UM

Browse/Search Results:  1-4 of 4 Help

Selected(0)Clear Items/Page:    Sort:
Efficient authentication protocol using elliptic curve with user anonymity for heterogeneous wireless networks Journal article
Jiang C., Jia W., Gu K.. Efficient authentication protocol using elliptic curve with user anonymity for heterogeneous wireless networks[J]. Journal of Information and Computational Science, 2012, 9(4), 1055-1061.
Authors:  Jiang C.;  Jia W.;  Gu K.
Favorite |  | Submit date:2019/02/11
Anonymous authentication  Elliptic curve  Group signature  Heterogeneous wireless networks  
Improved variance shadow maps based on non-linear wrapping Journal article
Lv W., Liu X., Wu E.. Improved variance shadow maps based on non-linear wrapping[J]. Journal of Information and Computational Science, 2008, 5(6), 2415-2421.
Authors:  Lv W.;  Liu X.;  Wu E.
Favorite |  | Submit date:2019/02/13
Anti-aliasing  Shadow maps  Variance shadow maps  
Decomposition algorithm of LS-SVM: Combination optimization Journal article
Zeng S., Tang Y.Y.. Decomposition algorithm of LS-SVM: Combination optimization[J]. Journal of Information and Computational Science, 2007, 4(3), 913-919.
Authors:  Zeng S.;  Tang Y.Y.
Favorite |  | Submit date:2019/02/11
Combination optimization algorithm  Decomposition algorithm  LS-SVM  
On the solution to singular integral equations with logarithmic kernel based on wavelet Journal article
Cui L., Liao F., Tang Y.. On the solution to singular integral equations with logarithmic kernel based on wavelet[J]. Journal of Information and Computational Science, 2006, 3(1), 1-14.
Authors:  Cui L.;  Liao F.;  Tang Y.
Favorite |  | Submit date:2019/02/11
Fourier approximation  Galerkin  Periodic wavelet  Tikhonov regularization  Weak singular integral equation