Search Results

There are 27780 results for: content related to: Privacy enhancement for fair PayWord-based micropayment

  1. Reformulation and decomposition approaches for traffic routing in optical networks

    Networks

    Volume 67, Issue 4, July 2016, Pages: 277–298, Benoit Vignac, François Vanderbeck and Brigitte Jaumard

    Version of Record online : 4 APR 2016, DOI: 10.1002/net.21672

  2. Using a birth-and-death process to estimate the steady-state distribution of a periodic queue

    Naval Research Logistics (NRL)

    Volume 62, Issue 8, December 2015, Pages: 664–685, James Dong and Ward Whitt

    Version of Record online : 30 DEC 2015, DOI: 10.1002/nav.21672

  3. Uniform multicommodity flows in the hypercube with random edge-capacities

    Random Structures & Algorithms

    Volume 50, Issue 3, May 2017, Pages: 437–463, Colin McDiarmid, Alex Scott and Paul Withers

    Version of Record online : 7 NOV 2016, DOI: 10.1002/rsa.20672

  4. Intuitionistic Fuzzy Hybrid Weighted Aggregation Operators

    International Journal of Intelligent Systems

    Volume 29, Issue 11, November 2014, Pages: 971–993, Huchang Liao and Zeshui Xu

    Version of Record online : 22 AUG 2014, DOI: 10.1002/int.21672

  5. On Finite 2-Path-Transitive Graphs

    Journal of Graph Theory

    Volume 73, Issue 2, June 2013, Pages: 225–237, Cai Heng Li and Hua Zhang

    Version of Record online : 18 JUN 2012, DOI: 10.1002/jgt.21672

  6. An Approach to the Option Market Model Based on End-User Net Demand

    Journal of Futures Markets

    Volume 35, Issue 5, May 2015, Pages: 476–503, Hiroshi Sasaki

    Version of Record online : 24 MAR 2014, DOI: 10.1002/fut.21672

  7. Revenue Management of Reusable Resources with Advanced Reservations

    Production and Operations Management

    Volume 26, Issue 5, May 2017, Pages: 836–859, Yiwei Chen, Retsef Levi and Cong Shi

    Version of Record online : 27 JAN 2017, DOI: 10.1111/poms.12672

  8. A scalable certificateless architecture for multicast wireless mesh network using proxy re-encryption

    Security and Communication Networks

    Volume 7, Issue 1, January 2014, Pages: 14–32, Hongbing Wang, Zhenfu Cao and Lifei Wei

    Version of Record online : 30 MAY 2013, DOI: 10.1002/sec.720

  9. Bottom hole pressure estimation and ℒ1 adaptive control in managed pressure drilling system

    International Journal of Adaptive Control and Signal Processing

    Volume 31, Issue 4, April 2017, Pages: 545–561, Zhiyuan Li, Naira Hovakimyan and Glenn-Ole Kaasa

    Version of Record online : 17 FEB 2016, DOI: 10.1002/acs.2672

  10. Predicate encryption for multi-inner-products

    Security and Communication Networks

    Volume 6, Issue 3, March 2013, Pages: 325–339, Dongdong Sun, Colin Boyd and Juan Manuel Gonzalez Nieto

    Version of Record online : 21 JUN 2012, DOI: 10.1002/sec.566

  11. Friction dominated dynamics of interacting particles locally close to a crystallographic lattice

    Mathematical Methods in the Applied Sciences

    Volume 36, Issue 10, 15 July 2013, Pages: 1206–1228, M. Bodnar and J.J.L. Velázquez

    Version of Record online : 13 SEP 2012, DOI: 10.1002/mma.2672

  12. You have free access to this content
    Modeling soil heating and moisture transport under extreme conditions: Forest fires and slash pile burns

    Water Resources Research

    Volume 48, Issue 10, October 2012, W. J. Massman

    Version of Record online : 30 OCT 2012, DOI: 10.1029/2011WR011710

  13. A new generator of causal ideal internal dynamics for a class of unstable linear differential equations

    International Journal of Robust and Nonlinear Control

    Quan Quan and Kai-Yuan Cai

    Version of Record online : 13 OCT 2016, DOI: 10.1002/rnc.3672

  14. How to quantify the temporal storage effect using simulations instead of math

    Ecology Letters

    Volume 19, Issue 11, November 2016, Pages: 1333–1342, Stephen P. Ellner, Robin E. Snyder and Peter B. Adler

    Version of Record online : 28 SEP 2016, DOI: 10.1111/ele.12672

  15. Concentration and velocity profiles of sediment-water mixtures using the drift flux model

    The Canadian Journal of Chemical Engineering

    Volume 94, Issue 6, June 2016, Pages: 1048–1058, Joep C. Goeree, Geert H. Keetels, Edwin A. Munts, Hassan H. Bugdayci and Cees van Rhee

    Version of Record online : 4 MAY 2016, DOI: 10.1002/cjce.22491

  16. Selectively chosen ciphertext security in threshold public-key encryption

    Security and Communication Networks

    Volume 9, Issue 3, February 2016, Pages: 189–200, Kitak Kim, Jong Hwan Park and Dong Hoon Lee

    Version of Record online : 22 FEB 2012, DOI: 10.1002/sec.417

  17. Dimensionless performance and characteristic numbers of reverse flow diverters during reverse flow mode

    Asia-Pacific Journal of Chemical Engineering

    Volume 8, Issue 3, May/June 2013, Pages: 396–404, Cong Xu, Hui Yu and Xiangda Meng

    Version of Record online : 12 JUL 2012, DOI: 10.1002/apj.1672

  18. Hierarchical attribute-based encryption with continuous auxiliary inputs leakage

    Security and Communication Networks

    Volume 9, Issue 18, December 2016, Pages: 4852–4862, Yuyan Guo, Jiguo Li, Yichen Zhang and Jian Shen

    Version of Record online : 15 DEC 2016, DOI: 10.1002/sec.1659

  19. Run-to-run optimization of batch processes with self-optimizing control strategy

    The Canadian Journal of Chemical Engineering

    Volume 95, Issue 4, April 2017, Pages: 724–736, Lingjian Ye, Hongwei Guan, Xiaofeng Yuan and Xiushui Ma

    Version of Record online : 2 NOV 2016, DOI: 10.1002/cjce.22692

  20. A new certificateless authenticated key agreement protocol for SIP with different KGCs

    Security and Communication Networks

    Volume 6, Issue 5, May 2013, Pages: 631–643, Xiaowei Li, Yuqing Zhang and Geifei Zhang

    Version of Record online : 5 JUL 2012, DOI: 10.1002/sec.595