Next Article in Journal
Adaptive Vector Quantization for Lossy Compression of Image Sequences
Previous Article in Journal
Hierarchical Parallel Evaluation of a Hamming Code
Previous Article in Special Issue
Trust in the Balance: Data Protection Laws as Tools for Privacy and Security in the Cloud
 
 
Due to scheduled maintenance work on our database systems, there may be short service disruptions on this website between 10:00 and 11:00 CEST on June 14th.
Article

Article Versions Notes

Algorithms 2017, 10(2), 52; https://doi.org/10.3390/a10020052
Action Date Notes Link
article pdf uploaded. 9 May 2017 14:19 CEST Version of Record https://www.mdpi.com/1999-4893/10/2/52/pdf-vor
article xml uploaded. 9 May 2017 14:19 CEST Original file -
article html file updated 9 May 2017 14:20 CEST Original file -
article html file updated 23 May 2017 03:55 CEST Update -
article pdf uploaded. 21 June 2017 13:07 CEST Updated version of record https://www.mdpi.com/1999-4893/10/2/52/pdf
article xml uploaded. 21 June 2017 13:07 CEST Update -
article xml uploaded. 21 June 2017 13:07 CEST Update https://www.mdpi.com/1999-4893/10/2/52/xml
article html file updated 21 June 2017 13:08 CEST Update -
article html file updated 28 June 2017 12:26 CEST Update -
article html file updated 3 May 2019 22:52 CEST Update -
article html file updated 24 September 2019 17:34 CEST Update -
article html file updated 8 February 2020 05:25 CET Update https://www.mdpi.com/1999-4893/10/2/52/html
Back to TopTop