default search action
Computers & Mathematics with Applications, Volume 63
Volume 63, Number 1, January 2012
- Mashaallah Matinfar, Hossein Zareamoghaddam, Mostafa Eslami, Mohammad Saeidy:
GMRES implementations and residual smoothing techniques for solving ill-posed linear systems. 1-13 - Jia Tang, Changfeng Ma:
An application of H differentiability to generalized complementarity problems over symmetric cones. 14-24 - Pratibha Joshi, Manoj Kumar:
Mathematical model and computer simulation of three dimensional thin film elliptic interface problems. 25-35 - Yasin Yazlik, Necati Taskara:
A note on generalized k-Horadam sequence. 36-41 - Jugal Kishore Prajapat, M. K. Aouf:
Majorization problem for certain class of p-valently analytic function defined by generalized fractional differintegral operator. 42-47 - Onur Yilmaz, Sercan Demirci, Yagiz Kaymak, Serkan Ergun, Ahmet Yildirim:
Shortest hop multipath algorithm for wireless sensor networks. 48-59 - E. Di Costanzo, Addolorata Marasco:
Approximate analytic solution of the Dirichlet problems for Laplace's equation in planar domains by a perturbation method. 60-67 - Syafaruddin, Engin Karatepe, Takashi Hiyama:
Fuzzy wavelet network identification of optimum operating point of non-crystalline silicon solar cells. 68-82 - Yanhong She, Xiaoli He:
Uncertainty measures for rough formulae in rough logic: An axiomatic approach. 83-93 - Mahmood-ul-Hassan, Abdul Majeed Siddiqui:
A modified approach to exact solutions of a general form of a non-Newtonian second grade fluid. 94-99 - M. Roodaki, Homa Almasieh:
Delta basis functions and their applications to systems of integral equations. 100-109 - Ching-Jong Liao, Chien-Wen Chao, Liang-Chuan Chen:
An improved heuristic for parallel machine weighted flowtime scheduling with family set-up times. 110-117 - Pratima Rai, Kapil K. Sharma:
Numerical study of singularly perturbed differential-difference equation arising in the modeling of neuronal variability. 118-132 - Khosrow Maleknejad, Morteza Khodabin, M. Rostami:
A numerical method for solving m-dimensional stochastic Itô-Volterra integral equations by stochastic operational matrix. 133-143 - Wen Liang Chang, Jyh-Horng Lin:
Optimal maintenance policy and length of extended warranty within the life cycle of products. 144-150 - Lifeng Guo, Lei Hu:
Efficient bidirectional proxy re-encryption with direct chosen-ciphertext security. 151-157 - A. Borumand Saeid, Akbar Rezaei:
Intuitionistic (T, S)-fuzzy CI-algebras. 158-166 - Yong Zhang, Weiguo Zhang, Weijun Xu, Xingyu Yang:
Risk-reward models for on-line leasing of depreciable equipment. 167-174 - Shalom Eliahou, Juan Manuel Marín, M. P. Revuelta, María Isabel Sanz Domínguez:
Weak Schur numbers and the search for G.W. Walker's lost partitions. 175-182 - Suwat Kuntanapreeda:
Robust synchronization of fractional-order unified chaotic systems via linear control. 183-190 - Amir Hossein Gandomi, Xin-She Yang, Siamak Talatahari, Suash Deb:
Coupled eagle strategy and differential evolution for unconstrained and constrained global optimization. 191-200 - Sima Varnosafaderani, Stefanka S. Chukova:
A two-dimensional warranty servicing strategy based on reduction in product failure intensity. 201-213 - Shahram Jamali, Gholam Shaker:
PSO-SFDD: Defense against SYN flooding DoS attacks by employing PSO algorithm. 214-221 - Erfang Shan, Yanxia Dong:
The k-tuple twin domination in generalized de Bruijn and Kautz networks. 222-227 - Z. H. Che:
Clustering and selecting suppliers based on simulated annealing algorithms. 228-238 - J. M. McNamee, Victor Y. Pan:
Efficient polynomial root-refiners: A survey and new record efficiency estimates. 239-254 - K. Das:
Slip effects on MHD mixed convection stagnation point flow of a micropolar fluid towards a shrinking vertical sheet. 255-267 - Navid Razmjooy, Bibi Somayeh Mousavi, Fazlollah Soleymani:
A real-time mathematical computer method for potato inspection using machine vision. 268-279 - Sanjay Sharma:
A novel weighted multilevel space-time trellis coding scheme. 280-287 - Wengui Yang:
Positive solutions for a coupled system of nonlinear fractional differential equations with integral boundary conditions. 288-297 - Hassen Aydi, Mihai Postolache, Wasfi A. Shatanawi:
Coupled fixed point results for (ψ, φ)-weakly contractive mappings in ordered G-metric spaces. 298-309 - Pedro Almenar, Lucas Jódar:
An upper bound for the distance between a zero and a critical point of a solution of a second order linear differential equation. 310-317 - Boban Marinkovic:
Optimality conditions in a vector continuous-time optimization problem. 318-324 - Wu Deng, Rong Chen, Jian Gao, Yingjie Song, Junjie Xu:
A novel parallel hybrid intelligence optimization algorithm for a function approximation problem. 325-336
Volume 63, Number 2, January 2012
- Marek R. Ogiela, Ilsun You, Fatos Xhafa, Hoon Ko:
Towards context, cognitive, and secure computing. 337-338
- Elis Kulla, Masahiro Hiyama, Makoto Ikeda, Leonard Barolli:
Performance comparison of OLSR and BATMAN routing protocols by a MANET testbed in stairs environment. 339-349 - Joanna Kolodziej, Fatos Xhafa:
Integration of task abortion and security requirements in GA-based meta-heuristics for independent batch grid scheduling. 350-364 - Yulai Yuan, Yongwei Wu, Qiuping Wang, Guangwen Yang, Weimin Zheng:
Job failures in high performance computing systems: A large-scale empirical study. 365-377 - Lidia Ogiela:
Semantic analysis in cognitive UBIAS & E-UBIAS systems. 378-390 - Jenq-Muh Hsu, Chao-Chun Chen, Chia Chi Li:
POOT: An efficient object tracking strategy based on short-term optimistic predictions for face-structured sensor networks. 391-406 - Yuh-Shyan Chen, Chih-Shun Hsu, Wei-Han Yi:
An IP passing protocol for vehicular ad hoc networks with network fragmentation. 407-426 - Quan Shi, Yanghua Xiao, Nik Bessis, Yiqi Lu, Yaoliang Chen, Richard Hill:
Optimizing K2 trees: A case for validating the maturity of network of practices. 427-436 - Aniello Castiglione, Alfredo De Santis, Ugo Fiore, Francesco Palmieri:
An asynchronous covert channel using spam. 437-447 - Jiaqing Lin, Hiroaki Nishino, Tsuneo Kagawa, Kouichi Utsumiya:
A method of two-handed gesture interactions with applications based on commodity devices. 448-457 - Feilong Tang, Ilsun You, Shui Yu, Cho-Li Wang, Minyi Guo, Wenlong Liu:
An efficient deadlock prevention approach for service oriented transaction processing. 458-468 - Ruoyu Zhang, Shiqiu Huang, Zhengwei Qi, Haibing Guan:
Static program analysis assisted dynamic taint tracking for software vulnerability discovery. 469-480 - Neeraj Kumar, Naveen K. Chilamkurti, Jong-Hyouk Lee:
A novel minimum delay maximum flow multicast algorithm to construct a multicast tree in wireless mesh networks. 481-491 - Zhuzhong Qian, Ce Chen, Ilsun You, Sanglu Lu:
ACSP: A novel security protocol against counting attack for UHF RFID systems. 492-500 - Sang Min Lee, Dong Seong Kim, Je Hak Lee, Jong Sou Park:
Detection of DDoS attacks using optimized traffic matrix. 501-510 - Yong-Hwan Lee, Bonam Kim, Heung-Jun Kim:
Efficient object identification and localization for image retrieval using query-by-region. 511-517 - Gabriele Costa, Ilaria Matteucci:
Gate automata-driven run-time enforcement. 518-524 - Kyungroul Lee, Kangbin Yim, Mohammad A. Mikki:
A secure framework of the surveillance video network integrating heterogeneous video formats and protocols. 525-535 - Bo Wang, Yongwei Wu, Weimin Zheng:
Task optimization based on CPU pipeline technique in a multicore system. 536-543 - Luis Gómez-Miralles, Joan Arnedo-Moreno:
Versatile iPad forensic acquisition using the Apple Camera Connection Kit. 544-553 - Hoon Ko, Kyung-jin An, Tai-Hoon Kim, Goreti Marreiros, Zita A. Vale, Jong-Myoung Choi:
A study on dynamic state information (DSI) around users for safe urban life. 554-563 - Marek R. Ogiela, Urszula Ogiela:
Linguistic protocols for secure information management and sharing. 564-572 - Shih-Hao Hung, Chi-Sheng Shih, Jeng-Peng Shieh, Chen-Pang Lee, Yi-Hsiang Huang:
Executing mobile applications on the cloud: Framework and issues. 573-587 - Baokang Zhao, Wei Peng, Ziming Song, Jinshu Su, Chunqing Wu, Wanrong Yu, Qiaolin Hu:
Towards efficient and practical network coding in delay tolerant networks. 588-600
Volume 63, Number 3, February 2012
- Jianzhong Liu, Xuande Zhang, Bo Jiang:
Some generalizations and improvements of discrete Hardy's inequality. 601-607 - Jafar Biazar, H. Ebrahimi:
Chebyshev wavelets approach for nonlinear systems of Volterra integral equations. 608-616 - Mehmet Ali Öztürk, Ebubekir Inan:
Fuzzy soft subnear-rings and (∈, ∈∨q)-fuzzy soft subnear-rings. 617-628 - Rezvan Salehi, Mehdi Dehghan:
The use of a Legendre pseudospectral viscosity technique to solve a class of nonlinear dynamic Hamilton-Jacobi equations. 629-644 - Ahmet Ipek:
Upper bounds for the condition numbers of the GCD and the reciprocal GCD matrices in spectral norm. 645-651 - Qinghua Feng, Fanwei Meng:
Some generalized Ostrowski-Grüss type integral inequalities. 652-659 - Rathinasamy Sakthivel, S. Suganya, Selvaraj Marshal Anthoni:
Approximate controllability of fractional stochastic evolution equations. 660-668 - Erbil Çetin, F. Serap Topal:
Symmetric positive solutions of fourth order boundary value problems for an increasing homeomorphism and homomorphism on time-scales. 669-678 - Muhuo Liu, Bolian Liu:
New method and new results on the order of spectral radius. 679-686 - Lin-Tian Luh:
The shape parameter in the Gaussian function. 687-694 - Rehan Ali Shah, Saeed Islam, Abdul Majeed Siddiqui, Tahira Haroon:
Wire coating analysis with Oldroyd 8-constant fluid by Optimal Homotopy Asymptotic Method. 695-707 - Pradip Debnath:
Lacunary ideal convergence in intuitionistic fuzzy normed linear spaces. 708-715 - Thabet Abdeljawad, Erdal Karapinar, Kenan Tas:
A generalized contraction principle with control functions on partial metric spaces. 716-719 - Yi Ling, Gejun Bao:
Some local Poincaré inequalities for the composition of the sharp maximal operator and the Green's operator. 720-727 - Zhouchao Wei:
Delayed feedback on the 3-D chaotic system only with two stable node-foci. 728-738 - Ismail Yaslan:
Higher order m-point boundary value problems on time scales. 739-750
Volume 63, Number 4, February 2012
- Peng Chen, X. H. Tang, Ravi P. Agarwal:
Infinitely many homoclinic solutions for nonautonomous p(t)-Laplacian Hamiltonian systems. 751-763 - Mahdi Sharifi, D. K. R. Babajee, Fazlollah Soleymani:
Finding the solution of nonlinear equations by a class of optimal methods. 764-774 - Said R. Grace, John R. Graef, Mohamed A. El-Beltagy:
On the oscillation of third order neutral delay dynamic equations on time scales. 775-782 - Xueling Ma, Yunqiang Yin, Jianming Zhan:
Characterizations of h-intra- and h-quasi-hemiregular hemirings. 783-793 - Kui Du:
A new preconditioner for the interface system arising in a fast Helmholtz solver. 794-806 - Ren-you Zhong, Nan-jing Huang:
On the stability of solution mapping for parametric generalized vector quasiequilibrium problems. 807-815 - Dinh Nho Hào, Huu Chuong La, Daniel Lesnic:
Heuristic regularization methods for numerical differentiation. 816-826 - Jinguang Han, Willy Susilo, Yi Mu, Jun Yan:
Efficient oblivious transfers with access control. 827-837 - Jianke Zhang, Sanyang Liu, Lifeng Li, Quanxi Feng:
Sufficiency and duality for multiobjective variational control problems with G-invexity. 838-850 - Raffaele D'Ambrosio, Giuseppe Izzo, Zdzislaw Jackiewicz:
Perturbed MEBDF methods. 851-861 - Yasir Khan, Parul Tiwari, R. Ali:
Application of variational methods to a rectangular clamped plate problem. 862-869
Volume 63, Number 5, March 2012
- Meng Liu, Ke Wang:
On a stochastic logistic equation with impulsive perturbations. 871-886 - Choon Ki Ahn:
Exponential H∞ stable learning method for Takagi-Sugeno fuzzy delayed neural networks: A convex optimization approach. 887-895 - Yao-Lin Jiang, Xiao-Li Ding:
Nonnegative solutions of fractional functional differential equations. 896-904 - Roman Witula, Damian Slota, Edyta Hetmaniok:
Some properties of inverses of the full matrices. 905-911 - Giorgio Chiandussi, Marco Codegone, S. Ferrero, F. E. Varesio:
Comparison of multi-objective optimization methodologies for engineering applications. 912-942 - Thoudam Roshan:
A Petrov-Galerkin method for solving the generalized regularized long wave (GRLW) equation. 943-956 - Jianping Zhao, Yanren Hou, Yongfei Li:
Immersed Interface Method for elliptic equations based on a piecewise second order polynomial. 957-965 - (Withdrawn) Approximation of solutions of generalized equations of Hammerstein type. 966-974
- Guoyu Yao, Ruifeng Ding:
Two-stage least squares based iterative identification algorithm for controlled autoregressive moving average (CARMA) systems. 975-984 - Cheng Wang, Yi Shen:
Robust H∞ control for stochastic systems with nonlinearity, uncertainty and time-varying delay. 985-998 - Ümit Totur, Ibrahim Çanak:
Some general Tauberian conditions for the weighted mean summability method. 999-1006
Volume 63, Number 6, March 2012
- Javad Taheri-Tolgari, Abolfazl Mirzazadeh, Fariborz Jolai:
An inventory model for imperfect items under inflationary conditions with considering inspection errors. 1007-1019 - Richard F. Patterson, Ekrem Savas:
RH-conservative matrix characterization of P-convergence in probability. 1020-1025 - Eduardo Silva Palmeira, Benjamín R. C. Bedregal:
Extension of fuzzy logic operators defined on bounded lattices via retractions. 1026-1038 - Murray R. Bremner, Raúl Felipe, Juana Sánchez-Ortega:
Jordan triple disystems. 1039-1055 - Emad H. Aly, Abdelhalim Ebaid, Randolph C. Rach:
Advances in the Adomian decomposition method for solving two-point nonlinear boundary value problems with Neumann boundary conditions. 1056-1065 - Zhaowen Li, Tusheng Xie, Qingguo Li:
Topological structure of generalized rough sets. 1066-1071 - Juan Luis Mata-Machuca, Rafael Martínez-Guerra:
Asymptotic synchronization of the Colpitts oscillator. 1072-1078 - Jin Han Park, Oe Hyeon Kim, Young Chel Kwun:
Some properties of equivalence soft set relations. 1079-1088 - Yekini Shehu:
Hybrid iterative scheme for fixed point problem, infinite systems of equilibrium and variational inequality problems. 1089-1103 - Mehdi Toloo:
Alternative solutions for classifying inputs and outputs in data envelopment analysis. 1104-1110 - Xiaoming Zhang, Weidong Jiang:
Some properties of log-convex function and applications for the exponential function. 1111-1116 - Jakkrit TeCho, Cholwich Nattee, Thanaruk Theeramunkong:
Boosting-based ensemble learning with penalty profiles for automatic Thai unknown word recognition. 1117-1134
Volume 63, Number 7, April 2012
- Heng-fei Ding, Yu-xin Zhang:
New numerical methods for the Riesz space fractional partial differential equations. 1135-1146 - Erhan Set:
New inequalities of Ostrowski type for mappings whose derivatives are s-convex in the second sense via fractional integrals. 1147-1154 - Chaogai Xue, Lili Dong, Junjuan Liu:
Enterprise information system structure optimization based on time property with improved immune genetic algorithm and binary tree. 1155-1168 - Bahattin Yildiz, Irfan Siap:
Cyclic codes over F2[u]/(u4-1) and applications to DNA codes. 1169-1176 - Yu-Ming Chu, Miao-Kun Wang, Song-Liang Qiu, Yue-Ping Jiang:
Bounds for complete elliptic integrals of the second kind with applications. 1177-1184 - Gyurhan H. Nedzhibov:
A derivative-free iterative method for simultaneously computing an arbitrary number of zeros of nonlinear equations. 1185-1191 - Lizheng Lu:
On polynomial approximation of circular arcs and helices. 1192-1196 - Sandile Sydney Motsa, Precious Sibanda:
A linearisation method for non-linear singular boundary value problems. 1197-1203 - Víctor Blanco, José Carlos Rosales:
On the enumeration of the set of numerical semigroups with fixed Frobenius number. 1204-1211 - Marion Darbas, Olivier Goubet, Stephanie Lohrengel:
Exact boundary controllability of the second-order Maxwell system: Theory and numerical simulation. 1212-1237 - Ji-Teng Jia, Qiong-xiang Kong, Tomohiro Sogabe:
A new algorithm for solving nearly penta-diagonal Toeplitz linear systems. 1238-1243 - Bikash Sahoo, Fotini Labropulu:
Steady Homann flow and heat transfer of an electrically conducting second grade fluid. 1244-1255 - Leonid Berezansky, Elena Braverman:
On the existence of positive solutions for systems of differential equations with a distributed delay. 1256-1265