Application of static analyses for state-space reduction to the microcontroller binary code Fulltext Access 19 Pages 2011
Reconciling method overloading and dynamically typed scripting languages Fulltext Access 19 Pages 2011
A theory of decomposition into prime factors of layered interconnection networks Fulltext Access 19 Pages 2011
Relating Toy Models of Quantum Computation: Comprehension, Complementarity and Dagger Mix Autonomous Categories Fulltext Access 19 Pages 2011
The shield that never was: Societies with single-peaked preferences are more open to manipulation and control Fulltext Access 19 Pages 2011
Controlling mean queuing delay under multi-class bursty and correlated traffic Fulltext Access 19 Pages 2011
Listener latency profiling: Measuring the perceptible performance of interactive Java applications Fulltext Access 19 Pages 2011
Instantiating abstract argumentation with classical logic arguments: Postulates and properties Fulltext Access 19 Pages 2011
Automated constraint-based addition of nonmasking and stabilizing fault-tolerance Fulltext Access 19 Pages 2011
On continued fraction expansion of real roots of polynomial systems, complexity and condition numbers Fulltext Access 19 Pages 2011
Linear time analysis of properties of conflict-free and general Petri nets Fulltext Access 19 Pages 2011
A Bayesian approach to model-based clustering for binary panel probit models Fulltext Access 19 Pages 2011
CATCH: A detecting algorithm for coalition attacks of hit inflation in internet advertising Fulltext Access 19 Pages 2011
Progressively Type-II censored competing risks data from Lomax distributions Fulltext Access 19 Pages 2011
Practical estimation of high dimensional stochastic differential mixed-effects models Fulltext Access 19 Pages 2011
Approximate inference of the bandwidth in multivariate kernel density estimation Fulltext Access 19 Pages 2011
An effective 3-in-1 keyword search method over heterogeneous data sources Fulltext Access 19 Pages 2011
Robust likelihood inference for regression parameters in partially linear models Fulltext Access 19 Pages 2011
Pyracanthus: A scalable solution for DHT-independent content-based publish/subscribe data networks Fulltext Access 20 Pages 2011
A novel formalization of symbolic trajectory evaluation semantics in Isabelle/HOL Fulltext Access 20 Pages 2011
Communication complexity and intrinsic universality in cellular automata Fulltext Access 20 Pages 2011
Monte-Carlo tree search and rapid action value estimation in computer Go Fulltext Access 20 Pages 2011
Taxonomy induction based on a collaboratively built knowledge repository Fulltext Access 20 Pages 2011
Parallel communicating grammar systems with regular control and skeleton preserving FRR automata Fulltext Access 20 Pages 2011
On the modelling and optimization of preferences in constraint-based temporal reasoning Fulltext Access 20 Pages 2011
Design, optimization and predictions of a coupled model of the cell cycle, circadian clock, DNA repair system, irinotecan metabolism and exposure control under temporal logic constraints Fulltext Access 20 Pages 2011
A semantic equivalence for Bio-PEPA based on discretisation of continuous values Fulltext Access 20 Pages 2011
Fuzzy rough granular neural networks, fuzzy granules, and classification Fulltext Access 20 Pages 2011
Computational complexity of the problem of tree generation under fine-grained access control policies Fulltext Access 20 Pages 2011
On Using B in the Design of Secure Micro-controllers: An Experience Report Fulltext Access 20 Pages 2011
Performance Evaluation of Software Development Teams: a Practical Case Study Fulltext Access 20 Pages 2011
Total restrained domination in claw-free graphs with minimum degree at least two Fulltext Access 20 Pages 2011
Goodness-of-fit test for interest rate models: An approach based on empirical processes Fulltext Access 20 Pages 2011
The correctness of Newman’s typability algorithm and some of its extensions Fulltext Access 20 Pages 2011
Rough-Set-and-Genetic-Algorithm based data mining and Rule Quality Measure to hypothesize distance protective relay operation characteristics from relay event report Fulltext Access 20 Pages 2011
Slicing the metric space to provide quick indexing of complex data in the main memory Fulltext Access 20 Pages 2011
Studying software evolution using artefacts’ shared information content Fulltext Access 20 Pages 2011
Maintaining consistent results of continuous queries under diverse window specifications Fulltext Access 20 Pages 2011
Efficient and accurate computation of upper bounds of approximation errors Fulltext Access 21 Pages 2011
Self-stabilizing leader election in optimal space under an arbitrary scheduler Fulltext Access 21 Pages 2011
Information methods for model selection in linear mixed effects models with application to HCV data Fulltext Access 21 Pages 2011