Search Results

There are 12897 results for: content related to: Discovering anomaly on the basis of flow estimation of alert feature distribution

  1. A finite element-based constrained mixture implementation for arterial growth, remodeling, and adaptation: Theory and numerical verification

    International Journal for Numerical Methods in Biomedical Engineering

    Volume 29, Issue 8, August 2013, Pages: 822–849, A. Valentín, J.D. Humphrey and G.A. Holzapfel

    Version of Record online : 24 MAY 2013, DOI: 10.1002/cnm.2555

  2. Traceable attribute-based signcryption

    Security and Communication Networks

    Volume 7, Issue 12, December 2014, Pages: 2302–2317, Jianghong Wei, Xuexian Hu and Wenfen Liu

    Version of Record online : 16 DEC 2013, DOI: 10.1002/sec.940

  3. Generalized Mann–Whitney Type Tests for Microarray Experiments

    Scandinavian Journal of Statistics

    Volume 41, Issue 3, September 2014, Pages: 672–692, Daniel Fischer, Hannu Oja, Johanna Schleutker, Pranab K. Sen and Tiina Wahlfors

    Version of Record online : 20 DEC 2013, DOI: 10.1111/sjos.12055

  4. Four techniques based on the B-spline expansion and the collocation approach for the numerical solution of the Lane–Emden equation

    Mathematical Methods in the Applied Sciences

    Volume 36, Issue 16, 15 November 2013, Pages: 2243–2253, Mehrdad Lakestani and Mehdi Dehghan

    Version of Record online : 21 JAN 2013, DOI: 10.1002/mma.2755

  5. ASYMPTOTIC INFERENCES FOR AN AR(1) MODEL WITH A CHANGE POINT: STATIONARY AND NEARLY NON-STATIONARY CASES

    Journal of Time Series Analysis

    Volume 35, Issue 2, March 2014, Pages: 133–150, Tianxiao Pang, Danna Zhang and Terence Tai-Leung Chong

    Version of Record online : 7 DEC 2013, DOI: 10.1111/jtsa.12055

  6. One-move convertible nominative signature in the standard model

    Security and Communication Networks

    Dennis Y.W. Liu and Duncan S. Wong

    Version of Record online : 4 JUL 2013, DOI: 10.1002/sec.812

  7. Generalized (identity-based) hash proof system and its applications

    Security and Communication Networks

    Yu Chen, Zongyang Zhang, Dongdai Lin and Zhenfu Cao

    Version of Record online : 7 NOV 2013, DOI: 10.1002/sec.827

  8. A fixed point model for rate control and routing in cloud data center networks

    Security and Communication Networks

    Volume 7, Issue 9, September 2014, Pages: 1420–1436, Bo Li, Xuefeng Ma, Jianming Li and Zhou Zong

    Version of Record online : 16 DEC 2013, DOI: 10.1002/sec.878

  9. Dynamic behavior of the discrete-time double integrator with saturated locally stabilizing linear state feedback laws

    International Journal of Robust and Nonlinear Control

    Volume 23, Issue 17, 25 November 2013, Pages: 1899–1931, Tao Yang, Anton A. Stoorvogel and Ali Saberi

    Version of Record online : 22 JUN 2012, DOI: 10.1002/rnc.2855

  10. Stability and consistency of nonhydrostatic free-surface models using the semi-implicit θ-method

    International Journal for Numerical Methods in Fluids

    Volume 72, Issue 5, 20 June 2013, Pages: 550–582, Sean Vitousek and Oliver B. Fringer

    Version of Record online : 21 NOV 2012, DOI: 10.1002/fld.3755

  11. Adaptive iterative learning control for coordination of second-order multi-agent systems

    International Journal of Robust and Nonlinear Control

    Volume 24, Issue 18, December 2014, Pages: 3282–3299, Jinsha Li and Junmin Li

    Version of Record online : 16 JUL 2013, DOI: 10.1002/rnc.3055

  12. On the efficiency of two-stage response-adaptive designs

    Statistics in Medicine

    Volume 32, Issue 10, 10 May 2013, Pages: 1646–1660, Holger Dette, Björn Bornkamp and Frank Bretz

    Version of Record online : 2 AUG 2012, DOI: 10.1002/sim.5555

  13. On cross-correlation properties of S-boxes and their design using semi-bent functions

    Security and Communication Networks

    Volume 8, Issue 5, 25 March 2015, Pages: 790–800, Enes Pasalic, Samed Bajrić and Milan Djordjević

    Version of Record online : 26 MAY 2014, DOI: 10.1002/sec.1035

  14. Mitigation of peer-to-peer overlay attacks in the automatic metering infrastructure of smart grids

    Security and Communication Networks

    Volume 8, Issue 3, February 2015, Pages: 343–359, Cristina Rottondi, Marco Savi, Giacomo Verticale and Christoph Krauß

    Version of Record online : 17 MAR 2014, DOI: 10.1002/sec.983

  15. Privacy preserving revocable predicate encryption revisited

    Security and Communication Networks

    Volume 8, Issue 3, February 2015, Pages: 471–485, Kwangsu Lee, Intae Kim and Seong Oun Hwang

    Version of Record online : 21 MAR 2014, DOI: 10.1002/sec.994

  16. A more secure and efficient Andrew Secure RPC protocol

    Security and Communication Networks

    Volume 7, Issue 11, November 2014, Pages: 2063–2077, Sirapat Boonkrong

    Version of Record online : 14 NOV 2013, DOI: 10.1002/sec.918

  17. Existence of bounds for dark solitons in a class of nonlinear Schrödinger equations: explicit upper and lower bounds

    Mathematical Methods in the Applied Sciences

    Volume 36, Issue 8, 30 May 2013, Pages: 974–982, J. Belmonte-Beitia

    Version of Record online : 27 JUL 2012, DOI: 10.1002/mma.2655

  18. Yet another attack on the chinese remainder theorem-based hierarchical access control scheme

    Security and Communication Networks

    Volume 7, Issue 7, July 2014, Pages: 1079–1095, Niu Liu, Shaohua Tang and Lingling Xu

    Version of Record online : 5 JUL 2013, DOI: 10.1002/sec.837

  19. Decentralized adaptive control of nonlinear large-scale pure-feedback interconnected systems with time-varying delays

    International Journal of Adaptive Control and Signal Processing

    Volume 29, Issue 1, January 2015, Pages: 24–40, Chao He, Junmin Li and Lin Zhang

    Version of Record online : 5 DEC 2013, DOI: 10.1002/acs.2455

  20. Wave-breaking phenomenon for a generalized spatially periodic Camassa–Holm system

    Mathematical Methods in the Applied Sciences

    Volume 38, Issue 7, 15 May 2015, Pages: 1405–1417, Shengqi Yu

    Version of Record online : 14 APR 2014, DOI: 10.1002/mma.3155