
Journals in DBLP
Inf. Sci. 2007, volume: 177, number: 19
 Ramon Lawrence, Ralph P. Russo, Nariankadu D. Shyamalkumar
The effect of reading policy on early join result production. [Citation Graph (0, 0)][DBLP] Inf. Sci., 2007, v:177, n:19, pp:39393956 [Journal]
 Qing Guo, Hui Zhang, Costas S. Iliopoulos
Computing the lambdacovers of a string. [Citation Graph (0, 0)][DBLP] Inf. Sci., 2007, v:177, n:19, pp:39573967 [Journal]
 Jianqin Zhang, Jianhua Gong, Hui Lin, Gang Wang, JianLing Huang, Jun Zhu, Bingli Xu, Jack Teng
Design and development of Distributed Virtual Geographic Environment system based on web services. [Citation Graph (0, 0)][DBLP] Inf. Sci., 2007, v:177, n:19, pp:39683980 [Journal]
 Baocang Wang, Qianhong Wu, Yupu Hu
A knapsackbased probabilistic encryption scheme. [Citation Graph (0, 0)][DBLP] Inf. Sci., 2007, v:177, n:19, pp:39813994 [Journal]
 Jin Wook Byun, Dong Hoon Lee, Jong In Lim
EC2CPAKA: An efficient clienttoclient passwordauthenticated key agreement. [Citation Graph (0, 0)][DBLP] Inf. Sci., 2007, v:177, n:19, pp:39954013 [Journal]
 Richard W. C. Lui, Lucas Chi Kwong Hui, SiuMing Yiu
Delegation with supervision. [Citation Graph (0, 0)][DBLP] Inf. Sci., 2007, v:177, n:19, pp:40144030 [Journal]
 IuonChang Lin, ChinChen Chang
Security enhancement for digital signature schemes with fault tolerance in RSA. [Citation Graph (0, 0)][DBLP] Inf. Sci., 2007, v:177, n:19, pp:40314039 [Journal]
 Tieyun Qian, Hui Xiong, Yuanzhen Wang, Enhong Chen
On the strength of hyperclique patterns for text categorization. [Citation Graph (0, 0)][DBLP] Inf. Sci., 2007, v:177, n:19, pp:40404058 [Journal]
 ChangKuo Chen, YungChing Hung, TehLu Liao, JunJuh Yan
Design of robust active queue management controllers for a class of TCP communication networks. [Citation Graph (0, 0)][DBLP] Inf. Sci., 2007, v:177, n:19, pp:40594071 [Journal]
 Lien F. Lai
A knowledge engineering approach to knowledge management. [Citation Graph (0, 0)][DBLP] Inf. Sci., 2007, v:177, n:19, pp:40724094 [Journal]
 Yuan Zhou, Binxing Fang, Zhenfu Cao, Xiaochun Yun, Xiaoming Cheng
How to construct secure proxy cryptosystem. [Citation Graph (0, 0)][DBLP] Inf. Sci., 2007, v:177, n:19, pp:40954108 [Journal]
 SuhWen Chiou
Comparative tests of solution methods for signalcontrolled road networks. [Citation Graph (0, 0)][DBLP] Inf. Sci., 2007, v:177, n:19, pp:41094121 [Journal]
 Juan C. ValleLisboa, Eduardo Mizraji
The uncovering of hidden structures by Latent Semantic Analysis. [Citation Graph (0, 0)][DBLP] Inf. Sci., 2007, v:177, n:19, pp:41224147 [Journal]
 Kamer Kaya, Ali Aydin Selçuk
Threshold cryptography based on AsmuthBloom secret sharing. [Citation Graph (0, 0)][DBLP] Inf. Sci., 2007, v:177, n:19, pp:41484160 [Journal]
 Asok K. Nanda, Sudhansu S. Maiti
Rényi information measure for a used item. [Citation Graph (0, 0)][DBLP] Inf. Sci., 2007, v:177, n:19, pp:41614175 [Journal]
 BenLian Xu, Zhengyi Wu
A study on two measurementstotracks data assignment algorithms. [Citation Graph (0, 0)][DBLP] Inf. Sci., 2007, v:177, n:19, pp:41764187 [Journal]
 DyiRong Duh, YiChing Chen, RueiYu Wu
Proof that pyramid networks are 1Hamiltonianconnected with high probability. [Citation Graph (0, 0)][DBLP] Inf. Sci., 2007, v:177, n:19, pp:41884199 [Journal]
 RueiYu Wu, GenHuey Chen, YuLiang Kuo, Gerard J. Chang
Nodedisjoint paths in hierarchical hypercube networks. [Citation Graph (0, 0)][DBLP] Inf. Sci., 2007, v:177, n:19, pp:42004207 [Journal]
 BihSheue Shieh
Solutions of fuzzy relation equations based on continuous tnorms. [Citation Graph (0, 0)][DBLP] Inf. Sci., 2007, v:177, n:19, pp:42084215 [Journal]
 YanKuen Wu
Optimization of fuzzy relational equations with maxav composition. [Citation Graph (0, 0)][DBLP] Inf. Sci., 2007, v:177, n:19, pp:42164229 [Journal]
 Daowu Pei
On definable concepts of rough set models. [Citation Graph (0, 0)][DBLP] Inf. Sci., 2007, v:177, n:19, pp:42304239 [Journal]
