nr |
titel |
auteur |
tijdschrift |
jaar |
jaarg. |
afl. |
pagina('s) |
type |
1 |
Accurate 3D reconstruction of subject-specific knee finite element model to simulate the articular cartilage defects
|
Dong, Yue-fu |
|
2011 |
16 |
5 |
p. 620-627 |
artikel |
2 |
Biomechanical properties and modeling of skin with laser influence
|
Huang, Zhen |
|
2011 |
16 |
5 |
p. 610-613 |
artikel |
3 |
Bit stream oriented enumeration tree pruning algorithm
|
Qiu, Wei-dong |
|
2011 |
16 |
5 |
p. 567-570 |
artikel |
4 |
Certificateless message recovery signatures providing girault’s level-3 security
|
Tso, Ray-lin |
|
2011 |
16 |
5 |
p. 577-585 |
artikel |
5 |
Certificateless strong key-insulated signature without random oracles
|
Wan, Zhong-mei |
|
2011 |
16 |
5 |
p. 571-576 |
artikel |
6 |
Comments on enhanced yoking proof protocols for radio frequency identification tags and tag groups
|
Chien, Hung-yu |
|
2011 |
16 |
5 |
p. 604-609 |
artikel |
7 |
Comparison of osteogenesis between two kinds of stem cells from goat combined calcium phosphate cement in tissue engineering
|
Zhao, Wei |
|
2011 |
16 |
5 |
p. 628-635 |
artikel |
8 |
Control system design and test for cryogenic ground support equipment
|
Yang, Yu-pu |
|
2011 |
16 |
5 |
p. 543-550 |
artikel |
9 |
Efficient democratic group signatures with threshold traceability
|
He, Guo-feng |
|
2011 |
16 |
5 |
p. 530-532 |
artikel |
10 |
External equality and absolute equality coincide in finite CCS and π calculus without summation
|
Jin, Yun |
|
2011 |
16 |
5 |
p. 533-537 |
artikel |
11 |
Fault detection of networked control systems with uncertain time-varying delay and quantization error
|
Li, Bin |
|
2011 |
16 |
5 |
p. 513-518 |
artikel |
12 |
Highly resilient key distribution strategy for multi-level heterogeneous sensor networks by using deployment knowledge
|
Wang, Chih-hung |
|
2011 |
16 |
5 |
p. 593-599 |
artikel |
13 |
Identity-based key-insulated proxy signature without random oracles
|
Chen, Jian-hong |
|
2011 |
16 |
5 |
p. 557-566 |
artikel |
14 |
Investigation of improved approaches to bayes risk decoding
|
Xu, Hai-hua |
|
2011 |
16 |
5 |
p. 524-529 |
artikel |
15 |
In-vitro and in-vivo electrical characteristics of a penetrating microelectrode array for optic nerve electrical stimulation
|
Sui, Xiao-hong |
|
2011 |
16 |
5 |
p. 614-619 |
artikel |
16 |
Looper-tension H∞ control for hot strip finishing mills
|
Wang, Jing-cheng |
|
2011 |
16 |
5 |
p. 519-523 |
artikel |
17 |
Security analysis of application layer protocols on wireless local area networks
|
Yang, Ming-hour |
|
2011 |
16 |
5 |
p. 586-592 |
artikel |
18 |
Significance of sacroiliac joint aerocele in diagnosis of ankylosing spondylitis
|
Wang, Feng |
|
2011 |
16 |
5 |
p. 636-640 |
artikel |
19 |
Simple three-party password authenticated key exchange protocol
|
Lo, Nai-wei |
|
2011 |
16 |
5 |
p. 600-603 |
artikel |
20 |
Threshold signature scheme with threshold verification based on multivariate linear polynomial
|
Shen, Zhong-hua |
|
2011 |
16 |
5 |
p. 551-556 |
artikel |
21 |
Viewpoint manipulation for interactive television by using human pose estimation
|
Tong, Ming-lei |
|
2011 |
16 |
5 |
p. 538-542 |
artikel |