A Graph Theoretic Approach to Statistical Data Security
A Decomposition-Based Pseudoapproximation Algorithm for Network Flow Inhibition
Approximation Algorithms and Hardness of the K-route Cut Problem