• Daneshyari
  • Topics
    • Physical Sciences and Engineering
      Life Sciences
      Health Sciences
      Social Sciences and Humanities
Daneshyari Computer Science (General) Journas Latest Articles

Computer Science (General) Research Articles

Validated Proof-Producing Decision Procedures
Fulltext Access 16 Pages 2005
Towards a Megamodel to Model Software Evolution Through Transformations
Fulltext Access 16 Pages 2005
New Object-Oriented PROGRES for Specifying the Conceptual Design Tool GraCAD
Fulltext Access 16 Pages 2005
Model Checking Functional and Performability Properties of Stochastic Fluid Models
Fulltext Access 16 Pages 2005
Efficient Model Checking of Hardware Using Conditioned Slicing
Fulltext Access 16 Pages 2005
CTL-Property Transformations Along an Incremental Design Process
Fulltext Access 16 Pages 2005
Finding Extremal Models of Discrete Duration Calculus formulae using Symbolic Search
Fulltext Access 16 Pages 2005
Parallel Multithreaded Satisfiability Solver: Design and Implementation
Fulltext Access 16 Pages 2005
Towards a Unifying CSP approach to Hierarchical Verification of Asynchronous Hardware
Fulltext Access 16 Pages 2005
Truly Concurrent Logic via In-Between Specification
Fulltext Access 16 Pages 2005
Petri Nets as Semantic Domain for Diagram Notations
Fulltext Access 16 Pages 2005
The Conversion of Dynamic Fault Trees to Stochastic Petri Nets, as a case of Graph Transformation
Fulltext Access 16 Pages 2005
Termination of High-Level Replacement Units with Application to Model Transformation
Fulltext Access 16 Pages 2005
Formal Verification of the NASA Runway Safety Monitor
Fulltext Access 16 Pages 2005
Reducing Symmetries to Generate Easier SAT Instances
Fulltext Access 16 Pages 2005
Difunctorial Semantics of Object Calculus
Fulltext Access 16 Pages 2005
Structural Translation from Time Petri Nets to Timed Automata
Fulltext Access 16 Pages 2005
Machine-Checkable Correctness Proofs for Intra-procedural Dataflow Analyses
Fulltext Access 16 Pages 2005
Validating More Loop Optimizations
Fulltext Access 16 Pages 2005
Simplifying Itai-Rodeh Leader Election for Anonymous Rings
Fulltext Access 16 Pages 2005
A Syntactic Criterion for Injectivity of Authentication Protocols
Fulltext Access 16 Pages 2005
Design and Analysis of Diffie-Hellman-Based Key Exchange Using One-time ID by SVO Logic
Fulltext Access 16 Pages 2005
Towards a Small Model Theorem for Data Independent Systems in Alloy
Fulltext Access 16 Pages 2005
Regularity Results for FIFO Channels
Fulltext Access 16 Pages 2005
Detecting Structural Refactoring Conflicts Using Critical Pair Analysis
Fulltext Access 16 Pages 2005
Verifying Industrial Hybrid Systems with MathSAT
Fulltext Access 16 Pages 2005
Logical Semantics for the Rewriting Calculus
Fulltext Access 16 Pages 2005
Satisfiability of Dolev-Yao Constraints
Fulltext Access 16 Pages 2005
Games for Counting Abstractions
Fulltext Access 17 Pages 2005
Optimal capacity allocation in multi-auction electricity markets under uncertainty
Fulltext Access 17 Pages 2005
Heuristic and exact algorithms for the spanning tree detection problem
Fulltext Access 17 Pages 2005
Finding Symmetry in Models of Concurrent Systems by Static Channel Diagram Analysis
Fulltext Access 17 Pages 2005
A new bound and an O(mn) algorithm for the undesirable 1-median problem (maxian) on networks
Fulltext Access 17 Pages 2005
About Fast and TReX Accelerations
Fulltext Access 17 Pages 2005
Sleep spindle detection using artificial neural networks trained with filtered time-domain EEG: A feasibility study
Fulltext Access 17 Pages 2005
A computational study of the permutation flow shop problem based on a tight lower bound
Fulltext Access 17 Pages 2005
Earliness-tardiness scheduling with setup considerations
Fulltext Access 17 Pages 2005
Genetic programming for the prediction of insolvency in non-life insurance companies
Fulltext Access 17 Pages 2005
Sorting multi-attribute alternatives: The TOMASO method
Fulltext Access 17 Pages 2005
Scheduling two-machine no-wait open shops to minimize makespan
Fulltext Access 17 Pages 2005
A 0-1 goal programming model for nurse scheduling
Fulltext Access 17 Pages 2005
The asymptotic self-similar behavior for the quasilinear heat equation with nonlinear boundary condition
Fulltext Access 17 Pages 2005
A relaxation scheme forcontinuous sedimentation in ideal clarifier-thickener units
Fulltext Access 17 Pages 2005
Automatic extraction of brain surface and mid-sagittal plane from PET images applying deformable models
Fulltext Access 17 Pages 2005
PsN-Toolkit-A collection of computer intensive statistical methods for non-linear mixed effect modeling using NONMEM
Fulltext Access 17 Pages 2005
News and comment on recent developments from around the world
Fulltext Access 17 Pages 2005
Exploiting Target Enlargement and Dynamic Abstraction within Mixed BDD and SAT Invariant Checking
Fulltext Access 17 Pages 2005
The ASW Protocol Revisited: A Unified View
Fulltext Access 17 Pages 2005
Synthesising Efficient and Effective Security Protocols
Fulltext Access 17 Pages 2005
Evolution Through Architectural Reconciliation
Fulltext Access 17 Pages 2005
From UML Models to Graph Transformation Systems
Fulltext Access 17 Pages 2005
Investigating Reasoning with Constraint Diagrams
Fulltext Access 17 Pages 2005
Processor-shared service systems with queue-dependent processors
Fulltext Access 17 Pages 2005
Towards Graph Transformation Based Generation of Visual Editors Using Eclipse
Fulltext Access 17 Pages 2005
An Algebraic Baseline for Automatic Transformations in MDA
Fulltext Access 17 Pages 2005
On the Evolution Complexity of Design Patterns
Fulltext Access 17 Pages 2005
Obtaining Memory-Efficient Solutions to Boolean Equation Systems
Fulltext Access 17 Pages 2005
Guaranteeing Correctness Properties of a Java Card Applet
Fulltext Access 17 Pages 2005
Runtime Refinement Checking of Concurrent Data Structures
Fulltext Access 17 Pages 2005
Program Instrumentation and Run-Time Analysis of Scoped Memory in Java
Fulltext Access 17 Pages 2005
Ambient Graph Rewriting
Fulltext Access 17 Pages 2005
A ρ-Calculus of Explicit Constraint Application
Fulltext Access 17 Pages 2005
Analysing Password Protocol Security Against Off-line Dictionary Attacks
Fulltext Access 17 Pages 2005
A Coalgebraic Semantic Framework for Component-based Development in UML
Fulltext Access 17 Pages 2005
From Active Names to π-calculus Rewriting Rules
Fulltext Access 17 Pages 2005
Architectural Prototyping: From CCS to .Net
Fulltext Access 17 Pages 2005
Formality, Evolution, and Model-driven Software Engineering
Fulltext Access 17 Pages 2005
Probabilistic Guarded Commands Mechanized in HOL
Fulltext Access 17 Pages 2005
Improving Software Quality in Safety-Critical Applications by Model-Driven Verification
Fulltext Access 17 Pages 2005
Geographical Versus Functional Modelling by Statecharts of Interlocking Systems
Fulltext Access 17 Pages 2005
The multi-item replenishment problem in a two-echelon supply chain: the effect of centralization versus decentralization
Fulltext Access 17 Pages 2005
Formulating and solving splittable capacitated multiple allocation hub location problems
Fulltext Access 17 Pages 2005
Solving two location models with few facilities by using a hybrid heuristic: a real health resources case
Fulltext Access 17 Pages 2005
Determination of the parameters in the dynamic weighted Round-Robin method for network load balancing
Fulltext Access 17 Pages 2005
A model for lumpy demand parts in a multi-location inventory system with transshipments
Fulltext Access 17 Pages 2005
A portable and scalable algorithm for a class of constrained combinatorial optimization problems
Fulltext Access 17 Pages 2005
Employee turnover: a neural network solution
Fulltext Access 17 Pages 2005
Neural network ensemble strategies for financial decision applications
Fulltext Access 17 Pages 2005
Adaptation and Evolution in Dynamic Persistent Environments
Fulltext Access 17 Pages 2005
Quantifying the Benefits of SSA-Based Mobile Code
Fulltext Access 17 Pages 2005
An Abstract Interpretation-based Approach to Mobile Code Safety
Fulltext Access 17 Pages 2005
Memory Requirements of Java Bytecode Verification on Limited Devices
Fulltext Access 17 Pages 2005
A Program Result Checker for the Lexical Analysis of the GNU C Compiler
Fulltext Access 17 Pages 2005
Contextual Labelled Semantics for Higher-order Process Calculi
Fulltext Access 17 Pages 2005
Justifying Equality
Fulltext Access 17 Pages 2005
Macros for Interaction Nets
Fulltext Access 17 Pages 2005
CTL* Model Checking on a Shared-Memory Architecture
Fulltext Access 17 Pages 2005
Decidability of Reachability for Polymorphic Systems with Arrays: A Complete Classification
Fulltext Access 17 Pages 2005
Towards formalising AADL in Proof Assistants
Fulltext Access 17 Pages 2005
A Generic Cost Model for Concurrent and Data-parallel Meta-computing
Fulltext Access 17 Pages 2005
An interactive method for inventory control with fuzzy lead-time and dynamic demand
Fulltext Access 17 Pages 2005
Generating efficient schedules for identical parallel machines involving flow-time and tardy jobs
Fulltext Access 17 Pages 2005
Singularity crossing phenomena in DAEs: A two-phase fluid flow application case study
Fulltext Access 17 Pages 2005
Wavelets in a generalized Sobolev space
Fulltext Access 17 Pages 2005
Decision process for multiobjective, multi-item production-inventory system via interactive fuzzy satisficing technique
Fulltext Access 17 Pages 2005
Nonlinear observer design for a general class of nonlinear systems with real parametric uncertainty
Fulltext Access 17 Pages 2005
Dissipative discrete Hamiltonian systems
Fulltext Access 17 Pages 2005
Triple solutions of focal boundary value problems on time scale
Fulltext Access 17 Pages 2005
Periodic boundary value problem for the second-order impulsive functional differential equations
Fulltext Access 17 Pages 2005
Automatic Analysis of a Non-Repudiation Protocol
Fulltext Access 17 Pages 2005
<< < 435 436 437 438 439 > >>
Related Topics
Genetic algorithm Articles
6327 Papers
Computer simulation Articles
3034 Papers
Productivity Articles
2777 Papers
Fuzzy logic Articles
2743 Papers
synchronization Articles
2257 Papers
Social media Articles
2052 Papers
Security Articles
2003 Papers
Automation Articles
1810 Papers
Cluster Articles
1655 Papers
Virtual reality Articles
1583 Papers
Robotics Articles
1524 Papers
Cloud computing Articles
1472 Papers
Fault detection Articles
1414 Papers
Social networks Articles
1409 Papers
survival analysis Articles
1353 Papers
CAM Articles
1272 Papers
Computer simulations Articles
1253 Papers
Computer vision Articles
1193 Papers
Privacy Articles
1165 Papers
Polymorphisms Articles
1155 Papers
Simulations Articles
1129 Papers
Information retrieval Articles
955 Papers
Scale-up Articles
840 Papers
Social network analysis Articles
712 Papers
Facebook Articles
666 Papers
Geographic information systems Articles
645 Papers
ICT Articles
638 Papers
Multimedia Articles
618 Papers
Semantic web Articles
592 Papers
Computer-mediated communication Articles
569 Papers
Process simulation Articles
531 Papers
Smartphone Articles
520 Papers
Artificial Intelligence Articles
Computational Theory and Mathematics Articles
Computer Graphics and Computer-Aided Design Articles
Computer Networks and Communications Articles
Computer Science (General) Articles
Computer Science Applications Articles
Computer Vision and Pattern Recognition Articles
Hardware and Architecture Articles
Human-Computer Interaction Articles
Information Systems Articles
Signal Processing Articles
Software Articles
All Topics
Related Journals
Artificial Intelligence Journals
Computational Theory and Mathematics Journals
Computer Graphics and Computer-Aided Design Journals
Computer Networks and Communications Journals
Computer Science (General) Journals
Computer Science Applications Journals
Computer Vision and Pattern Recognition Journals
Hardware and Architecture Journals
Human-Computer Interaction Journals
Information Systems Journals
Signal Processing Journals
Software Journals
New Scientist Journal
Electronic Notes in Theoretical Computer Science Journal
Future Generation Computer Systems Journal
Physical Communication Journal
Applied Computing and Informatics Journal
Computer Law & Security Review Journal
Computer Methods and Programs in Biomedicine Journal
Computer Science Review Journal
Computers & Mathematics with Applications Journal
Computers & Operations Research Journal
Egyptian Informatics Journal Journal
Engineering Journal
Engineering Science and Technology, an International Journal Journal
European Journal of Operational Research Journal
Informatics in Medicine Unlocked Journal
Journal of the Egyptian Mathematical Society Journal
Journal of King Saud University - Computer and Information Sciences Journal
Karbala International Journal of Modern Science Journal
Operations Research Perspectives Journal
Procedia Computer Science Journal
Procedia Technology Journal
Simulation Modelling Practice and Theory Journal
Sustainable Computing: Informatics and Systems Journal
Swarm and Evolutionary Computation Journal

Daneshyari.com

دسترسی سریع

  • صفحه اصلی دانشیاری
  • دسته بندی موضوعی مقالات
  • مقالات ترجمه شده
  • سفارش ترجمه مقاله
  • سفارش تولید محتوا
  • تولید محتوا

ارتباط

  • ورود
  • عضویت
  • تماس و پشتیبانی
  • تبلیغات

English Website

  • Home
  • Physical Sciences and Engineering
  • Life Sciences
  • Health Sciences
  • Social Sciences and Humanities