A joint test for structural stability and a unit root in autoregressions Fulltext Access 11 Pages 2014
A topology-aware load balancing algorithm for clustered hierarchical multi-core machines Fulltext Access 11 Pages 2014
Bayesian D-optimal designs for the two parameter logistic mixed effects model Fulltext Access 11 Pages 2014
Incorporation of gene exchangeabilities improves the reproducibility of gene set rankings Fulltext Access 11 Pages 2014
Power and sample size calculations for Poisson and zero-inflated Poisson regression models Fulltext Access 11 Pages 2014
Bayesian estimation of adaptive bandwidth matrices in multivariate kernel density estimation Fulltext Access 11 Pages 2014
Many-to-many two-disjoint path covers in restricted hypercube-like graphs Fulltext Access 11 Pages 2014
Solving the maximum duo-preservation string mapping problem with linear programming Fulltext Access 11 Pages 2014
A simple optimal binary representation of mosaic floorplans and Baxter permutations Fulltext Access 11 Pages 2014
On the event distance of Poisson processes with applications to sensors Fulltext Access 11 Pages 2014
Efficient parallel automata construction for hybrid resource-impelled data-matching Fulltext Access 11 Pages 2014
Measuring the privacy of user profiles in personalized information systems Fulltext Access 11 Pages 2014
A new multi-objective bi-level programming model for energy and locality aware multi-job scheduling in cloud computing Fulltext Access 11 Pages 2014
Community detection in networks via a spectral heuristic based on the clustering coefficient Fulltext Access 11 Pages 2014
Eliminating bias due to censoring in Kendall’s tau estimators for quasi-independence of truncation and failure Fulltext Access 11 Pages 2014
Sample size calculation for the proportional hazards model with a time-dependent covariate Fulltext Access 11 Pages 2014
Consistency-adjusted alpha allocation methods for a time-to-event analysis of composite endpoints Fulltext Access 11 Pages 2014
Mining permission patterns for contrasting clean and malicious android applications Fulltext Access 11 Pages 2014
Modeling and simulation for natural disaster contingency planning driven by high-resolution remote sensing images Fulltext Access 11 Pages 2014
A method for managing green power of a virtual machine cluster in cloud Fulltext Access 11 Pages 2014
Fuzzy Weak Regular, Strong and Preassociative Filters in Residuated Lattices Fulltext Access 11 Pages 2014
Generating trusted graphs for trust evaluation in online social networks Fulltext Access 11 Pages 2014
Authentication of lossy data in body-sensor networks for cloud-based healthcare monitoring Fulltext Access 11 Pages 2014
Investigating communication and step-size behaviour for co-simulation of hybrid physical systems Fulltext Access 12 Pages 2014
Flexible composition and execution of large scale applications on distributed e-infrastructures Fulltext Access 12 Pages 2014
Computational evaluation of micro-scale and macro-scale error sources in a thermodiffusive cell Fulltext Access 12 Pages 2014
A uniform approach for programming distributed heterogeneous computing systems Fulltext Access 12 Pages 2014
Parameter adaptive harmony search algorithm for unimodal and multimodal optimization problems Fulltext Access 12 Pages 2014
A lightweight dynamic pseudonym identity based authentication and key agreement protocol without verification tables for multi-server architecture Fulltext Access 12 Pages 2014
The impact of breakdowns disciplines and repeated attempts on performances of Small Cell Networks Fulltext Access 12 Pages 2014
Shield: A stackable secure storage system for file sharing in public storage Fulltext Access 12 Pages 2014
A symbolic model checking approach to verifying satellite onboard software Fulltext Access 12 Pages 2014
Complexity and approximation for Traveling Salesman Problems with profits Fulltext Access 12 Pages 2014
Inefficiency of Nash Equilibrium for scheduling games with constrained jobs: A parametric analysis Fulltext Access 12 Pages 2014
Efficient sub-5 approximations for minimum dominating sets in unit disk graphs Fulltext Access 12 Pages 2014
Second-Price Ad Auctions with Binary Bids and markets with good competition Fulltext Access 12 Pages 2014