Digitale Bibliotheek
Sluiten Bladeren door artikelen uit een tijdschrift
     Tijdschrift beschrijving
       Alle jaargangen van het bijbehorende tijdschrift
         Alle afleveringen van het bijbehorende jaargang
                                       Alle artikelen van de bijbehorende aflevering
 
                             59 gevonden resultaten
nr titel auteur tijdschrift jaar jaarg. afl. pagina('s) type
1 A characterization of the convergence of Picard iteration to a fixed point for a continuous mapping and an application Ahmed, M.A.
2005
169 2 p. 1298-1304
7 p.
artikel
2 Algorithm and mechanization to Cauchy problem of parabolic equation Zhao, Caidi
2005
169 2 p. 1038-1044
7 p.
artikel
3 A method for generating all efficient solutions of 0-1 multi-objective linear programming problem Jahanshahloo, G.R.
2005
169 2 p. 874-886
13 p.
artikel
4 An algorithm for solving nonlinear singular perturbation problems with mechanization Wang, Weiming
2005
169 2 p. 995-1009
15 p.
artikel
5 An analytic approach to solve multiple solutions of a strongly nonlinear problem Li, Shuicai
2005
169 2 p. 854-865
12 p.
artikel
6 An application for a modified KdV equation by the decomposition method and finite element method Geyikli, Turabi
2005
169 2 p. 971-981
11 p.
artikel
7 An efficient convergent lattice algorithm for European Asian options Dai, Tian-Shyr
2005
169 2 p. 1458-1471
14 p.
artikel
8 An efficient nonce-based authentication scheme with key agreement Chen, Yen-Cheng
2005
169 2 p. 982-994
13 p.
artikel
9 A new modification of Adomian decomposition method for solving a kind of evolution equation Jin, Chengri
2005
169 2 p. 953-962
10 p.
artikel
10 A note on computing matrix–vector products with generalized centrosymmetric (centrohermitian) matrices Liu, Zhong-Yun
2005
169 2 p. 1332-1345
14 p.
artikel
11 A note on the componentwise perturbation bounds of matrix inverse and linear systems Wei, Yimin
2005
169 2 p. 1221-1236
16 p.
artikel
12 A novel hybrid model for portfolio selection Ong, Chorng-Shyong
2005
169 2 p. 1195-1210
16 p.
artikel
13 A one-model approach to classification and sensitivity analysis in DEA Jahanshahloo, G.R.
2005
169 2 p. 887-896
10 p.
artikel
14 A secure and efficient authentication protocol for anonymous channel in wireless communications Yang, Chou-Chen
2005
169 2 p. 1431-1439
9 p.
artikel
15 A simplified Green element method solution for a the biharmonic equation and its application to Stokes flows Onyejekwe, Okey Oseloka
2005
169 2 p. 1405-1418
14 p.
artikel
16 A time-stamping protocol for digital watermarking Hwang, Min-Shiang
2005
169 2 p. 1276-1284
9 p.
artikel
17 Author Index to Volume 2005
169 2 p. I-VIII
nvt p.
artikel
18 Comparison between the homotopy analysis method and homotopy perturbation method Liao, Shijun
2005
169 2 p. 1186-1194
9 p.
artikel
19 Computational complexities and streamfunction coordinates Awartani, M.M.
2005
169 2 p. 758-777
20 p.
artikel
20 Designated verifier proxy signature scheme with message recovery Lu, Rongxing
2005
169 2 p. 1237-1246
10 p.
artikel
21 Determination of cluster number in clustering microarray data Shen, Judong
2005
169 2 p. 1172-1185
14 p.
artikel
22 Developing a nondiscretionary model of slacks-based measure in data envelopment analysis Saen, Reza Farzipoor
2005
169 2 p. 1440-1447
8 p.
artikel
23 Droop models of nutrient–plankton interaction with intratrophic predation Jang, S.R.-J.
2005
169 2 p. 1106-1128
23 p.
artikel
24 Effect of dust particles on a ferromagnetic fluid heated and soluted from below saturating a porous medium Sunil,
2005
169 2 p. 832-853
22 p.
artikel
25 Estimation of component mean lifetimes of a masked system using unclassified system life data Chang, Shui-Ching
2005
169 2 p. 797-805
9 p.
artikel
26 Fail-stop blind signature scheme design based on pairings Chang, Henry Ker-Chang
2005
169 2 p. 1324-1331
8 p.
artikel
27 Five points of accuracy synthesis of motion generator linkages using Maple-V Shirazi, Kourosh H.
2005
169 2 p. 1142-1171
30 p.
artikel
28 Fully developed flow through a porous channel bounded by flat plates Awartani, M.M.
2005
169 2 p. 749-757
9 p.
artikel
29 Generalized mathematical model for the solution of mixed-boundary-value elastic problems Hossain, M. Zubaer
2005
169 2 p. 1247-1275
29 p.
artikel
30 Identity based designated multi-confirmer signature: a new type signature Guo, Xing-Yang
2005
169 2 p. 1076-1085
10 p.
artikel
31 Identity based group-oriented undeniable signature scheme Guo, Xing-Yang
2005
169 2 p. 1448-1457
10 p.
artikel
32 Improvement on Tzeng et al.’s nonrepudiable threshold multi-proxy multi-signature scheme with shared verification Bao, Haiyong
2005
169 2 p. 1419-1430
12 p.
artikel
33 Mechanization for solving SPP by reducing order method Li, Zhenqing
2005
169 2 p. 1028-1037
10 p.
artikel
34 MHD free-convection flow of a non-Newtonian power-law fluid at a stretching surface with a uniform free-stream Abo-Eldahab, Emad M.
2005
169 2 p. 806-818
13 p.
artikel
35 On a generalized mixture distribution Nakhi, Y. Ben
2005
169 2 p. 943-952
10 p.
artikel
36 On computing of arbitrary positive integer powers for one type of odd order symmetric circulant matrices—II Rimas, Jonas
2005
169 2 p. 1016-1027
12 p.
artikel
37 On computing of arbitrary positive integer powers for one type of odd order tridiagonal matrices with zero row – I Rimas, Jonas
2005
169 2 p. 1390-1394
5 p.
artikel
38 One-to-one mapping matrix Wu, Tzong-Mou
2005
169 2 p. 963-970
8 p.
artikel
39 On the global behavior of higher order recursive sequences Douraki, M. Jaberi
2005
169 2 p. 819-831
13 p.
artikel
40 On the security of a convertible authenticated encryption Zhang, Jianhong
2005
169 2 p. 1063-1069
7 p.
artikel
41 Parallel algorithms for reduction of a symmetric matrix to tridiagonal form on a shared memory multiprocessor Kaya, Dogˇan
2005
169 2 p. 1045-1062
18 p.
artikel
42 PDEPtest: a package for the Painlevé test of nonlinear partial differential equations Xu, Gui-qiong
2005
169 2 p. 1364-1379
16 p.
artikel
43 Penalty shifting method on calculation of optimal linewise control of dam-detouring osimotic system for concrete dams with heterogemous Weng, Shiyou
2005
169 2 p. 1129-1141
13 p.
artikel
44 Population viability in three trophic-level food chains Bonneuil, Noël
2005
169 2 p. 1086-1105
20 p.
artikel
45 Practical convertible authenticated encryption schemes using self-certified public keys Lv, Jiqiang
2005
169 2 p. 1285-1297
13 p.
artikel
46 Proxy signature scheme using self-certified public keys Bao, Haiyong
2005
169 2 p. 1380-1389
10 p.
artikel
47 Remarks on some signature schemes based on factoring and discrete logarithms Chen, Tzung-Her
2005
169 2 p. 1070-1075
6 p.
artikel
48 Runge–Kutta methods of dynamic iteration for index-2 differential–algebraic equations Sun, Wei
2005
169 2 p. 1346-1363
18 p.
artikel
49 Security of Lu et al.’s proxy-protected signature scheme Park, Je Hong
2005
169 2 p. 1010-1015
6 p.
artikel
50 Sensitivity and stability analysis in DEA Jahanshahloo, G.R.
2005
169 2 p. 897-904
8 p.
artikel
51 Sensitivity of efficiency classifications in the inverse DEA models Jahanshahloo, G.R.
2005
169 2 p. 905-916
12 p.
artikel
52 Solving a special case of conservative problems by Secant-like methods Hernández, M.A.
2005
169 2 p. 926-942
17 p.
artikel
53 Study on the formation of Goertler vortices in natural convection flow over a rotating concave surface Lin, Ming-Han
2005
169 2 p. 778-796
19 p.
artikel
54 Symmetric successive overrelaxation methods for solving the rank deficient linear least squares problem Zheng, Bing
2005
169 2 p. 1305-1323
19 p.
artikel
55 The distribution models of grazing animals between two grassland resource points Wang, Weiming
2005
169 2 p. 1395-1404
10 p.
artikel
56 The identification of nondominated and efficient paths on a network Jahanshahloo, G.R.
2005
169 2 p. 866-873
8 p.
artikel
57 The least squares type estimation of the parameters in the power hazard function Mugdadi, A.R.
2005
169 2 p. 737-748
12 p.
artikel
58 Two provably secure k-out-of-n oblivious transfer schemes Zhang, Jianhong
2005
169 2 p. 1211-1220
10 p.
artikel
59 Undesirable inputs and outputs in DEA models Jahanshahloo, G.R.
2005
169 2 p. 917-925
9 p.
artikel
                             59 gevonden resultaten
 
 Koninklijke Bibliotheek - Nationale Bibliotheek van Nederland