Chosen-ciphertext secure multi-hop identity-based conditional proxy re-encryption with constant-size ciphertexts Fulltext Access 19 Pages 2014
On the efficiency of Influence-and-Exploit strategies for revenue maximization under positive externalities Fulltext Access 19 Pages 2014
Existential type systems between Church and Curry style (type-free style) Fulltext Access 19 Pages 2014
A decidable two-sorted quantified fragment of set theory with ordered pairs and some undecidable extensions Fulltext Access 19 Pages 2014
A case study on the lightweight verification of a multi-threaded task server Fulltext Access 19 Pages 2014
Metrics and techniques for quantifying performance isolation in cloud environments Fulltext Access 19 Pages 2014
Model-driven toolset for embedded reconfigurable cores: Flexible prototyping and software-like debugging Fulltext Access 19 Pages 2014
Versatile, scalable, and accurate simulation of distributed applications and platforms Fulltext Access 19 Pages 2014
Marginal reversible jump Markov chain Monte Carlo with application to motor unit number estimation Fulltext Access 19 Pages 2014
Scheduling arc maintenance jobs in a network to maximize total flow over time Fulltext Access 19 Pages 2014
Parameterized approximability of maximizing the spread of influence in networks Fulltext Access 19 Pages 2014
Guarantees and limits of preprocessing in constraint satisfaction and reasoning Fulltext Access 19 Pages 2014
Modeling tails of aggregate economic processes in a stochastic growth model Fulltext Access 19 Pages 2014
Adaptive likelihood ratio approaches for the detection of space-time disease clusters Fulltext Access 19 Pages 2014
Parsimonious parameterization of correlation matrices using truncated vines and factor analysis Fulltext Access 19 Pages 2014
A new method for non-unit protection of power transmission lines based on fault resistance and fault angle reduction Fulltext Access 19 Pages 2014
Fast fault section estimation in distribution control centers using adaptive genetic algorithm Fulltext Access 19 Pages 2014
A queueing theoretic approach for performance evaluation of low-power multi-core embedded systems Fulltext Access 19 Pages 2014
Bounded Budget Connection (BBC) games or how to make friends and influence people, on a budget Fulltext Access 19 Pages 2014
Combinatorial optimization with one quadratic term: Spanning trees and forests Fulltext Access 19 Pages 2014
Recursive estimation of nonparametric regression with functional covariate Fulltext Access 19 Pages 2014
On the determinacy of concurrent games on event structures with infinite winning sets Fulltext Access 19 Pages 2014
Mesh distribution system analysis in presence of distributed generation with time varying load model Fulltext Access 19 Pages 2014
New Concepts of Feasibility and Efficiency of Solutions in Fuzzy Mathematical Programming Problems Fulltext Access 19 Pages 2014
Discovering gene association networks by multi-objective evolutionary quantitative association rules Fulltext Access 19 Pages 2014
The Rough Intuitionistic Fuzzy Ideals of Intuitionistic Fuzzy Subrings in a Commutative Ring Fulltext Access 19 Pages 2014
An efficient algorithm for computing safe exit points of moving range queries in directed road networks Fulltext Access 19 Pages 2014
An unsupervised training method for non-intrusive appliance load monitoring Fulltext Access 19 Pages 2014
Fractional Goal Programming for Fuzzy Solid Transportation Problem with Interval Cost Fulltext Access 19 Pages 2014
A possibility degree method for interval-valued intuitionistic fuzzy multi-attribute group decision making Fulltext Access 20 Pages 2014
Nominal Lawvere Theories: A category theoretic account of equational theories with names Fulltext Access 20 Pages 2014
A survey of support for structured communication in concurrency control models Fulltext Access 20 Pages 2014
A graph mining approach for detecting identical design structures in object-oriented design models Fulltext Access 20 Pages 2014
The formalization and implementation of Adaptable Parsing Expression Grammars Fulltext Access 20 Pages 2014
The syntax and semantics of a domain-specific language for flow-network design Fulltext Access 20 Pages 2014
Software control flow error detection and correlation with system performance deviation Fulltext Access 20 Pages 2014
Towards a generic view of primality through multiset decompositions of natural numbers Fulltext Access 20 Pages 2014
A description based on languages of the final non-deterministic automaton Fulltext Access 20 Pages 2014
Tree projections and structural decomposition methods: Minimality and game-theoretic characterization Fulltext Access 20 Pages 2014
A conceptual model and technological support for organizational knowledge management Fulltext Access 20 Pages 2014
Performance analysis of randomised search heuristics operating with a fixed budget Fulltext Access 20 Pages 2014
Building a reputation-based bootstrapping mechanism for newcomers in collaborative alert systems Fulltext Access 20 Pages 2014