![](/images/ico/ico_close.png)
![](/images/ico/ico5.png)
Author: Atkinson M.D. Livesey M.J. Tulley D.
Publisher: Elsevier
ISSN: 0304-3975
Source: Theoretical Computer Science, Vol.178, Iss.1, 1997-05, pp. : 103-118
Disclaimer: Any content in publications that violate the sovereignty, the constitution or regulations of the PRC is not accepted or approved by CNPIEC.
Abstract
Related content
![](/images/ico/ico_close.png)
![](/images/ico/ico5.png)
Routing Permutations on Graphs via Factors
Journal of Parallel and Distributed Computing, Vol. 54, Iss. 2, 1998-11 ,pp. :
![](/images/ico/ico_close.png)
![](/images/ico/ico5.png)
![](/images/ico/ico_close.png)
![](/images/ico/ico5.png)
Token-Based Fingerprint Authentication
Recent Patents on Computer Science, Vol. 2, Iss. 1, 2009-01 ,pp. :
![](/images/ico/ico_close.png)
![](/images/ico/ico5.png)
Regular closed sets of permutations
By Albert M.H. Atkinson M.D. Ruskuc N.
Theoretical Computer Science, Vol. 306, Iss. 1, 2003-09 ,pp. :
![](/images/ico/ico_close.png)
![](/images/ico/ico5.png)
Intersection theorem for finite permutations
By Blinovsky V.
Problems of Information Transmission, Vol. 47, Iss. 1, 2011-03 ,pp. :