Digital Library
Close Browse articles from a journal
     Journal description
       All volumes of the corresponding journal
         All issues of the corresponding volume
                                       All articles of the corresponding issues
 
                             23 results found
no title author magazine year volume issue page(s) type
1 A taxonomy for region queries in spatial databases Taniar, David
2015
81 8 p. 1508-1531
24 p.
article
2 Authorship verification of e-mail and tweet messages applied for continuous authentication Brocardo, Marcelo Luiz
2015
81 8 p. 1429-1440
12 p.
article
3 Contents 2015
81 8 p. OBC-
1 p.
article
4 Editorial Board 2015
81 8 p. IFC-
1 p.
article
5 Equivalence and generalization in a layered network model Fortune, Steven
2015
81 8 p. 1698-1714
17 p.
article
6 From-below approximations in Boolean matrix factorization: Geometry and new algorithm Belohlavek, Radim
2015
81 8 p. 1678-1697
20 p.
article
7 Hardness of conjugacy, embedding and factorization of multidimensional subshifts Jeandel, Emmanuel
2015
81 8 p. 1648-1664
17 p.
article
8 Incentive-based resource assignment and regulation for collaborative cloud services in community networks Khan, Amin M.
2015
81 8 p. 1479-1495
17 p.
article
9 Journal of Computer and System Sciences Special Issue on Reliability and Optimization for Wireless Networking and Cloud Computing Enokido, Tomoya
2015
81 8 p. 1415-1416
2 p.
article
10 Length of polynomials over finite groups Horváth, Gábor
2015
81 8 p. 1614-1622
9 p.
article
11 μ-Limit sets of cellular automata from a computational complexity perspective Boyer, L.
2015
81 8 p. 1623-1647
25 p.
article
12 Modeling energy-efficient secure communications in multi-mode wireless mobile devices Castiglione, Arcangelo
2015
81 8 p. 1464-1478
15 p.
article
13 New inapproximability bounds for TSP Karpinski, Marek
2015
81 8 p. 1665-1677
13 p.
article
14 Node placement for wireless mesh networks: Analysis of WMN-GA system simulation results for different parameters and distributions Barolli, Admir
2015
81 8 p. 1496-1507
12 p.
article
15 Normality and automata Becher, Verónica
2015
81 8 p. 1592-1613
22 p.
article
16 Pancake Flipping is hard Bulteau, Laurent
2015
81 8 p. 1556-1574
19 p.
article
17 Read-abortion (RA) based synchronization protocols to prevent illegal information flow Nakamura, Shigenari
2015
81 8 p. 1441-1451
11 p.
article
18 SAFIR: Secure access framework for IoT-enabled services on smart buildings Hernández-Ramos, José L.
2015
81 8 p. 1452-1463
12 p.
article
19 Secure deduplication storage systems supporting keyword search Li, Jin
2015
81 8 p. 1532-1541
10 p.
article
20 Solovay functions and their applications in algorithmic randomness Bienvenu, Laurent
2015
81 8 p. 1575-1591
17 p.
article
21 Solving mesh router nodes placement problem in Wireless Mesh Networks by Tabu Search algorithm Xhafa, Fatos
2015
81 8 p. 1417-1428
12 p.
article
22 Task partitioning and priority assignment for distributed hard real-time systems Garibay-Martínez, Ricardo
2015
81 8 p. 1542-1555
14 p.
article
23 The complexity of minimum-length path decompositions Dereniowski, Dariusz
2015
81 8 p. 1715-1747
33 p.
article
                             23 results found
 
 Koninklijke Bibliotheek - National Library of the Netherlands