History
1
262


Please fill in your query. A complete syntax description you will find on the General Help page.
first | previous | 1 21 41 61 81 101 | next | last

Result 1 to 20 of 262 total

The loophole of the improved secure quantum sealed-bid auction with post-confirmation and solution. (English)
Quantum Inf. Process. 12, No. 1, 295-302 (2013).
WorldCat.org
1
Spatial interaction - modification model and applications to geo-demographic analysis. (English)
Knowl.-Based Syst.Knowl.-Based Syst. 49, 152-170(2013)
WorldCat.org
2
Cultural Diversity - New Challenge to Medical Device Use Safety for International Markets. (English)
HCI (21), 127-136(2013)
WorldCat.org
3
A Framework for Automated Security Proof and its Application to OAEP. (English)
JNWJNW 8, N0. 3, 552-558(2013)
WorldCat.org
4
A Proxy-Based Approach to Continuous Location-Based Spatial Queries in Mobile Environments. (English)
IEEE Trans. Knowl. Data Eng.IEEE Trans. Knowl. Data Eng. 25, N0. 2, 260-273(2013)
WorldCat.org
5
How faithfully can {$π$} be interpreted in SA? (English)
SCIENCE CHINA Information SciencesSCIENCE CHINA Information Sciences 56, N0. 3, 1-15(2013)
WorldCat.org
6
User-Oriented Energy- and Spectral- Efficiency Tradeoff for Wireless Networks. (English)
TIISTIIS 7, N0. 2, 216-233(2013)
WorldCat.org
7
A modified interval type-2 fuzzy C-means algorithm with application in MR image segmentation. (English)
Pattern Recognition LettersPattern Recognition Letters 34, N0. 12, 1329-1338(2013)
WorldCat.org
8
Design and implementation of a testbed for WSNs monitoring aquatic environment. (English)
WOCC, 438-443(2013)
WorldCat.org
9
Deriving the Vehicle Speeds from a Mobile Telecommunications Network. (English)
IEEE Transactions on Intelligent Transportation SystemsIEEE Transactions on Intelligent Transportation Systems 14, N0. 3, 1208-1217(2013)
WorldCat.org
10
Reverse Authentication in Financial Transactions and Identity Management. (English)
MONETMONET 18, N0. 5, 712-727(2013)
WorldCat.org
11
Method Based on GSCPN for Network Vulnerability Analysis. (English)
JSWJSW 8, N0. 8, 2032-2038(2013)
WorldCat.org
12
Clinical detection of human probiotics and human pathogenic bacteria by using a novel high-throughput platform based on next generation sequencing. (English)
IWBBIO, 29-40(2013)
WorldCat.org
13
Secrecy Capacity Enhancement With Distributed Precoding in Multirelay Wiretap Systems. (English)
IEEE Transactions on Information Forensics and SecurityIEEE Transactions on Information Forensics and Security 8, N0. 1, 229-238(2013)
WorldCat.org
14
Image Retrieval Based on Structured Local Binary Kirsch Pattern. (English)
IEICE TransactionsIEICE Transactions 96-D, N0. 5, 1230-1232(2013)
WorldCat.org
15
Graph-based semi-supervised learning with multi-modality propagation for large-scale image datasets. (English)
J. Visual Communication and Image RepresentationJ. Visual Communication and Image Representation 24, N0. 3, 295-302(2013)
WorldCat.org
16
Least squares estimators for discretely observed stochastic processes driven by small Lévy noises. (English)
J. Multivariate AnalysisJ. Multivariate Analysis 116, 422-439(2013)
WorldCat.org
17
On a class of binomial bent functions over the finite fields of odd characteristic. (English)
Appl. Algebra Eng. Commun. Comput.Appl. Algebra Eng. Commun. Comput. 24, N0. 6, 461-475(2013)
WorldCat.org
18
Boardroom voting scheme with unconditionally secret ballots based on DC-net. (English)
Xu, Li (ed.) et al., Network and system security. 6th international conference, NSS 2012, Wuyishan, Fujian, China, November 21‒23, 2012. Proceedings. Berlin: Springer (ISBN 978-3-642-34600-2/pbk). Lecture Notes in Computer Science 7645, 220-232 (2012).
WorldCat.org
19
Impulse control with random reaction periods: a central bank intervention problem. (English)
Oper. Res. Lett. 40, No. 6, 425-430 (2012).
WorldCat.org
20
first | previous | 1 21 41 61 81 101 | next | last

Result 1 to 20 of 262 total

Valid XHTML 1.0 Transitional Valid CSS!