Search Results

There are 2602 results for: content related to: Sorites Without Vagueness I: Classificatory Sorites

  1. Unbiased reconstruction of the large-scale structure

    Monthly Notices of the Royal Astronomical Society

    Volume 331, Issue 4, April 2002, Pages: 901–908, Saleem Zaroubi

    Article first published online : 20 NOV 2002, DOI: 10.1046/j.1365-8711.2002.05229.x

  2. Mastering crosscutting architectural decisions with aspects

    Software: Practice and Experience

    Volume 43, Issue 3, March 2013, Pages: 305–332, Claudio Sant'Anna, Alessandro Garcia, Thais Batista and Awais Rashid

    Article first published online : 26 FEB 2012, DOI: 10.1002/spe.2113

  3. Vandermonde matrix analysis of long-period seismograms

    Geophysical Journal International

    Volume 146, Issue 3, September 2001, Pages: 843–849, Freeman Gilbert

    Article first published online : 20 DEC 2001, DOI: 10.1046/j.1365-246X.2001.00496.x

  4. Foreground component separation with generalized Internal Linear Combination

    Monthly Notices of the Royal Astronomical Society

    Volume 418, Issue 1, November 2011, Pages: 467–476, Mathieu Remazeilles, Jacques Delabrouille and Jean-François Cardoso

    Article first published online : 12 SEP 2011, DOI: 10.1111/j.1365-2966.2011.19497.x

  5. The Economic Effects of the EU Budget: A VAR Analysis

    JCMS: Journal of Common Market Studies

    Volume 46, Issue 5, December 2008, Pages: 933–968, PIERFEDERICO ASDRUBALI and SOYOUNG KIM

    Article first published online : 9 OCT 2008, DOI: 10.1111/j.1468-5965.2008.00825.x

  6. A formal analysis of Trusted Platform Module 2.0 hash-based message authentication code authorization under digital rights management scenario

    Security and Communication Networks

    Fajiang Yu, Huanguo Zhang, Bo Zhao, Juan Wang, Liqiang Zhang, Fei Yan and Zhenlin Chen

    Article first published online : 23 JAN 2015, DOI: 10.1002/sec.1193

  7. PHANtom: a modern aspect language for Pharo Smalltalk

    Software: Practice and Experience

    Volume 44, Issue 4, April 2014, Pages: 393–412, Johan Fabry and Daniel Galdames

    Article first published online : 19 MAR 2012, DOI: 10.1002/spe.2117

  8. A new certificateless signature scheme under enhanced security models

    Security and Communication Networks

    Kee Sung Kim and Ik Rae Jeong

    Article first published online : 26 MAY 2014, DOI: 10.1002/sec.1036

  9. Fréchet kernels for body-wave amplitudes

    Geophysical Journal International

    Volume 150, Issue 2, August 2002, Pages: 440–466, F. A. Dahlen and Adam M. Baig

    Article first published online : 19 JUL 2002, DOI: 10.1046/j.1365-246X.2002.01718.x

  10. One-move convertible nominative signature in the standard model

    Security and Communication Networks

    Dennis Y.W. Liu and Duncan S. Wong

    Article first published online : 4 JUL 2013, DOI: 10.1002/sec.812

  11. Authenticated key exchange with synchronized state

    Security and Communication Networks

    Volume 7, Issue 12, December 2014, Pages: 2373–2388, Zheng Yang and Fei Guo

    Article first published online : 10 MAR 2014, DOI: 10.1002/sec.948

  12. Timed-release oblivious transfer

    Security and Communication Networks

    Volume 7, Issue 7, July 2014, Pages: 1138–1149, Lingling Xu, Fangguo Zhang and Shaohua Tang

    Article first published online : 28 AUG 2013, DOI: 10.1002/sec.845

  13. Spatial Planning on the Semantic Web

    Transactions in GIS

    Volume 14, Issue 2, April 2010, Pages: 147–161, Rinke Hoekstra, Radboud Winkels and Erik Hupkes

    Article first published online : 15 APR 2010, DOI: 10.1111/j.1467-9671.2010.01188.x

  14. Generalized (identity-based) hash proof system and its applications

    Security and Communication Networks

    Yu Chen, Zongyang Zhang, Dongdai Lin and Zhenfu Cao

    Article first published online : 7 NOV 2013, DOI: 10.1002/sec.827

  15. A 3-D finite-element algorithm for DC resistivity modelling using the shifted incomplete Cholesky conjugate gradient method

    Geophysical Journal International

    Volume 154, Issue 3, September 2003, Pages: 947–956, Xiaoping Wu

    Article first published online : 20 AUG 2003, DOI: 10.1046/j.1365-246X.2003.02018.x

  16. Polydesigns and Causal Inference

    Biometrics

    Volume 62, Issue 2, June 2006, Pages: 343–351, Fan Li and Constantine E. Frangakis

    Article first published online : 15 DEC 2005, DOI: 10.1111/j.1541-0420.2005.00494.x

  17. Execution profiling blueprints

    Software: Practice and Experience

    Volume 42, Issue 9, September 2012, Pages: 1165–1192, Alexandre Bergel, Felipe Bañados, Romain Robbes and Walter Binder

    Article first published online : 15 SEP 2011, DOI: 10.1002/spe.1120

  18. Spectral estimation on a sphere in geophysics and cosmology

    Geophysical Journal International

    Volume 174, Issue 3, September 2008, Pages: 774–807, F. A. Dahlen and Frederik J. Simons

    Article first published online : 22 AUG 2008, DOI: 10.1111/j.1365-246X.2008.03854.x

  19. A model-based framework for building extensible, high performance stream processing middleware and programming language for IBM InfoSphere Streams

    Software: Practice and Experience

    Volume 42, Issue 11, November 2012, Pages: 1363–1391, Buğra Gedik and Henrique Andrade

    Article first published online : 13 NOV 2011, DOI: 10.1002/spe.1139

  20. Further improvement of a certificateless signature scheme without pairing

    International Journal of Communication Systems

    Volume 27, Issue 10, October 2014, Pages: 2083–2091, Peng Gong and Ping Li

    Article first published online : 22 OCT 2012, DOI: 10.1002/dac.2457