Vol. 2 No. 3 (2007)
Published:
2025-08-29
Articles
-
Analyzing Authentication in Kerberos-5 Using Distributed Temporal Protocol Logic
[An open-access article; the PDF is free to any online user.] -
A Fourth Order Dual Method for Iteration Regularization with H-1 Fidelity Based Denoising
[An open-access article; the PDF is free to any online user.] -
Estimating Error Bounds for Non-stationary Binary Subdivision Curves / Surfaces
[An open-access article; the PDF is free to any online user.] -
Generating Multivariate Nonnormal Distribution Random Numbers Based on Copula Function
[An open-access article; the PDF is free to any online user.] -
High Dimensional and Large Numbers of Data Clustering Method Based Sensitive Subspace
[An open-access article; the PDF is free to any online user.] -
Computational Algorithm to Obtain Multiple Positive Solutions for Sublinear Semipositone Problems
[An open-access article; the PDF is free to any online user.] -
Eye Location and Eye State Detection in Facial Images with Unconstrained Background
[An open-access article; the PDF is free to any online user.] -
Exploiting word positional information in ngram model for Chinese text input method
[An open-access article; the PDF is free to any online user.] -
A New Reduction Implementation Based on Concept
[An open-access article; the PDF is free to any online user.] -
Towards Designing and Implementing an Expert Network To Manage the Computer Communication Networks
[An open-access article; the PDF is free to any online user.] -
Research on RBAC-based Separation of Duty Constraints
[An open-access article; the PDF is free to any online user.]