nr |
titel |
auteur |
tijdschrift |
jaar |
jaarg. |
afl. |
pagina('s) |
type |
1 |
A characterization of the convergence of Picard iteration to a fixed point for a continuous mapping and an application
|
Ahmed, M.A. |
|
2005 |
169 |
2 |
p. 1298-1304 7 p. |
artikel |
2 |
Algorithm and mechanization to Cauchy problem of parabolic equation
|
Zhao, Caidi |
|
2005 |
169 |
2 |
p. 1038-1044 7 p. |
artikel |
3 |
A method for generating all efficient solutions of 0-1 multi-objective linear programming problem
|
Jahanshahloo, G.R. |
|
2005 |
169 |
2 |
p. 874-886 13 p. |
artikel |
4 |
An algorithm for solving nonlinear singular perturbation problems with mechanization
|
Wang, Weiming |
|
2005 |
169 |
2 |
p. 995-1009 15 p. |
artikel |
5 |
An analytic approach to solve multiple solutions of a strongly nonlinear problem
|
Li, Shuicai |
|
2005 |
169 |
2 |
p. 854-865 12 p. |
artikel |
6 |
An application for a modified KdV equation by the decomposition method and finite element method
|
Geyikli, Turabi |
|
2005 |
169 |
2 |
p. 971-981 11 p. |
artikel |
7 |
An efficient convergent lattice algorithm for European Asian options
|
Dai, Tian-Shyr |
|
2005 |
169 |
2 |
p. 1458-1471 14 p. |
artikel |
8 |
An efficient nonce-based authentication scheme with key agreement
|
Chen, Yen-Cheng |
|
2005 |
169 |
2 |
p. 982-994 13 p. |
artikel |
9 |
A new modification of Adomian decomposition method for solving a kind of evolution equation
|
Jin, Chengri |
|
2005 |
169 |
2 |
p. 953-962 10 p. |
artikel |
10 |
A note on computing matrix–vector products with generalized centrosymmetric (centrohermitian) matrices
|
Liu, Zhong-Yun |
|
2005 |
169 |
2 |
p. 1332-1345 14 p. |
artikel |
11 |
A note on the componentwise perturbation bounds of matrix inverse and linear systems
|
Wei, Yimin |
|
2005 |
169 |
2 |
p. 1221-1236 16 p. |
artikel |
12 |
A novel hybrid model for portfolio selection
|
Ong, Chorng-Shyong |
|
2005 |
169 |
2 |
p. 1195-1210 16 p. |
artikel |
13 |
A one-model approach to classification and sensitivity analysis in DEA
|
Jahanshahloo, G.R. |
|
2005 |
169 |
2 |
p. 887-896 10 p. |
artikel |
14 |
A secure and efficient authentication protocol for anonymous channel in wireless communications
|
Yang, Chou-Chen |
|
2005 |
169 |
2 |
p. 1431-1439 9 p. |
artikel |
15 |
A simplified Green element method solution for a the biharmonic equation and its application to Stokes flows
|
Onyejekwe, Okey Oseloka |
|
2005 |
169 |
2 |
p. 1405-1418 14 p. |
artikel |
16 |
A time-stamping protocol for digital watermarking
|
Hwang, Min-Shiang |
|
2005 |
169 |
2 |
p. 1276-1284 9 p. |
artikel |
17 |
Author Index to Volume
|
|
|
2005 |
169 |
2 |
p. I-VIII nvt p. |
artikel |
18 |
Comparison between the homotopy analysis method and homotopy perturbation method
|
Liao, Shijun |
|
2005 |
169 |
2 |
p. 1186-1194 9 p. |
artikel |
19 |
Computational complexities and streamfunction coordinates
|
Awartani, M.M. |
|
2005 |
169 |
2 |
p. 758-777 20 p. |
artikel |
20 |
Designated verifier proxy signature scheme with message recovery
|
Lu, Rongxing |
|
2005 |
169 |
2 |
p. 1237-1246 10 p. |
artikel |
21 |
Determination of cluster number in clustering microarray data
|
Shen, Judong |
|
2005 |
169 |
2 |
p. 1172-1185 14 p. |
artikel |
22 |
Developing a nondiscretionary model of slacks-based measure in data envelopment analysis
|
Saen, Reza Farzipoor |
|
2005 |
169 |
2 |
p. 1440-1447 8 p. |
artikel |
23 |
Droop models of nutrient–plankton interaction with intratrophic predation
|
Jang, S.R.-J. |
|
2005 |
169 |
2 |
p. 1106-1128 23 p. |
artikel |
24 |
Effect of dust particles on a ferromagnetic fluid heated and soluted from below saturating a porous medium
|
Sunil, |
|
2005 |
169 |
2 |
p. 832-853 22 p. |
artikel |
25 |
Estimation of component mean lifetimes of a masked system using unclassified system life data
|
Chang, Shui-Ching |
|
2005 |
169 |
2 |
p. 797-805 9 p. |
artikel |
26 |
Fail-stop blind signature scheme design based on pairings
|
Chang, Henry Ker-Chang |
|
2005 |
169 |
2 |
p. 1324-1331 8 p. |
artikel |
27 |
Five points of accuracy synthesis of motion generator linkages using Maple-V
|
Shirazi, Kourosh H. |
|
2005 |
169 |
2 |
p. 1142-1171 30 p. |
artikel |
28 |
Fully developed flow through a porous channel bounded by flat plates
|
Awartani, M.M. |
|
2005 |
169 |
2 |
p. 749-757 9 p. |
artikel |
29 |
Generalized mathematical model for the solution of mixed-boundary-value elastic problems
|
Hossain, M. Zubaer |
|
2005 |
169 |
2 |
p. 1247-1275 29 p. |
artikel |
30 |
Identity based designated multi-confirmer signature: a new type signature
|
Guo, Xing-Yang |
|
2005 |
169 |
2 |
p. 1076-1085 10 p. |
artikel |
31 |
Identity based group-oriented undeniable signature scheme
|
Guo, Xing-Yang |
|
2005 |
169 |
2 |
p. 1448-1457 10 p. |
artikel |
32 |
Improvement on Tzeng et al.’s nonrepudiable threshold multi-proxy multi-signature scheme with shared verification
|
Bao, Haiyong |
|
2005 |
169 |
2 |
p. 1419-1430 12 p. |
artikel |
33 |
Mechanization for solving SPP by reducing order method
|
Li, Zhenqing |
|
2005 |
169 |
2 |
p. 1028-1037 10 p. |
artikel |
34 |
MHD free-convection flow of a non-Newtonian power-law fluid at a stretching surface with a uniform free-stream
|
Abo-Eldahab, Emad M. |
|
2005 |
169 |
2 |
p. 806-818 13 p. |
artikel |
35 |
On a generalized mixture distribution
|
Nakhi, Y. Ben |
|
2005 |
169 |
2 |
p. 943-952 10 p. |
artikel |
36 |
On computing of arbitrary positive integer powers for one type of odd order symmetric circulant matrices—II
|
Rimas, Jonas |
|
2005 |
169 |
2 |
p. 1016-1027 12 p. |
artikel |
37 |
On computing of arbitrary positive integer powers for one type of odd order tridiagonal matrices with zero row – I
|
Rimas, Jonas |
|
2005 |
169 |
2 |
p. 1390-1394 5 p. |
artikel |
38 |
One-to-one mapping matrix
|
Wu, Tzong-Mou |
|
2005 |
169 |
2 |
p. 963-970 8 p. |
artikel |
39 |
On the global behavior of higher order recursive sequences
|
Douraki, M. Jaberi |
|
2005 |
169 |
2 |
p. 819-831 13 p. |
artikel |
40 |
On the security of a convertible authenticated encryption
|
Zhang, Jianhong |
|
2005 |
169 |
2 |
p. 1063-1069 7 p. |
artikel |
41 |
Parallel algorithms for reduction of a symmetric matrix to tridiagonal form on a shared memory multiprocessor
|
Kaya, Dogˇan |
|
2005 |
169 |
2 |
p. 1045-1062 18 p. |
artikel |
42 |
PDEPtest: a package for the Painlevé test of nonlinear partial differential equations
|
Xu, Gui-qiong |
|
2005 |
169 |
2 |
p. 1364-1379 16 p. |
artikel |
43 |
Penalty shifting method on calculation of optimal linewise control of dam-detouring osimotic system for concrete dams with heterogemous
|
Weng, Shiyou |
|
2005 |
169 |
2 |
p. 1129-1141 13 p. |
artikel |
44 |
Population viability in three trophic-level food chains
|
Bonneuil, Noël |
|
2005 |
169 |
2 |
p. 1086-1105 20 p. |
artikel |
45 |
Practical convertible authenticated encryption schemes using self-certified public keys
|
Lv, Jiqiang |
|
2005 |
169 |
2 |
p. 1285-1297 13 p. |
artikel |
46 |
Proxy signature scheme using self-certified public keys
|
Bao, Haiyong |
|
2005 |
169 |
2 |
p. 1380-1389 10 p. |
artikel |
47 |
Remarks on some signature schemes based on factoring and discrete logarithms
|
Chen, Tzung-Her |
|
2005 |
169 |
2 |
p. 1070-1075 6 p. |
artikel |
48 |
Runge–Kutta methods of dynamic iteration for index-2 differential–algebraic equations
|
Sun, Wei |
|
2005 |
169 |
2 |
p. 1346-1363 18 p. |
artikel |
49 |
Security of Lu et al.’s proxy-protected signature scheme
|
Park, Je Hong |
|
2005 |
169 |
2 |
p. 1010-1015 6 p. |
artikel |
50 |
Sensitivity and stability analysis in DEA
|
Jahanshahloo, G.R. |
|
2005 |
169 |
2 |
p. 897-904 8 p. |
artikel |
51 |
Sensitivity of efficiency classifications in the inverse DEA models
|
Jahanshahloo, G.R. |
|
2005 |
169 |
2 |
p. 905-916 12 p. |
artikel |
52 |
Solving a special case of conservative problems by Secant-like methods
|
Hernández, M.A. |
|
2005 |
169 |
2 |
p. 926-942 17 p. |
artikel |
53 |
Study on the formation of Goertler vortices in natural convection flow over a rotating concave surface
|
Lin, Ming-Han |
|
2005 |
169 |
2 |
p. 778-796 19 p. |
artikel |
54 |
Symmetric successive overrelaxation methods for solving the rank deficient linear least squares problem
|
Zheng, Bing |
|
2005 |
169 |
2 |
p. 1305-1323 19 p. |
artikel |
55 |
The distribution models of grazing animals between two grassland resource points
|
Wang, Weiming |
|
2005 |
169 |
2 |
p. 1395-1404 10 p. |
artikel |
56 |
The identification of nondominated and efficient paths on a network
|
Jahanshahloo, G.R. |
|
2005 |
169 |
2 |
p. 866-873 8 p. |
artikel |
57 |
The least squares type estimation of the parameters in the power hazard function
|
Mugdadi, A.R. |
|
2005 |
169 |
2 |
p. 737-748 12 p. |
artikel |
58 |
Two provably secure k-out-of-n oblivious transfer schemes
|
Zhang, Jianhong |
|
2005 |
169 |
2 |
p. 1211-1220 10 p. |
artikel |
59 |
Undesirable inputs and outputs in DEA models
|
Jahanshahloo, G.R. |
|
2005 |
169 |
2 |
p. 917-925 9 p. |
artikel |