools and Technology for Computer Forensics: Research and Development in Hong Kong (Invited Paper). [Citation Graph (0, 0)][DBLP] ISPEC, 2007, pp:11-19 [Conf]
- Ho-Leung Chan, Jesper Jansson, Tak Wah Lam, Siu-Ming Yiu
Reconstructing an Ultrametric Galled Phylogenetic Network from a Distance Matrix. [Citation Graph (0, 0)][DBLP] MFCS, 2005, pp:224-235 [Conf]
- Sherman S. M. Chow, Richard W. C. Lui, Lucas Chi Kwong Hui, Siu-Ming Yiu
Identity Based Delegation Network. [Citation Graph (0, 0)][DBLP] Mycrypt, 2005, pp:99-115 [Conf]
- David Wai-Lok Cheung, Lian Wang, Siu-Ming Yiu, Bo Zhou
Density-Based Mining of Quantitative Association Rules. [Citation Graph (0, 0)][DBLP] PAKDD, 2000, pp:257-268 [Conf]
- Francis Y. L. Chin, Henry C. M. Leung, Siu-Ming Yiu, Tak Wah Lam, Roni Rosenfeld, Wai Wan Tsang, David K. Smith, Y. Jiang
Finding motifs for insufficient number of sequences with strong binding to transcription facto. [Citation Graph (0, 0)][DBLP] RECOMB, 2004, pp:125-132 [Conf]
- Wang Lian, David W. Cheung, Siu-Ming Yiu
Maintenance of maximal frequent itemsets in large databases. [Citation Graph (0, 0)][DBLP] SAC, 2007, pp:388-392 [Conf]
- Sherman S. M. Chow, Tsz Hon Yuen, Lucas Chi Kwong Hui, Siu-Ming Yiu
Signcryption in Hierarchical Identity Based Cryptosystem. [Citation Graph (0, 0)][DBLP] SEC, 2005, pp:443-457 [Conf]
- Lian Wang, David Wai-Lok Cheung, Siu-Ming Yiu
Indexing Attributes and Reordering Profiles for XML Document Filtering and Information Delivery. [Citation Graph (0, 0)][DBLP] WAIM, 2001, pp:355-366 [Conf]
- Bruce S. N. Cheung, Sarah Ho, Siu-Ming Yiu
A Survey On Online Education. [Citation Graph (0, 0)][DBLP] WebNet, 1998, pp:- [Conf]
- David Yang, Wing-Kin Sung, Siu-Ming Yiu, David Wai-Lok Cheung, Wai-Shing Ho, Tak Wah Lam, Sau Dan Lee
Construction of Online Catalog Topologies Using Decision Trees. [Citation Graph (0, 0)][DBLP] WECWIS, 2000, pp:223-230 [Conf]
- Wang Lian, Nikos Mamoulis, David Wai-Lok Cheung, Siu-Ming Yiu
Discovering Minimal Infrequent Structures from XML Documents. [Citation Graph (0, 0)][DBLP] WISE, 2004, pp:291-302 [Conf]
- Ho-Leung Chan, Tak Wah Lam, Wing-Kin Sung, Prudence W. H. Wong, Siu-Ming Yiu, X. Fan
The mutated subsequence problem and locating conserved genes. [Citation Graph (0, 0)][DBLP] Bioinformatics, 2005, v:21, n:10, pp:2271-2278 [Journal]
- Prudence W. H. Wong, Tak Wah Lam, N. Lu, Hing-Fung Ting, Siu-Ming Yiu
An efficient algorithm for optimizing whole genome alignment with noise. [Citation Graph (0, 0)][DBLP] Bioinformatics, 2004, v:20, n:16, pp:2676-2684 [Journal]
- Siu-Ming Yiu, Prudence W. H. Wong, Tak Wah Lam, Y. C. Mui, H. F. Kung, Marie Lin, Y. T. Cheung
Filtering of Ineffective siRNAs and Improved siRNA Design Tool. [Citation Graph (0, 0)][DBLP] Bioinformatics, 2005, v:21, n:2, pp:144-151 [Journal]
- Sherman S. M. Chow, Lucas Chi Kwong Hui, Siu-Ming Yiu, K. P. Chow
Practical electronic lotteries with offline TTP. [Citation Graph (0, 0)][DBLP] Computer Communications, 2006, v:29, n:15, pp:2830-2840 [Journal]
- Samuel Ieong, Ming-Yang Kao, Tak Wah Lam, Wing-Kin Sung, Siu-Ming Yiu
Predicting RNA Secondary Structures with Arbitrary Pseudoknots by Maximizing the Number of Stacking Pairs [Citation Graph (0, 0)][DBLP] CoRR, 2001, v:0, n:, pp:- [Journal]
- Wing-Kai Hon, Ming-Yang Kao, Tak Wah Lam, Wing-Kin Sung, Siu-Ming Yiu
Improved Phylogeny Comparisons: Non-Shared Edges Nearest Neighbor Interchanges, and Subtree Transfers [Citation Graph (0, 0)][DBLP] CoRR, 2002, v:0, n:, pp:- [Journal]
- Wing-Kai Hon, Tak Wah Lam, Siu-Ming Yiu, Ming-Yang Kao, Wing-Kin Sung
Subtree Transfer Distance For Degree-D Phylogenies. [Citation Graph (0, 0)][DBLP] Int. J. Found. Comput. Sci., 2004, v:15, n:6, pp:893-909 [Journal]
- Wing-Kai Hon, Ming-Yang Kao, Tak Wah Lam, Wing-Kin Sung, Siu-Ming Yiu
Non-shared edges and nearest neighbor interchanges revisited. [Citation Graph (0, 0)][DBLP] Inf. Process. Lett., 2004, v:91, n:3, pp:129-134 [Journal]
- Ho-Leung Chan, Jesper Jansson, Tak Wah Lam, Siu-Ming Yiu
Reconstructing an Ultrametric Galled Phylogenetic Network from a Distance Matrix. [Citation Graph (0, 0)][DBLP] J. Bioinformatics and Computational Biology, 2006, v:4, n:4, pp:807-832 [Journal]
- Samuel Ieong, Ming-Yang Kao, Tak Wah Lam, Wing-Kin Sung, Siu-Ming Yiu
Predicting RNA Secondary Structures with Arbitrary Pseudoknots by Maximizing the Number of Stacking Pairs. [Citation Graph (0, 0)][DBLP] Journal of Computational Biology, 2003, v:10, n:6, pp:981-995 [Journal]
- Henry C. M. Leung, Francis Y. L. Chin, Siu-Ming Yiu, Ronald Rosenfeld, Wai Wan Tsang
Finding Motifs with Insufficient Number of Strong Binding Sites. [Citation Graph (0, 0)][DBLP] Journal of Computational Biology, 2005, v:12, n:6, pp:686-701 [Journal]
- B. Cheung, Lucas Chi Kwong Hui, J. Zhang, Siu-Ming Yiu
SmartTutor: An intelligent tutoring system in web-based adult education. [Citation Graph (0, 0)][DBLP] Journal of Systems and Software, 2003, v:68, n:1, pp:11-25 [Journal]
- Sherman S. M. Chow, Lucas Chi Kwong Hui, Siu-Ming Yiu, K. P. Chow, Richard W. C. Lui
A generic anti-spyware solution by access control list at kernel level. [Citation Graph (0, 0)][DBLP] Journal of Systems and Software, 2005, v:75, n:1-2, pp:227-234 [Journal]
- Wang Lian, David Wai-Lok Cheung, Nikos Mamoulis, Siu-Ming Yiu
An Efficient and Scalable Algorithm for Clustering XML Documents by Structure. [Citation Graph (0, 0)][DBLP] IEEE Trans. Knowl. Data Eng., 2004, v:16, n:1, pp:82-96 [Journal]
- Wang Lian, Nikos Mamoulis, David Wai-Lok Cheung, Siu-Ming Yiu
Indexing Useful Structural Patterns for XML Query Processing. [Citation Graph (0, 0)][DBLP] IEEE Trans. Knowl. Data Eng., 2005, v:17, n:7, pp:997-1009 [Journal]
- Wing-Kin Sung, David Yang, Siu-Ming Yiu, David Wai-Lok Cheung, Wai-Shing Ho, Tak Wah Lam
Automatic construction of online catalog topologies. [Citation Graph (0, 0)][DBLP] IEEE Transactions on Systems, Man, and Cybernetics, Part C, 2002, v:32, n:4, pp:382-391 [Journal]
- Eric K. Wang, Joe C. K. Yau, Lucas Chi Kwong Hui, Zoe L. Jiang, Siu-Ming Yiu
A Key-Recovery System for Long-term Encrypted Documents. [Citation Graph (0, 0)][DBLP] EDOC Workshops, 2006, pp:52- [Conf]
- Francis Y. L. Chin, Henry C. M. Leung, W. K. Sung, Siu-Ming Yiu
The Point Placement Problem on a Line - Improved Bounds for Pairwise Distance Queries. [Citation Graph (0, 0)][DBLP] WABI, 2007, pp:372-382 [Conf]
- Meiqin Wang, Lin Li, Siu-Ming Yiu, Lucas Chi Kwong Hui, C. F. Chong, K. P. Chow, Wai Wan Tsang, H. W. Chan, Kevin K. H. Pun
A Hybrid Approach for Authenticating MPEG-2 Streaming Data. [Citation Graph (0, 0)][DBLP] MCAM, 2007, pp:203-212 [Conf]
- Tak Wah Lam, Wing-Kin Sung, Siu-Lung Tam, Chi-Kwong Wong, Siu-Ming Yiu
An Experimental Study of Compressed Indexing and Local Alignments of DNA. [Citation Graph (0, 0)][DBLP] COCOA, 2007, pp:242-254 [Conf]
- Wing-Kai Hon, Tak Wah Lam, Kunihiko Sadakane, Wing-Kin Sung, Siu-Ming Yiu
A Space and Time Efficient Algorithm for Constructing Compressed Suffix Arrays. [Citation Graph (0, 0)][DBLP] Algorithmica, 2007, v:48, n:1, pp:23-36 [Journal]
- Edward Wijaya, Kanagasabai Rajaraman, Siu-Ming Yiu, Wing-Kin Sung
Detection of generic spaced motifs using submotif pattern mining. [Citation Graph (0, 0)][DBLP] Bioinformatics, 2007, v:23, n:12, pp:1476-1485 [Journal]
- Y. Dong, Ai Fen Sui, Siu-Ming Yiu, Victor O. K. Li, Lucas Chi Kwong Hui
Providing distributed certificate authority service in cluster-based mobile ad hoc networks. [Citation Graph (0, 0)][DBLP] Computer Communications, 2007, v:30, n:11-12, pp:2442-2452 [Journal]
- Richard W. C. Lui, Lucas Chi Kwong Hui, Siu-Ming Yiu
Delegation with supervision. [Citation Graph (0, 0)][DBLP] Inf. Sci., 2007, v:177, n:19, pp:4014-4030 [Journal]
Indexing Similar DNA Sequences. [Citation Graph (, )][DBLP]
A Memory Efficient Algorithm for Structural Alignment of RNAs with Embedded Simple Pseudoknots. [Citation Graph (, )][DBLP]
Optimal Algorithm for Finding DNA Motifs with Nucleotide Adjacent Dependency. [Citation Graph (, )][DBLP]
Finding Alternative Splicing Patterns with Strong Support From Expressed Sequences. [Citation Graph (, )][DBLP]
Authenticated Directed Diffusion. [Citation Graph (, )][DBLP]
Unsupervised binning of environmental genomic fragments based on an error robust selection of l-mers. [Citation Graph (, )][DBLP]
Remote Group User Authentication with Forward Secrecy and Key Agreement with Smartcard. [Citation Graph (, )][DBLP]
A New Practical Scheme for Protecting Web Content. [Citation Graph (, )][DBLP]
Two Efficient Proxy Signature Schemes for Delegation Chains with Nonrepudiation and Untraceability. [Citation Graph (, )][DBLP]
A Practical SMS-based Mutual Authentication Protocol for Secure Online Banking. [Citation Graph (, )][DBLP]
An Efficient Cluster-Based Proactive Secret Share Update Scheme for Mobile Ad Hoc Networks. [Citation Graph (, )][DBLP]
Improving Disk Sector Integrity Using K-Dimension Hashing. [Citation Graph (, )][DBLP]
Space Efficient Indexes for String Matching with Don't Cares. [Citation Graph (, )][DBLP]
IDBA - A Practical Iterative de Bruijn Graph De Novo Assembler. [Citation Graph (, )][DBLP]
Protecting Digital Legal Professional Privilege (LPP) Data. [Citation Graph (, )][DBLP]
Succinct Text Indexing with Wildcards. [Citation Graph (, )][DBLP]
Structural Alignment of RNA with Complex Pseudoknot Structure. [Citation Graph (, )][DBLP]
Local Structural Alignment of RNA with Affine Gap Model. [Citation Graph (, )][DBLP]
Timed-Release Encryption Revisited. [Citation Graph (, )][DBLP]
High Throughput Short Read Alignment via Bi-directional BWT. [Citation Graph (, )][DBLP]
Improving Disk Sector Integrity Using 3-dimension Hashing Scheme. [Citation Graph (, )][DBLP]
RFID Forward Secure Authentication Protocol: Flaw and Solution. [Citation Graph (, )][DBLP]
Chained Threshold Proxy Signature without and with Supervision. [Citation Graph (, )][DBLP]
The 2-Interval Pattern Matching Problems and Its Application to ncRNA Scanning. [Citation Graph (, )][DBLP]
SPECS: Secure and Privacy Enhancing Communications Schemes for VANETs. [Citation Graph (, )][DBLP]
ARMR: Anonymous routing protocol with multiple routes for communications in mobile ad hoc networks. [Citation Graph (, )][DBLP]
Compressed indexing and local alignment of DNA. [Citation Graph (, )][DBLP]
MotifVoter: a novel ensemble method for fine-grained integration of generic motif finders. [Citation Graph (, )][DBLP]
SOAP2: an improved ultrafast tool for short read alignment. [Citation Graph (, )][DBLP]
Filtering of false positive microRNA candidates by a clustering-based approach. [Citation Graph (, )][DBLP]
Finding optimal threshold for correction error reads in DNA assembling. [Citation Graph (, )][DBLP]
Unsupervised binning of environmental genomic fragments based on an error robust selection of l-mers. [Citation Graph (, )][DBLP]
A new key establishment scheme for wireless sensor networks [Citation Graph (, )][DBLP]
Search in 0.070secs, Finished in 0.075secs
|