Search Results

There are 20510 results for: content related to: Blind detection of spread spectrum flow watermarks

  1. Unified derivation of the limit shape for multiplicative ensembles of random integer partitions with equiweighted parts

    Random Structures & Algorithms

    Volume 47, Issue 2, September 2015, Pages: 227–266, Leonid V. Bogachev

    Article first published online : 18 APR 2014, DOI: 10.1002/rsa.20540

  2. A scalable certificateless architecture for multicast wireless mesh network using proxy re-encryption

    Security and Communication Networks

    Volume 7, Issue 1, January 2014, Pages: 14–32, Hongbing Wang, Zhenfu Cao and Lifei Wei

    Article first published online : 30 MAY 2013, DOI: 10.1002/sec.720

  3. Leveraging Image-based Localization for Infrastructure-based Calibration of a Multi-camera Rig

    Journal of Field Robotics

    Volume 32, Issue 5, August 2015, Pages: 775–802, Lionel Heng, Paul Furgale and Marc Pollefeys

    Article first published online : 25 SEP 2014, DOI: 10.1002/rob.21540

  4. Submodularity of minimum-cost spanning tree games


    Volume 63, Issue 3, May 2014, Pages: 231–238, Masayuki Kobayashi and Yoshio Okamoto

    Article first published online : 27 JAN 2014, DOI: 10.1002/net.21540

  5. Normal probability plots with confidence

    Biometrical Journal

    Volume 57, Issue 1, January 2015, Pages: 52–63, Wanpen Chantarangsi, Wei Liu, Frank Bretz, Seksan Kiatsupaibul, Anthony J. Hayter and Fang Wan

    Article first published online : 21 OCT 2014, DOI: 10.1002/bimj.201300244

  6. Distributed model predictive control with asynchronous controller evaluations

    The Canadian Journal of Chemical Engineering

    Volume 91, Issue 10, October 2013, Pages: 1609–1620, Su Liu, Jing Zhang, Jinfeng Liu, Yiping Feng and Gang Rong

    Article first published online : 2 JUL 2013, DOI: 10.1002/cjce.21840

  7. Separating body and Rayleigh waves with cross terms of the cross-correlation tensor of ambient noise

    Journal of Geophysical Research: Solid Earth

    Volume 119, Issue 3, March 2014, Pages: 2005–2018, Ryota Takagi, Hisashi Nakahara, Toshio Kono and Tomomi Okada

    Article first published online : 20 MAR 2014, DOI: 10.1002/2013JB010824

  8. Predicate encryption for multi-inner-products

    Security and Communication Networks

    Volume 6, Issue 3, March 2013, Pages: 325–339, Dongdong Sun, Colin Boyd and Juan Manuel Gonzalez Nieto

    Article first published online : 21 JUN 2012, DOI: 10.1002/sec.566

  9. A fast collapsed data method for estimating haplotype frequencies from pooled genotype data with applications to the study of rare variants

    Statistics in Medicine

    Volume 32, Issue 8, 15 April 2013, Pages: 1343–1360, Anthony Y.C. Kuk, Xiang Li and Jinfeng Xu

    Article first published online : 1 AUG 2012, DOI: 10.1002/sim.5540

  10. You have free access to this content
    Formulation of a mathematical approach to regional frequency analysis

    Water Resources Research

    Volume 49, Issue 10, October 2013, Pages: 6810–6833, Bidroha Basu and V. V. Srinivas

    Article first published online : 21 OCT 2013, DOI: 10.1002/wrcr.20540

  11. Optimization of Recommender Systems Based on Inventory

    Production and Operations Management

    Emre M. Demirezen and Subodha Kumar

    Article first published online : 4 FEB 2016, DOI: 10.1111/poms.12540

  12. New public key cryptosystems based on non-Abelian factorization problems

    Security and Communication Networks

    Volume 6, Issue 7, July 2013, Pages: 912–922, Lize Gu, Licheng Wang, Kaoru Ota, Mianxiong Dong, Zhenfu Cao and Yixian Yang

    Article first published online : 1 MAR 2013, DOI: 10.1002/sec.710

  13. Error estimation and model adaptation for a stochastic-deterministic coupling method based on the Arlequin framework

    International Journal for Numerical Methods in Engineering

    Volume 96, Issue 2, 12 October 2013, Pages: 87–109, C. Zaccardi, L. Chamoin, R. Cottereau and H. Ben Dhia

    Article first published online : 16 JUL 2013, DOI: 10.1002/nme.4540

  14. An Equilibrium Model of Asset Trading with Sequential Information Arrival

    The Journal of Finance

    Volume 36, Issue 1, March 1981, Pages: 143–161, ROBERT H. JENNINGS, LAURA T. STARKS and JOHN C. FELLINGHAM

    Article first published online : 30 APR 2012, DOI: 10.1111/j.1540-6261.1981.tb03540.x

  15. Comments on ‘Assessing correlation of clustered mixed outcomes from a multivariate generalized linear mixed model’

    Statistics in Medicine

    Volume 34, Issue 22, 30 September 2015, Pages: 3075–3078, Gul Inan

    Article first published online : 1 SEP 2015, DOI: 10.1002/sim.6540

  16. Shipping the Good Horses Out

    Southern Economic Journal

    Volume 80, Issue 2, October 2013, Pages: 540–561, Jean Eid, Travis Ng and Terence Tai-Leung Chong

    Article first published online : 1 OCT 2013, DOI: 10.4284/0038-4038-2012.038

  17. Unified privacy analysis of new-found RFID authentication protocols

    Security and Communication Networks

    Volume 6, Issue 8, August 2013, Pages: 999–1009, Mahdi R. Alagheband and Mohammad R. Aref

    Article first published online : 17 DEC 2012, DOI: 10.1002/sec.650

  18. The robust adaptive control of chaotic systems with unknown parameters and external disturbance via a scalar input

    International Journal of Adaptive Control and Signal Processing

    Volume 29, Issue 10, October 2015, Pages: 1296–1307, Runzi Luo

    Article first published online : 2 FEB 2015, DOI: 10.1002/acs.2540

  19. On the non-newtonian viscous behavior of polymer melts in terms of temperature and pressure-dependent hole fraction

    Journal of Applied Polymer Science

    Volume 131, Issue 15, August 5, 2014, Fatma Sahin Dinc, Tomas Sedlacek, Cumali Tav and Ugur Yahsi

    Article first published online : 22 FEB 2014, DOI: 10.1002/app.40540

  20. Switched Second-Order Sliding Mode Control with Partial Information: Theory and Application

    Asian Journal of Control

    Volume 15, Issue 1, January 2013, Pages: 20–30, Mara Tanelli and Antonella Ferrara

    Article first published online : 31 MAY 2012, DOI: 10.1002/asjc.540