Displaying works 161 - 180 of 182 in total
Sorted by most recent date added to the index first, which may not be the same as publication date order.
2009 journal article
Visualization and analysis of microstructure in three-dimensional discrete numerical models
Journal of Computing in Civil Engineering, 23(5), 277โ287.
2009 journal article
Unsupervised assessment of microarray data quality using a Gaussian mixture model
BMC BIOINFORMATICS, 10.
2009 article
Push-Assisted Migration of Real-Time Tasks in Multi-Core Processors
Sarkar, A., Mueller, F., Ramaprasad, H., & Mohan, S. (2009, July). ACM SIGPLAN NOTICES, Vol. 44, pp. 80โ89.
2009 journal article
Coupling winds to ocean surface currents over the global ocean
OCEAN MODELLING, 29(4), 261โ268.
2009 journal article
Requirements-based Access Control Analysis and Policy Specification (ReCAPS)
INFORMATION AND SOFTWARE TECHNOLOGY, 51(6), 993โ1009.
2009 journal article
A tangible user interface for assessing cognitive mapping ability
INTERNATIONAL JOURNAL OF HUMAN-COMPUTER STUDIES, 67(3), 269โ278.
2009 journal article
A scalable, parallel algorithm for maximal clique enumeration
JOURNAL OF PARALLEL AND DISTRIBUTED COMPUTING, 69(4), 417โ428.
2009 journal article
A Shearlet Approach to Edge Analysis and Detection
IEEE TRANSACTIONS ON IMAGE PROCESSING, 18(5), 929โ941.
2009 journal article
Nonstationary analysis of the loss queue and of queueing networks of loss queues
EUROPEAN JOURNAL OF OPERATIONAL RESEARCH, 196(3), 1015โ1030.
2009 journal article
Stochastic convex ordering for multiplicative decrease internet congestion control
COMPUTER NETWORKS, 53(3), 365โ381.
2009 journal article
Query optimization using restructured views: Theory and experiments
INFORMATION SYSTEMS, 34(3), 353โ370.
2009 journal article
Optical burst switching
IET Communications, 3(3), 331โ333.
2009 journal article
On the departure process of burst aggregation algorithms in optical burst switching
COMPUTER NETWORKS, 53(3), 247โ264.
2009 journal article
Measuring Capacity Bandwidth of Targeted Path Segments
IEEE-ACM TRANSACTIONS ON NETWORKING, 17(1), 80โ92.
2009 article
Denial of service attacks and defenses in decentralized trust management
Li, J., Li, N., Wang, X. F., & Yu, T. (2009, April). INTERNATIONAL JOURNAL OF INFORMATION SECURITY, Vol. 8, pp. 89โ101.
2009 journal article
Burst lost probabilities in a queuing network with simultaneous resource possession: a single-node decomposition approach
IET Communications, 3(3), 441โ453.
2009 journal article
Particle Swarm Optimization for Sorted Adapted Gaussian Mixture Models
IEEE TRANSACTIONS ON AUDIO SPEECH AND LANGUAGE PROCESSING, 17(2), 344โ353.
2009 journal article
On automated prepared statement generation to remove SQL injection vulnerabilities
INFORMATION AND SOFTWARE TECHNOLOGY, 51(3), 589โ598.
2009 journal article
Identification of protein-coding sequences using the hybridization of 18S rRNA and mRNA during translation
NUCLEIC ACIDS RESEARCH, 37(2), 591โ601.
2009 journal article
Evaluation of call blocking probabilities in LEO satellite networks
INTERNATIONAL JOURNAL OF SATELLITE COMMUNICATIONS AND NETWORKING, 27(2), 103โ115.