The authors discuss applications of BTDH (bottom-up top-down duplication heuristic) to list scheduling algorithms (LSAs). There are two ways to use BTDH for LSAs. BTDH can be …
W Ying, S Dayong - Expert Systems with Applications, 2005 - Elsevier
In an e-commerce environment, the third party logistics (3PL) takes charge of the logistics design, delivery, storage and transportation in a supply chain with its professional and …
M Wei, K Kim - Journal of Communications and Networks, 2012 - ieeexplore.ieee.org
Detecting intrusion attacks accurately and rapidly in wireless networks is one of the most challenging security problems. Intrusion attacks of various types can be detected by the …