|
16081 |
Seasonal nitrate algorithms for nitrate retrieval using OCEANSAT-2 and MODIS-AQUA satellite data Enthalten in Environmental monitoring and assessment Bd. 187, 12.3.2015, Nr. 4, date:4.2015: 1-15
|
|
|
16082 |
Second-order partitioned method and adaptive time step algorithms for the nonstationary Stokes-Darcy equations Enthalten in Numerical algorithms Bd. 94, 7.3.2023, Nr. 1, date:9.2023: 413-457
|
|
|
16083 |
Second-order random walk-based proximity measures in graph analysis: formulations and algorithms Enthalten in The VLDB journal Bd. 27, 1.12.2017, Nr. 1, date:2.2018: 127-152
|
|
|
16084 |
Second-Order Three-Scale Asymptotic Analysis and Algorithms for Steklov Eigenvalue Problems in Composite Domain with Hierarchical Cavities Enthalten in Journal of scientific computing Bd. 98, 8.2.2024, Nr. 3, date:3.2024: 1-35
|
|
|
16085 |
Second Order, Unconditionally Stable, Linear Ensemble Algorithms for the Magnetohydrodynamics Equations Enthalten in Journal of scientific computing Bd. 94, 9.1.2023, Nr. 2, date:2.2023: 1-29
|
|
|
16086 |
Second version of the IZMIRAN solar spectromagnetograph. Part II. Algorithms for preliminary data processing Enthalten in Instruments and experimental techniques Bd. 54, 28.7.2011, Nr. 4, date:7.2011: 577-584
|
|
|
16087 |
Secure Authentication Framework for SDN-IoT network using Keccak-256 and Bliss-B algorithms Enthalten in International journal of information technology Bd. 15, 17.9.2022, Nr. 1, date:1.2023: 335-344
|
|
|
16088 |
Secure Messaging Application Development: Based on Post-Quantum Algorithms CSIDH, Falcon, and AES Symmetric Key Cryptosystem Enthalten in Programming and computer software Bd. 50, 30.7.2024, Nr. 4, date:8.2024: 322-333
|
|
|
16089 |
Secure vehicle routing: models and algorithms to increase security and reduce costs in the cash-in-transit sector Enthalten in 4OR Bd. 14, 2.6.2015, Nr. 1, date:3.2016: 105
|
|
|
16090 |
Security estimation of LWE via BKW algorithms Enthalten in Cybersecurity Bd. 6, 3.9.2023, Nr. 1, date:12.2023: 1-17
|
|