1 | -- | 15 | Prasada Rao, Miguel Angel Medina. A multiple domain algorithm for modeling one-dimensional transient contaminant transport flows |
16 | -- | 27 | Rafael Álvarez, Joan-Josep Climent, Leandro Tortosa, Antonio Zamora. An efficient binary sequence generator with cryptographic applications |
28 | -- | 45 | Mehdi Dehghan. Numerical approximations for solving a time-dependent partial differential equation with non-classical specification on four boundaries |
46 | -- | 67 | Mehdi Dehghan. Quasi-implicit and two-level explicit finite-difference procedures for solving the one-dimensional advection equation |
68 | -- | 75 | Dariush Shadman, Bahman Mehri. A non-homogeneous Hill s equation |
76 | -- | 80 | G. A. Afrouzi. On positive mountain pass solutions for a semilinear elliptic boundary value problem |
81 | -- | 93 | Yong Ding, Kwok-Wo Wong, Yu-Min Wang. A w-NNAF method for the efficient computation of scalar multiplication in elliptic curve cryptography |
94 | -- | 107 | Zhen-Jun Shi, Jie Shen. Convergence of descent method without line search |
108 | -- | 117 | Wu-Chuan Yang, Dah-Jyh Guan, Chi-Sung Laih. Algorithm of asynchronous binary signed-digit recoding on fast multiexponentiation |
118 | -- | 124 | Ming-Hsin Chang, Yi-Shiung Yeh. Improving Lamport one-time signature scheme |
125 | -- | 142 | R. Barrio, J. M. Peña. Evaluation of the derivative of a polynomial in Bernstein form |
143 | -- | 152 | Zuhua Shao. A new key authentication scheme for cryptosystems based on discrete logarithms |
153 | -- | 166 | Tariq Aziz, Arshad Khan, Jalil Rashidinia. Spline methods for the solution of fourth-order parabolic partial differential equations |
167 | -- | 178 | E. E. Ammar. On computational solution of vector maximum problem |
179 | -- | 197 | S. H. Saker. Oscillation of continuous and discrete diffusive delay Nicholson s blowflies models |
198 | -- | 211 | A. Malek, A. Yari. Primal-dual solution for the linear programming problems using neural networks |
212 | -- | 224 | Z. Merdan, M. Bayirli. The effect of the increase of linear dimensions on exponents obtained by finite-size scaling relations for the six-dimensional Ising model on the Creutz cellular automaton |
225 | -- | 236 | Rajesh K. Bawa. Spline based computational technique for linear singularly perturbed boundary value problems |
237 | -- | 251 | H. Saberi Najafi, S. Kordrostami, M. Esmaeilzadeh. Computational Quartic c:::3:::-spline and Quintic c:::2:::-spline algorithms for solving second-order initial value problems |
252 | -- | 273 | Ying-Ming Wang, Jian-Bo Yang, Dong-Ling Xu. Interval weight generation approaches based on consistency test and interval comparison matrices |
274 | -- | 280 | Eun-Jun Yoon, Eun-Kyung Ryu, Kee-Young Yoo. Improvement of Fan et al. s deniable authentication protocol based on Diffie-Hellman algorithm |
281 | -- | 285 | Shin-Jia Hwang, Hao-Chih Liao. Security of Hsu-Wu s authenticated encryption scheme with (t, n) shared verification |
286 | -- | 298 | Dragan Jukic, Rudolf Scitovski. Least squares fitting Gaussian type curve |
316 | -- | 323 | M. Tavassoli Kajani, B. Asady, A. Hadi Vencheh. An iterative method for solving dual fuzzy nonlinear equations |
324 | -- | 344 | Yongkun Li, Linghong Lu. Positive periodic solutions of discrete n-species food-chain systems |
345 | -- | 354 | Andrés Barrea, Cristina Turner. A numerical analysis of a model of growth tumor |
355 | -- | 361 | Sung-Woon Lee, Hyun-Sung Kim, Kee-Young Yoo. Efficient nonce-based remote user authentication scheme using smart cards |
362 | -- | 371 | Yuan-Lung Yu, Tzer-Shyong Chen. An efficient threshold group signature scheme |
372 | -- | 382 | Teresa Diogo, John T. Edwards, Neville J. Ford, Sophy M. Thomas. Numerical analysis of a singular integral equation |
383 | -- | 418 | Shan Zhao, G. W. Wei. Option valuation by using discrete singular convolution |
419 | -- | 434 | Luther White, Yiqi Luo. Model-based data assessment for terrestrial carbon processes: implications for sampling strategy in FACE experiments |
435 | -- | 453 | Saffet Ayasun, Chika O. Nwankpa, Harry G. Kwatny. An efficient method to compute singularity induced bifurcations of decoupled parameter-dependent differential-algebraic power system model |
454 | -- | 476 | Zhong-hua Yang, Qian Guo. Bifurcation analysis of delayed logistic equation |
477 | -- | 495 | Blanca Pérez-Gladish, Mar Arenas Parra, Amelia Bilbao-Terol, Maria Victoria Rodríguez Uría. Management of surgical waiting lists through a Possibilistic Linear Multiobjective Programming problem |
496 | -- | 507 | Mahmoud H. Alrefaei. A simulated annealing applied for optimizing a voice-multihop radio network |
508 | -- | 515 | Ching-Ter Chang. Fractional programming with absolute-value functions: a fuzzy goal programming approach |
516 | -- | 527 | R. M. Faye, S. Sawadogo, Félix Mora-Camino. Flexible management of water resource systems |
528 | -- | 538 | M. Fernández, D. P. Atherton. Analysis of insulin sensitivity estimates from linear models of glucose disappearance |
539 | -- | 560 | George E. Tsekouras. A fuzzy vector quantization approach to image compression |
561 | -- | 571 | S. Saha Ray, R. K. Bera. An approximate solution of a nonlinear fractional differential equation by Adomian decomposition method |
572 | -- | 575 | Da-Zhi Sun, Zhen-Fu Cao, Yu Sun. Remarks on a new key authentication scheme based on discrete logarithms |
576 | -- | 591 | Lihong Feng. Review of model order reduction methods for numerical simulation of nonlinear circuits |
592 | -- | 606 | Tadeusz Platkowski, Joanna Stachowska-Pietka. ESSs in n-player mixed games |
607 | -- | 615 | Ming Gen Cui, Li Hong Yang. The exact solutions of a kind of nonlinear operator equations |
616 | -- | 621 | E. Ahmed, M. El-Alem. On multiobjective optimization in portfolio management |
622 | -- | 634 | Zong-Yi Lee. Applying the double side method of weighted residual to the solution of shell deformation problem |
635 | -- | 649 | Patricia Mariela Morillas. Dykstra's algorithm with strategies for projecting onto certain polyhedral cones |
650 | -- | 669 | Kyungsoo Kim, Dokkyun Yi, Sungyun Lee. Mortar method for nonconforming finite elements |
670 | -- | 676 | Erdal Karaduman. On determinants of matrices with general Fibonacci numbers entries |
677 | -- | 694 | Pu-yan Nie. A filter method for solving nonlinear complementarity problems |
695 | -- | 710 | Nurullah Ankaralioglu, Hüseyin Aydin, Inci Gültekin. Computation of abstract groups S((d + 1)/2, d) and torus knots K(d, 2) |
711 | -- | 715 | Eun-Jun Yoon, Eun-Kyung Ryu, Kee-Young Yoo. Improvement of Chien-Jan s authenticated multiple-key agreement protocol without using conventional one-way function |
716 | -- | 728 | Shaohua Pan, Xingsi Li. An efficient algorithm for the Euclidean r-centrum location problem |
729 | -- | 739 | Yuh-Dauh Lyuu, Ming-Luen Wu. Cryptanalysis of and improvement on the Hwang-Chen multi-proxy multi-signature schemes |