Data protection in Germany I: The population census decision and the right to informational self-determination Fulltext Access 5 Pages 2009
The regular article tracking developments at the national level in key European countries in the area of IT and communications – Co-ordinated by Herbert Smith LLP and contributed to by firms across Europe Fulltext Access 5 Pages 2009
The Bermuda Islands blow ‘sweet & sour’ on employers’ liability for Internet libel Fulltext Access 5 Pages 2009
Grid-based deployment and performance measurement of the Weather Research & Forecasting model Fulltext Access 5 Pages 2009
Note on Shim and Kim’s lower bounds for scheduling on identical parallel machines to minimize total tardiness Fulltext Access 5 Pages 2009
OptIPuter: Enabling advanced applications with novel optical control planes and backplanes Fulltext Access 5 Pages 2009
Planning production using mathematical programming: The case of a woodturning company Fulltext Access 6 Pages 2009
A simulated annealing algorithm for single machine scheduling problems with family setups Fulltext Access 6 Pages 2009
On-line scheduling of parallel machines to minimize total completion times Fulltext Access 6 Pages 2009
A heuristic to manage perishable inventory with batch ordering, positive lead-times, and time-varying demand Fulltext Access 6 Pages 2009
A population-based variable neighborhood search for the single machine total weighted tardiness problem Fulltext Access 6 Pages 2009
Fast, effective heuristics for the 0–1 multi-dimensional knapsack problem Fulltext Access 6 Pages 2009
Minimizing the number of machines for scheduling jobs with equal processing times Fulltext Access 6 Pages 2009
Discrete dynamic convexized method for nonlinearly constrained nonlinear integer programming Fulltext Access 6 Pages 2009
Bounding the Čebyšev functional for the Riemann–Stieltjes integral via a Beesack inequality and applications Fulltext Access 6 Pages 2009
B-spline method for solving linear system of second-order boundary value problems Fulltext Access 6 Pages 2009
Self-adaptive projection method for co-coercive variational inequalities Fulltext Access 6 Pages 2009
A tabu search heuristic for the vehicle routing problem with private fleet and common carrier Fulltext Access 6 Pages 2009
Calculation of delay characteristics for multiserver queues with constant service times Fulltext Access 6 Pages 2009
An incentive contract for leadtime reduction in an (S-1,S)(S-1,S) inventory system Fulltext Access 6 Pages 2009
Two simple constant ratio approximation algorithms for minimizing the total weighted completion time on a single machine with a fixed non-availability interval Fulltext Access 6 Pages 2009
A variable selection method based on Tabu search for logistic regression models Fulltext Access 6 Pages 2009
Developing a coordinated vendor–buyer model in two-stage supply chains with stochastic lead-times Fulltext Access 6 Pages 2009
An iterated local search algorithm for the permutation flowshop problem with total flowtime criterion Fulltext Access 6 Pages 2009
Conjugate direction particle swarm optimization solving systems of nonlinear equations Fulltext Access 6 Pages 2009
The research on mechanism of color management system based on iCAM color appearance model Fulltext Access 6 Pages 2009
Developments in electronic money regulation – the Electronic Money Directive: A better deal for e-money issuers? Fulltext Access 6 Pages 2009
Real-time reconfiguration for guaranteeing QoS provisioning levels in Grid environments Fulltext Access 6 Pages 2009
Model-based simulation and performance evaluation of grid scheduling strategies Fulltext Access 6 Pages 2009
Real time switching and streaming transmission of uncompressed 4K motion pictures Fulltext Access 6 Pages 2009
Integrated resource management for lambda-grids: The Distributed Virtual Computer (DVC) Fulltext Access 6 Pages 2009
A mechanism for grid service composition behavior specification and verification Fulltext Access 6 Pages 2009
Structure design and test of enterprise security management system with advanced internal security Fulltext Access 6 Pages 2009
Secure verifiable non-interactive oblivious transfer protocol using RSA and Bit commitment on distributed environment Fulltext Access 6 Pages 2009
Evaluation of two-dimensional ZK-MEW equation using the Exp-function method Fulltext Access 6 Pages 2009
Generalized projection method for a variational inequality system with different mapping in Banach spaces Fulltext Access 6 Pages 2009
Erratum to: “Notes on Triple I method of fuzzy reasoning” [Comput. Math. Appl. 44 (2002) 1567–1579] Fulltext Access 6 Pages 2009
Existence results for a coupled system of nonlinear fractional differential equations with three-point boundary conditions Fulltext Access 6 Pages 2009
Triple positive solutions for pp-Laplacian mm-point boundary value problem on time scales Fulltext Access 6 Pages 2009
A new application of He’s variational iteration method for the solution of the one-phase Stefan problem Fulltext Access 6 Pages 2009
Periodic solutions for some strongly nonlinear oscillations by He’s energy balance method Fulltext Access 6 Pages 2009
Approximate soliton solutions for a (2+1)(2+1)-dimensional Broer–Kaup system by He’s methods Fulltext Access 6 Pages 2009
Thermal shock modeling of Ultra-High Temperature Ceramics under active cooling Fulltext Access 6 Pages 2009
Exp-function method for a nonlinear ordinary differential equation and new exact solutions of the dispersive long wave equations Fulltext Access 6 Pages 2009
Conservative upwind difference schemes for the Euler equations for real gas flows in a duct Fulltext Access 6 Pages 2009
Minimizing interference in satellite communications using transiently chaotic neural networks Fulltext Access 6 Pages 2009
A novel two-phase heuristic method for vehicle routing problem with backhauls Fulltext Access 6 Pages 2009