History
1
207


Please fill in your query. A complete syntax description you will find on the General Help page.
first | previous | 1 21 41 61 81 101 | next | last

Result 1 to 20 of 207 total

Singularity-avoiding swing-up control for underactuated three-link gymnast robot using virtual coupling between control torques. (English)
Int. J. Robust Nonlinear Control 25, No. 2, 207-221 (2015).
WorldCat.org
1
A position control of a planar three-link under-actuated mechanical system based on model reduction. (Chinese)
Acta Autom. Sin. 40, No. 7, 1303-1310 (2014).
WorldCat.org
2
On the recursive construction of MDS matrices for lightweight cryptography. (English)
Huang, Xinyi (ed.) et al., Information security practice and experience. 10th international conference, ISPEC 2014, Fuzhou, China, May 5‒8, 2014. Proceedings. Berlin: Springer (ISBN 978-3-319-06319-5/pbk). Lecture Notes in Computer Science 8434, 552-563 (2014).
WorldCat.org
3
Simulation studies on the impact of partner selection patterns on performance of innovation networks. (Chinese)
J. Nanjing Univ. Inf. Sci. Technol., Nat. Sci. 6, No. 1, 17-25 (2014).
WorldCat.org
4
Revisiting key schedule’s diffusion in relation with round function’s diffusion. (English)
Des. Codes Cryptography 73, No. 1, 85-103 (2014).
WorldCat.org
5
A unified method for finding impossible differentials of block cipher structures. (English)
Inf. Sci.Inf. Sci. 263, 211-220(2014)
WorldCat.org
6
A Survey on Target Tracking in Well-deployed Wireless Sensor Networks. (English)
JSWJSW 9, N0. 5, 1255-1262(2014)
WorldCat.org
7
Approximate Muscle Guided Beam Search for Three-Index Assignment Problem. (English)
ICSI (1), 44-52(2014)
WorldCat.org
8
Modeling HIV-1 Virus Dynamics with Both Virus-to-Cell Infection and Cell-to-Cell Transmission. (English)
SIAM Journal of Applied MathematicsSIAM Journal of Applied Mathematics 74, N0. 3, 898-917(2014)
WorldCat.org
9
DNA-chip-based dynamic broadcast encryption scheme with constant-size ciphertexts and decryption keys. (English)
SCIENCE CHINA Information SciencesSCIENCE CHINA Information Sciences 57, N0. 9, 1-10(2014)
WorldCat.org
10
Distinguishing properties and applications of higher order derivatives of Boolean functions. (English)
Inf. Sci.Inf. Sci. 271, 224-235(2014)
WorldCat.org
11
Novel short-circuit protection technique for DC-DC buck converters. (English)
IET Circuits, Devices & SystemsIET Circuits, Devices & Systems 8, N0. 2, 90-99(2014)
WorldCat.org
12
Kernel locality-constrained collaborative representation based discriminant analysis. (English)
Knowl.-Based Syst.Knowl.-Based Syst. 70, 212-220(2014)
WorldCat.org
13
A comprehensive study of three dimensional tolerance analysis methods. (English)
Computer-Aided DesignComputer-Aided Design 53, 1-13(2014)
WorldCat.org
14
Evolving Hard and Easy Traveling Salesman Problem Instances: A Multi-objective Approach. (English)
SEAL, 216-227(2014)
WorldCat.org
15
An improved approximation algorithm for the capacitated TSP with pickup and delivery on a tree. (English)
NetworksNetworks 63, N0. 2, 179-195(2014)
WorldCat.org
16
What is the effective key length for a block cipher: an attack on every practical block cipher. (English)
SCIENCE CHINA Information SciencesSCIENCE CHINA Information Sciences 57, N0. 7, 1-11(2014)
WorldCat.org
17
Conversion Algorithm of Linear-Time Temporal Logic to Buchi Automata. (English)
JSWJSW 9, N0. 4, 970-976(2014)
WorldCat.org
18
A sequential weighted least squares procedure for design of IIR filters and two-channel IIR filter banks. (English)
ISCAS, 1195-1198(2014)
WorldCat.org
19
The Computerized OMAHA System in Microsoft Office Excel. (English)
Nursing Informatics, 310-314(2014)
WorldCat.org
20
first | previous | 1 21 41 61 81 101 | next | last

Result 1 to 20 of 207 total

Valid XHTML 1.0 Transitional Valid CSS!