Search

Your search keyword '"*SCHEME programming language"' showing total 1,496 results

Search Constraints

Start Over You searched for: Descriptor "*SCHEME programming language" Remove constraint Descriptor: "*SCHEME programming language" Language english Remove constraint Language: english
1,496 results on '"*SCHEME programming language"'

Search Results

1. Optimization of Non-Newtonian Flow through a Coat-Hanger Die Using the Adjoint Method.

2. BEYOND NOTATIONS: HYGIENIC MACRO EXPANSION FOR THEOREM PROVING LANGUAGES.

3. The Excellent Schemer.

4. Effect of User Mobility upon Trust Building among Autonomous Content Routers in an Information-Centric Network.

5. Attribute-based authentication on the cloud for thin clients.

6. Design and Control of a New Biomimetic Transfemoral Knee Prosthesis Using an Echo-Control Scheme.

7. A Constant Switching Frequency Finite-Control-Set Predictive Current Control Scheme of a Five-Phase Inverter With Duty-Ratio Optimization.

8. Protection Scheme for Modular Multilevel Converters Under Diode Open-Circuit Faults.

9. Multi-criteria decision-making on assessment of proposed tidal barrage schemes in terms of environmental impacts.

10. Fourth Order Modified Explicit Decoupled Group Scheme in the Solution of Poisson Equation.

11. EVALUATION EFFICENTLY THE PROCESS OF REFLECTION INFORMATION THREATS IN LARGE INFORMATION SYSTEM.

12. ARTIFICIALLY-NATURAL ONTOLOGY OF INTELLIGENT SYSTEMS.

13. Secure Connectivity Probability of Multi-hop Clustered Randomize-and-Forward Networks.

14. Generalized Quadrature Spatial Modulation Scheme Using Antenna Grouping.

15. Rule Schema Multi-Level for Local Patterns Analysis: Application in Production Field.

16. Searchable attribute-based encryption scheme with attribute revocation in cloud storage.

17. Inter-Session Network Coding Schemes for 1-to-2 Downlink Access-Point Networks With Sequential Hard Deadline Constraints.

18. How Much Cache is Needed to Achieve Linear Capacity Scaling in Backhaul-Limited Dense Wireless Networks?

19. An Authenticated Key Agreement Scheme using Vector Decomposition.

20. Key Authentication Scheme-based on Discrete Logarithms and Chinese Remainder Theorem.

21. Correspondence Driven Saliency Transfer.

22. An Efficient Predicate Encryption with Constant Pairing Computations and Minimum Costs.

23. TranSim: A Simulation Framework for Cache-Enabled Transparent Computing Systems.

24. Designing a Resilient L1 Cache Architecture to Process Variation-Induced Access-Time Failures.

25. An adaptive and efficient buffer management scheme for resource-constrained delay tolerant networks.

26. Oblivious routing in wireless mesh networks.

27. E2EACK: an end-to-end acknowledgment-based scheme against collusion black hole and slander attacks in MANETs.

28. LoWaNA: low overhead watermark based node authentication in WSN.

29. A social overlay-based forwarding scheme for mobile social networks.

30. An Efficient XML Data Placement Scheme over Multiple Wireless Broadcast Channels.

31. Simultaneous tuning of cascaded controller design using genetic algorithm.

32. A hierarchical scheme for outage management in multi-microgrids.

33. Adaptive nested optimization scheme for multidimensional global search.

34. A New Scheme for Network Congestion Control Based on Modified Adaptive Smith Predictor.

35. Optimized Control Scheme for Frequency/Power Regulation of Microgrid for Fault Tolerant Operation.

36. An Improved Approximation Scheme for Variable-Sized Bin Packing.

37. A Modulation Scheme for Matrix Converters With Perfect Zero Common-Mode Voltage.

38. Developments in Time-Division Multiplexing of X-ray Transition-Edge Sensors.

39. Fuzzy logic based voltage control scheme for improvement in dynamic response of the class D inverter based high frequency induction heating system.

40. Peak-to-average power ratio reduction using backtracking search optimization algorithm in OFDM systems.

41. Name spell-check framework for social networks.

42. A Lamarckian Hybrid Grouping Genetic Algorithm with repair heuristics for resource assignment in WCDMA networks.

43. Applying a sensor energy supply communication scheme to big data opportunistic networks.

44. An Efficient Dynamic Group Signature with Non-frameability.

45. Robust Key Agreement From Received Signal Strength in Stationary Wireless Networks.

46. Optimal Power Allocation and Relay Selection for Cognitive Relay Networks using Non-orthogonal Cooperative Protocol.

47. Grid based Enhanced Routing Scheme in MANET.

48. Estimation of Sparse Channels in Millimeter-Wave MU-MIMO Systems.

49. Supporting Trusted Soft Decision Scheme Using Volatility Decay in Cooperative Spectrum Sensing.

50. Proactive Demand Participation of Smart Buildings in Smart Grid.

Catalog

Books, media, physical & digital resources