On the performance of non-contiguous allocation for common communication patterns in 2D mesh-connected multicomputers Fulltext Access 11 Pages 2013
Developing a Framework to Improve and Embed Project Management Practices in Organisations Fulltext Access 11 Pages 2013
Addressing Transparency, Communication and Participation in Enterprise 2.0 Projects Fulltext Access 11 Pages 2013
Challenges and Benefits on the Path towards Discovering PMO: Cases from Italian Banking Sector Fulltext Access 11 Pages 2013
Putting “Human Crowds” in the Loop of Bibliography Evaluation: A Collaborative Working Environment for CSCW Publications Fulltext Access 11 Pages 2013
Knowledge Applications Development at the SMEs Level in a Virtual Business Environment Fulltext Access 11 Pages 2013
Issues of Modeling Web Information Systems Proposal for a Document-centric Approach Fulltext Access 11 Pages 2013
Topological characterization and modeling of dynamic evolving power distribution networks Fulltext Access 11 Pages 2013
A Semantic Peer-to-Peer Network for Service Composition in Scientific Domains Fulltext Access 11 Pages 2013
Visualizing Variability Management in Requirements Engineering through Formal Concept Analysis Fulltext Access 11 Pages 2013
Simulation Games as Tools for Integrative Dynamic Learning: The Case of the Management Course at the University of Algarve Fulltext Access 11 Pages 2013
A GIS Anchored System for Selection of Utility Service Stations through Hierarchical Clustering Fulltext Access 11 Pages 2013
Risk Analysis in Construction Sites Using Fuzzy Reasoning and Fuzzy Analytic Hierarchy Process Fulltext Access 11 Pages 2013
Prediction of Flow Regime for Air-water Flow in Circular Micro Channels Using ANN Fulltext Access 11 Pages 2013
Green Supply Chain Model with Product Remanufacturing under Volume Flexible Environment Fulltext Access 11 Pages 2013
An Efficient and Effective Wrapper based on Paired t-test for Learning Naive Bayes Classifiers from Large-scale Domains Fulltext Access 11 Pages 2013
Detection and diagnosis of node failure in wireless sensor networks: A multiobjective optimization approach Fulltext Access 11 Pages 2013
An ant colony optimization technique for solving min–max Multi-Depot Vehicle Routing Problem Fulltext Access 11 Pages 2013
Economic analysis and power management of a stand-alone wind/photovoltaic hybrid energy system using biogeography based optimization algorithm Fulltext Access 11 Pages 2013
Distributed DOA estimation using clustering of sensor nodes and diffusion PSO algorithm Fulltext Access 11 Pages 2013
A robust clustering method based on blind, naked mole-rats (BNMR) algorithm Fulltext Access 11 Pages 2013
Feasibility of retrofitting centralized HVAC systems for room-level zoning Fulltext Access 11 Pages 2013
High-throughput, energy-efficient network-on-chip-based hardware accelerators Fulltext Access 11 Pages 2013
The Effect of the IFRS on Intercompany Transactions. The Case of the Greek Food-beverage Sector Fulltext Access 11 Pages 2013
How to Save Expert Knowledge for the Organization: Methods for Collecting and Documenting Expert Knowledge Using Virtual Reality based Learning Environments Fulltext Access 11 Pages 2013
Development of a GIS Application for Urban Forestry Management Planning Fulltext Access 11 Pages 2013
CRF based Feature Extraction Applied for Supervised Automatic Text Summarization Fulltext Access 11 Pages 2013
A New Robust Multi-machine Power System Stabilizer Design Using Quantitative Feedback Theory Fulltext Access 11 Pages 2013
IoTs (Internet of Things) and DfPL (Device-free Passive Localisation) in a disaster management scenario Fulltext Access 11 Pages 2013
Performance evaluation and energy consumption of a real-time heterogeneous grid system using DVS and DPM Fulltext Access 11 Pages 2013
LEADMesh: Design and analysis of an efficient leader election protocol for wireless mesh networks Fulltext Access 11 Pages 2013
Optimal blank design based on finite element method for blades of large Francis turbines Fulltext Access 11 Pages 2013
A grid-based spatial data model for the simulation and analysis of individual behaviours in micro-spatial environments Fulltext Access 11 Pages 2013
Comparison between two model-based algorithms for Li-ion battery SOC estimation in electric vehicles Fulltext Access 11 Pages 2013
Online monitoring, filtering, blocking ….What is the difference? Where to draw the line? Fulltext Access 11 Pages 2013
A two-level finite element discretization of the streamfunction formulation of the stationary quasi-geostrophic equations of the ocean Fulltext Access 11 Pages 2013
Almost sure instability of the equilibrium solution of a Milstein-type stochastic difference equation Fulltext Access 11 Pages 2013
Blurring the dimensions of privacy? Law enforcement and trusted traveler programs Fulltext Access 11 Pages 2013
Digital identity, privacy and the right to identity in the United States of America Fulltext Access 11 Pages 2013
Privacy by design and anonymisation techniques in action: Case study of Ma3tch technology Fulltext Access 11 Pages 2013
Combating the threats of cybercrimes in Malaysia: The efforts, the cyberlaws and the traditional laws Fulltext Access 11 Pages 2013
Performance analysis of dual-cell HSDPA plus MIMO and LTE along with adaptive MIMO switching at the cellular level Fulltext Access 11 Pages 2013
Propagation characteristics and modeling in indoor multi-floor environment Fulltext Access 11 Pages 2013
Analysis of mobility impact on interference in cognitive radio networks Fulltext Access 11 Pages 2013
Social networking sites and the legal profession: Balancing benefits with navigating minefields Fulltext Access 11 Pages 2013
A fuzzy extension of VIKOR for target network selection in heterogeneous wireless environments Fulltext Access 11 Pages 2013
A fuzzy admission control scheme for high quality video delivery over underlay cognitive radio Fulltext Access 11 Pages 2013
When self-stabilization meets real platforms: An experimental study of a peer-to-peer service discovery system Fulltext Access 11 Pages 2013
Hybrid P2P schemes for remote terrain interactive visualization systems Fulltext Access 11 Pages 2013
Scheduling strategies for optimal service deployment across multiple clouds Fulltext Access 11 Pages 2013
Biometric encryption based on a fuzzy vault scheme with a fast chaff generation algorithm Fulltext Access 11 Pages 2013
Monte Carlo simulation on heterogeneous distributed systems: A computing framework with parallel merging and checkpointing strategies Fulltext Access 11 Pages 2013
Scalable service discovery in ubiquitous and pervasive computing architectures: A percolation-driven approach Fulltext Access 11 Pages 2013
Utilizing memory content similarity for improving the performance of highly available virtual machines Fulltext Access 11 Pages 2013
Operation and preventive maintenance scheduling for containerships: Mathematical model and solution algorithm Fulltext Access 11 Pages 2013
Virtual Reality Use in Architectural Design Studios: A Case of Studying Structure and Construction Fulltext Access 11 Pages 2013
The Analysis of Peasant Households’ Collective Brand Maintenance Behavior in the “One Village, One Product” Program of China Fulltext Access 11 Pages 2013
Energy Time Series Data Analysis based on a Novel Integrated Data Characteristic Testing Approach Fulltext Access 11 Pages 2013
Low Cost Augmented Reality and RFID Application for Logistics Items Visualization Fulltext Access 11 Pages 2013
A Cognitively Inspired Heuristic for Two-armed Bandit Problems: The Loosely Symmetric (LS) Model Fulltext Access 11 Pages 2013
Overtaking Method based on Variance of Values: Resolving the Exploration–Exploitation Dilemma Fulltext Access 11 Pages 2013
An approach to products placement in supermarkets using PrefixSpan algorithm Fulltext Access 11 Pages 2013
Provably secure certificateless strong designated verifier signature scheme based on elliptic curve bilinear pairings Fulltext Access 11 Pages 2013
Dynamics of cooperative predator–prey system with impulsive effects and Beddington–DeAngelis functional response Fulltext Access 11 Pages 2013
Optimal ship navigation with safety distance and realistic turn constraints Fulltext Access 11 Pages 2013
Performance implications of multi-tier application deployments on Infrastructure-as-a-Service clouds: Towards performance modeling Fulltext Access 11 Pages 2013
Variable preconditioning in complex Hilbert space and its application to the nonlinear Schrödinger equation Fulltext Access 11 Pages 2013
Convergence of a residual based artificial viscosity finite element method Fulltext Access 11 Pages 2013
Existence of nontrivial solutions for singular quasilinear elliptic equations on RNRN Fulltext Access 11 Pages 2013
Filter-matrix lattice Boltzmann simulation of lid-driven deep-cavity flows, Part II — Flow bifurcation Fulltext Access 11 Pages 2013
Time domain analysis of the fractional order weighted distributed parameter Maxwell model Fulltext Access 11 Pages 2013
Propagation speed of the maximum of the fundamental solution to the fractional diffusion–wave equation Fulltext Access 11 Pages 2013
A family of Adams exponential integrators for fractional linear systems Fulltext Access 11 Pages 2013
Gauss–Jacobi-type quadrature rules for fractional directional integrals Fulltext Access 11 Pages 2013
A two-grid algorithm for expanded mixed finite element approximations of semi-linear elliptic equations Fulltext Access 11 Pages 2013