Integer linear programming and heuristic techniques for system-level low power scheduling on multiprocessor architectures under throughput constraints Fulltext Access 29 Pages 2007
An empirical comparison of generators for self similar simulated traffic Fulltext Access 29 Pages 2007
A calculus for parallel computations over multidimensional dense arrays Fulltext Access 29 Pages 2007
Filling the gap between design and performance/reliability models of component-based systems: A model-driven approach Fulltext Access 31 Pages 2007
Performance analysis of an ingress switch in a JumpStart optical burst switching network Fulltext Access 32 Pages 2007
CILIOS: Connectionist inductive learning and inter-ontology similarities for recommending information agents Fulltext Access 33 Pages 2007
Critical success factors for a customer relationship management strategy Fulltext Access 33 Pages 2007
AquaLog: An ontology-driven question answering system for organizational semantic intranets Fulltext Access 34 Pages 2007
Two efficient packet aggregation mechanisms and QoS support in a slotted dual bus optical ring network Fulltext Access 35 Pages 2007
Universality and semicomputability for nondeterministic programming languages over abstract algebras Fulltext Access 35 Pages 2007
Customizing an XML–Haskell data binding with type isomorphism inference in Generic Haskell Fulltext Access 36 Pages 2007
Contextualization as an independent abstraction mechanism for conceptual modeling Fulltext Access 37 Pages 2007
Using semi-formal methods for detecting interactions among smart homes policies Fulltext Access 37 Pages 2007
Combining Description Logics with synopses for inferring complex knowledge patterns from XML sources Fulltext Access 41 Pages 2007
Modeling of influence of hydrological processes on the carbon cycle of a forest ecosystem Fulltext Access 4 Pages 2006
An assessment of systems and software engineering scholars and institutions (2000–2004) Fulltext Access 4 Pages 2006
Analysis of Sun et al.’s linkability attack on some proxy blind signature schemes Fulltext Access 4 Pages 2006
PTFIndicator: An IRENE_DLL-based application to evaluate estimates from pedotransfer functions by integrated indices Fulltext Access 4 Pages 2006
A classification technique based on radial basis function neural networks Fulltext Access 4 Pages 2006
Introduction to the special issue on software analysis, evolution and reengineering Fulltext Access 4 Pages 2006
Advances in Onion Routing: Description and backtracing/investigation problems Fulltext Access 4 Pages 2006
Nonlinear controller synthesis based on inverse describing function technique in the MATLAB environment Fulltext Access 5 Pages 2006
A Bayesian method for computing sample size and cost requirements for stratified random sampling of pond water Fulltext Access 5 Pages 2006
CFD simulations of the wind environment around an airport terminal building Fulltext Access 5 Pages 2006
Regional collaborative urban air quality management: case studies across Great Britain Fulltext Access 5 Pages 2006
An application of genetic algorithms to the robust estimation of soil organic and mineral fraction densities Fulltext Access 5 Pages 2006
Semi-analytical solution of the asymptotic Langevin Equation by the Picard Iterative Method Fulltext Access 5 Pages 2006
Model study of environmental concentrations of TBT in Tokyo Bay – development of a Windows® version prototype Fulltext Access 5 Pages 2006
Generating psychotropic drug exposure data from computer-based medical records Fulltext Access 5 Pages 2006
An empirical study of relationships among extreme programming engineering activities Fulltext Access 5 Pages 2006
An S-Plus function to calculate relative risks and adjusted means for regression models using natural splines Fulltext Access 5 Pages 2006
Deblurring visual evoked potentials using commercially available software Fulltext Access 5 Pages 2006
Preprocessing RR interval time series for heart rate variability analysis and estimates of standard deviation of RR intervals Fulltext Access 5 Pages 2006
MedDietScore: A computer program that evaluates the adherence to the Mediterranean dietary pattern and its relation to cardiovascular disease risk Fulltext Access 5 Pages 2006
Viscoelastic studies of human subscapularis tendon: Relaxation test and a Wiechert model Fulltext Access 5 Pages 2006
On the security of the Yen–Guo’s domino signal encryption algorithm (DSEA) Fulltext Access 6 Pages 2006
Cryptanalysis of a hybrid authentication protocol for large mobile networks Fulltext Access 6 Pages 2006