Journal: Computers and Mathematics with Applications

Found 284 papers in total
Chaos, estimation and optimal control of habitat destruction model with uncertain parameters
2011,
The present paper discusses chaos, estimation and optimal control of the habitat...
Setting due dates to minimize the total weighted possibilistic mean value of the weighted earliness‐tardiness costs on a single machine
2011,
In this paper, it is investigated how to sequence jobs with fuzzy processing times and...
A hybrid ranking approach to estimate vulnerability for dynamic attacks
2011,
To enhance security in dynamic networks, it is important to evaluate the...
An efficient power control scheme for electric arc furnaces using online estimation of flexible cable inductance
2011,
This paper proposes a method for efficient power control of Electric Arc Furnaces...
Bankruptcy prediction in firms with statistical and intelligent techniques and a comparison of evolutionary computation approaches
2011,
In this paper, we compare some traditional statistical methods for predicting...
Optimal multinational capital budgeting under uncertainty
2011,
This paper discusses the multinational capital budgeting problem – when there...
Balanced bootstrap resampling method for neural model selection
2011,
Uniform resampling is the easiest to apply and is a general recipe for all problems,...
Modeling cooperative and competitive behaviors in emergency evacuation: A game-theoretical approach
2011,
A game‐theoretical model to study evacuees’ cooperative and competitive...
Chaos control and hybrid projective synchronization for a class of new chaotic systems
2011,
The problems on chaos control and hybrid projective synchronization for a class of new...
Global dynamics of vector-borne diseases with horizontal transmission in host population
2011,
The paper presents the dynamical features of a vector–host epidemic model with...
POOT: An efficient object tracking strategy based on short-term optimistic predictions for face-structured sensor networks
2012,
The advance of wireless sensor networks has enabled the development of a great number...
Performance comparison of OLSR and BATMAN routing protocols by a MANET testbed in stairs environment
2012,
A Mobile Ad‐hoc Network (MANET) is a set of mobile terminals, which move in...
Integration of task abortion and security requirements in GA-based meta-heuristics for independent batch grid scheduling
2012,
Scheduling and resource allocation in large scale distributed environments, such as...
Job failures in high performance computing systems: A large-scale empirical study
2012,
The growing complexity and size of High Performance Computing systems (HPCs) lead to...
Semantic analysis in cognitive UBIAS & E-UBIAS systems
2012,
This publication presents the use of semantic analysis in IT processes of data...
A method of two-handed gesture interactions with applications based on commodity devices
2012,
Recent progress on human–computer interface technology has enabled more...
Optimizing K2 trees: A case for validating the maturity of network of practices
2012,
Of late there has been considerable interest in the efficient and effective storage of...
An IP passing protocol for vehicular ad hoc networks with network fragmentation
2012,
When a vehicle is moving fast in a highway, how to effectively reduce the handoff...
A novel minimum delay maximum flow multicast algorithm to construct a multicast tree in wireless mesh networks
2012,
The construction of multicast tree within given constraints, such as delay and...
Static program analysis assisted dynamic taint tracking for software vulnerability discovery
2012,
The evolution of computer science has exposed us to the growing gravity of security...
Efficient object identification and localization for image retrieval using query-by-region
2012,
Localizing an object within an image is a common task in the field of computer vision,...
Detection of DDoS attacks using optimized traffic matrix
2012,
Distributed Denial of Service (DDoS) attacks have been increasing with the growth of...
A secure framework of the surveillance video network integrating heterogeneous video formats and protocols
2012,
Recently, IT technologies are becoming focused on different traditional industries....
Task optimization based on CPU pipeline technique in a multicore system
2012,
Currently, the multicore system is prevalent in desktops, laptops or servers. The web...
Papers per page: