nr |
titel |
auteur |
tijdschrift |
jaar |
jaarg. |
afl. |
pagina('s) |
type |
1 |
A Computationally Economic Novel Approach for Real-Time Moving Multi-vehicle Detection and Tracking toward Efficient Traffic Surveillance
|
Hadi, Raad Ahmed |
|
2016 |
42 |
2 |
p. 817-831 |
artikel |
2 |
A Cross-Layer Framework for Joint Routing and Resource Management in Multi-radio Infrastructure Wireless Mesh Networks
|
Narayan, D. G. |
|
2016 |
42 |
2 |
p. 651-667 |
artikel |
3 |
Adaptive Clustering of Embedded Multiple Web Objects for Efficient Group Prefetching
|
Gracia, Chithra D. |
|
2016 |
42 |
2 |
p. 715-724 |
artikel |
4 |
Adaptive Technique for Merging Broken Filaments in H-$$\upalpha $$α Solar Images Using Machine Learning Techniques
|
Atoum, Ibrahim A. |
|
2016 |
42 |
2 |
p. 787-792 |
artikel |
5 |
A Delay-Based Countermeasure Against the Discovery of Default Rules in Firewalls
|
Sattar, K. |
|
2016 |
42 |
2 |
p. 833-844 |
artikel |
6 |
A Hybrid Tabu Search Algorithm for the Variable Periodic Vehicle Routing Problem
|
Liao, Ching-Jong |
|
2016 |
42 |
2 |
p. 513-535 |
artikel |
7 |
A Lightweight Approach for Detection of Code Smells
|
Rasool, Ghulam |
|
2016 |
42 |
2 |
p. 483-506 |
artikel |
8 |
An Adaptive Dynamic Request Scheduling Model for Multi-socket, Multi-core Web Servers
|
You, Guohua |
|
2016 |
42 |
2 |
p. 751-764 |
artikel |
9 |
An Adaptive Non-symmetric Fuzzy Activation Function-Based Extreme Learning Machines for Face Recognition
|
Goel, Tripti |
|
2016 |
42 |
2 |
p. 805-816 |
artikel |
10 |
Analysis of Web Application Code Vulnerabilities using Secure Coding Standards
|
Sahu, Divya Rishi |
|
2016 |
42 |
2 |
p. 885-895 |
artikel |
11 |
An Automated Analysis of the Branch Coverage and Energy Consumption Using Concolic Testing
|
Godboley, Sangharatna |
|
2016 |
42 |
2 |
p. 619-637 |
artikel |
12 |
A Recommender Model in E-learning Environment
|
Bourkoukou, Outmane |
|
2016 |
42 |
2 |
p. 607-617 |
artikel |
13 |
Birthmark-Based Software Classification Using Rough Sets
|
Nazir, Shah |
|
2016 |
42 |
2 |
p. 859-871 |
artikel |
14 |
Cloud-Based Intrusion Detection and Response System: Open Research Issues, and Solutions
|
Inayat, Zakira |
|
2017 |
42 |
2 |
p. 399-423 |
artikel |
15 |
Collaborative Vehicle Location Management Service for Enhanced Hybrid Reactive and Proactive Multicast in VANETs
|
Al-Ezaly, Esraa |
|
2016 |
42 |
2 |
p. 691-704 |
artikel |
16 |
Cooperation in Opportunistic Networks: An Overlay Approach for Destination-Dependent Utility-Based Schemes
|
Yasmin, Sadaf |
|
2016 |
42 |
2 |
p. 467-482 |
artikel |
17 |
Cryptanalysis and Extended Three-Factor Remote User Authentication Scheme in Multi-Server Environment
|
Chandrakar, Preeti |
|
2016 |
42 |
2 |
p. 765-786 |
artikel |
18 |
DDoS Attack Detection and Mitigation Using SDN: Methods, Practices, and Solutions
|
Bawany, Narmeen Zakaria |
|
2017 |
42 |
2 |
p. 425-441 |
artikel |
19 |
Detecting Deadlocks Involving Diverse Synchronization Mechanisms Using Extended Petri Nets
|
Du, Yunkai |
|
2016 |
42 |
2 |
p. 913-923 |
artikel |
20 |
Dynamic Semantic LFU Policy with Victim tracer (DSLV): A Customizing Technique for Client Cache
|
Geetha, Krishnan |
|
2016 |
42 |
2 |
p. 725-737 |
artikel |
21 |
ECS: An Energy-Efficient Approach to Select Cluster-Head in Wireless Sensor Networks
|
Pati, Bibudhendu |
|
2016 |
42 |
2 |
p. 669-676 |
artikel |
22 |
Fair Priority Scheduling (FPS): A Process Scheduling Algorithm Based on Skip Ring Data Structure
|
Aksu, Mustafa |
|
2016 |
42 |
2 |
p. 677-689 |
artikel |
23 |
Gaussian Mixture Model with the Inclusion of Spatial Factor and Pixel Re-labelling: Application to MR Brain Image Segmentation
|
Meena Prakash, R. |
|
2016 |
42 |
2 |
p. 595-605 |
artikel |
24 |
Heterogeneous Opcode Space for Metamorphic Malware Detection
|
Raphel, Jithu |
|
2016 |
42 |
2 |
p. 537-558 |
artikel |
25 |
High-Performance Generic-Point Parallel Scalar Multiplication
|
Al-Somani, Turki F. |
|
2016 |
42 |
2 |
p. 507-512 |
artikel |
26 |
Intelligent Multiple Search Strategy Cuckoo Algorithm for Numerical and Engineering Optimization Problems
|
Rakhshani, Hojjat |
|
2016 |
42 |
2 |
p. 567-593 |
artikel |
27 |
Multimodal Biometric Systems: A Comparative Study
|
Sarhan, Shahenda |
|
2016 |
42 |
2 |
p. 443-457 |
artikel |
28 |
Optimum Design of Fractional-Order Hybrid Fuzzy Logic Controller for a Robotic Manipulator
|
Sharma, Richa |
|
2016 |
42 |
2 |
p. 739-750 |
artikel |
29 |
Performance Modeling and Analysis of the EDoS-Shield Mitigation
|
Al-Haidari, F. |
|
2016 |
42 |
2 |
p. 793-804 |
artikel |
30 |
RGNBC: Rough Gaussian Naïve Bayes Classifier for Data Stream Classification with Recurring Concept Drift
|
Kishore Babu, D. |
|
2016 |
42 |
2 |
p. 705-714 |
artikel |
31 |
Robust Region Duplication Detection on Log-Polar Domain Using Band Limitation
|
Yuan, Yue |
|
2016 |
42 |
2 |
p. 559-565 |
artikel |
32 |
Secure and Efficient Identity-Based Proxy Signature Scheme in the Standard Model Based on Computational Diffie–Hellman Problem
|
Hu, Xiaoming |
|
2016 |
42 |
2 |
p. 639-649 |
artikel |
33 |
Secure Data Storage in Cloud: An e-Stream Cipher-Based Secure and Dynamic Updation Policy
|
Ramesh, Dharavath |
|
2016 |
42 |
2 |
p. 873-883 |
artikel |
34 |
Single- and Multi-UAV Trajectory Control in RF Source Localization
|
Shahidian, Seyyed Ali Asghar |
|
2016 |
42 |
2 |
p. 459-466 |
artikel |
35 |
Synchronous Communication-Based Many-Core SoC
|
Baklouti, Mouna |
|
2016 |
42 |
2 |
p. 845-857 |
artikel |
36 |
Toward a Self-Adaptive Workflow Management System Through Learning and Prediction Models
|
Samiri, Mohamed Yassine |
|
2016 |
42 |
2 |
p. 897-912 |
artikel |