History
1
844

Please fill in your query. A complete syntax description you will find on the General Help page.
first | previous | 1 21 41 61 81 101 | next | last

Result 1 to 20 of 844 total

Loose Laplacian spectra of random hypergraphs. (English)
Random Struct. Algorithms 41, No. 4, 521-545 (2012).
1
The fractional chromatic number of triangle-free graphs with $\varDelta \leq 3$. (English)
Discrete Math. 312, No. 24, 3502-3516 (2012).
2
Finding $k$-biclusters from gene expression data. (English)
Huang, De-Shuang (ed.) et al., Intelligent computing theories and applications. 8th international conference, ICIC 2012, Huangshan, China, July 25‒29, 2012. Proceedings. Berlin: Springer (ISBN 978-3-642-31575-6/pbk). Lecture Notes in Computer Science 7390. Lecture Notes in Artificial Intelligence, 433-439 (2012).
3
Graphs with diameter $n - e$ minimizing the spectral radius. (English)
Linear Algebra Appl. 437, No. 11, 2823-2850 (2012).
4
On polynomial approximation of circular arcs and helices. (English)
Comput. Math. Appl. 63, No. 7, 1192-1196 (2012).
5
On Meyniel’s conjecture of the cop number. (English)
J. Graph Theory 71, No. 2, 192-205 (2012).
6
A fractional analogue of Brooks’ theorem. (English)
SIAM J. Discrete Math. 26, No. 2, 452-471 (2012).
7
Unsupervised multi-class segmentation of SAR images using fuzzy triplet Markov fields model. (English)
Pattern Recognition 45, No. 11, 4018-4033 (2012).
8
A note on iterative process for $G^{2}$-multi degree reduction of Bézier curves. (English)
Appl. Math. Comput. 218, No. 12, 6987-6990 (2012).
9
Diameter of random spanning trees in a given graph. (English)
J. Graph Theory 69, No. 3-4, 223-240 (2012).
10
Diamond-free families (English)
J. Comb. Theory, Ser. A 119, No. 2, 310-322 (2012).
11
Cyberguarder: A virtualization security assurance architecture for Green cloud computing (English)
Future Generation Comp. Syst. 28, No. 2, 379-390 (2012).
12
Nonparametric Bayesian dictionary learning for analysis of noisy and incomplete images (English)
IEEE Transactions on Image Processing 21, No. 1, 130-144 (2012).
13
A polymorphic type dependency analysis for logic programs. (English)
New Generation Comput. 29, No. 4, 409-444 (2011).
14
Passenger flow distribution in rail transit no-barrier transfer mode. (Chinese)
J. Comput. Appl. 31, No. 11, 3126-3128 (2011).
15
Sparse distance metric learning with $L1$-norm constraint for one-class samples in high-dimensional spaces and its application. (Chinese)
Math. Pract. Theory 41, No. 6, 116-124 (2011).
16
Graphs with asymptotically invariant degree sequences under restriction. (English)
Internet Math. 7, No. 1, 67-80 (2011).
17
Security analysis of an improved MFE public key cryptosystem. (English)
Lin, Dongdai (ed.) et al., Cryptology and network security. 10th international conference, CANS 2011, Sanya, China, December 10‒12, 2011. Proceedings. Berlin: Springer (ISBN 978-3-642-25512-0/pbk). Lecture Notes in Computer Science 7092, 118-125 (2011).
18
The validation sets of the logic NMG system. (Chinese)
J. Northwest Univ., Nat. Sci. Ed. 41, No. 5, 753-756,760 (2011).
19
Two projection methods for nonlinear eigenvalue problems. (Chinese)
J. Xiamen Univ., Nat. Sci. 50, No. 4, 669-673 (2011).
20
first | previous | 1 21 41 61 81 101 | next | last

Result 1 to 20 of 844 total