Digitale Bibliotheek
Sluiten Bladeren door artikelen uit een tijdschrift
     Tijdschrift beschrijving
       Alle jaargangen van het bijbehorende tijdschrift
         Alle afleveringen van het bijbehorende jaargang
                                       Alle artikelen van de bijbehorende aflevering
 
                             87 gevonden resultaten
nr titel auteur tijdschrift jaar jaarg. afl. pagina('s) type
1 ACASH: an adaptive web caching method based on the heterogeneity of web object and reference characteristics Na, Yun Ji
2006
403-404 12 p. 1695-1711
17 p.
artikel
2 Access concentration detection in click logs to improve mobile Web-IR Murata, Masaya
2009
403-404 12 p. 1859-1869
11 p.
artikel
3 A comparison of two kinds of definitions of rough approximations based on a similarity relation Abo-Tabl, E.A.
2011
403-404 12 p. 2587-2596
10 p.
artikel
4 A discrete artificial bee colony algorithm for the lot-streaming flow shop scheduling problem Pan, Quan-Ke
2011
403-404 12 p. 2455-2468
14 p.
artikel
5 A factoring approach for the Steiner tree problem in undirected networks Wang, Chu-Fu
2007
403-404 12 p. 2418-2435
18 p.
artikel
6 A fast and efficient nearly-optimal adaptive Fano coding scheme Rueda, Luis
2006
403-404 12 p. 1656-1683
28 p.
artikel
7 A generalized-constraint neural network model: Associating partially known relationships for nonlinear regressions Hu, Bao-Gang
2009
403-404 12 p. 1929-1943
15 p.
artikel
8 A hybrid coevolutionary algorithm for designing fuzzy classifiers Li, Minqiang
2009
403-404 12 p. 1970-1983
14 p.
artikel
9 Alternative characterizations for the representation of families of sets by fuzzy sets Saidi, Fathi B.
2008
403-404 12 p. 2639-2647
9 p.
artikel
10 A method of illumination compensation for human face image based on quotient image Wang, Ying-hui
2008
403-404 12 p. 2705-2721
17 p.
artikel
11 Analysis and design of a secure key exchange scheme Álvarez, Rafael
2009
403-404 12 p. 2014-2021
8 p.
artikel
12 An analysis of communication policies for homogeneous multi-colony ACO algorithms Twomey, C.
2010
403-404 12 p. 2390-2404
15 p.
artikel
13 An efficient algorithm for the collapsing knapsack problem Wu, Jigang
2006
403-404 12 p. 1739-1751
13 p.
artikel
14 An energy-efficient real-time scheduling scheme on dual-channel networks Kang, Mikyung
2008
403-404 12 p. 2553-2563
11 p.
artikel
15 Anomaly intrusion detection by clustering transactional audit streams in a host computer Park, Nam Hun
2010
403-404 12 p. 2375-2389
15 p.
artikel
16 A note on “Fuzzy differential equations and the extension principle” Allahviranloo, T.
2009
403-404 12 p. 2049-2051
3 p.
artikel
17 Application of load balancing based on symmetric balanced incomplete block design to random networks Lee, Okbin
2008
403-404 12 p. 2564-2572
9 p.
artikel
18 Applying fuzzy method for measuring criticality in project network Chen, Chen-Tung
2007
403-404 12 p. 2448-2458
11 p.
artikel
19 A semi-supervised incremental algorithm to automatically formulate topical queries Lorenzetti, Carlos M.
2009
403-404 12 p. 1881-1892
12 p.
artikel
20 A study on scale factor in distributed differential evolution Weber, Matthieu
2011
403-404 12 p. 2488-2511
24 p.
artikel
21 A survey on session detection methods in query logs and a proposal for future evaluation Gayo-Avello, Daniel
2009
403-404 12 p. 1822-1843
22 p.
artikel
22 A tabu search approach for the minimum sum-of-squares clustering problem Liu, Yongguo
2008
403-404 12 p. 2680-2704
25 p.
artikel
23 Attacks of simple block ciphers via efficient heuristics Nalini, N.
2007
403-404 12 p. 2553-2569
17 p.
artikel
24 Boolean sets and most general solutions of Boolean equations Rudeanu, Sergiu
2010
403-404 12 p. 2440-2447
8 p.
artikel
25 Class normalization in centroid-based text categorization Lertnattee, Verayuth
2006
403-404 12 p. 1712-1738
27 p.
artikel
26 Concave piecewise linear service curves and deadline calculations Hwang, Lain-Chyr
2008
403-404 12 p. 2585-2599
15 p.
artikel
27 Concordance and consensus Elzinga, Cees
2011
403-404 12 p. 2529-2549
21 p.
artikel
28 Conjugate conflict continuation graphs for multi-layer constrained via minimization Lin, Rung-Bin
2007
403-404 12 p. 2436-2447
12 p.
artikel
29 Constructing a minimum height elimination tree of a tree in linear time Hsu, Chung-Hsien
2007
403-404 12 p. 2473-2479
7 p.
artikel
30 Design and analysis of a fault tolerant hybrid mobile scheme Abd-El-Barr, Mostafa I.H.
2007
403-404 12 p. 2602-2620
19 p.
artikel
31 Design and performance of an intelligent predictive controller for a six-degree-of-freedom robot using the Elman network Köker, Raşit
2006
403-404 12 p. 1781-1799
19 p.
artikel
32 Disturbed Exploitation compact Differential Evolution for limited memory optimization problems Neri, Ferrante
2011
403-404 12 p. 2469-2487
19 p.
artikel
33 Domain semantics of possibility computations Chen, Yixiang
2008
403-404 12 p. 2661-2679
19 p.
artikel
34 Editorial Board 2006
403-404 12 p. CO2-
1 p.
artikel
35 Efficient algorithms for the minimum connected domination on trapezoid graphs Tsai, Yin-Te
2007
403-404 12 p. 2405-2417
13 p.
artikel
36 Enforcing the security of a time-bound hierarchical key assignment scheme De Santis, Alfredo
2006
403-404 12 p. 1684-1694
11 p.
artikel
37 Erratum to ‘Orthogonal variant moments features in image analysis’ [Information Sciences 180 (2010) 846–860] Martín H., José Antonio
2010
403-404 12 p. 2498-
1 p.
artikel
38 Error bounds of multi-graph regularized semi-supervised classification Chen, Hong
2009
403-404 12 p. 1960-1969
10 p.
artikel
39 Estimation of distribution and differential evolution cooperation for large scale economic load dispatch optimization of power systems Wang, Yu
2010
403-404 12 p. 2405-2420
16 p.
artikel
40 Evaluation of novelty metrics for sentence-level novelty mining Tsai, Flora S.
2010
403-404 12 p. 2359-2374
16 p.
artikel
41 Fault detection and isolation based on fuzzy automata Rigatos, Gerasimos G.
2009
403-404 12 p. 1893-1902
10 p.
artikel
42 Flexible online association rule mining based on multidimensional pattern relations Wang, Ching-Yao
2006
403-404 12 p. 1752-1780
29 p.
artikel
43 Fractal dimension applied to plant identification Bruno, Odemir Martinez
2008
403-404 12 p. 2722-2733
12 p.
artikel
44 Guest editorial special issue on graph theory and its applications Yen, William Chung-Kung
2007
403-404 12 p. 2403-2404
2 p.
artikel
45 Hamiltonian connectivity of the WK-recursive network with faulty nodes Fu, Jung-Sheng
2008
403-404 12 p. 2573-2584
12 p.
artikel
46 How valuable is medical social media data? Content analysis of the medical web Denecke, Kerstin
2009
403-404 12 p. 1870-1880
11 p.
artikel
47 Identifying the classical music composition of an unknown performance with wavelet dispersion vector and neural nets Rein, Stephan
2006
403-404 12 p. 1629-1655
27 p.
artikel
48 Inside Front Cover - Editorial Board 2010
403-404 12 p. IFC-
1 p.
artikel
49 Inside Front Cover - Editorial Board 2009
403-404 12 p. IFC-
1 p.
artikel
50 Inside Front Cover - Editorial Board 2008
403-404 12 p. IFC-
1 p.
artikel
51 Inside Front Cover - Editorial Board 2007
403-404 12 p. IFC-
1 p.
artikel
52 Inside Front Cover - Editorial Board 2011
403-404 12 p. IFC-
1 p.
artikel
53 ( L , ⊙ ) -approximation spaces and ( L , ⊙ ) -fuzzy quasi-uniform spaces Kim, Yong Chan
2009
403-404 12 p. 2028-2048
21 p.
artikel
54 Learning-based concept-hierarchy refinement through exploiting topology, content and social information Kuo, Tsung-Ting
2011
403-404 12 p. 2512-2528
17 p.
artikel
55 Managing software process measurement: A metamodel-based approach García, F.
2007
403-404 12 p. 2570-2586
17 p.
artikel
56 Maximal consistent extensions of information systems relative to their theories Moshkov, Mikhail
2008
403-404 12 p. 2600-2620
21 p.
artikel
57 Measure of image sharpness using eigenvalues Wee, Chong-Yaw
2007
403-404 12 p. 2533-2552
20 p.
artikel
58 Multi-objective optimization with artificial weed colonies Kundu, Debarati
2011
403-404 12 p. 2441-2454
14 p.
artikel
59 Multiple coordinated views for searching and navigating Web content repositories Hubmann-Haidvogel, Alexander
2009
403-404 12 p. 1813-1821
9 p.
artikel
60 Multiuser-based shadow watermark extraction system Wang, Feng-Hsing
2007
403-404 12 p. 2522-2532
11 p.
artikel
61 Natural language querying for video databases Erozel, Guzen
2008
403-404 12 p. 2534-2552
19 p.
artikel
62 New complexity results for the k-covers problem Iliopoulos, Costas S.
2011
403-404 12 p. 2571-2575
5 p.
artikel
63 On generalized middle-level problem Gregor, Petr
2010
403-404 12 p. 2448-2457
10 p.
artikel
64 On labeling in graph visualization Dogrusoz, Ugur
2007
403-404 12 p. 2459-2472
14 p.
artikel
65 On some entropy functionals derived from Rényi information divergence Bercher, J.-F.
2008
403-404 12 p. 2489-2506
18 p.
artikel
66 On the versatility of radial basis function neural networks: A case study in the field of intrusion detection Fisch, Dominik
2010
403-404 12 p. 2421-2439
19 p.
artikel
67 Pairwise-adaptive dissimilarity measure for document clustering D’hondt, Joris
2010
403-404 12 p. 2341-2358
18 p.
artikel
68 Parametric calibration of speed–density relationships in mesoscopic traffic simulator with data mining Jiang, Zhu
2009
403-404 12 p. 2002-2013
12 p.
artikel
69 Particle swarm optimization with preference order ranking for multi-objective optimization Wang, Yujia
2009
403-404 12 p. 1944-1959
16 p.
artikel
70 Practical electronic auction scheme with strong anonymity and bidding privacy Li, Ming-Jheng
2011
403-404 12 p. 2576-2586
11 p.
artikel
71 Quantized output feedback control for networked control systems Tian, Engang
2008
403-404 12 p. 2734-2749
16 p.
artikel
72 Reordering columns for smaller indexes Lemire, Daniel
2011
403-404 12 p. 2550-2570
21 p.
artikel
73 Risk-sensitive loss functions for sparse multi-category classification problems Suresh, S.
2008
403-404 12 p. 2621-2638
18 p.
artikel
74 Safety, domain independence and translation of complex value database queries Liu, Hong-Cheu
2008
403-404 12 p. 2507-2533
27 p.
artikel
75 Selection of programme slots of television channels for giving advertisement: A graph theoretic approach Saha, Anita
2007
403-404 12 p. 2480-2492
13 p.
artikel
76 Selectivity-sensitive shared evaluation of multiple continuous XPath queries over XML streams Lee, Hyun-Ho
2009
403-404 12 p. 1984-2001
18 p.
artikel
77 Software architecture graphs as complex networks: A novel partitioning scheme to measure stability and evolution Jenkins, S.
2007
403-404 12 p. 2587-2601
15 p.
artikel
78 Software execution processes as an evolving complex network Cai, Kai-Yuan
2009
403-404 12 p. 1903-1928
26 p.
artikel
79 Solutions to the functional equation I ( x , y ) = I ( x , I ( x , y ) ) for a continuous D-operation Xie, Aifang
2010
403-404 12 p. 2487-2497
11 p.
artikel
80 Stratified analysis of AOL query log Brenes, David J.
2009
403-404 12 p. 1844-1858
15 p.
artikel
81 Strong limit theorems for random sets and fuzzy random sets with slowly varying weights Fu, Ke-ang
2008
403-404 12 p. 2648-2660
13 p.
artikel
82 The pasting constructions of lattice ordered effect algebras Xie, Yongjian
2010
403-404 12 p. 2476-2486
11 p.
artikel
83 The use of Hints in SQL-Nested query optimization Taniar, David
2007
403-404 12 p. 2493-2521
29 p.
artikel
84 Time-selective convertible undeniable signatures with short conversion receipts Laguillaumie, Fabien
2010
403-404 12 p. 2458-2475
18 p.
artikel
85 Using a minimal fuzzy covering in decision-making problems Sirbiladze, Gia
2009
403-404 12 p. 2022-2027
6 p.
artikel
86 Web search Spink, Amanda
2009
403-404 12 p. 1795-
1 p.
artikel
87 What users see – Structures in search engine results pages Höchstötter, Nadine
2009
403-404 12 p. 1796-1812
17 p.
artikel
                             87 gevonden resultaten
 
 Koninklijke Bibliotheek - Nationale Bibliotheek van Nederland