Search Results

There are 10320 results for: content related to: A thermal theory for flammability diagrams guiding purge and inertion of a flammable mixture

  1. Sandwiching a densest subgraph by consecutive cores

    Random Structures & Algorithms

    Volume 47, Issue 2, September 2015, Pages: 341–360, Pu Gao

    Article first published online : 10 APR 2014, DOI: 10.1002/rsa.20543

  2. Cluster synchronization for T–S fuzzy complex networks using pinning control with probabilistic time-varying delays

    Complexity

    Volume 21, Issue 1, September/October 2015, Pages: 59–77, Rajan Rakkiyappan and Natarajan Sakthivel

    Article first published online : 14 MAY 2014, DOI: 10.1002/cplx.21543

  3. Port reduction in parametrized component static condensation: approximation and a posteriori error estimation

    International Journal for Numerical Methods in Engineering

    Volume 96, Issue 5, 2 November 2013, Pages: 269–302, Jens L. Eftang and Anthony T. Patera

    Article first published online : 22 JUL 2013, DOI: 10.1002/nme.4543

  4. Model-based testing for concurrent systems with labelled event structures

    Software Testing, Verification and Reliability

    Volume 24, Issue 7, November 2014, Pages: 558–590, Hernán Ponce de León, Stefan Haar and Delphine Longuet

    Article first published online : 20 AUG 2014, DOI: 10.1002/stvr.1543

  5. Applicability of bed load transport models for mixed-size sediments in steep streams considering macro-roughness

    Water Resources Research

    Volume 51, Issue 7, July 2015, Pages: 5260–5283, Johannes M. Schneider, Dieter Rickenmann, Jens M. Turowski, Kristin Bunte and James W. Kirchner

    Article first published online : 14 JUL 2015, DOI: 10.1002/2014WR016417

  6. Global well-posedness of the compressible Euler with damping in Besov spaces

    Mathematical Methods in the Applied Sciences

    Volume 35, Issue 13, 15 September 2012, Pages: 1570–1586, Quansen Jiu and Xiaoxin Zheng

    Article first published online : 19 JUN 2012, DOI: 10.1002/mma.2543

  7. The value of cooperation between relays in the multiple-access channel with multiple relays

    Transactions on Emerging Telecommunications Technologies

    Volume 23, Issue 4, June 2012, Pages: 341–359, Boaz Ghelber and Ron Dabora

    Article first published online : 14 FEB 2012, DOI: 10.1002/ett.1543

  8. Confidence intervals for the difference in paired Youden indices

    Pharmaceutical Statistics

    Volume 12, Issue 1, January/February 2013, Pages: 17–27, Haochuan Zhou and Gengsheng Qin

    Article first published online : 23 OCT 2012, DOI: 10.1002/pst.1543

  9. Empirical shrinkage estimator for consistency assessment of treatment effects in multi-regional clinical trials

    Statistics in Medicine

    Volume 32, Issue 10, 10 May 2013, Pages: 1691–1706, Hui Quan, Mingyu Li, Weichung Joe Shih, Soo Peter Ouyang, Joshua Chen, Ji Zhang and Peng-Liang Zhao

    Article first published online : 1 AUG 2012, DOI: 10.1002/sim.5543

  10. The Keck Aperture Masking Experiment: dust-enshrouded red giants

    Monthly Notices of the Royal Astronomical Society

    Volume 426, Issue 4, 11 November 2012, Pages: 2652–2667, T. D. Blasius, J. D. Monnier, P. G. Tuthill, W. C. Danchi and M. Anderson

    Article first published online : 17 OCT 2012, DOI: 10.1111/j.1365-2966.2012.21543.x

  11. Automatic Calibration of Spinning Actuated Lidar Internal Parameters

    Journal of Field Robotics

    Volume 32, Issue 5, August 2015, Pages: 723–747, Hatem Alismail and Brett Browning

    Article first published online : 8 SEP 2014, DOI: 10.1002/rob.21543

  12. Strategic placement of telemetry to reduce routing costs

    Networks

    Volume 63, Issue 3, May 2014, Pages: 260–275, Amit Verma and Ann Melissa Campbell

    Article first published online : 10 FEB 2014, DOI: 10.1002/net.21543

  13. A note on combined job selection and sequencing problems

    Naval Research Logistics (NRL)

    Volume 60, Issue 6, September 2013, Pages: 449–453, Christos Koulamas and Shrikant. S. Panwalkar

    Article first published online : 29 JUN 2013, DOI: 10.1002/nav.21543

  14. Reproducibility and biological basis of in vivo T2* magnetic resonance imaging of liver metastasis of colorectal cancer

    Magnetic Resonance in Medicine

    Volume 70, Issue 4, October 2013, Pages: 1145–1152, E. G. W. ter Voert, L. Heijmen, J. H. W. de Wilt, J. Bussink, C. J. A. Punt, H. W. M. van Laarhoven and A. Heerschap

    Article first published online : 19 NOV 2012, DOI: 10.1002/mrm.24543

  15. On a stochastic predator-prey system with modified functional response

    Mathematical Methods in the Applied Sciences

    Volume 35, Issue 2, 30 January 2012, Pages: 144–150, Jingliang Lv and Ke Wang

    Article first published online : 23 DEC 2011, DOI: 10.1002/mma.1543

  16. QoS and trust-aware coalition formation game in data-intensive cloud federations

    Concurrency and Computation: Practice and Experience

    Mohammad Mehedi Hassan, Mohammad Abdullah-Al-Wadud, Ahmad Almogren, SK Md. Mizanur Rahman, Abdulhameed Alelaiwi, Atif Alamri and Md. Abdul Hamid

    Article first published online : 19 MAY 2015, DOI: 10.1002/cpe.3543

  17. Performance of the marginal structural models under various scenarios of incomplete marker's values: A simulation study

    Biometrical Journal

    Volume 57, Issue 2, March 2015, Pages: 254–270, Georgia Vourli and Giota Touloumi

    Article first published online : 28 OCT 2014, DOI: 10.1002/bimj.201300159

  18. Design of “Magnetic Resonance Type” WPT Systems Based on Filter Theory

    Electronics and Communications in Japan

    Volume 96, Issue 10, October 2013, Pages: 1–11, Ikuo Awai and Toshio Ishizaki

    Article first published online : 11 SEP 2013, DOI: 10.1002/ecj.11543

  19. Financial Structure, Acquisition Opportunities, and Firm Locations

    The Journal of Finance

    Volume 65, Issue 2, April 2010, Pages: 529–563, ANDRES ALMAZAN, ADOLFO DE MOTTA, SHERIDAN TITMAN and VAHAP UYSAL

    Article first published online : 19 MAR 2010, DOI: 10.1111/j.1540-6261.2009.01543.x

  20. Introducing proxy zero-knowledge proof and utilization in anonymous credential systems

    Security and Communication Networks

    Volume 6, Issue 2, February 2013, Pages: 161–172, Hoda Jannati, Mahmoud Salmasizadeh, Javad Mohajeri and Amir Moradi

    Article first published online : 18 APR 2012, DOI: 10.1002/sec.543