Digitale Bibliotheek
Sluiten
Bladeren door artikelen uit een tijdschrift
Zoeken naar
Tijdschrift
Artikel
ISSN
NBN artikel
NBN tijdschrift
DARE/NARCIS document
met titel:
A
B
C
D
E
F
G
H
I
J
K
L
M
N
O
P
Q
R
S
T
U
V
W
X
Y
Z
Tijdschrift beschrijving
Alle jaargangen van het bijbehorende tijdschrift
Alle afleveringen van het bijbehorende jaargang
Alle artikelen van de bijbehorende aflevering
42 gevonden resultaten
nr
titel
auteur
tijdschrift
jaar
jaarg.
afl.
pagina('s)
type
1
Advance of Dynamic Production-Inventory Strategy for Multiple Policies Using Genetic Algorithm
Chih-Yao Lo
2008
7
4
p. 647-653
artikel
2
Advance of Dynamic Production-Inventory Strategy for Multiple Policies Using Genetic Algorithm
Chih-Yao Lo
2008
7
4
p. 647-653
artikel
3
A Dynamic Clustering-Based Routing Algorithm for Wireless Senor Networks
Kai Zhou
2008
7
4
p. 694-697
artikel
4
A Dynamic Clustering-Based Routing Algorithm for Wireless Senor Networks
Kai Zhou
2008
7
4
p. 694-697
artikel
5
A Novel Unsupervised Color Image Fuzzy Classification Algorithm with Salient Regions
Mingxin Zhang
2008
7
4
p. 560-569
artikel
6
Color Image Fuzzy Classification Algorithm with Salient Regions
Mingxin Zhang
2008
7
4
p. 560-569
artikel
7
Combination of Model Checking and Theorem Proving to Develop and Verify Embedded Software
Zhong Xu
2008
7
4
p. 623-630
artikel
8
Combination of Model Checking and Theorem Proving to Develop and Verify Embedded Software
Zhong Xu
2008
7
4
p. 623-630
artikel
9
Constraint Rectangle: A Novel Approach to Modeling Continuously Moving Objects
Peiquan Jin
2008
7
4
p. 607-614
artikel
10
Constraint Rectangle: A Novel Approach to Modeling Continuously Moving Objects
Peiquan Jin
2008
7
4
p. 607-614
artikel
11
Design of Portable Personal Information Management System with XML Technique
Chen-Feng Wu
2008
7
4
p. 615-622
artikel
12
Design of Portable Personal Information Management System with XML Technique
Chen-Feng Wu
2008
7
4
p. 615-622
artikel
13
D-S Evidence Theory Based Quality Evaluation Mechanism for Network Services
Zhu Haiping
2008
7
4
p. 673-678
artikel
14
D-S Evidence Theory Based Quality Evaluation Mechanism for Network Services
Zhu Haiping
2008
7
4
p. 673-678
artikel
15
Fault Proneness Model for Object-Oriented Software: Design Phase Perspective
R.A. Khan
2008
7
4
p. 698-701
artikel
16
Fault Proneness Model for Object-Oriented Software: Design Phase Perspective
R.A. Khan
2008
7
4
p. 698-701
artikel
17
GRFR: Greedy Rumor Forwarding Routing for Wireless Sensor/Actor Networks
Jiming Chen
2008
7
4
p. 661-666
artikel
18
GRFR: Greedy Rumor Forwarding Routing for Wireless Sensor/Actor Networks
Jiming Chen
2008
7
4
p. 661-666
artikel
19
MaxStd: A Task Scheduling Heuristic for Heterogeneous Computing Environment
Ehsan Ullah Munir
2008
7
4
p. 679-683
artikel
20
MaxStd: A Task Scheduling Heuristic for Heterogeneous Computing Environment
Ehsan Ullah Munir
2008
7
4
p. 679-683
artikel
21
MIMIC-PPT: Mimicking-Based Steganography for Microsoft Power Point Document
Yuling Liu
2008
7
4
p. 654-660
artikel
22
MIMIC-PPT: Mimicking-Based Steganography for Microsoft Power Point Document
Yuling Liu
2008
7
4
p. 654-660
artikel
23
Minimizing Maximum Tardiness in Single Computer Numerical Control Machine Scheduling with Tool Changes
Ming- Cheng Lo
2008
7
4
p. 580-589
artikel
24
Minimizing Maximum Tardiness in Single Computer Numerical Control Machine Scheduling with Tool Changes
Ming- Cheng Lo
2008
7
4
p. 580-589
artikel
25
Mobile Broadband: Comparison of Mobile WiMAX and Cellular 3G/3G+ Technologies
Muhammad Khalil Shahid
2008
7
4
p. 570-579
artikel
26
Mobile Broadband: Comparison of Mobile WiMAX and Cellular 3G/3G+ Technologies
Muhammad Khalil Shahid
2008
7
4
p. 570-579
artikel
27
On P2P and Hybrid Approaches for Replica Placement in Grid Environment
Qaisar Rasool
2008
7
4
p. 590-598
artikel
28
On P2P and Hybrid Approaches for Replica Placement in Grid Environment
Qaisar Rasool
2008
7
4
p. 590-598
artikel
29
Performance Evaluation of Reusable Learning Objects in e-Learning System-A Blended Approach to Make-Learning to Work
M.K. Jayanthi
2008
7
4
p. 667-672
artikel
30
Performance Evaluation of Reusable Learning Objects in e-Learning System-A Blended Approach to Make-Learning to Work
M.K. Jayanthi
2008
7
4
p. 667-672
artikel
31
Petri Net Methods of Constructing Kleene-Closure Operations of Regular Languages
WenJuan Lian
2008
7
4
p. 689-693
artikel
32
Petri Net Methods of Constructing Kleene-Closure Operations of Regular Languages
WenJuan Lian
2008
7
4
p. 689-693
artikel
33
PRI-Based Communication and Collaboration Between Agents
Liguo Liu
2008
7
4
p. 631-638
artikel
34
PRI-Based Communication and Collaboration Between Agents
Liguo Liu
2008
7
4
p. 631-638
artikel
35
QoS Protocol Specification for IEEE 802.11 WLAN
Issam JABRI
2008
7
4
p. 549-559
artikel
36
QoS Protocol Specification for IEEE 802.11 WLAN
Issam JABRI
2008
7
4
p. 549-559
artikel
37
Replicated R-Resilient Process Allocation for Load Distribution in Fault Tolerant System
Jian Wang
2008
7
4
p. 599-606
artikel
38
Replicated R-Resilient Process Allocation for Load Distribution in Fault Tolerant System
Jian Wang
2008
7
4
p. 599-606
artikel
39
Research on Structure Learning of Product Unit Neural Networks by Particle Swarm Optimization
Xian-Hui Wang
2008
7
4
p. 639-646
artikel
40
Research on Structure Learning of Product Unit Neural Networks by Particle Swarm Optimization
Xian-Hui Wang
2008
7
4
p. 639-646
artikel
41
Study on the Capacity of Hopfield Neural Networks
Humayun Karim Sulehria
2008
7
4
p. 684-688
artikel
42
Study on the Capacity of Hopfield Neural Networks
Humayun Karim Sulehria
2008
7
4
p. 684-688
artikel
42 gevonden resultaten
Koninklijke Bibliotheek -
Nationale Bibliotheek van Nederland