• Daneshyari
  • Topics
    • Physical Sciences and Engineering
      Life Sciences
      Health Sciences
      Social Sciences and Humanities
Daneshyari Computer Science (General) Journas Latest Articles

Computer Science (General) Research Articles

Symmetric duality in multiobjective programming involving generalized cone-invex functions
Fulltext Access 6 Pages 2005
Threshold based discounting networks: The cost allocation provided by the nucleolus
Fulltext Access 6 Pages 2005
Some remarks on conflict analysis
Fulltext Access 6 Pages 2005
On “investment decisions in the theory of finance: Some antinomies and inconsistencies”
Fulltext Access 6 Pages 2005
Some geometrical aspects of the efficient line in vector optimization
Fulltext Access 6 Pages 2005
On multi-item inventory
Fulltext Access 6 Pages 2005
Development of efficient computational kernels and linear algebra routines for out-of-order superscalar processors
Fulltext Access 6 Pages 2005
Complexity of master-slave tasking on heterogeneous trees
Fulltext Access 6 Pages 2005
An ϵ-sensitivity analysis for semidefinite programming
Fulltext Access 6 Pages 2005
Correspondence between mutation and selection pressure and the genetic code degeneracy in the gene evolution
Fulltext Access 7 Pages 2005
Criminal profiling and insider cyber crime
Fulltext Access 7 Pages 2005
Biological sequence alignment on the computational grid using the GrADS framework
Fulltext Access 7 Pages 2005
Oh behave! Agent-based behavioral representations in problem solving environments
Fulltext Access 7 Pages 2005
Computerized recognition of Alzheimer disease-EEG using genetic algorithms and neural network
Fulltext Access 7 Pages 2005
Nonlinear model for ECG R-R interval variation using genetic programming approach
Fulltext Access 7 Pages 2005
Self-organizing multivariate constrained meta-modeling technique for passive microwave and RF components
Fulltext Access 7 Pages 2005
Classification of surface EMG signal using relative wavelet packet energy
Fulltext Access 7 Pages 2005
The instruction register file micro-architecture
Fulltext Access 7 Pages 2005
A Channel Memory based fault tolerance for MPI applications
Fulltext Access 7 Pages 2005
Retargetable code generation for application-specific processors
Fulltext Access 7 Pages 2005
A static analysis for Bulk Synchronous Parallel ML to avoid parallel nesting
Fulltext Access 7 Pages 2005
Enhancing wildland fire prediction on cluster systems applying evolutionary optimization techniques
Fulltext Access 7 Pages 2005
A quadratic time algorithm to maximize the number of just-in-time jobs on identical parallel machines
Fulltext Access 7 Pages 2005
The Cambridge CFD grid for large-scale distributed CFD applications
Fulltext Access 7 Pages 2005
Characterization of EEG-A comparative study
Fulltext Access 7 Pages 2005
High-order corrected trapezoidal quadrature rules for the coulomb potential in three dimensions
Fulltext Access 7 Pages 2005
The loss of orthogonality in the Gram-Schmidt orthogonalization process
Fulltext Access 7 Pages 2005
Approximation of positive matrices by transitive matrices
Fulltext Access 7 Pages 2005
Fractal analysis of acceleration signals from patients with CPPD, rheumatoid arthritis, and spondyloarthroparthy of the finger joint
Fulltext Access 7 Pages 2005
A new software for carrying out one-way ANOVA post hoc tests
Fulltext Access 7 Pages 2005
Modified minimal model using a single-step fitting process for the intravenous glucose tolerance test in Type 2 diabetes and healthy humans
Fulltext Access 7 Pages 2005
MSurvPow: a FORTRAN program to calculate the sample size and power for cluster-randomized clinical trials with survival outcomes
Fulltext Access 7 Pages 2005
Multiple correspondence analysis in S-PLUS
Fulltext Access 7 Pages 2005
Sampling schedule design towards optimal drug monitoring for individualizing therapy
Fulltext Access 7 Pages 2005
Rule-based visualization in the Discover computational steering collaboratory
Fulltext Access 7 Pages 2005
A computer program to estimate the parameters of covariate dependent higher order Markov model
Fulltext Access 7 Pages 2005
Digital image analysis of haematopoietic clusters
Fulltext Access 7 Pages 2005
Explicit solutions for a class of indirect pharmacodynamic response models
Fulltext Access 7 Pages 2005
Analysis of esophageal atrial recordings through wavelet packets decomposition
Fulltext Access 7 Pages 2005
Legal risk management for the IT industry
Fulltext Access 7 Pages 2005
Baker & McKenzie's regular article tracking developments in EU law relating to IP, IT & telecommunications
Fulltext Access 7 Pages 2005
Data protection and multi-application smart cards - the use of intelligent servers to ensure interoperability and data flow requirements
Fulltext Access 7 Pages 2005
EU update
Fulltext Access 7 Pages 2005
When is personal data not “personal data” - The impact of Durant v. FSA
Fulltext Access 7 Pages 2005
Proof Transformation via Interpretation Functions: Results, Problems and Applications
Fulltext Access 7 Pages 2005
Rectangular quasigroups and rectangular loops
Fulltext Access 7 Pages 2005
Value at risk and inventory control
Fulltext Access 7 Pages 2005
A decision-rule for transplanting non-cadaveric organs
Fulltext Access 7 Pages 2005
Reference point approach for multiple decision makers
Fulltext Access 7 Pages 2005
Characterizations of the 3-cycle count and backward length of a tournament
Fulltext Access 7 Pages 2005
Chromatic scheduling in a cyclic open shop
Fulltext Access 7 Pages 2005
Positive half-products and scheduling with controllable processing times
Fulltext Access 7 Pages 2005
Stability of θ-methods for advanced differential equations with piecewise continuous arguments
Fulltext Access 7 Pages 2005
On the fallacy of averages in project risk management
Fulltext Access 7 Pages 2005
A Note On the Turing Degrees of Divergence Bounded Computable Reals
Fulltext Access 7 Pages 2005
Existence of nonoscillatory solutions of first-order linear neutral delay differential equations
Fulltext Access 7 Pages 2005
Multiobjective second-order symmetric duality with F-convexity
Fulltext Access 7 Pages 2005
Exponentiated beta distributions
Fulltext Access 7 Pages 2005
Non-differentiable higher-order symmetric duality in mathematical programming with generalized invexity
Fulltext Access 7 Pages 2005
Convolutions of the T distribution
Fulltext Access 7 Pages 2005
A Lorenz-Pareto measure of pure diversification
Fulltext Access 7 Pages 2005
Variants of the two-dimensional boussinesq equation with compactons, solitons, and periodic solutions
Fulltext Access 7 Pages 2005
The parameterization reduction of soft sets and its applications
Fulltext Access 7 Pages 2005
Indeterminacy in portfolio selection
Fulltext Access 7 Pages 2005
Numerical solution ofmatrix differential models using cubic matrix splines
Fulltext Access 7 Pages 2005
Approximations of singular integral equations on Lyapunov contours in Banach spaces
Fulltext Access 7 Pages 2005
Strategic Rewriting
Fulltext Access 7 Pages 2005
Discounting Infinite Games But How and Why?
Fulltext Access 7 Pages 2005
The extended concentric tabu for the quadratic assignment problem
Fulltext Access 7 Pages 2005
Existence and global attractivity of positive periodic solutions of a survival model of red blood cells
Fulltext Access 7 Pages 2005
Existence of periodic solutions for fourth-order difference equations
Fulltext Access 7 Pages 2005
Algebraic inversion of the Laplace transform
Fulltext Access 7 Pages 2005
A note on flow-shop and job-shop batch scheduling with identical processing-time jobs
Fulltext Access 7 Pages 2005
Measuring super-efficiency in DEA in the presence of infeasibility
Fulltext Access 7 Pages 2005
Minimizing number of tardy jobs on a batch processing machine with incompatible job families
Fulltext Access 7 Pages 2005
The Eckhaus soliton propagation in a random medium
Fulltext Access 7 Pages 2005
Functional data analysis for clients segmentation tasks
Fulltext Access 7 Pages 2005
Coefficient-free adaptations of polynomial root-finders
Fulltext Access 7 Pages 2005
Oscillation criteria for certain forced second-order nonlinear differential equations with delayed argument
Fulltext Access 7 Pages 2005
e-Commerce directive - The Greek response
Fulltext Access 8 Pages 2005
Entropies for detection of epilepsy in EEG
Fulltext Access 8 Pages 2005
FILDIG: A program to filter brain electrical signals in the frequency domain
Fulltext Access 8 Pages 2005
Music piracy, universities and the Australian Federal Court: Issues for forensic computing specialists
Fulltext Access 8 Pages 2005
Partitioning finite element meshes using space-filling curves
Fulltext Access 8 Pages 2005
Incorporation of middleware and grid technologies to enhance usability in Computational Chemistry applications
Fulltext Access 8 Pages 2005
Executing and observing CFD applications on the Grid
Fulltext Access 8 Pages 2005
Application of Grid-enabled technologies for solving optimization problems in data-driven reservoir studies
Fulltext Access 8 Pages 2005
“Applications on demand” as the exploitation of the Migrating Desktop
Fulltext Access 8 Pages 2005
Workflow composer and service registry for grid applications
Fulltext Access 8 Pages 2005
Novel mediator architectures for Grid information systems
Fulltext Access 8 Pages 2005
JavaSymphony, a programming model for the Grid
Fulltext Access 8 Pages 2005
An efficient incremental marshaling framework for distributed systems
Fulltext Access 8 Pages 2005
An update on the proposed Hague Convention on exclusive choice of court agreements
Fulltext Access 8 Pages 2005
Automatic differentiation and nonlinear controller design by exact linearization
Fulltext Access 8 Pages 2005
Looking for narrow interfaces in automatic differentiation using graph drawing
Fulltext Access 8 Pages 2005
Baker & McKenzie's regular article tracking developments in EU law relating to IP, IT and telecommunications
Fulltext Access 8 Pages 2005
Calcium3D: A visual software package for the simulation of calcium buffered diffusion in neuroendocrine cells
Fulltext Access 8 Pages 2005
Taking a sledgehammer to crack the nut: The EU Enforcement Directive
Fulltext Access 8 Pages 2005
Biometrics and identity fraud protection
Fulltext Access 8 Pages 2005
Two barriers to realizing the benefits of biometrics - A chain perspective on biometrics, and identity fraud
Fulltext Access 8 Pages 2005
<< < 425 426 427 428 429 > >>
Related Topics
Genetic algorithm Articles
6327 Papers
Computer simulation Articles
3034 Papers
Productivity Articles
2777 Papers
Fuzzy logic Articles
2743 Papers
synchronization Articles
2257 Papers
Social media Articles
2052 Papers
Security Articles
2003 Papers
Automation Articles
1810 Papers
Cluster Articles
1655 Papers
Virtual reality Articles
1583 Papers
Robotics Articles
1524 Papers
Cloud computing Articles
1472 Papers
Fault detection Articles
1414 Papers
Social networks Articles
1409 Papers
survival analysis Articles
1353 Papers
CAM Articles
1272 Papers
Computer simulations Articles
1253 Papers
Computer vision Articles
1193 Papers
Privacy Articles
1165 Papers
Polymorphisms Articles
1155 Papers
Simulations Articles
1129 Papers
Information retrieval Articles
955 Papers
Scale-up Articles
840 Papers
Social network analysis Articles
712 Papers
Facebook Articles
666 Papers
Geographic information systems Articles
645 Papers
ICT Articles
638 Papers
Multimedia Articles
618 Papers
Semantic web Articles
592 Papers
Computer-mediated communication Articles
569 Papers
Process simulation Articles
531 Papers
Smartphone Articles
520 Papers
Artificial Intelligence Articles
Computational Theory and Mathematics Articles
Computer Graphics and Computer-Aided Design Articles
Computer Networks and Communications Articles
Computer Science (General) Articles
Computer Science Applications Articles
Computer Vision and Pattern Recognition Articles
Hardware and Architecture Articles
Human-Computer Interaction Articles
Information Systems Articles
Signal Processing Articles
Software Articles
All Topics
Related Journals
Artificial Intelligence Journals
Computational Theory and Mathematics Journals
Computer Graphics and Computer-Aided Design Journals
Computer Networks and Communications Journals
Computer Science (General) Journals
Computer Science Applications Journals
Computer Vision and Pattern Recognition Journals
Hardware and Architecture Journals
Human-Computer Interaction Journals
Information Systems Journals
Signal Processing Journals
Software Journals
New Scientist Journal
Electronic Notes in Theoretical Computer Science Journal
Future Generation Computer Systems Journal
Physical Communication Journal
Applied Computing and Informatics Journal
Computer Law & Security Review Journal
Computer Methods and Programs in Biomedicine Journal
Computer Science Review Journal
Computers & Mathematics with Applications Journal
Computers & Operations Research Journal
Egyptian Informatics Journal Journal
Engineering Journal
Engineering Science and Technology, an International Journal Journal
European Journal of Operational Research Journal
Informatics in Medicine Unlocked Journal
Journal of the Egyptian Mathematical Society Journal
Journal of King Saud University - Computer and Information Sciences Journal
Karbala International Journal of Modern Science Journal
Operations Research Perspectives Journal
Procedia Computer Science Journal
Procedia Technology Journal
Simulation Modelling Practice and Theory Journal
Sustainable Computing: Informatics and Systems Journal
Swarm and Evolutionary Computation Journal

Daneshyari.com

دسترسی سریع

  • صفحه اصلی دانشیاری
  • دسته بندی موضوعی مقالات
  • مقالات ترجمه شده
  • سفارش ترجمه مقاله
  • سفارش تولید محتوا
  • تولید محتوا

ارتباط

  • ورود
  • عضویت
  • تماس و پشتیبانی
  • تبلیغات

English Website

  • Home
  • Physical Sciences and Engineering
  • Life Sciences
  • Health Sciences
  • Social Sciences and Humanities