Sort by:
Publication Type:
Open access:
Publication Date:
Periodicals:
Search results
Online since: August 2011
Authors: Wei Hua Li, Wei Jia Li, Yuan Yang, Hai Qiang Liao, Ji Long Li, Xi Peng Zheng
., On the performance of artificial bee colony (ABC) algorithm, Applied Soft Computing, 8, 2008, 687 - 697
[18] Wong L.
P., Low, M.Y.H. and Chong, C.S., A bee colony optimization algorithm for traveling salesman problem, in Proceedings of Second Asia International Conference on Modeling and Simulation, 2008, 818-823.
[18] Wong L.
P., Low, M.Y.H. and Chong, C.S., A bee colony optimization algorithm for traveling salesman problem, in Proceedings of Second Asia International Conference on Modeling and Simulation, 2008, 818-823.
Online since: August 2013
Authors: Rui Wang, Yu Guang Xie, Kai Xie, Ya Qiao Luo
Li, “Security-constrained unit commitment with volatile wind power generation,” IEEE Trans. on Power Systems, Vol.23, No.3, pp.1319-1327, Aug. 2008
Gooi, et al., “Fuzzy MILP unit commitment incorporating wind generators,” IEEE Trans. on Power System, Vol.23, No.4, pp.1738-1327, Nov. 2008
Wong, et al., “Probabilistic load flow evaluation with hybrid Latin hypercube sampling and Cholesky decomposition,” IEEE Trans. on Power Systems, Vol. 24, No. 2, pp. 661-667, May. 2009
Gooi, et al., “Fuzzy MILP unit commitment incorporating wind generators,” IEEE Trans. on Power System, Vol.23, No.4, pp.1738-1327, Nov. 2008
Wong, et al., “Probabilistic load flow evaluation with hybrid Latin hypercube sampling and Cholesky decomposition,” IEEE Trans. on Power Systems, Vol. 24, No. 2, pp. 661-667, May. 2009
Online since: May 2012
Authors: Li Ming Xia, Long Zhang
[3] Jing Zhang, Yanping Yang: China Management Informationization, 2008(23), p.84-87, In Chinese
[5] Chen Yan, Cheng Hu, Liu Jing, Dai Hongjun: Journal of Southeast University (English Edition), 2008(4)
[11] Lai V.S., Wong B.K., Cheung W.: European Journal of Operational Research, 2002, 137(1)
[5] Chen Yan, Cheng Hu, Liu Jing, Dai Hongjun: Journal of Southeast University (English Edition), 2008(4)
[11] Lai V.S., Wong B.K., Cheung W.: European Journal of Operational Research, 2002, 137(1)
Online since: September 2012
Authors: Bin Yu, Zheng Xin Fu
Chen, Colored visual cryptography scheme based on additive color mixing, Pattern Recognition, 41 (2008) 3114-3129
Wong, On the security of a visual cryptography scheme for color images, Pattern Recognition, 42 (2009) 929-940
Tsaic, Visual secret sharing for multiple secrets, Pattern Recog- nition, 41 (2008) 3572-3581.
Wong, On the security of a visual cryptography scheme for color images, Pattern Recognition, 42 (2009) 929-940
Tsaic, Visual secret sharing for multiple secrets, Pattern Recog- nition, 41 (2008) 3572-3581.
Online since: November 2012
Authors: Yong Hui Zhang, Zhang Xi Lin, Li Wen Chen, Quan Liang
Communications magazine, IEEE. 46(2008) 31-40
[8] Ahmadi, S., An overview of next-generation mobile WiMAX technology.
IEEE Personal Communications. 7(2000) 42-49 [13] Solouk, V., Ali, B.M., Khatun, S., Wong, K.D., Mahdi, M.A., Layer-2 Protocol Adaptation Method to Improve Fast Handoff for Mobile IPv6 Vertical Handoffs.
[34] Demmer, M., Ott, J., Delay Tolerant Networking TCP Convergence Layer Protocol [S]. work in progress as an internetdraft, draft-irtf-dtnrg-tcp-clayer-02. 2008
IEEE Personal Communications. 7(2000) 42-49 [13] Solouk, V., Ali, B.M., Khatun, S., Wong, K.D., Mahdi, M.A., Layer-2 Protocol Adaptation Method to Improve Fast Handoff for Mobile IPv6 Vertical Handoffs.
[34] Demmer, M., Ott, J., Delay Tolerant Networking TCP Convergence Layer Protocol [S]. work in progress as an internetdraft, draft-irtf-dtnrg-tcp-clayer-02. 2008