Search Results

There are 12430 results for: content related to: Key Predistribution Scheme for Clustered Hierarchical Wireless Sensor Networks based on Combinatorial Designs

  1. Reliability enhancement for CIR-based physical layer authentication

    Security and Communication Networks

    Volume 8, Issue 4, 10 March 2015, Pages: 661–671, Jiazi Liu, Ahmed Refaey, Xianbin Wang and Helen Tang

    Article first published online : 7 MAY 2014, DOI: 10.1002/sec.1014

  2. A stability-dependent parametrization of transfer coefficients for momentum and heat over polar sea ice to be used in climate models

    Journal of Geophysical Research: Atmospheres

    Volume 120, Issue 2, 27 January 2015, Pages: 552–581, Christof Lüpkes and Vladimir M. Gryanik

    Article first published online : 28 JAN 2015, DOI: 10.1002/2014JD022418

  3. Gasoline engine air filter health monitoring by second-order sliding modes

    International Journal of Adaptive Control and Signal Processing

    Volume 27, Issue 6, June 2013, Pages: 447–461, Qadeer Ahmed, Aamer Iqbal Bhatti, Muddassar Abbas Rizvi and Mohsin Raza

    Article first published online : 26 JUN 2012, DOI: 10.1002/acs.2314

  4. Nonlinear convex and concave relaxations for the solutions of parametric ODEs

    Optimal Control Applications and Methods

    Volume 34, Issue 2, March/April 2013, Pages: 145–163, Joseph K. Scott, Benoit Chachuat and Paul I. Barton

    Article first published online : 14 JAN 2012, DOI: 10.1002/oca.2014

  5. Adaptive Output Feedback based Output Tracking Control for a Time-Delay System with a PFC

    Asian Journal of Control

    I. Mizumoto and T. Takagi

    Article first published online : 23 OCT 2014, DOI: 10.1002/asjc.1014

  6. Computationally efficient simultaneous policy update algorithm for nonlinear H state feedback control with Galerkin's method

    International Journal of Robust and Nonlinear Control

    Volume 23, Issue 9, June 2013, Pages: 991–1012, Biao Luo and Huai-Ning Wu

    Article first published online : 16 APR 2012, DOI: 10.1002/rnc.2814

  7. Global classical solutions of viscous liquid–gas two-phase flow model

    Mathematical Methods in the Applied Sciences

    Volume 36, Issue 5, 30 March 2013, Pages: 567–583, Haibo Cui, Huanyao Wen and Haiyan Yin

    Article first published online : 19 JUN 2012, DOI: 10.1002/mma.2614

  8. Channel capacity and bit error rate optimization of the ultra-wide bandwidth transmitted-reference receiver

    Wireless Communications and Mobile Computing

    Volume 13, Issue 18, 25 December 2013, Pages: 1657–1670, Shuyi Wang, Yunfei Chen, Mark Leeson and Norman C. Beaulieu

    Article first published online : 4 NOV 2011, DOI: 10.1002/wcm.1214

  9. Time-dependent finite element simulations of a shear-thinning viscoelastic fluid with application to blood flow

    International Journal for Numerical Methods in Fluids

    Volume 75, Issue 9, 30 July 2014, Pages: 668–686, I. G. Donev and B. D. Reddy

    Article first published online : 14 MAY 2014, DOI: 10.1002/fld.3914

  10. A mathematical and physical Study of multiscale deconvolution models of turbulence

    Mathematical Methods in the Applied Sciences

    Volume 35, Issue 10, 15 July 2012, Pages: 1205–1219, Argus Adrian Dunca, Kara E. Kohler, Monika Neda and Leo G. Rebholz

    Article first published online : 7 JUN 2012, DOI: 10.1002/mma.2514

  11. Comparison of three accelerated FFT-based schemes for computing the mechanical response of composite materials

    International Journal for Numerical Methods in Engineering

    Volume 97, Issue 13, 30 March 2014, Pages: 960–985, H. Moulinec and F. Silva

    Article first published online : 16 JAN 2014, DOI: 10.1002/nme.4614

  12. Gel'fand–Tsetlin bases of orthogonal polynomials in Hermitean Clifford analysis

    Mathematical Methods in the Applied Sciences

    Volume 34, Issue 17, 30 November 2011, Pages: 2167–2180, F. Brackx, H. De Schepper, R. Lávička and V. Souček

    Article first published online : 3 NOV 2011, DOI: 10.1002/mma.1514

  13. An improved and provable remote user authentication scheme based on elliptic curve cryptosystem with user anonymity

    Security and Communication Networks

    Volume 8, Issue 2, 25 January 2015, Pages: 245–260, Lili Xu and Fan Wu

    Article first published online : 10 MAR 2014, DOI: 10.1002/sec.977

  14. Validation of the actuator line method using near wake measurements of the MEXICO rotor

    Wind Energy

    Volume 18, Issue 3, March 2015, Pages: 499–514, Karl Nilsson, Wen Z. Shen, Jens N. Sørensen, Simon-Philippe Breton and Stefan Ivanell

    Article first published online : 29 JAN 2014, DOI: 10.1002/we.1714

  15. n-Evasive all-but-many lossy trapdoor function and its constructions

    Security and Communication Networks

    Volume 8, Issue 4, 10 March 2015, Pages: 550–564, Zhengan Huang, Shengli Liu and Kefei Chen

    Article first published online : 4 APR 2014, DOI: 10.1002/sec.1002

  16. A new multi-use multi-secret sharing scheme based on the duals of minimal linear codes

    Security and Communication Networks

    Volume 8, Issue 2, 25 January 2015, Pages: 202–211, Yun Song, Zhihui Li, Yongming Li and Jing Li

    Article first published online : 19 MAR 2014, DOI: 10.1002/sec.972

  17. Mitigation of peer-to-peer overlay attacks in the automatic metering infrastructure of smart grids

    Security and Communication Networks

    Volume 8, Issue 3, February 2015, Pages: 343–359, Cristina Rottondi, Marco Savi, Giacomo Verticale and Christoph Krauß

    Article first published online : 17 MAR 2014, DOI: 10.1002/sec.983

  18. A scaling relation for warm-phase orographic precipitation: a Lagrangian analysis for 2D mountains

    Quarterly Journal of the Royal Meteorological Society

    Annette K. Miltenberger, Axel Seifert, Hanna Joos and Heini Wernli

    Article first published online : 4 MAR 2015, DOI: 10.1002/qj.2514

  19. Mechanisms to locate noncooperative transmitters in wireless networks based on residual signal strengths

    Security and Communication Networks

    Volume 7, Issue 11, November 2014, Pages: 1788–1804, Éric Barthélémy and Jean-Marc Robert

    Article first published online : 24 OCT 2013, DOI: 10.1002/sec.877

  20. Secure transmission for big data based on nested sampling and coprime sampling with spectrum efficiency

    Security and Communication Networks

    Junjie Chen, Qilian Liang and Jie Wang

    Article first published online : 10 MAY 2013, DOI: 10.1002/sec.785