-
141
An Iterative Algorithm for the Generalized Reflexive Solution of the Matrix Equations AXB=E, CXD=F
Published 2012-01-01Get full text
Article -
142
Mathematical Model of Pipeline Abandonment and Recovery in Deepwater
Published 2014-01-01Get full text
Article -
143
Trustworthy identity system based on IPv6 source address validation
Published 2014-10-01Get full text
Article -
144
Stochastic burstiness boundary analysis of LFSN-based self-similar network traffic model
Published 2010-01-01Get full text
Article -
145
Survivable virtual network mapping with differentiated services QoP
Published 2013-12-01Get full text
Article -
146
Sub-topic detection and tracking based on dependency connection weights for vector space model
Published 2013-08-01Get full text
Article -
147
Fully Developed Laminar Fluid Flow in a Rotating Isothermal Isosceles Triangular Channel
Published 2002-01-01Get full text
Article -
148
-
149
Result merging method based on combined kernels for distributed information retrieval
Published 2011-01-01Get full text
Article -
150
Utility-based barter trade incentive scheme in opportunistic network
Published 2016-09-01Get full text
Article -
151
A survey of distributed denial-of-service attack, prevention, and mitigation techniques
Published 2017-12-01Get full text
Article -
152
-
153
Bifurcation, Chaos, and Pattern Formation for the Discrete Predator-Prey Reaction-Diffusion Model
Published 2019-01-01Get full text
Article -
154
Survey on intellectual property protection for deep learning model
Published 2022-04-01Get full text
Article -
155
-
156
-
157
Wideband and High-Efficiency SIW Cavity-Backed Magneto-Electric Dipole Antenna Array
Published 2019-01-01Get full text
Article -
158
-
159
Non-invasive eye tracking technology based on corneal reflex
Published 2012-12-01Get full text
Article -
160