History
1
938

Please fill in your query. A complete syntax description you will find on the General Help page.
first | previous | 1 21 41 61 81 101 | next | last

Result 1 to 20 of 938 total

Estimation, modeling, and aggregation of missing survey data for prioritizing customer voices. (English)
Eur. J. Oper. Res. 220, No. 3, 762-776 (2012).
1
Three-color Ramsey numbers of $K _{n }$ dropping an edge. (English)
Graphs Comb. 28, No. 5, 663-669 (2012).
2
The evidential reasoning approach for risk management in large enterprises. (English)
Int. J. Uncertain. Fuzziness Knowl.-Based Syst. 20, Suppl. 1, 17-30 (2012).
3
An introduction and survey of the evidential reasoning approach for multiple criteria decision analysis. (English)
Ann. Oper. Res. 195, 163-187 (2012).
4
Performance of local information-based link prediction: a sampling perspective. (English)
J. Phys. A, Math. Theor. 45, No. 34, Article ID 345001, 18 p. (2012).
5
Preimage attacks on step-reduced SM3 hash function. (English)
Kim, Howon (ed.), Information security and cryptology ‒ ICISC 2011. 14th international conference, Seoul, Korea, November 30‒December 2, 2011. Revised selected papers. Berlin: Springer (ISBN 978-3-642-31911-2/pbk). Lecture Notes in Computer Science 7259, 375-390 (2012).
6
A new one-step smoothing Newton method for second-order cone programming. (English)
Appl. Math., Praha 57, No. 4, 311-331 (2012).
Reviewer: 13425
7
Nearly deterministic controlled-NOT gate with weak cross-Kerr nonlinearities. (English)
Quantum Inf. Comput. 12, No. 1-2, 159-170 (2012).
8
$H_{\infty }$ filtering for networked systems with partly known distribution transmission delays. (English)
Inf. Sci. 194, 270-282 (2012).
9
Enterprise information system structure optimization based on time property with improved immune genetic algorithm and binary tree. (English)
Comput. Math. Appl. 63, No. 7, 1155-1168 (2012).
10
An approach to construct dynamic service mashups using lightweight semantics. (English)
Harth, Andreas (ed.) et al., Current trends in web engineering. Workshops, doctoral symposium, and tutorials, held at ICWE 2011, Paphos, Cyprus, June 20‒21, 2011. Revised selected papers. Berlin: Springer (ISBN 978-3-642-27996-6/pbk). Lecture Notes in Computer Science 7059, 13-24 (2012).
11
Known-key distinguisher on round-reduced 3D block cipher. (English)
Jung, Souhwan (ed.) et al., Information security applications. 12th international workshop, WISA 2011, Jeju Island, Korea, August 22‒24, 2011. Revised selected papers. Berlin: Springer (ISBN 978-3-642-27889-1/pbk). Lecture Notes in Computer Science 7115, 55-69 (2012).
12
Selecting an appropriate interestingness measure to evaluate the correlation between syndrome elements and symptoms. (English)
Cao, Longbing (ed.) et al., New frontiers in applied data mining. PAKDD 2011 international workshops, Shenzhen, China, May 24‒27, 2011. Revised selected papers. Berlin: Springer (ISBN 978-3-642-28319-2/pbk). Lecture Notes in Computer Science 7104. Lecture Notes in Artificial Intelligence, 372-383 (2012).
13
$(2,n)$ secret sharing scheme for gray and color images based on Boolean operation. (English)
Sci. China, Inf. Sci. 55, No. 5, 1151-1161 (2012).
14
The use of tail inequalities on the probable computational time of randomized search heuristics. (English)
Theor. Comput. Sci. 436, 106-117 (2012).
15
Cryptographic protocol. Security analysis based on trusted freshness. (English)
Berlin: Springer; Beijing: Higher Education Press (ISBN 978-3-642-24072-0; 978-7-04-031331-4/hbk). xi, 373~p. EUR~119.95/net; SFR~160.00; \sterling~108.00; \\$~169.00/hbk (2012).
16
Facial expression recognition using radial encoding of local Gabor features and classifier synthesis. (English)
Pattern Recognition 45, No. 1, 80-91 (2012).
17
Integrated efficiency and trade-off analyses using a DEA-oriented interactive minimax reference point approach (English)
Computers & OR 39, No. 5, 1062-1073 (2012).
18
Design and application of middleware for web full-text retrieval. (Chinese)
J. Comput. Appl. 31, No. 8, 2261-2264 (2011).
19
Lesion area segmentation in leukoaraiosis’s magnetic resonance image based on C-V model. (Chinese)
J. Comput. Appl. 31, No. 10, 2757-2759 (2011).
20
first | previous | 1 21 41 61 81 101 | next | last

Result 1 to 20 of 938 total