


default search action
IJCM: CST, Volume 5
Volume 5, Number 1, January 2020
- Yufei Huang, Weihua He, Guixian Huang, Hong-Jian Lai

, Sulin Song
:
A characterization of graphs with supereulerian line graphs. 1-14 - Ramón Flores, Delaram Kahrobaei

, Thomas Koberda:
A cryptographic application of the Thurston norm. 15-24 - Guanqin Lian, Shuming Zhou, Eddie Cheng, Jiafei Liu, Gaolin Chen, Zhendong Gu:

Reliability and conditional diagnosability of hyper bijective connection networks. 25-47 - Elham Abdali, Reza Fallahnejad

:
A bargaining game model for measuring efficiency of two-stage network DEA with non-discretionary inputs. 48-59
Volume 5, Number 2, April 2020
- Hong Zhang, Laijiang Zhang, Jixiang Meng:

Hybrid fault diagnosis capability analysis of regular graphs under the PMC model. 61-71 - Wu-Lin Chen, Kuo-Hsiung Wang:

Reliability and sensitivity analysis of a retrial machine repair problem with warm standbys and imperfect coverage. 72-86 - Masaaki Harada:

Construction of s-extremal optimal unimodular lattices in dimension 52. 87-91 - Amir Khamseh

:
A note on (t - 1)-chromatic Ramsey number of linear forests. 92-97 - James Hallas, Maria Talanda-Fisher, Ping Zhang:

Dominating functions in graphs - regularity versus irregularity. 98-111 - Eddie Cheng, Ke Qiu, Zhizhang Shen

:
The g-extra diagnosability of the generalized exchanged hypercube. 112-123
Volume 5, Number 3, 2020
- Chun-Nan Hung, Mohamad Abdallah

, Jui-I Weng, Tzu-Liang Kung:
Edge-pancyclicity of pancake graph. 125-133
- Chuan-Min Lee:

The complexity of total k-domatic partition and total R-domination on graphs with weak elimination orderings. 134-147 - Sean Bailey, David Brown:

Bipartite dot product graphs. 148-158 - Sourav Pradhan

:
A discrete-time batch transmission channel with random serving capacity under batch-size-dependent service. 175-197 - Sujit Kumar Samanta

, B. Bank
:
Analysis of stationary queue-length distributions of the BMAP/R(a, b)/1 queue. 198-223
Volume 5, Number 4, 2020
- R. Kuppan, L. Shobana

, Ismail Naci Cangül
:
Encrypting and decrypting algorithms using strong face graph of a tree. 225-233 - Jie-Fu Huang, Sun-Yuan Hsieh:

Recursive and parallel constructions of independent spanning trees in alternating group networks. 234-262
- Oluwasefunmi 'Tale Arogundade

, Samuel Ibukun Olotu
, Olusola Abayomi-Alli, Sanjay Misra
, Abiodun Motunrayo Ikotun:
A study of existing use case extensions and experience: a systematic review. 263-281
- Samuel Dobson

, Steven D. Galbraith
, Jason T. LeGrow
, Yan Bo Ti
, Lukas Zobernig
:
An adaptive attack on 2-SIDH. 282-299 - Mohammad Reza Zarrabi

, Nasrollah Moghaddam Charkari
:
On approximations to minimum link visibility paths in simple polygons. 300-307

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.


Google
Google Scholar
Semantic Scholar
Internet Archive Scholar
CiteSeerX
ORCID














