The dual and degrees of freedom of linearly constrained generalized lasso Fulltext Access 14 Pages 2015
Transdimensional approximate Bayesian computation for inference on invasive species models with latent variables of unknown dimension Fulltext Access 14 Pages 2015
A sequential test for variable selection in high dimensional complex data Fulltext Access 14 Pages 2015
An on-the-fly grammar modification mechanism for composing and defining extensible languages Fulltext Access 14 Pages 2015
On the parameterized complexity of vertex cover and edge cover with connectivity constraints Fulltext Access 15 Pages 2015
The complexity of fully proportional representation for single-crossing electorates Fulltext Access 15 Pages 2015
A complexity and approximation framework for the maximization scaffolding problem Fulltext Access 15 Pages 2015
Verification of membrane systems with delays via Petri nets with delays Fulltext Access 15 Pages 2015
Inefficiency of equilibria for scheduling game with machine activation costs Fulltext Access 15 Pages 2015
A basis for compositionally ensuring safety properties and its connection to relational algebraic operators Fulltext Access 15 Pages 2015
New degrees of freedom in metaheuristic optimization of component-based systems architecture: Architecture topology and load balancing Fulltext Access 15 Pages 2015
Binding energies of tyrosine kinase inhibitors: Error assessment of computational methods for imatinib and nilotinib binding Fulltext Access 15 Pages 2015
Multi-threaded modularity based graph clustering using the multilevel paradigm Fulltext Access 15 Pages 2015
Time hybrid total order broadcast: Exploiting the inherent synchrony of broadcast networks Fulltext Access 15 Pages 2015
On the complexity of determining the irregular chromatic index of a graph Fulltext Access 15 Pages 2015
Generation scheduling in smart grid environment using global best artificial bee colony algorithm Fulltext Access 15 Pages 2015
Multi-Label Regularized Generative Model for Semi-Supervised Collective Classification in Large-Scale Networks Fulltext Access 15 Pages 2015
A local strategy for cleaning expanding cellular domains by simple robots Fulltext Access 15 Pages 2015
Modules and transactions: Building blocks for a theory of software engineering Fulltext Access 15 Pages 2015
Using least square support vector regression with genetic algorithm to forecast beta systematic risk Fulltext Access 15 Pages 2015
Comparative analysis of architectures for monitoring cloud computing infrastructures Fulltext Access 15 Pages 2015
An external field prior for the hidden Potts model with application to cone-beam computed tomography Fulltext Access 15 Pages 2015
Best linear near unbiased estimation for nonlinear signal models via semi-infinite programming approach Fulltext Access 15 Pages 2015
A hybrid firefly algorithm and pattern search technique for automatic generation control of multi area power systems Fulltext Access 15 Pages 2015
Matching preclusion and conditional matching preclusion problems for the folded Petersen cube Fulltext Access 15 Pages 2015
On maximum independent set of categorical product and ultimate categorical ratios of graphs Fulltext Access 15 Pages 2015
On the complexity of finding a largest common subtree of bounded degree Fulltext Access 15 Pages 2015
On the approximability of covering points by lines and related problems Fulltext Access 15 Pages 2015
Nonparametric density estimation for multivariate bounded data using two non-negative multiplicative bias correction methods Fulltext Access 15 Pages 2015
Robust heart rate variability analysis by generalized entropy minimization Fulltext Access 15 Pages 2015
An efficient and robust variable selection method for longitudinal generalized linear models Fulltext Access 15 Pages 2015
Domain selection for the varying coefficient model via local polynomial regression Fulltext Access 15 Pages 2015
Dynamic heterogeneous team formation for robotic urban search and rescue Fulltext Access 15 Pages 2015
Higher-order triangular-distance Delaunay graphs: Graph-theoretical properties Fulltext Access 15 Pages 2015
Algorithms and bounds for drawing non-planar graphs with crossing-free subgraphs Fulltext Access 15 Pages 2015
Stochastic optimal power flow incorporating offshore wind farm and electric vehicles Fulltext Access 15 Pages 2015
Assessing power system security. A framework and a multi model approach Fulltext Access 15 Pages 2015
Integrated distribution network expansion planning incorporating distributed generation considering uncertainties, reliability, and operational conditions Fulltext Access 15 Pages 2015
A novel quasi-oppositional harmony search algorithm and fuzzy logic controller for frequency stabilization of an isolated hybrid power system Fulltext Access 15 Pages 2015
On the usefulness and ease of use of a model-driven Method Engineering approach Fulltext Access 15 Pages 2015
Technology adoption: A conjoint analysis of consumers׳ preference on future online banking services Fulltext Access 15 Pages 2015
Learning pseudo-tags to augment sparse tagging in hybrid music recommender systems Fulltext Access 15 Pages 2015
A robust and efficient method for estimating enzyme complex abundance and metabolic flux from expression data Fulltext Access 15 Pages 2015
A Grey Theory Based Multiple Attribute Approach for R&D Project Portfolio Selection Fulltext Access 15 Pages 2015
Correcting gene tree by removal and modification: Tractability and approximability Fulltext Access 15 Pages 2015
Malware behavioural detection and vaccine development by using a support vector model classifier Fulltext Access 15 Pages 2015
The complexity of equivalence, entailment, and minimization in existential positive logic Fulltext Access 15 Pages 2015
Communication-optimal eventually perfect failure detection in partially synchronous systems Fulltext Access 15 Pages 2015
Towards dynamic real-time scheduling for multiple earth observation satellites Fulltext Access 15 Pages 2015
Modeling energy-efficient secure communications in multi-mode wireless mobile devices Fulltext Access 15 Pages 2015
Resistance distance-based graph invariants of subdivisions and triangulations of graphs Fulltext Access 15 Pages 2015
Artificial Neural Network support to monitoring of the evolutionary driven security aware scheduling in computational distributed environments Fulltext Access 15 Pages 2015
The Minimum Flow Cost Hamiltonian Cycle Problem: A comparison of formulations Fulltext Access 15 Pages 2015
Asymptotic Behavior and Performance Constraints of Replication Policies Fulltext Access 15 Pages 2015
Reprint of “Abstraction for data integration: Fusing mammalian molecular, cellular and phenotype big datasets for better knowledge extraction” Fulltext Access 16 Pages 2015
A new verification technique for large processes based on identification of relevant tasks Fulltext Access 16 Pages 2015
On the commutative equivalence of bounded context-free and regular languages: The code case Fulltext Access 16 Pages 2015
Improved approximation algorithms for scheduling parallel jobs on identical clusters Fulltext Access 16 Pages 2015
A bound for the convergence rate of parallel tempering for sampling restricted Boltzmann machines Fulltext Access 16 Pages 2015
Practical (fully) distributed signatures provably secure in the standard model Fulltext Access 16 Pages 2015