Runtime reduction techniques for the probabilistic traveling salesman problem with deadlines Fulltext Access 18 Pages 2009
A two-machine flowshop problem with processing time-dependent buffer constraints—An application in multimedia presentations Fulltext Access 18 Pages 2009
Dynamic behaviors of the impulsive periodic multi-species predator–prey system Fulltext Access 18 Pages 2009
Viscosity independent numerical errors for Lattice Boltzmann models: From recurrence equations to “magic” collision numbers Fulltext Access 18 Pages 2009
Improvements of semi-implicit schemes for hyperbolic balance laws applied on open channel flow equations Fulltext Access 18 Pages 2009
Convergence of optimal solutions about approximation scheme for fuzzy programming with minimum-risk criteria Fulltext Access 18 Pages 2009
A survey of repair methods used as constraint handling techniques in evolutionary algorithms Fulltext Access 18 Pages 2009
Cloud computing and emerging IT platforms: Vision, hype, and reality for delivering computing as the 5th utility Fulltext Access 18 Pages 2009
Implementing and analyzing in Maude the Enhanced Interior Gateway Routing Protocol Fulltext Access 18 Pages 2009
A random key based genetic algorithm for the resource constrained project scheduling problem Fulltext Access 18 Pages 2009
Rewriting Logic Specification of Membrane Systems with Promoters and Inhibitors Fulltext Access 18 Pages 2009
Some Programming Languages Suggested by Game Models (Extended Abstract) Fulltext Access 18 Pages 2009
Design of Architectures for Proximity-aware Services: Experiments in Context-based Authentication with Subjective Logic Fulltext Access 18 Pages 2009
Estimation of urban traffic conditions using an Automatic Vehicle Location (AVL) System Fulltext Access 18 Pages 2009
Comparison of different formulations of 2D beam elements based on Bond Graph technique Fulltext Access 18 Pages 2009
Scalable methodology for supply chain inventory coordination with private information Fulltext Access 18 Pages 2009
Integrating DEA-oriented performance assessment and target setting using interactive MOLP methods Fulltext Access 18 Pages 2009
On the communal analysis suspicion scoring for identity crime in streaming credit applications Fulltext Access 18 Pages 2009
Selection of contract suppliers under price and demand uncertainty in a dynamic market Fulltext Access 18 Pages 2009
Portfolio choice and optimal hedging with general risk functions: A simplex-like algorithm Fulltext Access 18 Pages 2009
Impact of information sharing and lead time on bullwhip effect and on-hand inventory Fulltext Access 18 Pages 2009
L-fuzzy Scott Topology and Scott Convergence of Stratified L-filters on Fuzzy Dcpos Fulltext Access 18 Pages 2009
An intelligent-agent-based fuzzy group decision making model for financial multicriteria decision support: The case of credit scoring Fulltext Access 18 Pages 2009
A regularized pairwise multi-classification knowledge-based machine and applications Fulltext Access 18 Pages 2009
ELECTRE methods with interaction between criteria: An extension of the concordance index Fulltext Access 18 Pages 2009
Finding rectilinear least cost paths in the presence of convex polygonal congested regions Fulltext Access 18 Pages 2009
A comparative analysis of several asymmetric traveling salesman problem formulations Fulltext Access 18 Pages 2009
Heuristic factory planning algorithm for advanced planning and scheduling Fulltext Access 18 Pages 2009
Formal Verification and Validation of UML 2.0 Sequence Diagrams using Source and Destination of Messages Fulltext Access 18 Pages 2009
A Tableau Decision Procedure for ALC With Monotonic Modal Operators and Constant Domains Fulltext Access 18 Pages 2009
A TLA+ Formal Specification and Verification of a New Real-Time Communication Protocol Fulltext Access 18 Pages 2009
Verified Compilation and the B Method: A Proposal and a First Appraisal Fulltext Access 18 Pages 2009
Approximating Probabilistic Behaviors of Biological Systems Using Abstract Interpretation Fulltext Access 18 Pages 2009
Using Heuristics to Automate Parameter Generation for Benchmarking of Java Methods Fulltext Access 19 Pages 2009
BAS: A Case Study for Modeling and Verification in Trustable Model Driven Development Fulltext Access 19 Pages 2009
Sound and Complete SLD-Resolution for Bilattice-Based Annotated Logic Programs Fulltext Access 19 Pages 2009
Denotational Semantics of Call-by-name Normalization in Lambda-mu Calculus Fulltext Access 19 Pages 2009
Parallel and Distributed Invariant Checking of Microcontroller Software Fulltext Access 19 Pages 2009