본문 바로가기 주메뉴 바로가기
검색 검색영역닫기 검색 검색영역닫기 ENGLISH 메뉴 전체보기 메뉴 전체보기

논문

463

Effects of tunnel structures of two termite species on territorial competition and territory size

수학원리응용센터 | Wonju Jeon, Lee, S.H. | Journal of Asia-Pacific entomology 17(3), 199-205 (2014)

자세히보기

462

Large deviations for affine diffusion processes on $\mathbb{R}^m_{+} \times \mathbb{R}^n$

수학원리응용센터 | Kang, W,, Kang, C. | Stochastic processes and their applications 124(6), 2188-2227 (2014)

자세히보기

461

Simulation of the Shifted Poisson Distribution with an Application to the CEV Model

수학원리응용센터 | Chulmin Kang, | Management science and financial engineering : MSFE 2014(5), 27-32 (2014)

자세히보기

460

On the number of even and odd strings along the overpartitions of $n$

수학원리응용센터 | Byungchan Kim, Eunmi Kim, Jeehyeon Seo | Archiv der Mathematik 102(4), 357-368 (2014)

자세히보기

459

On the subpartitions of the ordinary partitions, II

수학원리응용센터 | Byungchan Kim, Eunmi Kim. | Electronic Journal of Combinatorics 21(4) (2014)

자세히보기

458

Parabolic Harnack inequality of viscosity solutions on Riemannian manifolds

수학원리응용센터 | Soojung Kim, Lee. K. A. | Journal of functional analysis 267(7), 2152-2198 (2014)

자세히보기

457

On delegatability of designated verifier signature schemes

수리모델연구부 | Kyung-Ah Shim. | Information sciences 281, 365-372 (2014)

자세히보기

456

S2DRP: Secure implementations of distributed reprogramming protocol for wireless sensor networks

수리모델연구부 | Kyung-Ah Shim. | Ad hoc networks 2014(19), 1-8 (2014)

자세히보기

455

Equivalent Public Keys and a Key Substitution Attack on the Schemes from Vector Decomposition

수리모델연구부 | Seongan Lim, Eunjeong Lee, Cheol-Min Park. | Security and Communication Networks 7, 1274-1282 (2014)

자세히보기

454

On the security of verifiably encrypted signature schemes in a multi-user setting

수리모델연구부 | Kyung-Ah Shim | Annals of telecommunications 69(11), 585-591 (2014)

자세히보기

이 페이지에서 제공하는 정보에 대해 만족하십니까?

컨텐츠담당자     성과평가팀: 배자호   042- 717- 5762