Kernel function-based primal-dual interior-point methods for symmetric cones optimization Dequan ZhaoMingwang Zhang Mathematics 12 November 2014 Pages: 461 - 468
On nonsingularity and group inverse of linear combinations of generalized and hypergeneralized projectors Yinlan ChenKezheng ZuoTao Xie Mathematics 12 November 2014 Pages: 469 - 476
Behavioral consistency checking between requirements and implementations Yong XuXiang LingBo Huang Computer Science 12 November 2014 Pages: 477 - 488
Review of public-key cryptosystem based on the error correcting code Zhongyuan LiChengqin QuLifeng Zhuo Computer Science 12 November 2014 Pages: 489 - 496
Fragile audio watermarking with perfect restoration capacity based on an adapted integer transform Xinrong LuoShijun Xiang Computer Science 12 November 2014 Pages: 497 - 504
Data secure transmission model based on compressed sensing and digital watermarking technology Chundong WangYi BaiXiuliang Mo Computer Science 12 November 2014 Pages: 505 - 511
Complexity measure based on program slicing and its validation Hongwei TaoYixiang Chen Computer Science 12 November 2014 Pages: 512 - 518
Register reallocation for soft error reduction Peng WenGuochang YanShi Ying Computer Science 12 November 2014 Pages: 519 - 525
Taiyuan City subsidence observed with Persistent Scatterer InSAR Wei TangMingsheng Liao Engineering Science 12 November 2014 Pages: 526 - 534
Safety analysis for thread pair clearance of safety mechanism of Three Gorges Project ship lift Duanwei ShiShuxiao ChengYongbo Wang Engineering Science 12 November 2014 Pages: 535 - 543
Effect of annealing temperature on CrN microspheres synthesized by CAP technology Canxin TianShaojian YanDejun Fu Engineering Science 12 November 2014 Pages: 544 - 548