Digitale Bibliotheek
Sluiten Bladeren door artikelen uit een tijdschrift
     Tijdschrift beschrijving
       Alle jaargangen van het bijbehorende tijdschrift
         Alle afleveringen van het bijbehorende jaargang
                                       Alle artikelen van de bijbehorende aflevering
 
                             80 gevonden resultaten
nr titel auteur tijdschrift jaar jaarg. afl. pagina('s) type
1 A blind separation method of overlapped multi-components based on time varying AR model Cai, QuanWei
2008
1 p. 81-92
artikel
2 A characterization of answer sets for logic programs Zhang, MingYi
2007
1 p. 46-62
artikel
3 A complete algorithm for automated discovering of a class of inequality-type theorems Yang, Lu

1 p. 33-49
artikel
4 A fast and adaptive method for complex-valued SAR image denoising based on lk norm regularization Wang, WeiWei
2009
1 p. 138-148
artikel
5 A fast learning algorithm of neural network with tunable activation function Shen, Yanjun

1 p. 126-136
artikel
6 A functional presentation of Pi calculus Fu, Yuxi

1 p. 20-32
artikel
7 Algebraic conditions of stability for hopfield neural network Liao, Xiaoxin

1 p. 113-125
artikel
8 Almost sure convergence of iterative learning control for stochastic systems Chen, Hanfu

1 p. 67-79
artikel
9 A new formal model for privilege control with supporting POSIX capability mechanism Ji, Qingguang

1 p. 46-66
artikel
10 An ideal topology type convergent theorem on scale effect algebras Wu, JunDe
2007
1 p. 41-45
artikel
11 An orthogonal basis for the hyperbolic hybrid polynomial space Huang, Yu
2007
1 p. 21-28
artikel
12 A novel compensation-based recurrent fuzzy neural network and its learning algorithm Wu, Bo
2009
1 p. 41-51
artikel
13 A novel complex-system-view-based method for system effectiveness analysis: Monotonic indexes space Hu, Jianwen
2006
1 p. 90-102
artikel
14 A novel model on dynamic resource allocation in optical networks Tang, Yong

1 p. 15-27
artikel
15 Application of asymptotic waveform approximation technique to hybrid FE/BI method for 3D scattering Peng, Zhen
2007
1 p. 124-134
artikel
16 A pure quasi-human algorithm for solving the cuboid packing problem Huang, WenQi
2009
1 p. 52-58
artikel
17 A schematic axiom for open congruence Fu, Yuxi

1 p. 67-77
artikel
18 A unified approximate reasoning theory suitable for both propositional calculus system and predicate calculus system Wang, Guojun

1 p. 1-14
artikel
19 Chessboard-interpolation-based multiple description video coding Fan, Chen

1 p. 66-74
artikel
20 Collision attack on reduced-round Camellia Wu, Wenling

1 p. 78-90
artikel
21 Communication contention in APN list scheduling algorithm Tang, XiaoYong
2009
1 p. 59-69
artikel
22 Constructing parallel long-message signcryption scheme from trapdoor permutation Hu, ZhenYu
2007
1 p. 82-98
artikel
23 Construction and enumeration of Boolean functions with maximum algebraic immunity Zhang, WenYing
2009
1 p. 32-40
artikel
24 Corner block list representation and its application with boundary constraints Hong, Xianlong

1 p. 1-19
artikel
25 Cova: A programming language for cooperative applications Yang, Guangxin

1 p. 73-80
artikel
26 Cryptographic protocol security analysis based on bounded constructing algorithm Li, Xianxian
2006
1 p. 26-47
artikel
27 Design of smooth orthogonal wavelets with beautiful structure from 2-band to 4-band Peng, Lizhong
2006
1 p. 128-137
artikel
28 Fast frequency-domain equalization for single-carrier V-BLAST systems over multipath channel Feng, Ang
2009
1 p. 115-125
artikel
29 Formal verification technique for grid service chain model and its application Xu, Ke
2007
1 p. 1-20
artikel
30 Geometric constraint solving with geometric transformation Gao, Xiaoshan

1 p. 50-59
artikel
31 Grading learning for blind source separation Zhang, Xianda

1 p. 31-44
artikel
32 Investigation progress on key photonic integration for application in optical communication network Wang, Qiming

1 p. 60-66
artikel
33 Joint multiple parameters estimation for coherent chirp signals using vector sensor array Wen, Zhong
2008
1 p. 93-100
artikel
34 Lane of parallel through carry in ternary optical adder Jin, Yi

1 p. 107-116
artikel
35 Linear cryptanalysis of NUSH block cipher Wu, Wenling

1 p. 59-67
artikel
36 Linear multi-secret sharing schemes Xiao, Liangliang

1 p. 125-136
artikel
37 Mathematic principles of interrupted-sampling repeater jamming (ISRJ) Wang, XueSong
2007
1 p. 113-123
artikel
38 Medical image segmentation based on cellular neural network Yao, Li

1 p. 68-72
artikel
39 Modeling and analyzing of the interaction between worms and antiworms during network worm propagation Yang, Feng

1 p. 91-106
artikel
40 Multi-degree reduction of NURBS curves based on their explicit matrix representation and polynomial approximation theory Cheng, Min

1 p. 44-54
artikel
41 Multi-degree reduction of tensor product Bézier surfaces with conditions of corners interpolations Chen, Guodong

1 p. 51-58
artikel
42 Multiple stochastic paths scheme on partially-trusted relay quantum key distribution network Wen, Hao
2009
1 p. 18-22
artikel
43 Multiple symbol differential detection based on sphere decoding for unitary space-time modulation Li, Ying
2009
1 p. 126-137
artikel
44 Natural gradient-based recursive least-squares algorithm for adaptive blind source separation Zhu, Xiaolong

1 p. 55-65
artikel
45 Neural networks and graph theory Xu, Jin

1 p. 1-24
artikel
46 Neuro-fuzzy and model-based motion control for mobile manipulator among dynamic obstacles Wei, Wu

1 p. 14-30
artikel
47 New approach to the automatic segmentation of coronary artery in X-ray angiograms Zhou, ShouJun
2008
1 p. 25-39
artikel
48 New construction for expert system based on innovative knowledge discovery technology Yang, BingRu
2007
1 p. 29-40
artikel
49 New theoretical bounds on the aperiodic correlation functions of binary sequences Peng, Daiyuan

1 p. 28-45
artikel
50 Non-smooth finite-time stabilization for a class of nonlinear systems Hong, Yiguang
2006
1 p. 80-89
artikel
51 Novel Ω-protocols for NP Deng, Yi
2008
1 p. 40-52
artikel
52 On decidability and model checking for a first order modal logic for value-passing processes Xue, Rui

1 p. 45-59
artikel
53 Optimal approximation of linear systems by artificial immune response Gong, Maoguo
2006
1 p. 63-79
artikel
54 Output-threshold coupled neural network for solving the shortest path problems Zhang, Junying

1 p. 20-33
artikel
55 Packet routing algorithm for polar orbit LEO satellite constellation network Kaidong, Wang
2006
1 p. 103-127
artikel
56 Parallel compact integration in handwritten Chinese character recognition Wang, Chunheng

1 p. 89-96
artikel
57 Partner selection model and soft computing approach for dynamic alliance of enterprises Wang, Dingwei

1 p. 68-80
artikel
58 Polarization discrimination between repeater false-target and radar target Shi, LongFei
2009
1 p. 149-158
artikel
59 Quasi-two-dimensional subthreshold current model of deep submicrometer SOI drive-in gate controlled hybrid transistors with lateral non-uniform doping profile Huang, Ru

1 p. 60-67
artikel
60 Recursive functions of context free languages (I) Dong, Yunmei

1 p. 25-39
artikel
61 Repair approach for DMC images based on hierarchical location using edge curve Pan, Jun
2009
1 p. 23-31
artikel
62 Research progress of the fractional Fourier transform in signal processing Tao, Ran
2006
1 p. 1-25
artikel
63 Reuse-based software production technology Yang, Fuqing

1 p. 8-19
artikel
64 Scaling CMOS devices through alternative structures Hu, Chenming

1 p. 1-7
artikel
65 Security extension for the Canetti-Krawczyk model in identity-based systems Li, Xinghua

1 p. 117-124
artikel
66 Sequential stratified sampling belief propagation for multiple targets tracking Xue, Jianru
2006
1 p. 48-62
artikel
67 Spectral clustering based on matrix perturbation theory Tian, Zheng
2007
1 p. 63-81
artikel
68 Stability of switched nonlinear systems via extensions of LaSalle’s invariance principle Wang, JinHuan
2009
1 p. 84-90
artikel
69 Study on the distribution law of random code structure of irregular LDPC codes and its application in eliminating short cycles Ma, LinHua
2007
1 p. 99-104
artikel
70 Synthetic aperture radar tomography sampling criteria and three-dimensional range migration algorithm with elevation digital spotlighting Tan, WeiXian
2009
1 p. 100-114
artikel
71 The completeness and applications of the formal system ℒ* Pei, Daowu

1 p. 40-50
artikel
72 The essential order of approximation for neural networks Xu, Zongben

1 p. 97-112
artikel
73 The Internet accessible mathematical computation framework Wang, Paul S.

1 p. 75-88
artikel
74 Theory of (n) truth degrees of formulas in modal logic and a consistency theorem Wang, GuoJun
2009
1 p. 70-83
artikel
75 Three-dimensional beam propagation method based on the variable transformed Galerkin’s method Xiao, Jinbiao

1 p. 34-43
artikel
76 Time-accelerated integral equations for two-dimensional transient scattering problems Wang, Jianguo

1 p. 1-13
artikel
77 Turbo iterative equalization for HSDPA systems Wu, QiHui
2007
1 p. 105-112
artikel
78 Unparallel trajectory bistatic spotlight SAR imaging Zhang, Lei
2009
1 p. 91-99
artikel
79 Using the multi-living agent concept to investigate complex information systems Wang, Yue
2008
1 p. 1-17
artikel
80 Using the multi-living agent concept to investigate complex information systems Wang, Yue
2008
1 p. 1-17
artikel
                             80 gevonden resultaten
 
 Koninklijke Bibliotheek - Nationale Bibliotheek van Nederland