Parallel and distributed simulation of sediment dynamics in shallow water using particle decomposition approach Fulltext Access 12 Pages 2008
Load balancing algorithms based on gradient methods and their analysis through algebraic graph theory Fulltext Access 12 Pages 2008
Mobile Java RMI support over heterogeneous wireless networks: A case study Fulltext Access 12 Pages 2008
Two proposals for the inclusion of directory information in the last-level private caches of glueless shared-memory multiprocessors Fulltext Access 12 Pages 2008
On the complexity of sequential rectangle placement in IEEE 802.16/WiMAX systems Fulltext Access 12 Pages 2008
Approximation hardness of dominating set problems in bounded degree graphs Fulltext Access 12 Pages 2008
Performance analysis of an adaptive dynamic grid-based approach to data distribution management Fulltext Access 12 Pages 2008
A service-oriented WSRF-based architecture for metascheduling on computational Grids Fulltext Access 12 Pages 2008
High-level application-specific performance analysis using the G-PM tool Fulltext Access 12 Pages 2008
Open interface for autonomic management of virtualized resources in complex systems — construction methodology Fulltext Access 12 Pages 2008
Blocking vs. non-blocking coordinated checkpointing for large-scale fault tolerant MPI Protocols Fulltext Access 12 Pages 2008
Fault-free Hamiltonian cycles in twisted cubes with conditional link faults Fulltext Access 12 Pages 2008
Integrated connection-level and packet-level QoS controls over wireless mesh networks Fulltext Access 12 Pages 2008
Competitive analysis of most-request-first for scheduling broadcasts with start-up delay Fulltext Access 12 Pages 2008
Towards mechanized correctness proofs for cryptographic algorithms: Axiomatization of a probabilistic Hoare style logic Fulltext Access 12 Pages 2008
Computing finest mincut partitions of a graph and application to routing problems Fulltext Access 12 Pages 2008
A covering problem that is easy for trees but NP-complete for trivalent graphs Fulltext Access 12 Pages 2008
Testing the significance of cell-cycle patterns in time-course microarray data using nonparametric quadratic inference functions Fulltext Access 12 Pages 2008
Confidence intervals for parameters of two diagnostic tests in the absence of a gold standard Fulltext Access 12 Pages 2008
Step-up and step-down procedures controlling the number and proportion of false positives Fulltext Access 12 Pages 2008
Forecasting time series using principal component analysis with respect to instrumental variables Fulltext Access 12 Pages 2008
A novel crazy swarm optimized economic load dispatch for various types of cost functions Fulltext Access 12 Pages 2008
Investments in liberalised power markets: Gas turbine investment opportunities in the Nordic power system Fulltext Access 12 Pages 2008
Scalable unit commitment by memory-bounded ant colony optimization with Aâ local search Fulltext Access 12 Pages 2008
Revisiting the relationship between compositional sequence complexity and periodicity Fulltext Access 12 Pages 2008
fficient and Provably Secure Generic Construction of Client-to-Client Password-Based Key Exchange Protocol Fulltext Access 12 Pages 2008
Translation of Restricted OCL Constraints into Graph Constraints for Generating Meta Model Instances by Graph Grammars Fulltext Access 12 Pages 2008
Implementing an EJB3-Specific Graph Transformation Plugin by Using Database Independent Queries Fulltext Access 12 Pages 2008
Maintaining Coherence Between Models With Distributed Rules: From Theory to Eclipse Fulltext Access 12 Pages 2008
Model and simulation of Na+/K+ pump phosphorylation in the presence of palytoxin Fulltext Access 12 Pages 2008
A Calculus for Interaction Nets Based on the Linear Chemical Abstract Machine Fulltext Access 12 Pages 2008
The Interpretation of Intuitionistic Type Theory in Locally Cartesian Closed Categories – an Intuitionistic Perspective Fulltext Access 12 Pages 2008
An Effective Tietze-Urysohn Theorem for QCB-Spaces: (Extended Abstract) Fulltext Access 12 Pages 2008
Effective Computability of Solutions of Ordinary Differential Equations The Thousand Monkeys Approach Fulltext Access 12 Pages 2008