nr |
titel |
auteur |
tijdschrift |
jaar |
jaarg. |
afl. |
pagina('s) |
type |
1 |
A generalization of the migrativity property of aggregation functions
|
Bustince, H. |
|
2012 |
191 |
C |
p. 76-85 10 p. |
artikel |
2 |
An evolutionary programming based asymmetric weighted least squares support vector machine ensemble learning methodology for software repository mining
|
Yu, Lean |
|
2012 |
191 |
C |
p. 31-46 16 p. |
artikel |
3 |
An integrated risk measurement and optimization model for trustworthy software process management
|
Li, Jianping |
|
2012 |
191 |
C |
p. 47-60 14 p. |
artikel |
4 |
A non-functional requirements tradeoff model in Trustworthy Software
|
Zhu, Ming-Xun |
|
2012 |
191 |
C |
p. 61-75 15 p. |
artikel |
5 |
A trust prediction framework in rating-based experience sharing social networks without a Web of Trust
|
Kim, Young Ae |
|
2012 |
191 |
C |
p. 128-145 18 p. |
artikel |
6 |
Data mining for software trustworthiness
|
Kou, Gang |
|
2012 |
191 |
C |
p. 1-2 2 p. |
artikel |
7 |
High-payload image hiding with quality recovery using tri-way pixel-value differencing
|
Lee, Yen-Po |
|
2012 |
191 |
C |
p. 214-225 12 p. |
artikel |
8 |
Improving feature space based image segmentation via density modification
|
Sen, Debashis |
|
2012 |
191 |
C |
p. 169-191 23 p. |
artikel |
9 |
Inside Front Cover - Editorial Board
|
|
|
2012 |
191 |
C |
p. IFC- 1 p. |
artikel |
10 |
Limiting disclosure of sensitive data in sequential releases of databases
|
Shmueli, Erez |
|
2012 |
191 |
C |
p. 98-127 30 p. |
artikel |
11 |
Nondeterministic fuzzy automata
|
Cao, Yongzhi |
|
2012 |
191 |
C |
p. 86-97 12 p. |
artikel |
12 |
On the use of cross-validation for time series predictor evaluation
|
Bergmeir, Christoph |
|
2012 |
191 |
C |
p. 192-213 22 p. |
artikel |
13 |
On the use of multi neighbourhood structures within a Tabu-based memetic approach to university timetabling problems
|
Abdullah, Salwani |
|
2012 |
191 |
C |
p. 146-168 23 p. |
artikel |
14 |
Searching for rules to detect defective modules: A subgroup discovery approach
|
RodrÃguez, D. |
|
2012 |
191 |
C |
p. 14-30 17 p. |
artikel |
15 |
Similarity-based training set acquisition for continuous handwriting recognition
|
Sas, Jerzy |
|
2012 |
191 |
C |
p. 226-244 19 p. |
artikel |
16 |
User preferences based software defect detection algorithms selection using MCDM
|
Peng, Yi |
|
2012 |
191 |
C |
p. 3-13 11 p. |
artikel |