Genetic programming for anticancer therapeutic response prediction using the NCI-60 dataset Fulltext Access 11 Pages 2010
The benefit of VMI strategies in a stochastic multi-product serial two echelon system Fulltext Access 11 Pages 2010
An evolutionary approach with diversity guarantee and well-informed grouping recombination for graph coloring Fulltext Access 11 Pages 2010
A branch and price algorithm to minimize makespan on a single batch processing machine with non-identical job sizes Fulltext Access 11 Pages 2010
A model of portfolio optimization using time adapting genetic network programming Fulltext Access 11 Pages 2010
Lattice Boltzmann computations of incompressible laminar flow and heat transfer in a constricted channel Fulltext Access 11 Pages 2010
Optimal design for non-Newtonian flows using a topology optimization approach Fulltext Access 11 Pages 2010
Application of the Lattice-Boltzmann method to the modeling of population blob dynamics in 2D porous domains Fulltext Access 11 Pages 2010
Multirange multi-relaxation time Shan–Chen model with extended equilibrium Fulltext Access 11 Pages 2010
Arc-flow model for the two-dimensional guillotine cutting stock problem Fulltext Access 11 Pages 2010
DEMORS: A hybrid multi-objective optimization algorithm using differential evolution and rough set theory for constrained problems Fulltext Access 11 Pages 2010
A Hybrid Multi-Swarm Particle Swarm Optimization algorithm for the Probabilistic Traveling Salesman Problem Fulltext Access 11 Pages 2010
Transient analysis of pollutant dispersion in a cylindrical pipe with a nonlinear waste discharge concentration Fulltext Access 11 Pages 2010
Numerical solution of system of nonlinear second-order integro-differential equations Fulltext Access 11 Pages 2010
Bicriteria robotic operation allocation in a flexible manufacturing cell Fulltext Access 11 Pages 2010
Model development in discrete-event simulation and system dynamics: An empirical study of expert modellers Fulltext Access 11 Pages 2010
Robust scheduling and robustness measures for the discrete time/cost trade-off problem Fulltext Access 11 Pages 2010
A model for dynamic chance constraints in hydro power reservoir management Fulltext Access 11 Pages 2010
Multiattribute utility analysis for policy selection and financing for the preservation of the forest Fulltext Access 11 Pages 2010
Optimization and analysis of the profitability of tariff structures with two-part tariffs Fulltext Access 11 Pages 2010
Scheduling elective surgery under uncertainty and downstream capacity constraints Fulltext Access 11 Pages 2010
Throughput optimization in robotic cells with input and output machine buffers: A comparative study of two key models Fulltext Access 11 Pages 2010
Branch-and-cut for the pickup and delivery traveling salesman problem with FIFO loading Fulltext Access 11 Pages 2010
A novel competitive co-evolutionary quantum genetic algorithm for stochastic job shop scheduling problem Fulltext Access 11 Pages 2010
Core-Edge design of storage area networks—A Single-edge formulation with problem-specific cuts Fulltext Access 11 Pages 2010
A robust transportation signal control problem accounting for traffic dynamics Fulltext Access 11 Pages 2010
Metaheuristics for the waste collection vehicle routing problem with time windows, driver rest period and multiple disposal facilities Fulltext Access 11 Pages 2010
Optimal due date assignment and resource allocation in a group technology scheduling environment Fulltext Access 11 Pages 2010
Parallel machine scheduling with precedence constraints and setup times Fulltext Access 11 Pages 2010
An ant colony optimization metaheuristic for machine–part cell formation problems Fulltext Access 11 Pages 2010
Group shops scheduling with makespan criterion subject to random release dates and processing times Fulltext Access 11 Pages 2010
Min-degree constrained minimum spanning tree problem: New formulation via Miller–Tucker–Zemlin constraints Fulltext Access 11 Pages 2010
Design of pre-processing algorithms for efficient MIMO–OFDM receiver architectures Fulltext Access 11 Pages 2010
Heuristics for the two-machine flowshop scheduling problem to minimize maximum lateness with bounded processing times Fulltext Access 11 Pages 2010
Positive solutions of second-order delay differential equations with a damping term Fulltext Access 11 Pages 2010
Some new sequence spaces derived by the domain of generalized difference matrix Fulltext Access 11 Pages 2010
Triple positive solutions for a multi-point boundary value problem with a one-dimensional pp-Laplacian Fulltext Access 11 Pages 2010
Some properties of a certain subclass of multivalent analytic functions involving the Liu–Owa operator Fulltext Access 11 Pages 2010
Coexistence and stability of an unstirred chemostat model with Beddington–DeAngelis function Fulltext Access 11 Pages 2010
On the selection of primal unknowns for a FETI-DP formulation of the Stokes problem in two dimensions Fulltext Access 11 Pages 2010
Optimally balancing data and pilot power for adaptive MIMO-OFDM systems Fulltext Access 11 Pages 2010
Performance analysis of multiuser diversity with antenna selection in MIMO MRC systems Fulltext Access 11 Pages 2010
Upper and lower bounds on subcarrier collision for inter-cell interference scheduler in OFDMA-based systems: Voice traffic Fulltext Access 11 Pages 2010
A universal access control method based on host identifiers for Future Internet Fulltext Access 11 Pages 2010
Grids with multiple batch systems for performance enhancement of multi-component and parameter sweep parallel applications Fulltext Access 11 Pages 2010
Scalable DHT- and ontology-based information service for large-scale grids Fulltext Access 11 Pages 2010
An adaptive multisite mapping for computationally intensive grid applications Fulltext Access 11 Pages 2010
Ensuring the performance and scalability of peer-to-peer distributed virtual environments Fulltext Access 11 Pages 2010
A model to predict the optimal performance of the Hierarchical Data Grid Fulltext Access 11 Pages 2010
OSLN: An Object-Oriented Semantic Link Network language for complex object description and operation Fulltext Access 11 Pages 2010
Triva: Interactive 3D visualization for performance analysis of parallel applications Fulltext Access 11 Pages 2010
CARE Resource Broker: A framework for scheduling and supporting virtual resource management Fulltext Access 11 Pages 2010
Symbolic algorithm for inverting cyclic pentadiagonal matrices recursively — Derivation and implementation Fulltext Access 11 Pages 2010
A new operational matrix for solving fractional-order differential equations Fulltext Access 11 Pages 2010
New approach modeling and a maximum power point tracker method for solar cells Fulltext Access 11 Pages 2010
Vendor selection problem by using an interactive fuzzy multi-objective approach with modified S-curve membership functions Fulltext Access 11 Pages 2010
Optimal allocation and sizing of capacitors to minimize the transmission line loss and to improve the voltage profile Fulltext Access 11 Pages 2010
Multiple positive solutions of nn-point boundary value problems for pp-Laplacian impulsive dynamic equations on time scales Fulltext Access 11 Pages 2010
Strong convergence of the modified Ishikawa iterative method for infinitely many nonexpansive mappings in Banach spaces Fulltext Access 11 Pages 2010
A multi-step differential transform method and application to non-chaotic or chaotic systems Fulltext Access 11 Pages 2010
Modified hybrid algorithms for Lipschitz quasi-pseudo-contractive mappings in Hilbert spaces Fulltext Access 11 Pages 2010
Solution of nonlinear pull-in behavior in electrostatic micro-actuators by using He’s homotopy perturbation method Fulltext Access 11 Pages 2010
Improved binary four point subdivision scheme and new corner cutting scheme Fulltext Access 11 Pages 2010
Decentralized robust set-valued state estimation in networked multiple sensor systems Fulltext Access 11 Pages 2010
A guest-transparent file integrity monitoring method in virtualization environment Fulltext Access 11 Pages 2010
Kerberos based authentication for inter-domain roaming in wireless heterogeneous network Fulltext Access 11 Pages 2010
An inter-domain authentication scheme for pervasive computing environment Fulltext Access 11 Pages 2010
Realization of Call-Back Authentication (CBA) for secure web to cellular phone SMS communication Fulltext Access 11 Pages 2010