nr |
titel |
auteur |
tijdschrift |
jaar |
jaarg. |
afl. |
pagina('s) |
type |
1 |
Analytic network process for pattern classification problems using genetic algorithms
|
Hu, Yi-Chung |
|
2010 |
180 |
13 |
p. 2528-2539 12 p. |
artikel |
2 |
Conditional edge-fault Hamiltonicity of augmented cubes
|
Hsieh, Sun-Yuan |
|
2010 |
180 |
13 |
p. 2596-2617 22 p. |
artikel |
3 |
C-PSA: Constrained Pareto simulated annealing for constrained multi-objective optimization
|
Singh, Hemant Kumar |
|
2010 |
180 |
13 |
p. 2499-2513 15 p. |
artikel |
4 |
Evolving decision tree rule based system for audio stego anomalies detection based on Hausdorff distance statistics
|
Geetha, S. |
|
2010 |
180 |
13 |
p. 2540-2559 20 p. |
artikel |
5 |
Generating probabilistic Boolean networks from a prescribed stationary distribution
|
Zhang, Shu-Qin |
|
2010 |
180 |
13 |
p. 2560-2570 11 p. |
artikel |
6 |
Improving bounds on link failure tolerance of the star graph
|
Walker, David |
|
2010 |
180 |
13 |
p. 2571-2575 5 p. |
artikel |
7 |
Inside Front Cover - Editorial Board
|
|
|
2010 |
180 |
13 |
p. IFC- 1 p. |
artikel |
8 |
Minimizing the expected complete influence time of a social network
|
Ni, Yaodong |
|
2010 |
180 |
13 |
p. 2514-2527 14 p. |
artikel |
9 |
Proxy re-encryption with keyword search
|
Shao, Jun |
|
2010 |
180 |
13 |
p. 2576-2587 12 p. |
artikel |
10 |
Secure threshold multi authority attribute based encryption without a central authority
|
Lin, Huang |
|
2010 |
180 |
13 |
p. 2618-2632 15 p. |
artikel |
11 |
Two-node-Hamiltonicity of enhanced pyramid networks
|
Chen, Yi-Ching |
|
2010 |
180 |
13 |
p. 2588-2595 8 p. |
artikel |