nr |
titel |
auteur |
tijdschrift |
jaar |
jaarg. |
afl. |
pagina('s) |
type |
1 |
A knapsack-based probabilistic encryption scheme
|
Wang, Baocang |
|
2007 |
177 |
19 |
p. 3981-3994 14 p. |
artikel |
2 |
A knowledge engineering approach to knowledge management
|
Lai, Lien F. |
|
2007 |
177 |
19 |
p. 4072-4094 23 p. |
artikel |
3 |
A study on two measurements-to-tracks data assignment algorithms
|
Xu, Ben-Lian |
|
2007 |
177 |
19 |
p. 4176-4187 12 p. |
artikel |
4 |
Comparative tests of solution methods for signal-controlled road networks
|
Chiou, Suh-Wen |
|
2007 |
177 |
19 |
p. 4109-4121 13 p. |
artikel |
5 |
Computing the λ-covers of a string
|
Guo, Qing |
|
2007 |
177 |
19 |
p. 3957-3967 11 p. |
artikel |
6 |
Delegation with supervision
|
Lui, Richard W.C. |
|
2007 |
177 |
19 |
p. 4014-4030 17 p. |
artikel |
7 |
Design and development of Distributed Virtual Geographic Environment system based on web services
|
Zhang, Jianqin |
|
2007 |
177 |
19 |
p. 3968-3980 13 p. |
artikel |
8 |
Design of robust active queue management controllers for a class of TCP communication networks
|
Chen, Chang-Kuo |
|
2007 |
177 |
19 |
p. 4059-4071 13 p. |
artikel |
9 |
EC2C-PAKA: An efficient client-to-client password-authenticated key agreement
|
Byun, Jin Wook |
|
2007 |
177 |
19 |
p. 3995-4013 19 p. |
artikel |
10 |
How to construct secure proxy cryptosystem
|
Zhou, Yuan |
|
2007 |
177 |
19 |
p. 4095-4108 14 p. |
artikel |
11 |
Inside Front Cover - Editorial Board
|
|
|
2007 |
177 |
19 |
p. IFC- 1 p. |
artikel |
12 |
Node-disjoint paths in hierarchical hypercube networks
|
Wu, Ruei-Yu |
|
2007 |
177 |
19 |
p. 4200-4207 8 p. |
artikel |
13 |
On definable concepts of rough set models
|
Pei, Daowu |
|
2007 |
177 |
19 |
p. 4230-4239 10 p. |
artikel |
14 |
On the strength of hyperclique patterns for text categorization
|
Qian, Tieyun |
|
2007 |
177 |
19 |
p. 4040-4058 19 p. |
artikel |
15 |
Optimization of fuzzy relational equations with max-av composition
|
Wu, Yan-Kuen |
|
2007 |
177 |
19 |
p. 4216-4229 14 p. |
artikel |
16 |
Proof that pyramid networks are 1-Hamiltonian-connected with high probability
|
Duh, Dyi-Rong |
|
2007 |
177 |
19 |
p. 4188-4199 12 p. |
artikel |
17 |
Rényi information measure for a used item
|
Nanda, Asok K. |
|
2007 |
177 |
19 |
p. 4161-4175 15 p. |
artikel |
18 |
Security enhancement for digital signature schemes with fault tolerance in RSA
|
Lin, Iuon-Chang |
|
2007 |
177 |
19 |
p. 4031-4039 9 p. |
artikel |
19 |
Solutions of fuzzy relation equations based on continuous t-norms
|
Shieh, Bih-Sheue |
|
2007 |
177 |
19 |
p. 4208-4215 8 p. |
artikel |
20 |
The effect of reading policy on early join result production
|
Lawrence, Ramon |
|
2007 |
177 |
19 |
p. 3939-3956 18 p. |
artikel |
21 |
The uncovering of hidden structures by Latent Semantic Analysis
|
Valle-Lisboa, Juan C. |
|
2007 |
177 |
19 |
p. 4122-4147 26 p. |
artikel |
22 |
Threshold cryptography based on Asmuth–Bloom secret sharing
|
Kaya, Kamer |
|
2007 |
177 |
19 |
p. 4148-4160 13 p. |
artikel |