Digital Library
Close
Browse articles from a journal
Search for
Magazine
Article
ISSN
NBN article
NBN magazine
DARE/NARCIS document
with title:
A
B
C
D
E
F
G
H
I
J
K
L
M
N
O
P
Q
R
S
T
U
V
W
X
Y
Z
Journal description
All volumes of the corresponding journal
All issues of the corresponding volume
All articles of the corresponding issues
42 results found
no
title
author
magazine
year
volume
issue
page(s)
type
1
Advance of Dynamic Production-Inventory Strategy for Multiple Policies Using Genetic Algorithm
Chih-Yao Lo
2008
7
4
p. 647-653
article
2
Advance of Dynamic Production-Inventory Strategy for Multiple Policies Using Genetic Algorithm
Chih-Yao Lo
2008
7
4
p. 647-653
article
3
A Dynamic Clustering-Based Routing Algorithm for Wireless Senor Networks
Kai Zhou
2008
7
4
p. 694-697
article
4
A Dynamic Clustering-Based Routing Algorithm for Wireless Senor Networks
Kai Zhou
2008
7
4
p. 694-697
article
5
A Novel Unsupervised Color Image Fuzzy Classification Algorithm with Salient Regions
Mingxin Zhang
2008
7
4
p. 560-569
article
6
Color Image Fuzzy Classification Algorithm with Salient Regions
Mingxin Zhang
2008
7
4
p. 560-569
article
7
Combination of Model Checking and Theorem Proving to Develop and Verify Embedded Software
Zhong Xu
2008
7
4
p. 623-630
article
8
Combination of Model Checking and Theorem Proving to Develop and Verify Embedded Software
Zhong Xu
2008
7
4
p. 623-630
article
9
Constraint Rectangle: A Novel Approach to Modeling Continuously Moving Objects
Peiquan Jin
2008
7
4
p. 607-614
article
10
Constraint Rectangle: A Novel Approach to Modeling Continuously Moving Objects
Peiquan Jin
2008
7
4
p. 607-614
article
11
Design of Portable Personal Information Management System with XML Technique
Chen-Feng Wu
2008
7
4
p. 615-622
article
12
Design of Portable Personal Information Management System with XML Technique
Chen-Feng Wu
2008
7
4
p. 615-622
article
13
D-S Evidence Theory Based Quality Evaluation Mechanism for Network Services
Zhu Haiping
2008
7
4
p. 673-678
article
14
D-S Evidence Theory Based Quality Evaluation Mechanism for Network Services
Zhu Haiping
2008
7
4
p. 673-678
article
15
Fault Proneness Model for Object-Oriented Software: Design Phase Perspective
R.A. Khan
2008
7
4
p. 698-701
article
16
Fault Proneness Model for Object-Oriented Software: Design Phase Perspective
R.A. Khan
2008
7
4
p. 698-701
article
17
GRFR: Greedy Rumor Forwarding Routing for Wireless Sensor/Actor Networks
Jiming Chen
2008
7
4
p. 661-666
article
18
GRFR: Greedy Rumor Forwarding Routing for Wireless Sensor/Actor Networks
Jiming Chen
2008
7
4
p. 661-666
article
19
MaxStd: A Task Scheduling Heuristic for Heterogeneous Computing Environment
Ehsan Ullah Munir
2008
7
4
p. 679-683
article
20
MaxStd: A Task Scheduling Heuristic for Heterogeneous Computing Environment
Ehsan Ullah Munir
2008
7
4
p. 679-683
article
21
MIMIC-PPT: Mimicking-Based Steganography for Microsoft Power Point Document
Yuling Liu
2008
7
4
p. 654-660
article
22
MIMIC-PPT: Mimicking-Based Steganography for Microsoft Power Point Document
Yuling Liu
2008
7
4
p. 654-660
article
23
Minimizing Maximum Tardiness in Single Computer Numerical Control Machine Scheduling with Tool Changes
Ming- Cheng Lo
2008
7
4
p. 580-589
article
24
Minimizing Maximum Tardiness in Single Computer Numerical Control Machine Scheduling with Tool Changes
Ming- Cheng Lo
2008
7
4
p. 580-589
article
25
Mobile Broadband: Comparison of Mobile WiMAX and Cellular 3G/3G+ Technologies
Muhammad Khalil Shahid
2008
7
4
p. 570-579
article
26
Mobile Broadband: Comparison of Mobile WiMAX and Cellular 3G/3G+ Technologies
Muhammad Khalil Shahid
2008
7
4
p. 570-579
article
27
On P2P and Hybrid Approaches for Replica Placement in Grid Environment
Qaisar Rasool
2008
7
4
p. 590-598
article
28
On P2P and Hybrid Approaches for Replica Placement in Grid Environment
Qaisar Rasool
2008
7
4
p. 590-598
article
29
Performance Evaluation of Reusable Learning Objects in e-Learning System-A Blended Approach to Make-Learning to Work
M.K. Jayanthi
2008
7
4
p. 667-672
article
30
Performance Evaluation of Reusable Learning Objects in e-Learning System-A Blended Approach to Make-Learning to Work
M.K. Jayanthi
2008
7
4
p. 667-672
article
31
Petri Net Methods of Constructing Kleene-Closure Operations of Regular Languages
WenJuan Lian
2008
7
4
p. 689-693
article
32
Petri Net Methods of Constructing Kleene-Closure Operations of Regular Languages
WenJuan Lian
2008
7
4
p. 689-693
article
33
PRI-Based Communication and Collaboration Between Agents
Liguo Liu
2008
7
4
p. 631-638
article
34
PRI-Based Communication and Collaboration Between Agents
Liguo Liu
2008
7
4
p. 631-638
article
35
QoS Protocol Specification for IEEE 802.11 WLAN
Issam JABRI
2008
7
4
p. 549-559
article
36
QoS Protocol Specification for IEEE 802.11 WLAN
Issam JABRI
2008
7
4
p. 549-559
article
37
Replicated R-Resilient Process Allocation for Load Distribution in Fault Tolerant System
Jian Wang
2008
7
4
p. 599-606
article
38
Replicated R-Resilient Process Allocation for Load Distribution in Fault Tolerant System
Jian Wang
2008
7
4
p. 599-606
article
39
Research on Structure Learning of Product Unit Neural Networks by Particle Swarm Optimization
Xian-Hui Wang
2008
7
4
p. 639-646
article
40
Research on Structure Learning of Product Unit Neural Networks by Particle Swarm Optimization
Xian-Hui Wang
2008
7
4
p. 639-646
article
41
Study on the Capacity of Hopfield Neural Networks
Humayun Karim Sulehria
2008
7
4
p. 684-688
article
42
Study on the Capacity of Hopfield Neural Networks
Humayun Karim Sulehria
2008
7
4
p. 684-688
article
42 results found
Koninklijke Bibliotheek -
National Library of the Netherlands