Digital Library
Close Browse articles from a journal
     Journal description
       All volumes of the corresponding journal
         All issues of the corresponding volume
                                       All articles of the corresponding issues
 
                             22 results found
no title author magazine year volume issue page(s) type
1 A knapsack-based probabilistic encryption scheme Wang, Baocang
2007
177 19 p. 3981-3994
14 p.
article
2 A knowledge engineering approach to knowledge management Lai, Lien F.
2007
177 19 p. 4072-4094
23 p.
article
3 A study on two measurements-to-tracks data assignment algorithms Xu, Ben-Lian
2007
177 19 p. 4176-4187
12 p.
article
4 Comparative tests of solution methods for signal-controlled road networks Chiou, Suh-Wen
2007
177 19 p. 4109-4121
13 p.
article
5 Computing the λ-covers of a string Guo, Qing
2007
177 19 p. 3957-3967
11 p.
article
6 Delegation with supervision Lui, Richard W.C.
2007
177 19 p. 4014-4030
17 p.
article
7 Design and development of Distributed Virtual Geographic Environment system based on web services Zhang, Jianqin
2007
177 19 p. 3968-3980
13 p.
article
8 Design of robust active queue management controllers for a class of TCP communication networks Chen, Chang-Kuo
2007
177 19 p. 4059-4071
13 p.
article
9 EC2C-PAKA: An efficient client-to-client password-authenticated key agreement Byun, Jin Wook
2007
177 19 p. 3995-4013
19 p.
article
10 How to construct secure proxy cryptosystem Zhou, Yuan
2007
177 19 p. 4095-4108
14 p.
article
11 Inside Front Cover - Editorial Board 2007
177 19 p. IFC-
1 p.
article
12 Node-disjoint paths in hierarchical hypercube networks Wu, Ruei-Yu
2007
177 19 p. 4200-4207
8 p.
article
13 On definable concepts of rough set models Pei, Daowu
2007
177 19 p. 4230-4239
10 p.
article
14 On the strength of hyperclique patterns for text categorization Qian, Tieyun
2007
177 19 p. 4040-4058
19 p.
article
15 Optimization of fuzzy relational equations with max-av composition Wu, Yan-Kuen
2007
177 19 p. 4216-4229
14 p.
article
16 Proof that pyramid networks are 1-Hamiltonian-connected with high probability Duh, Dyi-Rong
2007
177 19 p. 4188-4199
12 p.
article
17 Rényi information measure for a used item Nanda, Asok K.
2007
177 19 p. 4161-4175
15 p.
article
18 Security enhancement for digital signature schemes with fault tolerance in RSA Lin, Iuon-Chang
2007
177 19 p. 4031-4039
9 p.
article
19 Solutions of fuzzy relation equations based on continuous t-norms Shieh, Bih-Sheue
2007
177 19 p. 4208-4215
8 p.
article
20 The effect of reading policy on early join result production Lawrence, Ramon
2007
177 19 p. 3939-3956
18 p.
article
21 The uncovering of hidden structures by Latent Semantic Analysis Valle-Lisboa, Juan C.
2007
177 19 p. 4122-4147
26 p.
article
22 Threshold cryptography based on Asmuth–Bloom secret sharing Kaya, Kamer
2007
177 19 p. 4148-4160
13 p.
article
                             22 results found
 
 Koninklijke Bibliotheek - National Library of the Netherlands