Digital Library
Close Browse articles from a journal
     Journal description
       All volumes of the corresponding journal
         All issues of the corresponding volume
                                       All articles of the corresponding issues
 
                             16 results found
no title author magazine year volume issue page(s) type
1 A generalization of the migrativity property of aggregation functions Bustince, H.
2012
191 C p. 76-85
10 p.
article
2 An evolutionary programming based asymmetric weighted least squares support vector machine ensemble learning methodology for software repository mining Yu, Lean
2012
191 C p. 31-46
16 p.
article
3 An integrated risk measurement and optimization model for trustworthy software process management Li, Jianping
2012
191 C p. 47-60
14 p.
article
4 A non-functional requirements tradeoff model in Trustworthy Software Zhu, Ming-Xun
2012
191 C p. 61-75
15 p.
article
5 A trust prediction framework in rating-based experience sharing social networks without a Web of Trust Kim, Young Ae
2012
191 C p. 128-145
18 p.
article
6 Data mining for software trustworthiness Kou, Gang
2012
191 C p. 1-2
2 p.
article
7 High-payload image hiding with quality recovery using tri-way pixel-value differencing Lee, Yen-Po
2012
191 C p. 214-225
12 p.
article
8 Improving feature space based image segmentation via density modification Sen, Debashis
2012
191 C p. 169-191
23 p.
article
9 Inside Front Cover - Editorial Board 2012
191 C p. IFC-
1 p.
article
10 Limiting disclosure of sensitive data in sequential releases of databases Shmueli, Erez
2012
191 C p. 98-127
30 p.
article
11 Nondeterministic fuzzy automata Cao, Yongzhi
2012
191 C p. 86-97
12 p.
article
12 On the use of cross-validation for time series predictor evaluation Bergmeir, Christoph
2012
191 C p. 192-213
22 p.
article
13 On the use of multi neighbourhood structures within a Tabu-based memetic approach to university timetabling problems Abdullah, Salwani
2012
191 C p. 146-168
23 p.
article
14 Searching for rules to detect defective modules: A subgroup discovery approach Rodríguez, D.
2012
191 C p. 14-30
17 p.
article
15 Similarity-based training set acquisition for continuous handwriting recognition Sas, Jerzy
2012
191 C p. 226-244
19 p.
article
16 User preferences based software defect detection algorithms selection using MCDM Peng, Yi
2012
191 C p. 3-13
11 p.
article
                             16 results found
 
 Koninklijke Bibliotheek - National Library of the Netherlands