Review of pulse-coupled neural networks | 35 | 1.46 | 2010 |
New Constructions of Permutation Arrays | 1 | 0.38 | 2008 |
New Lower Bounds on Sizes of Permutation Arrays | 0 | 0.34 | 2008 |
New Upper Bounds on Sizes of Permutation Arrays | 2 | 0.45 | 2008 |
Extraction of Interested Objects in Botanic Somatic Embryo Images | 0 | 0.34 | 2008 |
Cryptanalysis of a timestamp-based password authentication scheme. | 13 | 1.21 | 2004 |
Yet another attack on a password authentication scheme based on quadratic residues with parameters unknown 1. | 0 | 0.34 | 2004 |