• Daneshyari
  • Topics
    • Physical Sciences and Engineering
      Life Sciences
      Health Sciences
      Social Sciences and Humanities
Daneshyari Computer Science (General) Journas Latest Articles

Computer Science (General) Research Articles

The right of publicity in the digital age – Doctrinal tensions, common law theories and proposals for solutions
Fulltext Access 14 Pages 2008
Learning market prices in real-time supply chain management
Fulltext Access 14 Pages 2008
A heuristic manipulation technique for the sequential ordering problem
Fulltext Access 14 Pages 2008
Efficient blocking probability computation of complex traffic flows for network dimensioning
Fulltext Access 14 Pages 2008
A stabilized branch-and-price-and-cut algorithm for the multiple length cutting stock problem
Fulltext Access 14 Pages 2008
Estimating steady-state distributions via simulation-generated histograms
Fulltext Access 14 Pages 2008
Augmenting priority rule heuristics with justification and rollout to solve the resource-constrained project scheduling problem
Fulltext Access 14 Pages 2008
Computation of approximate αα-points for large scale single machine scheduling problem
Fulltext Access 14 Pages 2008
News and comment on recent developments from around the world
Fulltext Access 14 Pages 2008
The impact of replenishment parameters and information sharing on the bullwhip effect: A computational study
Fulltext Access 14 Pages 2008
Managing service level agreement contracts in OGSA-based Grids
Fulltext Access 14 Pages 2008
An on-line replication strategy to increase availability in Data Grids
Fulltext Access 14 Pages 2008
Large scale agent-based simulation on the grid
Fulltext Access 14 Pages 2008
Efficient reuse of replicated parallel data segments in computational grids
Fulltext Access 14 Pages 2008
An innovative workflow mapping mechanism for Grids in the frame of Quality of Service
Fulltext Access 14 Pages 2008
SemreX: Efficient search in a semantic overlay for literature retrieval
Fulltext Access 14 Pages 2008
An accurate mathematical performance model of adaptive routing in the star graph
Fulltext Access 14 Pages 2008
Interaction Nets With Nested Pattern Matching
Fulltext Access 14 Pages 2008
Solving an urban waste collection problem using ants heuristics
Fulltext Access 14 Pages 2008
Solving the hazmat transport network design problem
Fulltext Access 14 Pages 2008
Computational experiments with heuristics for two nature reserve site selection problems
Fulltext Access 14 Pages 2008
Modeling and solving the rooted distance-constrained minimum spanning tree problem
Fulltext Access 14 Pages 2008
Roll assortment optimization in a paper mill: An integer programming approach
Fulltext Access 14 Pages 2008
On an approximation method for pricing a high-dimensional basket option on assets with mean-reverting prices
Fulltext Access 14 Pages 2008
Computing all efficient solutions of the biobjective minimum spanning tree problem
Fulltext Access 14 Pages 2008
Heuristic and exact algorithms for generating homogenous constrained three-staged cutting patterns
Fulltext Access 14 Pages 2008
A multi-objective model for environmental investment decision making
Fulltext Access 14 Pages 2008
Sensitivity analysis of the knapsack sharing problem: Perturbation of the weight of an item
Fulltext Access 14 Pages 2008
Algorithms for solving the single-sink fixed-charge transportation problem
Fulltext Access 14 Pages 2008
Set partitioning/covering-based approaches for the integrated vehicle and crew scheduling problem
Fulltext Access 14 Pages 2008
Ranking of units on the DEA frontier with common weights
Fulltext Access 14 Pages 2008
Statistical confidentiality: Optimization techniques to protect tables
Fulltext Access 14 Pages 2008
PERM for solving circle packing problem
Fulltext Access 14 Pages 2008
Remote Attestation on Legacy Operating Systems With Trusted Platform Modules 1
Fulltext Access 14 Pages 2008
Interaction in Time and Space
Fulltext Access 14 Pages 2008
Extending Lustre with Timeout Automata
Fulltext Access 14 Pages 2008
A Model Checking Approach to Protocol Conversion
Fulltext Access 14 Pages 2008
Towards Mutation Analysis for Lustre Programs
Fulltext Access 14 Pages 2008
Declaring Numbers
Fulltext Access 14 Pages 2008
A New Proposal for Debugging Datalog Programs 1
Fulltext Access 14 Pages 2008
Computational Origami Construction as Constraint Solving and Rewriting
Fulltext Access 14 Pages 2008
The HiVe Writer
Fulltext Access 14 Pages 2008
A Tool for Programming with Interaction Nets
Fulltext Access 14 Pages 2008
Expressiveness of Process Algebras
Fulltext Access 14 Pages 2008
ConSpec – A Formal Language for Policy Specification 1
Fulltext Access 14 Pages 2008
Monitoring External Resources in Java MIDP
Fulltext Access 14 Pages 2008
A Virtual Machine Based Information Flow Control System for Policy Enforcement 1
Fulltext Access 14 Pages 2008
Distributed Verification of Multi-threaded C++ Programs
Fulltext Access 14 Pages 2008
A Stack-Slicing Algorithm for Multi-Core Model Checking
Fulltext Access 14 Pages 2008
Normalization for the Simply-Typed Lambda-Calculus in Twelf
Fulltext Access 14 Pages 2008
Reduction and Refinement
Fulltext Access 14 Pages 2008
Modeling and Verifying Graph Transformations in Proof Assistants
Fulltext Access 14 Pages 2008
Silver: an Extensible Attribute Grammar System 1
Fulltext Access 14 Pages 2008
Automatic Verification of Combined Specifications: An Overview
Fulltext Access 14 Pages 2008
Encoding Distributed Process Calculi into LMNtal
Fulltext Access 14 Pages 2008
Time Separation of Events: An Inverse Method
Fulltext Access 14 Pages 2008
Describing the Immune System Using Enhanced Mobile Membranes 1
Fulltext Access 14 Pages 2008
Encoding First Order Proofs in SMT
Fulltext Access 14 Pages 2008
Decidability of Innermost Termination and Context-Sensitive Termination for Semi-Constructor Term Rewriting Systems
Fulltext Access 14 Pages 2008
Rewriting Interpolants
Fulltext Access 14 Pages 2008
Coinductive Characterisations Reveal Nice Relations Between Preorders and Equivalences
Fulltext Access 14 Pages 2008
Cyclic Extensions of Order Varieties
Fulltext Access 14 Pages 2008
Separation Logic for Multiple Inheritance
Fulltext Access 14 Pages 2008
Quantum Arrows in Haskell
Fulltext Access 14 Pages 2008
Cooperative Testing of Timed Systems
Fulltext Access 14 Pages 2008
On Verification of Linear Occurrence Properties of Real-Time Systems
Fulltext Access 14 Pages 2008
Optimization of transit route network, vehicle headways and timetables for large-scale transit networks
Fulltext Access 15 Pages 2008
Decision making with hybrid influence diagrams using mixtures of truncated exponentials
Fulltext Access 15 Pages 2008
Efficient shift scheduling in the retail sector through two-stage optimization
Fulltext Access 15 Pages 2008
Scheduling aircraft landings using airlines’ preferences
Fulltext Access 15 Pages 2008
A novel elitist multiobjective optimization algorithm: Multiobjective extremal optimization
Fulltext Access 15 Pages 2008
Manufacturer’s mixed pallet design problem
Fulltext Access 15 Pages 2008
Synchronization in the single-manufacturer multi-buyer integrated inventory supply chain
Fulltext Access 15 Pages 2008
Adaptive data reduction for large-scale transaction data
Fulltext Access 15 Pages 2008
New approaches to due date assignment in job shops
Fulltext Access 15 Pages 2008
Maximizing throughput in queueing networks with limited flexibility
Fulltext Access 15 Pages 2008
Unfair allocation of gains under the Equal Price allocation method in purchasing groups
Fulltext Access 15 Pages 2008
Sensitivity estimation for Gaussian systems
Fulltext Access 15 Pages 2008
A two-level supply chain with partial backordering and approximated Poisson demand
Fulltext Access 15 Pages 2008
Discrete time modeling of mean-reverting stochastic processes for real option valuation
Fulltext Access 15 Pages 2008
Response time and vendor–assembler relationship in a supply chain
Fulltext Access 15 Pages 2008
Efficiency and welfare implications of managed public sector hospital waiting lists
Fulltext Access 15 Pages 2008
The efficacy of exclusive territory assignments to delivery vehicle drivers
Fulltext Access 15 Pages 2008
Discounted MEAN bound for the optimal searcher path problem with non-uniform travel times
Fulltext Access 15 Pages 2008
PCI DSS: Payment card industry data security standards in context
Fulltext Access 15 Pages 2008
News and comment on recent developments from around the world
Fulltext Access 15 Pages 2008
Cybering, online grooming and ageplay
Fulltext Access 15 Pages 2008
Selection based resource allocation for decentralized multi-user communications
Fulltext Access 15 Pages 2008
The Grid Workloads Archive
Fulltext Access 15 Pages 2008
Scalability comparison of Peer-to-Peer similarity search structures
Fulltext Access 15 Pages 2008
Diversified local search strategy under scatter search framework for the probabilistic traveling salesman problem
Fulltext Access 15 Pages 2008
The assortment problem: A survey
Fulltext Access 15 Pages 2008
Global variation of outputs with respect to the variation of inputs in performance analysis; generalized RTS
Fulltext Access 15 Pages 2008
An LDQBD process under degradation, inspection, and two types of repair
Fulltext Access 15 Pages 2008
A new approach for solving linear bilevel problems using genetic algorithms
Fulltext Access 15 Pages 2008
Negotiating wisely: Considerations based on MCDM/MAUT
Fulltext Access 15 Pages 2008
Revenue management for low-cost providers
Fulltext Access 15 Pages 2008
A production scheduling heuristic for an electronics manufacturer with sequence-dependent setup costs
Fulltext Access 15 Pages 2008
On the dynamics of capital accumulation across space
Fulltext Access 15 Pages 2008
Manufacturer’s revenue-sharing contract and retail competition
Fulltext Access 15 Pages 2008
<< < 371 372 373 374 375 > >>
Related Topics
Genetic algorithm Articles
6327 Papers
Computer simulation Articles
3034 Papers
Productivity Articles
2777 Papers
Fuzzy logic Articles
2743 Papers
synchronization Articles
2257 Papers
Social media Articles
2052 Papers
Security Articles
2003 Papers
Automation Articles
1810 Papers
Cluster Articles
1655 Papers
Virtual reality Articles
1583 Papers
Robotics Articles
1524 Papers
Cloud computing Articles
1472 Papers
Fault detection Articles
1414 Papers
Social networks Articles
1409 Papers
survival analysis Articles
1353 Papers
CAM Articles
1272 Papers
Computer simulations Articles
1253 Papers
Computer vision Articles
1193 Papers
Privacy Articles
1165 Papers
Polymorphisms Articles
1155 Papers
Simulations Articles
1129 Papers
Information retrieval Articles
955 Papers
Scale-up Articles
840 Papers
Social network analysis Articles
712 Papers
Facebook Articles
666 Papers
Geographic information systems Articles
645 Papers
ICT Articles
638 Papers
Multimedia Articles
618 Papers
Semantic web Articles
592 Papers
Computer-mediated communication Articles
569 Papers
Process simulation Articles
531 Papers
Smartphone Articles
520 Papers
Artificial Intelligence Articles
Computational Theory and Mathematics Articles
Computer Graphics and Computer-Aided Design Articles
Computer Networks and Communications Articles
Computer Science (General) Articles
Computer Science Applications Articles
Computer Vision and Pattern Recognition Articles
Hardware and Architecture Articles
Human-Computer Interaction Articles
Information Systems Articles
Signal Processing Articles
Software Articles
All Topics
Related Journals
Artificial Intelligence Journals
Computational Theory and Mathematics Journals
Computer Graphics and Computer-Aided Design Journals
Computer Networks and Communications Journals
Computer Science (General) Journals
Computer Science Applications Journals
Computer Vision and Pattern Recognition Journals
Hardware and Architecture Journals
Human-Computer Interaction Journals
Information Systems Journals
Signal Processing Journals
Software Journals
New Scientist Journal
Electronic Notes in Theoretical Computer Science Journal
Future Generation Computer Systems Journal
Physical Communication Journal
Applied Computing and Informatics Journal
Computer Law & Security Review Journal
Computer Methods and Programs in Biomedicine Journal
Computer Science Review Journal
Computers & Mathematics with Applications Journal
Computers & Operations Research Journal
Egyptian Informatics Journal Journal
Engineering Journal
Engineering Science and Technology, an International Journal Journal
European Journal of Operational Research Journal
Informatics in Medicine Unlocked Journal
Journal of the Egyptian Mathematical Society Journal
Journal of King Saud University - Computer and Information Sciences Journal
Karbala International Journal of Modern Science Journal
Operations Research Perspectives Journal
Procedia Computer Science Journal
Procedia Technology Journal
Simulation Modelling Practice and Theory Journal
Sustainable Computing: Informatics and Systems Journal
Swarm and Evolutionary Computation Journal

Daneshyari.com

دسترسی سریع

  • صفحه اصلی دانشیاری
  • دسته بندی موضوعی مقالات
  • مقالات ترجمه شده
  • سفارش ترجمه مقاله
  • سفارش تولید محتوا
  • تولید محتوا

ارتباط

  • ورود
  • عضویت
  • تماس و پشتیبانی
  • تبلیغات

English Website

  • Home
  • Physical Sciences and Engineering
  • Life Sciences
  • Health Sciences
  • Social Sciences and Humanities