

Publisher: Edp Sciences
E-ISSN: 1270-900x|23|issue|30-47
ISSN: 1270-900x
Source: ESAIM: Proceedings, Vol.23, Iss.issue, 2008-01, pp. : 30-47
Disclaimer: Any content in publications that violate the sovereignty, the constitution or regulations of the PRC is not accepted or approved by CNPIEC.
Related content




Optimal Randomizer Efficiency in the Bounded-Storage Model
Journal of Cryptology, Vol. 17, Iss. 1, 2004-01 ,pp. :






Gas Kinetic Scheme for Anisotropic Savage-Hutter Model
Communications in Computational Physics, Vol. 13, Iss. 5, 2013-05 ,pp. :