Fault-tolerant and efficient data propagation in wireless sensor networks using local, additional network information Fulltext Access 18 Pages 2007
Clustering techniques for dynamic location management in mobile computing Fulltext Access 18 Pages 2007
Dynamic partner identification in mobile agent-based distributed job workflow execution Fulltext Access 18 Pages 2007
Modeling of concurrent web sessions with bounded inconsistency in shared data Fulltext Access 18 Pages 2007
The most probable annotation problem in HMMs and its application to bioinformatics Fulltext Access 18 Pages 2007
The configuration space of homologous proteins: A theoretical and practical framework to reduce the diversity of the protein sequence space after massive all-by-all sequence comparisons Fulltext Access 18 Pages 2007
Equivalence of linear, free, liberal, structured program schemas is decidable in polynomial time Fulltext Access 18 Pages 2007
A geometrical characterization of factors of multidimensional Billiard words and some applications Fulltext Access 18 Pages 2007
Finding large cliques in sparse semi-random graphs by simple randomized search heuristics Fulltext Access 18 Pages 2007
A simple and efficient method for variable ranking according to their usefulness for learning Fulltext Access 18 Pages 2007
Towards Software Component Procurement Automation with Latent Semantic Analysis Fulltext Access 18 Pages 2007
Sampling algorithms for generating joint uniform distributions using the vine-copula method Fulltext Access 18 Pages 2007
Comparison of PQL and Laplace 6 estimates of hierarchical linear models when comparing groups of small incident rates in cluster randomised trials Fulltext Access 18 Pages 2007
Kernel logistic PLS: A tool for supervised nonlinear dimensionality reduction and binary classification Fulltext Access 18 Pages 2007
Discovery, visualization and performance analysis of enterprise workflow Fulltext Access 18 Pages 2007
Combined use of association rules mining and clustering methods to find relevant links between binary rare attributes in a large data set Fulltext Access 18 Pages 2007
Partial Order Reduction for Rewriting Semantics of Programming Languages Fulltext Access 18 Pages 2007
Comparison of different estimation procedures for proportional hazards model with random effects Fulltext Access 18 Pages 2007
Influence functions and local influence in linear discriminant analysis Fulltext Access 18 Pages 2007
Estimating quantiles under sampling on two occasions with arbitrary sample designs Fulltext Access 18 Pages 2007
Optimum experimental designs for dynamic systems in the presence of correlated errors Fulltext Access 18 Pages 2007
Java+ITP: A Verification Tool Based on Hoare Logic and Algebraic Semantics 1 Fulltext Access 18 Pages 2007
General Secret Sharing Based on the Chinese Remainder Theorem with Applications in E-Voting Fulltext Access 18 Pages 2007
From Functional Programs to Interaction Nets via the Rewriting Calculus ⋆ Fulltext Access 18 Pages 2007
When not losing is better than winning: Abstraction and refinement for the full μ-calculus Fulltext Access 19 Pages 2007
Improved decremental algorithms for maintaining transitive closure and all-pairs shortest paths Fulltext Access 19 Pages 2007
A priority-based distributed group mutual exclusion algorithm when group access is non-uniform Fulltext Access 19 Pages 2007
Maximum integer multiflow and minimum multicut problems in two-sided uniform grid graphs Fulltext Access 19 Pages 2007
Structural and behavioural compatibility of graphical service specifications Fulltext Access 19 Pages 2007