Digitale Bibliotheek
Sluiten Bladeren door artikelen uit een tijdschrift
     Tijdschrift beschrijving
       Alle jaargangen van het bijbehorende tijdschrift
         Alle afleveringen van het bijbehorende jaargang
                                       Alle artikelen van de bijbehorende aflevering
 
                             36 gevonden resultaten
nr titel auteur tijdschrift jaar jaarg. afl. pagina('s) type
1 A Computationally Economic Novel Approach for Real-Time Moving Multi-vehicle Detection and Tracking toward Efficient Traffic Surveillance Hadi, Raad Ahmed
2016
42 2 p. 817-831
artikel
2 A Cross-Layer Framework for Joint Routing and Resource Management in Multi-radio Infrastructure Wireless Mesh Networks Narayan, D. G.
2016
42 2 p. 651-667
artikel
3 Adaptive Clustering of Embedded Multiple Web Objects for Efficient Group Prefetching Gracia, Chithra D.
2016
42 2 p. 715-724
artikel
4 Adaptive Technique for Merging Broken Filaments in H-$$\upalpha $$α Solar Images Using Machine Learning Techniques Atoum, Ibrahim A.
2016
42 2 p. 787-792
artikel
5 A Delay-Based Countermeasure Against the Discovery of Default Rules in Firewalls Sattar, K.
2016
42 2 p. 833-844
artikel
6 A Hybrid Tabu Search Algorithm for the Variable Periodic Vehicle Routing Problem Liao, Ching-Jong
2016
42 2 p. 513-535
artikel
7 A Lightweight Approach for Detection of Code Smells Rasool, Ghulam
2016
42 2 p. 483-506
artikel
8 An Adaptive Dynamic Request Scheduling Model for Multi-socket, Multi-core Web Servers You, Guohua
2016
42 2 p. 751-764
artikel
9 An Adaptive Non-symmetric Fuzzy Activation Function-Based Extreme Learning Machines for Face Recognition Goel, Tripti
2016
42 2 p. 805-816
artikel
10 Analysis of Web Application Code Vulnerabilities using Secure Coding Standards Sahu, Divya Rishi
2016
42 2 p. 885-895
artikel
11 An Automated Analysis of the Branch Coverage and Energy Consumption Using Concolic Testing Godboley, Sangharatna
2016
42 2 p. 619-637
artikel
12 A Recommender Model in E-learning Environment Bourkoukou, Outmane
2016
42 2 p. 607-617
artikel
13 Birthmark-Based Software Classification Using Rough Sets Nazir, Shah
2016
42 2 p. 859-871
artikel
14 Cloud-Based Intrusion Detection and Response System: Open Research Issues, and Solutions Inayat, Zakira
2017
42 2 p. 399-423
artikel
15 Collaborative Vehicle Location Management Service for Enhanced Hybrid Reactive and Proactive Multicast in VANETs Al-Ezaly, Esraa
2016
42 2 p. 691-704
artikel
16 Cooperation in Opportunistic Networks: An Overlay Approach for Destination-Dependent Utility-Based Schemes Yasmin, Sadaf
2016
42 2 p. 467-482
artikel
17 Cryptanalysis and Extended Three-Factor Remote User Authentication Scheme in Multi-Server Environment Chandrakar, Preeti
2016
42 2 p. 765-786
artikel
18 DDoS Attack Detection and Mitigation Using SDN: Methods, Practices, and Solutions Bawany, Narmeen Zakaria
2017
42 2 p. 425-441
artikel
19 Detecting Deadlocks Involving Diverse Synchronization Mechanisms Using Extended Petri Nets Du, Yunkai
2016
42 2 p. 913-923
artikel
20 Dynamic Semantic LFU Policy with Victim tracer (DSLV): A Customizing Technique for Client Cache Geetha, Krishnan
2016
42 2 p. 725-737
artikel
21 ECS: An Energy-Efficient Approach to Select Cluster-Head in Wireless Sensor Networks Pati, Bibudhendu
2016
42 2 p. 669-676
artikel
22 Fair Priority Scheduling (FPS): A Process Scheduling Algorithm Based on Skip Ring Data Structure Aksu, Mustafa
2016
42 2 p. 677-689
artikel
23 Gaussian Mixture Model with the Inclusion of Spatial Factor and Pixel Re-labelling: Application to MR Brain Image Segmentation Meena Prakash, R.
2016
42 2 p. 595-605
artikel
24 Heterogeneous Opcode Space for Metamorphic Malware Detection Raphel, Jithu
2016
42 2 p. 537-558
artikel
25 High-Performance Generic-Point Parallel Scalar Multiplication Al-Somani, Turki F.
2016
42 2 p. 507-512
artikel
26 Intelligent Multiple Search Strategy Cuckoo Algorithm for Numerical and Engineering Optimization Problems Rakhshani, Hojjat
2016
42 2 p. 567-593
artikel
27 Multimodal Biometric Systems: A Comparative Study Sarhan, Shahenda
2016
42 2 p. 443-457
artikel
28 Optimum Design of Fractional-Order Hybrid Fuzzy Logic Controller for a Robotic Manipulator Sharma, Richa
2016
42 2 p. 739-750
artikel
29 Performance Modeling and Analysis of the EDoS-Shield Mitigation Al-Haidari, F.
2016
42 2 p. 793-804
artikel
30 RGNBC: Rough Gaussian Naïve Bayes Classifier for Data Stream Classification with Recurring Concept Drift Kishore Babu, D.
2016
42 2 p. 705-714
artikel
31 Robust Region Duplication Detection on Log-Polar Domain Using Band Limitation Yuan, Yue
2016
42 2 p. 559-565
artikel
32 Secure and Efficient Identity-Based Proxy Signature Scheme in the Standard Model Based on Computational Diffie–Hellman Problem Hu, Xiaoming
2016
42 2 p. 639-649
artikel
33 Secure Data Storage in Cloud: An e-Stream Cipher-Based Secure and Dynamic Updation Policy Ramesh, Dharavath
2016
42 2 p. 873-883
artikel
34 Single- and Multi-UAV Trajectory Control in RF Source Localization Shahidian, Seyyed Ali Asghar
2016
42 2 p. 459-466
artikel
35 Synchronous Communication-Based Many-Core SoC Baklouti, Mouna
2016
42 2 p. 845-857
artikel
36 Toward a Self-Adaptive Workflow Management System Through Learning and Prediction Models Samiri, Mohamed Yassine
2016
42 2 p. 897-912
artikel
                             36 gevonden resultaten
 
 Koninklijke Bibliotheek - Nationale Bibliotheek van Nederland