323 | -- | 326 | Chi-Kwong Chan, L. M. Cheng. Cryptanalysis of a remote password authentication scheme |
327 | -- | 342 | Jonathan K. Lawder, Peter J. H. King. Using state diagrams for hilbert curve mappings |
343 | -- | 364 | Gheorghe Paun, Yasuhiro Suzuki, Hiroshi Tanaka. P systems with energy accounting |
365 | -- | 382 | Daehyon Kim. vs. fuzzy artmap |
383 | -- | 397 | Mohd Yazid Saman, David J. Evans. Distributed computing on cluster systems |
399 | -- | 412 | A. A. Soliman, K. R. Raslan. Collocation method using quadratic B-spline for the RLW equation |
413 | -- | 432 | E. H. Doha, F. M. R. Al-Kholi. An Efficient Double Legendre Spectral Method for Parabolic and Elliptic Partial Differential Equations |
433 | -- | 444 | Chenglie Hu. On widening region of convergence for newton' method - a numerical ODE perspective |
445 | -- | 450 | K. Suenaga, M. Sakai. A cubic spline approximation of an offset curve of a planar cubic spline |
451 | -- | 470 | Ke Chen 0002, Anwar Hussein, Haibin Wan. An analysis of seydel' test function methods for nonlinear power flow equations |
471 | -- | 480 | Z. Khatir. An algorithm for velocity calculation in close proximity to body surfaces in panel methods |