George Markowsky

According to our database1, George Markowsky
  • authored at least 39 papers between 1975 and 2017.
  • has a "Dijkstra number"2 of three.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Other 

Links

On csauthors.net:

Bibliography

2017
The problem of interceptor top level domains revisited.
Proceedings of the 9th IEEE International Conference on Intelligent Data Acquisition and Advanced Computing Systems: Technology and Applications, 2017

2015
Scanning for vulnerable devices in the Internet of Things.
Proceedings of the IEEE 8th International Conference on Intelligent Data Acquisition and Advanced Computing Systems: Technology and Applications, 2015

The problem of interceptor top level domains.
Proceedings of the IEEE 8th International Conference on Intelligent Data Acquisition and Advanced Computing Systems: Technology and Applications, 2015

2013
Was the 2006 Debian SSL Debacle a system accident?
Proceedings of the IEEE 7th International Conference on Intelligent Data Acquisition and Advanced Computing Systems, 2013

Adapting American ERP systems for China: Cross-cultural issues and a case study.
Proceedings of the IEEE 7th International Conference on Intelligent Data Acquisition and Advanced Computing Systems, 2013

2012
Security network interface for alarm systems.
Computer Standards & Interfaces, 2012

2011
Universal asset assessment system based on excel™.
Proceedings of the IEEE 6th International Conference on Intelligent Data Acquisition and Advanced Computing Systems: Technology and Applications, 2011

Evolutionary dynamics of revolution: Opinion modeling in society based on graphs and rules.
Proceedings of the IEEE 6th International Conference on Intelligent Data Acquisition and Advanced Computing Systems: Technology and Applications, 2011

2010
Consumer Guide to Online Cybersecurity Resources: UMCEG.
Proceedings of the 2010 International Conference on Security & Management, 2010

High School Cyber Defense Competitions: Lessons from the Trenches.
Proceedings of the 2010 International Conference on Security & Management, 2010

2007
Security Tools for GRID- Systems.
Proceedings of the 2007 International Conference on Security & Management, 2007

Survey of Supercomputer Cluster Security Issues.
Proceedings of the 2007 International Conference on Security & Management, 2007

RF Eavesdropping Beowulf Clusters.
Proceedings of the 2007 International Conference on Security & Management, 2007

2004
Database design for CAD system optimising distributed sensor networks for perimeter security.
Proceedings of the IASTED Conference on Software Engineering and Applications, 2004

1997
An introduction to algorithmic information theory.
Complexity, 1997

1996
Introduction To Algorithmic Information Theory.
J. UCS, 1996

1991
Bounding fault detection probabilities in combinational circuits.
J. Electronic Testing, 1991

1988
Learning Probabilistic Prediction Functions (Extended Abstract)
Proceedings of the 29th Annual Symposium on Foundations of Computer Science, 1988

Learning Probabilistic Prediction Functions.
Proceedings of the First Annual Workshop on Computational Learning Theory, 1988

1987
Bounding Signal Probabilities in Combinational Circuits.
IEEE Trans. Computers, 1987

1983
Intersection-union systems.
Discrete Applied Mathematics, 1983

On Sets of Boolean n -Projections Surjective.
Acta Inf., 1983

1981
Syndrome-Testability Can be Achieved by Circuit Modification.
IEEE Trans. Computers, 1981

The Weighted Syndrome Sums Approach to VLSI Testing.
IEEE Trans. Computers, 1981

Best Huffman Trees.
Acta Inf., 1981

A Fast Algorithm for Steiner Trees.
Acta Inf., 1981

VLSI Self-Testing Based on Syndrome Techniques.
Proceedings of the Proceedings International Test Conference 1981, 1981

1980
On a Class of One-Step Majority-Logic Decodable Cyclic Codes.
IBM Journal of Research and Development, 1980

The level polynomials of the free distributive lattices.
Discrete Mathematics, 1980

1979
Diagnosing Single Faults in Fanout-Free Combinational Circuits.
IEEE Trans. Computers, 1979

Search within a Page.
J. ACM, 1979

1978
Slide Search.
IBM Research Report, June, 1978

On the number of prime implicants.
Discrete Mathematics, 1978

Exact and Approximate Membership Testers
Proceedings of the 10th Annual ACM Symposium on Theory of Computing, 1978

Analysis of a Universal Class of Hash Functions.
Proceedings of the Mathematical Foundations of Computer Science 1978, 1978

1977
Categories of Chain-Complete Posets.
Theor. Comput. Sci., 1977

Multidimensional Bin Packing Algorithms.
IBM Journal of Research and Development, 1977

1976
Lower bounds on the lengths of node sequences in directed graphs.
Discrete Mathematics, 1976

1975
Bases for Chain-Complete Posets
Proceedings of the 16th Annual Symposium on Foundations of Computer Science, 1975


  Loading...