History
1
4039

Please fill in your query. A complete syntax description you will find on the General Help page.

Result 81 to 100 of 4039 total

The fuzzy information processing method in the reliability analysis. (Chinese)
Fuzzy Syst. Math. 25, No. 5, 90-95 (2011).
81
Differential evolution with orthogonal crossover for solving mixed-integer programming. (Chinese)
Syst. Eng. Electron. 33, No. 9, 2126-2132 (2011).
82
Principal support vector machines for linear and nonlinear sufficient dimension reduction. (English)
Ann. Stat. 39, No. 6, 3182-3210 (2011).
83
$H_\infty$ predictive control of networked control systems. (English)
Int. J. Control 84, No. 6, 1080-1097 (2011).
84
Verification tool of software requirement for network software. (English)
Liu, Baoxiang (ed.) et al., Information computing and applications. Second international conference, ICICA 2011, Qinhuangdao, China, October 28‒31, 2011. Proceedings. Berlin: Springer (ISBN 978-3-642-25254-9/pbk). Lecture Notes in Computer Science 7030, 545-552 (2011).
85
Modification algorithm on routh-pade model reduction of interval systems. (English)
Huang, De-Shuang (ed.) et al., Advanced intelligent computing. 7th international conference, ICIC 2011, Zhengzhou, China, August 11‒14, 2011. Revised selected papers. Berlin: Springer (ISBN 978-3-642-24727-9/pbk). Lecture Notes in Computer Science 6838, 701-704 (2011).
86
A branch-and-price algorithm for the bin packing problem with conflicts. (English)
INFORMS J. Comput. 23, No. 3, 404-415 (2011).
87
Security analysis of an improved MFE public key cryptosystem. (English)
Lin, Dongdai (ed.) et al., Cryptology and network security. 10th international conference, CANS 2011, Sanya, China, December 10‒12, 2011. Proceedings. Berlin: Springer (ISBN 978-3-642-25512-0/pbk). Lecture Notes in Computer Science 7092, 118-125 (2011).
88
New impossible differential cryptanalysis of reduced-round Camellia. (English)
Lin, Dongdai (ed.) et al., Cryptology and network security. 10th international conference, CANS 2011, Sanya, China, December 10‒12, 2011. Proceedings. Berlin: Springer (ISBN 978-3-642-25512-0/pbk). Lecture Notes in Computer Science 7092, 26-39 (2011).
89
An inverse voter model for co-evolutionary networks: Stationary efficiency and phase transitions. (English)
Phys. Lett., A 375, No. 11, 1378-1384 (2011).
90
Block triangular preconditioner for static Maxwell equations. (English)
Comput. Appl. Math. 30, No. 3, 589-612 (2011).
91
The GI/M/1 queue with start-up period and single working vacation and Bernoulli vacation interruption. (English)
Appl. Math. Comput. 218, No. 8, 4401-4413 (2011).
92
Using a cellular-automata model to investigate the effects of grazing on plateau pika population dynamics. (English)
Int. J. Biomath. 4, No. 3, 275-287 (2011).
93
Some researches on regularity for trivariate Lagrange interpolation. (Chinese)
J. Dalian Nationalities Univ. 13, No. 1, 34-36 (2011).
94
Universal method on degree distribution of the improved Barabási-Albert model. (Chinese)
J. Hebei Univ. Technol. 40, No. 2, 90-93 (2011).
95
Traffic velocity distributions for different spacings. (Chinese)
J. Tsinghua Univ., Sci. Technol. 51, No. 3, 309-312 (2011).
96
Analysis of the Markov process for degree distribution of an improved model BA. (Chinese)
J. Lanzhou Univ., Nat. Sci. 47, No. 1, 97-99 (2011).
97
An improved particle swarm optimization algorithm based on two subpopulations. (Chinese)
J. Hunan Univ., Nat. Sci. 38, No. 1, 84-88 (2011).
98
Optimal inspection and replacement policy for a shock model with preventive repair. (Chinese)
J. Shandong Univ., Nat. Sci. 46, No. 9, 122-126 (2011).
99
An interval model and its algorithm for the optimal selection of software project risk response actions. (Chinese)
Control Decis. 26, No. 4, 530-534 (2011).
100

Result 81 to 100 of 4039 total