nr |
titel |
auteur |
tijdschrift |
jaar |
jaarg. |
afl. |
pagina('s) |
type |
1 |
A 3D shape retrieval framework for 3D smart cities
|
Leng, Biao |
|
2010 |
|
3 |
p. 394-404 |
artikel |
2 |
A fast iterative-clique percolation method for identifying functional modules in protein interaction networks
|
Sun, Penggang |
|
2009 |
|
3 |
p. 405-411 |
artikel |
3 |
A hierarchical model for structure learning based on the physiological characteristics of neurons
|
Wei, Hui |
|
2007 |
|
3 |
p. 361-372 |
artikel |
4 |
An adaptive polling interval and short preamble media access control protocol for wireless sensor networks
|
Chen, Defu |
|
2011 |
|
3 |
p. 300-307 |
artikel |
5 |
An alternative approach to characterize the topology of complex networks and its application in epidemic spreading
|
Liu, Zonghua |
|
2009 |
|
3 |
p. 324-334 |
artikel |
6 |
An alternative approach to characterize the topology of complex networks and its application in epidemic spreading
|
Liu, Zonghua |
|
|
|
3 |
p. 324-334 |
artikel |
7 |
A new centrality measure based on sub-tree
|
Rong, Lili |
|
2009 |
|
3 |
p. 356-360 |
artikel |
8 |
An improved spectral clustering algorithm based on random walk
|
Zhang, Xianchao |
|
2011 |
|
3 |
p. 268-278 |
artikel |
9 |
An optimal replication strategy for data grid systems
|
Jiang, Jianjin |
|
2007 |
|
3 |
p. 338-348 |
artikel |
10 |
An overview of the haplotype problems and algorithms
|
Zhao, Yuzhong |
|
2007 |
|
3 |
p. 272-282 |
artikel |
11 |
A pointer logic and certifying compiler
|
Chen, Yiyun |
|
2007 |
|
3 |
p. 297-312 |
artikel |
12 |
Applied research of data sensing and service to ubiquitous intelligent transportation system
|
Lv, Weifeng |
|
2010 |
|
3 |
p. 417-426 |
artikel |
13 |
A temporal-spatial background modeling of dynamic scenes
|
Hao, Jiuyue |
|
2011 |
|
3 |
p. 290-299 |
artikel |
14 |
Challenges and possible approaches: towards the petaflops computers
|
Qian, Depei |
|
2009 |
|
3 |
p. 273-289 |
artikel |
15 |
Class structure refactoring of object-oriented softwares using community detection in dependency networks
|
Pan, Weifeng |
|
2009 |
|
3 |
p. 396-404 |
artikel |
16 |
Cluster based parallel database management system for data intensive computing
|
Li, Jianzhong |
|
2009 |
|
3 |
p. 302-314 |
artikel |
17 |
Cognitive sense of China
|
Ni, Lionel M. |
|
2010 |
|
3 |
p. 309-310 |
artikel |
18 |
Complex networks and computing
|
Zhou, Shuigeng |
|
2009 |
|
3 |
p. 322-323 |
artikel |
19 |
Correlation in mobile call networks from structure perspective
|
Wu, Bin |
|
2009 |
|
3 |
p. 347-355 |
artikel |
20 |
Data-driven testing methodology for RFID systems
|
Lu, An |
|
2010 |
|
3 |
p. 354-364 |
artikel |
21 |
Decentralized architecture for resource management of group-based distributed systems
|
Zhang, Rong |
|
2008 |
|
3 |
p. 224-233 |
artikel |
22 |
Detecting community structure in networks by representative energy
|
Liu, Ji |
|
2009 |
|
3 |
p. 366-372 |
artikel |
23 |
Development of foundation models for Internet of Things
|
Chen, Lei |
|
2010 |
|
3 |
p. 376-385 |
artikel |
24 |
Distributed query processing in flash-based sensor networks
|
Xu, Jianliang |
|
2008 |
|
3 |
p. 248-256 |
artikel |
25 |
Dynamic description logic model for data integration
|
Hao, Guoshun |
|
2008 |
|
3 |
p. 306-330 |
artikel |
26 |
Evaluation of subgraph searching algorithms detecting network motif in biological networks
|
Hu, Jialu |
|
2009 |
|
3 |
p. 412-416 |
artikel |
27 |
Four styles of parallel and net programming
|
Xu, Zhiwei |
|
2009 |
|
3 |
p. 290-301 |
artikel |
28 |
Generalized collaboration networks in software systems: a case study of Linux kernels
|
Sun, Shiwen |
|
2009 |
|
3 |
p. 421-426 |
artikel |
29 |
Green challenges to system software in data centers
|
Sun, Yuzhong |
|
2011 |
|
3 |
p. 353-368 |
artikel |
30 |
High TPO/TCO for data storage: policy, algorithm and early practice
|
Zeng, Lingfang |
|
2007 |
|
3 |
p. 349-360 |
artikel |
31 |
Human behavior clustering for anomaly detection
|
Zhu, Xudong |
|
2011 |
|
3 |
p. 279-289 |
artikel |
32 |
Hybrid information retrieval policies based on cooperative cache in mobile P2P networks
|
Xu, Quanqing |
|
2009 |
|
3 |
p. 381-395 |
artikel |
33 |
Improved collaborative filtering algorithm based on heat conduction
|
Guo, Qiang |
|
2009 |
|
3 |
p. 417-420 |
artikel |
34 |
Introduction to the special section on peer-to-peer computing and web data management
|
Zhou, Aoying |
|
2008 |
|
3 |
p. 209-210 |
artikel |
35 |
iSensNet: an infrastructure for research and development in wireless sensor networks
|
Cao, Jiannong |
|
2010 |
|
3 |
p. 339-353 |
artikel |
36 |
Learning multiple metrics for ranking
|
Geng, Xiubo |
|
2011 |
|
3 |
p. 259-267 |
artikel |
37 |
Long-term large-scale sensing in the forest: recent advances and future directions of GreenOrbs
|
Liu, Yunhao |
|
2010 |
|
3 |
p. 334-338 |
artikel |
38 |
Median Fisher Discriminator: a robust feature extraction method with applications to biometrics
|
Yang, Jian |
|
2008 |
|
3 |
p. 295-305 |
artikel |
39 |
Minimizing interconnect length on reconfigurable meshes
|
Wu, Jigang |
|
2009 |
|
3 |
p. 315-321 |
artikel |
40 |
Multidimensional views on mobile call network
|
Yang, Shengqi |
|
2009 |
|
3 |
p. 335-346 |
artikel |
41 |
Packet transmission policies for battery operated wireless sensor networks
|
Li, Ye |
|
2010 |
|
3 |
p. 365-375 |
artikel |
42 |
Performance analysis of a dependable scheduling strategy based on a fault-tolerant grid model
|
Wang, Yuanzhuo |
|
2007 |
|
3 |
p. 329-337 |
artikel |
43 |
Pre-post notation is questionable in effectively specifying operations of object-oriented systems
|
Liu, Shaoying |
|
2011 |
|
3 |
p. 341-352 |
artikel |
44 |
Reasonable routing in delay/disruption tolerant networks
|
Yu, Haizheng |
|
2011 |
|
3 |
p. 327-334 |
artikel |
45 |
Requirement emergence computation of networked software
|
He, Keqing |
|
2007 |
|
3 |
p. 322-328 |
artikel |
46 |
Research on dynamic update transaction for Java classes
|
Zhang, Shi |
|
2007 |
|
3 |
p. 313-321 |
artikel |
47 |
Scale-free network models with accelerating growth
|
Li, Huan |
|
2009 |
|
3 |
p. 373-380 |
artikel |
48 |
Search an unsorted database with quantum mechanics
|
Long, Guilu |
|
2007 |
|
3 |
p. 247-271 |
artikel |
49 |
Security analysis of two recently proposed RFID authentication protocols
|
Lv, Chao |
|
2011 |
|
3 |
p. 335-340 |
artikel |
50 |
SIS model of epidemic spreading on dynamical networks with community
|
Xia, Chengyi |
|
2009 |
|
3 |
p. 361-365 |
artikel |
51 |
Static typing for a substructural lambda calculus
|
Hua, Baojian |
|
2011 |
|
3 |
p. 369-380 |
artikel |
52 |
Status of pattern recognition with wavelet analysis
|
Tang, Yuanyan |
|
2008 |
|
3 |
p. 268-294 |
artikel |
53 |
Supporting K nearest neighbors query on high-dimensional data in P2P systems
|
Li, Mei |
|
2008 |
|
3 |
p. 234-247 |
artikel |
54 |
SWER: small world-based efficient routing for wireless sensor networks with mobile sinks
|
Liu, Xuejun |
|
2009 |
|
3 |
p. 427-434 |
artikel |
55 |
Three challenges in data mining
|
Yang, Qiang |
|
2010 |
|
3 |
p. 324-333 |
artikel |
56 |
Toward in vivo nanoscale communication networks: utilizing an active network architecture
|
Bush, Stephen F. |
|
2011 |
|
3 |
p. 316-326 |
artikel |
57 |
Toward secure and private service discovery anywhere anytime
|
Zhu, Feng |
|
2010 |
|
3 |
p. 311-323 |
artikel |
58 |
Traceable P2P record exchange: a database-oriented approach
|
Li, Fengrong |
|
2008 |
|
3 |
p. 257-267 |
artikel |
59 |
Traceback in wireless sensor networks with packet marking and logging
|
Xu, Jun |
|
2011 |
|
3 |
p. 308-315 |
artikel |
60 |
Using Wide Table to manage web data: a survey
|
Yang, Bin |
|
2008 |
|
3 |
p. 211-223 |
artikel |
61 |
Virtual cityscapes: recent advances in crowd modeling and traffic simulation
|
Lin, Ming C. |
|
2010 |
|
3 |
p. 405-416 |
artikel |
62 |
Visual data security and management for smart cities
|
Chen, Zhenyong |
|
2010 |
|
3 |
p. 386-393 |
artikel |
63 |
Well limit behaviors of term rewriting systems
|
Ma, Shilong |
|
2007 |
|
3 |
p. 283-296 |
artikel |