History
1
368

Please fill in your query. A complete syntax description you will find on the General Help page.

Result 41 to 60 of 368 total

E-AHRW: an energy-efficient adaptive hash scheduler for stream processing on multi-core servers (English)
ANCS, 45-56 (2011).
41
An energy-efficient scheduling algorithm for sporadic real-time tasks in multiprocessor systems (English)
HPCC, 187-194 (2011).
42
Application of human-machine modeling technique in the flight safety simulation of civil aircraft (English)
ICAL, 192-195 (2011).
43
BCN: expansible network structures for data centers using hierarchical compound graphs (English)
INFOCOM, 61-65 (2011).
44
Localization in non-localizable sensor and ad-hoc networks: A localizability-aided approach (English)
INFOCOM, 276-280 (2011).
45
A QoS aware multicore hash scheduler for network applications (English)
INFOCOM, 1089-1097 (2011).
46
Mass-spring model deformation simulation based on weight vector (English)
ISCID (1), 59-62 (2011).
47
A numerical method for two-dimensional Schrödinger equation using MPS (English)
ICICA (1), 44-51 (2011).
48
The design and implementation of E-government system based on county (English)
ICICA (2), 545-551 (2011).
49
The application of PID controller optimized by genetic algorithm in valve-controlling asymmetrical cylinder system (English)
EMEIT, 845-848 (2011).
50
An efficient shared memory based virtual communication system for embedded SMP cluster (English)
NAS, 288-294 (2011).
51
KCube: a novel architecture for interconnection networks. (English)
Inf. Process. Lett. 110, No. 18-19, 821-825 (2010).
52
Intrusion detection using wavelet neural networks with genetic and Levenberg-Marquardt algorithms. (Chinese)
J. Jinan Univ., Nat. Sci. Med. Ed. 31, No. 1, 24-28 (2010).
53
Brief discussion of random simulation. (Chinese)
J. Anhui Norm. Univ., Nat. Sci. 33, No. 1, 1-4 (2010).
54
A sensing policy based on the statistical property of licensed channel in cognitive network. (English)
Int. J. Internet Protocol Technol. 5, No. 4, 219-229 (2010).
55
An authorization model for collaborative access control. (English)
J. Zhejiang Univ., Sci. C 11, No. 9, 699-717 (2010).
56
Betweenness centrality of an edge in tree-like components with finite size. (English)
J. Phys. A, Math. Theor. 43, No. 48, Article ID 485003, 13 p. (2010).
57
Single-machine scheduling problems with both deteriorating jobs and learning effects. (English)
Appl. Math. Modelling 34, No. 10, 2831-2839 (2010).
58
Finite iterative algorithms for the generalized Sylvester-conjugate matrix equation $AX+BY=E\overline{X}F+S$. (English)
Computing 89, No. 3-4, 147-170 (2010).
59
Two-stage target locating algorithm in three dimensional wsns under typical deployment schemes. (English)
Pandurangan, Gopal (ed.) et al., Wireless algorithms, systems, and applications. 5th international conference, WASA 2010, Beijing, China, August 15‒17, 2010. Proceedings. Berlin: Springer (ISBN 978-3-642-14653-4/pbk). Lecture Notes in Computer Science 6221, 172-181 (2010).
60

Result 41 to 60 of 368 total