Found: 82
Select item for more details and to access through your institution.
P2P resource searching with Cloning Random Walker assisted by Weakly Connected Dominating Set.
- Published in:
- Journal of Supercomputing, 2014, v. 68, n. 1, p. 443, doi. 10.1007/s11227-013-1046-0
- By:
- Publication type:
- Article
Connectivity and coverage maintenance in wireless sensor networks.
- Published in:
- Journal of Supercomputing, 2010, v. 52, n. 1, p. 23, doi. 10.1007/s11227-009-0268-7
- By:
- Publication type:
- Article
Iterative classification for multiple target attributes.
- Published in:
- Journal of Intelligent Information Systems, 2013, v. 40, n. 2, p. 283, doi. 10.1007/s10844-012-0224-5
- By:
- Publication type:
- Article
Validation tools for variable subset regression.
- Published in:
- Journal of Computer-Aided Molecular Design, 2004, v. 18, n. 7-9, p. 549, doi. 10.1007/s10822-004-4071-5
- By:
- Publication type:
- Article
Four-objective formulations of multicast flows via evolutionary algorithms with quality demands.
- Published in:
- Telecommunication Systems, 2014, v. 55, n. 3, p. 435, doi. 10.1007/s11235-013-9797-8
- By:
- Publication type:
- Article
Optimizing network load balancing: an hybridization approach of metaheuristics with column generation.
- Published in:
- Telecommunication Systems, 2013, v. 52, n. 2, p. 959, doi. 10.1007/s11235-011-9604-3
- By:
- Publication type:
- Article
Resilient routing in optical networks using SRLG-disjoint path pairs of min-sum cost.
- Published in:
- Telecommunication Systems, 2013, v. 52, n. 2, p. 737, doi. 10.1007/s11235-011-9574-5
- By:
- Publication type:
- Article
Stochastic performance analysis of non-feedforward networks.
- Published in:
- Telecommunication Systems, 2010, v. 43, n. 3/4, p. 237, doi. 10.1007/s11235-009-9211-8
- By:
- Publication type:
- Article
Influence of Network Characteristics on Application Performance in a Grid Environment.
- Published in:
- Telecommunication Systems, 2005, v. 30, n. 1-3, p. 99, doi. 10.1007/s11235-005-4320-5
- By:
- Publication type:
- Article
Heuristic and Hybrid Methods for Solving Optimal Multiple Multicast Problem on WDM Ring Network.
- Published in:
- Telecommunication Systems, 2005, v. 28, n. 2, p. 245, doi. 10.1007/s11235-004-5019-8
- By:
- Publication type:
- Article
Lossy Communicating Finite State Machines.
- Published in:
- Telecommunication Systems, 2004, v. 25, n. 3/4, p. 433, doi. 10.1023/B:TELS.0000014793.19622.0e
- By:
- Publication type:
- Article
Construction of Time-Relaxed c-Broadcast Networks.
- Published in:
- Telecommunication Systems, 2003, v. 24, n. 1, p. 47, doi. 10.1023/A:1025838126048
- By:
- Publication type:
- Article
Reformulation of the set partitioning problem as a pure network with special order set constraints.
- Published in:
- Annals of Operations Research, 1998, v. 81, n. 1-4, p. 233, doi. 10.1023/A:1018953006796
- By:
- Publication type:
- Article
Throughput estimation in cyclic queueing networks with blocking.
- Published in:
- Annals of Operations Research, 1998, v. 79, n. 1-4, p. 207, doi. 10.1023/A:1018970621392
- By:
- Publication type:
- Article
An Exact Algorithm for Blockmodeling of Two-Mode Network Data.
- Published in:
- Journal of Mathematical Sociology, 2013, v. 37, n. 2, p. 61, doi. 10.1080/0022250X.2011.597278
- By:
- Publication type:
- Article
A Physics-Driven Neural Networks-based Simulation System(PhyNNeSS) for Multimodal Interactive Virtual Environments Involving Nonlinear Deformable Objects.
- Published in:
- PRESENCE: Teleoperators & Virtual Environments, 2011, v. 20, n. 4, p. 289, doi. 10.1162/PRES_a_00054
- By:
- Publication type:
- Article
Efficient detection of contagious outbreaks in massive metropolitan encounter networks.
- Published in:
- Scientific Reports, 2014, p. 1, doi. 10.1038/srep05099
- By:
- Publication type:
- Article
Maintaining Consistency of Imprecise Relations.
- Published in:
- Computer Journal, 1996, v. 39, n. 2, p. 114, doi. 10.1093/comjnl/39.2.114
- By:
- Publication type:
- Article
The integrated production–inventory–distribution–routing problem.
- Published in:
- Journal of Scheduling, 2009, v. 12, n. 3, p. 257, doi. 10.1007/s10951-008-0081-9
- By:
- Publication type:
- Article
Reconstruction from Projections Using Grassmann Tensors.
- Published in:
- International Journal of Computer Vision, 2009, v. 83, n. 3, p. 274, doi. 10.1007/s11263-009-0225-1
- By:
- Publication type:
- Article
Translated Poisson Mixture Model for Stratification Learning.
- Published in:
- International Journal of Computer Vision, 2008, v. 80, n. 3, p. 358, doi. 10.1007/s11263-008-0144-6
- By:
- Publication type:
- Article
Solving survivable two-layer network design problems by metric inequalities.
- Published in:
- Computational Optimization & Applications, 2012, v. 51, n. 2, p. 809, doi. 10.1007/s10589-010-9364-0
- By:
- Publication type:
- Article
Large-Scale Active-Set Box-Constrained Optimization Method with Spectral Projected Gradients.
- Published in:
- Computational Optimization & Applications, 2002, v. 23, n. 1, p. 101, doi. 10.1023/A:1019928808826
- By:
- Publication type:
- Article
Genetic network inference as a series of discrimination tasks.
- Published in:
- Bioinformatics, 2009, v. 25, n. 7, p. 918, doi. 10.1093/bioinformatics/btp072
- By:
- Publication type:
- Article
Causality and pathway search in microarray time series experiment.
- Published in:
- Bioinformatics, 2007, v. 23, n. 4, p. 442
- By:
- Publication type:
- Article
Statistical aspects of rainfall fields in Southern Italy during a rain enhancement experiment.
- Published in:
- Environmetrics, 2006, v. 17, n. 8, p. 777, doi. 10.1002/env.793
- By:
- Publication type:
- Article
Contributions and challenges for network models in cognitive neuroscience.
- Published in:
- Nature Neuroscience, 2014, v. 17, n. 5, p. 652, doi. 10.1038/nn.3690
- By:
- Publication type:
- Article
Static Replication Strategies for Content Availability in Vehicular Ad-hoc Networks.
- Published in:
- Mobile Networks & Applications, 2009, v. 14, n. 5, p. 590, doi. 10.1007/s11036-008-0120-y
- By:
- Publication type:
- Article
An Inter-cluster Communication based Energy Aware and Fault Tolerant Protocol for Wireless Sensor Networks.
- Published in:
- Mobile Networks & Applications, 2008, v. 13, n. 6, p. 614, doi. 10.1007/s11036-008-0093-x
- By:
- Publication type:
- Article
NAPADI NA BEZBEDNOST BEžIčNIH LOKALNIH MREžA.
- Published in:
- InfoM, 2013, n. 47, p. 46
- By:
- Publication type:
- Article
Security Performance.
- Published in:
- IEEE Internet Computing, 2003, v. 7, n. 3, p. 84, doi. 10.1109/MIC.2003.1200305
- By:
- Publication type:
- Article
Efficient Mobile Authentication Scheme Preserving User Privacy for Large-Scale Wireless Networks.
- Published in:
- Adhoc & Sensor Wireless Networks, 2013, v. 17, n. 3/4, p. 313
- By:
- Publication type:
- Article
Approximation Algorithms for Maximum Weight Independent Set of Links Under the SINR Model.
- Published in:
- Adhoc & Sensor Wireless Networks, 2013, v. 17, n. 3/4, p. 293
- By:
- Publication type:
- Article
Secure Computation Without Authentication.
- Published in:
- Journal of Cryptology, 2011, v. 24, n. 4, p. 720, doi. 10.1007/s00145-010-9075-9
- By:
- Publication type:
- Article
Efficient Protocols for Set Intersection and Pattern Matching with Security Against Malicious and Covert Adversaries.
- Published in:
- Journal of Cryptology, 2010, v. 23, n. 3, p. 422, doi. 10.1007/s00145-008-9034-x
- By:
- Publication type:
- Article
Analysis and Characterization of Asynchronous State Transition Graphs Using Extremal States.
- Published in:
- Bulletin of Mathematical Biology, 2013, v. 75, n. 6, p. 920, doi. 10.1007/s11538-012-9782-5
- By:
- Publication type:
- Article
Binocular imaging of a laser stripe and approximation networks for shape detection.
- Published in:
- International Journal of Imaging Systems & Technology, 2007, v. 17, n. 2, p. 62
- By:
- Publication type:
- Article
Multiobjective Optimisation Problem of Regional Power Electric Networks Development.
- Published in:
- International Review on Modelling & Simulations, 2010, v. 3, n. 5, p. 852
- By:
- Publication type:
- Article
Transferring Data Between Any Two UDDI v3 - Compliant Repositories - K.A.L.I.N.A. Data Migration.
- Published in:
- International Review on Computers & Software, 2007, v. 2, n. 4, p. 382
- By:
- Publication type:
- Article
An Evaluation of Self-Organizing Map Networks as a Robust Alternative to Factor Analysis in Data Mining Applications.
- Published in:
- Information Systems Research, 2001, v. 12, n. 2, p. 177, doi. 10.1287/isre.12.2.177.9696
- By:
- Publication type:
- Article
A divide-and-conquer recursive approach for scaling up instance selection algorithms.
- Published in:
- Data Mining & Knowledge Discovery, 2009, v. 18, n. 3, p. 392, doi. 10.1007/s10618-008-0121-2
- By:
- Publication type:
- Article
Finding desirable objects under group categorical preferences.
- Published in:
- Knowledge & Information Systems, 2016, v. 49, n. 1, p. 273, doi. 10.1007/s10115-015-0886-8
- By:
- Publication type:
- Article
Set containment join revisited.
- Published in:
- Knowledge & Information Systems, 2016, v. 49, n. 1, p. 375, doi. 10.1007/s10115-015-0895-7
- By:
- Publication type:
- Article
Finding least fuel emission paths in a network with time-varying speeds.
- Published in:
- Networks, 2014, v. 63, n. 1, p. 96, doi. 10.1002/net.21524
- By:
- Publication type:
- Article
Calculating reliability of the recursively definable networks.
- Published in:
- Automation & Remote Control, 2010, v. 71, n. 7, p. 1403, doi. 10.1134/S0005117910070131
- By:
- Publication type:
- Article
Efficiency of the Methods of Scheduling Complex Sets of Tasks in Nonuniform Multiprocessor Computer Systems.
- Published in:
- Automation & Remote Control, 2003, v. 64, n. 10, p. 1571, doi. 10.1023/A:1026009422491
- By:
- Publication type:
- Article
Mobile gSET—secure business workflows for Mobile-Grid clients.
- Published in:
- Concurrency & Computation: Practice & Experience, 2010, v. 22, n. 14, p. 2036, doi. 10.1002/cpe.1437
- By:
- Publication type:
- Article
Radio planning and coverage optimization of 3G cellular networks.
- Published in:
- Wireless Networks (10220038), 2008, v. 14, n. 4, p. 435, doi. 10.1007/s11276-006-0729-3
- By:
- Publication type:
- Article
On the scalability of IEEE 802.11 ad-hoc-mode timing synchronization function.
- Published in:
- Wireless Networks (10220038), 2008, v. 14, n. 4, p. 479, doi. 10.1007/s11276-006-0732-8
- By:
- Publication type:
- Article
FUNDAMENTAL LAW NETWORK.
- Published in:
- Journal of Applied Global Research, 2011, v. 4, n. 11, p. 44
- By:
- Publication type:
- Article