History
1
220


Please fill in your query. A complete syntax description you will find on the General Help page.
first | previous | 1 21 41 61 81 101 | next | last

Result 1 to 20 of 220 total

Singularity-avoiding swing-up control for underactuated three-link gymnast robot using virtual coupling between control torques. (English)
Int. J. Robust Nonlinear Control 25, No. 2, 207-221 (2015).
WorldCat.org
1
Stabilization of underactuated two-link gymnast robot by using trajectory tracking strategy. (English)
Applied Mathematics and ComputationApplied Mathematics and Computation 253, 193-204(2015)
WorldCat.org
2
Attacks on a double length blockcipher-based hash proposal. (English)
Cryptography and CommunicationsCryptography and Communications 7, N0. 3, 289-295(2015)
WorldCat.org
3
Construction of perfect diffusion layers from linear feedback shift registers. (English)
IET Information SecurityIET Information Security 9, N0. 2, 127-135(2015)
WorldCat.org
4
Classification of Evoked Emotions Using an Artificial Neural Network Based on Single, Short-Term Physiological Signals. (English)
JACIIIJACIII 19, N0. 1, 118-126(2015)
WorldCat.org
5
The Pseudorandomness of Many-Round Lai-Massey Scheme. (English)
J. Inf. Sci. Eng.J. Inf. Sci. Eng. 31, N0. 3, 1085-1096(2015)
WorldCat.org
6
The Principal Axes Decomposition of Spatial Stiffness Matrices. (English)
IEEE Transactions on RoboticsIEEE Transactions on Robotics 31, N0. 1, 191-207(2015)
WorldCat.org
7
Optimal assignment schemes for general access structures based on linear programming. (English)
Des. Codes CryptographyDes. Codes Cryptography 74, N0. 3, 623-644(2015)
WorldCat.org
8
Mobile Application Recommendations Based on Complex Information. (English)
IEA/AIE, 415-424(2015)
WorldCat.org
9
A position control of a planar three-link under-actuated mechanical system based on model reduction. (Chinese)
Acta Autom. Sin. 40, No. 7, 1303-1310 (2014).
WorldCat.org
10
On the recursive construction of MDS matrices for lightweight cryptography. (English)
Huang, Xinyi (ed.) et al., Information security practice and experience. 10th international conference, ISPEC 2014, Fuzhou, China, May 5‒8, 2014. Proceedings. Berlin: Springer (ISBN 978-3-319-06319-5/pbk). Lecture Notes in Computer Science 8434, 552-563 (2014).
WorldCat.org
11
Simulation studies on the impact of partner selection patterns on performance of innovation networks. (Chinese)
J. Nanjing Univ. Inf. Sci. Technol., Nat. Sci. 6, No. 1, 17-25 (2014).
WorldCat.org
12
Revisiting key schedule’s diffusion in relation with round function’s diffusion. (English)
Des. Codes Cryptography 73, No. 1, 85-103 (2014).
WorldCat.org
13
Modeling HIV-1 Virus Dynamics with Both Virus-to-Cell Infection and Cell-to-Cell Transmission. (English)
SIAM Journal of Applied MathematicsSIAM Journal of Applied Mathematics 74, N0. 3, 898-917(2014)
WorldCat.org
14
What is the effective key length for a block cipher: an attack on every practical block cipher. (English)
SCIENCE CHINA Information SciencesSCIENCE CHINA Information Sciences 57, N0. 7, 1-11(2014)
WorldCat.org
15
Kernel locality-constrained collaborative representation based discriminant analysis. (English)
Knowl.-Based Syst.Knowl.-Based Syst. 70, 212-220(2014)
WorldCat.org
16
An improved approximation algorithm for the capacitated TSP with pickup and delivery on a tree. (English)
NetworksNetworks 63, N0. 2, 179-195(2014)
WorldCat.org
17
Evolving Hard and Easy Traveling Salesman Problem Instances: A Multi-objective Approach. (English)
SEAL, 216-227(2014)
WorldCat.org
18
Performance Analysis of Evolutionary Algorithms for the Minimum Label Spanning Tree Problem. (English)
IEEE Trans. Evolutionary ComputationIEEE Trans. Evolutionary Computation 18, N0. 6, 860-872(2014)
WorldCat.org
19
A sequential weighted least squares procedure for design of IIR filters and two-channel IIR filter banks. (English)
ISCAS, 1195-1198(2014)
WorldCat.org
20
first | previous | 1 21 41 61 81 101 | next | last

Result 1 to 20 of 220 total

Valid XHTML 1.0 Transitional Valid CSS!