Digitale Bibliotheek
Sluiten Bladeren door artikelen uit een tijdschrift
     Tijdschrift beschrijving
       Alle jaargangen van het bijbehorende tijdschrift
         Alle afleveringen van het bijbehorende jaargang
                                       Alle artikelen van de bijbehorende aflevering
 
                             167 gevonden resultaten
nr titel auteur tijdschrift jaar jaarg. afl. pagina('s) type
1 Access protocols for optical burst-switched ring networks Xu, Lisong
2003
349-350 1-3 p. 75-81
7 p.
artikel
2 A certainty equivalence principle based nonlinear separation control rule for random access channels: Stability and delay analysis Thomopoulos, Stelios C.A.
1991
349-350 1-3 p. 75-111
37 p.
artikel
3 A constant time algorithm for theorem proving in propositional logic on reconfigurable meshes Pradeep, B.
1995
349-350 1-3 p. 175-184
10 p.
artikel
4 A database clustering methodology and tool Ryu, Tae-Wan
2005
349-350 1-3 p. 29-59
31 p.
artikel
5 A discrete method for studying indifference and order relations between fuzzy numbers González, Antonio
1991
349-350 1-3 p. 245-258
14 p.
artikel
6 A formal model of diagnostic inference, II. Algorithmic solution and application Reggia, James A.
1985
349-350 1-3 p. 257-285
29 p.
artikel
7 A formal model of diagnostic inference. I. Problem formulation and decomposition Reggia, James A.
1985
349-350 1-3 p. 227-256
30 p.
artikel
8 A formal power series approach to the construction of minimal fuzzy automata Ray, A.K.
1991
349-350 1-3 p. 189-207
19 p.
artikel
9 A framework for multi-source data fusion Yager, Ronald R.
2004
349-350 1-3 p. 175-200
26 p.
artikel
10 A fuzzy algorithm for priority estimation in Immediate Area Networks Henne, A.Marlow
1991
349-350 1-3 p. 209-237
29 p.
artikel
11 A general heuristic bottom-up procedure for searching and/or graphs Kumar, Vipin
1991
349-350 1-3 p. 39-57
19 p.
artikel
12 A hierarchical perception-linked model for machine recognition of phonemes Datta, A.K.
1991
349-350 1-3 p. 259-269
11 p.
artikel
13 A hybrid decision tree/genetic algorithm method for data mining Carvalho, Deborah R.
2004
349-350 1-3 p. 13-35
23 p.
artikel
14 A hybrid search algorithm with heuristics for resource allocation problem Lee, Zne-Jung
2005
349-350 1-3 p. 155-167
13 p.
artikel
15 A LCOS microdisplay driver with frame buffer pixels Lee, Sangrok
2003
349-350 1-3 p. 3-11
9 p.
artikel
16 Algorithms for finding and updating minimum-depth spanning trees in parallel Chaudhuri, Pranay
1995
349-350 1-3 p. 171-183
13 p.
artikel
17 A method for the expansion and contraction of text's size by using the string replacement algorithm Tsuda, Kazuhiko
1995
349-350 1-3 p. 47-64
18 p.
artikel
18 A model for an expert system for medium access control in a local area network Maule, Ruth Anne
1985
349-350 1-3 p. 39-83
45 p.
artikel
19 An almost machine-independent theory of program-length complexity, sophistication, and induction Koppel, Moshe
1991
349-350 1-3 p. 23-33
11 p.
artikel
20 Analytic properties of maximum entropy OWA operators Filev, Dimitar
1995
349-350 1-3 p. 11-27
17 p.
artikel
21 An approach to module distribution for the design of embedded distributed software systems Yau, Stephen S.
1991
349-350 1-3 p. 1-22
22 p.
artikel
22 An automatic selection method and its application to key search algorithms Park, Ki-Hong
1995
349-350 1-3 p. 127-146
20 p.
artikel
23 A new notion of fuzzy compactness in L-topological spaces Shi, Fu-Gui
2005
349-350 1-3 p. 35-48
14 p.
artikel
24 An extensible model of selectivity estimation Mannino, Michael V.
1989
349-350 1-3 p. 225-247
23 p.
artikel
25 An extreme limit theorem for dependency bounds of normalized sums of random variables Williamson, Robert C.
1991
349-350 1-3 p. 113-141
29 p.
artikel
26 An integer linear programming approach to data allocation with the minimum total communication cost in distributed database systems Lin, Xuemin
1995
349-350 1-3 p. 1-10
10 p.
artikel
27 An isomorphic Fourier transform approach to light propagation in AWGs, FBGs, and photonic crystals Parker, Michael C
2003
349-350 1-3 p. 41-51
11 p.
artikel
28 An optimal algorithm for solving the searchlight guarding problem on weighted trees Yen, William C.K.
1995
349-350 1-3 p. 79-105
27 p.
artikel
29 A note on allocating k-ary multiple key hashing files among multiple disks Chang, C.C.
1991
349-350 1-3 p. 69-76
8 p.
artikel
30 A note on fuzzy relations and fuzzy groups Malik, D.S.
1991
349-350 1-3 p. 193-198
6 p.
artikel
31 A practical unification algorithm Purdom, Paul W.
1991
349-350 1-3 p. 123-127
5 p.
artikel
32 A robust method for understanding NL interface commands in the ICI Intelligent Command Interpreter Mima, Hideki
1995
349-350 1-3 p. 185-198
14 p.
artikel
33 A roughness measure for fuzzy sets Huynh, Van-Nam
2005
349-350 1-3 p. 255-275
21 p.
artikel
34 A segment-wise time warping method for time scaling searching Zhou, Mi
2005
349-350 1-3 p. 227-254
28 p.
artikel
35 A short technical note: Comments on “trigonometric entropies, Jensen difference divergence measures, and error bounds” Ramachandran, K.M.
1991
349-350 1-3 p. 283-284
2 p.
artikel
36 A short technical paper: Determining whether a vote assignment is dominated Jajodia, Sushil
1991
349-350 1-3 p. 279-282
4 p.
artikel
37 A survey of two-dimensional automata theory Inoue, Katsushi
1991
349-350 1-3 p. 99-121
23 p.
artikel
38 A temporal relational model and a query language Navathe, S.B.
1989
349-350 1-3 p. 147-175
29 p.
artikel
39 A universal table model for categorical databases Malvestuto, Francesco M.
1989
349-350 1-3 p. 203-223
21 p.
artikel
40 Author index to volumes 47, 48 and 49 1989
349-350 1-3 p. 285-287
3 p.
artikel
41 Author index to volumes 35, 36, and 37 1985
349-350 1-3 p. 287-289
3 p.
artikel
42 Automatic entity extraction from an N-Ary relation: Toward a general law for information decomposition Jaoua, A.
1995
349-350 1-3 p. 153-169
17 p.
artikel
43 Cartesian closed stable categories Liu, Ni
2005
349-350 1-3 p. 173-187
15 p.
artikel
44 Climbing hashing for expansible files Chang, Ye-In
1995
349-350 1-3 p. 77-99
23 p.
artikel
45 CLIP4: Hybrid inductive machine learning algorithm that generates inequality rules Cios, Krzysztof J.
2004
349-350 1-3 p. 37-83
47 p.
artikel
46 Coimplication and its application to fuzzy expert systems Oh, Kyung-Whan
1991
349-350 1-3 p. 59-73
15 p.
artikel
47 Complexities of layouts in three-dimensional VLSI circuits Aboelaze, Mokhtar A.
1991
349-350 1-3 p. 167-188
22 p.
artikel
48 Constrained many-to-one string editing with memory Golić, Jovan Dj.
1995
349-350 1-3 p. 61-76
16 p.
artikel
49 Contents 2003
349-350 1-3 p. vi-vii
nvt p.
artikel
50 Convergence rate of empirical Bayes estimation for two-dimensional truncation parameters under linex loss Shi, Yimin
2005
349-350 1-3 p. 1-11
11 p.
artikel
51 Dedication Kandel, Abraham
1985
349-350 1-3 p. 1-
1 p.
artikel
52 Design and implementation of Flora, a language for object algebra Florescu, Daniela
1995
349-350 1-3 p. 1-27
27 p.
artikel
53 Design and performance evaluation of scheduling algorithms for unslotted CSMA/CA with backoff MAC protocol in multiple-access WDM ring networks Kim, Kyeong Soo
2003
349-350 1-3 p. 135-149
15 p.
artikel
54 Design of transaction commitment protocols Ramarao, K.V.S.
1991
349-350 1-3 p. 129-149
21 p.
artikel
55 Detection, decision, and missing information Meisels, Amnon
1985
349-350 1-3 p. 95-106
12 p.
artikel
56 Divergence statistics based on entropy functions and stratified sampling Esteban, M.D.
1995
349-350 1-3 p. 185-203
19 p.
artikel
57 Dynamic pictorial databases design for similarity retrieval Chang, C.C.
1995
349-350 1-3 p. 29-46
18 p.
artikel
58 Editorial board 2003
349-350 1-3 p. iii-iv
nvt p.
artikel
59 Editorial Board 1995
349-350 1-3 p. IFC-
1 p.
artikel
60 Editorial Board 1995
349-350 1-3 p. IFC-
1 p.
artikel
61 Editorial Board 1995
349-350 1-3 p. IFC-
1 p.
artikel
62 Editorial board 2004
349-350 1-3 p. iii-iv
nvt p.
artikel
63 Editorial board 2005
349-350 1-3 p. iii-iv
nvt p.
artikel
64 Editorial board 2005
349-350 1-3 p. iii-iv
nvt p.
artikel
65 Editorial Board 1991
349-350 1-3 p. IFC-
1 p.
artikel
66 Editorial Board 1991
349-350 1-3 p. IFC-
1 p.
artikel
67 Editorial Board 1985
349-350 1-3 p. IFC-
1 p.
artikel
68 Editorial Board 1989
349-350 1-3 p. IFC-
1 p.
artikel
69 Emergency-Oriented expert systems: A fuzzy approach Kacprzyk, Janusz
1985
349-350 1-3 p. 143-155
13 p.
artikel
70 Evaluation of timestamp-based concurrency control mechanisms incorporating livelock avoidance Rusinkiewicz, Marek E.
1991
349-350 1-3 p. 1-26
26 p.
artikel
71 Expanding Self-Organizing Map for data visualization and cluster analysis Jin, Huidong
2004
349-350 1-3 p. 157-173
17 p.
artikel
72 File handling for detail and extent and for subtasks in the implementation of decision processes Cockett, J.R.B.
1985
349-350 1-3 p. 157-168
12 p.
artikel
73 Formal analysis of modern security protocols Yasinsac, Alec
2005
349-350 1-3 p. 189-211
23 p.
artikel
74 Frame representation of physical systems for expert system use LeVan, David O.
1985
349-350 1-3 p. 169-177
9 p.
artikel
75 Frames as a superclass of relations Jonker, J.
1995
349-350 1-3 p. 37-59
23 p.
artikel
76 Fully invariant, characteristic, and S-Fuzzy subgroups Sidky, F.I.
1991
349-350 1-3 p. 27-33
7 p.
artikel
77 Fuzzy bi-ideals in ordered semigroups Kehayopulu, Niovi
2005
349-350 1-3 p. 13-28
16 p.
artikel
78 Fuzzy filters of BL-algebras Liu, Lianzhen
2005
349-350 1-3 p. 141-154
14 p.
artikel
79 Fuzzy implicative and Boolean filters of R 0 algebras Lianzhen, Liu
2005
349-350 1-3 p. 61-71
11 p.
artikel
80 Fuzzy L-bornological spaces Yan, Cong-hua
2005
349-350 1-3 p. 1-10
10 p.
artikel
81 Fuzzy primary representations of fuzzy ideals Malik, D.S.
1991
349-350 1-3 p. 151-165
15 p.
artikel
82 Fuzzy relation equations for coding/decoding processes of images and videos Loia, Vincenzo
2005
349-350 1-3 p. 145-172
28 p.
artikel
83 Fuzzy vector spaces Malik, D.S.
1991
349-350 1-3 p. 271-281
11 p.
artikel
84 Generalized Cesàro vector-valued sequence space and matrix transformations Mursaleen, Mohammad
2005
349-350 1-3 p. 11-21
11 p.
artikel
85 Generalized network modeling and diagnosis using financial ratios Whalen, Thomas
1985
349-350 1-3 p. 179-192
14 p.
artikel
86 GeneScout: a data mining system for predicting vertebrate genes in genomic DNA sequences Yin, Michael M.
2004
349-350 1-3 p. 201-218
18 p.
artikel
87 Genetic programming in classifying large-scale data: an ensemble method Zhang, Yifeng
2004
349-350 1-3 p. 85-101
17 p.
artikel
88 Genetic wrappers for feature selection in decision tree induction and variable ordering in Bayesian network structure learning Hsu, William H.
2004
349-350 1-3 p. 103-122
20 p.
artikel
89 Geometric modeling and representation based on sweep mathematical morphology Shih, Frank Y.
2005
349-350 1-3 p. 213-231
19 p.
artikel
90 How to thwart the mafia attack Jau-Liang Chen,
1995
349-350 1-3 p. 99-104
6 p.
artikel
91 HYPERSOLVER: A graphical tool for commonsense set theory Pakkan, Müjdat
1995
349-350 1-3 p. 43-61
19 p.
artikel
92 Implementing imprecision in information systems Zemankova, Maria
1985
349-350 1-3 p. 107-141
35 p.
artikel
93 Intelligent next generation WDM optical networks Tancevski, Lubo
2003
349-350 1-3 p. 211-217
7 p.
artikel
94 Inter channel crosstalk in fiber Bragg grating based optical add drop multiplexer Narayankhedkar, S.K
2003
349-350 1-3 p. 53-59
7 p.
artikel
95 Introducing objects and parallelism to an imperative programming language Radenski, A.A.
1995
349-350 1-3 p. 107-122
16 p.
artikel
96 Introduction to the special issue on database systems Elmagarmid, Ahmed K.
1989
349-350 1-3 p. 1-2
2 p.
artikel
97 Investigating spoken Arabic digits in speech recognition setting Alotaibi, Yousef Ajami
2005
349-350 1-3 p. 115-139
25 p.
artikel
98 L-fuzzy preproximities and L-fuzzy topologies Kim, Yong Chan
2005
349-350 1-3 p. 93-113
21 p.
artikel
99 Logical operators on complete lattices Zherui, Ma
1991
349-350 1-3 p. 77-97
21 p.
artikel
100 Loopback recovery from neighboring double-link failures in WDM mesh networks Choi, Hongsik
2003
349-350 1-3 p. 197-209
13 p.
artikel
101 MEMS tunable gratings with analog actuation Shih, Wei-Chuan
2003
349-350 1-3 p. 31-40
10 p.
artikel
102 Mining massive document collections by the WEBSOM method Lagus, Krista
2004
349-350 1-3 p. 135-156
22 p.
artikel
103 MSQL: A multidatabase language Litwin, W.
1989
349-350 1-3 p. 59-101
43 p.
artikel
104 Multi-drop path model for multicast routing and wavelength assignment Yan, Shuguang
2003
349-350 1-3 p. 113-134
22 p.
artikel
105 Multi-objective rule mining using genetic algorithms Ghosh, Ashish
2004
349-350 1-3 p. 123-133
11 p.
artikel
106 Non-product property of the digital fundamental group Han, Sang-Eon
2005
349-350 1-3 p. 73-91
19 p.
artikel
107 [No title] John Caulfield, H
2003
349-350 1-3 p. 1-2
2 p.
artikel
108 On characterization of a generalized information improvement due to N revisions Ahmad, R.
1995
349-350 1-3 p. 105-111
7 p.
artikel
109 On characterization of quantitative-qualitative measure of inaccuracy Bhatia, P.K.
1991
349-350 1-3 p. 143-149
7 p.
artikel
110 On class weights of CT bursts Dial, Gur
1991
349-350 1-3 p. 251-257
7 p.
artikel
111 On heuristics for determining the thickness of a graph Cimikowski, Robert
1995
349-350 1-3 p. 87-98
12 p.
artikel
112 On intuitionistic fuzzy compactness Abbas, S.E.
2005
349-350 1-3 p. 75-91
17 p.
artikel
113 On the abstraction of conventional dynamic systems: from numerical analysis to linguistic analysis Wang, Fei-Yue
2005
349-350 1-3 p. 233-259
27 p.
artikel
114 On the evolution of PON-based FTTH solutions Kim, Kyeong Soo
2003
349-350 1-3 p. 21-30
10 p.
artikel
115 On the reusability of query optimization algorithms Batory, D.S.
1989
349-350 1-3 p. 177-202
26 p.
artikel
116 On three-way two-dimensional multicounter automata Szepietowski, Andrzej
1991
349-350 1-3 p. 35-47
13 p.
artikel
117 Optical code division multiplexing (OCDM) and its application for peta-bit/s photonic network Sotobayashi, Hideyuki
2003
349-350 1-3 p. 171-182
12 p.
artikel
118 Optical implementation of the Kak neural network Shortt, A.
2005
349-350 1-3 p. 273-287
15 p.
artikel
119 Overlap and channel errors in Adaptive Vector Quantization for image coding Rizzo, Francesco
2005
349-350 1-3 p. 125-143
19 p.
artikel
120 Parallel algorithms for merging and sorting Deo, Narsingh
1991
349-350 1-3 p. 151-161
11 p.
artikel
121 Performance analysis of temporal queries Ahn, Ilsoo
1989
349-350 1-3 p. 103-146
44 p.
artikel
122 Performance analysis of two concurrency control schemes for design environments Yeh, Show-Way
1989
349-350 1-3 p. 3-33
31 p.
artikel
123 Performance evaluation of optical mesh restoration schemes Koo, Sunggy
2003
349-350 1-3 p. 183-195
13 p.
artikel
124 Performance of recovery algorithms for centralized database management systems Kumar, Vijay
1995
349-350 1-3 p. 101-147
47 p.
artikel
125 PRACTIC: A concurrent object data model for a parallel object-oriented database system Bassiliades, N.
1995
349-350 1-3 p. 149-178
30 p.
artikel
126 Reasoning with imprecise knowledge in expert systems Dutta, Amitava
1985
349-350 1-3 p. 3-24
22 p.
artikel
127 Recoverability study of SPC product codes under erasure decoding Amutha, R.
2005
349-350 1-3 p. 169-179
11 p.
artikel
128 Relational-product architectures for information processing Kohout, Ladislav J.
1985
349-350 1-3 p. 25-37
13 p.
artikel
129 Research issues in real-time database systems Ulusoy, Özgür
1995
349-350 1-3 p. 123-151
29 p.
artikel
130 λ-Resolution and interpretation of λ-implication in fuzzy operator logic Xuhua, Liu
1991
349-350 1-3 p. 259-278
20 p.
artikel
131 Resonant holography Sinha, Arnab
2003
349-350 1-3 p. 13-19
7 p.
artikel
132 Robust adaptive single neural control for a class of uncertain nonlinear systems with input nonlinearity Chang, Wei-Der
2005
349-350 1-3 p. 261-271
11 p.
artikel
133 Robust m-interval detection procedures for strong mixing noise Hussain, Arshad
1995
349-350 1-3 p. 113-125
13 p.
artikel
134 Robust MIPA array processors with bivariate and Markov dependence Ketel, Mohammed
1995
349-350 1-3 p. 63-86
24 p.
artikel
135 Rough operations on Boolean algebras Qi, Guilin
2005
349-350 1-3 p. 49-63
15 p.
artikel
136 Second order symmetric duality in nondifferentiable multiobjective programming Ahmad, Izhar
2005
349-350 1-3 p. 23-34
12 p.
artikel
137 Signature extraction method in rectangular database Arour, Khedija
1995
349-350 1-3 p. 65-78
14 p.
artikel
138 Soft computing data mining Pal, Sankar K
2004
349-350 1-3 p. 1-3
3 p.
artikel
139 Soft data mining, computational theory of perceptions, and rough-fuzzy approach Pal, Sankar K.
2004
349-350 1-3 p. 5-12
8 p.
artikel
140 Solutions of algebraic equations involving generalized fuzzy numbers Zhao, Renhong
1991
349-350 1-3 p. 199-243
45 p.
artikel
141 Solving visibility problems on MCCs of smaller size Lu, Mi
1991
349-350 1-3 p. 163-192
30 p.
artikel
142 Special issue contents list 2004
349-350 1-3 p. vi-
1 p.
artikel
143 Specialized speech: A first prose for language expert systems Rocha, A.F.
1985
349-350 1-3 p. 193-210
18 p.
artikel
144 Survivable embedding of logical topologies in WDM ring networks Lee, Hwajung
2003
349-350 1-3 p. 151-160
10 p.
artikel
145 Symbolic normalized acquisition and representation of knowledge Bouchon, Bernadette
1985
349-350 1-3 p. 85-94
10 p.
artikel
146 Synthesis and characterization of optically nonlinear and light emitting lanthanide borates Giesber, Henry G.
2003
349-350 1-3 p. 61-68
8 p.
artikel
147 Testing variability in multivariate quality control: A conditional entropy measure approach Guerrero-Cusumano, José-Luis
1995
349-350 1-3 p. 179-202
24 p.
artikel
148 The applicative data model Held, James P.
1989
349-350 1-3 p. 249-283
35 p.
artikel
149 The chi-square divergence measure in random sampling with dirichlet process priors Morales, Domingo
1991
349-350 1-3 p. 239-249
11 p.
artikel
150 The development of a medical expert system and the treatment of imprecision in the framework of possibility theory Buisson, Jean-Christophe
1985
349-350 1-3 p. 211-226
16 p.
artikel
151 The entropy of the multivariate poisson: An approximation Guerrero-Cusumano, José-Luis
1995
349-350 1-3 p. 1-17
17 p.
artikel
152 The optimal testing in photonic switching networks using tabulation methodology Hwang, I-Shyan
2003
349-350 1-3 p. 83-111
29 p.
artikel
153 Theorem of abstraction for equivalent controllers in hybrid systems Lin, Feng
2005
349-350 1-3 p. 181-195
15 p.
artikel
154 The relative useful information measure: Some comments Kvålseth, T.O.
1991
349-350 1-3 p. 35-38
4 p.
artikel
155 The uniqueness condition for the double pushout transformation of algebras Llabrés, M.
2005
349-350 1-3 p. 93-124
32 p.
artikel
156 Tide index to volumes 35, 36, and 37 1985
349-350 1-3 p. 291-292
2 p.
artikel
157 Time series segmentation: A sliding window approach Chu, Chia-Shang James
1995
349-350 1-3 p. 147-173
27 p.
artikel
158 Title index to volumes 47, 48 and 49 1989
349-350 1-3 p. 289-290
2 p.
artikel
159 Transparent silica glasses containing single walled carbon nanotubes DiMaio, J
2003
349-350 1-3 p. 69-73
5 p.
artikel
160 Two phase gossip: Managing distributed event histories Heddaya, Abdelsalam
1989
349-350 1-3 p. 35-57
23 p.
artikel
161 Two-sided empirical Bayes test for truncation parameter using NA samples Shi, Yimin
2005
349-350 1-3 p. 65-74
10 p.
artikel
162 Usage refinement for ER-to-relation design transformations Teorey, Toby J.
1991
349-350 1-3 p. 49-67
19 p.
artikel
163 Using fuzzy MCDM to select partners of strategic alliances for liner shipping Ding, Ji-Feng
2005
349-350 1-3 p. 197-225
29 p.
artikel
164 Vertical partitioning in database design Yin-Fu Huang,
1995
349-350 1-3 p. 19-35
17 p.
artikel
165 Virtual lines, a deadlock-free and real-time routing mechanism for ATM networks Smit, Gerard J.M.
1995
349-350 1-3 p. 29-42
14 p.
artikel
166 Volume 35 1985
349-350 1-3 p. iii-vii
nvt p.
artikel
167 Wavelength exchange: A novel function for optical networks Wong, K.K.Y
2003
349-350 1-3 p. 161-169
9 p.
artikel
                             167 gevonden resultaten
 
 Koninklijke Bibliotheek - Nationale Bibliotheek van Nederland