

Author: Derrick John
Publisher: Springer Publishing Company
ISSN: 0934-5043
Source: Formal Aspects of Computing, Vol.23, Iss.1, 2011-01, pp. : 43-71
Disclaimer: Any content in publications that violate the sovereignty, the constitution or regulations of the PRC is not accepted or approved by CNPIEC.
Abstract
Related content




Z‐Number‐Based Linear Programming
INTERNATIONAL JOURNAL OF INTELLIGENT SYSTEMS, Vol. 30, Iss. 5, 2015-05 ,pp. :




Strong cocycle triviality for Z 2 subshifts
By Jenkinson O.
Theoretical Computer Science, Vol. 262, Iss. 1, 2001-07 ,pp. :


Attack on RSA-type cryptosystems based on singular cubic curves over Z/nZ
By Chua S.K.S.K. Leung K.H.K.H. Ling S.
Theoretical Computer Science, Vol. 226, Iss. 1, 1999-09 ,pp. :