nr |
titel |
auteur |
tijdschrift |
jaar |
jaarg. |
afl. |
pagina('s) |
type |
1 |
A comparison between aggregation before and after propagation based on a reliability model
|
Berdai, Mounia |
|
2018 |
453 |
C |
p. 99-110 |
artikel |
2 |
A neighbor-based learning particle swarm optimizer with short-term and long-term memory for dynamic optimization problems
|
Cao, Leilei |
|
2018 |
453 |
C |
p. 463-485 |
artikel |
3 |
A new hierarchical ranking aggregation method
|
Ding, Jiankun |
|
2018 |
453 |
C |
p. 168-185 |
artikel |
4 |
A new paradigm for uncertain knowledge representation by Plausible Petri nets
|
ChiachÃo, Manuel |
|
2018 |
453 |
C |
p. 323-345 |
artikel |
5 |
An integrated multi-population genetic algorithm for multi-vehicle task assignment in a drift field
|
Bai, Xiaoshan |
|
2018 |
453 |
C |
p. 227-238 |
artikel |
6 |
An iterated greedy heuristic for no-wait flow shops with sequence dependent setup times, learning and forgetting effects
|
Li, Xiaoping |
|
2018 |
453 |
C |
p. 408-425 |
artikel |
7 |
Approximately optimizing NDCG using pair-wise loss
|
Jin, Xiao-Bo |
|
2018 |
453 |
C |
p. 50-65 |
artikel |
8 |
Automated deduction of cross-organizational collaborative business processes
|
Montarnal, Aurelie |
|
2018 |
453 |
C |
p. 30-49 |
artikel |
9 |
BPRH: Bayesian personalized ranking for heterogeneous implicit feedback
|
Qiu, Huihuai |
|
2018 |
453 |
C |
p. 80-98 |
artikel |
10 |
Characteristic sets and generalized maximal consistent blocks in mining incomplete data
|
Clark, Patrick G. |
|
2018 |
453 |
C |
p. 66-79 |
artikel |
11 |
Cheating identifiable secret sharing scheme using symmetric bivariate polynomial
|
Liu, Yanxiao |
|
2018 |
453 |
C |
p. 21-29 |
artikel |
12 |
Chernoff information between Gaussian trees
|
Li, Binglin |
|
2018 |
453 |
C |
p. 442-462 |
artikel |
13 |
Differential communication with distributed MPC based on occupancy grid
|
Sprodowski, Tobias |
|
2018 |
453 |
C |
p. 426-441 |
artikel |
14 |
Editorial Board
|
|
|
2018 |
453 |
C |
p. ii |
artikel |
15 |
Fast and effective cluster-based information retrieval using frequent closed itemsets
|
Djenouri, Youcef |
|
2018 |
453 |
C |
p. 154-167 |
artikel |
16 |
FastPM: An approach to pattern matching via distributed stream processing
|
Yang, Dingyu |
|
2018 |
453 |
C |
p. 263-280 |
artikel |
17 |
Game theoretical security detection strategy for networked systems
|
Wu, Hao |
|
2018 |
453 |
C |
p. 346-363 |
artikel |
18 |
Generic construction of public key encryption, identity-based encryption and signcryption with equality test
|
Lin, Xi-Jun |
|
2018 |
453 |
C |
p. 111-126 |
artikel |
19 |
Handling distributed XML queries over large XML data based on MapReduce framework
|
Fan, Hongjie |
|
2018 |
453 |
C |
p. 1-20 |
artikel |
20 |
HeteRank: A general similarity measure in heterogeneous information networks by integrating multi-type relationships
|
Zhang, Mingxi |
|
2018 |
453 |
C |
p. 389-407 |
artikel |
21 |
Incremental evaluation of continuous preference queries
|
Ribeiro, Marcos Roberto |
|
2018 |
453 |
C |
p. 127-153 |
artikel |
22 |
Intelligent system for drowsiness recognition based on ear canal electroencephalography with photoplethysmography and electrocardiography
|
Hong, Seunghyeok |
|
2018 |
453 |
C |
p. 302-322 |
artikel |
23 |
Multiattribute decision making based on non-linear programming methodology with hyperbolic function and interval-valued intuitionistic fuzzy values
|
Chen, Shyi-Ming |
|
2018 |
453 |
C |
p. 379-388 |
artikel |
24 |
On pricing approximate queries
|
Wang, Xingwang |
|
2018 |
453 |
C |
p. 198-215 |
artikel |
25 |
Overlapping community detection with least replicas in complex networks
|
Long, Hao |
|
2018 |
453 |
C |
p. 216-226 |
artikel |
26 |
Secure data uploading scheme for a smart home system
|
Shen, Jian |
|
2018 |
453 |
C |
p. 186-197 |
artikel |
27 |
The randomness of the inferred parameters. A machine learning framework for computing confidence regions.
|
Apolloni, Bruno |
|
2018 |
453 |
C |
p. 239-262 |
artikel |
28 |
What happened then and there: Top-k spatio-temporal keyword query
|
Liu, Xiping |
|
2018 |
453 |
C |
p. 281-301 |
artikel |
29 |
Witness-based searchable encryption
|
Ma, Sha |
|
2018 |
453 |
C |
p. 364-378 |
artikel |