• Daneshyari
  • Topics
    • Physical Sciences and Engineering
      Life Sciences
      Health Sciences
      Social Sciences and Humanities
Daneshyari Computer Science (General) Journas Latest Articles

Computer Science (General) Research Articles

Periodicity and asymptotic stability of a predator–prey system with infinite delays
Fulltext Access 8 Pages 2010
Soft set theory and uni–int decision making
Fulltext Access 8 Pages 2010
Coordination of supply chains by option contracts: A cooperative game theory approach
Fulltext Access 8 Pages 2010
Gains from diversification on convex combinations: A majorization and stochastic dominance approach
Fulltext Access 8 Pages 2010
GRASP heuristic with path-relinking for the multi-plant capacitated lot sizing problem
Fulltext Access 8 Pages 2010
An inventory model with unidirectional lateral transshipments
Fulltext Access 8 Pages 2010
Minmax regret approach and optimality evaluation in combinatorial optimization problems with interval and fuzzy weights
Fulltext Access 8 Pages 2010
Robust network design in telecommunications under polytope demand uncertainty
Fulltext Access 8 Pages 2010
The group consensus based evidential reasoning approach for multiple attributive group decision analysis
Fulltext Access 8 Pages 2010
Min sum clustering with penalties
Fulltext Access 8 Pages 2010
Change of the Willmore energy under infinitesimal bending of membranes
Fulltext Access 8 Pages 2010
DES with any reduced masked rounds is not secure against side-channel attacks
Fulltext Access 8 Pages 2010
A scale based trust model for multi-context environments
Fulltext Access 8 Pages 2010
Incentives and individual motivation in supervised work groups
Fulltext Access 8 Pages 2010
On Poncelet’s maps
Fulltext Access 8 Pages 2010
On solutions of set-valued optimization problems
Fulltext Access 8 Pages 2010
A fourth-order numerical scheme for solving the modified Burgers equation
Fulltext Access 8 Pages 2010
Another neural network based approach for computing eigenvalues and eigenvectors of real skew-symmetric matrices
Fulltext Access 8 Pages 2010
Classes of multivalent functions associated with a convolution operator
Fulltext Access 8 Pages 2010
Random Airy type differential equations: Mean square exact and numerical solutions
Fulltext Access 8 Pages 2010
Application of the (G′G)-expansion method to (3 +1)-dimensional nonlinear evolution equations
Fulltext Access 8 Pages 2010
Approximation properties of complex qq-Szász–Mirakjan operators in compact disks
Fulltext Access 8 Pages 2010
Generalized weak contractions in partially ordered metric spaces
Fulltext Access 8 Pages 2010
Fuzzy nonlinear set-valued variational inclusions
Fulltext Access 8 Pages 2010
Uniqueness and periodicity of meromorphic functions concerning the difference operator
Fulltext Access 8 Pages 2010
Optimal solutions for unrelated parallel machines scheduling problems using convex quadratic reformulations
Fulltext Access 8 Pages 2010
The use of interval arithmetic in solving a non-linear rational expectation based multiperiod output-inflation process model: The case of the IN/GB method
Fulltext Access 8 Pages 2010
The two-machine open-shop problem with unit-time operations and time delays to minimize the makespan
Fulltext Access 8 Pages 2010
Solving multiobjective, multiconstraint knapsack problems using mathematical programming and evolutionary algorithms
Fulltext Access 8 Pages 2010
On optimal service capacity allocation policy in an advance selling environment in continuous time
Fulltext Access 8 Pages 2010
Time-indexed formulations for scheduling chains on a single machine: An application to airborne radars
Fulltext Access 8 Pages 2010
Robust strategies for natural gas procurement
Fulltext Access 8 Pages 2010
An efficient tabu algorithm for the single row facility layout problem
Fulltext Access 8 Pages 2010
Non-block scheduling with priority for radiotherapy treatments
Fulltext Access 8 Pages 2010
An adjustment scheme for nonlinear pricing problem with two buyers
Fulltext Access 8 Pages 2010
A model for maintenance service contract design, negotiation and optimization
Fulltext Access 8 Pages 2010
Diagnostic errors and repetitive sequential classifications in on-line process control by attributes
Fulltext Access 8 Pages 2010
On the link between Markovian trees and tree-structured Markov chains
Fulltext Access 8 Pages 2010
Partially ordered cone metric spaces and coupled fixed point results
Fulltext Access 8 Pages 2010
Scheduling identical jobs and due-window on uniform machines
Fulltext Access 8 Pages 2010
An optimal online algorithm for single machine scheduling with bounded delivery times
Fulltext Access 8 Pages 2010
Benchmarking the operating efficiency of Asia container ports
Fulltext Access 8 Pages 2010
Induction over constrained strategic agents
Fulltext Access 8 Pages 2010
Limitations of learning in automata-based systems
Fulltext Access 8 Pages 2010
An optimal production-inventory model for deteriorating items with multiple-market demand
Fulltext Access 8 Pages 2010
Supply chain interactions due to store-brand introductions: The impact of retail competition
Fulltext Access 8 Pages 2010
Developing a market-based approach to managing the US strategic petroleum reserve
Fulltext Access 8 Pages 2010
New lower bounds for bin packing problems with conflicts
Fulltext Access 8 Pages 2010
Network DEA: Additive efficiency decomposition
Fulltext Access 8 Pages 2010
Generalised soft binomial American real option pricing model (fuzzy–stochastic approach)
Fulltext Access 8 Pages 2010
An auction method for resource allocation in computational grids
Fulltext Access 8 Pages 2010
Asia-pacific news
Fulltext Access 8 Pages 2010
Internet of Things – New security and privacy challenges
Fulltext Access 8 Pages 2010
Open source software (OSS) governance in the organisation
Fulltext Access 8 Pages 2010
Chilling ISPs… when private regulators act without adequate public framework…
Fulltext Access 8 Pages 2010
Asia-Pacific news
Fulltext Access 8 Pages 2010
EU law requirements to provide information to website visitors
Fulltext Access 8 Pages 2010
Wireless transmission using cooperation on demand
Fulltext Access 8 Pages 2010
Transmitted power allocation/control for multi-band MC-CDMA
Fulltext Access 8 Pages 2010
Asia-Pacific news
Fulltext Access 8 Pages 2010
A noncooperative power control game in multi-access fading channels with quality of service (QoS) constraints
Fulltext Access 8 Pages 2010
Dynamic reconfiguration of software defined radios using standard architectures
Fulltext Access 8 Pages 2010
Parallel OLAP with the Sidera server
Fulltext Access 8 Pages 2010
Smart and integrated ticketing in the UK: Piecing together the jigsaw
Fulltext Access 8 Pages 2010
Giga-stack: A method for visualizing giga-pixel layered imagery on massively tiled displays
Fulltext Access 8 Pages 2010
Large-scale functional MRI study on a production grid
Fulltext Access 8 Pages 2010
Optimal workload allocation model for scheduling divisible data grid applications
Fulltext Access 8 Pages 2010
A precompiler to reduce the memory footprint of multiscale PDE solvers in C++
Fulltext Access 8 Pages 2010
Comprehensive cache performance tuning with a toolset
Fulltext Access 8 Pages 2010
Transforming MPI source code based on communication patterns
Fulltext Access 8 Pages 2010
VLBI_UDP: An application for transporting VLBI data using the UDP protocol
Fulltext Access 8 Pages 2010
JXTA resource access control by means of advertisement encryption
Fulltext Access 8 Pages 2010
Steering and visualization: Enabling technologies for computational science
Fulltext Access 8 Pages 2010
A multiple-perspective approach to constructing and aggregating Citation Semantic Link Network
Fulltext Access 8 Pages 2010
Discovering phishing target based on semantic link network
Fulltext Access 8 Pages 2010
Relative perturbation bounds for weighted polar decomposition
Fulltext Access 8 Pages 2010
Start-up flow of a viscoelastic fluid in a pipe with a fractional Maxwell’s model
Fulltext Access 8 Pages 2010
Common fixed point theorems in Menger spaces with common property (E.A)
Fulltext Access 8 Pages 2010
On certain subclasses of meromorphic functions associated with certain integral operators
Fulltext Access 8 Pages 2010
Maximum cardinality resonant sets and maximal alternating sets of hexagonal systems
Fulltext Access 8 Pages 2010
A multi-objective re-assembling policy model and its implementation in the case of a network of personal computers
Fulltext Access 8 Pages 2010
Damped oscillators: A continuous model for velocity dependent drag
Fulltext Access 8 Pages 2010
Multiobjective mixed symmetric duality involving cones
Fulltext Access 8 Pages 2010
Refinements of Hadamard-type inequalities for quasi-convex functions with applications to trapezoidal formula and to special means
Fulltext Access 8 Pages 2010
Existence of mild solutions to stochastic neutral partial functional differential equations with non-Lipschitz coefficients
Fulltext Access 8 Pages 2010
A new system of generalized quasi-variational-like inclusion in Hilbert spaces
Fulltext Access 8 Pages 2010
Complexity of terms, superpositions, and generalized hypersubstitutions
Fulltext Access 8 Pages 2010
On characterizations of preinvex fuzzy mappings
Fulltext Access 8 Pages 2010
VDB-MR: MapReduce-based distributed data integration using virtual database
Fulltext Access 8 Pages 2010
Adaptive-expectation based multi-attribute FTS model for forecasting TAIEX
Fulltext Access 8 Pages 2010
Vague soft sets and their properties
Fulltext Access 8 Pages 2010
Detection of over-represented motifs corresponding to known TFBSs via motif clustering and matching
Fulltext Access 8 Pages 2010
Prediction of multivariate chaotic time series with local polynomial fitting
Fulltext Access 8 Pages 2010
Feedback numbers of de Bruijn digraphs
Fulltext Access 8 Pages 2010
System initial conditions vs derivative initial conditions
Fulltext Access 8 Pages 2010
Fractional wavelet transform for the quantitative spectral resolution of the composite signals of the active compounds in a two-component mixture
Fulltext Access 8 Pages 2010
Control of a heat diffusion system through a fractional order nonlinear algorithm
Fulltext Access 8 Pages 2010
Effect of fractional orders in the velocity control of a servo system
Fulltext Access 8 Pages 2010
The exploitation of Business Register data from a public sector information and data protection perspective: A case study
Fulltext Access 8 Pages 2010
When video cameras watch and screen: Privacy implications of pattern recognition technologies
Fulltext Access 8 Pages 2010
<< < 314 315 316 317 318 > >>
Related Topics
Genetic algorithm Articles
6327 Papers
Computer simulation Articles
3034 Papers
Productivity Articles
2777 Papers
Fuzzy logic Articles
2743 Papers
synchronization Articles
2257 Papers
Social media Articles
2052 Papers
Security Articles
2003 Papers
Automation Articles
1810 Papers
Cluster Articles
1655 Papers
Virtual reality Articles
1583 Papers
Robotics Articles
1524 Papers
Cloud computing Articles
1472 Papers
Fault detection Articles
1414 Papers
Social networks Articles
1409 Papers
survival analysis Articles
1353 Papers
CAM Articles
1272 Papers
Computer simulations Articles
1253 Papers
Computer vision Articles
1193 Papers
Privacy Articles
1165 Papers
Polymorphisms Articles
1155 Papers
Simulations Articles
1129 Papers
Information retrieval Articles
955 Papers
Scale-up Articles
840 Papers
Social network analysis Articles
712 Papers
Facebook Articles
666 Papers
Geographic information systems Articles
645 Papers
ICT Articles
638 Papers
Multimedia Articles
618 Papers
Semantic web Articles
592 Papers
Computer-mediated communication Articles
569 Papers
Process simulation Articles
531 Papers
Smartphone Articles
520 Papers
Artificial Intelligence Articles
Computational Theory and Mathematics Articles
Computer Graphics and Computer-Aided Design Articles
Computer Networks and Communications Articles
Computer Science (General) Articles
Computer Science Applications Articles
Computer Vision and Pattern Recognition Articles
Hardware and Architecture Articles
Human-Computer Interaction Articles
Information Systems Articles
Signal Processing Articles
Software Articles
All Topics
Related Journals
Artificial Intelligence Journals
Computational Theory and Mathematics Journals
Computer Graphics and Computer-Aided Design Journals
Computer Networks and Communications Journals
Computer Science (General) Journals
Computer Science Applications Journals
Computer Vision and Pattern Recognition Journals
Hardware and Architecture Journals
Human-Computer Interaction Journals
Information Systems Journals
Signal Processing Journals
Software Journals
New Scientist Journal
Electronic Notes in Theoretical Computer Science Journal
Future Generation Computer Systems Journal
Physical Communication Journal
Applied Computing and Informatics Journal
Computer Law & Security Review Journal
Computer Methods and Programs in Biomedicine Journal
Computer Science Review Journal
Computers & Mathematics with Applications Journal
Computers & Operations Research Journal
Egyptian Informatics Journal Journal
Engineering Journal
Engineering Science and Technology, an International Journal Journal
European Journal of Operational Research Journal
Informatics in Medicine Unlocked Journal
Journal of the Egyptian Mathematical Society Journal
Journal of King Saud University - Computer and Information Sciences Journal
Karbala International Journal of Modern Science Journal
Operations Research Perspectives Journal
Procedia Computer Science Journal
Procedia Technology Journal
Simulation Modelling Practice and Theory Journal
Sustainable Computing: Informatics and Systems Journal
Swarm and Evolutionary Computation Journal

Daneshyari.com

دسترسی سریع

  • صفحه اصلی دانشیاری
  • دسته بندی موضوعی مقالات
  • مقالات ترجمه شده
  • سفارش ترجمه مقاله
  • سفارش تولید محتوا
  • تولید محتوا

ارتباط

  • ورود
  • عضویت
  • تماس و پشتیبانی
  • تبلیغات

English Website

  • Home
  • Physical Sciences and Engineering
  • Life Sciences
  • Health Sciences
  • Social Sciences and Humanities