Search Results

There are 17223 results for: content related to: Anonymous communication in overlay networks

  1. Adaptive contrast weighted learning for multi-stage multi-treatment decision-making

    Biometrics

    Yebin Tao and Lu Wang

    Version of Record online : 23 MAY 2016, DOI: 10.1111/biom.12539

  2. Generalized measures for fault tolerance of star networks

    Networks

    Volume 63, Issue 3, May 2014, Pages: 225–230, Xiang-Jun Li and Jun-Ming Xu

    Version of Record online : 27 JAN 2014, DOI: 10.1002/net.21539

  3. The mixing time of the giant component of a random graph

    Random Structures & Algorithms

    Volume 45, Issue 3, October 2014, Pages: 383–407, Itai Benjamini, Gady Kozma and Nicholas Wormald

    Version of Record online : 14 MAY 2014, DOI: 10.1002/rsa.20539

  4. Modelling the relationship between catchment attributes and wetland water quality in Japan

    Ecohydrology

    Volume 8, Issue 4, June 2015, Pages: 726–737, Azam Haidary, Bahman Jabbarian Amiri, Jan Adamowski, Nicola Fohrer and Kaneyuki Nakane

    Version of Record online : 26 AUG 2014, DOI: 10.1002/eco.1539

  5. An analytical framework for flood water conservation considering forecast uncertainty and acceptable risk

    Water Resources Research

    Volume 51, Issue 6, June 2015, Pages: 4702–4726, Wei Ding, Chi Zhang, Yong Peng, Ruijie Zeng, Huicheng Zhou and Ximing Cai

    Version of Record online : 28 JUN 2015, DOI: 10.1002/2015WR017127

  6. A Situationally Aware Voice-commandable Robotic Forklift Working Alongside People in Unstructured Outdoor Environments

    Journal of Field Robotics

    Volume 32, Issue 4, June 2015, Pages: 590–628, Matthew R. Walter, Matthew Antone, Ekapol Chuangsuwanich, Andrew Correa, Randall Davis, Luke Fletcher, Emilio Frazzoli, Yuli Friedman, James Glass, Jonathan P. How, Jeong hwan Jeon, Sertac Karaman, Brandon Luders, Nicholas Roy, Stefanie Tellex and Seth Teller

    Version of Record online : 19 SEP 2014, DOI: 10.1002/rob.21539

  7. A scalable certificateless architecture for multicast wireless mesh network using proxy re-encryption

    Security and Communication Networks

    Volume 7, Issue 1, January 2014, Pages: 14–32, Hongbing Wang, Zhenfu Cao and Lifei Wei

    Version of Record online : 30 MAY 2013, DOI: 10.1002/sec.720

  8. You have free access to this content
    Conformational selection in protein binding and function

    Protein Science

    Volume 23, Issue 11, November 2014, Pages: 1508–1518, Thomas R. Weikl and Fabian Paul

    Version of Record online : 6 SEP 2014, DOI: 10.1002/pro.2539

  9. Predicate encryption for multi-inner-products

    Security and Communication Networks

    Volume 6, Issue 3, March 2013, Pages: 325–339, Dongdong Sun, Colin Boyd and Juan Manuel Gonzalez Nieto

    Version of Record online : 21 JUN 2012, DOI: 10.1002/sec.566

  10. The Role of Options in the Resolution of Agency Problems: A Comment

    The Journal of Finance

    Volume 41, Issue 5, December 1986, Pages: 1157–1170, ROGER E. A. FARMER and RALPH A. WINTER

    Version of Record online : 30 APR 2012, DOI: 10.1111/j.1540-6261.1986.tb02539.x

  11. Boundary integral method for scattering problems with cracks buried in a piecewise homogeneous medium

    Mathematical Methods in the Applied Sciences

    Volume 35, Issue 1, 15 January 2012, Pages: 84–96, Guozheng Yan and Jianguo Ye

    Version of Record online : 29 DEC 2011, DOI: 10.1002/mma.1539

  12. You have full text access to this OnlineOpen article
    Parameterization of intrawave ripple-averaged sediment pickup above steep ripples

    Journal of Geophysical Research: Oceans

    Volume 121, Issue 1, January 2016, Pages: 658–673, L. O. Amoudry, A. J. Souza, P. D. Thorne and P. L.-F. Liu

    Version of Record online : 22 JAN 2016, DOI: 10.1002/2015JC011185

  13. Surface plasmon polaritons with plasma frequencies above 1 eV in Sn-doped In2 O3

    physica status solidi (b)

    Volume 253, Issue 2, February 2016, Pages: 361–365, Sascha Kalusniak, Laura Orphal, Peter Schäfer and Sergey Sadofev

    Version of Record online : 20 OCT 2015, DOI: 10.1002/pssb.201552539

  14. A flexible hierarchical access control mechanism enforcing extension policies

    Security and Communication Networks

    Volume 8, Issue 2, 25 January 2015, Pages: 189–201, Ya-Fen Chang

    Version of Record online : 4 MAR 2014, DOI: 10.1002/sec.971

  15. Mathematical modeling of the partial hydrogenation of vegetable oil in a monolithic stirrer reactor

    AIChE Journal

    Volume 60, Issue 10, October 2014, Pages: 3524–3533, Diego E. Boldrini, Daniel E. Damiani and Gabriela M. Tonetto

    Version of Record online : 2 JUL 2014, DOI: 10.1002/aic.14539

  16. A decision theoretic approach to optimization of multiple testing procedures

    Biometrical Journal

    Volume 57, Issue 1, January 2015, Pages: 64–75, Vera Lisovskaja and Carl-Fredrik Burman

    Version of Record online : 13 NOV 2014, DOI: 10.1002/bimj.201300186

  17. Sparse set membership identification of nonlinear functions and application to fault detection

    International Journal of Adaptive Control and Signal Processing

    Volume 30, Issue 2, February 2016, Pages: 206–223, Carlo Novara

    Version of Record online : 23 JAN 2015, DOI: 10.1002/acs.2539

  18. You have free access to this content
    Simulation of subice shelf melt rates in a general circulation model: Velocity-dependent transfer and the role of friction

    Journal of Geophysical Research: Oceans

    Volume 119, Issue 3, March 2014, Pages: 1765–1790, Véronique Dansereau, Patrick Heimbach and Martin Losch

    Version of Record online : 12 MAR 2014, DOI: 10.1002/2013JC008846

  19. Selectively chosen ciphertext security in threshold public-key encryption

    Security and Communication Networks

    Volume 9, Issue 3, February 2016, Pages: 189–200, Kitak Kim, Jong Hwan Park and Dong Hoon Lee

    Version of Record online : 22 FEB 2012, DOI: 10.1002/sec.417

  20. Generalized (identity-based) hash proof system and its applications

    Security and Communication Networks

    Yu Chen, Zongyang Zhang, Dongdai Lin and Zhenfu Cao

    Version of Record online : 7 NOV 2013, DOI: 10.1002/sec.827