Hasil Penelitian
Journal
Variant Scheme of Adaptive Tracking Control for Robot Manipulators
HUANG Chunqing
Electrics, Communication and Autocontrol Technology 29 October 2011 Download
High-Order Analytic Approximation for MOSFET Surface Potential with Lateral Channel Field Effect
CHANG Sheng,HUANG Qijun,WANG Gaofeng,WANG Hao
Electrics, Communication and Autocontrol Technology 11 October 2011 Download
A handover scheme with an adaptive triggering window mechanism in LTE-advanced systems
WANG Yu
Electrics, Communication and Autocontrol Technology 08 October 2011 Download
Verification and Validation of Simulation Models
Sargent RG
Proceeding of The 1998 Winter Simulation Conference Download
Automatic Parallelization of Divide and Conquer Algorithms
(Radu Rugina and Martin Rinard)
Laboratory for Computer Science
Massachusetts Institute of Technology
Cambridge MA …. Download
Divide and Conquer for the Solution of Banded Linear Systems of Equations
(M. Hegland)
Australian National University
Computer Sciences Laboratory
Canberra, ACT, 0200 … Download
Dividing and Conquering Long Sentences in a Translation System
(Peter F. Brown, Stephen A. Della Pietra, Vincent J. Della Pietra, Robert L. Mercer, and Surya Mohanty)
IBM Thomas J. Watson Research Center
Yorktown Heights, NY 10598 … Download
Dynamic programming algorithms for RNA secondary structure prediction with pseudoknots
(Tatsuya Akutsu)
Human Genome Center, Institute of Medical Science, University of Tokyo, 4-6-1 Shirokanedai,
Minato-ku, Tokyo 108-8639, Japan … Download
A Dynamic Programming Approach to Sequencing Problems
(Michael Held; Richard M. Karp)
Journal of the Society for Industrial and Applied Mathematics, Vol. 10, No. 1 (Mar., 1962), 196-210 … Download
Disk scheduling algorithms based on rotational position
(David M. Jacobson and John Wilkes)
Concurrent Systems Project, Palo Alto, CA Technical report HPL–CSP–91–7rev1, 26th February 1991, revised 1st March 1991.
(Issued electronically 10th May 1995) … Download
A Greedy Algorithm for Aligning DNA Sequences
(ZHENG ZHANG, SCOTT SCHWARTZ, LUKAS WAGNER, and WEBB MILLER) … Download
GPSR: Greedy Perimeter Stateless Routing for Wireless Network
(Brad Karp , Harvard University / ACIRI, and H. T. Kung, Harvard University) … Download
Greedy Algorithms for Sequential Sensing Decisions
(Hannaneh Hajishirzi, Afsaneh Shirazi, Jaesik Choi, Eyal Amir)
Computer Science Department University of Illinois at Urbana-Champaign
Urbana, IL 61801, USA … Download
Handling forecasting problems using fuzzy time series
(Jeng-Reng Hwang, Shyi-Ming Chen, Chia-Hoang Lee) … Download
Private Download
1. An Architecture for Interoperability of Embedded Systems and Virtual Reality
(By Veit Köppen, Norbert Siegmund, Michael Soffner and Gunter Saake)
Institute for Business and Technical Information Systems, Department of Computer Science, University of Magdeburg, Germany …Download
2. Provably Secure Cluster-based Group Key Agreement for Ad hoc Networks
(By Fucai Zhou, Hui Li, Jian Xu, Bing Yu)
College of Information Science and Engineering, Northeastern University, 11, Lane 3, Wenhua Road, Heping Shenyang Liaoning, China 110004, Shenyang China, Software College, Northeastern University, Mailbox 349,11, Lane 3, Wenhua Road, Heping Shenyang Liaoning, China 110004, Shenyang China …Download
3. Asserting and Checking Determinism for Multithreaded Programs
(By Jacob Burnim and Koushik Sen) …Download
4. Inside risks, risks of Undisciplined Development
(By David L. Parnas) …Download
5. Performance Evaluation and Model Checking Join Forces
(By Christel Baier, Boudewijn R. Haverkort, Holger Hermanns, and Joost-Pieter Katoen) …Download
6. Ready or not, computers are coming to the people Inventing the PC
(By Paul E. Ceruzzi) …Download
7. Security Advice; Malvertisements; and CS Education in Qatar
(By Greg Linden is the founder of geeky Ventures. Jason hong is an associate professor of computer science at Carnegie mellon University. Mark Guzdial is a professor at the georgia institute of technology) …Download
8. Situated Learning and Identity Development in a Korean Older Adults’ Computer Classroom
(By Young Sek Kim and Sharan B. Merriam) …Download
9. The Ideal HPC Programming Language
(By euGene Loh) …Download
10.x86-TSO: A Rigorous and Usable Programmer’s Model for x86 Multiprocessors
(By Peter Sewell, Susmit Sarkar, Scott Owens, Francesco Zappa nardelli, and Magnus O. Myreen) …Download
11.A Matter of Computer Time
(By Donna Celano and Susan B. Neuman) …Download
12.A Neuromorphic Approach to Computer Vision
(By Thomas Serre and Tomaso Poggio) …Download
13.Computer Graphics for All
(By Takeo Igarashi) …Download
14.Difference Engine Harnessing Memory Redundancy in Virtual Machines
(By Diwaker Gupta, Sangmin Lee, Michael Vrable, Stefan Savage, Alex C. Snoeren, George Varghese, Geoffrey M. Voelker, and Amin Vahdat) …Download
15.Memory Models A Case for Rethinking Parallel Languages and Hardware
(By Sarita V. Adve and Hans-J. Boehm) …Download
16.Plat-Forms Is there one best Web development technology
(By Lutz Prechelt) …Download
17.Reasoning About the Unknown in Static Analysis
(By Isil Dillig, Thomas Dillig, and Alex Aiken) …Download
18.WNetSim : a web-based computer network simulator
(By N. Jovanovic, R. Popovic and Z. Jovanovic)
Business School of Professional Studies, Blace, Serbia
Faculty of Informatics and Management, Singidunum University,
Faculty of Electrical Engineering, University of Belgrade, Serbia …Download
19.Certified Software
(By Zhong Shao) …Download
20.Commonsense Understanding of Concurrency Computing Students and Concert Tickets
(By Gary Lewandowski, Dennis J. Bouvier, Tzu-Yi Chen, Robert Mccartney, Kate Sanders, Beth Simon, And Tammy Vandegrift) …Download
21.Efficient Image Encryption Using a Chaos-based PWL Memristor
(By Zhaohui Lin and Hongxia Wang)
School of Information Science and Technology, Southwest Jiaotong University, Chengdu 610031, People’s Republic of China …Download
22.Native Client A Sandbox for Portable, Untrusted x86 Native Code
(By Bennet Yee, David Sehr, Gregory Dardyk, J. Bradley Chen, Robert Muth, tavis ormandy, Shiki okasaka, neha narula, and nicholas fullagar) …Download
23.Paper-based and computer-based concept mappings The effects on computer achievement, computer anxiety and computer attitude
(By Yavuz Erdogan)
Department of Computer and Instructional Technologies at Marmara University in Turkey …Download
24.QIP = PSPACE
(By Rahul Jain, Zhengfeng Ji, Sarvagya Upadhyay, and John Watrous) …Download
25.Relative Status of Journal and Conference Publications in Computer Science
(By Jill Freyne, Lorcan Coyle, Barry smyth, and Padraig Cunningham) …Download
26.SeL4 Formal Verification of an Operating-System Kernel
(By Gerwin Klein, June Andronick, Kevin Elphinstone, Gernot Heiser, David Cock, Philip Derrin, Dhammika Elkaduwe, Kai Engelhardt, Rafal Kolanski, Michael Norrish, Thomas Sewell, Harvey Tuch, and Simon Winwood) …Download
27.Seven Principles for Selecting Software Packages
(By Jan Damsgaard and Jan Karlsbjerg) …Download
28.Software Development with Code Maps
(By Robert Deline, Gina Venolia, and Kael Rowan) …Download
29.The Singularity System
(By James Larus and Galen Hunt) …Download
30.Think Big for Reuse
(By Paul D. Witman and Terry Ryan) …Download
31.Thinking Clearly About Performance, Part 2
(By Cary Millsap) …Download
32.Viewpoint Objects Never Well, Hardly Ever
(By Mordechai Ben-Ari) …Download
33.You’re Doing It Wrong
(By Poul-Henning Kamp) …Download
Facebook Andi Hasad | Photo-Photo Terkini