Volume 177; Issue 19

Information Sciences

Volume 177; Issue 19
1

On definable concepts of rough set models

Year:
2007
Language:
english
File:
PDF, 168 KB
english, 2007
2

How to construct secure proxy cryptosystem

Year:
2007
Language:
english
File:
PDF, 216 KB
english, 2007
3

Computing the λ-covers of a string

Year:
2007
Language:
english
File:
PDF, 285 KB
english, 2007
4

A knowledge engineering approach to knowledge management

Year:
2007
Language:
english
File:
PDF, 846 KB
english, 2007
5

Node-disjoint paths in hierarchical hypercube networks

Year:
2007
Language:
english
File:
PDF, 185 KB
english, 2007
6

Optimization of fuzzy relational equations with max-av composition

Year:
2007
Language:
english
File:
PDF, 304 KB
english, 2007
7

The effect of reading policy on early join result production

Year:
2007
Language:
english
File:
PDF, 1.01 MB
english, 2007
10

A knapsack-based probabilistic encryption scheme

Year:
2007
Language:
english
File:
PDF, 222 KB
english, 2007
11

Proof that pyramid networks are 1-Hamiltonian-connected with high probability

Year:
2007
Language:
english
File:
PDF, 266 KB
english, 2007
12

A study on two measurements-to-tracks data assignment algorithms

Year:
2007
Language:
english
File:
PDF, 312 KB
english, 2007
13

Comparative tests of solution methods for signal-controlled road networks

Year:
2007
Language:
english
File:
PDF, 224 KB
english, 2007
14

EC2C-PAKA: An efficient client-to-client password-authenticated key agreement

Year:
2007
Language:
english
File:
PDF, 430 KB
english, 2007
15

Rényi information measure for a used item

Year:
2007
Language:
english
File:
PDF, 215 KB
english, 2007
16

Security enhancement for digital signature schemes with fault tolerance in RSA

Year:
2007
Language:
english
File:
PDF, 152 KB
english, 2007
17

Delegation with supervision

Year:
2007
Language:
english
File:
PDF, 256 KB
english, 2007
18

On the strength of hyperclique patterns for text categorization

Year:
2007
Language:
english
File:
PDF, 588 KB
english, 2007
19

Solutions of fuzzy relation equations based on continuous t-norms

Year:
2007
Language:
english
File:
PDF, 194 KB
english, 2007
20

The uncovering of hidden structures by Latent Semantic Analysis

Year:
2007
Language:
english
File:
PDF, 957 KB
english, 2007
21

Threshold cryptography based on Asmuth–Bloom secret sharing

Year:
2007
Language:
english
File:
PDF, 211 KB
english, 2007
22

Inside Front Cover - Editorial Board

Year:
2007
Language:
english
File:
PDF, 36 KB
english, 2007