• Daneshyari
  • Topics
    • Physical Sciences and Engineering
      Life Sciences
      Health Sciences
      Social Sciences and Humanities
Daneshyari Computer Science (General) Journas Latest Articles

Computer Science (General) Research Articles

Improved Tabu search heuristics for the dynamic space allocation problem
Fulltext Access 13 Pages 2008
The multi-weighted Steiner tree problem: A reformulation by intersection
Fulltext Access 13 Pages 2008
Real-time supply chain control via multi-agent adjustable autonomy
Fulltext Access 13 Pages 2008
The design of real-time logistics information system for trucking industry
Fulltext Access 13 Pages 2008
A linear programming method for generating the most favorable weights from a pairwise comparison matrix
Fulltext Access 13 Pages 2008
On the performance of binomial and beta-binomial models of demand forecasting for multiple slow-moving inventory items
Fulltext Access 13 Pages 2008
A branch and bound algorithm for an identical parallel machine scheduling problem with a job splitting property
Fulltext Access 13 Pages 2008
A multiperiod set covering location model for dynamic redeployment of ambulances
Fulltext Access 13 Pages 2008
The 1-center problem in the plane with independent random weights
Fulltext Access 13 Pages 2008
A computational study of DEA with massive data sets
Fulltext Access 13 Pages 2008
A double scaling algorithm for the constrained maximum flow problem
Fulltext Access 13 Pages 2008
A branch-and-bound algorithm for single-machine scheduling with batch delivery and job release times
Fulltext Access 13 Pages 2008
Scale-invariant clustering with minimum volume ellipsoids
Fulltext Access 13 Pages 2008
Rolling-horizon and fix-and-relax heuristics for the parallel machine lot-sizing and scheduling problem with sequence-dependent set-up costs
Fulltext Access 13 Pages 2008
Analysis of heuristics for the UET two-machine flow shop problem with time delays
Fulltext Access 13 Pages 2008
Determination of replenishment dates for restricted-storage, static demand, cyclic replenishment schedule
Fulltext Access 13 Pages 2008
Dose mapping: Validation in 4D dosimetry with measurements and application in radiotherapy follow-up evaluation
Fulltext Access 13 Pages 2008
Validation of mutual information-based registration of CT and bone SPECT images in dual-isotope studies
Fulltext Access 13 Pages 2008
Lattice Boltzmann simulation of capillary interactions among colloidal particles
Fulltext Access 13 Pages 2008
Development of a data assimilation algorithm
Fulltext Access 13 Pages 2008
Operator splitting for delay equations
Fulltext Access 13 Pages 2008
Multiple positive solutions for singular BVPs on the positive half-line
Fulltext Access 13 Pages 2008
Mathematical models for the control of a pest population by infected pest
Fulltext Access 13 Pages 2008
Pulsatile flow of blood using a modified second-grade fluid model
Fulltext Access 13 Pages 2008
A Hierarchy of Quantum Semantics
Fulltext Access 13 Pages 2008
Product selection, machine time allocation, and scheduling decisions for manufacturing perishable products subject to a deadline
Fulltext Access 13 Pages 2008
Type-2 fuzzy mathematical modeling and analysis of the dynamical behaviors of complex ecosystems
Fulltext Access 13 Pages 2008
A scheme for robust trajectory control of space robots
Fulltext Access 13 Pages 2008
A message passing benchmark for unbalanced applications
Fulltext Access 13 Pages 2008
Numerical simulations of pulsatile non-Newtonian flow in an end-to-side anastomosis model
Fulltext Access 13 Pages 2008
Ants for track initiation of bearings-only tracking
Fulltext Access 13 Pages 2008
Using computer simulation to determine operations policies for a mechanised car park
Fulltext Access 13 Pages 2008
The garbage can model of organisational behaviour: A theoretical reconstruction of some of its variants
Fulltext Access 13 Pages 2008
Application of a hybrid controller to a mobile robot
Fulltext Access 13 Pages 2008
Gas–liquid separator modelling and simulation with Gaussian-process models
Fulltext Access 13 Pages 2008
Event Patterns as Indicators of Usability Problems
Fulltext Access 13 Pages 2008
Minimizing makespan on an mm-machine re-entrant flowshop
Fulltext Access 13 Pages 2008
Dynamics of the difference equation xn+1=xn+pxn−kxn+q
Fulltext Access 13 Pages 2008
Integrating multi-product production and distribution in newspaper logistics
Fulltext Access 13 Pages 2008
A very fast TS/SA algorithm for the job shop scheduling problem
Fulltext Access 13 Pages 2008
Neural network-based mean–variance–skewness model for portfolio selection
Fulltext Access 13 Pages 2008
Polynomial time algorithms for the UET permutation flowshop problem with time delays
Fulltext Access 13 Pages 2008
Selecting compact habitat reserves for species with differential habitat size needs
Fulltext Access 13 Pages 2008
A neural model for the p-median problem
Fulltext Access 13 Pages 2008
The importance of a match in a tournament
Fulltext Access 13 Pages 2008
Storage space allocation to maximize inter-replenishment times
Fulltext Access 13 Pages 2008
Discrete–continuous project scheduling with discounted cash flows—A tabu search approach
Fulltext Access 13 Pages 2008
Stochastic facility location with general long-run costs and convex short-run costs
Fulltext Access 13 Pages 2008
An algorithm for ranking assignments using reoptimization
Fulltext Access 13 Pages 2008
Chosen-name Attacks: An Overlooked Class of Type-flaw Attacks
Fulltext Access 13 Pages 2008
Reconstruction of heat transfer coefficients using the boundary element method
Fulltext Access 13 Pages 2008
Positioning-based framework for secondary spectrum usage
Fulltext Access 13 Pages 2008
SIGMCC: A system for sharing meta patient records in a Peer-to-Peer environment
Fulltext Access 13 Pages 2008
A standards based approach to enabling legacy applications on the Grid
Fulltext Access 13 Pages 2008
RCT: A distributed tree for supporting efficient range and multi-attribute queries in grid computing
Fulltext Access 13 Pages 2008
A content-based load balancing algorithm with admission control for cluster web servers
Fulltext Access 13 Pages 2008
MiPeG: A middleware infrastructure for pervasive grids
Fulltext Access 13 Pages 2008
Securing Ad Hoc Storage through Probabilistic Cooperation Assessment 1
Fulltext Access 13 Pages 2008
Ad-Hoc Threshold Broadcast Encryption with Shorter Ciphertexts
Fulltext Access 13 Pages 2008
Elastic Flow in an Application Specific Network-on-Chip
Fulltext Access 13 Pages 2008
Concurrency in Biological Modeling: Behavior, Execution and Visualization
Fulltext Access 13 Pages 2008
Trusted Directory Services for Secure Internet Connectivity: Transport Layer Security using DNSSEC
Fulltext Access 13 Pages 2008
Elimination of vesicular sounds from pulmonary crackle waveforms
Fulltext Access 13 Pages 2008
Model-based Theory Combination
Fulltext Access 13 Pages 2008
Various Constructions of Continuous Information Systems 1
Fulltext Access 13 Pages 2008
A Monoidal Category of Bifinite Chu Spaces
Fulltext Access 13 Pages 2008
Reasoning About Multi-Lingual Exception Handling Using RIPLS
Fulltext Access 13 Pages 2008
Bisimilarity of Distributionally Equivalent Markov Transition Systems
Fulltext Access 13 Pages 2008
j-POST: a Java Toolchain for Property-Oriented Software Testing
Fulltext Access 13 Pages 2008
Verifying Test-Hypotheses: An Experiment in Test and Proof
Fulltext Access 13 Pages 2008
Aspect-Oriented Action Semantics Descriptions
Fulltext Access 13 Pages 2008
Copying Subgraphs Within Model Repositories
Fulltext Access 13 Pages 2008
Declarative Debugging Meets the World
Fulltext Access 13 Pages 2008
A Behavioural Pseudometric based on λ–Bisimilarity
Fulltext Access 13 Pages 2008
General iterative algorithms for solving mixed quasi-variational-like inclusions
Fulltext Access 13 Pages 2008
Nonnegative matrices with prescribed extremal singular values
Fulltext Access 13 Pages 2008
Local perturbations of generalized systems under feedback and derivative feedback
Fulltext Access 13 Pages 2008
A simple method to locate the optimal solution for exponentially deteriorating items under trade credit financing
Fulltext Access 13 Pages 2008
Nontrivial solutions for higher order multi-point boundary value problems
Fulltext Access 13 Pages 2008
Some graceful lobsters with all three types of branches incident on the vertices of the central path
Fulltext Access 13 Pages 2008
On the difference equation xn+1=α+xn−1xn
Fulltext Access 13 Pages 2008
New comparison and oscillation theorems for second-order half-linear dynamic equations on time scales
Fulltext Access 13 Pages 2008
Visualization of heat transport using dimensionless heatfunction for natural convection and conduction in an enclosure with thick solid ceiling
Fulltext Access 13 Pages 2008
Stability and chaos in a class of finite-dimensional discrete spatiotemporal systems
Fulltext Access 13 Pages 2008
Performance sensitivity of helicopter global and local optimal harmonic vibration controller
Fulltext Access 13 Pages 2008
The EU Data Protection Directive: An engine of a global regime
Fulltext Access 13 Pages 2008
Mobile collaborative medical display system
Fulltext Access 13 Pages 2008
Classifying algorithms for SIFT-MS technology and medical diagnosis
Fulltext Access 13 Pages 2008
Computing normalised prediction distribution errors to evaluate nonlinear mixed-effect models: The npde add-on package for R
Fulltext Access 13 Pages 2008
Building a virtual archive using brain architecture and Web 3D to deliver neuropsychopharmacology content over the Internet
Fulltext Access 13 Pages 2008
Bayesian classification for the selection of in vitro human embryos using morphological and clinical data
Fulltext Access 13 Pages 2008
Design of a JAIN SLEE/ESB-based platform for routing medical data in the ICU
Fulltext Access 13 Pages 2008
Performance evaluation of PCA-based spike sorting algorithms
Fulltext Access 13 Pages 2008
Control system design of a 3-DOF upper limbs rehabilitation robot
Fulltext Access 13 Pages 2008
Generic causal probabilistic networks: A solution to a problem of transferability in medical decision support
Fulltext Access 13 Pages 2008
Biofidelic child head FE model to simulate real world trauma
Fulltext Access 13 Pages 2008
A heuristic index for selecting similar categories in multiple correspondence analysis applied to living donor kidney transplantation
Fulltext Access 13 Pages 2008
A neural-based remote eye gaze tracker under natural head motion
Fulltext Access 13 Pages 2008
An admissible-behaviour-based analysis of the deadlock in Petri-net controllers
Fulltext Access 14 Pages 2008
Ontology based web simulation system for hydrodynamic modeling
Fulltext Access 14 Pages 2008
<< < 369 370 371 372 373 > >>
Related Topics
Genetic algorithm Articles
6327 Papers
Computer simulation Articles
3034 Papers
Productivity Articles
2777 Papers
Fuzzy logic Articles
2743 Papers
synchronization Articles
2257 Papers
Social media Articles
2052 Papers
Security Articles
2003 Papers
Automation Articles
1810 Papers
Cluster Articles
1655 Papers
Virtual reality Articles
1583 Papers
Robotics Articles
1524 Papers
Cloud computing Articles
1472 Papers
Fault detection Articles
1414 Papers
Social networks Articles
1409 Papers
survival analysis Articles
1353 Papers
CAM Articles
1272 Papers
Computer simulations Articles
1253 Papers
Computer vision Articles
1193 Papers
Privacy Articles
1165 Papers
Polymorphisms Articles
1155 Papers
Simulations Articles
1129 Papers
Information retrieval Articles
955 Papers
Scale-up Articles
840 Papers
Social network analysis Articles
712 Papers
Facebook Articles
666 Papers
Geographic information systems Articles
645 Papers
ICT Articles
638 Papers
Multimedia Articles
618 Papers
Semantic web Articles
592 Papers
Computer-mediated communication Articles
569 Papers
Process simulation Articles
531 Papers
Smartphone Articles
520 Papers
Artificial Intelligence Articles
Computational Theory and Mathematics Articles
Computer Graphics and Computer-Aided Design Articles
Computer Networks and Communications Articles
Computer Science (General) Articles
Computer Science Applications Articles
Computer Vision and Pattern Recognition Articles
Hardware and Architecture Articles
Human-Computer Interaction Articles
Information Systems Articles
Signal Processing Articles
Software Articles
All Topics
Related Journals
Artificial Intelligence Journals
Computational Theory and Mathematics Journals
Computer Graphics and Computer-Aided Design Journals
Computer Networks and Communications Journals
Computer Science (General) Journals
Computer Science Applications Journals
Computer Vision and Pattern Recognition Journals
Hardware and Architecture Journals
Human-Computer Interaction Journals
Information Systems Journals
Signal Processing Journals
Software Journals
New Scientist Journal
Electronic Notes in Theoretical Computer Science Journal
Future Generation Computer Systems Journal
Physical Communication Journal
Applied Computing and Informatics Journal
Computer Law & Security Review Journal
Computer Methods and Programs in Biomedicine Journal
Computer Science Review Journal
Computers & Mathematics with Applications Journal
Computers & Operations Research Journal
Egyptian Informatics Journal Journal
Engineering Journal
Engineering Science and Technology, an International Journal Journal
European Journal of Operational Research Journal
Informatics in Medicine Unlocked Journal
Journal of the Egyptian Mathematical Society Journal
Journal of King Saud University - Computer and Information Sciences Journal
Karbala International Journal of Modern Science Journal
Operations Research Perspectives Journal
Procedia Computer Science Journal
Procedia Technology Journal
Simulation Modelling Practice and Theory Journal
Sustainable Computing: Informatics and Systems Journal
Swarm and Evolutionary Computation Journal

Daneshyari.com

دسترسی سریع

  • صفحه اصلی دانشیاری
  • دسته بندی موضوعی مقالات
  • مقالات ترجمه شده
  • سفارش ترجمه مقاله
  • سفارش تولید محتوا
  • تولید محتوا

ارتباط

  • ورود
  • عضویت
  • تماس و پشتیبانی
  • تبلیغات

English Website

  • Home
  • Physical Sciences and Engineering
  • Life Sciences
  • Health Sciences
  • Social Sciences and Humanities