Results 1-10 of 513 (Search time: 0.003 seconds).
NO | Title, Author(s) (Publication Title, Volume Issue, Page, Issue Date) |
---|---|
Analytical approach for calculating the minimally required ranging codes in fixed and mobile broadband wireless access systems based on OFDMA Chang Y.; Hwang, Gang Uk; Lee Y., WSEAS TRANSACTIONS ON COMMUNICATIONS, v.4, no.10, pp.989 - 993, 2005-10 | |
Cyclic renewal systems Hong, S; Shin, Sujin, THEORETICAL COMPUTER SCIENCE, v.410, no.27-29, pp.2675 - 2684, 2009-06 | |
Tests of randomness by the gamblers ruin algorithm Kim, Chihurn; Choe, Geon Ho; Kim, Dong Han, APPLIED MATHEMATICS AND COMPUTATION, v.199, no.1, pp.195 - 210, 2008-05 | |
Signature invariants of covering links Cha, JC; Ko, Ki-Hyoung, TRANSACTIONS OF THE AMERICAN MATHEMATICAL SOCIETY, v.358, no.8, pp.3399 - 3412, 2006 | |
Potential comparison and asymptotics in scalar conservation laws without convexity Kim, Yong Jung, JOURNAL OF DIFFERENTIAL EQUATIONS, v.244, no.1, pp.40 - 51, 2008-01 | |
Fourth-order partial differential equations for image enhancement Yi, D; Lee, Sungyun, APPLIED MATHEMATICS AND COMPUTATION, v.175, no.1, pp.430 - 440, 2006-04 | |
Proof of semialgebraic covering mapping cylinder conjecture with semialgebraic covering homotopy theorem Choi, MJ; Park, DH; Suh, Dong Youp, TOPOLOGY AND ITS APPLICATIONS, v.154, no.1, pp.69 - 89, 2007-01 | |
Towards generating secure keys for braid cryptography Ko, Ki-Hyoung; Lee, JW; Thomas, T, DESIGNS CODES AND CRYPTOGRAPHY, v.45, no.3, pp.317 - 333, 2007-12 | |
A divide-and-conquer approach in applying EM for large recursive models with incomplete categorical data Kim, Sung-Ho, COMPUTATIONAL STATISTICS & DATA ANALYSIS, v.50, no.3, pp.611 - 641, 2006-02 | |
Properties of Markovian subgraphs of a decomposable graph Kim, Sung-Ho, LECTURE NOTES IN COMPUTER SCIENCE (INCLUDING SUBSERIES LECTURE NOTES IN ARTIFICIAL INTELLIGENCE AND LECTURE NOTES IN BIOINFORMATICS), v.4293 LNAI, no.0, pp.15 - 26, 2006 |
Discover