P-stable symmetric super-implicitmethods for periodic initial value problems Fulltext Access 5 Pages 2005
Effet d'un champ magnétique transversal sur la stabilité de l'écoulement de Hartmann : les modes tridimensionnels Fulltext Access 5 Pages 2005
Ãtude numérique de l'écoulement d'un fluide non newtonien thermodépendant entre deux plaques parallèles Fulltext Access 5 Pages 2005
Five-point boundary value problems for third-order differential equations by solution matching Fulltext Access 5 Pages 2005
A Steiner arborescence model for the feeder reconfiguration in electric distribution networks Fulltext Access 5 Pages 2005
Single machine preemptive scheduling with fixed jobs to minimize tardiness related criteria Fulltext Access 5 Pages 2005
On the three-dimensional alternative to the Blasius boundary-layer solution Fulltext Access 5 Pages 2005
Note on starting the Numerov method more accurately by a hybrid formula of order four for an initial-value problem Fulltext Access 5 Pages 2005
Accelerated convergence in Newton's method for approximating square roots Fulltext Access 5 Pages 2005
Recurrence relations for the even and odd characteristic polynomials of a symmetric Toeplitz matrix Fulltext Access 5 Pages 2005
A new semilocal convergence theorem for Newton's method involving twice Fréchet-differentiability at only one point Fulltext Access 5 Pages 2005
The fundamental group of an oriented surface of genus n with k boundary surfaces Fulltext Access 5 Pages 2005
Maximum probability/entropy translating of contiguous categorical observations into frequencies Fulltext Access 5 Pages 2005
New travelling wave solutions for the Fisher-KPP equation with general exponents Fulltext Access 5 Pages 2005
Norm estimates of the Fourier series coefficients of the matrix resolvent Fulltext Access 5 Pages 2005
A suggested approach for possibility and necessity dominance indices in stochastic fuzzy linear programming Fulltext Access 5 Pages 2005
Stabilization of some nonlinear controlled electrohydraulic servosystems Fulltext Access 5 Pages 2005
Uniqueness implies existence for three-point boundary value problems for second order differential equations Fulltext Access 5 Pages 2005
Influence d'une polarisation électrique sur l'instabilité d'une interface liquide/liquide Fulltext Access 5 Pages 2005
A heat transfer measurement of jet impingement with high injection temperature Fulltext Access 5 Pages 2005
Rôle du soufflage dans le contrôle de l'éclatement tourbillonnaire sur une aile delta Fulltext Access 5 Pages 2005
Improvement of Chien-Jan's authenticated multiple-key agreement protocol without using conventional one-way function Fulltext Access 5 Pages 2005
Security of Hsu-Wu's authenticated encryption scheme with (t, n) shared verification Fulltext Access 5 Pages 2005
On positive mountain pass solutions for a semilinear elliptic boundary value problem Fulltext Access 5 Pages 2005
On computing of arbitrary positive integer powers for one type of odd order tridiagonal matrices with zero row - I Fulltext Access 5 Pages 2005
Comment on traceability on RSA-based partially signature with low computation Fulltext Access 5 Pages 2005
Uniform persistence of asymptotically periodic multispecies competition predator-prey systems with Holling III type functional response Fulltext Access 5 Pages 2005
On the global asymptotic stability of the difference equation xn=xn-1xn-2+xn-3+axn-1+xn-2xn-3+a Fulltext Access 5 Pages 2005
Explicit solutions of the generalized KdV equations with higher order nonlinearity Fulltext Access 5 Pages 2005
Corrigendum to “Extension of Ambarzumyan's theorem to general boundary conditions” [J. Math. Anal. Appl. 263 (2001) 333-342] Fulltext Access 5 Pages 2005
A new blind signature based on the discrete logarithm problem for untraceability Fulltext Access 5 Pages 2005
On the unlinkability of randomization-enhanced Chaum's blind signature scheme Fulltext Access 5 Pages 2005
Preliminary test estimation in the two parameter exponential distribution with time censored data Fulltext Access 5 Pages 2005
Numerical implementation of Adomian decomposition method for linear Volterra integral equations of the second kind Fulltext Access 5 Pages 2005
On computing of arbitrary positive integer powers for one type of odd order symmetric circulant matrices-I Fulltext Access 5 Pages 2005
A modified formula of ancient Chinese algorithm by the homotopy continuation technique Fulltext Access 5 Pages 2005
On the traceability on RSA-based partially signature with low computation Fulltext Access 5 Pages 2005
Cryptanalysis of Li-Tzeng-Hwang's improved signature schemes based on factoring and discrete logarithms Fulltext Access 5 Pages 2005
On computing of arbitrary positive integer powers for one type of symmetric tridiagonal matrices of even order Fulltext Access 5 Pages 2005
Security of Tzeng-Hwang's authenticated encryption scheme based on elliptic curve discrete logarithm problems Fulltext Access 5 Pages 2005
Off-line password-guessing attacks on the generalized key agreement and password authentication protocol Fulltext Access 5 Pages 2005
A composite third order Newton-Steffensen method for solving nonlinear equations Fulltext Access 5 Pages 2005
Cryptanalysis of an authenticated encryption scheme using self-certified public keys Fulltext Access 5 Pages 2005