default search action
IJCM: CST, Volume 5
Volume 5, Number 1, January 2020
- Yufei Huang, Weihua He, Guixian Huang, Hong-Jian Lai, Sulin Song:
A characterization of graphs with supereulerian line graphs. 1-14 - Ramón Flores, Delaram Kahrobaei, Thomas Koberda:
A cryptographic application of the Thurston norm. 15-24 - Guanqin Lian, Shuming Zhou, Eddie Cheng, Jiafei Liu, Gaolin Chen, Zhendong Gu:
Reliability and conditional diagnosability of hyper bijective connection networks. 25-47 - Elham Abdali, Reza Fallahnejad:
A bargaining game model for measuring efficiency of two-stage network DEA with non-discretionary inputs. 48-59
Volume 5, Number 2, April 2020
- Hong Zhang, Laijiang Zhang, Jixiang Meng:
Hybrid fault diagnosis capability analysis of regular graphs under the PMC model. 61-71 - Wu-Lin Chen, Kuo-Hsiung Wang:
Reliability and sensitivity analysis of a retrial machine repair problem with warm standbys and imperfect coverage. 72-86 - Masaaki Harada:
Construction of s-extremal optimal unimodular lattices in dimension 52. 87-91 - Amir Khamseh:
A note on (t - 1)-chromatic Ramsey number of linear forests. 92-97 - James Hallas, Maria Talanda-Fisher, Ping Zhang:
Dominating functions in graphs - regularity versus irregularity. 98-111 - Eddie Cheng, Ke Qiu, Zhizhang Shen:
The g-extra diagnosability of the generalized exchanged hypercube. 112-123
Volume 5, Number 3, 2020
- Chun-Nan Hung, Mohamad Abdallah, Jui-I Weng, Tzu-Liang Kung:
Edge-pancyclicity of pancake graph. 125-133
- Chuan-Min Lee:
The complexity of total k-domatic partition and total R-domination on graphs with weak elimination orderings. 134-147 - Sean Bailey, David Brown:
Bipartite dot product graphs. 148-158 - Sourav Pradhan:
A discrete-time batch transmission channel with random serving capacity under batch-size-dependent service. 175-197 - Sujit Kumar Samanta, B. Bank:
Analysis of stationary queue-length distributions of the BMAP/R(a, b)/1 queue. 198-223
Volume 5, Number 4, 2020
- R. Kuppan, L. Shobana, Ismail Naci Cangül:
Encrypting and decrypting algorithms using strong face graph of a tree. 225-233 - Jie-Fu Huang, Sun-Yuan Hsieh:
Recursive and parallel constructions of independent spanning trees in alternating group networks. 234-262
- Oluwasefunmi 'Tale Arogundade, Samuel Ibukun Olotu, Olusola Abayomi-Alli, Sanjay Misra, Abiodun Motunrayo Ikotun:
A study of existing use case extensions and experience: a systematic review. 263-281
- Samuel Dobson, Steven D. Galbraith, Jason T. LeGrow, Yan Bo Ti, Lukas Zobernig:
An adaptive attack on 2-SIDH. 282-299 - Mohammad Reza Zarrabi, Nasrollah Moghaddam Charkari:
On approximations to minimum link visibility paths in simple polygons. 300-307
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.