no |
title |
author |
magazine |
year |
volume |
issue |
page(s) |
type |
1 |
A Co-processor for Computing the Euler Number of a Binary Image using Divide-and-Conquer Strategy
|
Dey, Sabyasachi |
|
2007 |
76 |
1-2 |
p. 75-89 |
article |
2 |
Advances in Symmetric Sandpiles
|
Formenti, Enrico |
|
2007 |
76 |
1-2 |
p. 91-112 |
article |
3 |
A Pricing Approach For Grid Resource Scheduling With QoS Guarantees
|
Chunlin, Li |
|
2007 |
76 |
1-2 |
p. 59-73 |
article |
4 |
Full-Searching-Equivalent Vector Quantization Using Two-Bounds Triangle Inequality
|
Chang, Chin-Chen |
|
2007 |
76 |
1-2 |
p. 25-37 |
article |
5 |
Intercode Regular Languages
|
Han, Yo-Sub |
|
2007 |
76 |
1-2 |
p. 113-128 |
article |
6 |
Modal-Like Operators in Boolean Lattices, Galois Connections and Fixed Points
|
Järvinen, Jouni |
|
2007 |
76 |
1-2 |
p. 129-145 |
article |
7 |
On the Optimality of the Binary Algorithm for the Jacobi Symbol
|
Busch, J. |
|
2007 |
76 |
1-2 |
p. 1-11 |
article |
8 |
Particle Swarms for Linearly Constrained Optimisation
|
Paquet, Ulrich |
|
2007 |
76 |
1-2 |
p. 147-170 |
article |
9 |
Rough set Based Ensemble Classifier forWeb Page Classification
|
Saha, Suman |
|
2007 |
76 |
1-2 |
p. 171-187 |
article |
10 |
Stochastic Petri Box Calculus with Discrete Time
|
Tarasyuk, Igor V. |
|
2007 |
76 |
1-2 |
p. 189-218 |
article |
11 |
Tolerant Key Assignment for Enforcing Complicated Access Control Policies in a Hierarchy
|
Chang, Ya-Fen |
|
2007 |
76 |
1-2 |
p. 13-23 |
article |
12 |
VQ Codebook Searching Algorithm Based on Correlation Property
|
Chang, Chin-Chen |
|
2007 |
76 |
1-2 |
p. 39-57 |
article |