Items where Subject is "Q Science > QA Mathematics > QA75 Electronic computers. Computer science"

Up a level
Export as [feed] Atom [feed] RSS 1.0 [feed] RSS 2.0
Group by: Creators | Item Type
Jump to: | A | B | D | E | F | G | H | I | J | K | L | M | N | O | P | R | S | T | V | W | Y | Z
Number of items at this level: 135.

Das, Ramkrishna and Dutta, Saurabh (2013) An approach of bitwise Private-key Encryption technique based on Multiple Operators and numbers of 0 and 1 counted from binary representation of Plain Text‘s single character. An approach of bitwise Private-key Encryption technique based on Multiple Operators and numbers of 0 and 1 counted from binary representation of Plain Text‘s single character, 10. pp. 1-6. ISSN 2278-3075

Fenu, Gianni and Solinas, Fabrizio (2013) COMPUTER FORENSICS INVESTIGATION AN APPROACH TO EVIDENCE IN CYBERSPACE. COMPUTER FORENSICS INVESTIGATION AN APPROACH TO EVIDENCE IN CYBERSPACE .

A

A. A. BOROVKOV, A. A. BOROVKOV and S. G. FOSS, S. G. FOSS (1998) ESTIMATES FOR OVERSHOOTING AN ARBITRARY BOUNDARY BY A RANDOM WALK AND THEIR APPLICATIONS. ESTIMATES FOR OVERSHOOTING AN ARBITRARY BOUNDARY BY A RANDOM WALK AND THEIR APPLICATIONS, 44 (2). pp. 231-253. ISSN 1095-7219

A. G. GRIN, A. G. GRIN (1997) ON STRONG ATTRACTION OF STATIONARY SEQUENCES TO A NORMAL LAW. ON STRONG ATTRACTION OF STATIONARY SEQUENCES TO A NORMAL LAW, 44 (4). pp. 768-774. ISSN 1095-7219

A. G. KUKUSH, A. G. KUKUSH and YU. S. MISHURA, YU. S. MISHURA (1996) ASYMPTOTIC PROPERTIES OF AN INTENSITY ESTIMATOR OF AN INHOMOGENEOUS POISSON PROCESS IN. ASYMPTOTIC PROPERTIES OF AN INTENSITY ESTIMATOR OF AN INHOMOGENEOUS POISSON PROCESS IN, 44 (2). pp. 273-292. ISSN 1095-7219

A. N. CHUPRUNOV, A. N. CHUPRUNOV (1996) ON CONVERGENCE IN LAW OF MAXIMA OF INDEPENDENT IDENTICALLY DISTRIBUTED RANDOM VARIABLES WITH RANDOM COEFFICIENTS. ON CONVERGENCE IN LAW OF MAXIMA OF INDEPENDENT IDENTICALLY DISTRIBUTED RANDOM VARIABLES WITH RANDOM COEFFICIENTS, 44 (1). pp. 93-98. ISSN 1095-7219

A. N. KOLMOGOROV, A. N. KOLMOGOROV and N. G. RYCHKOVA, N. G. RYCHKOVA (1998) RUSSIAN POETRY RHYTHM ANALYSIS AND PROBABILITY THEORY. RUSSIAN POETRY RHYTHM ANALYSIS AND PROBABILITY THEORY, 44 (2). pp. 375-385. ISSN 1095-7219

A. N. SHIRYAEV, A. N. SHIRYAEV ACADEMY OF SCIENCES AND ABOUT THE FIRST ARTICLES ON PROBABILITY THEORY IN RUSSIAN PUBLICATIONS. ACADEMY OF SCIENCES AND ABOUT THE FIRST ARTICLES ON PROBABILITY THEORY IN RUSSIAN PUBLICATIONS, 44 (2). pp. 225-230. ISSN 1095-7219

A. N. SHIRYAEV, A. N. SHIRYAEV ON THE HISTORY OF THE FOUNDATION OF THE RUSSIAN ACADEMY OF SCIENCES AND ABOUT THE FIRST ARTICLES ON PROBABILITY THEORY IN RUSSIAN PUBLICATIONS. ON THE HISTORY OF THE FOUNDATION OF THE RUSSIAN ACADEMY OF SCIENCES AND ABOUT THE FIRST ARTICLES ON PROBABILITY THEORY IN RUSSIAN PUBLICATIONS.

A. N. SHIRYAEV, A. N. SHIRYAEV and A. S. CHERNY, A. S. CHERNY (1999) SOME DISTRIBUTIONAL PROPERTIES OF A BROWNIAN MOTION WITH A DRIFT AND AN EXTENSION OF P. L´EVY’S THEOREM. SOME DISTRIBUTIONAL PROPERTIES OF A BROWNIAN MOTION WITH A DRIFT AND AN EXTENSION OF P. L´EVY’S THEOREM, 44 (2). pp. 412-419. ISSN 1095-7219

A. TEMPELMAN, A. TEMPELMAN (1998) DIMENSION OF RANDOM FRACTALS IN METRIC SPACES. DIMENSION OF RANDOM FRACTALS IN METRIC SPACES, 44 (3). pp. 537-557. ISSN 1095-7219

A. V. LEBEDEV, A. V. LEBEDEV (1998) LIMIT THEOREMS ON MAXIMUMS OF POISSON SEQUENCES AND THEIR APPLICATIONS TO QUEUING THEORY. LIMIT THEOREMS ON MAXIMUMS OF POISSON SEQUENCES AND THEIR APPLICATIONS TO QUEUING THEORY, 44 (2). pp. 412-419. ISSN 1095-7219

A. YU. VERETENNIKOV, A. YU. VERETENNIKOV (1999) ON POLYNOMIAL MIXING AND CONVERGENCE RATE FOR STOCHASTIC DIFFERENCE AND DIFFERENTIAL EQUATIONS. ON POLYNOMIAL MIXING AND CONVERGENCE RATE FOR STOCHASTIC DIFFERENCE AND DIFFERENTIAL EQUATIONS, 44 (2). pp. 361-374. ISSN 1095-7219

Aaron, Scott T urberg (2013) A Grounded Theory of How Jewish Experiential Education I mpacts the I dentity Development of Jewish Emerging Adults. A Grounded Theory of How Jewish Experiential Education I mpacts the I dentity Development of Jewish Emerging Adults. pp. 1-141.

Aliev, F A, Aliev, F A (1998) NEW CHARACTERIZATION OF DISCRETE DISTRIBUTIONS THROUGH WEAK RECORDS. NEW CHARACTERIZATION OF DISCRETE DISTRIBUTIONS THROUGH WEAK RECORDS, 44 (4). pp. 756-761. ISSN 1095-7219

Amrohi, Azeem Haider and Kumar, Ashwani (2013) Benefits of Hybrid Hosting Over Conventional Hosting. Benefits of Hybrid Hosting Over Conventional Hosting.

Arulanadam, Srinivasan and Jaganathan, Suresh and Avula, Damodaram (2012) An Efficient Transport Protocol for delivery of Multimedia Content in Wireless Grids. An Efficient Transport Protocol for delivery of Multimedia Content in Wireless Grids , 3 (5). pp. 1-20. ISSN 2222-1719

Astoul, Julien, - and Geneix, Jérôme, - and Mermoz, Emmanuel, - and Sartor, Marc, - (2013) A simple and robust method for spiral bevel gear generation and tooth contact analysis. A simple and robust method for spiral bevel gear generation and tooth contact analysis. pp. 37-49.

B

B. A. ROGOZIN, B. A. ROGOZIN (1998) ON THE CONSTANT IN THE DEFINITION OF SUBEXPONENTIAL DISTRIBUTIONS. ON THE CONSTANT IN THE DEFINITION OF SUBEXPONENTIAL DISTRIBUTIONS, 44 (2). pp. 409-412. ISSN 1095-7219

BASU, MOUMITA (2013) DESIGN AND DEVELOPMENT OF AUTOMATIC AND RANDOMONE-TIME PAD ALGORITHM USING FINITE INDUCTIVE SEQUENCE. DESIGN AND DEVELOPMENT OF AUTOMATIC AND RANDOMONE-TIME PAD ALGORITHM USING FINITE INDUCTIVE SEQUENCE.

Bacon, Simon, - (2012) “We Can Rebuild Him!”: The essentialisation of the human/cyborg interface in the twenty-first century, or whatever happened to The Six Million Dollar Man? Ai & Society, 28 (3). pp. 267-276.

Banik, Barnali Gupta and Bandyopadhyay, Prof. Samir K. (2013) A DWT Method for Image Steganography. A DWT Method for Image Steganography. pp. 1-7.

Bhatt, Ashutosh Kumar, - and Pant, Durgesh, - and Singh, Richa, - (2012) An analysis of the performance of Artificial Neural Network technique for apple classification. Ai & Society.

Bohara, Bhimsingh and Sharma, Varun (2013) Analysis and Prevention of effects of gray hole attacks on Routing Protocol in Mobile Ad-hoc Networks. Analysis and Prevention of effects of gray hole attacks on Routing Protocol in Mobile Ad-hoc Networks, 2. pp. 1-5. ISSN 2278-1021

Borodin, A N, Borodin, A N (1996) Distribution of functionals of certain non-markovian processes. Distribution of functionals of certain non-markovian processes, 44 (3). pp. 433-452. ISSN 1095-7219

Breton, A L E, Breton, A L E and Novikov, A A, Novikov, A A (2007) On stochastic approximation procedures with averaging. On stochastic approximation procedures with averaging. pp. 591-607. ISSN 1095-7219

Buzzi, Marco, - and Colombo, Giorgio, - and Facoetti, Giancarlo, - and Gabbiadini, Stella, - and Rizzi, Caterina, - (2012) 3D modelling and knowledge : tools to automate prosthesis development process. Springer-Verlag. pp. 41-53.

D

D. NEUENSCHWANDER, D. NEUENSCHWANDER (1998) THE CLASS I0 FOR RANDOM INCREASING UPPER SEMICONTINUOUS FUNCTIONS. THE CLASS I0 FOR RANDOM INCREASING UPPER SEMICONTINUOUS FUNCTIONS, 44 (1). pp. 106-110. ISSN 1095-7219

Das, Ramakrishna and Dutta, Saurabh (2013) An Approach of Private-Key Encryption Technique Based on Multiple Operators And Nth Even or Odd Term For Even or Odd Bit Position's Value of A Plain Text's Character. An Approach of Private-Key Encryption Technique Based on Multiple Operators And Nth Even or Odd Term For Even or Odd Bit Position's Value of A Plain Text's Character. p. 15. ISSN 2249 – 8958

Debasis, D. and Lanjewar U. A., U.A and Sharma, S. J. (2013) The Art of Cryptology: From Ancient Number System to Strange Number System. The Art of Cryptology: From Ancient Number System to Strange Number System, 2. pp. 1-11. ISSN 2319 - 4847

Dineshkumar, R. Dineshkumar and Suganthi, Prof. Dr.J.Suganthi (2013) A Research Survey on Sanskrit Offline Handwritten Character Recognition. A Research Survey on Sanskrit Offline Handwritten Character Recognition. pp. 1-7. ISSN 2250-3153

E

E. B. DYNKIN, E. B. DYNKIN (1999) EXIT LAWS AND EXCESSIVE FUNCTIONS FOR SUPERPROCESSES. EXIT LAWS AND EXCESSIVE FUNCTIONS FOR SUPERPROCESSES, 44 (4). pp. 762-767. ISSN 1095-7219

E. MORDECKI, E. MORDECKI (1999) NECESSARY CONDITIONS FOR STABLE CONVERGENCE OF SEMIMARTINGALES. NECESSARY CONDITIONS FOR STABLE CONVERGENCE OF SEMIMARTINGALES, 44 (1). pp. 229-232. ISSN 1095-7219

E. VALKEILA, E. VALKEILA and A. V. MELNIKOV, A. V. MELNIKOV (1998) MARTINGALE MODELS OF STOCHASTIC APPROXIMATION AND THEIR CONVERGENCE. MARTINGALE MODELS OF STOCHASTIC APPROXIMATION AND THEIR CONVERGENCE, 44 (2). pp. 333-360. ISSN 1095-7219

F

F. Cordella, - and L. Zollo, - and E. Guglielmelli, - and B. Siciliano, - (2012) A bio-inspired grasp optimization algorithm for an anthropomorphic robotic hand. Springer-Verlag. pp. 113-122.

F. S. NASYROV, F. S. NASYROV (1998) ON THE REPRESENTATION OF CERTAIN CLASSES OF STOCHASTIC ITˆO INTEGRALS IN THE FORM OF PATHWISE LEBESGUE INTEGRALS. ON THE REPRESENTATION OF CERTAIN CLASSES OF STOCHASTIC ITˆO INTEGRALS IN THE FORM OF PATHWISE LEBESGUE INTEGRALS, 44 (2). pp. 404-409. ISSN 1095-7219

Fenu, Gianni and Solinas, Fabrizio (2013) COMPUTER FORENSICS BETWEEN THE ITALIAN LEGISLATION AND PRAGMATIC QUESTIONS. COMPUTER FORENSICS BETWEEN THE ITALIAN LEGISLATION AND PRAGMATIC QUESTIONS. ISSN 2305-0012

G

G. FREIMAN, G. FREIMAN and A. M. VERSHIK, A. M. VERSHIK and YU. V. YAKUBOVICH, YU. V. YAKUBOVICH (1998) A LOCAL LIMIT THEOREM FOR RANDOM STRICT PARTITIONS. A LOCAL LIMIT THEOREM FOR RANDOM STRICT PARTITIONS, 44 (3). pp. 453-468. ISSN 1095-7219

G. M. MOLCHAN, G. M. MOLCHAN (1998) ON THE MAXIMUM OF A FRACTIONAL BROWNIAN MOTION. ON THE MAXIMUM OF A FRACTIONAL BROWNIAN MOTION, 44 (1). pp. 124-130. ISSN 1095-7219

Gamet, C, Gamet, C and Weber, M, Weber, M Entropy numbers of some ergodic averages. Entropy numbers of some ergodic averages , 44 (4). pp. 650-668. ISSN 1095-7219

Gayathri, C.Gayathri and Kalpana, V.Kalpana (2013) Study on Image Steganography Techniques. Study on Image Steganography Techniques. pp. 1-6.

Giuseppe Di Gironimo, - and Pasquale Franciosa, - and Salvatore Gerbino, - (2009) A RE-CAE methodology for re-designing free shape objects interactively. A RE-CAE methodology for re-designing free shape objects interactively. pp. 273-283.

Grond, Florian, - and Hermann, Thomas, - (2011) Aesthetic strategies in sonification. Ai & Society, 27 (2). pp. 213-222.

Gupta, Ankit and M., Mahesh (2013) A Novel Recommendation Trust Proxy (RTP) Based Pre-emptive Malicious Node Detection Mechanism for AODV in MANET. A Novel Recommendation Trust Proxy (RTP) Based Pre-emptive Malicious Node Detection Mechanism for AODV in MANET, 2. pp. 1-6. ISSN 2278-733X

H

Hales, Gavin Anthony and Ferguson, Robert Ian and Archibald, Jacqueline McEwan (2013) On the use of data visualization techniques to support digital forensic analysis A survey of current approaches. On the use of data visualization techniques to support digital forensic analysis A survey of current approaches . pp. 1-13.

I

I. A. IBRAGIMOV, I. A. IBRAGIMOV and M. A. LIFSHITS, M. A. LIFSHITS ON ALMOST SURE LIMIT THEOREMS. ON ALMOST SURE LIMIT THEOREMS, 44 (2). pp. 254-272. ISSN 1095-7219

I. EPIFANI, I. EPIFANI and A. LIJOI, A. LIJOI A FINITELY ADDITIVE VERSION OF THE LAW OF THE ITERATED LOGARITHM. A FINITELY ADDITIVE VERSION OF THE LAW OF THE ITERATED LOGARITHM, 44 (4). pp. 633-649. ISSN 1095-7219

Ibragimov, I A, Ibragimov, I A (1997) Estimation problems for coefficients of stochastic partial differential equations. part II. Estimation problems for coefficients of stochastic partial differential equations. part II, 44 (3). ISSN 1095-7219

Ibrahim, Safa S. and Bamatraf, Mohamed A. (2013) INTERPRETATION TRAINED NEURAL NETWORKS BASED ON GENETIC ALGORITHMS. INTERPRETATION TRAINED NEURAL NETWORKS BASED ON GENETIC ALGORITHMS. pp. 1-10.

Indirani, G. and Selvakumar, K. (2013) Performance of Swarm Based Intrusion Detection System Under Different Mobility Conditions in MANET. Performance of Swarm Based Intrusion Detection System Under Different Mobility Conditions in MANET. pp. 1-7. ISSN 2250-2459

Indirani, G. Indirani and Selvakumar, K.Selvakumar (2013) HANDLING CROSS-LAYER ATTACKS USING NEIGHBORS MONITORING SCHEME AND SWARM INTELLIGENCE IN MANET. HANDLING CROSS-LAYER ATTACKS USING NEIGHBORS MONITORING SCHEME AND SWARM INTELLIGENCE IN MANET . pp. 41-48.

J

J. R. MAGNUS, J. R. MAGNUS (1998) THE TRADITIONAL PRETEST ESTIMATOR. THE TRADITIONAL PRETEST ESTIMATOR, 44 (2). pp. 412-419. ISSN 1095-7219

Jabbar, Emad K. (2013) Classification ofImages Using Decision Tree. Classification ofImages Using Decision Tree , 31 (6). pp. 1-12.

Jani, Ms. Bhumi and Patel, Prof. Hitesh (2013) Mitigation of Blackhole for AODV (Ad hoc On Demand Distance Vector). Mitigation of Blackhole for AODV (Ad hoc On Demand Distance Vector). pp. 338-345.

Jassim, Firas A. (2013) A Novel Robust Method to Add Watermarks to Bitmap Images by Fading Technique. A Novel Robust Method to Add Watermarks to Bitmap Images by Fading Technique, 4 (5). pp. 43-47.

Jyoti , Jyoti and Sabir, Md. Sabir (2013) More Secured Steganography Model with High Concealing Capacity by using Genetic Algorithm, Integer Wavelet Transform and OPAP. More Secured Steganography Model with High Concealing Capacity by using Genetic Algorithm, Integer Wavelet Transform and OPAP, 1. pp. 1-15. ISSN 2321 – 8169

K

KAPDI, MR. NIKHILESH B. and DETROJA, BRIJESH B. (2013) SIMULATION BASED STUDY OF ATTACKS ON DIFFERENT LAYERIN MOBILE AD HOC NETWORK (MANET). SIMULATION BASED STUDY OF ATTACKS ON DIFFERENT LAYERIN MOBILE AD HOC NETWORK (MANET) . pp. 1-4.

Kanai, Satoshi, - and Higuchi, Taiga, - and Kikuta, Yukiaki, - (2009) 3D digital prototyping and usability enhancement of information appliances based on UsiXML. Springer-Verlag. pp. 201-222.

Kanai, Satoshi, - and Iyoda, Daisuke, - and Endo, Yui, - and Sakamoto, Hideki, - and Kanatani, Naoki, - (2012) Appearance preserving simplification of 3D CAD model with large-scale assembly structures. Appearance preserving simplification of 3D CAD model with large-scale assembly structures. pp. 139-154.

Kapur , Jyotika and Baregar , Akshay. J. (2013) Security using image processing. Security using image processing, 5 (2). pp. 1-9.

Kaur, Prabhjot and Kaur, Amanpreet (2013) Implementation of Dynamic Level Scheduling Algorithm using Genetic Operators. Implementation of Dynamic Level Scheduling Algorithm using Genetic Operators, 2. pp. 1-5. ISSN 2319 - 4847

Kaur, Ravneet (2013) Energy Efficient Routing Protocols in Mobile Ad hoc Network based on AODV Protocol. Energy Efficient Routing Protocols in Mobile Ad hoc Network based on AODV Protocol.

Khatoon, Hasina and Altaf, Talat (2013) Exploiting the Role of Hardware Prefetchers in Multicore Processors. Exploiting the Role of Hardware Prefetchers in Multicore Processors. pp. 1-11.

Kumar, Anil and Sharma, Rohini (2013) A Secure Image Steganography Based on RSA Algorithm and Hash-LSB Technique. A Secure Image Steganography Based on RSA Algorithm and Hash-LSB Technique. pp. 1-10.

Kumar, Bhargav (2013) ON-CHIP ADDRESS AND TEST PATTERN GENERATION FOR IMAGE WATERMARKING SRAM. ON-CHIP ADDRESS AND TEST PATTERN GENERATION FOR IMAGE WATERMARKING SRAM. ISSN 2249-9954

L

L. Adam, - and A. Daidié, - and B. Castanié, - and E. Bonhomme, - (2012) Application of high-performance computing to a bolt static tensile test. Application of high-performance computing to a bolt static tensile test. pp. 195-203.

L. V. ROZOVSKY, L. V. ROZOVSKY (1998) ON A FELLER THEOREM. ON A FELLER THEOREM, 44 (1). pp. 124-130. ISSN 1095-7219

Lau, Henry, - and Chan, Leith, - and Wong, Rocky, - (2007) A virtual container terminal simulator for the design of terminal operation. A virtual container terminal simulator for the design of terminal operation. pp. 107-113.

Lebedev, A V, Lebedev, A V (1998) Limit theorems for maxima of independent random sums. Limit theorems for maxima of independent random sums. pp. 558-561. ISSN 1095-7219

Liang, Qixuan and Chen, Shizhan and Feng, Zhiyong (2013) Application of Services Relation Tracing to Automated Web Service Composition. Application of Services Relation Tracing to Automated Web Service Composition.

Liptser, R, Liptser, R and Runggaldier, W J, Runggaldier, W J and Taksar, M, Taksar, M Diffusion approximation and optimal stochastic control. Diffusion approximation and optimal stochastic control. ISSN 1095-7219

M

M. Habib, M. Habib and C. McDiarmid, C. McDiarmid and J. Ramirez-Alfonsin, J. Ramirez-Alfonsin and B. Reed, B. Reed (1998) Reviews and bibliography (Habib, Mcdiarmid, Reed_1998). Reviews and bibliography (Habib, Mcdiarmid, Reed_1998), 44 (3). pp. 613-621. ISSN 1095-7219

M. L. NECHAEV, M. L. NECHAEV (1999) ON THE MEAN-VARIANCE HEDGING IN THE HO–LEE DIFFUSION MODEL. ON THE MEAN-VARIANCE HEDGING IN THE HO–LEE DIFFUSION MODEL, 44 (1). pp. 124-130. ISSN 1095-7219

M. Taleb, Ahmad and Yahya , Anwar A. and M. Taleb, Nasser (2013) Parallel Genetic Algorithm Model to Extract Association Rules. Parallel Genetic Algorithm Model to Extract Association Rules . pp. 1-9.

M. V. Khatuntseva, M. V. Khatuntseva (1999) News of scientific life. News of scientific life, 44 (4). pp. 806-807. ISSN 1095-7219

Madalina Ioana Toma, - and Florin Gîrbacia, - and Csaba Antonya, - (2012) A comparative evaluation of human interaction for design and assembly of 3D CAD models in desktop and immersive. Springer-Verlag. pp. 179-193.

Martijn Tideman, - and Mascha C. van der Voort, - and Fred J. A. M. van Houten, - (2008) A new product design method based on virtual reality, gaming and scenarios. A new product design method based on virtual reality, gaming and scenarios. 195-2-5.

Matsak, I K, Matsak, I K (1998) ON THE LAW OF THE ITERATED LOGARITHM IN BANACH. ON THE LAW OF THE ITERATED LOGARITHM IN BANACH, 44 (4). pp. 775-784. ISSN 1095-7219

Mikulevicius, R., Mikulevicius, R. and Rozovskii, B., Rozovskii, B. (2000) Fourier Hermite Expansions for Nonlinear Filtering. Fourier Hermite Expansions for Nonlinear Filtering, 44 (3). pp. 606-612. ISSN 1095-7219

Minozzo, M, Minozzo, M (1998) Purely game-theoretic random sequences: i. strong law of large numbers and law of the iterated logarithm. Purely game-theoretic random sequences: i. strong law of large numbers and law of the iterated logarithm, 44 (3). pp. 511-522. ISSN 1095-7219

Miranda Baladi, - and Henry Vitali, - and Georges Fade, - and Joshua Summers, - and Andrew Duchowski, - (2008) A taxonomy for the design and evaluation of Networked Virtual Environments : its application to collaborative design. A taxonomy for the design and evaluation of Networked Virtual Environments : its application to collaborative design. pp. 17-32.

Mishra, Sasmita (2013) Integrated Segmentation And Recognition Of Handwritten Devnagari Characters. Digital Watermarking, Robust, Fragile, Semifragile Watermarking. pp. 1-6.

Mishra, Sasmita and Mahapatra, Amitav (2013) A Survey on Digital Watermarking Techniques. A Survey on Digital Watermarking Techniques. pp. 1-6.

N

N. V. SMORODINA, N. V. SMORODINA (1998) HOMOGENEOUS FUNCTIONAL OF A STRICTLY STABLE. HOMOGENEOUS FUNCTIONAL OF A STRICTLY STABLE, 44 (2). pp. 419-428. ISSN 1095-7219

N. V. TSILEVICH, N. V. TSILEVICH (1998) STATIONARY RANDOM PARTITIONS OF POSITIVE INTEGERS. STATIONARY RANDOM PARTITIONS OF POSITIVE INTEGERS, 44 (1). pp. 60-74. ISSN 1095-7219

Nadaf , Reshma and Desai , Veena (2013) Hardware Implementation of Modified AES with Key Dependent Dynamic S-Box. Hardware Implementation of Modified AES with Key Dependent Dynamic S-Box . pp. 1-5.

Noquet, C, Noquet, C (1998) DISTRIBUTIONS OF A SEQUENCE AND ITS TRANSLATE. DISTRIBUTIONS OF A SEQUENCE AND ITS TRANSLATE, 44 (3). pp. 561-570. ISSN 1095-7219

Novak, S Y, Novak, S Y (1996) Generalized kernel density estimator. Generalized kernel density estimator. pp. 570-585. ISSN 1095-7219

O

O. E. BARNDORFF-NIELSEN, O. E. BARNDORFF-NIELSEN L-NONFORMATION, L-ANCILLARITY, AND L-SUFFICIENCY. L-NONFORMATION, L-ANCILLARITY, AND L-SUFFICIENCY. ISSN 1095-7219

O. V. GULINSKY, O. V. GULINSKY and R. SH. LIPTSER, R. SH. LIPTSER AN EXAMPLE OF LARGE DEVIATIONS FOR A STATIONARY PROCESS. AN EXAMPLE OF LARGE DEVIATIONS FOR A STATIONARY PROCESS, 44 (1). pp. 201-218. ISSN 1095-7219

O.E. , Oguike (2013) Recursive Shortest Route Algorithm Using Abstract Data Type, Graph. Recursive Shortest Route Algorithm Using Abstract Data Type, Graph, 6 (2). pp. 1-12. ISSN 2006-1781

P

P. DEL MORAL, P. DEL MORAL and M. DOISY, M. DOISY (1998) MASLOV IDEMPOTENT PROBABILITY CALCULUS. II. MASLOV IDEMPOTENT PROBABILITY CALCULUS. II, 44 (2). pp. 319-332. ISSN Society For Industrial And Applied Mathematics1095-7219

P. GRANDITS, P. GRANDITS (1998) ON MARTINGALE MEASURES FOR STOCHASTIC PROCESSES WITH INDEPENDENT INCREMENTS. ON MARTINGALE MEASURES FOR STOCHASTIC PROCESSES WITH INDEPENDENT INCREMENTS, 44 (1). pp. 124-130. ISSN 1095-7219

Pasquale Franciosa, - and Stanislao Patalano, - and Alain Riviere, - (2009) 3D tolerance specification : an approach for the analysis of the global consistency based on graphs. Springer-Verlag. pp. 1-10.

Pellegrinotti, A, Pellegrinotti, A and Sidoravicius, V, Sidoravicius, V and Vares, M E, Vares, M E (1998) Stationary state and diffusion for a charged particle in a one-dimensional medium with lifetimes. Stationary state and diffusion for a charged particle in a one-dimensional medium with lifetimes, 44 (4). pp. 697-721. ISSN 1095-7219

R

R. DOUADY, R. DOUADY and A. N. SHIRYAEV, A. N. SHIRYAEV and M. YOR, M. YOR (1998) ON PROBABILITY CHARACTERISTICS OF “DOWNFALLS” IN A STANDARD BROWNIAN MOTION. ON PROBABILITY CHARACTERISTICS OF “DOWNFALLS” IN A STANDARD BROWNIAN MOTION, 44 (1). pp. 1-17. ISSN 1095-7219

Raffaeli, Roberto, - and Germani, Michele, - (2011) Advanced computer aided technologies for design automation in footwear industry. International Journal on Interactive Design and Manufacturing (IJIDeM), 5 (3). pp. 137-149.

Rinott, Y, Rinott, Y and Rotar, V, Rotar, V SOME BOUNDS ON THE RATE OF CONVERGENCE IN THE CLT. SOME BOUNDS ON THE RATE OF CONVERGENCE IN THE CLT, 44 (3). pp. 523-536. ISSN 1095-7219

Roberto Raffaeli, - and Michele Germani, - (2011) Advanced computer aided technologies for design automation in footwear industry. Advanced computer aided technologies for design automation in footwear industry. pp. 137-149.

Rooij, A C M V A N, Rooij, A C M V A N and Ruymgaart, F H, Ruymgaart, F H and Zwet, W R V A N, Zwet, W R V A N (1998) Asymptotic efficiency of inverse estimators. Asymptotic efficiency of inverse estimators, 44 (4). pp. 722-738. ISSN 1095-7219

Rozovsky, L V, Rozovsky, L V (1998) ON THE J. DOOB INEQUALITY FOR CHARACTERISTIC FUNCTIONS. ON THE J. DOOB INEQUALITY FOR CHARACTERISTIC FUNCTIONS. pp. 588-591. ISSN 1095-7219

Rozovsky, L V, Rozovsky, L V (1998) An extremal property of the uniform distribution and some of its consequences. An extremal property of the uniform distribution and some of its consequences, 44 (3). pp. 583-588. ISSN 1095-7219

S

S. Scherer, - and M.Wabner, - (2008) Advanced visualization for finite elements analysis in virtual reality environments. Advanced visualization for finite elements analysis in virtual reality environments. pp. 169-172.

S. V. ZHULENEV, S. V. ZHULENEV (1997) ON LARGE DEVIATIONS, I. ON LARGE DEVIATIONS, I, 44 (1). pp. 75-92.

S. YA. MAKHNO, S. YA. MAKHNO (1997) CONVERGENCE OF SOLUTIONS OF ONE-DIMENSIONAL STOCHASTIC EQUATIONS. CONVERGENCE OF SOLUTIONS OF ONE-DIMENSIONAL STOCHASTIC EQUATIONS, 44 (3). pp. 495-510. ISSN 1095-7219

S. YU. NOVAK, S. YU. NOVAK (1997) ON THE MODE OF AN UNKNOWN PROBABILITY DISTRIBUTION. ON THE MODE OF AN UNKNOWN PROBABILITY DISTRIBUTION, 44 (1). pp. 109-113. ISSN 1095-7219

Sahu, Megha and Shukla, Neeraj (2013) Rotation Invariant Approach of SURF for Unimodal Biometric System. Rotation Invariant Approach of SURF for Unimodal Biometric System, 3.

Shahana, Shahana T (2013) An Enhanced Security Technique for Steganography Using DCT and RSA. An Enhanced Security Technique for Steganography Using DCT and RSA.

Shaikh, Atique (2013) AGV routing using Dijkstra’s Algorithm. AGV routing using Dijkstra’s Algorithm. ISSN 2229-5518

Shojanazeri, Hamid and Azizun, Wan and Syed Ahmad, Sharifah Mumtadzah (2013) Video Watermarking Techniques for Copyright protection and Content Authentication. Video Watermarking Techniques for Copyright protection and Content Authentication, 5. pp. 652-660. ISSN 2150-7988

Singh, Jatinder Pal and Gupta, Anuj Kr. (2013) Protocol Stack based Security Vulnerabilities in MANETs. Protocol Stack based Security Vulnerabilities in MANETs, 69 (21). p. 17. ISSN 0975 – 8887

Singh, Kuldeep and Sohi, B.S. Sohi and Agrawal, S. (2013) A Near Real-time IP Traffic Classification Using Machine Learning. A Near Real-time IP Traffic Classification Using Machine Learning.

Singh , Gurvinder and Kaur, Talvinder (2013) A Duplication Based List Scheduling Genetic Algorithm for Scheduling Task on Parallel Processors. A Duplication Based List Scheduling Genetic Algorithm for Scheduling Task on Parallel Processors. pp. 1-10.

Singh , Jagtar and Dhiman, Natasha (2013) A Review Paper on Introduction to Mobile Ad Hoc Networks. A Review Paper on Introduction to Mobile Ad Hoc Networks .

Soloviov, V N, Soloviov, V N (1997) Towards the theory of minimax-bayesian estimation. Towards the theory of minimax-bayesian estimation, 44 (4). pp. 739-754. ISSN 1095-7219

T

T. SHERVASHIDZE, T. SHERVASHIDZE (1997) LOCAL LIMIT THEOREMS FOR CONDITIONALLY INDEPENDENT RANDOM VARIABLES CONTROLLED BY A FINITE MARKOV CHAIN. LOCAL LIMIT THEOREMS FOR CONDITIONALLY INDEPENDENT RANDOM VARIABLES CONTROLLED BY A FINITE MARKOV CHAIN, 44 (1). pp. 131-136. ISSN 1095-7219

Tanwar, Sarvesh (2013) Threats & Security Issues in Ad hoc network: A Survey Report. Threats & Security Issues in Ad hoc network: A Survey Report, 2 (6).

Thakare, Mr. Nitikesh S. Thakare and Wadhe, Mr.Avinash P. (2013) A literature Review on Desktop Phishing Based on Visual Appearance Analysis. A literature Review on Desktop Phishing, 2 (2). pp. 1-4.

Thankachan, Tulips Angel and Raimond, Kumudha (0203) A Survey on Classification and Rule Extraction Techniques for Datamining. A Survey on Classification and Rule Extraction Techniques for Datamining, 8. pp. 75-78. ISSN 2278-0661

Thomas, Lintu Liz and Gopakumar, Dr. C. Gopakumar and Thomas, Antu Annam (2013) Face Recognition based on Gabor Wavelet and Backpropagation Neural Network. Face Recognition based on Gabor Wavelet and Backpropagation Neural Network, 4. pp. 1-6. ISSN 2229-5518

V

V. F. GAPOSHKIN, V. F. GAPOSHKIN (1998) ON THE INTEGRABILITY OF A MAXIMAL SQUARE FUNCTION IN ERGODIC THEORY. ON THE INTEGRABILITY OF A MAXIMAL SQUARE FUNCTION IN ERGODIC THEORY, 44 (2). pp. 375-385. ISSN 1095-7219

V. I. BAKHTIN, V. I. BAKHTIN (1997) CRAM´ER ASYMPTOTICS IN A SYSTEM WITH SLOW AND FAST MARKOVIAN MOTIONS. CRAM´ER ASYMPTOTICS IN A SYSTEM WITH SLOW AND FAST MARKOVIAN MOTIONS, 44 (1). pp. 1-17. ISSN 1095-7219

V. I. SERDOBOLSKII, V. I. SERDOBOLSKII (1997) ASYMPTOTICALLY DOMINATING ESTIMATION OF EXPECTATION VALUE VECTORS. ASYMPTOTICALLY DOMINATING ESTIMATION OF EXPECTATION VALUE VECTORS, 44 (1). pp. 124-130. ISSN 1095-7219

V. P. MASLOV, V. P. MASLOV and A. M. CHEBOTAREV, A. M. CHEBOTAREV (1999) AN EQUATION OF THE KOLMOGOROV–FELLER TYPE IN A FACTORIZED PROBABILITY SPACE. AN EQUATION OF THE KOLMOGOROV–FELLER TYPE IN A FACTORIZED PROBABILITY SPACE, 44 (2). pp. 375-385. ISSN 1095-7219

V. YU. KOROLEV, V. YU. KOROLEV ASYMPTOTIC PROPERTIES OF SAMPLE QUANTILES CONSTRUCTED FROM SAMPLES WITH RANDOM SIZES. ASYMPTOTIC PROPERTIES OF SAMPLE QUANTILES CONSTRUCTED FROM SAMPLES WITH RANDOM SIZES.

V. YU. KOROLEV, V. YU. KOROLEV (1998) CONSTRUCTED FROM SAMPLES WITH RANDOM SIZES. CONSTRUCTED FROM SAMPLES WITH RANDOM SIZES, 44 (1). pp. 394-400. ISSN 1095-7219

V. ˇCEKANAVIˇCIUS, V. ˇCEKANAVIˇCIUS (1997) ON COMPOUND POISSON APPROXIMATIONS UNDER MOMENT RESTRICTIONS. ON COMPOUND POISSON APPROXIMATIONS UNDER MOMENT RESTRICTIONS, 44 (1). pp. 124-130. ISSN 1095-7219

VIDYAPITH, BANASTHALI (2013) IMAGE STEGANOGRAPHY TECHNIQUES A REVIEW ARTICLE. IMAGE STEGANOGRAPHY TECHNIQUES A REVIEW ARTICLE. pp. 1-8.

Vatutin, Vatutin and Translated V A, Translated V A (1999) News of scientific life. News of scientific life, 44 (3). pp. 622-631. ISSN 1095-7219

W

W. SCHACHERMAYER, W. SCHACHERMAYER and W. SCHACHINGER, W. SCHACHINGER (1998) IS THERE A PREDICTABLE CRITERION FOR MUTUAL SINGULARITY OF TWO PROBABILITY MEASURES ON A FILTERED SPACE? IS THERE A PREDICTABLE CRITERION FOR MUTUAL SINGULARITY OF TWO PROBABILITY MEASURES ON A FILTERED SPACE?, 44 (1). pp. 124-130. ISSN 1095-7219

Y

YU. A. ROZANOV, YU. A. ROZANOV and F. SANS`O, F. SANS`O (1997) ON STOCHASTIC BOUNDARY PROBLEMS FOR HARMONIC FUNCTIONS IN BANACH SPACES. ON STOCHASTIC BOUNDARY PROBLEMS FOR HARMONIC FUNCTIONS IN BANACH SPACES, 44 (1). pp. 124-130. ISSN 1095-7219

Z

ZHENGYAN LIN, ZHENGYAN LIN (1997) THE INVARIANCE PRINCIPLE FOR SOME CLASS OF MARKOV CHAINS. THE INVARIANCE PRINCIPLE FOR SOME CLASS OF MARKOV CHAINS, 44 (1). pp. 1-17. ISSN 1095-7219

Zamani , Abu Sarwar and Miandad, Mohammad Jawed (2013) Data Center Based, Service Oriented Architecture. Data Center Based, Service Oriented Architecture . pp. 1-5. ISSN 2278-9669

Zubkov, A M, Zubkov, A M (1999) ISOMORPHISMS BETWEEN SETS OF PROBABILITY DISTRIBUTIONS. ISOMORPHISMS BETWEEN SETS OF PROBABILITY DISTRIBUTIONS, 44 (4). pp. 794-797. ISSN 1095-7219

Zubkov, A M, Zubkov, A M (1999) ON THE ACCURACY OF NORMAL APPROXIMATION FOR THE DENSITIES OF SUMS OF INDEPENDENT IDENTICALLY DISTRIBUTED RANDOM VARIABLES. ON THE ACCURACY OF NORMAL APPROXIMATION FOR THE DENSITIES OF SUMS OF INDEPENDENT IDENTICALLY DISTRIBUTED RANDOM VARIABLES, 44 (4). pp. 794-797. ISSN 1095-7219

This list was generated on Tue Jun 15 22:20:01 2021 WIT.