


default search action
Computers & Mathematics with Applications, Volume 63
Volume 63, Number 1, January 2012
- Mashaallah Matinfar

, Hossein Zareamoghaddam, Mostafa Eslami
, Mohammad Saeidy:
GMRES implementations and residual smoothing techniques for solving ill-posed linear systems. 1-13 - Jia Tang, Changfeng Ma:

An application of H differentiability to generalized complementarity problems over symmetric cones. 14-24 - Pratibha Joshi

, Manoj Kumar:
Mathematical model and computer simulation of three dimensional thin film elliptic interface problems. 25-35 - Yasin Yazlik, Necati Taskara:

A note on generalized k-Horadam sequence. 36-41 - Jugal Kishore Prajapat

, M. K. Aouf:
Majorization problem for certain class of p-valently analytic function defined by generalized fractional differintegral operator. 42-47 - Onur Yilmaz, Sercan Demirci, Yagiz Kaymak, Serkan Ergun, Ahmet Yildirim

:
Shortest hop multipath algorithm for wireless sensor networks. 48-59 - E. Di Costanzo, Addolorata Marasco

:
Approximate analytic solution of the Dirichlet problems for Laplace's equation in planar domains by a perturbation method. 60-67 - Syafaruddin

, Engin Karatepe
, Takashi Hiyama
:
Fuzzy wavelet network identification of optimum operating point of non-crystalline silicon solar cells. 68-82 - Yanhong She, Xiaoli He:

Uncertainty measures for rough formulae in rough logic: An axiomatic approach. 83-93 - Mahmood-ul-Hassan, Abdul Majeed Siddiqui:

A modified approach to exact solutions of a general form of a non-Newtonian second grade fluid. 94-99 - M. Roodaki, Homa Almasieh:

Delta basis functions and their applications to systems of integral equations. 100-109 - Ching-Jong Liao, Chien-Wen Chao, Liang-Chuan Chen:

An improved heuristic for parallel machine weighted flowtime scheduling with family set-up times. 110-117 - Pratima Rai, Kapil K. Sharma

:
Numerical study of singularly perturbed differential-difference equation arising in the modeling of neuronal variability. 118-132 - Khosrow Maleknejad

, Morteza Khodabin, M. Rostami:
A numerical method for solving m-dimensional stochastic Itô-Volterra integral equations by stochastic operational matrix. 133-143 - Wen Liang Chang, Jyh-Horng Lin:

Optimal maintenance policy and length of extended warranty within the life cycle of products. 144-150 - Lifeng Guo, Lei Hu:

Efficient bidirectional proxy re-encryption with direct chosen-ciphertext security. 151-157 - A. Borumand Saeid

, Akbar Rezaei
:
Intuitionistic (T, S)-fuzzy CI-algebras. 158-166 - Yong Zhang, Weiguo Zhang, Weijun Xu, Xingyu Yang:

Risk-reward models for on-line leasing of depreciable equipment. 167-174 - Shalom Eliahou

, Juan Manuel Marín
, M. P. Revuelta
, María Isabel Sanz Domínguez
:
Weak Schur numbers and the search for G.W. Walker's lost partitions. 175-182 - Suwat Kuntanapreeda

:
Robust synchronization of fractional-order unified chaotic systems via linear control. 183-190 - Amir Hossein Gandomi

, Xin-She Yang
, Siamak Talatahari
, Suash Deb:
Coupled eagle strategy and differential evolution for unconstrained and constrained global optimization. 191-200 - Sima Varnosafaderani, Stefanka S. Chukova

:
A two-dimensional warranty servicing strategy based on reduction in product failure intensity. 201-213 - Shahram Jamali, Gholam Shaker:

PSO-SFDD: Defense against SYN flooding DoS attacks by employing PSO algorithm. 214-221 - Erfang Shan, Yanxia Dong:

The k-tuple twin domination in generalized de Bruijn and Kautz networks. 222-227 - Z. H. Che

:
Clustering and selecting suppliers based on simulated annealing algorithms. 228-238 - J. M. McNamee, Victor Y. Pan:

Efficient polynomial root-refiners: A survey and new record efficiency estimates. 239-254 - K. Das:

Slip effects on MHD mixed convection stagnation point flow of a micropolar fluid towards a shrinking vertical sheet. 255-267 - Navid Razmjooy

, Bibi Somayeh Mousavi, Fazlollah Soleymani
:
A real-time mathematical computer method for potato inspection using machine vision. 268-279 - Sanjay Sharma:

A novel weighted multilevel space-time trellis coding scheme. 280-287 - Wengui Yang

:
Positive solutions for a coupled system of nonlinear fractional differential equations with integral boundary conditions. 288-297 - Hassen Aydi

, Mihai Postolache
, Wasfi A. Shatanawi
:
Coupled fixed point results for (ψ, φ)-weakly contractive mappings in ordered G-metric spaces. 298-309 - Pedro Almenar

, Lucas Jódar
:
An upper bound for the distance between a zero and a critical point of a solution of a second order linear differential equation. 310-317 - Boban Marinkovic

:
Optimality conditions in a vector continuous-time optimization problem. 318-324 - Wu Deng

, Rong Chen, Jian Gao
, Yingjie Song, Junjie Xu:
A novel parallel hybrid intelligence optimization algorithm for a function approximation problem. 325-336
Volume 63, Number 2, January 2012
- Marek R. Ogiela

, Ilsun You, Fatos Xhafa
, Hoon Ko
:
Towards context, cognitive, and secure computing. 337-338
- Elis Kulla, Masahiro Hiyama, Makoto Ikeda, Leonard Barolli:

Performance comparison of OLSR and BATMAN routing protocols by a MANET testbed in stairs environment. 339-349 - Joanna Kolodziej

, Fatos Xhafa
:
Integration of task abortion and security requirements in GA-based meta-heuristics for independent batch grid scheduling. 350-364 - Yulai Yuan, Yongwei Wu, Qiuping Wang, Guangwen Yang, Weimin Zheng:

Job failures in high performance computing systems: A large-scale empirical study. 365-377 - Lidia Ogiela:

Semantic analysis in cognitive UBIAS & E-UBIAS systems. 378-390 - Jenq-Muh Hsu, Chao-Chun Chen, Chia Chi Li:

POOT: An efficient object tracking strategy based on short-term optimistic predictions for face-structured sensor networks. 391-406 - Yuh-Shyan Chen

, Chih-Shun Hsu, Wei-Han Yi:
An IP passing protocol for vehicular ad hoc networks with network fragmentation. 407-426 - Quan Shi, Yanghua Xiao, Nik Bessis

, Yiqi Lu, Yaoliang Chen, Richard Hill
:
Optimizing K2 trees: A case for validating the maturity of network of practices. 427-436 - Aniello Castiglione

, Alfredo De Santis
, Ugo Fiore
, Francesco Palmieri
:
An asynchronous covert channel using spam. 437-447 - Jiaqing Lin, Hiroaki Nishino, Tsuneo Kagawa, Kouichi Utsumiya:

A method of two-handed gesture interactions with applications based on commodity devices. 448-457 - Feilong Tang, Ilsun You, Shui Yu

, Cho-Li Wang, Minyi Guo, Wenlong Liu:
An efficient deadlock prevention approach for service oriented transaction processing. 458-468 - Ruoyu Zhang, Shiqiu Huang, Zhengwei Qi, Haibing Guan:

Static program analysis assisted dynamic taint tracking for software vulnerability discovery. 469-480 - Neeraj Kumar

, Naveen K. Chilamkurti, Jong-Hyouk Lee:
A novel minimum delay maximum flow multicast algorithm to construct a multicast tree in wireless mesh networks. 481-491 - Zhuzhong Qian, Ce Chen, Ilsun You, Sanglu Lu:

ACSP: A novel security protocol against counting attack for UHF RFID systems. 492-500 - Sang Min Lee, Dong Seong Kim

, Je Hak Lee, Jong Sou Park:
Detection of DDoS attacks using optimized traffic matrix. 501-510 - Yong-Hwan Lee, Bonam Kim, Heung-Jun Kim:

Efficient object identification and localization for image retrieval using query-by-region. 511-517 - Gabriele Costa

, Ilaria Matteucci
:
Gate automata-driven run-time enforcement. 518-524 - Kyungroul Lee, Kangbin Yim, Mohammad A. Mikki:

A secure framework of the surveillance video network integrating heterogeneous video formats and protocols. 525-535 - Bo Wang, Yongwei Wu, Weimin Zheng:

Task optimization based on CPU pipeline technique in a multicore system. 536-543 - Luis Gómez-Miralles

, Joan Arnedo-Moreno:
Versatile iPad forensic acquisition using the Apple Camera Connection Kit. 544-553 - Hoon Ko, Kyung-jin An, Tai-Hoon Kim, Goreti Marreiros

, Zita A. Vale
, Jong-Myoung Choi:
A study on dynamic state information (DSI) around users for safe urban life. 554-563 - Marek R. Ogiela

, Urszula Ogiela:
Linguistic protocols for secure information management and sharing. 564-572 - Shih-Hao Hung

, Chi-Sheng Shih
, Jeng-Peng Shieh, Chen-Pang Lee, Yi-Hsiang Huang:
Executing mobile applications on the cloud: Framework and issues. 573-587 - Baokang Zhao, Wei Peng

, Ziming Song, Jinshu Su
, Chunqing Wu, Wanrong Yu, Qiaolin Hu:
Towards efficient and practical network coding in delay tolerant networks. 588-600
Volume 63, Number 3, February 2012
- Jianzhong Liu, Xuande Zhang, Bo Jiang:

Some generalizations and improvements of discrete Hardy's inequality. 601-607 - Jafar Biazar

, H. Ebrahimi:
Chebyshev wavelets approach for nonlinear systems of Volterra integral equations. 608-616 - Mehmet Ali Öztürk

, Ebubekir Inan
:
Fuzzy soft subnear-rings and (∈, ∈∨q)-fuzzy soft subnear-rings. 617-628 - Rezvan Salehi

, Mehdi Dehghan
:
The use of a Legendre pseudospectral viscosity technique to solve a class of nonlinear dynamic Hamilton-Jacobi equations. 629-644 - Ahmet Ipek:

Upper bounds for the condition numbers of the GCD and the reciprocal GCD matrices in spectral norm. 645-651 - Qinghua Feng, Fanwei Meng:

Some generalized Ostrowski-Grüss type integral inequalities. 652-659 - Rathinasamy Sakthivel

, S. Suganya, Selvaraj Marshal Anthoni
:
Approximate controllability of fractional stochastic evolution equations. 660-668 - Erbil Çetin

, F. Serap Topal:
Symmetric positive solutions of fourth order boundary value problems for an increasing homeomorphism and homomorphism on time-scales. 669-678 - Muhuo Liu, Bolian Liu:

New method and new results on the order of spectral radius. 679-686 - Lin-Tian Luh

:
The shape parameter in the Gaussian function. 687-694 - Rehan Ali Shah, Saeed Islam

, Abdul Majeed Siddiqui, Tahira Haroon:
Wire coating analysis with Oldroyd 8-constant fluid by Optimal Homotopy Asymptotic Method. 695-707 - Pradip Debnath

:
Lacunary ideal convergence in intuitionistic fuzzy normed linear spaces. 708-715 - Thabet Abdeljawad

, Erdal Karapinar, Kenan Tas
:
A generalized contraction principle with control functions on partial metric spaces. 716-719 - Yi Ling, Gejun Bao:

Some local Poincaré inequalities for the composition of the sharp maximal operator and the Green's operator. 720-727 - Zhouchao Wei

:
Delayed feedback on the 3-D chaotic system only with two stable node-foci. 728-738 - Ismail Yaslan

:
Higher order m-point boundary value problems on time scales. 739-750
Volume 63, Number 4, February 2012
- Peng Chen, X. H. Tang, Ravi P. Agarwal:

Infinitely many homoclinic solutions for nonautonomous p(t)-Laplacian Hamiltonian systems. 751-763 - Mahdi Sharifi, D. K. R. Babajee, Fazlollah Soleymani

:
Finding the solution of nonlinear equations by a class of optimal methods. 764-774 - Said R. Grace, John R. Graef, Mohamed A. El-Beltagy

:
On the oscillation of third order neutral delay dynamic equations on time scales. 775-782 - Xueling Ma, Yunqiang Yin, Jianming Zhan

:
Characterizations of h-intra- and h-quasi-hemiregular hemirings. 783-793 - Kui Du:

A new preconditioner for the interface system arising in a fast Helmholtz solver. 794-806 - Ren-you Zhong, Nan-jing Huang:

On the stability of solution mapping for parametric generalized vector quasiequilibrium problems. 807-815 - Dinh Nho Hào

, Huu Chuong La, Daniel Lesnic:
Heuristic regularization methods for numerical differentiation. 816-826 - Jinguang Han

, Willy Susilo
, Yi Mu, Jun Yan
:
Efficient oblivious transfers with access control. 827-837 - Jianke Zhang, Sanyang Liu, Lifeng Li

, Quanxi Feng:
Sufficiency and duality for multiobjective variational control problems with G-invexity. 838-850 - Raffaele D'Ambrosio

, Giuseppe Izzo
, Zdzislaw Jackiewicz
:
Perturbed MEBDF methods. 851-861 - Yasir Khan

, Parul Tiwari
, R. Ali:
Application of variational methods to a rectangular clamped plate problem. 862-869
Volume 63, Number 5, March 2012
- Meng Liu

, Ke Wang:
On a stochastic logistic equation with impulsive perturbations. 871-886 - Choon Ki Ahn

:
Exponential H∞ stable learning method for Takagi-Sugeno fuzzy delayed neural networks: A convex optimization approach. 887-895 - Yao-Lin Jiang, Xiao-Li Ding:

Nonnegative solutions of fractional functional differential equations. 896-904 - Roman Witula, Damian Slota

, Edyta Hetmaniok
:
Some properties of inverses of the full matrices. 905-911 - Giorgio Chiandussi

, Marco Codegone
, S. Ferrero, F. E. Varesio:
Comparison of multi-objective optimization methodologies for engineering applications. 912-942 - Thoudam Roshan:

A Petrov-Galerkin method for solving the generalized regularized long wave (GRLW) equation. 943-956 - Jianping Zhao

, Yanren Hou
, Yongfei Li:
Immersed Interface Method for elliptic equations based on a piecewise second order polynomial. 957-965 - (Withdrawn) Approximation of solutions of generalized equations of Hammerstein type. 966-974

- Guoyu Yao, Ruifeng Ding:

Two-stage least squares based iterative identification algorithm for controlled autoregressive moving average (CARMA) systems. 975-984 - Cheng Wang, Yi Shen:

Robust H∞ control for stochastic systems with nonlinearity, uncertainty and time-varying delay. 985-998 - Ümit Totur

, Ibrahim Çanak
:
Some general Tauberian conditions for the weighted mean summability method. 999-1006
Volume 63, Number 6, March 2012
- Javad Taheri-Tolgari, Abolfazl Mirzazadeh

, Fariborz Jolai
:
An inventory model for imperfect items under inflationary conditions with considering inspection errors. 1007-1019 - Richard F. Patterson, Ekrem Savas:

RH-conservative matrix characterization of P-convergence in probability. 1020-1025 - Eduardo Silva Palmeira, Benjamín R. C. Bedregal:

Extension of fuzzy logic operators defined on bounded lattices via retractions. 1026-1038 - Murray R. Bremner, Raúl Felipe, Juana Sánchez-Ortega:

Jordan triple disystems. 1039-1055 - Emad H. Aly

, Abdelhalim Ebaid
, Randolph C. Rach:
Advances in the Adomian decomposition method for solving two-point nonlinear boundary value problems with Neumann boundary conditions. 1056-1065 - Zhaowen Li, Tusheng Xie, Qingguo Li

:
Topological structure of generalized rough sets. 1066-1071 - Juan Luis Mata-Machuca, Rafael Martínez-Guerra

:
Asymptotic synchronization of the Colpitts oscillator. 1072-1078 - Jin Han Park, Oe Hyeon Kim, Young Chel Kwun:

Some properties of equivalence soft set relations. 1079-1088 - Yekini Shehu

:
Hybrid iterative scheme for fixed point problem, infinite systems of equilibrium and variational inequality problems. 1089-1103 - Mehdi Toloo

:
Alternative solutions for classifying inputs and outputs in data envelopment analysis. 1104-1110 - Xiaoming Zhang, Weidong Jiang:

Some properties of log-convex function and applications for the exponential function. 1111-1116 - Jakkrit TeCho, Cholwich Nattee, Thanaruk Theeramunkong:

Boosting-based ensemble learning with penalty profiles for automatic Thai unknown word recognition. 1117-1134
Volume 63, Number 7, April 2012
- Heng-fei Ding

, Yu-xin Zhang:
New numerical methods for the Riesz space fractional partial differential equations. 1135-1146 - Erhan Set:

New inequalities of Ostrowski type for mappings whose derivatives are s-convex in the second sense via fractional integrals. 1147-1154 - Chaogai Xue, Lili Dong, Junjuan Liu:

Enterprise information system structure optimization based on time property with improved immune genetic algorithm and binary tree. 1155-1168 - Bahattin Yildiz

, Irfan Siap
:
Cyclic codes over F2[u]/(u4-1) and applications to DNA codes. 1169-1176 - Yu-Ming Chu, Miao-Kun Wang, Song-Liang Qiu, Yue-Ping Jiang:

Bounds for complete elliptic integrals of the second kind with applications. 1177-1184 - Gyurhan H. Nedzhibov:

A derivative-free iterative method for simultaneously computing an arbitrary number of zeros of nonlinear equations. 1185-1191 - Lizheng Lu:

On polynomial approximation of circular arcs and helices. 1192-1196 - Sandile Sydney Motsa, Precious Sibanda

:
A linearisation method for non-linear singular boundary value problems. 1197-1203 - Víctor Blanco

, José Carlos Rosales
:
On the enumeration of the set of numerical semigroups with fixed Frobenius number. 1204-1211 - Marion Darbas, Olivier Goubet, Stephanie Lohrengel:

Exact boundary controllability of the second-order Maxwell system: Theory and numerical simulation. 1212-1237 - Ji-Teng Jia, Qiong-xiang Kong, Tomohiro Sogabe

:
A new algorithm for solving nearly penta-diagonal Toeplitz linear systems. 1238-1243 - Bikash Sahoo, Fotini Labropulu:

Steady Homann flow and heat transfer of an electrically conducting second grade fluid. 1244-1255 - Leonid Berezansky, Elena Braverman:

On the existence of positive solutions for systems of differential equations with a distributed delay. 1256-1265 - Mengzhuo Luo, Shouming Zhong:

Passivity analysis and passification of uncertain Markovian jump systems with partially known transition rates and mode-dependent interval time-varying delays. 1266-1278
Volume 63, Number 8, April 2012
- Zheyong Qiu:

Existence and uniqueness of common fixed points for two multivalued operators in ordered metric spaces. 1279-1286 - S. G. Venkatesh

, S. K. Ayyaswamy, S. Raja Balachandar
:
The Legendre wavelet method for solving initial value problems of Bratu-type. 1287-1295 - Kondooru Raghavendar, Anbhu Swaminathan

:
Integral transforms of functions to be in certain class defined by the combination of starlike and convex functions. 1296-1304 - Guangwu Yan, Tingting Li, Xianli Yin:

Lattice Boltzmann model for elastic thin plate with small deflection. 1305-1318 - Maher Berzig

, Bessem Samet
:
An extension of coupled fixed point's concept in higher dimension and applications. 1319-1334 - Ji-jun Ao

, Jiong Sun, Mao-zhu Zhang:
Matrix representations of Sturm-Liouville problems with transmission conditions. 1335-1348 - Yanbin Sang:

Multiple solutions for nonlinear operator equations under the condition of two pairs of paralleled lower and upper solutions. 1349-1353
- J. M. McNamee:

Corrigendum to "Efficient polynomial root-refiners: A survey and new record efficiency estimates", by J.M. McNamee and V.Y. Pan [Comput. Math. Appl. 63 (2012) 239-254]. 1354
Volume 63, Number 9, May 2012
- Shunyong Li, Xiaoqin Zhang:

Existence and uniqueness of monotone positive solutions for an elastic beam equation with nonlinear boundary conditions. 1355-1360 - V. Ghorbanian, Shahram Rezapour

, Naseer Shahzad
:
Some ordered fixed point results and the property (P). 1361-1368 - Zhanbing Bai

, Weichen Sun:
Existence and multiplicity of positive solutions for singular fractional boundary value problems. 1369-1381 - Mehmet Giyas Sakar

, Fevzi Erdogan, Ahmet Yildirim:
Variational iteration method for the time-fractional Fornberg-Whitham equation. 1382-1388 - Ya Gu, Ruifeng Ding:

Observable state space realizations for multivariable systems. 1389-1399 - Yasunori Kimura, Kazuhide Nakajo:

Viscosity approximations by the shrinking projection method in Hilbert spaces. 1400-1408 - Alexandra Olteanu, Florin Pop, Ciprian Dobre

, Valentin Cristea:
A dynamic rescheduling algorithm for resource management in large scale dependable distributed systems. 1409-1423
- Retraction notice to: "Computer application in mathematics" [Comput. Math. Appl. 59(1) (2009) 296-297]. 1424

Volume 63, Number 10, May 2012
- Kazuo Kuroki, Toshio Hayami, Neslihan Uyanik, Shigeyoshi Owa:

Some properties for a certain class concerned with univalent functions. 1425-1432 - Alexander L. Balandin

, Yasushi Ono, Setthivoine You:
3D vector tomography using vector spherical harmonics decomposition. 1433-1441 - Suayip Yüzbasi:

On the solutions of a system of linear retarded and advanced differential equations by the Bessel collocation approximation. 1442-1455 - Khalida Inayat Noor, Wasim Ul-Haq:

On some implication type results involving generalized bounded Mocanu variations. 1456-1461 - Aiying Rong

, José Rui Figueira
:
Computational performance of basic state reduction based dynamic programming algorithms for bi-objective 0-1 knapsack problems. 1462-1480 - Kai Li, Chengwen Zhong

, Congshan Zhuo
, Jun Cao:
Non-body-fitted Cartesian-mesh simulation of highly turbulent flows using multi-relaxation-time lattice Boltzmann method. 1481-1496
Volume 63, Number 11, June 2012
- Ioan-Lucian Popa

, Traian Ceausu, Mihail Megan
:
On exponential stability for linear discrete-time systems in Banach spaces. 1497-1503 - Norbert Heuer

, Thanh Tran:
Radial basis functions for the solution of hypersingular operators on open surfaces. 1504-1518 - Patrick O. Kano, Moysey Brio, Paul Dostert, Jon Cain:

Dempster-Shafer evidential theory for the automated selection of parameters for Talbot's method contours and application to matrix exponentiation. 1519-1535 - Jafar Saberi-Nadjafi, M. Mehrabinezhad, H. Akbari:

Solving Volterra integral equations of the second kind by wavelet-Galerkin scheme. 1536-1547 - Abdullah Shah

, Li Yuan, Shamsul Islam:
Numerical solution of unsteady Navier-Stokes equations on curvilinear meshes. 1548-1556 - Jun-Sheng Duan

, Randolph C. Rach:
Higher-order numeric Wazwaz-El-Sayed modified Adomian decomposition algorithms. 1557-1568
Volume 63, Number 12, June 2012
- Xiangsong Zhang, Zhenhua Liu, Sanyang Liu:

A trust region SQP-filter method for nonlinear second-order cone programming. 1569-1576 - Zhi Liu, Yuangong Sun:

Interval criteria for oscillation of a forced impulsive differential equation with Riemann-Stieltjes integral. 1577-1586 - Mario Krnic:

A refined discrete Hilbert inequality obtained via the Hermite-Hadamard inequality. 1587-1596 - Yunqing Huang

, Jichun Li
, Wei Yang:
Solving metamaterial Maxwell's equations via a vector wave integro-differential equation. 1597-1606 - Hanyu Li

, Hu Yang
, Hua Shao:
Perturbation analysis for the hyperbolic QR factorization. 1607-1620 - Chaobang Gao, Jiajin Wen

:
Theory of surround system and associated inequalities. 1621-1640

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.


Google
Google Scholar
Semantic Scholar
Internet Archive Scholar
CiteSeerX
ORCID














