Works matching DE "SET (Computer network protocol)"
Results: 83
Validation tools for variable subset regression.
- Published in:
- Journal of Computer-Aided Molecular Design, 2004, v. 18, n. 7-9, p. 549, doi. 10.1007/s10822-004-4071-5
- By:
- Publication type:
- Article
Adding the Reliability on Tree Based Topology Construction Algorithms for Wireless Sensor Networks.
- Published in:
- Wireless Personal Communications, 2014, v. 74, n. 2, p. 989, doi. 10.1007/s11277-013-1334-2
- By:
- Publication type:
- Article
Mobile IP-Based Protocol for Wireless Personal Area Networks in Critical Environments.
- Published in:
- Wireless Personal Communications, 2011, v. 61, n. 4, p. 711, doi. 10.1007/s11277-011-0428-y
- By:
- Publication type:
- Article
Adaptive Distributed Channel Assignment in Wireless Mesh Networks.
- Published in:
- Wireless Personal Communications, 2008, v. 47, n. 3, p. 363, doi. 10.1007/s11277-008-9484-3
- By:
- Publication type:
- Article
Using neural networks to predict surface zooplankton biomass along a 50°N to 50°S transect of the Atlantic.
- Published in:
- Journal of Plankton Research, 2001, v. 23, n. 8, p. 875, doi. 10.1093/plankt/23.8.875
- By:
- Publication type:
- Article
The integrated production–inventory–distribution–routing problem.
- Published in:
- Journal of Scheduling, 2009, v. 12, n. 3, p. 257, doi. 10.1007/s10951-008-0081-9
- By:
- Publication type:
- Article
Radio planning and coverage optimization of 3G cellular networks.
- Published in:
- Wireless Networks (10220038), 2008, v. 14, n. 4, p. 435, doi. 10.1007/s11276-006-0729-3
- By:
- Publication type:
- Article
On the scalability of IEEE 802.11 ad-hoc-mode timing synchronization function.
- Published in:
- Wireless Networks (10220038), 2008, v. 14, n. 4, p. 479, doi. 10.1007/s11276-006-0732-8
- By:
- Publication type:
- Article
Penetration of e-Transactions in Odisha: Issues, Challenges and the Way Forward.
- Published in:
- IUP Journal of Information Technology, 2016, v. 12, n. 3, p. 7
- By:
- Publication type:
- Article
INDEX-MAXMINER:: A NEW MAXIMAL FREQUENT ITEMSET MINING ALGORITHM.
- Published in:
- International Journal on Artificial Intelligence Tools, 2008, v. 17, n. 2, p. 303, doi. 10.1142/S021821300800390X
- By:
- Publication type:
- Article
The Outer-connected Domination Number of Sierpiński-like Graphs.
- Published in:
- Theory of Computing Systems, 2016, v. 58, n. 2, p. 345, doi. 10.1007/s00224-015-9621-9
- By:
- Publication type:
- Article
Sequential Diagnosis by Abstraction.
- Published in:
- Journal of Artificial Intelligence Research, 2011, v. 41, p. 329, doi. 10.1613/jair.3296
- By:
- Publication type:
- Article
Set Intersection and Consistency in Constraint Networks.
- Published in:
- Journal of Artificial Intelligence Research, 2006, v. 27, p. 441, doi. 10.1613/jair.2058
- By:
- Publication type:
- Article
Solving survivable two-layer network design problems by metric inequalities.
- Published in:
- Computational Optimization & Applications, 2012, v. 51, n. 2, p. 809, doi. 10.1007/s10589-010-9364-0
- By:
- Publication type:
- Article
Large-Scale Active-Set Box-Constrained Optimization Method with Spectral Projected Gradients.
- Published in:
- Computational Optimization & Applications, 2002, v. 23, n. 1, p. 101, doi. 10.1023/A:1019928808826
- By:
- Publication type:
- Article
Static Replication Strategies for Content Availability in Vehicular Ad-hoc Networks.
- Published in:
- Mobile Networks & Applications, 2009, v. 14, n. 5, p. 590, doi. 10.1007/s11036-008-0120-y
- By:
- Publication type:
- Article
An Inter-cluster Communication based Energy Aware and Fault Tolerant Protocol for Wireless Sensor Networks.
- Published in:
- Mobile Networks & Applications, 2008, v. 13, n. 6, p. 614, doi. 10.1007/s11036-008-0093-x
- By:
- Publication type:
- Article
Four-objective formulations of multicast flows via evolutionary algorithms with quality demands.
- Published in:
- Telecommunication Systems, 2014, v. 55, n. 3, p. 435, doi. 10.1007/s11235-013-9797-8
- By:
- Publication type:
- Article
Optimizing network load balancing: an hybridization approach of metaheuristics with column generation.
- Published in:
- Telecommunication Systems, 2013, v. 52, n. 2, p. 959, doi. 10.1007/s11235-011-9604-3
- By:
- Publication type:
- Article
Resilient routing in optical networks using SRLG-disjoint path pairs of min-sum cost.
- Published in:
- Telecommunication Systems, 2013, v. 52, n. 2, p. 737, doi. 10.1007/s11235-011-9574-5
- By:
- Publication type:
- Article
Stochastic performance analysis of non-feedforward networks.
- Published in:
- Telecommunication Systems, 2010, v. 43, n. 3/4, p. 237, doi. 10.1007/s11235-009-9211-8
- By:
- Publication type:
- Article
Influence of Network Characteristics on Application Performance in a Grid Environment.
- Published in:
- Telecommunication Systems, 2005, v. 30, n. 1-3, p. 99, doi. 10.1007/s11235-005-4320-5
- By:
- Publication type:
- Article
Heuristic and Hybrid Methods for Solving Optimal Multiple Multicast Problem on WDM Ring Network.
- Published in:
- Telecommunication Systems, 2005, v. 28, n. 2, p. 245, doi. 10.1007/s11235-004-5019-8
- By:
- Publication type:
- Article
Lossy Communicating Finite State Machines.
- Published in:
- Telecommunication Systems, 2004, v. 25, n. 3/4, p. 433, doi. 10.1023/B:TELS.0000014793.19622.0e
- By:
- Publication type:
- Article
Construction of Time-Relaxed c-Broadcast Networks.
- Published in:
- Telecommunication Systems, 2003, v. 24, n. 1, p. 47, doi. 10.1023/A:1025838126048
- By:
- Publication type:
- Article
Reformulation of the set partitioning problem as a pure network with special order set constraints.
- Published in:
- Annals of Operations Research, 1998, v. 81, n. 1-4, p. 233, doi. 10.1023/A:1018953006796
- By:
- Publication type:
- Article
Throughput estimation in cyclic queueing networks with blocking.
- Published in:
- Annals of Operations Research, 1998, v. 79, n. 1-4, p. 207, doi. 10.1023/A:1018970621392
- By:
- Publication type:
- Article
NAPADI NA BEZBEDNOST BEžIčNIH LOKALNIH MREžA.
- Published in:
- InfoM, 2013, n. 47, p. 46
- By:
- Publication type:
- Article
Coalgebraic Weak Bisimulation for Action-Type Systems.
- Published in:
- Scientific Annals of Computer Science, 2009, v. 19, p. 93
- By:
- Publication type:
- Article
Minisum collection depots location problem with multiple facilities on a network.
- Published in:
- Journal of the Operational Research Society, 2004, v. 55, n. 7, p. 769, doi. 10.1057/palgrave.jors.2601742
- By:
- Publication type:
- Article
Iterative classification for multiple target attributes.
- Published in:
- Journal of Intelligent Information Systems, 2013, v. 40, n. 2, p. 283, doi. 10.1007/s10844-012-0224-5
- By:
- Publication type:
- Article
Finding desirable objects under group categorical preferences.
- Published in:
- Knowledge & Information Systems, 2016, v. 49, n. 1, p. 273, doi. 10.1007/s10115-015-0886-8
- By:
- Publication type:
- Article
Set containment join revisited.
- Published in:
- Knowledge & Information Systems, 2016, v. 49, n. 1, p. 375, doi. 10.1007/s10115-015-0895-7
- By:
- Publication type:
- Article
Finding least fuel emission paths in a network with time-varying speeds.
- Published in:
- Networks, 2014, v. 63, n. 1, p. 96, doi. 10.1002/net.21524
- By:
- Publication type:
- Article
Genetic network inference as a series of discrimination tasks.
- Published in:
- Bioinformatics, 2009, v. 25, n. 7, p. 918, doi. 10.1093/bioinformatics/btp072
- By:
- Publication type:
- Article
Causality and pathway search in microarray time series experiment.
- Published in:
- Bioinformatics, 2007, v. 23, n. 4, p. 442
- By:
- Publication type:
- Article
Formal Analysis of SET and NSL Protocols Using the Interpretation Functions-Based Method.
- Published in:
- Journal of Computer Networks & Communications, 2012, p. 1, doi. 10.1155/2012/254942
- By:
- Publication type:
- Article
An overview of the verification of SET.
- Published in:
- International Journal of Information Security, 2005, v. 4, n. 1/2, p. 17, doi. 10.1007/s10207-004-0047-7
- By:
- Publication type:
- Article
An advanced cost estimation methodology for engineering systems.
- Published in:
- Systems Engineering, 2012, v. 15, n. 1, p. 28, doi. 10.1002/sys.20192
- By:
- Publication type:
- Article
Security Performance.
- Published in:
- IEEE Internet Computing, 2003, v. 7, n. 3, p. 84, doi. 10.1109/MIC.2003.1200305
- By:
- Publication type:
- Article
Efficient Mobile Authentication Scheme Preserving User Privacy for Large-Scale Wireless Networks.
- Published in:
- Adhoc & Sensor Wireless Networks, 2013, v. 17, n. 3/4, p. 313
- By:
- Publication type:
- Article
Approximation Algorithms for Maximum Weight Independent Set of Links Under the SINR Model.
- Published in:
- Adhoc & Sensor Wireless Networks, 2013, v. 17, n. 3/4, p. 293
- By:
- Publication type:
- Article
New dominating sets in social networks.
- Published in:
- Journal of Global Optimization, 2010, v. 48, n. 4, p. 633, doi. 10.1007/s10898-009-9511-2
- By:
- Publication type:
- Article
Survivable network design under optimal and heuristic interdiction scenarios.
- Published in:
- Journal of Global Optimization, 2007, v. 38, n. 2, p. 181, doi. 10.1007/s10898-006-9067-3
- By:
- Publication type:
- Article
Evaluating the Performance of VANET for Different Mobility Models using NS-2.
- Published in:
- International Journal of Computer Science & Management Studies, 2013, v. 13, n. 5, p. 107
- By:
- Publication type:
- Article
Call Forwarding-Based Active Probing for POTS Fault Isolation.
- Published in:
- Journal of Network & Systems Management, 2008, v. 16, n. 2, p. 145, doi. 10.1007/s10922-007-9076-7
- By:
- Publication type:
- Article
On a Self-Organizing Multipath Routing Protocol in MobileWireless Networks.
- Published in:
- Journal of Network & Systems Management, 2006, v. 14, n. 1, p. 103, doi. 10.1007/s10922-005-9017-2
- By:
- Publication type:
- Article
A CONSTRAINED SHORTEST ROUTE PROBLEM.
- Published in:
- Operations Research, 1968, v. 16, n. 1, p. 205, doi. 10.1287/opre.16.1.205
- By:
- Publication type:
- Article
Fast local search for the maximum independent set problem.
- Published in:
- Journal of Heuristics, 2012, v. 18, n. 4, p. 525, doi. 10.1007/s10732-012-9196-4
- By:
- Publication type:
- Article
Maintaining Consistency of Imprecise Relations.
- Published in:
- Computer Journal, 1996, v. 39, n. 2, p. 114, doi. 10.1093/comjnl/39.2.114
- By:
- Publication type:
- Article