Metadata Search Funding Data Link References Status API Help
Facet browsing currently unavailable
Page 2 of 127017 results
Sort by: relevance publication year

Protecting Smart Home from Cybersecurity Threats Strategies for Homeowners

JOURNAL ARTICLE published 2023 in Journal of Cybersecurity and Information Management

Authors: Miguel Botto Botto-Tobar | Department of Mathematics and Computer Science, Eindhoven University of Technology, Eindhoven, 5600 MB, The Netherlands; Research Group in Artificial Intelligence and Information Technology, Department of Mathematics and Physical Sciences, University of Guayaquil, Guayaquil, 090514, Ecuador | Department of Computer Science and Engineering, Babu Banarasi Das University, Lucknow, India | Department of Computer Science and Engineering, Babu Banarasi Das University, Lucknow, India | Sumaiya Rehan | Ravi Prakash Verma

International Conference on Computational Management Science May 17–19, 2006 Organized by the Centrum voor Wiskunde en Informatica (CWI) and Technische Universiteit Eindhoven

JOURNAL ARTICLE published September 2005 in Operational Research

Homogenization and dimension reduction of filtration combustion in heterogeneous thin layers

JOURNAL ARTICLE published 2014 in Networks & Heterogeneous Media

Authors: Tasnim Fatima | ,Department of Mathematics and Computer Science, CASA - Center for Analysis, Scientific computing and Applications, Eindhoven University of Technology, P.O. Box 513, 5600 MB, Eindhoven | Ekeoma Ijioma | Toshiyuki Ogawa | Adrian Muntean | ,Graduate School of Advanced Mathematical Science, Meiji University, 4-21-1 Nakano, Nakano-ku, Tokyo, 164-8525 | ,CASA - Centre for Analysis, Scientific computing and Applications, Department of Mathematics and Computer Science, Institute of Complex Molecular Systems, Eindhoven University of Technology, PO Box 513, 5600 MB Eindhoven

Bounds and constructions for key distribution schemes

JOURNAL ARTICLE published 2009 in Advances in Mathematics of Communications

Authors: Yvo Desmedt | ,BT Chair of Information Security, Department of Computer Science, University College London, London | Niels Duif | Henk van Tilborg | Huaxiong Wang | ,Department of Mathematics and Computer Science, Eindhoven University of Technology, P.O. Box 513, 5600 MB Eindhoven | ,Division of Mathematical Sciences, School of Physical and Mathematical Sciences, Nanyang Technological University

Comparative analysis of some modified prim�s algorithms to solve the multiperiod degree constrained minimum spanning tree problem

JOURNAL ARTICLE published 1 March 2018 in Indian Journal of Science and Technology

Authors: Mustofa Usman | Astria Hijriani | Wibi Cahyo Hastono | Department of Mathematics, Faculty of Mathematics and Natural Sciences, UniversitasLampung, Indonesia | Department of Mathematics, Faculty of Mathematics and Natural Sciences, UniversitasLampung, Indonesia | Department of Mathematics, Faculty of Mathematics and Natural Sciences, UniversitasLampung, Indonesia | Department of Computer Science, Faculty of Mathematics and Natural Sciences, Universitas Lampung, Indonesia | Department of Computer Science, Faculty of Mathematics and Natural Sciences, Universitas Lampung, Indonesia

On defining generalized rank weights

JOURNAL ARTICLE published 2017 in Advances in Mathematics of Communications

Authors: Relinde Jurrius | ,Institut de Mathématiques, Université de Neuchatel, Rue Emilie-Argand 11,2000 Neuchatel, Switzerland | Ruud Pellikaan | ,Department of Mathematics and Computer Science, Eindhoven University of Technology, P.O. Box 513,5600 MB Eindhoven, The Netherlands

Certified and fast computations with shallow covariance kernels

JOURNAL ARTICLE published 2020 in Foundations of Data Science

Authors: Daniel Kressner | ,MATH-ANCHP, École Polytechnique fédérale de Lausanne, 1015 Lausanne, Switzerland | Jonas Latz | Stefano Massei | Elisabeth Ullmann | ,Department of Applied Mathematics and Theoretical Physics, University of Cambridge, Cambridge CB3 0WA, United Kingdom | ,Department of Mathematics and Computer Science, Eindhoven University of Technology, 5612 AZ Eindhoven, Netherlands | ,Department of Mathematics, Technical University of Munich, 85748 Garching, Germany

A Boxology of Design Patterns forHybrid Learningand Reasoning Systems

JOURNAL ARTICLE published 2019 in Journal of Web Engineering

Authors: Frank van Harmelen | Annette ten Teije | Department of Computer Science, Vrije Universiteit Amsterdam, Netherlands | Department of Computer Science, Vrije Universiteit Amsterdam, Netherlands

Efficient halving for genus 3 curves over binary fields

JOURNAL ARTICLE published 2010 in Advances in Mathematics of Communications

Authors: Peter Birkner | ,Department of Mathematics and Computer Science, Eindhoven University of Technology, P.O. Box 513, 5600 MB Eindhoven | Nicolas Thériault | ,Instituto de Matemática y Física, Universidad de Talca, Casilla 747, Talca

The Laplacian spread of a tree

JOURNAL ARTICLE published 1 January 2008 in Discrete Mathematics & Theoretical Computer Science

Authors: Yi-Zheng Fan | Jing Xu | Yi Wang | Dong Liang

Optimal Key Tree Structure for Deleting Two or More Leaves

BOOK CHAPTER published 2008 in Algorithms and Computation

Authors: Weiwei Wu | Minming Li | Enhong Chen

THE PRACTICALITY OF ENGINEERING PRINCIPLES IN SOFTWARE ENGINEERING

JOURNAL ARTICLE published 31 December 2019 in International Journal of Advanced Research

Authors: Patrick Obilikwu PhD | Department of Mathematics and Computer Science, Benue State University, Makurdi, Nigeria | Kenneth Dekera Kwaghtyo | Edward N. Udo | Department of Mathematics and Computer Science, Benue State University, Makurdi, Nigeria | Department of Computer Science, University of Uyo, Uyo, Nigeria

"Frontier algorithms"

JOURNAL ARTICLE published 2008 in Teaching Mathematics and Computer Science

Authors: Zoltán Kátai

Fraud Detection in Customers’ Electricity Consumption in Nigeria Using Support Vector Machine and C4.5 Decision Tree Algorithms

JOURNAL ARTICLE published 30 January 2021 in Advances in Multidisciplinary and scientific Research Journal Publication

Authors: J.A. Sarumi, (PhD) | Department of Computer Science Lagos State Polytechnic Ikorodu, Lagos Nigeria

A Toolkit for Debugging Parallel Lisp Programs

BOOK CHAPTER published 1991 in Parle ’91 Parallel Architectures and Languages Europe

Authors: Hermann Ilmberger | Sabine Thürmel

SIMULATION TO THE TWO BASIC GALTON PROBLEMS

JOURNAL ARTICLE published 1 December 2008 in Journal of Al-Nahrain University Science

Authors: Akram M. Al-Abood | Department of Mathematics and Computer Applications, College of Science, Al-Nahrain University, Baghdad, Iraq | Shayma A. Al-Dabbagh | Department of Mathematics and Computer Applications, College of Science, Al-Nahrain University, Baghdad, Iraq

Bifurcation and stability of two-dimensional double-diffusive convection

JOURNAL ARTICLE published 2008 in Communications on Pure & Applied Analysis

Authors: Chun-Hsiung Hsia | ,Department of Mathematics, Statistics and Computer Science, University of Illinois at Chicago, Chicago, Illinois 60607 | Tian Ma | Shouhong Wang | ,Department of Mathematics, Sichuan University, Chengdu | ,Department of Mathematics, Indiana University, Bloomington, IN 47405

Two Kadane Algorithms for the Maximum Sum Sub-Array Problem

POSTED CONTENT published

Authors: Joseph B. Kadane

A Comparative Study Of Minimal Spanning Tree Algorithms

PROCEEDINGS ARTICLE published March 2020 in 2020 International Conference in Mathematics, Computer Engineering and Computer Science (ICMCECS)

Authors: Peace Ayegba | Joyce Ayoola | Emmanuel Asani | Aderemi Okeyinka

Tree-Search Algorithms

BOOK CHAPTER published 2008 in Graph Theory