On the number of productive individuals in the Bienayme-Galton-Watson process with immigration Fulltext Access 4 Pages 2007
A note on multi-criteria ABC inventory classification using weighted linear optimization Fulltext Access 4 Pages 2007
Conjugate points of second order ordinary differential equations with jumping nonlinearities Fulltext Access 4 Pages 2007
Potential weaknesses of AuthA password-authenticated key agreement protocols Fulltext Access 4 Pages 2007
Vulnerabilities of generalized MQV key agreement protocol without using one-way hash functions Fulltext Access 4 Pages 2007
An application of efficient frontier in transportation of hazardous materials Fulltext Access 4 Pages 2007
A fresh approach to performance evaluation in a multi-item production scenario Fulltext Access 4 Pages 2007
A polynomial algorithm for the production/ordering planning problem with limited storage Fulltext Access 4 Pages 2007
Improving the security of ‘a flexible biometrics remote user authentication scheme’ Fulltext Access 4 Pages 2007
Human centered processes: Toward a naturalistic decision making paradigm Fulltext Access 4 Pages 2007
Optimal inventory model for items with imperfect quality and shortage backordering Fulltext Access 5 Pages 2007
Two-scale numerical solution of the electromagnetic two-fluid plasma-Maxwell equations: Shock and soliton simulation Fulltext Access 5 Pages 2007
Numerical integration in the DGFEM for nonlinear convection-diffusion problems Fulltext Access 5 Pages 2007
Geographical information systems applied in the field of renewable energy sources Fulltext Access 5 Pages 2007
A nonuniform mesh semi-implicit CE-SE method modelling unsteady flow in tapered ducts Fulltext Access 5 Pages 2007
Computing mean square approximations of random diffusion models with source term Fulltext Access 5 Pages 2007
The qualitative properties of the Stokes and Navier–Stokes system for the mixed problem in a nonsmooth domain Fulltext Access 5 Pages 2007
On the derivation of new families of generating functions involving ordinary Bessel functions and Bessel–Hermite functions Fulltext Access 5 Pages 2007
A case study for determining standard time in a multi-pattern and short life-cycle production system Fulltext Access 5 Pages 2007
A note on the economic lot size of the integrated vendor–buyer inventory system derived without derivatives Fulltext Access 5 Pages 2007
A note on a single-vendor and multiple-buyers production-inventory policy for a deteriorating item Fulltext Access 5 Pages 2007
Extending commutative diagram cryptanalysis to slide, boomerang, rectangle and square attacks Fulltext Access 5 Pages 2007
Control limits for two-state partially observable Markov decision processes Fulltext Access 5 Pages 2007
On the representation of the one machine sequencing problem in the shifting bottleneck heuristic Fulltext Access 5 Pages 2007
Ensuring population diversity in genetic algorithms: A technical note with application to the cell formation problem Fulltext Access 5 Pages 2007
A note on article “A tolerance approach to the fuzzy goal programming problems with unbalanced triangular membership function” Fulltext Access 5 Pages 2007
Business process management: Where business processes and web services meet Fulltext Access 5 Pages 2007
Mutual authentication protocol for RFID conforming to EPC Class 1 Generation 2 standards Fulltext Access 6 Pages 2007
An enhanced authenticated key agreement protocol for wireless mobile communication Fulltext Access 6 Pages 2007
Cryptanalysis and improvement on two efficient remote user authentication scheme using smart cards Fulltext Access 6 Pages 2007
Understanding motion planning better: A comparative review of “Principles of Robot Motion: Theory, Algorithms, and Implementations”, by H. Choset et al. Fulltext Access 6 Pages 2007
Radio-Frequency Identification (RFID) applications: A brief introduction Fulltext Access 6 Pages 2007