default search action
Search dblp
Full-text search
- > Home
Please enter a search query
- case-insensitive prefix search: default
e.g., sig matches "SIGIR" as well as "signal" - exact word search: append dollar sign ($) to word
e.g., graph$ matches "graph", but not "graphics" - boolean and: separate words by space
e.g., codd model - boolean or: connect words by pipe symbol (|)
e.g., graph|network
Update May 7, 2017: Please note that we had to disable the phrase search operator (.) and the boolean not operator (-) due to technical problems. For the time being, phrase search queries will yield regular prefix search result, and search terms preceded by a minus will be interpreted as regular (positive) search terms.
Author search results
no matches
Venue search results
no matches
Refine list
refine by author
- no options
- temporarily not available
refine by venue
- no options
- temporarily not available
refine by type
- no options
- temporarily not available
refine by access
- no options
- temporarily not available
refine by year
- no options
- temporarily not available
Publication search results
found 89 matches
- 2005
- Saeid Abbasbandy, Mohammad Taghi Darvishi:
A numerical solution of Burgers' equation by modified Adomian method. Appl. Math. Comput. 163(3): 1265-1272 (2005) - Bashir Ahmad:
Sub Mach-1 sound due to an arbitrary time dependent source near an absorbing half plane. Appl. Math. Comput. 163(1): 39-50 (2005) - Rais Ahmad, Abul Hasan Siddiqi, Zubair Khan:
Proximal point algorithm for generalized multivalued nonlinear quasi-variational-like inclusions in Banach spaces. Appl. Math. Comput. 163(1): 295-308 (2005) - Elsayed Ahmed, A. S. Hegazi, Ahmed S. Elgazzar:
On some variants of prisoner's dilemma dynamics. Appl. Math. Comput. 163(1): 163-168 (2005) - Fikri Akdeniz, Fikri Öztürk:
The distribution of stochastic shrinkage biasing parameters of the Liu type estimator. Appl. Math. Comput. 163(1): 29-38 (2005) - Tofigh Allahviranloo:
The Adomian decomposition method for fuzzy system of linear equations. Appl. Math. Comput. 163(2): 553-563 (2005) - Alireza Amirteimoori, Sohrab Kordrostami:
Efficient surfaces and an efficiency index in DEA: a constant returns to scale. Appl. Math. Comput. 163(2): 683-691 (2005) - Alireza Amirteimoori, Sohrab Kordrostami:
DEA-like models for multi-component performance measurement. Appl. Math. Comput. 163(2): 735-743 (2005) - Hazem Ali Attia:
Numerical study of flow and heat transfer of a non-Newtonian fluid on a rotating porous disk. Appl. Math. Comput. 163(1): 327-342 (2005) - Zahra Naji Azimi:
Hybrid heuristics for Examination Timetabling problem. Appl. Math. Comput. 163(2): 705-733 (2005) - Kwang June Bai, Sang-Mok Choo, Sang K. Chung, Do Young Kim:
Numerical solutions for nonlinear free surface flows by finite element methods. Appl. Math. Comput. 163(2): 941-959 (2005) - Ayman Baklizi:
Preliminary test estimation in the two parameter exponential distribution with time censored data. Appl. Math. Comput. 163(2): 639-643 (2005) - Roberto Barrio:
Performance of the Taylor series method for ODEs/DAEs. Appl. Math. Comput. 163(2): 525-545 (2005) - Aziz Belmiloudi, Gregory Le Meur:
Mathematical and numerical analysis of dehydratation of gypsum plasterboards exposed to fire. Appl. Math. Comput. 163(3): 1023-1041 (2005) - Jafar Biazar, H. Ebrahimi:
An approximation to the solution of hyperbolic equations by Adomian decomposition method and comparison with characteristics method. Appl. Math. Comput. 163(2): 633-638 (2005) - Jafar Biazar, Roya Montazeri:
A computational method for solution of the prey and predator problem. Appl. Math. Comput. 163(2): 841-847 (2005) - Necdet Bildik, Hatice Bayramoglu:
The solution of two dimensional nonlinear differential equation by the Adomian decomposition method. Appl. Math. Comput. 163(2): 519-524 (2005) - Necdet Bildik, Sevil Özlü:
On the numerical solution of Helmholtz equation by alternating group explicit (AGE) methods. Appl. Math. Comput. 163(1): 505-518 (2005) - Josef A. Boguslavskiy:
The algorithms of the organized search for identification of parameters of models of nonlinear dynamic system. Appl. Math. Comput. 163(1): 357-372 (2005) - Iliya A. Brayanov:
Uniformly convergent finite volume difference scheme for 2D convection-dominated problem with discontinuous coefficients. Appl. Math. Comput. 163(2): 645-665 (2005) - Ting Yi Chang, Min-Shiang Hwang, Wei-Pang Yang:
An improvement on the Lin-Wu (t, n) threshold verifiable multi-secret sharing scheme. Appl. Math. Comput. 163(1): 169-178 (2005) - Yu-Yi Chen, Jinn-ke Jan, Chin-Ling Chen:
A novel proxy deposit protocol for e-cash systems. Appl. Math. Comput. 163(2): 869-877 (2005) - Yong-Lin Chen, Xue-Yuan Tan:
Computing generalized inverses of matrices by iterative methods based on splittings of matrices. Appl. Math. Comput. 163(1): 309-325 (2005) - YoungJu Choie, Eunkyung Jeong, Eunjeong Lee:
Supersingular hyperelliptic curves of genus 2 over finite fields. Appl. Math. Comput. 163(2): 565-576 (2005) - Ethelbert Nwakuche Chukwu:
Cooperation and competition in modeling the dynamics of gross-domestic products of nations. Appl. Math. Comput. 163(2): 991-1021 (2005) - Damian Clancy, Alexei B. Piunovskiy:
An explicit optimal isolation policy for a deterministic epidemic model. Appl. Math. Comput. 163(3): 1109-1121 (2005) - Idris Dag, Dursun Irk, Bülent Saka:
A numerical solution of the Burgers' equation using cubic B-splines. Appl. Math. Comput. 163(1): 199-211 (2005) - Thomas K. DeLillo, Alan R. Elcrat, Chenglie Hu:
Computation of the Helmholtz-Kirchhoff and reentrant jet flows using Fourier series. Appl. Math. Comput. 163(1): 397-422 (2005) - A. Abd El-Shafy, Mamdouh Elkady:
On existence of unique solution to non-linear integral equations of the second kind. Appl. Math. Comput. 163(2): 801-809 (2005) - Ali Asghar Foroughi, Dylan F. Jones, Mehrdad Tamiz:
A selection method for a preferential election. Appl. Math. Comput. 163(1): 107-116 (2005)
skipping 59 more matches
loading more results
failed to load more results, please try again later
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
retrieved on 2024-11-20 08:41 CET from data curated by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint