Approximate by thinning: Deriving fully polynomial-time approximation schemes Fulltext Access 32 Pages 2015
Reliability prediction for component-based software systems: Dealing with concurrent and propagating errors Fulltext Access 32 Pages 2015
The limits of decidability in fuzzy description logics with general concept inclusions Fulltext Access 33 Pages 2015
Exploiting velocity distribution skew to speed up moving object indexing Fulltext Access 33 Pages 2015
Rule-based peer-to-peer framework for decentralised real-time service oriented architectures Fulltext Access 33 Pages 2015
Semantic characterization of rational closure: From propositional logic to description logics Fulltext Access 33 Pages 2015
From senses to texts: An all-in-one graph-based approach for measuring semantic similarity Fulltext Access 34 Pages 2015
Interval-valued Fuzzy Matrices with Interval-valued Fuzzy Rows and Columns Fulltext Access 34 Pages 2015
Constrained narrowing for conditional equational theories modulo axioms Fulltext Access 34 Pages 2015
Interval-based data refinement: A uniform approach to true concurrency in discrete and real-time systems Fulltext Access 34 Pages 2015
Two techniques to improve the precision of a demand-driven null-dereference verification approach Fulltext Access 35 Pages 2015
Methods for solving reasoning problems in abstract argumentation - A survey Fulltext Access 36 Pages 2015
A principled approach to context schema evolution in a data management perspective Fulltext Access 37 Pages 2015
Multilevel cumulative logistic regression model with random effects: Application to British social attitudes panel survey data Fulltext Access 37 Pages 2015
Publisher's Note: Abstraction for data integration: Fusing mammalian molecular, cellular and phenotype big datasets for better knowledge extraction Fulltext Access 38 Pages 2015
The deterministic part of the seventh International Planning Competition Fulltext Access 38 Pages 2015
Modular robotic systems: Methods and algorithms for abstraction, planning, control, and synchronization Fulltext Access 38 Pages 2015
Rule-based transformation of graph rewriting rules: Towards higher-order graph grammars Fulltext Access 39 Pages 2015
A cooperative learning method based on cellular learning automata and its application in optimization problems Fulltext Access 39 Pages 2015
Analyzing the computational complexity of abstract dialectical frameworks via approximation fixpoint theory Fulltext Access 41 Pages 2015
Model checking linear temporal logic of rewriting formulas under localized fairness Fulltext Access 42 Pages 2015
Co-evolving meta-models and their instance models: A formal approach based on graph transformation Fulltext Access 42 Pages 2015
Red–black planning: A new systematic approach to partial delete relaxation Fulltext Access 42 Pages 2015
Incremental dataflow execution, resource efficiency and probabilistic guarantees with Fuzzy Boolean nets Fulltext Access 43 Pages 2015
A new probabilistic constraint logic programming language based on a generalised distribution semantics Fulltext Access 44 Pages 2015
Truthful learning mechanisms for multi-slot sponsored search auctions with externalities Fulltext Access 47 Pages 2015
A generic approach to planning in the presence of incomplete information: Theory and implementation Fulltext Access 51 Pages 2015
Inducing semantic relations from conceptual spaces: A data-driven approach to plausible reasoning Fulltext Access 60 Pages 2015
Assessing and forecasting energy efficiency on Cloud computing platforms Fulltext Access 63 Pages 2015
Automated type-based analysis of injective agreement in the presence of compromised principals Fulltext Access 74 Pages 2015
On the advice complexity of online bipartite matching and online stable marriage Fulltext Access 4 Pages 2014
Serial batch scheduling on uniform parallel machines to minimize total completion time Fulltext Access 4 Pages 2014
On the inapproximability of minimizing cascading failures under the deterministic threshold model Fulltext Access 4 Pages 2014
Security pitfalls of an efficient threshold proxy signature scheme for mobile agents Fulltext Access 4 Pages 2014
Fitness levels with tail bounds for the analysis of randomized search heuristics Fulltext Access 4 Pages 2014
A note on eigenvalue bounds for independence numbers of non-regular graphs Fulltext Access 4 Pages 2014
An optimal algorithm for the Euclidean bottleneck full Steiner tree problem Fulltext Access 4 Pages 2014
Guest editorial to the Special Issue on Component-Based Software Engineering and Software Architecture Fulltext Access 4 Pages 2014
Enhanced utilization bound of Rate-Monotonic scheduling in Controller Area Networks Fulltext Access 4 Pages 2014
Minimizing total weighted completion time approximately for the parallel machine problem with a single server Fulltext Access 4 Pages 2014
An affine arithmetic-based algorithm for radial distribution system power flow with uncertainties Fulltext Access 4 Pages 2014
Adaptive overcurrent relay coordination for off-peak loading in interconnected power system Fulltext Access 5 Pages 2014
Modified fuzzy algorithm based safety analysis of nuclear energy for sustainable hydrogen production in climate change prevention Fulltext Access 5 Pages 2014
Study of gas insulated substation and its comparison with air insulated substation Fulltext Access 5 Pages 2014
Analysis of transient electric field distribution inside the large generator under strong surge voltage Fulltext Access 5 Pages 2014
Performance enhancement of solar photovoltaic system using novel Maximum Power Point Tracking Fulltext Access 5 Pages 2014