Search

Start a new search
Current filters:
Add filters:
  • Results/Page
  • Sort items by
  • In order
  • Authors/record

Results 31-40 of 53 (Search time: 0.004 seconds).

NO Title, Author(s) (Publication Title, Volume Issue, Page, Issue Date)
31
A practitioners approach to normalizing XQuery expressions

Lee, Ki-Hoon; Kim, Seo-Young; Whang, Euijong; Lee, Jae-Gil, LECTURE NOTES IN COMPUTER SCIENCE (INCLUDING SUBSERIES LECTURE NOTES IN ARTIFICIAL INTELLIGENCE AND LECTURE NOTES IN BIOINFORMATICS), v.3882 LNCS, no.0, pp.437 - 453, 2006

32
Estimating the near-term changes of an organization with simulations

Moon, I.-C.; Carley, K.M., AAAI Fall Symposium - Technical Report, v.FS-06-05, no.0, pp.111 - 118, 2006-10

33
Multicast tree rearrangement to recover node failures in overlay multicast networks

Cho, HK; Lee, Chae Young, COMPUTERS OPERATIONS RESEARCH, v.33, no.3, pp.581 - 594, 2006-03

34
Modeling users task performance on the mobile device: PC convergence system

Yoo, Seung Hun; Yoon, Wan Chul, INTERACTING WITH COMPUTERS, v.18, no.5, pp.1084 - 1100, 2006-09

35
On stochastic decomposition in the GI/M/1 queue with single exponential vacation

Chae, Kyung-Chul; Lee, SM; Lee, HW, OPERATIONS RESEARCH LETTERS, v.34, pp.706 - 712, 2006-11

36
Scheduling single-armed cluster tools with reentrant wafer flows

Lee, HY; Lee, Tae-Eog, IEEE TRANSACTIONS ON SEMICONDUCTOR MANUFACTURING, v.19, no.2, pp.226 - 240, 2006-05

37
A classification method using a hybrid genetic algorithm combined with an adaptive procedure for the pool of ellipsoids

Lee, KK; Yoon, Wan Chul; Baek, DH, APPLIED INTELLIGENCE, v.25, pp.293 - 304, 2006-12

38
An effective DDoS attack detection and packet-filtering scheme

Jeong, S; Kim, H; Kim, Sehun, IEICE TRANSACTIONS ON COMMUNICATIONS, v.E89B, pp.2033 - 2042, 2006-07

39
Lifetime-enhancing selection of monitoring nodes for intrusion detection in mobile ad hoc networks

Kim, H; Kim, D; Kim, Sehun, AEU-INTERNATIONAL JOURNAL OF ELECTRONICS AND COMMUNICATIONS, v.60, no.3, pp.248 - 250, 2006

40
Development of a dual burn-in policy for semiconductor products based on the number of defective neighborhood chips

Tong S.H.; Yum, Bong-Jin, INTERNATIONAL JOURNAL OF RELIABILITY, QUALITY AND SAFETY ENGINEERING, v.13, no.6, pp.501 - 525, 2006-12

Discover

rss_1.0 rss_2.0 atom_1.0