Search Results

There are 5342 results for: content related to: Sorites Without Vagueness I: Classificatory Sorites

  1. One-move convertible nominative signature in the standard model

    Security and Communication Networks

    Volume 9, Issue 12, August 2016, Pages: 1796–1809, Dennis Y. W. Liu and Duncan S. Wong

    Version of Record online : 4 JUL 2013, DOI: 10.1002/sec.812

  2. Properties of the offshore low level jet and rotor layer wind shear as measured by scanning Doppler Lidar

    Wind Energy

    Volume 20, Issue 6, June 2017, Pages: 987–1002, Y. L. Pichugina, W. A. Brewer, R. M. Banta, A. Choukulkar, C. T. M. Clack, M. C. Marquis, B. J. McCarty, A. M. Weickmann, S. P. Sandberg, R. D. Marchbanks and R. M. Hardesty

    Version of Record online : 6 DEC 2016, DOI: 10.1002/we.2075

  3. C-strider: type-aware heap traversal for C

    Software: Practice and Experience

    Volume 46, Issue 6, June 2016, Pages: 767–788, Karla Saur, Michael Hicks and Jeffrey S. Foster

    Version of Record online : 14 MAY 2015, DOI: 10.1002/spe.2332

  4. An Algebra for Spatiotemporal Data: From Observations to Events

    Transactions in GIS

    Volume 18, Issue 2, April 2014, Pages: 253–269, Karine Reis Ferreira, Gilberto Camara and Antônio Miguel Vieira Monteiro

    Version of Record online : 22 MAY 2013, DOI: 10.1111/tgis.12030

  5. Effects of Gender on Costly Punishment

    Journal of Behavioral Decision Making

    Laura Mieth, Axel Buchner and Raoul Bell

    Version of Record online : 12 APR 2017, DOI: 10.1002/bdm.2012

  6. Exporting and Upgrading of Product Portfolio: Evidence from Korea, Japan and Indonesia*

    Asian Economic Journal

    Volume 30, Issue 4, December 2016, Pages: 349–373, Chin Hee Hahn, Keiko Ito and Dionisius Narjoko

    Version of Record online : 15 DEC 2016, DOI: 10.1111/asej.12104

  7. A formal analysis of Trusted Platform Module 2.0 hash-based message authentication code authorization under digital rights management scenario

    Security and Communication Networks

    Volume 9, Issue 15, October 2016, Pages: 2802–2815, Fajiang Yu, Huanguo Zhang, Bo Zhao, Juan Wang, Liqiang Zhang, Fei Yan and Zhenlin Chen

    Version of Record online : 23 JAN 2015, DOI: 10.1002/sec.1193

  8. Generalized (identity-based) hash proof system and its applications

    Security and Communication Networks

    Volume 9, Issue 12, August 2016, Pages: 1698–1716, Yu Chen, Zongyang Zhang, Dongdai Lin and Zhenfu Cao

    Version of Record online : 7 NOV 2013, DOI: 10.1002/sec.827

  9. You have full text access to this OnlineOpen article
    A generic parallel pattern interface for stream and data processing

    Concurrency and Computation: Practice and Experience

    David del Rio Astorga, Manuel F. Dolz, Javier Fernández and J. Daniel García

    Version of Record online : 29 MAY 2017, DOI: 10.1002/cpe.4175

  10. LOGICAL RELATIONS

    Philosophical Perspectives

    Volume 27, Issue 1, December 2013, Pages: 175–230, Lloyd Humberstone

    Version of Record online : 29 DEC 2013, DOI: 10.1111/phpe.12021

  11. A generic static analyzer for multithreaded Java programs

    Software: Practice and Experience

    Volume 43, Issue 6, June 2013, Pages: 663–684, P. Ferrara

    Version of Record online : 9 MAY 2012, DOI: 10.1002/spe.2126

  12. Secure universal designated verifier identity-based signcryption

    Security and Communication Networks

    Volume 7, Issue 2, February 2014, Pages: 434–444, Changlu Lin, Fei Tang, Pinhui Ke, Lein Harn and Shengyuan Zhang

    Version of Record online : 28 JUN 2013, DOI: 10.1002/sec.820

  13. PHANtom: a modern aspect language for Pharo Smalltalk

    Software: Practice and Experience

    Volume 44, Issue 4, April 2014, Pages: 393–412, Johan Fabry and Daniel Galdames

    Version of Record online : 19 MAR 2012, DOI: 10.1002/spe.2117

  14. You have free access to this content
    XIV International Conference

    Journal of Analytical Psychology

    Volume 62, Issue 1, February 2017, Pages: 178–180,

    Version of Record online : 16 JAN 2017, DOI: 10.1111/1468-5922.12287

  15. Authenticated key exchange with synchronized state

    Security and Communication Networks

    Volume 7, Issue 12, December 2014, Pages: 2373–2388, Zheng Yang and Fei Guo

    Version of Record online : 10 MAR 2014, DOI: 10.1002/sec.948

  16. Existence and uniqueness of solutions for the magnetohydrodynamic flow of a second grade fluid

    Mathematical Methods in the Applied Sciences

    Volume 36, Issue 4, 15 March 2013, Pages: 478–496, K. Hamdache and B. Jaffal-Mourtada

    Version of Record online : 21 JUN 2012, DOI: 10.1002/mma.2608

  17. Analysis of cosmic microwave background data on an incomplete sky

    Monthly Notices of the Royal Astronomical Society

    Volume 330, Issue 2, February 2002, Pages: 405–420, Daniel J. Mortlock, Anthony D. Challinor and Michael P. Hobson

    Version of Record online : 4 APR 2002, DOI: 10.1046/j.1365-8711.2002.05085.x

  18. A suite of abstract domains for static analysis of string values

    Software: Practice and Experience

    Volume 45, Issue 2, February 2015, Pages: 245–287, Giulia Costantini, Pietro Ferrara and Agostino Cortesi

    Version of Record online : 16 AUG 2013, DOI: 10.1002/spe.2218

  19. A new efficient signcryption scheme in the standard model

    Security and Communication Networks

    Volume 8, Issue 5, 25 March 2015, Pages: 778–789, Zheng Yang

    Version of Record online : 7 MAY 2014, DOI: 10.1002/sec.1034

  20. Some theoretical considerations on predictability of linear stochastic dynamics

    Tellus A

    Volume 55, Issue 2, March 2003, Pages: 148–157, MICHAEL K. TIPPETT and PING CHANG

    Version of Record online : 14 FEB 2003, DOI: 10.1034/j.1600-0870.2003.00008.x