• Daneshyari
  • Topics
    • Physical Sciences and Engineering
      Life Sciences
      Health Sciences
      Social Sciences and Humanities
Daneshyari Computer Science (General) Journas Latest Articles

Computer Science (General) Research Articles

RWELS: A Remote Web Event Logging System
Fulltext Access 11 Pages 2008
Inverse problem for coefficient identification in the Euler–Bernoulli equation
Fulltext Access 11 Pages 2008
Establishing performance evaluation structures by fuzzy relation-based cluster analysis
Fulltext Access 11 Pages 2008
A Clustering-based Group Key Agreement Protocol for Ad-Hoc Networks
Fulltext Access 11 Pages 2008
An Application-Oriented Framework for Wireless Sensor Network Key Establishment
Fulltext Access 11 Pages 2008
Axiomatic Description of Mixed States From Selinger's CPM-construction
Fulltext Access 11 Pages 2008
Towards a Graphical Tool for Refining User to System Requirements
Fulltext Access 11 Pages 2008
Towards Testing the Implementation of Graph Transformations
Fulltext Access 11 Pages 2008
The Role of Visual Modeling and Model Transformations in Business-driven Development
Fulltext Access 11 Pages 2008
Imperative LF Meta-Programming
Fulltext Access 11 Pages 2008
On the Relationship between Filter Spaces and Weak Limit Spaces
Fulltext Access 11 Pages 2008
Finitely Bounded Effective Computability
Fulltext Access 11 Pages 2008
E2-computability of e, π and Other Famous Constants
Fulltext Access 11 Pages 2008
Lower Bounds on the Continuation of Holomorphic Functions
Fulltext Access 11 Pages 2008
Towards Computability over Effectively Enumerable Topological Spaces
Fulltext Access 11 Pages 2008
On Oscillation-free ε-random Sequences
Fulltext Access 11 Pages 2008
Effective Symbolic Dynamics
Fulltext Access 11 Pages 2008
Sub-λ-calculi, Classified
Fulltext Access 11 Pages 2008
Iterated tabu search for the car sequencing problem
Fulltext Access 12 Pages 2008
Simulating fluid flow over sinusoidal surfaces using the lattice Boltzmann method
Fulltext Access 12 Pages 2008
A hybrid heuristic ordering and variable neighbourhood search for the nurse rostering problem
Fulltext Access 12 Pages 2008
Optimal maintenance service contract negotiation with aging equipment
Fulltext Access 12 Pages 2008
Mean sojourn times for phase-type discriminatory processor sharing systems
Fulltext Access 12 Pages 2008
Valuing finite-lived Russian options
Fulltext Access 12 Pages 2008
The graph coloring problem: A neuronal network approach
Fulltext Access 12 Pages 2008
Postoptimal analysis in multicriteria linear programming
Fulltext Access 12 Pages 2008
QoS-aware service evaluation and selection
Fulltext Access 12 Pages 2008
End-to-end QoS issues of MPEG-4 FGS video streaming traffic delivery in an IP/DVB/UMTS network
Fulltext Access 12 Pages 2008
A hybrid heuristic for a multi-objective real-life car sequencing problem with painting and assembly line constraints
Fulltext Access 12 Pages 2008
A simulation model for amphiphilic molecules in a mesoscale solvent
Fulltext Access 12 Pages 2008
Local power of a Cramér–von Mises type test for parametric autoregressive models of order one
Fulltext Access 12 Pages 2008
Assessing an ambulance service with queuing theory
Fulltext Access 12 Pages 2008
Comparison of customer balking and reneging behavior to queueing theory predictions: An experimental study
Fulltext Access 12 Pages 2008
Analyzing Weighted Round Robin policies with a stochastic comparison approach
Fulltext Access 12 Pages 2008
Automated speech analysis applied to laryngeal disease categorization
Fulltext Access 12 Pages 2008
Physiological modeling of tumor-affected renal circulation
Fulltext Access 12 Pages 2008
Robust projective filtering of time-warped ECG beats
Fulltext Access 12 Pages 2008
A heuristic multi-start decomposition approach for optimal design of serial machining lines
Fulltext Access 12 Pages 2008
An analytical model for reverse automotive production planning and pricing
Fulltext Access 12 Pages 2008
The impact of investment lags on investment decision
Fulltext Access 12 Pages 2008
Exact and heuristic solution approaches for the mixed integer setup knapsack problem
Fulltext Access 12 Pages 2008
The p-median problem under uncertainty
Fulltext Access 12 Pages 2008
A fuzzy ranking method with range reduction techniques
Fulltext Access 12 Pages 2008
Efficiency decomposition in two-stage data envelopment analysis: An application to non-life insurance companies in Taiwan
Fulltext Access 12 Pages 2008
Genetic algorithms for portfolio selection problems with minimum transaction lots
Fulltext Access 12 Pages 2008
Economic lot sizing problem with inventory bounds
Fulltext Access 12 Pages 2008
Application of a simulation-based dynamic traffic assignment model
Fulltext Access 12 Pages 2008
Lower bounds for the earliness–tardiness scheduling problem on parallel machines with distinct due dates
Fulltext Access 12 Pages 2008
Resolution approach for multi-objective problems with uncertain demands
Fulltext Access 12 Pages 2008
Learning curves for imperfect production processes with reworks and process restoration interruptions
Fulltext Access 12 Pages 2008
Network design and flow problems with cross-arc costs
Fulltext Access 12 Pages 2008
Contrarian investment strategy with data envelopment analysis concept
Fulltext Access 12 Pages 2008
A bi-objective coordination setup problem in a two-stage production system
Fulltext Access 12 Pages 2008
Multiobjective service restoration in electric distribution networks using a local search based heuristic
Fulltext Access 12 Pages 2008
An efficient approach for solving the lot-sizing problem with time-varying storage capacities
Fulltext Access 12 Pages 2008
Simple bounds and greedy algorithms for decomposing a flow into a minimal set of paths
Fulltext Access 12 Pages 2008
A stochastic model for operating room planning with elective and emergency demand for surgery
Fulltext Access 12 Pages 2008
Fuzzy chance constrained linear programming model for optimizing the scrap charge in steel production
Fulltext Access 12 Pages 2008
Towards a Notion of Transaction in Graph Rewriting 1
Fulltext Access 12 Pages 2008
Rules and Strategies in Java
Fulltext Access 12 Pages 2008
fficient and Provably Secure Generic Construction of Client-to-Client Password-Based Key Exchange Protocol
Fulltext Access 12 Pages 2008
Model-based Security Testing Using UMLsec: A Case Study
Fulltext Access 12 Pages 2008
Coverage-biased Random Exploration of Models
Fulltext Access 12 Pages 2008
Translation of Restricted OCL Constraints into Graph Constraints for Generating Meta Model Instances by Graph Grammars
Fulltext Access 12 Pages 2008
Implementing an EJB3-Specific Graph Transformation Plugin by Using Database Independent Queries
Fulltext Access 12 Pages 2008
Visual Specification of Metrics for Domain Specific Visual Languages
Fulltext Access 12 Pages 2008
Maintaining Coherence Between Models With Distributed Rules: From Theory to Eclipse
Fulltext Access 12 Pages 2008
Transformational Pattern System – Some Assembly Required
Fulltext Access 12 Pages 2008
Graph Transformation Semantics for a QVT Language
Fulltext Access 12 Pages 2008
On Term-Graph Rewrite Strategies 1
Fulltext Access 12 Pages 2008
Exploiting User-definable Synchronizations in Graph Transformation
Fulltext Access 12 Pages 2008
A Formal Framework for Interactive Agents
Fulltext Access 12 Pages 2008
A Calculus for Interaction Nets Based on the Linear Chemical Abstract Machine
Fulltext Access 12 Pages 2008
Universal Boolean Systems
Fulltext Access 12 Pages 2008
The Interpretation of Intuitionistic Type Theory in Locally Cartesian Closed Categories – an Intuitionistic Perspective
Fulltext Access 12 Pages 2008
An Effective Tietze-Urysohn Theorem for QCB-Spaces: (Extended Abstract)
Fulltext Access 12 Pages 2008
Complexity of Blowup Problems
Fulltext Access 12 Pages 2008
Integral of Two-dimensional Fine-computable Functions
Fulltext Access 12 Pages 2008
Effective Computability of Solutions of Ordinary Differential Equations The Thousand Monkeys Approach
Fulltext Access 12 Pages 2008
A class of ninth degree system with four isochronous centers
Fulltext Access 12 Pages 2008
A mesh independent superlinear algorithm for some nonlinear nonsymmetric elliptic systems
Fulltext Access 12 Pages 2008
Uniqueness theorems on meromorphic functions sharing one value
Fulltext Access 12 Pages 2008
Positive periodic solutions of second-order nonlinear differential systems with two parameters
Fulltext Access 12 Pages 2008
Poincaré and Sobolev type inequalities for vector-valued functions
Fulltext Access 12 Pages 2008
Upper and lower solutions method and a second order three-point singular boundary value problem
Fulltext Access 12 Pages 2008
On the Galerkin and collocation methods for two-point boundary value problems using sinc bases
Fulltext Access 12 Pages 2008
Monotonic Abstraction in Parameterized Verification
Fulltext Access 12 Pages 2008
Comparison and validation of multi phase closure models
Fulltext Access 12 Pages 2008
The optimum output quantity of a duopoly market under a fuzzy decision environment
Fulltext Access 12 Pages 2008
Numerical approximation of a one-dimensional space fractional advection–dispersion equation with boundary layer
Fulltext Access 12 Pages 2008
Sufficient conditions of the discrete maximum–minimum principle for parabolic problems on rectangular meshes
Fulltext Access 12 Pages 2008
Automatic covariate selection in logistic models for chest pain diagnosis: A new approach
Fulltext Access 12 Pages 2008
SAS and R functions to compute pseudo-values for censored data regression
Fulltext Access 12 Pages 2008
CTmod—A toolkit for Monte Carlo simulation of projections including scatter in computed tomography
Fulltext Access 12 Pages 2008
Detecting reliable gene interactions by a hierarchy of Bayesian network classifiers
Fulltext Access 12 Pages 2008
Stochastic modelling of insulin sensitivity and adaptive glycemic control for critical care
Fulltext Access 12 Pages 2008
Automated analysis of two- and three-color fluorescent Elispot (Fluorospot) assays for cytokine secretion
Fulltext Access 12 Pages 2008
Global optimization method for combined spherical–cylindrical wrapping in musculoskeletal upper limb modelling
Fulltext Access 12 Pages 2008
Managing Conflicts of Interest in Virtual Organisations
Fulltext Access 12 Pages 2008
Adaptive Threat Modeling for Secure Ad Hoc Routing Protocols
Fulltext Access 12 Pages 2008
<< < 366 367 368 369 370 > >>
Related Topics
Genetic algorithm Articles
6327 Papers
Computer simulation Articles
3034 Papers
Productivity Articles
2777 Papers
Fuzzy logic Articles
2743 Papers
synchronization Articles
2257 Papers
Social media Articles
2052 Papers
Security Articles
2003 Papers
Automation Articles
1810 Papers
Cluster Articles
1655 Papers
Virtual reality Articles
1583 Papers
Robotics Articles
1524 Papers
Cloud computing Articles
1472 Papers
Fault detection Articles
1414 Papers
Social networks Articles
1409 Papers
survival analysis Articles
1353 Papers
CAM Articles
1272 Papers
Computer simulations Articles
1253 Papers
Computer vision Articles
1193 Papers
Privacy Articles
1165 Papers
Polymorphisms Articles
1155 Papers
Simulations Articles
1129 Papers
Information retrieval Articles
955 Papers
Scale-up Articles
840 Papers
Social network analysis Articles
712 Papers
Facebook Articles
666 Papers
Geographic information systems Articles
645 Papers
ICT Articles
638 Papers
Multimedia Articles
618 Papers
Semantic web Articles
592 Papers
Computer-mediated communication Articles
569 Papers
Process simulation Articles
531 Papers
Smartphone Articles
520 Papers
Artificial Intelligence Articles
Computational Theory and Mathematics Articles
Computer Graphics and Computer-Aided Design Articles
Computer Networks and Communications Articles
Computer Science (General) Articles
Computer Science Applications Articles
Computer Vision and Pattern Recognition Articles
Hardware and Architecture Articles
Human-Computer Interaction Articles
Information Systems Articles
Signal Processing Articles
Software Articles
All Topics
Related Journals
Artificial Intelligence Journals
Computational Theory and Mathematics Journals
Computer Graphics and Computer-Aided Design Journals
Computer Networks and Communications Journals
Computer Science (General) Journals
Computer Science Applications Journals
Computer Vision and Pattern Recognition Journals
Hardware and Architecture Journals
Human-Computer Interaction Journals
Information Systems Journals
Signal Processing Journals
Software Journals
New Scientist Journal
Electronic Notes in Theoretical Computer Science Journal
Future Generation Computer Systems Journal
Physical Communication Journal
Applied Computing and Informatics Journal
Computer Law & Security Review Journal
Computer Methods and Programs in Biomedicine Journal
Computer Science Review Journal
Computers & Mathematics with Applications Journal
Computers & Operations Research Journal
Egyptian Informatics Journal Journal
Engineering Journal
Engineering Science and Technology, an International Journal Journal
European Journal of Operational Research Journal
Informatics in Medicine Unlocked Journal
Journal of the Egyptian Mathematical Society Journal
Journal of King Saud University - Computer and Information Sciences Journal
Karbala International Journal of Modern Science Journal
Operations Research Perspectives Journal
Procedia Computer Science Journal
Procedia Technology Journal
Simulation Modelling Practice and Theory Journal
Sustainable Computing: Informatics and Systems Journal
Swarm and Evolutionary Computation Journal

Daneshyari.com

دسترسی سریع

  • صفحه اصلی دانشیاری
  • دسته بندی موضوعی مقالات
  • مقالات ترجمه شده
  • سفارش ترجمه مقاله
  • سفارش تولید محتوا
  • تولید محتوا

ارتباط

  • ورود
  • عضویت
  • تماس و پشتیبانی
  • تبلیغات

English Website

  • Home
  • Physical Sciences and Engineering
  • Life Sciences
  • Health Sciences
  • Social Sciences and Humanities