Understanding behaviour in problem structuring methods interventions with activity theory Fulltext Access 60 Pages 2016
Energy-aware load monitoring for improving battery life of mobile peer-to-peer nodes Fulltext Access 78 Pages 2016
A quantum-inspired genetic algorithm for solving the antenna positioning problem Fulltext Access 87 Pages 2016
Introduction to special issue on Selected Papers from 2013 International Green Computing Conference Fulltext Access 4 Pages 2015
Upper Bounds for Rainbow 2-Connectivity of the Cartesian Product of a Path and a Cycle Fulltext Access 4 Pages 2015
Implementing Geographical Information System to Provide Evident Support for Crime Analysis Fulltext Access 4 Pages 2015
Tanh–coth scheme for traveling wave solutions for Nonlinear Wave Interaction model Fulltext Access 4 Pages 2015
Decision Support Model for Automated Railway Level Crossing System Using Fuzzy Logic Control Fulltext Access 4 Pages 2015
Towards a Multi-level Upper Ontology/ foundation Ontology Framework as Background Knowledge for Ontology Matching Problem Fulltext Access 4 Pages 2015
A single vehicle routing problem with pickups and deliveries, continuous random demands and predefined customer order Fulltext Access 4 Pages 2015
Two faster algorithms for coordination of production and batch delivery: A note Fulltext Access 4 Pages 2015
A closed-form solution for a tollbooth tandem queue with two heterogeneous servers and exponential service times Fulltext Access 4 Pages 2015
On the solution of multidimensional convex separable continuous knapsack problem with bounded variables Fulltext Access 4 Pages 2015
Nitroxyl, a New Generation of Positive Inotropic Agent for Heart Failure Fulltext Access 4 Pages 2015
Multi-level facility location as the maximization of a submodular set function Fulltext Access 4 Pages 2015
First-Principles Study of Lithium and Sodium Atoms Intercalation in Fluorinated Graphite Fulltext Access 4 Pages 2015
New Theory for Code-translation; Punctuator and Qualifier as Two Token Categories and Supplementary Concepts of Programming Fulltext Access 5 Pages 2015
Virtual Tool for the Development of Strategies to Reduce the Stress in Students Fulltext Access 5 Pages 2015
Graph Coloring Based on Evolutionary Algorithms to Support Data Hiding Scheme on Medical Images Fulltext Access 5 Pages 2015
Hybrid Intrusion Detection System for Private Cloud: A Systematic Approach Fulltext Access 5 Pages 2015
A Centralized Comparison of Energy Efficient Routing Protocol for Mobile and Static Wireless Sensor Network Fulltext Access 5 Pages 2015
A Novel Approach to Low Temperature Thermal Reverse Osmosis Desalination Fulltext Access 5 Pages 2015
A Method to Improve Transparency of Electronic Election Process without Identification Fulltext Access 5 Pages 2015
Optimizing water delivery system storage and its influence on air pollutant emission reduction Fulltext Access 5 Pages 2015
Does mean-variance portfoliomanagement deserve expected utility's approximative affirmation? Fulltext Access 5 Pages 2015
High-Throughput Multi-Plume Pulsed-Laser Deposition for Materials Exploration and Optimization Fulltext Access 5 Pages 2015
Numerical simulation of nanofluid flow with convective boundary condition Fulltext Access 5 Pages 2015
Coefficient estimates for a subclass of analytic and bi-univalent functions Fulltext Access 5 Pages 2015
Fully developed natural convective micropolar fluid flow in a vertical channel with slip Fulltext Access 5 Pages 2015
Theoretical energy saving analysis of air conditioning system using heat pipe heat exchanger for Indian climatic zones Fulltext Access 5 Pages 2015
A continuous time–cost tradeoff problem with multiple milestones and completely ordered jobs Fulltext Access 5 Pages 2015
Modeling and multi-objective optimization of powder mixed electric discharge machining process of aluminum/alumina metal matrix composite Fulltext Access 5 Pages 2015
A note on “A goal programming model for incomplete interval multiplicative preference relations and its application in group decision-making” Fulltext Access 5 Pages 2015
Pricing and sales-effort investment under bi-criteria in a supply chain of virtual products involving risk Fulltext Access 5 Pages 2015
An Iterative Solution for the Coverage and Connectivity Problem in Wireless Sensor Network Fulltext Access 5 Pages 2015
Formal Transformation Inhibitory Safe Petri Nets into Equivalent not Inhibitory Fulltext Access 5 Pages 2015
Associated Credit Risk Contagion Between Enterprises Based on the Imperfect Immunization Scenario Fulltext Access 5 Pages 2015
Unsupervised Speech Segregation Using Pitch Information and Time Frequency Masking Fulltext Access 5 Pages 2015
Performance Analysis of a Novel High Impedance Surface for Microstrip-line Small Patch Antenna for Mobile Applications Fulltext Access 5 Pages 2015
Using Assistive Technology for Spiritual Enhancement of Brain-Impaired Children Fulltext Access 5 Pages 2015
On generalized superposition operator acting of analytic function spaces Fulltext Access 5 Pages 2015
On successive approximation method for coupled systems of Chandrasekhar quadratic integral equations Fulltext Access 5 Pages 2015
Rigorous results on the effectiveness of some heuristics for the consolidation of virtual machines in a cloud data center Fulltext Access 6 Pages 2015
Server-aided anonymous attribute-based authentication in cloud computing Fulltext Access 6 Pages 2015