1315 | -- | 1323 | Rongxing Lu, Xiaodong Lin, Zhenfu Cao, Liuquan Qin, Xiaohui Liang. A simple deniable authentication protocol based on the Diffie-Hellman algorithm |
1325 | -- | 1331 | Jiansheng Cai, Guizhen Liu, Jianfeng Hou. Binding number and Hamiltonian (::::g, f::::)-factors in graphs II |
1333 | -- | 1340 | Nikos Kofidis, Athanasios Margaris, Konstantinos I. Diamantaras, Manos Roumeliotis. Blind system identification: instantaneous mixtures of ::::n:::: sources |
1341 | -- | 1353 | A. K. Maiti, M. Maiti. Discounted multi-item inventory model via genetic algorithm with Roulette wheel selection, arithmetic crossover and uniform mutation in constraints bounded domains |
1355 | -- | 1362 | Saralees Nadarajah. Exact distribution of the linear combination of ::::p:::: Gumbel random variables |
1363 | -- | 1373 | Rongjun Cheng. Determination of a control parameter in a one-dimensional parabolic equation using the moving least-square approximation |
1375 | -- | 1395 | Christian Gout. Viscosity solutions for geodesic active contour under geometrical conditions |
1397 | -- | 1411 | Yiyong Nie, Zheng Li, J. D. Han. Origin-shifted algorithm for matrix eigenvalues |
1413 | -- | 1429 | Yu-Jie Ren, Da-Hai Zhang, Fang Chen, Hong-Qing Zhang. New generalized method to construct new non-travelling wave solutions and travelling wave solutions of K-D equations |
1431 | -- | 1440 | Athanassios G. Bratsos. Solitary-wave propagation and interactions for the good Boussinesq equation |
1441 | -- | 1453 | Xingping Sheng, Guoliang Chen. Several representations of generalized inverse and their application |
1455 | -- | 1461 | Mehdi Dehghan, Mehrdad Lakestani. Numerical solution of nonlinear system of second-order boundary value problems using cubic B-spline scaling functions |
1463 | -- | 1472 | Mong-Shu Lee. Noisy image enhancement on smooth function spaces |