Journal

Variant Scheme of Adaptive Tracking Control for Robot Manipulators
HUANG Chunqing
Electrics, Communication and Autocontrol Technology 29 October 2011 Download

High-Order Analytic Approximation for MOSFET Surface Potential with Lateral Channel Field Effect
CHANG Sheng,HUANG Qijun,WANG Gaofeng,WANG Hao
Electrics, Communication and Autocontrol Technology 11 October 2011 Download

A handover scheme with an adaptive triggering window mechanism in LTE-advanced systems
WANG Yu
Electrics, Communication and Autocontrol Technology 08 October 2011 Download

Verification and Validation of Simulation Models
Sargent RG
Proceeding of The 1998 Winter Simulation Conference Download

Automatic Parallelization of Divide and Conquer Algorithms
(Radu Rugina and Martin Rinard)
Laboratory for Computer Science
Massachusetts Institute of Technology
Cambridge  MA ….  Download

Divide and Conquer for the Solution of Banded Linear Systems of Equations
(M. Hegland)
Australian National University
Computer Sciences Laboratory
Canberra, ACT, 0200 … Download

Dividing and Conquering Long Sentences in a Translation System
(Peter F. Brown, Stephen A. Della Pietra, Vincent J. Della Pietra, Robert L. Mercer, and Surya Mohanty)
IBM Thomas J. Watson Research Center
Yorktown Heights, NY 10598 … Download

Dynamic programming algorithms for RNA secondary structure prediction with pseudoknots
(Tatsuya Akutsu)
Human Genome Center, Institute of Medical Science, University of Tokyo, 4-6-1 Shirokanedai,
Minato-ku, Tokyo 108-8639, Japan … Download

A Dynamic Programming Approach to Sequencing Problems
(Michael Held; Richard M. Karp)
Journal of the Society for Industrial and Applied Mathematics, Vol. 10, No. 1 (Mar., 1962), 196-210 …  Download

Disk scheduling algorithms based on rotational position
(David M. Jacobson and John Wilkes)
Concurrent Systems Project, Palo Alto, CA Technical report HPL–CSP–91–7rev1, 26th February 1991, revised 1st March 1991.
(Issued electronically 10th May 1995) … Download

A Greedy Algorithm for Aligning DNA Sequences
(ZHENG ZHANG, SCOTT SCHWARTZ, LUKAS WAGNER, and WEBB MILLER) …  Download

GPSR: Greedy Perimeter Stateless Routing for Wireless Network
(Brad Karp , Harvard University / ACIRI, and H. T. Kung, Harvard University) … Download

Greedy Algorithms for Sequential Sensing Decisions
(Hannaneh Hajishirzi, Afsaneh Shirazi, Jaesik Choi, Eyal Amir)
Computer Science Department University of Illinois at Urbana-Champaign
Urbana, IL 61801, USA … Download

Handling forecasting problems using fuzzy time series
(Jeng-Reng Hwang, Shyi-Ming Chen, Chia-Hoang Lee) … Download

Private Download

1. An Architecture for Interoperability of Embedded Systems and Virtual Reality
(By Veit Köppen, Norbert Siegmund, Michael Soffner and Gunter Saake)
Institute for Business and Technical Information Systems, Department of Computer Science, University of Magdeburg, Germany …Download

2. Provably Secure Cluster-based Group Key Agreement for Ad hoc Networks

(By Fucai Zhou, Hui Li, Jian Xu, Bing Yu)
College of Information Science and Engineering, Northeastern University, 11, Lane 3, Wenhua Road, Heping Shenyang Liaoning, China 110004, Shenyang China, Software College, Northeastern University, Mailbox 349,11, Lane 3, Wenhua Road, Heping Shenyang Liaoning, China 110004, Shenyang China …Download

3. Asserting and Checking Determinism for Multithreaded Programs

(By Jacob Burnim and Koushik Sen) …Download

4. Inside risks, risks of Undisciplined Development

(By David L. Parnas) …Download

5. Performance Evaluation and Model Checking Join Forces

(By Christel Baier, Boudewijn R. Haverkort, Holger Hermanns, and Joost-Pieter Katoen) …Download

6. Ready or not, computers are coming to the people Inventing the PC

(By Paul E. Ceruzzi) …Download

7. Security Advice; Malvertisements; and CS Education in Qatar

(By Greg Linden is the founder of geeky Ventures. Jason hong is an associate professor of computer science at Carnegie mellon University. Mark Guzdial is a professor at the georgia institute of technology) …Download

8. Situated Learning and Identity Development in a Korean Older Adults’ Computer Classroom
(By Young Sek Kim and Sharan B. Merriam) …Download

9. The Ideal HPC Programming Language

(By euGene Loh) …Download

10.x86-TSO: A Rigorous and Usable Programmer’s Model for x86 Multiprocessors

(By Peter Sewell, Susmit Sarkar, Scott Owens, Francesco Zappa nardelli, and Magnus O. Myreen) …Download

11.A Matter of Computer Time

(By Donna Celano and Susan B. Neuman) …Download

12.A Neuromorphic Approach to Computer Vision

(By Thomas Serre and Tomaso Poggio) …Download

13.Computer Graphics for All

(By Takeo Igarashi) …Download

14.Difference Engine Harnessing Memory Redundancy in Virtual Machines

(By  Diwaker Gupta, Sangmin Lee, Michael Vrable, Stefan Savage, Alex C. Snoeren, George Varghese, Geoffrey M. Voelker, and Amin Vahdat) …Download

15.Memory Models A Case for Rethinking Parallel Languages and Hardware

(By  Sarita V. Adve and Hans-J. Boehm) …Download

16.Plat-Forms Is there one best Web development technology

(By  Lutz Prechelt) …Download

17.Reasoning About the Unknown in Static Analysis
(By Isil Dillig, Thomas Dillig, and Alex Aiken) …Download

18.WNetSim : a web-based computer network simulator
(By N. Jovanovic, R. Popovic and Z. Jovanovic)
Business School of Professional Studies, Blace, Serbia
Faculty of Informatics and Management, Singidunum University,
Faculty of Electrical Engineering, University of Belgrade, Serbia …Download

19.Certified Software
(By Zhong Shao) …Download

20.Commonsense Understanding of Concurrency Computing Students and Concert Tickets
(By Gary Lewandowski, Dennis J. Bouvier, Tzu-Yi Chen, Robert Mccartney, Kate Sanders, Beth Simon, And Tammy Vandegrift) …Download

21.Efficient Image Encryption Using a Chaos-based PWL Memristor
(By Zhaohui Lin and Hongxia Wang)
School of Information Science and Technology, Southwest Jiaotong University, Chengdu 610031, People’s Republic of China …Download

22.Native Client A Sandbox for Portable, Untrusted x86 Native Code
(By Bennet Yee, David Sehr, Gregory Dardyk, J. Bradley Chen, Robert Muth, tavis ormandy, Shiki okasaka, neha narula, and nicholas fullagar) …Download

23.Paper-based and computer-based concept mappings The effects on computer achievement, computer anxiety and computer attitude
(By Yavuz Erdogan)
Department of Computer and Instructional Technologies at Marmara University in Turkey …Download

24.QIP = PSPACE
(By Rahul Jain, Zhengfeng Ji, Sarvagya Upadhyay, and John Watrous) …Download

25.Relative Status of Journal and Conference Publications in Computer Science
(By Jill Freyne, Lorcan Coyle, Barry smyth, and Padraig Cunningham) …Download

26.SeL4 Formal Verification of an Operating-System Kernel
(By Gerwin Klein, June Andronick, Kevin Elphinstone, Gernot Heiser, David Cock, Philip Derrin, Dhammika Elkaduwe, Kai Engelhardt, Rafal Kolanski, Michael Norrish, Thomas Sewell, Harvey Tuch, and Simon Winwood) …Download

27.Seven Principles for Selecting Software Packages
(By Jan Damsgaard and Jan Karlsbjerg) …Download

28.Software Development with Code Maps
(By Robert Deline, Gina Venolia, and Kael Rowan) …Download

29.The Singularity System
(By James Larus and Galen Hunt) …Download

30.Think Big for Reuse
(By Paul D. Witman and Terry Ryan) …Download

31.Thinking Clearly About Performance, Part 2
(By Cary Millsap) …Download

32.Viewpoint Objects Never Well, Hardly Ever
(By Mordechai Ben-Ari) …Download

33.You’re Doing It Wrong
(By Poul-Henning Kamp) …Download

Facebook Andi Hasad | Photo-Photo Terkini


4 respons untuk ‘Journal

  1. hi to all andihasad.wordpress.comers this is my frst post and thought i would say a big hello to yous –
    regards speak again soon
    gazza

Tinggalkan Balasan

Isikan data di bawah atau klik salah satu ikon untuk log in:

Logo WordPress.com

You are commenting using your WordPress.com account. Logout /  Ubah )

Foto Facebook

You are commenting using your Facebook account. Logout /  Ubah )

Connecting to %s