Periodicity and asymptotic stability of a predator–prey system with infinite delays Fulltext Access 8 Pages 2010
Coordination of supply chains by option contracts: A cooperative game theory approach Fulltext Access 8 Pages 2010
Gains from diversification on convex combinations: A majorization and stochastic dominance approach Fulltext Access 8 Pages 2010
GRASP heuristic with path-relinking for the multi-plant capacitated lot sizing problem Fulltext Access 8 Pages 2010
Minmax regret approach and optimality evaluation in combinatorial optimization problems with interval and fuzzy weights Fulltext Access 8 Pages 2010
Robust network design in telecommunications under polytope demand uncertainty Fulltext Access 8 Pages 2010
The group consensus based evidential reasoning approach for multiple attributive group decision analysis Fulltext Access 8 Pages 2010
DES with any reduced masked rounds is not secure against side-channel attacks Fulltext Access 8 Pages 2010
A fourth-order numerical scheme for solving the modified Burgers equation Fulltext Access 8 Pages 2010
Another neural network based approach for computing eigenvalues and eigenvectors of real skew-symmetric matrices Fulltext Access 8 Pages 2010
Random Airy type differential equations: Mean square exact and numerical solutions Fulltext Access 8 Pages 2010
Application of the (G′G)-expansion method to (3 +1)-dimensional nonlinear evolution equations Fulltext Access 8 Pages 2010
Approximation properties of complex qq-Szász–Mirakjan operators in compact disks Fulltext Access 8 Pages 2010
Uniqueness and periodicity of meromorphic functions concerning the difference operator Fulltext Access 8 Pages 2010
Optimal solutions for unrelated parallel machines scheduling problems using convex quadratic reformulations Fulltext Access 8 Pages 2010
The use of interval arithmetic in solving a non-linear rational expectation based multiperiod output-inflation process model: The case of the IN/GB method Fulltext Access 8 Pages 2010
The two-machine open-shop problem with unit-time operations and time delays to minimize the makespan Fulltext Access 8 Pages 2010
Solving multiobjective, multiconstraint knapsack problems using mathematical programming and evolutionary algorithms Fulltext Access 8 Pages 2010
On optimal service capacity allocation policy in an advance selling environment in continuous time Fulltext Access 8 Pages 2010
Time-indexed formulations for scheduling chains on a single machine: An application to airborne radars Fulltext Access 8 Pages 2010
A model for maintenance service contract design, negotiation and optimization Fulltext Access 8 Pages 2010
Diagnostic errors and repetitive sequential classifications in on-line process control by attributes Fulltext Access 8 Pages 2010
An optimal online algorithm for single machine scheduling with bounded delivery times Fulltext Access 8 Pages 2010
An optimal production-inventory model for deteriorating items with multiple-market demand Fulltext Access 8 Pages 2010
Supply chain interactions due to store-brand introductions: The impact of retail competition Fulltext Access 8 Pages 2010
Developing a market-based approach to managing the US strategic petroleum reserve Fulltext Access 8 Pages 2010
Generalised soft binomial American real option pricing model (fuzzy–stochastic approach) Fulltext Access 8 Pages 2010
Chilling ISPs… when private regulators act without adequate public framework… Fulltext Access 8 Pages 2010
A noncooperative power control game in multi-access fading channels with quality of service (QoS) constraints Fulltext Access 8 Pages 2010
Dynamic reconfiguration of software defined radios using standard architectures Fulltext Access 8 Pages 2010
Giga-stack: A method for visualizing giga-pixel layered imagery on massively tiled displays Fulltext Access 8 Pages 2010
Optimal workload allocation model for scheduling divisible data grid applications Fulltext Access 8 Pages 2010
A precompiler to reduce the memory footprint of multiscale PDE solvers in C++ Fulltext Access 8 Pages 2010
VLBI_UDP: An application for transporting VLBI data using the UDP protocol Fulltext Access 8 Pages 2010
Steering and visualization: Enabling technologies for computational science Fulltext Access 8 Pages 2010
A multiple-perspective approach to constructing and aggregating Citation Semantic Link Network Fulltext Access 8 Pages 2010
Start-up flow of a viscoelastic fluid in a pipe with a fractional Maxwell’s model Fulltext Access 8 Pages 2010
On certain subclasses of meromorphic functions associated with certain integral operators Fulltext Access 8 Pages 2010
Maximum cardinality resonant sets and maximal alternating sets of hexagonal systems Fulltext Access 8 Pages 2010
A multi-objective re-assembling policy model and its implementation in the case of a network of personal computers Fulltext Access 8 Pages 2010
Refinements of Hadamard-type inequalities for quasi-convex functions with applications to trapezoidal formula and to special means Fulltext Access 8 Pages 2010
Existence of mild solutions to stochastic neutral partial functional differential equations with non-Lipschitz coefficients Fulltext Access 8 Pages 2010
A new system of generalized quasi-variational-like inclusion in Hilbert spaces Fulltext Access 8 Pages 2010
VDB-MR: MapReduce-based distributed data integration using virtual database Fulltext Access 8 Pages 2010
Adaptive-expectation based multi-attribute FTS model for forecasting TAIEX Fulltext Access 8 Pages 2010
Detection of over-represented motifs corresponding to known TFBSs via motif clustering and matching Fulltext Access 8 Pages 2010
Prediction of multivariate chaotic time series with local polynomial fitting Fulltext Access 8 Pages 2010
Fractional wavelet transform for the quantitative spectral resolution of the composite signals of the active compounds in a two-component mixture Fulltext Access 8 Pages 2010
Control of a heat diffusion system through a fractional order nonlinear algorithm Fulltext Access 8 Pages 2010
The exploitation of Business Register data from a public sector information and data protection perspective: A case study Fulltext Access 8 Pages 2010
When video cameras watch and screen: Privacy implications of pattern recognition technologies Fulltext Access 8 Pages 2010