Showing 161 - 180 results of 28,739 for search '"computational"', query time: 0.08s Refine Results
  1. 161
  2. 162

    User-Centered Computer Aided Language Learning / by Zaphiris, Panayiotis

    Published 2006
    Subjects: “…Language and languages Computer-assisted instruction. 5677…”
    Table of contents only
    View in OPAC
    Book
  3. 163

    A simple guide to using your computer

    Published 2002
    View in OPAC
    Book
  4. 164
  5. 165

    Numerical methods of computation of singular and hypersingular integrals by I. V. Boikov

    Published 2001-01-01
    “…Therefore approximate methods of singular integrals calculation are an active developing direction of computing in mathematics. This review is devoted to the optimal with respect to accuracy algorithms of the calculation of singular integrals with fixed singularity, Cauchy and Hilbert kernels, polysingular and many-dimensional singular integrals. …”
    Get full text
    Article
  6. 166
  7. 167
  8. 168

    Hybrid data synchronization mechanism for mobile computing by Xiao-long XU, Xiao-xiao LIU

    Published 2016-08-01
    Subjects: “…mobile computing…”
    Get full text
    Article
  9. 169

    Survey on Data Center Network for Cloud Computing by Xuan Luo, Tong Ye, Yaohui Jin

    Published 2014-02-01
    “…Data center network has faced several challenges from the arising of cloud computing.Along with the continuous expansive bandwidth requirements,data center network also should provide network isolation and service guarantee for each tenant.Current researches focued on the physical network,network virtualization and service guarantee were introduced.…”
    Get full text
    Article
  10. 170
  11. 171
  12. 172

    On the Computation of the Efficient Frontier of the Portfolio Selection Problem by Clara Calvo, Carlos Ivorra, Vicente Liern

    Published 2012-01-01
    “…An easy-to-use procedure is presented for improving the ε-constraint method for computing the efficient frontier of the portfolio selection problem endowed with additional cardinality and semicontinuous variable constraints. …”
    Get full text
    Article
  13. 173

    Survey of the teaching methods of human computer interaction by Kristina Lapin

    Published 2004-12-01
    “… The paper surveys teaching methods of both sciences and engineering that are implemented in the Hu­man Computer Interaction courses. It deals with traditional lecture-based, case-based and pattern-based teaching. …”
    Get full text
    Article
  14. 174

    Password authentication scheme for mobile computing environment by LIU Jun, LIAO Jian-xin, ZHU Xiao-min, WANG Chun

    Published 2007-01-01
    “…By means of IC(integrated circuit) card,RSA cryptography,and discrete logarithm,a password authentication scheme for mobile computing environment was presented.No verification tables were preserved at the server side to consolidate the security.To be applicable for the mobile computing environment,the scheme was designed as a one-roundtrip protocol to meet the computation-constraint terminals and narrow-bandwidth radio interface.Moreover,the passwords in use could be changed by users without any interaction with servers over the radio.The performance of the scheme was measured by making use of M/G/1/N queuing model and compared with that of TLS.…”
    Get full text
    Article
  15. 175

    A Stochastic Dynamic Model of Computer Viruses by Chunming Zhang, Yun Zhao, Yingjiang Wu, Shuwen Deng

    Published 2012-01-01
    “…A stochastic computer virus spread model is proposed and its dynamic behavior is fully investigated. …”
    Get full text
    Article
  16. 176

    Fast Computation of Singular Oscillatory Fourier Transforms by Hongchao Kang, Xinping Shao

    Published 2014-01-01
    “…Based on substituting the original interval of integration by the paths of steepest descent, if f is analytic in the complex region G containing [a, b], the computation of integrals can be transformed into the problems of integrating two integrals on [0, ∞) with the integrand that does not oscillate and decays exponentially fast, which can be efficiently computed by using the generalized Gauss Laguerre quadrature rule. …”
    Get full text
    Article
  17. 177
  18. 178
  19. 179
  20. 180