|
Journals in DBLP
Inf. Sci. 2007, volume: 177, number: 19
- Ramon Lawrence, Ralph P. Russo, Nariankadu D. Shyamalkumar
The effect of reading policy on early join result production. [Citation Graph (0, 0)][DBLP] Inf. Sci., 2007, v:177, n:19, pp:3939-3956 [Journal]
- Qing Guo, Hui Zhang, Costas S. Iliopoulos
Computing the lambda-covers of a string. [Citation Graph (0, 0)][DBLP] Inf. Sci., 2007, v:177, n:19, pp:3957-3967 [Journal]
- Jianqin Zhang, Jianhua Gong, Hui Lin, Gang Wang, JianLing Huang, Jun Zhu, Bingli Xu, Jack Teng
Design and development of Distributed Virtual Geographic Environment system based on web services. [Citation Graph (0, 0)][DBLP] Inf. Sci., 2007, v:177, n:19, pp:3968-3980 [Journal]
- Baocang Wang, Qianhong Wu, Yupu Hu
A knapsack-based probabilistic encryption scheme. [Citation Graph (0, 0)][DBLP] Inf. Sci., 2007, v:177, n:19, pp:3981-3994 [Journal]
- Jin Wook Byun, Dong Hoon Lee, Jong In Lim
EC2C-PAKA: An efficient client-to-client password-authenticated key agreement. [Citation Graph (0, 0)][DBLP] Inf. Sci., 2007, v:177, n:19, pp:3995-4013 [Journal]
- Richard W. C. Lui, Lucas Chi Kwong Hui, Siu-Ming Yiu
Delegation with supervision. [Citation Graph (0, 0)][DBLP] Inf. Sci., 2007, v:177, n:19, pp:4014-4030 [Journal]
- Iuon-Chang Lin, Chin-Chen Chang
Security enhancement for digital signature schemes with fault tolerance in RSA. [Citation Graph (0, 0)][DBLP] Inf. Sci., 2007, v:177, n:19, pp:4031-4039 [Journal]
- Tieyun Qian, Hui Xiong, Yuanzhen Wang, Enhong Chen
On the strength of hyperclique patterns for text categorization. [Citation Graph (0, 0)][DBLP] Inf. Sci., 2007, v:177, n:19, pp:4040-4058 [Journal]
- Chang-Kuo Chen, Yung-Ching Hung, Teh-Lu Liao, Jun-Juh Yan
Design of robust active queue management controllers for a class of TCP communication networks. [Citation Graph (0, 0)][DBLP] Inf. Sci., 2007, v:177, n:19, pp:4059-4071 [Journal]
- Lien F. Lai
A knowledge engineering approach to knowledge management. [Citation Graph (0, 0)][DBLP] Inf. Sci., 2007, v:177, n:19, pp:4072-4094 [Journal]
- Yuan Zhou, Binxing Fang, Zhenfu Cao, Xiao-chun Yun, Xiaoming Cheng
How to construct secure proxy cryptosystem. [Citation Graph (0, 0)][DBLP] Inf. Sci., 2007, v:177, n:19, pp:4095-4108 [Journal]
- Suh-Wen Chiou
Comparative tests of solution methods for signal-controlled road networks. [Citation Graph (0, 0)][DBLP] Inf. Sci., 2007, v:177, n:19, pp:4109-4121 [Journal]
- Juan C. Valle-Lisboa, Eduardo Mizraji
The uncovering of hidden structures by Latent Semantic Analysis. [Citation Graph (0, 0)][DBLP] Inf. Sci., 2007, v:177, n:19, pp:4122-4147 [Journal]
- Kamer Kaya, Ali Aydin Selçuk
Threshold cryptography based on Asmuth-Bloom secret sharing. [Citation Graph (0, 0)][DBLP] Inf. Sci., 2007, v:177, n:19, pp:4148-4160 [Journal]
- Asok K. Nanda, Sudhansu S. Maiti
Rényi information measure for a used item. [Citation Graph (0, 0)][DBLP] Inf. Sci., 2007, v:177, n:19, pp:4161-4175 [Journal]
- Ben-Lian Xu, Zheng-yi Wu
A study on two measurements-to-tracks data assignment algorithms. [Citation Graph (0, 0)][DBLP] Inf. Sci., 2007, v:177, n:19, pp:4176-4187 [Journal]
- Dyi-Rong Duh, Yi-Ching Chen, Ruei-Yu Wu
Proof that pyramid networks are 1-Hamiltonian-connected with high probability. [Citation Graph (0, 0)][DBLP] Inf. Sci., 2007, v:177, n:19, pp:4188-4199 [Journal]
- Ruei-Yu Wu, Gen-Huey Chen, Yu-Liang Kuo, Gerard J. Chang
Node-disjoint paths in hierarchical hypercube networks. [Citation Graph (0, 0)][DBLP] Inf. Sci., 2007, v:177, n:19, pp:4200-4207 [Journal]
- Bih-Sheue Shieh
Solutions of fuzzy relation equations based on continuous t-norms. [Citation Graph (0, 0)][DBLP] Inf. Sci., 2007, v:177, n:19, pp:4208-4215 [Journal]
- Yan-Kuen Wu
Optimization of fuzzy relational equations with max-av composition. [Citation Graph (0, 0)][DBLP] Inf. Sci., 2007, v:177, n:19, pp:4216-4229 [Journal]
- Daowu Pei
On definable concepts of rough set models. [Citation Graph (0, 0)][DBLP] Inf. Sci., 2007, v:177, n:19, pp:4230-4239 [Journal]
|