


default search action
Applied Mathematics and Computation, Volume 167
Volume 167, Number 1, August 2005
- Prasada Rao, Miguel Angel Medina

:
A multiple domain algorithm for modeling one-dimensional transient contaminant transport flows. 1-15 - Rafael Álvarez

, Joan-Josep Climent
, Leandro Tortosa
, Antonio Zamora
:
An efficient binary sequence generator with cryptographic applications. 16-27 - Mehdi Dehghan

:
Numerical approximations for solving a time-dependent partial differential equation with non-classical specification on four boundaries. 28-45 - Mehdi Dehghan

:
Quasi-implicit and two-level explicit finite-difference procedures for solving the one-dimensional advection equation. 46-67 - Dariush Shadman, Bahman Mehri:

A non-homogeneous Hill's equation. 68-75 - G. A. Afrouzi:

On positive mountain pass solutions for a semilinear elliptic boundary value problem. 76-80 - Yong Ding, Kwok-Wo Wong, Yu-Min Wang:

A w-NNAF method for the efficient computation of scalar multiplication in elliptic curve cryptography. 81-93 - Zhen-Jun Shi, Jie Shen:

Convergence of descent method without line search. 94-107 - Wu-Chuan Yang, Dah-Jyh Guan, Chi-Sung Laih:

Algorithm of asynchronous binary signed-digit recoding on fast multiexponentiation. 108-117 - Ming-Hsin Chang, Yi-Shiung Yeh:

Improving Lamport one-time signature scheme. 118-124 - Roberto Barrio

, Juan Manuel Peña
:
Evaluation of the derivative of a polynomial in Bernstein form. 125-142 - Zuhua Shao:

A new key authentication scheme for cryptosystems based on discrete logarithms. 143-152 - Tariq Aziz, Arshad Khan, Jalil Rashidinia

:
Spline methods for the solution of fourth-order parabolic partial differential equations. 153-166 - E. E. Ammar

:
On computational solution of vector maximum problem. 167-178 - S. H. Saker

:
Oscillation of continuous and discrete diffusive delay Nicholson's blowflies models. 179-197 - Alaeddin Malek, A. Yari:

Primal-dual solution for the linear programming problems using neural networks. 198-211 - Z. Merdan, M. Bayirli:

The effect of the increase of linear dimensions on exponents obtained by finite-size scaling relations for the six-dimensional Ising model on the Creutz cellular automaton. 212-224 - Rajesh K. Bawa:

Spline based computational technique for linear singularly perturbed boundary value problems. 225-236 - Hashem Saberi Najafi

, Sohrab Kordrostami
, M. Esmaeilzadeh:
Computational Quartic c3-spline and Quintic c2-spline algorithms for solving second-order initial value problems. 237-251 - Ying-Ming Wang, Jian-Bo Yang

, Dong-Ling Xu
:
Interval weight generation approaches based on consistency test and interval comparison matrices. 252-273 - Eun-Jun Yoon, Eun-Kyung Ryu, Kee-Young Yoo:

Improvement of Fan et al.'s deniable authentication protocol based on Diffie-Hellman algorithm. 274-280 - Shin-Jia Hwang, Hao-Chih Liao:

Security of Hsu-Wu's authenticated encryption scheme with (t, n) shared verification. 281-285 - Dragan Jukic, Rudolf Scitovski

:
Least squares fitting Gaussian type curve. 286-298 - Mohammad Y. Al-Rawwash:

Covariance matrix estimation using repeated measurements when data are incomplete. 299-315 - M. Tavassoli Kajani

, B. Asady, A. Hadi-Vencheh
:
An iterative method for solving dual fuzzy nonlinear equations. 316-323 - Yongkun Li, Linghong Lu:

Positive periodic solutions of discrete n-species food-chain systems. 324-344 - Andrés Barrea, Cristina Vilma Turner:

A numerical analysis of a model of growth tumor. 345-354 - Sung-Woon Lee, Hyun-Sung Kim

, Kee-Young Yoo:
Efficient nonce-based remote user authentication scheme using smart cards. 355-361 - Yuan-Lung Yu, Tzer-Shyong Chen

:
An efficient threshold group signature scheme. 362-371 - Teresa Diogo

, John T. Edwards, Neville J. Ford
, Sophy M. Thomas:
Numerical analysis of a singular integral equation. 372-382 - Shan Zhao

, Guo-Wei Wei:
Option valuation by using discrete singular convolution. 383-418 - Luther W. White, Yiqi Luo:

Model-based data assessment for terrestrial carbon processes: implications for sampling strategy in FACE experiments. 419-434 - Saffet Ayasun, Chika O. Nwankpa, Harry G. Kwatny:

An efficient method to compute singularity induced bifurcations of decoupled parameter-dependent differential-algebraic power system model. 435-453 - Zhong-hua Yang, Qian Guo

:
Bifurcation analysis of delayed logistic equation. 454-476 - Blanca Pérez-Gladish

, Mar Arenas Parra
, Amelia Bilbao-Terol
, Maria Victoria Rodríguez Uría:
Management of surgical waiting lists through a Possibilistic Linear Multiobjective Programming problem. 477-495 - Mahmoud H. Alrefaei

:
A simulated annealing applied for optimizing a voice-multihop radio network. 496-507 - Ching-Ter Chang:

Fractional programming with absolute-value functions: a fuzzy goal programming approach. 508-515 - Roger M. Faye

, Salam Sawadogo, Félix Mora-Camino:
Flexible management of water resource systems. 516-527 - Margarita Fernández, Derek P. Atherton:

Analysis of insulin sensitivity estimates from linear models of glucose disappearance. 528-538 - George E. Tsekouras

:
A fuzzy vector quantization approach to image compression. 539-560 - Santanu Saha Ray, R. K. Bera:

An approximate solution of a nonlinear fractional differential equation by Adomian decomposition method. 561-571 - Da-Zhi Sun, Zhen-Fu Cao

, Yu Sun:
Remarks on a new key authentication scheme based on discrete logarithms. 572-575 - Lihong Feng:

Review of model order reduction methods for numerical simulation of nonlinear circuits. 576-591 - Tadeusz Platkowski, Joanna Stachowska-Pietka

:
ESSs in n-player mixed games. 592-606 - Ming Gen Cui, Li Hong Yang:

The exact solutions of a kind of nonlinear operator equations. 607-615 - E. Ahmed, Mahmoud El-Alem:

On multiobjective optimization in portfolio management. 616-621 - Zong-Yi Lee:

Applying the double side method of weighted residual to the solution of shell deformation problem. 622-634 - Patricia Mariela Morillas

:
Dykstra's algorithm with strategies for projecting onto certain polyhedral cones. 635-649 - Kyungsoo Kim

, Dokkyun Yi, Sungyun Lee:
Mortar method for nonconforming finite elements. 650-669 - Erdal Karaduman:

On determinants of matrices with general Fibonacci numbers entries. 670-676 - Pu-yan Nie

:
A filter method for solving nonlinear complementarity problems. 677-694 - Nurullah Ankaralioglu, Hüseyin Aydin, Inci Gültekin:

Computation of abstract groups S((d + 1)/2, d) and torus knots K(d, 2). 695-710 - Eun-Jun Yoon, Eun-Kyung Ryu, Kee-Young Yoo:

Improvement of Chien-Jan's authenticated multiple-key agreement protocol without using conventional one-way function. 711-715 - Shaohua Pan, Xingsi Li:

An efficient algorithm for the Euclidean r-centrum location problem. 716-728 - Yuh-Dauh Lyuu

, Ming-Luen Wu:
Cryptanalysis of and improvement on the Hwang-Chen multi-proxy multi-signature schemes. 729-739
Volume 167, Number 2, August 2005
- Jong-Wuu Wu, Wen-Chuan Lee, Sheau-Chiann Chen

:
Prediction intervals of future observation from one-parameter exponential distribution based on multiply type II censored samples. 741-806 - Jong-Wuu Wu, Chin-Chuan Wu, Mei-Huei Tsai:

Optimal parameter estimation of the two-parameter bathtub-shaped lifetime distribution based on a type II right censored sample. 807-819 - Ya-Fen Chang, Chin-Chen Chang:

Authentication schemes with no verification table. 820-832 - Eun-Kyung Ryu, Jae-Yuel Im, Kee-Young Yoo:

Security of Tseng-Jan's conference key distribution system. 833-839 - Liao-Jun Pang

, Yu-Min Wang:
A new (t, n) multi-secret sharing scheme based on Shamir's secret sharing. 840-848 - Hassan N. A. Ismail, Kamal R. Raslan, Ghada S. E. Salem, Aziza A. Abd Rabboh:

Comparison study between restrictive Taylor, restrictive Padé approximations and Adomian decomposition method for the solitary wave solution of the General KdV equation. 849-869 - Ren-Junn Hwang, Chih-Hua Lai, Feng-Fu Su:

An efficient signcryption scheme with forward secrecy based on elliptic curve. 870-881 - Chien-Lung Hsu:

Cryptanalysis and improvement of the Tzeng-Hwang authenticated encryption scheme based on elliptic curve discrete logarithm problem. 882-890 - Tseng-Kuei Li:

Cycle embedding in star graphs with edge faults. 891-900 - Li-Hong Cui, Zheng-xing Cheng:

A method of construction for biorthogonal multiwavelets system with 2r multiplicity. 901-918 - Yong Chen, Qi Wang:

A new general algebraic method with symbolic computation to construct new doubly-periodic solutions of the (2 + 1)-dimensional dispersive long wave equation. 919-929 - Yong-Lin Chen, Xue-Yuan Tan:

Semiconvergence criteria of iterations and extrapolated iterations and constructive methods of semiconvergent iteration matrices. 930-956 - Caidi Zhao:

Algorithmization formula and mechanization to Cauchy problem of high dimensional wave equation. 957-963 - Afrah Saad Mahmood, Luis Casasús, Waleed Al-Hayani

:
The decomposition method for stiff systems of ordinary differential equations. 964-975 - Din-Yuen Chan, Cheng-Yuan Ku:

Finite-precision arithmetic coding via index-splitting and probability-fitting. 976-995 - Sung-Woon Lee, Hyun-Sung Kim

, Kee-Young Yoo:
Efficient verifier-based key agreement protocol for three parties without server's public key. 996-1003 - Yi-Qin Lin:

Implicitly restarted global FOM and GMRES for nonsymmetric matrix equations and Sylvester equations. 1004-1025 - Xianfu Zhang, Zhaolin Cheng:

Output feedback stabilization of nonlinear systems with delays in the input. 1026-1040 - Ali Vahidian Kamyad

, Hamed Hashemi Mehne
, Akbar Hashemi Borzabadi:
The best linear approximation for nonlinear systems. 1041-1061 - Jingjun Zhao, Yang Xu, M. Z. Liu:

Stability analysis of numerical methods for linear neutral Volterra delay-integro-differential system. 1062-1079 - Abdollah Shidfar, M. Djalalvand, Morteza Garshasbi

:
A numerical scheme for solving special class of nonlinear diffusion-convection equation. 1080-1089 - M. Hadizadeh

, M. Asgary:
An efficient numerical approximation for the linear class of mixed integral equations. 1090-1100 - Kamal R. Raslan:

A computational method for the regularized long wave (RLW) equation. 1101-1118 - Yaghoub Mahmoudi:

Wavelet Galerkin method for numerical solution of nonlinear integral equation. 1119-1129 - Jinlin Shi, Aizhi Weng, Jiyang Chen:

The calculation for characteristic multiplier of Hill's equation in case q(t) < 0. 1130-1149 - Esmail Babolian, A. R. Vahidi

, G. H. Asadi Cordshooli:
Solving differential equations by decomposition method. 1150-1155 - Abdalah A. Badr:

Numerical solution of Fredholm-Volterra integral equation in one dimension with time dependent. 1156-1161 - Abdul-Majid Wazwaz:

Generalized Boussinesq type of equations with compactons, solitons and periodic solutions. 1162-1178 - Abdul-Majid Wazwaz:

The tanh and the sine-cosine methods for compact and noncompact solutions of the nonlinear Klein-Gordon equation. 1179-1195 - Abdul-Majid Wazwaz:

The tanh method: exact solutions of the sine-Gordon and the sinh-Gordon equations. 1196-1210 - Khaled M. Furati

, Nasser-eddine Tatar:
Uniform boundedness and stability for a viscoelastic problem. 1211-1220 - Mohamed Medjden, Nasser-eddine Tatar:

Asymptotic behavior for a viscoelastic problem with not necessarily decreasing kernel. 1221-1235 - Ravi P. Agarwal, Donal O'Regan, V. Lakshmikantham, S. Leela:

Nonresonant singular boundary value problems with sign changing nonlinearities. 1236-1248 - Mahir Rasulov

:
Numerical solution of one dimensional filtration of three phase compressible fluid through porous medium in a class of discontinuous functions. 1249-1266 - Tuncay Candan

, Rajbir S. Dahiya:
Oscillation behavior of higher order neutral differential equations. 1267-1280 - K. L. Boey, Patricia J. Y. Wong

:
Two-point right focal eigenvalue problems on time scales. 1281-1303 - Mokhtar Kirane

, Y. Laskri:
Nonexistence of global solutions to a hyperbolic equation with a space-time fractional damping. 1304-1310 - Juan I. Ramos

:
Exponentially-fitted methods on layer-adapted meshes. 1311-1330 - Juan I. Ramos

:
Equivalence of C0 and C1 methods for ODE's. 1331-1338 - Salah M. El-Sayed, Dogan Kaya:

Exact and numerical traveling wave solutions of Whitham-Broer-Kaup equations. 1339-1349 - Weiming Wang:

An algorithm for solving DAEs with mechanization. 1350-1372 - Jianhong Zhang, Yumin Wang:

On the security of Miyaji et al. group signature scheme. 1373-1382 - Haibo Zhao

, Chuguang Zheng, Minghou Xu
:
Multi-Monte Carlo method for particle coagulation: description and validation. 1383-1399 - Rais Ahmad, Fabián Flores Bazán:

An iterative algorithm for random generalized nonlinear mixed variational inclusions for random fuzzy mappings. 1400-1411 - Ebrahim A. Youness:

Level set algorithm for solving convex multiplicative programming problems. 1412-1417 - Sedaghat Shahmorad:

Numerical solution of the general form linear Fredholm-Volterra integro-differential equations by the Tau method with an error estimation. 1418-1429 - Reza Tavakkoli-Moghaddam

, Ghasem Moslehi
, M. Vasei, Amir Azaron:
Optimal scheduling for a single machine to minimize the sum of maximum earliness and tardiness considering idle insert. 1430-1450 - Iwan M. Duursma, Hyang-Sook Lee:

A group key agreement protocol from pairings. 1451-1456 - Pradeep Kumar Gudla, Ranjan Ganguli

:
An automated hybrid genetic-conjugate gradient algorithm for multimodal optimization problems. 1457-1474

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.


Google
Google Scholar
Semantic Scholar
Internet Archive Scholar
CiteSeerX
ORCID














