History
1
1618


Please fill in your query. A complete syntax description you will find on the General Help page.

Result 41 to 60 of 1618 total

New results on equilibrium balking strategies in the single-server queue with breakdowns and repairs. (English)
Applied Mathematics and ComputationApplied Mathematics and Computation 241, 380-388(2014)
WorldCat.org
41
Public-key encryption scheme with selective opening chosen-ciphertext security based on the Decisional Diffie-Hellman assumption. (English)
Concurrency and Computation: Practice and ExperienceConcurrency and Computation: Practice and Experience 26, N0. 8, 1506-1519(2014)
WorldCat.org
42
A Revocable Certificateless Signature Scheme. (English)
JCPJCP 9, N0. 8, 1843-1850(2014)
WorldCat.org
43
HHT-SVM: An online method for detecting profile injection attacks in collaborative recommender systems. (English)
Knowl.-Based Syst.Knowl.-Based Syst. 65, 96-105(2014)
WorldCat.org
44
Parallax-Tolerant Image Stitching. (English)
CVPR, 3262-3269(2014)
WorldCat.org
45
Incremental FP-Growth mining strategy for dynamic threshold value and database based on MapReduce. (English)
CSCWD, 271-276(2014)
WorldCat.org
46
Parallel Attribute Reduction Based on MapReduce. (English)
RSKT, 631-641(2014)
WorldCat.org
47
ViewDroid: towards obfuscation-resilient mobile application repackaging detection. (English)
WISEC, 25-36(2014)
WorldCat.org
48
A ranking-based lung nodule image classification method using unlabeled image knowledge. (English)
ISBI, 1356-1359(2014)
WorldCat.org
49
Extended Extreme Learning Machine for Tensorial Signal Classification. (English)
BIC-TA, 420-424(2014)
WorldCat.org
50
An Improved Correlation Method Based on Rotation Invariant Feature for Automatic Particle Selection. (English)
ISBRA, 114-125(2014)
WorldCat.org
51
Mechanized Network Origin and Path Authenticity Proofs. (English)
ACM Conference on Computer and Communications Security, 346-357(2014)
WorldCat.org
52
Scaling and operation characteristics of HfOx based vertical RRAM for 3D cross-point architecture. (English)
ISCAS, 417-420(2014)
WorldCat.org
53
A new method for deriving priority weights by extracting consistent numerical-valued matrices from interval-valued fuzzy judgement matrix. (English)
Inf. Sci.Inf. Sci. 279, 280-300(2014)
WorldCat.org
54
Identity-based chameleon hashing and signatures without key exposure. (English)
Inf. Sci.Inf. Sci. 265, 198-210(2014)
WorldCat.org
55
Patent activity analysis of vibration-reduction control technology in high-speed railway vehicle systems in China. (English)
ScientometricsScientometrics 100, N0. 3, 723-740(2014)
WorldCat.org
56
GreenDCN: A General Framework for Achieving Energy Efficiency in Data Center Networks. (English)
IEEE Journal on Selected Areas in CommunicationsIEEE Journal on Selected Areas in Communications 32, N0. 1, 4-15(2014)
WorldCat.org
57
Evolutionary Scheduling of Dynamic Multitasking Workloads for Big-Data Analytics in Elastic Cloud. (English)
IEEE Trans. Emerging Topics Comput.IEEE Trans. Emerging Topics Comput. 2, N0. 3, 338-351(2014)
WorldCat.org
58
Bistatic Scattering From Three-Dimensional Layered Structures With Multilayer Rough Interfaces. (English)
IEEE Geosci. Remote Sensing Lett.IEEE Geosci. Remote Sensing Lett. 11, N0. 3, 676-680(2014)
WorldCat.org
59
Using integrated quality function deployment and theory of innovation problem solving approach for ergonomic product design. (English)
Computers & Industrial EngineeringComputers & Industrial Engineering 76, 60-74(2014)
WorldCat.org
60

Result 41 to 60 of 1618 total

Valid XHTML 1.0 Transitional Valid CSS!