Pascal and Francis Bibliographic Databases

Help

Search results

Your search

kw.\*:("Esquema discreto")

Document Type [dt]

A-Z Z-A Frequency ↓ Frequency ↑
Export in CSV

Publication Year[py]

A-Z Z-A Frequency ↓ Frequency ↑
Export in CSV

Discipline (document) [di]

A-Z Z-A Frequency ↓ Frequency ↑
Export in CSV

Language

A-Z Z-A Frequency ↓ Frequency ↑
Export in CSV

Author Country

A-Z Z-A Frequency ↓ Frequency ↑
Export in CSV

Results 1 to 25 of 365

  • Page / 15
Export

Selection :

  • and

On robust Schur property of discrete-time polynomialsKATBAB, A; JURY, E. I; MANSOUR, M et al.IEEE Transactions on circuits and systems. I : Fundamental theory and applications. 1992, Vol 39, Num 6, pp 467-470Article

LA MODELISATION PAR DES GAZ DISCRETS DES PHENOMENES D'EVAPORATION/CONDENSATION = DISCRETE VELOCITY MODELS FOR THE RAREFIED GAS AND APPLICATIONS TO EVAPORATION/CONDENSATION PROBLEMSNicodin, Ioana; Gatignol, Renée.2001, 209 p.Thesis

SOME RESULTS ON TROPICAL COMPACTIFICATIONSLUXTON, Mark; ZHENHUA QU.Transactions of the American Mathematical Society. 2011, Vol 363, Num 9, pp 4853-4876, issn 0002-9947, 24 p.Article

A robust (k,n) + 1 threshold proxy signature scheme based on factoringRONGXING LU; ZHENFU CAO; HAOJIN ZHU et al.Applied mathematics and computation. 2005, Vol 166, Num 1, pp 35-45, issn 0096-3003, 11 p.Article

Robust key authentication scheme resistant to public key substitution attacksWU, Tzong-Sun; LIN, Han-Yu.Applied mathematics and computation. 2004, Vol 157, Num 3, pp 825-833, issn 0096-3003, 9 p.Article

Reconstruction of convex 2D discrete sets in polynomial timeKUBA, Attila; BALOGH, Emese.Theoretical computer science. 2002, Vol 283, Num 1, pp 223-242, issn 0304-3975Conference Paper

Guaranteed discrimination of discrete stochastic processes by using a lower order extrapolatorDOMBROVSKI, V. V.Soviet journal of communications technology & electronics. 1992, Vol 37, Num 6, pp 74-82, issn 8756-6648Article

Insensitivity in discrete time queues with a moving serverHENDERSON, W; TAYLOR, P. G.Queueing systems. 1992, Vol 11, Num 3, pp 273-297, issn 0257-0130Article

On the unimodality of discrete probability measuresBERTIN, E; THEODORESCU, R.Mathematische Zeitschrift. 1989, Vol 201, Num 1, pp 131-137, issn 0025-5874, 7 p.Article

A construction of non-isomorphic amorphous association schemes from pseudo-cyclic association schemesFUJISAKI, Tatsuya.Discrete mathematics. 2008, Vol 308, Num 14, pp 2944-2948, issn 0012-365X, 5 p.Conference Paper

Threshold undeniable signature scheme based on conicRONG XING LU; ZHEN FU CAO; YUAN ZHOU et al.Applied mathematics and computation. 2005, Vol 162, Num 1, pp 165-177, issn 0096-3003, 13 p.Article

On the K-theory and topological cyclic homology of smooth schemes over a discrete valuation ringGEISSER, Thomas; HESSELHOLT, Lars.Transactions of the American Mathematical Society. 2006, Vol 358, Num 1, pp 131-145, issn 0002-9947, 15 p.Article

Space localization and well-balanced schemes for discrete kinetic models in diffusive regimesGOSSE, Laurent; TOSCANIT, Giuseppe.SIAM journal on numerical analysis. 2004, Vol 41, Num 2, pp 641-658, issn 0036-1429, 18 p.Article

Minimizing the expected minimumMALLOWS, Colin L.Advances in applied mathematics (Print). 2003, Vol 31, Num 1, pp 180-192, issn 0196-8858, 13 p.Article

Design of reliable decentralized controllers: a unified continuous/discrete formulationSHOR, M. H; PERKINS, W. R; MEDANIC, J. V et al.International Journal of Control. 1992, Vol 56, Num 4, pp 943-965, issn 0020-7179Article

Classifications of discrete livesROY, D; GUPTA, R. P.Microelectronics and reliability. 1992, Vol 32, Num 10, pp 1459-1473, issn 0026-2714Article

Meta-He digital signatures based on factoring and discrete logarithmsPON, Shun-Fu; LU, Erl-Huei; JENG, Albert B et al.Applied mathematics and computation. 2005, Vol 165, Num 1, pp 171-176, issn 0096-3003, 6 p.Article

Cryptanalysis and improvement of the Tzeng-Hwang authenticated encryption scheme based on elliptic curve discrete logarithm problemHSU, Chien-Lung.Applied mathematics and computation. 2005, Vol 167, Num 2, pp 882-890, issn 0096-3003, 9 p.Article

GQ and Schnorr identification schemes: Proofs of security against impersonation under active and concurrent attacksBELLARE, Mihir; PALACIO, Adriana.Lecture notes in computer science. 2002, pp 162-177, issn 0302-9743, isbn 3-540-44050-X, 16 p.Conference Paper

Discrete shock profiles and their stabilitySERRE, D.International series of numerical mathematics. 1999, pp 843-853, issn 0373-3149, isbn 3-7643-6080-1, 2VolConference Paper

Comparison of several discrete arithmetic schemes for simulating a constrained jet and a lab-scale tangential fired furnaceZHOU, X.-Y; ZHENG, C.-G; MA, Y.-Y et al.Computer methods in applied mechanics and engineering. 1996, Vol 130, Num 3-4, pp 279-288, issn 0045-7825Article

Lower bounds for the solution of the discrete algebraic Lyapunov equationKOMAROFF, N.IEEE transactions on automatic control. 1992, Vol 37, Num 7, pp 1017-1018, issn 0018-9286Article

Etude des solutions des équations de Boltzmann discrètes et applications = Study of solutions of discrete Boltzmann equations and applicationsD'Almeida, Amah Sena; Gatignol, R.1995, 250 p.Thesis

Limite hydrodynamique des modèles discrets et semidiscrets de l'équation de Boltzmann = Hydrodynamical limit of discrets and semidiscrets models of the Boltzmann equationHammouch, Jillal; Bardos, C.1995, 104 p.Thesis

On the existence of finite-dimensional filters in discrete timeFERRANTE, M.Stochastics and stochastics reports (Print). 1992, Vol 40, Num 3-4, pp 169-179, issn 1045-1129Article

  • Page / 15