Efficient processing of label-constraint reachability queries in large graphs Fulltext Access 20 Pages 2014
Center-within-trial versus trial-level evaluation of surrogate endpoints Fulltext Access 20 Pages 2014
Bayesian analysis of tail asymmetry based on a threshold extreme value model Fulltext Access 20 Pages 2014
Maximum likelihood estimation of spatially and serially correlated panels with random effects Fulltext Access 20 Pages 2014
A reliability assessment based graph theoretical approach for feeder routing in power distribution networks including distributed generations Fulltext Access 20 Pages 2014
Artificial immune simulation for improved forecasting of electricity consumption with random variations Fulltext Access 20 Pages 2014
Yield grammar analysis and product optimization in a domain-specific language for dynamic programming Fulltext Access 21 Pages 2014
Parameter cascading for panel models with unknown number of unobserved factors: An application to the credit spread puzzle Fulltext Access 21 Pages 2014
Shortest-linkage-based parallel hierarchical clustering on main-belt moving objects of the solar system Fulltext Access 21 Pages 2014
Compositional semantics and behavioural equivalences for reaction systems with restriction Fulltext Access 21 Pages 2014
Sequential aggregate signatures with lazy verification from trapdoor permutations Fulltext Access 21 Pages 2014
A new population seeding technique for permutation-coded Genetic Algorithm: Service transfer approach Fulltext Access 21 Pages 2014
A spatiotemporal compression based approach for efficient big data processing on Cloud Fulltext Access 21 Pages 2014
The higher-order meet-in-the-middle attack and its application to the Camellia block cipher Fulltext Access 21 Pages 2014
On the use of feature-oriented programming for evolving software product lines — A comparative study Fulltext Access 21 Pages 2014
A query language and ranking algorithm for news items in the Hermes news processing framework Fulltext Access 21 Pages 2014
Modeling the complex dynamics and changing correlations of epileptic events Fulltext Access 21 Pages 2014
Reducing the verification cost of evolving product families using static analysis techniques Fulltext Access 21 Pages 2014
Adding pebbles to weighted automata: Easy specification & efficient evaluation Fulltext Access 21 Pages 2014
Testing for persistence change in fractionally integrated models: An application to world inflation rates Fulltext Access 21 Pages 2014
Joint search with self-interested agents and the failure of cooperation enhancers Fulltext Access 21 Pages 2014
A comparison of confluence and ample sets in probabilistic and non-probabilistic branching time Fulltext Access 21 Pages 2014
Scalable skyline computation using a balanced pivot selection technique Fulltext Access 21 Pages 2014
An event-based platform for collaborative threats detection and monitoring Fulltext Access 21 Pages 2014
What stakeholders will or will not say: A theoretical and empirical study of topic importance in Requirements Engineering elicitation interviews Fulltext Access 21 Pages 2014
Parallel online spatial and temporal aggregations on multi-core CPUs and many-core GPUs Fulltext Access 21 Pages 2014
Using a knowledge learning framework to predict errors in database design Fulltext Access 21 Pages 2014
A hybrid harmony search with arithmetic crossover operation for economic dispatch Fulltext Access 21 Pages 2014
Robust growth mixture models with non-ignorable missingness: Models, estimation, selection, and application Fulltext Access 21 Pages 2014
Multiple break detection in the correlation structure of random variables Fulltext Access 21 Pages 2014
Design of an advanced electric power distribution systems using seeker optimization algorithm Fulltext Access 22 Pages 2014
A Bayesian approach to estimating animal density from binary acoustic transects Fulltext Access 22 Pages 2014
Empirical likelihood inference in linear regression with nonignorable missing response Fulltext Access 22 Pages 2014
Comparative analysis of asynchronous cellular automata in stochastic pharmaceutical modelling Fulltext Access 22 Pages 2014
An extended attribute based access control model with trust and privacy: Application to a collaborative crisis management system Fulltext Access 22 Pages 2014
Better redistribution with inefficient allocation in multi-unit auctions Fulltext Access 22 Pages 2014
Formal specification and proofs for the topology and classification of combinatorial surfaces Fulltext Access 22 Pages 2014
Ordered weighted average combinatorial optimization: Formulations and their properties Fulltext Access 22 Pages 2014
An Ontological Rule-Based Approach for Analyzing Dead and False Optional Features in Feature Models Fulltext Access 22 Pages 2014
Concurrency control generation for dynamic threads using discrete-event systems Fulltext Access 22 Pages 2014
Mitigating the effects of equivalent mutants with mutant classification strategies Fulltext Access 22 Pages 2014
On modelling and verifying railway interlockings: Tracking train lengths Fulltext Access 22 Pages 2014
Property-dependent reductions adequate with divergence-sensitive branching bisimilarity Fulltext Access 23 Pages 2014
Logical characterizations of regular equivalence in weighted social networks Fulltext Access 23 Pages 2014
Real-time verification of wireless home networks using bigraphs with sharing Fulltext Access 23 Pages 2014
Exploiting semantic technologies in smart environments and grids: Emerging roles and case studies Fulltext Access 23 Pages 2014
Compositional assume–guarantee reasoning for input/output component theories Fulltext Access 23 Pages 2014