The following pages link to Mathematical and Computer Modelling (Q166953):
Displaying 50 items.
- Notes on ``Application of the Hamiltonian approach to nonlinear oscillators with rational and irrational elastic terms'' (Q410080) (← links)
- Corrigendum to ``A cross-efficiency model based on super-efficiency for ranking units through TOPSIS approach and its extension to interval case'' (Q410085) (← links)
- Corrigendum to ``Novel approximate solving algorithm for fuzzy relational equations'' (Q410087) (← links)
- On the mathematical modelling of complex dynamical systems of an electrically operated vehicle (Q436941) (← links)
- Adaptively secure identity-based broadcast encryption with constant size private keys and ciphertexts from the subgroups (Q445344) (← links)
- On weaknesses of the HDCP authentication and key exchange protocol and its repair (Q445345) (← links)
- Differential fault analysis on block cipher SEED (Q445349) (← links)
- A novel user authentication and privacy preserving scheme with smart cards for wireless communications (Q445351) (← links)
- A scalable and privacy-preserving child-care and safety service in a ubiquitous computing environment (Q445355) (← links)
- A novel method for SQL injection attack detection based on removing SQL query attribute values (Q445359) (← links)
- Improving performance of network covert timing channel through Huffman coding (Q445363) (← links)
- Task-based behavior detection of illegal codes (Q445369) (← links)
- A new construction of the server-aided verification signature scheme (Q445370) (← links)
- Modeling and quantitatively predicting software security based on stochastic Petri nets (Q445374) (← links)
- Authenticated public key broadcast encryption scheme secure against insiders' attack (Q445379) (← links)
- Related key chosen IV attacks on Decim v2 and Decim-128. (Q445382) (← links)
- Authentication protocol using an identifier in an ad hoc network environment (Q445385) (← links)
- On the number of rotation symmetric functions over \(\mathrm{GF}(p)\) (Q445387) (← links)
- Discrete logarithm problem using index calculus method (Q445390) (← links)
- A new multistage approach to detect subtle DDoS attacks (Q445392) (← links)
- Enhanced secure anonymous authentication scheme for roaming service in global mobility networks (Q445398) (← links)
- AS alliance based security enhancement for inter-domain routing protocol (Q445401) (← links)
- Fault detection and a differential fault analysis countermeasure for the Montgomery power ladder in elliptic curve cryptography (Q445404) (← links)
- Topology optimization of conditioner suspension for mower conditioner considering multiple loads (Q462671) (← links)
- Simulation of the flow characteristics of a drip irrigation emitter with large eddy methods (Q462677) (← links)
- Mathematical modeling for active and dynamic diagnosis of crop diseases based on Bayesian networks and incremental learning (Q462683) (← links)
- Fuzzy-adaptive control method for off-road vehicle guidance system (Q462684) (← links)
- Mathematical and computer modeling in agriculture (Q462685) (← links)
- An improved \(K\)-means clustering algorithm for fish image segmentation (Q462688) (← links)
- A parallel clustering algorithm on the star graph and its performance (Q462692) (← links)
- Coincidence and common fixed point theorems in modified intuitionistic fuzzy metric spaces (Q462693) (← links)
- Financial IT and security (Q462730) (← links)
- CVaR measurement and operational risk management in commercial banks according to the peak value method of extreme value theory (Q462734) (← links)
- Option valuation by a self-exciting threshold binomial model (Q462735) (← links)
- Blind image watermarking method based on chaotic key and dynamic coefficient quantization in the DWT domain (Q462738) (← links)
- Multi-recastable e-bidding game with dual-blindness (Q462743) (← links)
- A secure electronic cash based on a certificateless group signcryption scheme (Q462747) (← links)
- Identity-based partially blind signature in the standard model for electronic cash (Q462748) (← links)
- A new logo watermarking based on redundant fractional wavelet transform (Q462750) (← links)
- User efficient recoverable off-line e-cash scheme with fast anonymity revoking (Q462753) (← links)
- Multiband treatment of quantum transport in anisotropic semiconductors: non-equilibrium Green's function (Q462757) (← links)
- Computer simulation of electron energy state spin-splitting in nanoscale LnAs/GaAs semiconductor quantum rings (Q462758) (← links)
- Scattering basis representation in ballistic transport simulations of nanowire transistors (Q462762) (← links)
- Simulation of a double-gate MOSFET by a non-parabolic energy-transport subband model for semiconductors based on the maximum entropy principle (Q462764) (← links)
- Geometric programming approach to doping profile design optimization of metal-oxide-semiconductor devices (Q462766) (← links)
- Modeling of transient drain current overshoot in polycrystalline silicon thin-film transistors (Q462768) (← links)
- Accurate SPICE compatible CNT interconnect and CNTFET models for circuit design and simulation (Q462771) (← links)
- Matrix representation of the double-curl operator for simulating three dimensional photonic crystals (Q462774) (← links)
- A numerical method for handling boundary and transmission conditions (Q462777) (← links)
- Ultra-wide band microwave image reconstruction for early breast cancer detection by norm constrained capon beamforming (Q462780) (← links)