• Daneshyari
  • Topics
    • Physical Sciences and Engineering
      Life Sciences
      Health Sciences
      Social Sciences and Humanities
Daneshyari Computer Science (General) Journas Latest Articles

Computer Science (General) Research Articles

An integrated systems approach to process control and maintenance
Fulltext Access 17 Pages 2005
Managing inventories in a two-echelon dual-channel supply chain
Fulltext Access 17 Pages 2005
Profitability of a sample of Portuguese bank branches and its decomposition into technical and allocative components
Fulltext Access 17 Pages 2005
A non-additive decision-aid for venture capitalists' investment decisions
Fulltext Access 17 Pages 2005
Optimal portfolio selection and dynamic benchmark tracking
Fulltext Access 17 Pages 2005
Optimal burn-in time to minimize the cost for general repairable products sold under warranty
Fulltext Access 17 Pages 2005
Efficient market-clearing prices in markets with nonconvexities
Fulltext Access 17 Pages 2005
Customer base analysis: partial defection of behaviourally loyal clients in a non-contractual FMCG retail setting
Fulltext Access 17 Pages 2005
Hedge fund performance appraisal using data envelopment analysis
Fulltext Access 17 Pages 2005
Forest structure optimization using evolutionary programming and landscape ecology metrics
Fulltext Access 17 Pages 2005
Inventory control based on advanced probability theory, an application
Fulltext Access 17 Pages 2005
A review of exact solution methods for the non-preemptive multiprocessor flowshop problem
Fulltext Access 17 Pages 2005
An inventory model for delayed customization: A hybrid approach
Fulltext Access 17 Pages 2005
Vehicle minimization for periodic deliveries
Fulltext Access 17 Pages 2005
A characterization of concordance relations
Fulltext Access 17 Pages 2005
Solving influence diagrams with fuzzy chance and value nodes
Fulltext Access 17 Pages 2005
Using the sum-of-uniforms method to generate correlated random variates with certain marginal distribution
Fulltext Access 17 Pages 2005
An action-research based instrument for monitoring continuous quality improvement
Fulltext Access 17 Pages 2005
Estimating the market shares of stores based on the shopper's search and purchase behavior
Fulltext Access 17 Pages 2005
Robust scheduling of parallel machines with sequence-dependent set-up costs
Fulltext Access 17 Pages 2005
Air distribution numerical simulating of isothermal jet with interference parameters in large space
Fulltext Access 17 Pages 2005
Estimation of parameters in latent class models using fuzzy clustering algorithms
Fulltext Access 17 Pages 2005
Support for decision implementation and follow-up
Fulltext Access 17 Pages 2005
A case-based fuzzy multicriteria decision support model for tropical cyclone forecasting
Fulltext Access 17 Pages 2005
Dealing with imprecise information in group multicriteria decisions: a methodology and a GDSS architecture
Fulltext Access 17 Pages 2005
Selecting preferred solutions in the minimax approach to dynamic programming problems under flexible constraints
Fulltext Access 17 Pages 2005
“To be recorded” analysis in reverse-mode automatic differentiation
Fulltext Access 17 Pages 2005
A greedy strategy for detecting negative cost cycles in networks
Fulltext Access 17 Pages 2005
Cooperative control of multicast-based streaming on-demand systems
Fulltext Access 17 Pages 2005
Auctions with bidder-determined allowable combinations
Fulltext Access 17 Pages 2005
Algorithm for minimizing weighted earliness penalty in single-machine problem
Fulltext Access 17 Pages 2005
Three-stage flow-shop scheduling with assembly operations to minimize the weighted sum of product completion times
Fulltext Access 17 Pages 2005
Towards Verification of Well-Formed Transactions in Java Card Bytecode
Fulltext Access 18 Pages 2005
Fairness of Components in System Computations
Fulltext Access 18 Pages 2005
A Space-Aware Bytecode Verifier for Java Cards
Fulltext Access 18 Pages 2005
JVM Bytecode Verification Without Dataflow Analysis
Fulltext Access 18 Pages 2005
Control of drug infusion for biological systems using FREN with sliding bounds
Fulltext Access 18 Pages 2005
Combining the Box Structure Development Method and CSP for Software Development
Fulltext Access 18 Pages 2005
Application of SVM and ANN for intrusion detection
Fulltext Access 18 Pages 2005
Dynamic analysis of proportional solenoid controlled piloted relief valve by bondgraph
Fulltext Access 18 Pages 2005
State observer based indirect adaptive fuzzy tracking control
Fulltext Access 18 Pages 2005
The initial conditions problem in longitudinal binary process: A simulation study
Fulltext Access 18 Pages 2005
A multi-agent reinforcement learning approach to obtaining dynamic control policies for stochastic lot scheduling problem
Fulltext Access 18 Pages 2005
An agent-based simulation testbed for evaluating internet-based matching mechanisms
Fulltext Access 18 Pages 2005
On line extraction of temporal episodes from ICU high-frequency data: A visual support for signal interpretation
Fulltext Access 18 Pages 2005
Content-based image database system for epilepsy
Fulltext Access 18 Pages 2005
Novel runtime systems support for adaptive compositional modeling in PSEs
Fulltext Access 18 Pages 2005
An Optimized Intruder Model for SAT-based Model-Checking of Security Protocols
Fulltext Access 18 Pages 2005
Distributed Event Graphs: Formalizing Component-based Modelling and Simulation
Fulltext Access 18 Pages 2005
Semantics and Verification of Data Flow in UML 2.0 Activities
Fulltext Access 18 Pages 2005
Analysing the Vulnerability of Protocols to Produce Known-pair and Chosen-text Attacks
Fulltext Access 18 Pages 2005
Partial Order Reduction for Verification of Spatial Properties of Pi-Calculus Processes
Fulltext Access 18 Pages 2005
Proving Modal Properties of Rewrite Theories Using Maude's Metalevel
Fulltext Access 18 Pages 2005
Breaking the Model: Finalisation and a Taxonomy of Security Attacks
Fulltext Access 18 Pages 2005
Verifying Concurrent Data Structures by Simulation
Fulltext Access 18 Pages 2005
Simpler Reasoning About System Properties: a Proof-by-Refinement Technique
Fulltext Access 18 Pages 2005
Structural Encoding of Static Single Assignment Form
Fulltext Access 18 Pages 2005
On the Optimality of Register Saturation
Fulltext Access 18 Pages 2005
Synchronization Algebras with Mobility for Graph Transformations
Fulltext Access 18 Pages 2005
Formal Verification of Timed Systems Using Cones and Foci
Fulltext Access 18 Pages 2005
A Compiler for Mapping a Rule-Based Event-Triggered Program to a Hardware Engine
Fulltext Access 18 Pages 2005
Rational Unification in 28 Characters
Fulltext Access 18 Pages 2005
Recursion Engineering for Reduction Incorporated Parsers
Fulltext Access 18 Pages 2005
Inferring Context-Free Grammars for Domain-Specific Languages
Fulltext Access 18 Pages 2005
Towards a Programming Language in Cellular Computing
Fulltext Access 18 Pages 2005
Towards Composition Management for Component-based Peer-to-Peer Architectures
Fulltext Access 18 Pages 2005
A Run-Time Environment for Concurrent Objects With Asynchronous Method Calls
Fulltext Access 18 Pages 2005
μ-Calculus Model Checking in Maude
Fulltext Access 18 Pages 2005
Equational Abstractions for Model Checking Erlang Programs
Fulltext Access 18 Pages 2005
Compositional Properties of Sequential Processes
Fulltext Access 18 Pages 2005
A Denotational Approach to the Static Analysis of Cryptographic Processes
Fulltext Access 18 Pages 2005
Weak Bisimulation for Action-Type Coalgebras
Fulltext Access 18 Pages 2005
Concrete Data Structures as Games
Fulltext Access 18 Pages 2005
A Component Assembly Approach Based On Aspect-Oriented Generative Domain Modeling
Fulltext Access 18 Pages 2005
On Decidability Properties of Local Sentences
Fulltext Access 18 Pages 2005
Integrating Time and Resource into Circus
Fulltext Access 18 Pages 2005
Coherently Explaining UML Statechart and Collaboration Diagrams by Graph Transformations
Fulltext Access 18 Pages 2005
Testing for the Conformance of Real-time Protocols Implemented by Operating Systems
Fulltext Access 18 Pages 2005
Early Verification and Validation of Mission Critical Systems
Fulltext Access 18 Pages 2005
Simultaneous disruption recovery of a train timetable and crew roster in real time
Fulltext Access 18 Pages 2005
Improving pilot mental workload classification through feature exploitation and combination: a feasibility study
Fulltext Access 18 Pages 2005
Approximating the sheep milk production curve through the use of artificial neural networks and genetic algorithms
Fulltext Access 18 Pages 2005
Radial point interpolation collocation method (RPICM) for partial differential equations
Fulltext Access 18 Pages 2005
A Translation-Facilitated Comparison Between the Common Language Runtime and the Java Virtual Machine
Fulltext Access 18 Pages 2005
Parametric Performance Contracts for QML-specified Software Components
Fulltext Access 18 Pages 2005
The Role of Agent Interaction in Models of Computing: Panelist Reviews
Fulltext Access 18 Pages 2005
Interactions in Transport Networks
Fulltext Access 18 Pages 2005
Gurland's ratio for the gamma function
Fulltext Access 18 Pages 2005
Nonlinear observer design for a general class of discrete-time nonlinear systems with real parametric uncertainty
Fulltext Access 18 Pages 2005
Applying the fuzzy-weighted-average approach to evaluate network security systems
Fulltext Access 18 Pages 2005
A new TVD-MUSCL scheme for hyperbolic conservation laws
Fulltext Access 18 Pages 2005
Flexible Bytecode for Linking in .NET
Fulltext Access 18 Pages 2005
A finite-difference method for the one-dimensional time-dependent schrödinger equation on unbounded domain
Fulltext Access 18 Pages 2005
Existence of triple positive solutions of two-point right focal boundary value problems on time scales
Fulltext Access 18 Pages 2005
Point-to-point and collision avoidance control of the motion of an autonomous bicycle
Fulltext Access 18 Pages 2005
Quantified Interference for a While Language
Fulltext Access 18 Pages 2005
On Quantitative Analysis of Probabilistic Protocols
Fulltext Access 18 Pages 2005
Tarzan: Communicating and Moving in Wireless Jungles
Fulltext Access 18 Pages 2005
Abstract Model Checking of tccp programs
Fulltext Access 18 Pages 2005
Monitoring Algorithms for Metric Temporal Logic Specifications
Fulltext Access 18 Pages 2005
<< < 436 437 438 439 440 > >>
Related Topics
Genetic algorithm Articles
6327 Papers
Computer simulation Articles
3034 Papers
Productivity Articles
2777 Papers
Fuzzy logic Articles
2743 Papers
synchronization Articles
2257 Papers
Social media Articles
2052 Papers
Security Articles
2003 Papers
Automation Articles
1810 Papers
Cluster Articles
1655 Papers
Virtual reality Articles
1583 Papers
Robotics Articles
1524 Papers
Cloud computing Articles
1472 Papers
Fault detection Articles
1414 Papers
Social networks Articles
1409 Papers
survival analysis Articles
1353 Papers
CAM Articles
1272 Papers
Computer simulations Articles
1253 Papers
Computer vision Articles
1193 Papers
Privacy Articles
1165 Papers
Polymorphisms Articles
1155 Papers
Simulations Articles
1129 Papers
Information retrieval Articles
955 Papers
Scale-up Articles
840 Papers
Social network analysis Articles
712 Papers
Facebook Articles
666 Papers
Geographic information systems Articles
645 Papers
ICT Articles
638 Papers
Multimedia Articles
618 Papers
Semantic web Articles
592 Papers
Computer-mediated communication Articles
569 Papers
Process simulation Articles
531 Papers
Smartphone Articles
520 Papers
Artificial Intelligence Articles
Computational Theory and Mathematics Articles
Computer Graphics and Computer-Aided Design Articles
Computer Networks and Communications Articles
Computer Science (General) Articles
Computer Science Applications Articles
Computer Vision and Pattern Recognition Articles
Hardware and Architecture Articles
Human-Computer Interaction Articles
Information Systems Articles
Signal Processing Articles
Software Articles
All Topics
Related Journals
Artificial Intelligence Journals
Computational Theory and Mathematics Journals
Computer Graphics and Computer-Aided Design Journals
Computer Networks and Communications Journals
Computer Science (General) Journals
Computer Science Applications Journals
Computer Vision and Pattern Recognition Journals
Hardware and Architecture Journals
Human-Computer Interaction Journals
Information Systems Journals
Signal Processing Journals
Software Journals
New Scientist Journal
Electronic Notes in Theoretical Computer Science Journal
Future Generation Computer Systems Journal
Physical Communication Journal
Applied Computing and Informatics Journal
Computer Law & Security Review Journal
Computer Methods and Programs in Biomedicine Journal
Computer Science Review Journal
Computers & Mathematics with Applications Journal
Computers & Operations Research Journal
Egyptian Informatics Journal Journal
Engineering Journal
Engineering Science and Technology, an International Journal Journal
European Journal of Operational Research Journal
Informatics in Medicine Unlocked Journal
Journal of the Egyptian Mathematical Society Journal
Journal of King Saud University - Computer and Information Sciences Journal
Karbala International Journal of Modern Science Journal
Operations Research Perspectives Journal
Procedia Computer Science Journal
Procedia Technology Journal
Simulation Modelling Practice and Theory Journal
Sustainable Computing: Informatics and Systems Journal
Swarm and Evolutionary Computation Journal

Daneshyari.com

دسترسی سریع

  • صفحه اصلی دانشیاری
  • دسته بندی موضوعی مقالات
  • مقالات ترجمه شده
  • سفارش ترجمه مقاله
  • سفارش تولید محتوا
  • تولید محتوا

ارتباط

  • ورود
  • عضویت
  • تماس و پشتیبانی
  • تبلیغات

English Website

  • Home
  • Physical Sciences and Engineering
  • Life Sciences
  • Health Sciences
  • Social Sciences and Humanities