Suchergebnisse - theory of computation → constraint AND login programming phrases large-scale scheduling problems~
-
1
Principled Schedulability Analysis for Distributed Storage Systems Using Thread Architecture Models.
Autoren: et al.
Quelle: ACM Transactions on Storage; May2023, Vol. 19 Issue 2, p1-47, 47p
-
2
Autoren: et al.
Quelle: PLoS ONE; 10/14/2025, Vol. 20 Issue 10, p1-27, 27p
Schlagwörter: MULTI-objective optimization, OPTIMIZATION algorithms, PROBLEM solving
-
3
Autoren:
Quelle: Scientific Reports; 12/3/2025, Vol. 15 Issue 1, p1-32, 32p
-
4
Autoren: et al.
Quelle: Cluster Computing; Oct2023, Vol. 26 Issue 5, p2519-2537, 19p
-
5
Autoren:
Quelle: PLoS ONE; 2/3/2025, Vol. 20 Issue 1, p1-41, 41p
Schlagwörter: ELDER care, OLDER people, POPULATION aging, SATISFACTION, ABSTRACTING & indexing services
-
6
Autoren:
Quelle: International Scientific Journal of Engineering & Management; Apr2025, Vol. 4 Issue 4, p1-2, 2002p
Schlagwörter: PATIENT monitoring, EARLY diagnosis, ACQUISITION of data, DATA transmission systems, DIAGNOSIS
-
7
Autoren: Alnanih, Reem Abdulaziz
Quelle: International Journal of Advanced Computer Science & Applications; Oct2024, Vol. 15 Issue 10, p613-622, 510p
-
8
Autoren: et al.
Quelle: ACM Transactions on Intelligent Systems & Technology; Feb2025, Vol. 16 Issue 1, p1-54, 54p
Schlagwörter: TRUST, RESEARCH personnel, FAIRNESS, EMPLOYERS, AUTOMATION
-
9
Autoren:
Quelle: Advances in Science & Technology Research Journal; 2025, Vol. 19 Issue 2, p127-135, 209p
-
10
Quelle: Innovation in Aging; 2024 Supplement, Vol. 8, p1-1377, 1377p
-
11
Autoren:
Quelle: Frontiers in Health Informatics; 2024, Vol. 13 Issue 8, p5334-5342, 9p
Schlagwörter: DIGITAL forensics, CRIMINAL investigation, DATA recovery, CORPORATE governance, CYBERTERRORISM
-
12
Quelle: Quality of Life Research; 2024 Suppl 1, Vol. 33, p1-235, 235p
-
13
Autoren: et al.
Quelle: ACM Transactions on Multimedia Computing, Communications & Applications; 2023 Suppl 3, Vol. 19, p1-27, 27p
Schlagwörter: DNA, DNA sequencing, SAMPLE size (Statistics), CYBERTERRORISM
-
14
Autoren: et al.
Quelle: ACM Computing Surveys; Mar2024, Vol. 56 Issue 3, p1-37, 37p
-
15
-
16
Autoren:
Quelle: Security & Privacy; Nov2023, Vol. 6 Issue 6, p1-37, 37p
Schlagwörter: INTERNET of things, INTERNET security, 5G networks, DISRUPTIVE innovations, WEARABLE technology
-
17
Autoren: Almalki, Jameel
Quelle: Arabian Journal for Science & Engineering (Springer Science & Business Media B.V. ); Mar2024, Vol. 49 Issue 3, p3163-3191, 29p
Schlagwörter: BLOCKCHAINS, SOFTWARE engineering, TELEMEDICINE
-
18
Autoren:
Quelle: International Journal of Communication (19328036); 2024, Vol. 18, p3945-3959, 15p
Schlagwörter: COVID-19 pandemic, JOURNALISTS, SOCIAL media, PROFESSIONALISM, JOURNALISM
-
19
Autoren: et al.
Quelle: EAI Endorsed Transactions on Internet of Things; 2024, Vol. 10, p1-6, 552p
Schlagwörter: HYBRID systems, SMARTPHONES, RECOMMENDER systems, MOBILE learning, MACHINE learning
-
20
Quelle: Journal of the Mississippi Academy of Sciences; Jan2024, Vol. 69 Issue 1, p1-234, 234p
Full Text Finder
Nájsť tento článok vo Web of Science