nr |
titel |
auteur |
tijdschrift |
jaar |
jaarg. |
afl. |
pagina('s) |
type |
1 |
A communication-efficient private matching scheme in Client–Server model
|
Wu, Mu-En |
|
2014 |
275 |
C |
p. 348-359 12 p. |
artikel |
2 |
An enhanced (t,n) threshold directed signature scheme
|
Hwang, Jung Yeon |
|
2014 |
275 |
C |
p. 284-292 9 p. |
artikel |
3 |
Anti-modularity and anti-community detecting in complex networks
|
Chen, Ling |
|
2014 |
275 |
C |
p. 293-313 21 p. |
artikel |
4 |
A set covering based approach to find the reduct of variable precision rough set
|
Liu, James N.K. |
|
2014 |
275 |
C |
p. 83-100 18 p. |
artikel |
5 |
A top-down information theoretic word clustering algorithm for phrase recognition
|
Wu, Yu-Chieh |
|
2014 |
275 |
C |
p. 213-225 13 p. |
artikel |
6 |
Attribute-based key-insulated signature and its applications
|
Chen, Jianhong |
|
2014 |
275 |
C |
p. 57-67 11 p. |
artikel |
7 |
Boosted geometric hashing based indexing technique for finger-knuckle-print database
|
Jayaraman, Umarani |
|
2014 |
275 |
C |
p. 30-44 15 p. |
artikel |
8 |
Cauchy–Peano theorem for Metric Dynamical Systems
|
Nieto, Juan J. |
|
2014 |
275 |
C |
p. 267-283 17 p. |
artikel |
9 |
Ciphertext-policy hierarchical attribute-based encryption with short ciphertexts
|
Deng, Hua |
|
2014 |
275 |
C |
p. 370-384 15 p. |
artikel |
10 |
Construction of n-ary F-polygroups
|
Davvaz, B. |
|
2014 |
275 |
C |
p. 199-212 14 p. |
artikel |
11 |
Control synthesis problem for networked linear sampled-data control systems with band-limited channels
|
Hui, Guotao |
|
2014 |
275 |
C |
p. 385-399 15 p. |
artikel |
12 |
Data-intensive applications, challenges, techniques and technologies: A survey on Big Data
|
Philip Chen, C.L. |
|
2014 |
275 |
C |
p. 314-347 34 p. |
artikel |
13 |
Evaluation of clustering algorithms for financial risk analysis using MCDM methods
|
Kou, Gang |
|
2014 |
275 |
C |
p. 1-12 12 p. |
artikel |
14 |
Fuzzy delay differential equations under generalized differentiability
|
Khastan, A. |
|
2014 |
275 |
C |
p. 145-167 23 p. |
artikel |
15 |
Hand shape identification on multirange images
|
Travieso, Carlos M. |
|
2014 |
275 |
C |
p. 45-56 12 p. |
artikel |
16 |
Identity obfuscation in graphs through the information theoretic lens
|
Bonchi, Francesco |
|
2014 |
275 |
C |
p. 232-256 25 p. |
artikel |
17 |
Inside Front Cover - Editorial Board
|
|
|
2014 |
275 |
C |
p. IFC- 1 p. |
artikel |
18 |
KGMO: A swarm optimization algorithm based on the kinetic energy of gas molecules
|
Moein, Sara |
|
2014 |
275 |
C |
p. 127-144 18 p. |
artikel |
19 |
Oppositional extension of reinforcement learning techniques
|
Mahootchi, M. |
|
2014 |
275 |
C |
p. 101-114 14 p. |
artikel |
20 |
Power system fault diagnosis based on history driven differential evolution and stochastic time domain simulation
|
Zhao, Junhua |
|
2014 |
275 |
C |
p. 13-29 17 p. |
artikel |
21 |
Propagation properties of acoustic waves inside periodic pipelines
|
Jia, Deli |
|
2014 |
275 |
C |
p. 360-369 10 p. |
artikel |
22 |
Reduction of fuzzy automata by means of fuzzy quasi-orders
|
Stamenković, Aleksandar |
|
2014 |
275 |
C |
p. 168-198 31 p. |
artikel |
23 |
Sensitivity to evidence in Gaussian Bayesian networks using mutual information
|
Gómez-Villegas, Miguel Angel |
|
2014 |
275 |
C |
p. 115-126 12 p. |
artikel |
24 |
Single machine group scheduling with time dependent processing times and ready times
|
Wang, Ji-Bo |
|
2014 |
275 |
C |
p. 226-231 6 p. |
artikel |
25 |
Using annotations on Mechanical Turk to perform supervised polarity classification of Spanish customer comments
|
Costa-jussà, Marta R. |
|
2014 |
275 |
C |
p. 400-412 13 p. |
artikel |
26 |
Vertex-pancyclicity of augmented cubes with maximal faulty edges
|
Fu, Jung-Sheng |
|
2014 |
275 |
C |
p. 257-266 10 p. |
artikel |
27 |
View field nearest neighbor: A novel type of spatial queries
|
Yi, Sungmin |
|
2014 |
275 |
C |
p. 68-82 15 p. |
artikel |