Digitale Bibliotheek
Sluiten Bladeren door artikelen uit een tijdschrift
     Tijdschrift beschrijving
       Alle jaargangen van het bijbehorende tijdschrift
         Alle afleveringen van het bijbehorende jaargang
                                       Alle artikelen van de bijbehorende aflevering
 
                             145 gevonden resultaten
nr titel auteur tijdschrift jaar jaarg. afl. pagina('s) type
1 A brief survey on probability distribution approximation Melucci, Massimo
2019
15-16 C p. 91-97
artikel
2 A comparative review of Urdu stemmers: Approaches and challenges Jabbar, Abdul

15-16 C p.
artikel
3 A comparative study on popular MAC protocols for mixed Wireless Sensor Networks: From implementation viewpoint Maitra, Tanmoy
2016
15-16 C p. 107-134
28 p.
artikel
4 A comprehensive taxonomy of schemes to detect and mitigate blackhole attack and its variants in MANETs Khanna, Nitin
2019
15-16 C p. 24-44
artikel
5 Aeronautical communication transition from analog to digital data: A network security survey Ben Mahmoud, Mohamed Slim
2014
15-16 C p. 1-29
29 p.
artikel
6 Agent Based Modelling and Simulation tools: A review of the state-of-art software Abar, Sameera
2017
15-16 C p. 13-33
21 p.
artikel
7 An annotated bibliography on 1-planarity Kobourov, Stephen G.
2017
15-16 C p. 49-67
19 p.
artikel
8 An overview of self-adaptive technologies within virtual reality training Vaughan, Neil
2016
15-16 C p. 65-87
23 p.
artikel
9 Application of deep learning for retinal image analysis: A review Badar, Maryam

15-16 C p.
artikel
10 Approximation and online algorithms for multidimensional bin packing: A survey Christensen, Henrik I.
2017
15-16 C p. 63-79
17 p.
artikel
11 A PRISMA-compliant systematic review and analysis on color image encryption using DNA properties Sokouti, Massoud
2018
15-16 C p. 14-20
artikel
12 A recent review of conventional vs. automated cybersecurity anti-phishing techniques Qabajeh, Issa
2018
15-16 C p. 44-55
artikel
13 A review of attack graph and attack tree visual syntax in cyber security Lallie, Harjinder Singh

15-16 C p.
artikel
14 A review of using object-orientation properties of C++ for designing expert system in strategic planning Ahmadi, Mohsen

15-16 C p.
artikel
15 A state-of-the-art review of FMEA/FMECA including patents Spreafico, Christian
2017
15-16 C p. 19-28
10 p.
artikel
16 A still simpler way of introducing interior-point method for linear programming Mehlhorn, Kurt
2016
15-16 C p. 1-11
11 p.
artikel
17 A survey of active learning in collaborative filtering recommender systems Elahi, Mehdi
2016
15-16 C p. 29-50
22 p.
artikel
18 A survey of identifier–locator split addressing architectures Komu, Miika
2015
15-16 C p. 25-42
18 p.
artikel
19 A survey of memory management techniques in virtualized systems Mishra, Debadatta
2018
15-16 C p. 56-73
artikel
20 A survey of safety and trustworthiness of deep neural networks: Verification, testing, adversarial attack and defence, and interpretability Huang, Xiaowei

15-16 C p.
artikel
21 A survey of timed automata for the development of real-time systems Waez, Md Tawhid Bin
2013
15-16 C p. 1-26
26 p.
artikel
22 A survey on design and implementation of protected searchable data in the cloud Dowsley, Rafael
2017
15-16 C p. 17-30
artikel
23 A survey on essential components of a self-sovereign identity Mühle, Alexander
2018
15-16 C p. 80-86
artikel
24 A Survey on malware analysis and mitigation techniques Sibi Chakkaravarthy, S.
2019
15-16 C p. 1-23
artikel
25 A survey on mobile affective computing Politou, Eugenia
2017
15-16 C p. 79-100
22 p.
artikel
26 A survey on parallel and distributed multi-agent systems for high performance computing simulations Rousset, Alban
2016
15-16 C p. 27-46
20 p.
artikel
27 A survey on privacy in decentralized online social networks De Salve, Andrea
2018
15-16 C p. 154-176
artikel
28 A Survey on quantum computing technology Gyongyosi, Laszlo
2019
15-16 C p. 51-71
artikel
29 A survey on socio-semantic information retrieval Schoefegger, Karin
2013
15-16 C p. 25-46
22 p.
artikel
30 A survey on the usability and practical applications of Graphical Security Models Hong, Jin B.
2017
15-16 C p. 1-16
artikel
31 A survey on tree matching and XML retrieval Tahraoui, Mohammed Amin
2013
15-16 C p. 1-23
23 p.
artikel
32 A systematic mapping study of API usability evaluation methods Rauf, Irum
2019
15-16 C p. 49-68
artikel
33 A systematic mapping study of clone visualization Hammad, Muhammad

15-16 C p.
artikel
34 A taxonomy and survey of attacks against machine learning Pitropakis, Nikolaos

15-16 C p.
artikel
35 Attention to news and its dissemination on Twitter: A survey Orellana-Rodriguez, Claudia
2018
15-16 C p. 74-94
artikel
36 Automated knowledge base management: A survey Martinez-Gil, Jorge
2015
15-16 C p. 1-9
9 p.
artikel
37 Background subtraction in real applications: Challenges, current models and future directions Garcia-Garcia, Belmar

15-16 C p.
artikel
38 Big networks: A survey Bedru, Hayat Dino

15-16 C p.
artikel
39 Caching methodologies in Content centric networking (CCN): A survey Lal, Nidhi
2019
15-16 C p. 39-50
artikel
40 Catastrophic event phenomena in communication networks: A survey Dabrowski, Christopher
2015
15-16 C p. 10-45
36 p.
artikel
41 Change point detection in social networks—Critical review with experiments Kendrick, Lucy
2018
15-16 C p. 1-13
artikel
42 Characterizing DDoS attacks and flash events: Review, research gaps and future directions Behal, Sunny
2017
15-16 C p. 101-114
14 p.
artikel
43 Citations, research topics and active countries in software engineering: A bibliometrics study Garousi, Vahid
2016
15-16 C p. 56-77
22 p.
artikel
44 Cluster ensembles: A survey of approaches with recent extensions and applications Boongoen, Tossapon
2018
15-16 C p. 1-25
artikel
45 Combining UML and ontology: An exploratory survey Mejhed Mkhinini, Meriem

15-16 C p.
artikel
46 Community detection in node-attributed social networks: A survey Chunaev, Petr

15-16 C p.
artikel
47 Comparative study for 8 computational intelligence algorithms for human identification Abdulrahman, Shaymaa Adnan

15-16 C p.
artikel
48 Conjunctive and Boolean grammars: The true general case of the context-free grammars Okhotin, Alexander
2013
15-16 C p. 27-59
33 p.
artikel
49 Context Aware Recommendation Systems: A review of the state of the art techniques Kulkarni, Saurabh

15-16 C p.
artikel
50 Conversational agents in business: A systematic literature review and future research directions Bavaresco, Rodrigo

15-16 C p.
artikel
51 Corrigendum to “Catastrophic event phenomena in communication networks: A survey” [Comput. Sci. Rev. 18 (2015) 10–45] Dabrowski, Christopher
2016
15-16 C p. 51-
1 p.
artikel
52 Crowdsourcing: A taxonomy and systematic mapping study Hosseini, Mahmood
2015
15-16 C p. 43-69
27 p.
artikel
53 Current status and key issues in image steganography: A survey Subhedar, Mansi S.
2014
15-16 C p. 95-113
19 p.
artikel
54 Current trends in consumption of multimedia content using online streaming platforms: A user-centric survey Falkowski-Gilski, Przemysław

15-16 C p.
artikel
55 Cyber-insurance survey Marotta, Angelica
2017
15-16 C p. 35-61
27 p.
artikel
56 DAG-based attack and defense modeling: Don’t miss the forest for the attack trees Kordy, Barbara
2014
15-16 C p. 1-38
38 p.
artikel
57 Data Mining and Information Retrieval in the 21st century: A bibliographic review Liu, Jiaying

15-16 C p.
artikel
58 Data mining of social networks represented as graphs Nettleton, David F.
2013
15-16 C p. 1-34
34 p.
artikel
59 Decomposition into low-rank plus additive matrices for background/foreground separation: A review for a comparative evaluation with a large-scale dataset Bouwmans, Thierry
2017
15-16 C p. 1-71
71 p.
artikel
60 Detection and mitigation of DDoS attacks in SDN: A comprehensive review, research challenges and future directions Singh, Jagdeep

15-16 C p.
artikel
61 Development of improved whale optimization-based FCM clustering for image watermarking Soppari, Kavitha

15-16 C p.
artikel
62 Digital watermarking: Applicability for developing trust in medical imaging workflows state of the art review Qasim, Asaad F.
2018
15-16 C p. 45-60
artikel
63 Distributed virtual machine consolidation: A systematic mapping study Ashraf, Adnan
2018
15-16 C p. 118-130
artikel
64 Editorial Board 2018
15-16 C p. ii
artikel
65 Editorial Board 2019
15-16 C p. ii
artikel
66 Editorial Board 2018
15-16 C p. ii
artikel
67 Editorial Board 2019
15-16 C p. ii
artikel
68 Editorial Board 2019
15-16 C p. ii
artikel
69 Editorial Board
15-16 C p.
artikel
70 Editorial Board
15-16 C p.
artikel
71 Editorial Board 2017
15-16 C p. IFC-
1 p.
artikel
72 Editorial Board 2018
15-16 C p. ii
artikel
73 Editorial Board 2017
15-16 C p. IFC
artikel
74 Editorial Board 2018
15-16 C p. ii
artikel
75 Editorial Board
15-16 C p.
artikel
76 Editorial Board
15-16 C p.
artikel
77 Evaluation of information retrieval systems using structural equation modeling Melucci, Massimo
2019
15-16 C p. 1-18
artikel
78 Fault tree analysis: A survey of the state-of-the-art in modeling, analysis and tools Ruijters, Enno
2015
15-16 C p. 29-62
34 p.
artikel
79 General classification of the authenticated encryption schemes for the CAESAR competition Abed, Farzaneh
2016
15-16 C p. 13-26
14 p.
artikel
80 Generalizing input-driven languages: Theoretical and practical benefits Mandrioli, Dino
2018
15-16 C p. 61-87
artikel
81 Getting into the mind of an “in-auction” fraud perpetrator Trevathan, Jarrod
2018
15-16 C p. 1-15
artikel
82 Graph grammars according to the type of input and manipulated data: A survey Albane, Saadia
2018
15-16 C p. 178-203
artikel
83 Graph spanners: A tutorial review Ahmed, Reyan

15-16 C p.
artikel
84 Higher order mutation testing: A Systematic Literature Review Ghiduk, Ahmed S.
2017
15-16 C p. 29-48
20 p.
artikel
85 Homomorphic encryption systems statement: Trends and challenges Alaya, Bechir

15-16 C p.
artikel
86 I2CE3: A dedicated and separated attack chain for ransomware offenses as the most infamous cyber extortion Keshavarzi, Masoudeh

15-16 C p.
artikel
87 Improved node localization using K-means clustering for Wireless Sensor Networks El Khediri, Salim

15-16 C p.
artikel
88 Indoor environment propagation review Obeidat, H.

15-16 C p.
artikel
89 Indoor location based services challenges, requirements and usability of current solutions Basiri, Anahid
2017
15-16 C p. 1-12
12 p.
artikel
90 Indoor location identification technologies for real-time IoT-based applications: An inclusive survey Oguntala, George
2018
15-16 C p. 55-79
artikel
91 Integrating blockchain technology into the energy sector — from theory of blockchain to research and application of energy blockchain Wang, Qiang

15-16 C p.
artikel
92 Intelligent retrieval and classification in three-dimensional biomedical images — A systematic mapping Bergamasco, Leila Cristina C.
2019
15-16 C p. 19-38
artikel
93 Introducing article numbering to Computer Science Review Li, Jimeng

15-16 C p.
artikel
94 Julia language in machine learning: Algorithms, applications, and open issues Gao, Kaifeng

15-16 C p.
artikel
95 Localization schemes for Underwater Acoustic Sensor Networks - A Review Toky, Archana

15-16 C p.
artikel
96 Location management in mobile network: A survey Mukherjee, Anwesha
2016
15-16 C p. 1-14
14 p.
artikel
97 Logo and seal based administrative document image retrieval: A survey Alaei, Alireza
2016
15-16 C p. 47-63
17 p.
artikel
98 Machine learning and multi-agent systems in oil and gas industry applications: A survey Hanga, Khadijah M.

15-16 C p.
artikel
99 Model-based testing using UML activity diagrams: A systematic mapping study Ahmad, Tanwir
2019
15-16 C p. 98-112
artikel
100 Motif discovery in networks: A survey Yu, Shuo

15-16 C p.
artikel
101 Multidisciplinary Pattern Recognition applications: A review Paolanti, Marina

15-16 C p.
artikel
102 Multilayer network simplification: Approaches, models and methods Interdonato, Roberto

15-16 C p.
artikel
103 Named Data Networking: A survey Saxena, Divya
2016
15-16 C p. 15-55
41 p.
artikel
104 Near infrared face recognition: A literature survey Farokhi, Sajad
2016
15-16 C p. 1-17
17 p.
artikel
105 New trends on moving object detection in video images captured by a moving camera: A survey Yazdi, Mehran
2018
15-16 C p. 157-177
artikel
106 [No title] Díaz, Josep

15-16 C p.
artikel
107 [No title] Bálek, Martin
2013
15-16 C p. 35-46
12 p.
artikel
108 [No title] Zuhair Mahmoud, Khaled
2013
15-16 C p. 31-34
4 p.
artikel
109 Offline Script Identification from multilingual Indic-script documents: A state-of-the-art Singh, Pawan Kumar
2015
15-16 C p. 1-28
28 p.
artikel
110 On cloud security requirements, threats, vulnerabilities and countermeasures: A survey Kumar, Rakesh
2019
15-16 C p. 1-48
artikel
111 On the role and the importance of features for background modeling and foreground detection Bouwmans, Thierry
2018
15-16 C p. 26-91
artikel
112 Parametric survey on cross-layer designs for wireless sensor networks Sah, Dinesh Kumar
2018
15-16 C p. 112-134
artikel
113 Practical algorithms for MSO model-checking on tree-decomposable graphs Langer, Alexander
2014
15-16 C p. 39-74
36 p.
artikel
114 Prediction methods and applications in the science of science: A survey Hou, Jie

15-16 C p.
artikel
115 Privacy and verifiability in voting systems: Methods, developments and trends Jonker, Hugo
2013
15-16 C p. 1-30
30 p.
artikel
116 Privacy issues in intrusion detection systems: A taxonomy, survey and future directions Niksefat, Salman
2017
15-16 C p. 69-78
10 p.
artikel
117 Privacy preserving publication of relational and transaction data: Survey on the anonymization of patient data Puri, Vartika
2019
15-16 C p. 45-61
artikel
118 Progress in context-aware recommender systems — An overview Raza, Shaina
2019
15-16 C p. 84-97
artikel
119 Publication trends in gamification: A systematic mapping study Kasurinen, Jussi
2018
15-16 C p. 33-44
artikel
120 Publisher’s Note Faez, Telli
2017
15-16 C p. 31
artikel
121 Real-time detection of shill bidding in online auctions: A literature review Majadi, Nazia
2017
15-16 C p. 1-18
18 p.
artikel
122 Recent Named Entity Recognition and Classification techniques: A systematic review Goyal, Archana
2018
15-16 C p. 21-43
artikel
123 Relational intelligence recognition in online social networks — A survey Zhang, Ji

15-16 C p.
artikel
124 Scenario analysis, from BigData to black swan Batrouni, Marwan
2018
15-16 C p. 131-139
artikel
125 Scheduling in distributed systems: A cloud computing perspective Bittencourt, Luiz F.
2018
15-16 C p. 31-54
artikel
126 Science of Scientific Team Science: A survey Yu, Shuo
2019
15-16 C p. 72-83
artikel
127 Security and privacy aspects in MapReduce on clouds: A survey Derbeko, Philip
2016
15-16 C p. 1-28
28 p.
artikel
128 Semantic Web Services testing: A Systematic Mapping study de Souza Neto, João B.
2018
15-16 C p. 140-156
artikel
129 Smart grid communication and information technologies in the perspective of Industry 4.0: Opportunities and challenges Faheem, M.
2018
15-16 C p. 1-30
artikel
130 Social computing for software engineering: A mapping study Ardini, Amalia
2014
15-16 C p. 75-93
19 p.
artikel
131 Sorting on graphs by adjacent swaps using permutation groups Kim, Dohan
2016
15-16 C p. 89-105
17 p.
artikel
132 Survey on hardware implementation of random number generators on FPGA: Theory and experimental analyses Bakiri, Mohammed
2018
15-16 C p. 135-153
artikel
133 Survey on Visualization and Visual Analytics pipeline-based models: Conceptual aspects, comparative studies and challenges Ltifi, Hela

15-16 C p.
artikel
134 Systematic analysis and review of stock market prediction techniques Gandhmal, Dattatray P.

15-16 C p.
artikel
135 The Critical Node Detection Problem in networks: A survey Lalou, Mohammed
2018
15-16 C p. 92-117
artikel
136 The evolution of sentiment analysis—A review of research topics, venues, and top cited papers Mäntylä, Mika V.
2018
15-16 C p. 16-32
artikel
137 The journey of graph kernels through two decades Ghosh, Swarnendu
2018
15-16 C p. 88-111
artikel
138 Traditional and recent approaches in background modeling for foreground detection: An overview Bouwmans, Thierry
2014
15-16 C p. 31-66
36 p.
artikel
139 Transaction scheduling protocols for controlling priority inversion: A review Pandey, Sarvesh

15-16 C p.
artikel
140 Tutorial and critical analysis of phishing websites methods Mohammad, Rami M.
2015
15-16 C p. 1-24
24 p.
artikel
141 Understandable Big Data: A survey Kacfah Emani, Cheikh
2015
15-16 C p. 70-81
12 p.
artikel
142 Usability, security and trust in password managers: A quest for user-centric properties and features Chaudhary, Sunil
2019
15-16 C p. 69-90
artikel
143 When machine learning meets medical world: Current status and future challenges Smiti, Abir

15-16 C p.
artikel
144 Where is the research on connecting game ​ worlds?—A systematic mapping study Parkkila, Janne
2015
15-16 C p. 46-58
13 p.
artikel
145 XML data manipulation in conventional and temporal XML databases: A survey Brahmia, Zouhaier

15-16 C p.
artikel
                             145 gevonden resultaten
 
 Koninklijke Bibliotheek - Nationale Bibliotheek van Nederland