Vyzkoušejte nový nástroj s podporou AI
Summon Research Assistant
BETA
Loading…
Service discovery method based on two-step clustering
He, Jia-Jing, Wang, Jin-Dong, Wang, Na, Niu, Kan
Published in 2015 4th International Conference on Computer Science and Network Technology (ICCSNT) (01.12.2015)
Published in 2015 4th International Conference on Computer Science and Network Technology (ICCSNT) (01.12.2015)
Get full text
Conference Proceeding
Loading…
New approach for solving economic load dispatch problem
Gherbi, Yamina Ahlem, Bouzeboudja, Hamid, Lakdja, Fatiha, Gherbi, Fatima Zohra, Ould-Abdeslam, Djaffar
Published in 2014 International Conference on Electrical Sciences and Technologies in Maghreb (CISTEM) (01.11.2014)
Published in 2014 International Conference on Electrical Sciences and Technologies in Maghreb (CISTEM) (01.11.2014)
Get full text
Conference Proceeding
Loading…
Bi-objective Operating Theater scheduling case of the paediatric hospital of Oran
Dekhici, Latifa, Belkadi, Khaled
Published in 2014 International Conference on Logistics Operations Management (01.06.2014)
Published in 2014 International Conference on Logistics Operations Management (01.06.2014)
Get full text
Conference Proceeding
Loading…
Simultaneous localization and mapping using swarm intelligence based methods
Nedjah, Nadia, Macedo Mourelle, Luiza, Albuquerque de Oliveira, Pedro Jorge
Published in Expert systems with applications (30.11.2020)
Published in Expert systems with applications (30.11.2020)
Get full text
Journal Article
Loading…
Loading…
Loading…
Firefly swarm intelligence based cooperative localization and automatic clustering for indoor FANETs
Chen, Siji, Jiang, Bo, Pang, Tao, Xu, Hong, Gao, Mingke, Ding, Yan, Wang, Xin
Published in PloS one (30.03.2023)
Published in PloS one (30.03.2023)
Get full text
Journal Article
Loading…
Loading…
MLDA: a multi-level k-degree anonymity scheme on directed social network graphs
Hao, Yuanjing, Li, Long, Chang, Liang, Gu, Tianlong
Published in Frontiers of Computer Science (01.04.2024)
Published in Frontiers of Computer Science (01.04.2024)
Get full text
Journal Article
Loading…
Loading…
Loading…
Loading…
Loading…
Loading…
Loading…
Loading…