Browse Papers
From IFORS
Contact Us
English
Remember me
Login
Forgot password?
Journal: Computers and Mathematics with Applications
Found
284 papers
in total
Date Descending
Date Ascending
Title Descending
Title Ascending
Chaos, estimation and optimal control of habitat destruction model with uncertain parameters
2011,
Alwan Saba
The present paper discusses chaos, estimation and optimal control of the habitat...
Setting due dates to minimize the total weighted possibilistic mean value of the weighted earliness‐tardiness costs on a single machine
2011,
Xu Dehua
In this paper, it is investigated how to sequence jobs with fuzzy processing times and...
A hybrid ranking approach to estimate vulnerability for dynamic attacks
2011,
Zhang Qin
To enhance security in dynamic networks, it is important to evaluate the...
An efficient power control scheme for electric arc furnaces using online estimation of flexible cable inductance
2011,
Khoshkhoo H
This paper proposes a method for efficient power control of Electric Arc Furnaces...
Bankruptcy prediction in firms with statistical and intelligent techniques and a comparison of evolutionary computation approaches
2011,
Chen Mu-Yen
In this paper, we compare some traditional statistical methods for predicting...
Optimal multinational capital budgeting under uncertainty
2011,
Huang Xiaoxia
This paper discusses the multinational capital budgeting problem – when there...
Balanced bootstrap resampling method for neural model selection
2011,
Hung Wen-Liang
Uniform resampling is the easiest to apply and is a general recipe for all problems,...
Modeling cooperative and competitive behaviors in emergency evacuation: A game-theoretical approach
2011,
Zheng Xiaoping
A game‐theoretical model to study evacuees’ cooperative and competitive...
Chaos control and hybrid projective synchronization for a class of new chaotic systems
2011,
Wang Tao
The problems on chaos control and hybrid projective synchronization for a class of new...
Global dynamics of vector-borne diseases with horizontal transmission in host population
2011,
Lashari Abid Ali
The paper presents the dynamical features of a vector–host epidemic model with...
POOT: An efficient object tracking strategy based on short-term optimistic predictions for face-structured sensor networks
2012,
Hsu Jenq-Muh
The advance of wireless sensor networks has enabled the development of a great number...
Performance comparison of OLSR and BATMAN routing protocols by a MANET testbed in stairs environment
2012,
Kulla Elis
A Mobile Ad‐hoc Network (MANET) is a set of mobile terminals, which move in...
Integration of task abortion and security requirements in GA-based meta-heuristics for independent batch grid scheduling
2012,
Xhafa Fatos
Scheduling and resource allocation in large scale distributed environments, such as...
Job failures in high performance computing systems: A large-scale empirical study
2012,
Yang Guangwen
The growing complexity and size of High Performance Computing systems (HPCs) lead to...
Semantic analysis in cognitive UBIAS & E-UBIAS systems
2012,
Ogiela Lidia
This publication presents the use of semantic analysis in IT processes of data...
A method of two-handed gesture interactions with applications based on commodity devices
2012,
Lin Jiaqing
Recent progress on human–computer interface technology has enabled more...
Optimizing K2 trees: A case for validating the maturity of network of practices
2012,
Shi Quan
Of late there has been considerable interest in the efficient and effective storage of...
An IP passing protocol for vehicular ad hoc networks with network fragmentation
2012,
Chen Yuh-Shyan
When a vehicle is moving fast in a highway, how to effectively reduce the handoff...
A novel minimum delay maximum flow multicast algorithm to construct a multicast tree in wireless mesh networks
2012,
Kumar Neeraj
The construction of multicast tree within given constraints, such as delay and...
Static program analysis assisted dynamic taint tracking for software vulnerability discovery
2012,
Zhang Ruoyu
The evolution of computer science has exposed us to the growing gravity of security...
Efficient object identification and localization for image retrieval using query-by-region
2012,
Lee Yong-Hwan
Localizing an object within an image is a common task in the field of computer vision,...
Detection of DDoS attacks using optimized traffic matrix
2012,
Lee Sang Min
Distributed Denial of Service (DDoS) attacks have been increasing with the growth of...
A secure framework of the surveillance video network integrating heterogeneous video formats and protocols
2012,
Lee Kyungroul
Recently, IT technologies are becoming focused on different traditional industries....
Task optimization based on CPU pipeline technique in a multicore system
2012,
Zheng Weimin
Currently, the multicore system is prevalent in desktops, laptops or servers. The web...
First Page
6
7
8
9
10
Last Page
Papers per page:
6 Papers
12 Papers
24 Papers
36 Papers
48 Papers