A note on determining the number of outliers in a normal sample with unequal variances by least squares procedure Fulltext Access 6 Pages 2005
On computing of arbitrary positive integer powers for one type of even order tridiagonal matrices with zero row-I Fulltext Access 6 Pages 2005
A new efficient (t, n) verifiable multi-secret sharing (VMSS) based on YCH scheme Fulltext Access 6 Pages 2005
The security of a strong proxy signature scheme with proxy signer privacy protection Fulltext Access 6 Pages 2005
Solving second kind integral equations with hybrid Fourier and block-pulse functions Fulltext Access 6 Pages 2005
A new computational algorithm for solving periodic tri-diagonal linear systems Fulltext Access 6 Pages 2005
Exact solutions of multi-component nonlinear Schrödinger and Klein-Gordon equations Fulltext Access 6 Pages 2005
Improvement of signature scheme based on factoring and discrete logarithms Fulltext Access 6 Pages 2005
An approximation to the solution of hyperbolic equations by Adomian decomposition method and comparison with characteristics method Fulltext Access 6 Pages 2005
The solution of two dimensional nonlinear differential equation by the Adomian decomposition method Fulltext Access 6 Pages 2005
A computation method for nonlinear vibration of axially accelerating viscoelastic strings Fulltext Access 6 Pages 2005
Automatic calculation of the fundamental group of an oriented surface of genus n with k boundary surfaces Fulltext Access 6 Pages 2005
Finding the piecewise linear frontier production function in data envelopment analysis Fulltext Access 6 Pages 2005
A new approach to the solution of the prey and predator problem and comparison of the results with the Adomian method Fulltext Access 6 Pages 2005
A modified goal programming approach for the mean-absolute deviation portfolio optimization model Fulltext Access 6 Pages 2005
Comments on ID-based multi-signature with distinguished signing authorities Fulltext Access 6 Pages 2005
Numerical solution of Fredholm-Volterra integral equation in one dimension with time dependent Fulltext Access 6 Pages 2005
Level set algorithm for solving convex multiplicative programming problems Fulltext Access 6 Pages 2005
Remarks on some signature schemes based on factoring and discrete logarithms Fulltext Access 6 Pages 2005
Improvement on Hwang et al.'s generalization of proxy signature schemes based on elliptic curves Fulltext Access 7 Pages 2005
Restarted Adomian method for system of nonlinear Volterra integral equations Fulltext Access 7 Pages 2005
A knapsack public-key cryptosystem based on elliptic curve discrete logarithm Fulltext Access 7 Pages 2005
Maximum principles for a coupled system of second and fourth order elliptic equations and an application Fulltext Access 7 Pages 2005
Comment: A new blind signature based on the discrete logarithm problem for untraceability Fulltext Access 7 Pages 2005
On computing of arbitrary positive integer powers for one type of tridiagonal matrices of even order Fulltext Access 7 Pages 2005
Solution of linear and nonlinear parabolic equations by the decomposition method Fulltext Access 7 Pages 2005
Periodicity and attractivity of a nonlinear higher order difference equation Fulltext Access 7 Pages 2005
A multiplicity result for second order impulsive differential equations via the Leggett Williams fixed point theorem Fulltext Access 7 Pages 2005
Fourier embedded domain methods: extending a function defined on an irregular region to a rectangle so that the extension is spatially periodic and Câ Fulltext Access 7 Pages 2005
LMI optimization approach to asymptotic stability of certain neutral delay differential equation with time-varying coefficients Fulltext Access 7 Pages 2005
Improvement of Fan et al.'s deniable authentication protocol based on Diffie-Hellman algorithm Fulltext Access 7 Pages 2005
Improvement of Tzeng et al.'s nonrepudiable threshold proxy signature scheme with known signers Fulltext Access 7 Pages 2005
Solution of systems of integral-differential equations by Adomian decomposition method Fulltext Access 7 Pages 2005
Error estimation problem of nonlinear integral equations in the space Lp(p ⩾ 1) Fulltext Access 7 Pages 2005
A characterization of the convergence of Picard iteration to a fixed point for a continuous mapping and an application Fulltext Access 7 Pages 2005
On Lipschitz stability for comparison systems of differential equations via limiting equation Fulltext Access 7 Pages 2005
Cryptanalysis and further improvement of Peinado's improved LHL-key authentication scheme Fulltext Access 7 Pages 2005
Nonexistence of global solutions to a hyperbolic equation with a space-time fractional damping Fulltext Access 7 Pages 2005
An LMI approach to reliable guaranteed cost control of discrete-time systems with actuator failure Fulltext Access 7 Pages 2005
Efficient nonce-based remote user authentication scheme using smart cards Fulltext Access 7 Pages 2005
Solving second kind integral equations with Hybrid Chebyshev and Block-Pulse functions Fulltext Access 7 Pages 2005
Fuzzy linear regression analysis: a multi-objective programming approach Fulltext Access 7 Pages 2005
Performance analysis of discrete-time queue GI/G/1 with negative arrivals Fulltext Access 7 Pages 2005
On a family of iterative methods for simultaneous extraction of all roots of algebraic polynomial Fulltext Access 7 Pages 2005
Numerical simulations of periodic travelling waves to a generalized Ginzburg-Landau equation Fulltext Access 7 Pages 2005