Digital Library
Close Browse articles from a journal
     Journal description
       All volumes of the corresponding journal
         All issues of the corresponding volume
                                       All articles of the corresponding issues
 
                             27 results found
no title author magazine year volume issue page(s) type
1 A communication-efficient private matching scheme in Client–Server model Wu, Mu-En
2014
275 C p. 348-359
12 p.
article
2 An enhanced (t,n) threshold directed signature scheme Hwang, Jung Yeon
2014
275 C p. 284-292
9 p.
article
3 Anti-modularity and anti-community detecting in complex networks Chen, Ling
2014
275 C p. 293-313
21 p.
article
4 A set covering based approach to find the reduct of variable precision rough set Liu, James N.K.
2014
275 C p. 83-100
18 p.
article
5 A top-down information theoretic word clustering algorithm for phrase recognition Wu, Yu-Chieh
2014
275 C p. 213-225
13 p.
article
6 Attribute-based key-insulated signature and its applications Chen, Jianhong
2014
275 C p. 57-67
11 p.
article
7 Boosted geometric hashing based indexing technique for finger-knuckle-print database Jayaraman, Umarani
2014
275 C p. 30-44
15 p.
article
8 Cauchy–Peano theorem for Metric Dynamical Systems Nieto, Juan J.
2014
275 C p. 267-283
17 p.
article
9 Ciphertext-policy hierarchical attribute-based encryption with short ciphertexts Deng, Hua
2014
275 C p. 370-384
15 p.
article
10 Construction of n-ary F-polygroups Davvaz, B.
2014
275 C p. 199-212
14 p.
article
11 Control synthesis problem for networked linear sampled-data control systems with band-limited channels Hui, Guotao
2014
275 C p. 385-399
15 p.
article
12 Data-intensive applications, challenges, techniques and technologies: A survey on Big Data Philip Chen, C.L.
2014
275 C p. 314-347
34 p.
article
13 Evaluation of clustering algorithms for financial risk analysis using MCDM methods Kou, Gang
2014
275 C p. 1-12
12 p.
article
14 Fuzzy delay differential equations under generalized differentiability Khastan, A.
2014
275 C p. 145-167
23 p.
article
15 Hand shape identification on multirange images Travieso, Carlos M.
2014
275 C p. 45-56
12 p.
article
16 Identity obfuscation in graphs through the information theoretic lens Bonchi, Francesco
2014
275 C p. 232-256
25 p.
article
17 Inside Front Cover - Editorial Board 2014
275 C p. IFC-
1 p.
article
18 KGMO: A swarm optimization algorithm based on the kinetic energy of gas molecules Moein, Sara
2014
275 C p. 127-144
18 p.
article
19 Oppositional extension of reinforcement learning techniques Mahootchi, M.
2014
275 C p. 101-114
14 p.
article
20 Power system fault diagnosis based on history driven differential evolution and stochastic time domain simulation Zhao, Junhua
2014
275 C p. 13-29
17 p.
article
21 Propagation properties of acoustic waves inside periodic pipelines Jia, Deli
2014
275 C p. 360-369
10 p.
article
22 Reduction of fuzzy automata by means of fuzzy quasi-orders Stamenković, Aleksandar
2014
275 C p. 168-198
31 p.
article
23 Sensitivity to evidence in Gaussian Bayesian networks using mutual information Gómez-Villegas, Miguel Angel
2014
275 C p. 115-126
12 p.
article
24 Single machine group scheduling with time dependent processing times and ready times Wang, Ji-Bo
2014
275 C p. 226-231
6 p.
article
25 Using annotations on Mechanical Turk to perform supervised polarity classification of Spanish customer comments Costa-jussà, Marta R.
2014
275 C p. 400-412
13 p.
article
26 Vertex-pancyclicity of augmented cubes with maximal faulty edges Fu, Jung-Sheng
2014
275 C p. 257-266
10 p.
article
27 View field nearest neighbor: A novel type of spatial queries Yi, Sungmin
2014
275 C p. 68-82
15 p.
article
                             27 results found
 
 Koninklijke Bibliotheek - National Library of the Netherlands