Digital Library
Close Browse articles from a journal
     Journal description
       All volumes of the corresponding journal
         All issues of the corresponding volume
                                       All articles of the corresponding issues
 
                             42 results found
no title author magazine year volume issue page(s) type
1 Advance of Dynamic Production-Inventory Strategy for Multiple Policies Using Genetic Algorithm Chih-Yao Lo
2008
7 4 p. 647-653
article
2 Advance of Dynamic Production-Inventory Strategy for Multiple Policies Using Genetic Algorithm Chih-Yao Lo
2008
7 4 p. 647-653
article
3 A Dynamic Clustering-Based Routing Algorithm for Wireless Senor Networks Kai Zhou
2008
7 4 p. 694-697
article
4 A Dynamic Clustering-Based Routing Algorithm for Wireless Senor Networks Kai Zhou
2008
7 4 p. 694-697
article
5 A Novel Unsupervised Color Image Fuzzy Classification Algorithm with Salient Regions Mingxin Zhang
2008
7 4 p. 560-569
article
6 Color Image Fuzzy Classification Algorithm with Salient Regions Mingxin Zhang
2008
7 4 p. 560-569
article
7 Combination of Model Checking and Theorem Proving to Develop and Verify Embedded Software Zhong Xu
2008
7 4 p. 623-630
article
8 Combination of Model Checking and Theorem Proving to Develop and Verify Embedded Software Zhong Xu
2008
7 4 p. 623-630
article
9 Constraint Rectangle: A Novel Approach to Modeling Continuously Moving Objects Peiquan Jin
2008
7 4 p. 607-614
article
10 Constraint Rectangle: A Novel Approach to Modeling Continuously Moving Objects Peiquan Jin
2008
7 4 p. 607-614
article
11 Design of Portable Personal Information Management System with XML Technique Chen-Feng Wu
2008
7 4 p. 615-622
article
12 Design of Portable Personal Information Management System with XML Technique Chen-Feng Wu
2008
7 4 p. 615-622
article
13 D-S Evidence Theory Based Quality Evaluation Mechanism for Network Services Zhu Haiping
2008
7 4 p. 673-678
article
14 D-S Evidence Theory Based Quality Evaluation Mechanism for Network Services Zhu Haiping
2008
7 4 p. 673-678
article
15 Fault Proneness Model for Object-Oriented Software: Design Phase Perspective R.A. Khan
2008
7 4 p. 698-701
article
16 Fault Proneness Model for Object-Oriented Software: Design Phase Perspective R.A. Khan
2008
7 4 p. 698-701
article
17 GRFR: Greedy Rumor Forwarding Routing for Wireless Sensor/Actor Networks Jiming Chen
2008
7 4 p. 661-666
article
18 GRFR: Greedy Rumor Forwarding Routing for Wireless Sensor/Actor Networks Jiming Chen
2008
7 4 p. 661-666
article
19 MaxStd: A Task Scheduling Heuristic for Heterogeneous Computing Environment Ehsan Ullah Munir
2008
7 4 p. 679-683
article
20 MaxStd: A Task Scheduling Heuristic for Heterogeneous Computing Environment Ehsan Ullah Munir
2008
7 4 p. 679-683
article
21 MIMIC-PPT: Mimicking-Based Steganography for Microsoft Power Point Document Yuling Liu
2008
7 4 p. 654-660
article
22 MIMIC-PPT: Mimicking-Based Steganography for Microsoft Power Point Document Yuling Liu
2008
7 4 p. 654-660
article
23 Minimizing Maximum Tardiness in Single Computer Numerical Control Machine Scheduling with Tool Changes Ming- Cheng Lo
2008
7 4 p. 580-589
article
24 Minimizing Maximum Tardiness in Single Computer Numerical Control Machine Scheduling with Tool Changes Ming- Cheng Lo
2008
7 4 p. 580-589
article
25 Mobile Broadband: Comparison of Mobile WiMAX and Cellular 3G/3G+ Technologies Muhammad Khalil Shahid
2008
7 4 p. 570-579
article
26 Mobile Broadband: Comparison of Mobile WiMAX and Cellular 3G/3G+ Technologies Muhammad Khalil Shahid
2008
7 4 p. 570-579
article
27 On P2P and Hybrid Approaches for Replica Placement in Grid Environment Qaisar Rasool
2008
7 4 p. 590-598
article
28 On P2P and Hybrid Approaches for Replica Placement in Grid Environment Qaisar Rasool
2008
7 4 p. 590-598
article
29 Performance Evaluation of Reusable Learning Objects in e-Learning System-A Blended Approach to Make-Learning to Work M.K. Jayanthi
2008
7 4 p. 667-672
article
30 Performance Evaluation of Reusable Learning Objects in e-Learning System-A Blended Approach to Make-Learning to Work M.K. Jayanthi
2008
7 4 p. 667-672
article
31 Petri Net Methods of Constructing Kleene-Closure Operations of Regular Languages WenJuan Lian
2008
7 4 p. 689-693
article
32 Petri Net Methods of Constructing Kleene-Closure Operations of Regular Languages WenJuan Lian
2008
7 4 p. 689-693
article
33 PRI-Based Communication and Collaboration Between Agents Liguo Liu
2008
7 4 p. 631-638
article
34 PRI-Based Communication and Collaboration Between Agents Liguo Liu
2008
7 4 p. 631-638
article
35 QoS Protocol Specification for IEEE 802.11 WLAN Issam JABRI
2008
7 4 p. 549-559
article
36 QoS Protocol Specification for IEEE 802.11 WLAN Issam JABRI
2008
7 4 p. 549-559
article
37 Replicated R-Resilient Process Allocation for Load Distribution in Fault Tolerant System Jian Wang
2008
7 4 p. 599-606
article
38 Replicated R-Resilient Process Allocation for Load Distribution in Fault Tolerant System Jian Wang
2008
7 4 p. 599-606
article
39 Research on Structure Learning of Product Unit Neural Networks by Particle Swarm Optimization Xian-Hui Wang
2008
7 4 p. 639-646
article
40 Research on Structure Learning of Product Unit Neural Networks by Particle Swarm Optimization Xian-Hui Wang
2008
7 4 p. 639-646
article
41 Study on the Capacity of Hopfield Neural Networks Humayun Karim Sulehria
2008
7 4 p. 684-688
article
42 Study on the Capacity of Hopfield Neural Networks Humayun Karim Sulehria
2008
7 4 p. 684-688
article
                             42 results found
 
 Koninklijke Bibliotheek - National Library of the Netherlands