The least squares type estimation of the parameters in the power hazard function
Fully developed flow through a porous channel bounded by flat plates
Computational complexities and streamfunction coordinates
Study on the formation of Goertler vortices in natural convection flow over a rotating concave surface
Estimation of component mean lifetimes of a masked system using unclassified system life data
MHD free-convection flow of a non-Newtonian power-law fluid at a stretching surface with a uniform free-stream
On the global behavior of higher order recursive sequences
Effect of dust particles on a ferromagnetic fluid heated and soluted from below saturating a porous medium
An analytic approach to solve multiple solutions of a strongly nonlinear problem
The identification of nondominated and efficient paths on a network
A method for generating all efficient solutions of 0-1 multi-objective linear programming problem
A one-model approach to classification and sensitivity analysis in DEA
Sensitivity and stability analysis in DEA
Sensitivity of efficiency classifications in the inverse DEA models
Undesirable inputs and outputs in DEA models
Solving a special case of conservative problems by Secant-like methods
On a generalized mixture distribution
A new modification of Adomian decomposition method for solving a kind of evolution equation
One-to-one mapping matrix
An application for a modified KdV equation by the decomposition method and finite element method
An efficient nonce-based authentication scheme with key agreement
An algorithm for solving nonlinear singular perturbation problems with mechanization
Security of Lu et al.’s proxy-protected signature scheme
On computing of arbitrary positive integer powers for one type of odd order symmetric circulant matrices—II
Mechanization for solving SPP by reducing order method
Algorithm and mechanization to Cauchy problem of parabolic equation
Parallel algorithms for reduction of a symmetric matrix to tridiagonal form on a shared memory multiprocessor
On the security of a convertible authenticated encryption
Remarks on some signature schemes based on factoring and discrete logarithms
Identity based designated multi-confirmer signature: a new type signature
Population viability in three trophic-level food chains
Droop models of nutrient–plankton interaction with intratrophic predation
Penalty shifting method on calculation of optimal linewise control of dam-detouring osimotic system for concrete dams with heterogemous
Five points of accuracy synthesis of motion generator linkages using Maple-V
Determination of cluster number in clustering microarray data
Comparison between the homotopy analysis method and homotopy perturbation method
A novel hybrid model for portfolio selection
Two provably secure k-out-of-n oblivious transfer schemes
A note on the componentwise perturbation bounds of matrix inverse and linear systems
Designated verifier proxy signature scheme with message recovery
Generalized mathematical model for the solution of mixed-boundary-value elastic problems
A time-stamping protocol for digital watermarking
Practical convertible authenticated encryption schemes using self-certified public keys
A characterization of the convergence of Picard iteration to a fixed point for a continuous mapping and an application
Symmetric successive overrelaxation methods for solving the rank deficient linear least squares problem
Fail-stop blind signature scheme design based on pairings
A note on computing matrix–vector products with generalized centrosymmetric (centrohermitian) matrices
Runge–Kutta methods of dynamic iteration for index-2 differential–algebraic equations
PDEPtest: a package for the Painlevé test of nonlinear partial differential equations
Proxy signature scheme using self-certified public keys
On computing of arbitrary positive integer powers for one type of odd order tridiagonal matrices with zero row – I
The distribution models of grazing animals between two grassland resource points
A simplified Green element method solution for a the biharmonic equation and its application to Stokes flows
Improvement on Tzeng et al.’s nonrepudiable threshold multi-proxy multi-signature scheme with shared verification
A secure and efficient authentication protocol for anonymous channel in wireless communications
Developing a nondiscretionary model of slacks-based measure in data envelopment analysis
Identity based group-oriented undeniable signature scheme
An efficient convergent lattice algorithm for European Asian options
Author Index to Volume