Digitale Bibliotheek
Sluiten Bladeren door artikelen uit een tijdschrift
     Tijdschrift beschrijving
       Alle jaargangen van het bijbehorende tijdschrift
         Alle afleveringen van het bijbehorende jaargang
                                       Alle artikelen van de bijbehorende aflevering
 
                             37 gevonden resultaten
nr titel auteur tijdschrift jaar jaarg. afl. pagina('s) type
1 Active Contours without Edges and Curvature Analysis for Endoscopic Image Classification B. V. Dhandra
2007
1 p. 19-32
artikel
2 A Encryption Based Dynamic and Secure Routing Protocol for Mobile Ad Hoc Network Pankaj Kumar Sehgal
2009
1 p. 16-22
artikel
3 A Multi-Operator Based Simulated Annealing Approach For Robot Navigation in Uncertain Environments Hui Miao
2010
1 p. 50-61
artikel
4 Analysis & Integrated Modeling of the Performance Evaluation Techniques for Evaluating Parallel Systems Amit Chhabra
2007
1 p. 1-10
artikel
5 An Ant Algorithm for Solving QoS Multicast Routing Problem Ahmed Younes Hamed
2011
1 p. 156-167
artikel
6 A Novel Mathematical Based Method for Generating Virtual Samples from a Frontal 2D Face Image for Single Training Sample Face Recognition Reza Ebrahimpour, Masoom Nazari, Mehdi Azizi, Mahdieh Rezvan
2011
1 p. 64-71
artikel
7 A Novel Secure Key Agreement Protocol using Trusted Third Party Sairam Kulkarni
2007
1 p. 11-18
artikel
8 A REVIEW OF STUDIES ON MACHINE LEARNING TECHNIQUES Yogesh Singh
2007
1 p. 70-84
artikel
9 A REVIEW PAPER ON AD HOC NETWORK SECURITY Karan Singh
2007
1 p. 52-69
artikel
10 Asking Users: A Continuous Evaluation on Systems in a Controlled Environment Dayang Rohaya Awang Rambli
2009
1 p. 34-42
artikel
11 A Survey on MANET Intrusion Detection Satria Mandala
2008
1 p. 1-11
artikel
12 Authentication and Authorization Models More V.N
2011
1 p. 72-84
artikel
13 Car-Following Parameters by Means of Cellular Automata in the Case of Evacuation Kohei Arai, Tri Harsono & Achmad Basuki
2011
1 p. 28-38
artikel
14 Detecting and preventing attacks using network intrusion detection systems MeeraGandhi
2008
1 p. 49-58
artikel
15 Development of Predictor for Sequence Derived Features From Amino Acid Sequence Using Associate Rule Mining Manpreet Singh, Gurvinder Singh
2011
1 p. 14-27
artikel
16 Diacritic Oriented Arabic Information Retrieval System Khalid Saleh Aloufi
2011
1 p. 143-155
artikel
17 Exploring Knowledge for a Common Man through Mobile Services and Knowledge Discovery in Databases Mayank Dave
2009
1 p. 43-61
artikel
18 GPS-less Localization Protocol for Underwater Acoustic Networks Al-Khalid Othman
2008
1 p. 34-48
artikel
19 ID-Based Directed Multi-Proxy Signature Scheme from Bilinear Pairings B.Umaprasada Rao & P.Vasudeva Reddy
2011
1 p. 107-117
artikel
20 Image Recognition With the Help of Auto-Associative Neural Network Moumi Pandit, Mousumi Gupta
2011
1 p. 54-63
artikel
21 IMPLEMENTATION OF ECHOSTATE NETWORK IN NIDS Meera Gandhi
2008
1 p. 73-86
artikel
22 Implementation of Radial Basis Function Neural Network for Image Steganalysis Sambasiva Rao Baragada
2008
1 p. 12-22
artikel
23 Information Technology (IT) Security Framework for Kenyan Small and Medium Enterprises (SMEs) Michael Kimwele, Waweru Mwangi, Stephen Kimani
2011
1 p. 39-53
artikel
24 Integration of Least Recently Used Algorithm and Neuro-Fuzzy System into Client-side Web Caching Siti Mariyam Shamsuddin
2009
1 p. 1-15
artikel
25 MMI Diversity Based Text Summarization Ladda Suanmali
2009
1 p. 23-33
artikel
26 Morphological Reconstruction for Word Level Script Identification B.V.Dhandra
2007
1 p. 41-51
artikel
27 On the use of continued fractions for electronic cash Amadou Moctar Kane
2010
1 p. 136-148
artikel
28 RB-GDM: A Role-Based Grid Delegation Model G Geethakumari
2008
1 p. 61-72
artikel
29 Recognition of Non-Compound Handwritten Devnagari Characters using a Combination of MLP and Minimum Edit Distance S. Arora, D. Bhattacharjee, M. Nasipuri, D. K. Basu & M. Kundu
2010
1 p. 107-120
artikel
30 Secure E-Commerce Protocol Khalid Haseeb, Muhammad Arshad, Shoukat Ali, Shazia Yasin
2011
1 p. 132-142
artikel
31 Security Architecture for On-Line Mutual Funds Trading With Multiple Mobile Agents Nirmala C R & V.Ramaswamy
2011
1 p. 98-106
artikel
32 Security Model for Hierarchical Clustered Wireless Sensor Networks Kalpana Sharma, S. K. Ghosh, M.K. Ghose
2011
1 p. 85-97
artikel
33 Segmentation of Malay Syllables in Connected Digit Speech Using Statistical Approach M-S Salam
2008
1 p. 23-33
artikel
34 Simple Encryption/Decryption Application Majdi Al-qdah
2007
1 p. 33-40
artikel
35 Stream Processing Environmental Applications in Jordan Valley Iyad Ahmad Aldasouqi, Jalal Atoum
2011
1 p. 1-13
artikel
36 Systematic Digital Forensic Investigation Model Systematic Digital Forensic Investigation Model
2011
1 p. 118-131
artikel
37 Texting satisfaction: does age and gender make a difference? Vimala Balakrishnan
2007
1 p. 85-96
artikel
                             37 gevonden resultaten
 
 Koninklijke Bibliotheek - Nationale Bibliotheek van Nederland