# George Markowsky

According to our database

Collaborative distances:

^{1}, George Markowsky authored at least 40 papers between 1975 and 2018.Collaborative distances:

## Timeline

#### Legend:

Book In proceedings Article PhD thesis Other## Links

#### On csauthors.net:

## Bibliography

2018

The Technique for Metamorphic Viruses' Detection Based on Its Obfuscation Features Analysis.

Proceedings of the 14th International Conference on ICT in Education, 2018

2017

The problem of interceptor top level domains revisited.

Proceedings of the 9th IEEE International Conference on Intelligent Data Acquisition and Advanced Computing Systems: Technology and Applications, 2017

2015

Scanning for vulnerable devices in the Internet of Things.

Proceedings of the IEEE 8th International Conference on Intelligent Data Acquisition and Advanced Computing Systems: Technology and Applications, 2015

The problem of interceptor top level domains.

Proceedings of the IEEE 8th International Conference on Intelligent Data Acquisition and Advanced Computing Systems: Technology and Applications, 2015

2013

Was the 2006 Debian SSL Debacle a system accident?

Proceedings of the IEEE 7th International Conference on Intelligent Data Acquisition and Advanced Computing Systems, 2013

Adapting American ERP systems for China: Cross-cultural issues and a case study.

Proceedings of the IEEE 7th International Conference on Intelligent Data Acquisition and Advanced Computing Systems, 2013

2012

Security network interface for alarm systems.

Computer Standards & Interfaces, 2012

2011

Universal asset assessment system based on excel™.

Proceedings of the IEEE 6th International Conference on Intelligent Data Acquisition and Advanced Computing Systems: Technology and Applications, 2011

Evolutionary dynamics of revolution: Opinion modeling in society based on graphs and rules.

Proceedings of the IEEE 6th International Conference on Intelligent Data Acquisition and Advanced Computing Systems: Technology and Applications, 2011

2010

Consumer Guide to Online Cybersecurity Resources: UMCEG.

Proceedings of the 2010 International Conference on Security & Management, 2010

High School Cyber Defense Competitions: Lessons from the Trenches.

Proceedings of the 2010 International Conference on Security & Management, 2010

2007

Security Tools for GRID- Systems.

Proceedings of the 2007 International Conference on Security & Management, 2007

Survey of Supercomputer Cluster Security Issues.

Proceedings of the 2007 International Conference on Security & Management, 2007

RF Eavesdropping Beowulf Clusters.

Proceedings of the 2007 International Conference on Security & Management, 2007

2004

Database design for CAD system optimising distributed sensor networks for perimeter security.

Proceedings of the IASTED Conference on Software Engineering and Applications, 2004

1997

An introduction to algorithmic information theory.

Complexity, 1997

1996

Introduction To Algorithmic Information Theory.

J. UCS, 1996

1991

Bounding fault detection probabilities in combinational circuits.

J. Electronic Testing, 1991

1988

Learning Probabilistic Prediction Functions (Extended Abstract)

Proceedings of the 29th Annual Symposium on Foundations of Computer Science, 1988

Learning Probabilistic Prediction Functions.

Proceedings of the First Annual Workshop on Computational Learning Theory, 1988

1987

Bounding Signal Probabilities in Combinational Circuits.

IEEE Trans. Computers, 1987

1983

Intersection-union systems.

Discrete Applied Mathematics, 1983

On Sets of Boolean

*n*-Projections Surjective.
Acta Inf., 1983

1981

Syndrome-Testability Can be Achieved by Circuit Modification.

IEEE Trans. Computers, 1981

The Weighted Syndrome Sums Approach to VLSI Testing.

IEEE Trans. Computers, 1981

Best Huffman Trees.

Acta Inf., 1981

A Fast Algorithm for Steiner Trees.

Acta Inf., 1981

VLSI Self-Testing Based on Syndrome Techniques.

Proceedings of the Proceedings International Test Conference 1981, 1981

1980

On a Class of One-Step Majority-Logic Decodable Cyclic Codes.

IBM Journal of Research and Development, 1980

The level polynomials of the free distributive lattices.

Discrete Mathematics, 1980

1979

Diagnosing Single Faults in Fanout-Free Combinational Circuits.

IEEE Trans. Computers, 1979

Search within a Page.

J. ACM, 1979

1978

Slide Search.

IBM Research Report, June, 1978

On the number of prime implicants.

Discrete Mathematics, 1978

Exact and Approximate Membership Testers

Proceedings of the 10th Annual ACM Symposium on Theory of Computing, 1978

Analysis of a Universal Class of Hash Functions.

Proceedings of the Mathematical Foundations of Computer Science 1978, 1978

1977

Categories of Chain-Complete Posets.

Theor. Comput. Sci., 1977

Multidimensional Bin Packing Algorithms.

IBM Journal of Research and Development, 1977

1976

Lower bounds on the lengths of node sequences in directed graphs.

Discrete Mathematics, 1976

1975

Bases for Chain-Complete Posets

Proceedings of the 16th Annual Symposium on Foundations of Computer Science, 1975