Search in Medwell
Asian Journal of Information Technology
Year: 2015 | Volume: 14 | Issue: 4 | Page No.: 117-121
DOI: 10.36478/ajit.2015.117.121  
On Some Suggested Applications of Sudoku in Information Systems Security
H.I. Okagbue, Z.O. Omogbadegun, F.A. Olajide and A.A. Opanuga
Gunther, J. and T. Moon, 2012. Entropy minimization for solving sudoku. Signal Process, IEEE Trans., 60: 508-513.
CrossRef  |  

Khalid, S.K.A., M.M. Deris and K.M. Mohamad, 2013. Anti-cropping digital image watermarking using sudoku. Int. J. Grid Util. Comput., 4: 169-177.
CrossRef  |  

Lewis, R., 2007. Metaheuristics can solve sudoku puzzles. J. Heuristics, 13: 387-401.
CrossRef  |  

Maire, S. and C. Prissette, 2012. A restarted estimation of distribution algorithm for solving sudoku puzzles. Monte Carlo Methods Appl., 18: 147-160.
CrossRef  |  

Santos-Garcia, G. and M. Palomino, 2007. Solving Sudoku puzzles with rewriting rules. Electron. Notes Theor. Comput. Sci., 176: 79-93.
CrossRef  |