Next Article in Journal
Coarsely Quantized Decoding and Construction of Polar Codes Using the Information Bottleneck Method
Previous Article in Journal
Parallelism Strategies for Big Data Delayed Transfer Entropy Evaluation
Previous Article in Special Issue
Algorithmic Matching Attacks on Optimally Suppressed Tabular Data
 
 
Article

Article Versions Notes

Algorithms 2019, 12(9), 191; https://doi.org/10.3390/a12090191
Action Date Notes Link
article xml file uploaded 10 September 2019 14:23 CEST Original file -
article pdf uploaded. 10 September 2019 14:23 CEST Version of Record https://www.mdpi.com/1999-4893/12/9/191/pdf-vor
article xml file uploaded 19 September 2019 10:12 CEST Update -
article xml uploaded. 19 September 2019 10:12 CEST Update https://www.mdpi.com/1999-4893/12/9/191/xml
article pdf uploaded. 19 September 2019 10:12 CEST Updated version of record https://www.mdpi.com/1999-4893/12/9/191/pdf
article html file updated 19 September 2019 10:17 CEST Original file -
article html file updated 19 September 2019 10:21 CEST Update -
article html file updated 19 September 2019 10:25 CEST Update -
article html file updated 25 September 2019 23:42 CEST Update -
article html file updated 13 February 2020 16:37 CET Update https://www.mdpi.com/1999-4893/12/9/191/html
Back to TopTop