Next Article in Journal
An Image Hashing Algorithm for Authentication with Multi-Attack Reference Generation and Adaptive Thresholding
Next Article in Special Issue
CYK Parsing over Distributed Representations
Previous Article in Journal
A Linear-Time Algorithm for the Isometric Reconciliation of Unrooted Trees
Previous Article in Special Issue
A Brief Survey of Fixed-Parameter Parallelism
 
 
Article

Article Versions Notes

Action Date Notes Link
article xml file uploaded 8 September 2020 12:17 CEST Original file -
article xml uploaded. 8 September 2020 12:17 CEST Update https://0-www-mdpi-com.brum.beds.ac.uk/1999-4893/13/9/226/xml
article pdf uploaded. 8 September 2020 12:17 CEST Version of Record https://0-www-mdpi-com.brum.beds.ac.uk/1999-4893/13/9/226/pdf
article html file updated 8 September 2020 12:18 CEST Original file -
article html file updated 22 July 2022 06:23 CEST Update https://0-www-mdpi-com.brum.beds.ac.uk/1999-4893/13/9/226/html
Back to TopTop