Quantitative Model Refinement as a Solution to the Combinatorial Size Explosion of Biomodels Fulltext Access 19 Pages 2012
A survey on gaps, threat remediation challenges and some thoughts for proactive attack detection in cloud computing Fulltext Access 19 Pages 2012
HOPE: A Hybrid Optimistic checkpointing and selective Pessimistic mEssage logging protocol for large scale distributed systems Fulltext Access 19 Pages 2012
Biometrics-based consumer applications driven by reconfigurable hardware architectures Fulltext Access 19 Pages 2012
Deciding regularity of hairpin completions of regular languages in polynomial time Fulltext Access 19 Pages 2012
The undecidability of type related problems in the type-free style System F with finitely stratified polymorphic types Fulltext Access 19 Pages 2012
A practical solution for achieving language compatibility in scripting language compilers Fulltext Access 19 Pages 2012
Parameter reduction and automata evaluation for grammar-compressed trees Fulltext Access 19 Pages 2012
Synonymous theories and knowledge representations in answer set programming Fulltext Access 19 Pages 2012
Correlation decay and deterministic FPTAS for counting colorings of a graph Fulltext Access 19 Pages 2012
Applicability conditions for plans with loops: Computability results and algorithms Fulltext Access 19 Pages 2012
Ensuring correctness during process configuration via partner synthesis Fulltext Access 19 Pages 2012
pest: Fast approximate keyword search in semantic data using eigenvector-based term propagation Fulltext Access 19 Pages 2012
A model of fuzzy spatio-temporal knowledge representation and reasoning based on high-level Petri nets Fulltext Access 19 Pages 2012
Approximate Bayesian inference for large spatial datasets using predictive process models Fulltext Access 19 Pages 2012
A shortest path-based approach to the multileaf collimator sequencing problem Fulltext Access 19 Pages 2012
Dynamic factors in periodic time-varying regressions with an application to hourly electricity load modelling Fulltext Access 19 Pages 2012
Empirical assessment of the Maximum Likelihood Estimator quality in a parametric counting process model for recurrent events Fulltext Access 19 Pages 2012
Generalized extreme value distribution with time-dependence using the AR and MA models in state space form Fulltext Access 19 Pages 2012
Bayesian Value-at-Risk and expected shortfall forecasting via the asymmetric Laplace distribution Fulltext Access 19 Pages 2012
Sequential and distributed on-the-fly computation of weak tau-confluence Fulltext Access 20 Pages 2012
A defeasible reasoning model of inductive concept learning from examples and communication Fulltext Access 20 Pages 2012
Generating counterexamples for quantitative safety specifications in probabilistic B Fulltext Access 20 Pages 2012
Assessing the SALSA architecture for developing agent-based ambient computing applications Fulltext Access 20 Pages 2012
Approximation complexity of complex-weighted degree-two counting constraint satisfaction problems Fulltext Access 20 Pages 2012
Chosen-ciphertext secure anonymous conditional proxy re-encryption with keyword search Fulltext Access 20 Pages 2012
An improved on-line algorithm for single parallel-batch machine scheduling with delivery times Fulltext Access 20 Pages 2012
Vague continuous K-nearest neighbor queries over moving objects with uncertain velocity in road networks Fulltext Access 20 Pages 2012
Preserving geometric properties in reconstructing regions from internal and nearby points Fulltext Access 20 Pages 2012
Minimal enclosing discs, circumcircles, and circumcenters in normed planes (Part II) Fulltext Access 20 Pages 2012
Testing non-inferiority for clustered matched-pair binary data in diagnostic medicine Fulltext Access 20 Pages 2012
Consistency of support vector machines using additive kernels for additive models Fulltext Access 20 Pages 2012
Bayesian estimation of generalized hyperbolic skewed student GARCH models Fulltext Access 20 Pages 2012
Comparing the asymptotic and empirical (un)conditional distributions of OLS and IV in a linear static simultaneous equation Fulltext Access 20 Pages 2012
Multiset rewriting for the verification of depth-bounded processes with name binding Fulltext Access 20 Pages 2012
Content-based image retrieval approach for biometric security using colour, texture and shape features controlled by fuzzy heuristics Fulltext Access 20 Pages 2012
SLA-based admission control for a Software-as-a-Service provider in Cloud computing environments Fulltext Access 20 Pages 2012