Mustafa Atici

According to our database1, Mustafa Atici authored at least 17 papers between 1996 and 2018.

Collaborative distances:
  • Dijkstra number2 of five.
  • Erdős number3 of two.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

On csauthors.net:

Bibliography

2018
Application of Huffman data compression algorithm in hashing computation.
Proceedings of the ACMSE 2018 Conference, Richmond, KY, USA, March 29-31, 2018, 2018

2017
A New Approach for Modeling with Discrete Fractional Equations.
Fundam. Informaticae, 2017

2016
Efficient Algorithm to Construct Perfect Secret Sharing Scheme for a Given Access Structure.
Proceedings of the 11th Annual Cyber and Information Security Research Conference, 2016

2015
Proposed Approximate Dynamic Programming for Pathfinding under Visible Uncertainty.
CoRR, 2015

2014
Fault-Tolerant, but Paradoxical Path-Finding in Physical and Conceptual Systems.
CoRR, 2014

Parameter estimations of sigmoidal models of cancer.
BMC Bioinform., 2014

2013
Vector space secret sharing and an efficient algorithm to construct a φ function.
Proceedings of the ACM Southeast Regional Conference 2013, 2013

2012
Secret Sharing Scheme: Vector Space Secret Sharing and F Function.
Proceedings of the International Conference on Advances in Social Networks Analysis and Mining, 2012

2011
On the Range of Possible Integrities of Graphs <i>G</i>(<i>n</i>, <i>k</i>).
Graphs Comb., 2011

Graph coloring: color sequences and algorithm for color sequence.
Proceedings of the 49th Annual Southeast Regional Conference, 2011

2009
The integrity of small cage graphs.
Australas. J Comb., 2009

2007
(t, k)-Geodetic Set of a Graph.
Ars Comb., 2007

2004
New upper bounds for the integrity of cubic graphs.
Int. J. Comput. Math., 2004

2003
On The Edge Geodetic Number of a Graph.
Int. J. Comput. Math., 2003

2002
Computational Complexity of Geodetic Set.
Int. J. Comput. Math., 2002

Geodesics in Graphs, an Extremal Set Problem, and Perfect Hash Families.
Graphs Comb., 2002

1996
Universal Hashing and Multiple Authentication.
Proceedings of the Advances in Cryptology, 1996


  Loading...