nr |
titel |
auteur |
tijdschrift |
jaar |
jaarg. |
afl. |
pagina('s) |
type |
1 |
Abstraction for model checking multi-agent systems
|
Zhou, Conghua |
|
2010 |
|
1 |
p. 14-25 |
artikel |
2 |
A constraint-based topic modeling approach for name disambiguation
|
Wang, Feng |
|
2010 |
|
1 |
p. 100-111 |
artikel |
3 |
A fast algorithm for computing moments of gray images based on NAM and extended shading approach
|
Zheng, Yunping |
|
2010 |
|
1 |
p. 57-65 |
artikel |
4 |
A hybrid multi-swarm particle swarm optimization to solve constrained optimization problems
|
Wang, Yong |
|
2009 |
|
1 |
p. 38-52 |
artikel |
5 |
A MANET accessing Internet routing algorithm based on dynamic gateway adaptive selection
|
Li, Xin |
|
2010 |
|
1 |
p. 143-150 |
artikel |
6 |
A metric normalization of tree edit distance
|
Li, Yujian |
|
2011 |
|
1 |
p. 119-125 |
artikel |
7 |
An analytical model for Network-on-Chip with finite input buffer
|
Wang, Jian |
|
2010 |
|
1 |
p. 126-134 |
artikel |
8 |
An effective scheduling scheme for multi-hop multicast in wireless mesh networks
|
Liu, Zheng |
|
2010 |
|
1 |
p. 135-142 |
artikel |
9 |
A new model for model checking: cycle-weighted Kripke structure
|
Zhu, Jiaqi |
|
2010 |
|
1 |
p. 78-88 |
artikel |
10 |
A semantic model of confinement and Locality theorem
|
Wang, Shuling |
|
2010 |
|
1 |
p. 28-46 |
artikel |
11 |
Behavior pattern extraction by trajectory analysis
|
Wen, Jia |
|
2010 |
|
1 |
p. 37-44 |
artikel |
12 |
Boosting performance in attack intention recognition by integrating multiple techniques
|
Bai, Hao |
|
2010 |
|
1 |
p. 109-118 |
artikel |
13 |
Distance metric learning guided adaptive subspace semi-supervised clustering
|
Yin, Xuesong |
|
2010 |
|
1 |
p. 100-108 |
artikel |
14 |
Evolutionary algorithm based on schemata theory
|
Maruyama, Takashi |
|
2009 |
|
1 |
p. 123-129 |
artikel |
15 |
Evolutionary multi-objective optimization: some current research trends and topics that remain to be explored
|
Coello Coello, Carlos A. |
|
2009 |
|
1 |
p. 18-30 |
artikel |
16 |
Evolving Nash-optimal poker strategies using evolutionary computation
|
Quek, Hanyang |
|
2009 |
|
1 |
p. 73-91 |
artikel |
17 |
Forecasting — where computational intelligence meets the stock market
|
Tsang, Edward |
|
2009 |
|
1 |
p. 53-63 |
artikel |
18 |
Formal verification of concurrent programs with read-write locks
|
Fu, Ming |
|
2010 |
|
1 |
p. 65-77 |
artikel |
19 |
From nature to computing and back
|
Tang, Ke |
|
2009 |
|
1 |
p. 1-3 |
artikel |
20 |
Fuzzy c-means clustering with non local spatial information for noisy image segmentation
|
Zhao, Feng |
|
2010 |
|
1 |
p. 45-56 |
artikel |
21 |
Identifying different community members in complex networks based on topology potential
|
Han, Yanni |
|
2010 |
|
1 |
p. 87-99 |
artikel |
22 |
Improved feedback modeling of transport in enlarging urban areas of developing countries
|
Feng, Xuesong |
|
2010 |
|
1 |
p. 112-122 |
artikel |
23 |
Incorporating prior knowledge into learning by dividing training data
|
Lu, Baoliang |
|
2009 |
|
1 |
p. 109-122 |
artikel |
24 |
Indeterminacy-aware service selection for reliable service composition
|
Fan, Xiaoqin |
|
2010 |
|
1 |
p. 26-36 |
artikel |
25 |
Integrative biological systems modeling: challenges and opportunities
|
Wu, Jialiang |
|
2009 |
|
1 |
p. 92-100 |
artikel |
26 |
Learning random forests for ranking
|
Jiang, Liangxiao |
|
2010 |
|
1 |
p. 79-86 |
artikel |
27 |
Mining non-redundant diverse patterns: an information theoretic perspective
|
Sha, Chaofeng |
|
2010 |
|
1 |
p. 89-99 |
artikel |
28 |
Monitoring of particle swarm optimization
|
Shi, Yuhui |
|
2009 |
|
1 |
p. 31-37 |
artikel |
29 |
Optimisation of algorithm control parameters in cultural differential evolution applied to molecular crystallography
|
Tremayne, Maryjane |
|
2009 |
|
1 |
p. 101-108 |
artikel |
30 |
Pareto analysis of evolutionary and learning systems
|
Jin, Yaochu |
|
2009 |
|
1 |
p. 4-17 |
artikel |
31 |
Property transformation under specification change
|
Fu, Zheng |
|
2010 |
|
1 |
p. 1-13 |
artikel |
32 |
Runtime analysis of search heuristics on software engineering problems
|
Lehre, Per Kristian |
|
2009 |
|
1 |
p. 64-72 |
artikel |
33 |
Soft spectral clustering ensemble applied to image segmentation
|
Jia, Jianhua |
|
2010 |
|
1 |
p. 66-78 |
artikel |
34 |
Static worst-case execution time analysis of the μC/OS-II real-time kernel
|
Lv, Mingsong |
|
2010 |
|
1 |
p. 17-27 |
artikel |
35 |
Symbolic model checking APSL
|
Liu, Wanwei |
|
2009 |
|
1 |
p. 130-141 |
artikel |
36 |
TRainbow: a new trusted virtual machine based platform
|
Sun, Yuzhong |
|
2010 |
|
1 |
p. 47-64 |
artikel |