Digital Library
Close Browse articles from a journal
     Journal description
       All volumes of the corresponding journal
         All issues of the corresponding volume
                                       All articles of the corresponding issues
 
                             33 results found
no title author magazine year volume issue page(s) type
1 Access control encryption with efficient verifiable sanitized decryption Wang, Huige

465 C p. 72-85
article
2 An incremental attribute reduction method for dynamic data mining Jing, Yunge

465 C p. 202-218
article
3 A payload-dependent packet rearranging covert channel for mobile VoIP traffic Liang, Chen

465 C p. 162-173
article
4 A scalable framework for cross-lingual authorship identification Sarwar, Raheem

465 C p. 323-339
article
5 Block-secure: Blockchain based scheme for secure P2P cloud storage Li, Jiaxing

465 C p. 219-231
article
6 Consensus rate-based label propagation for semi-supervised classification Yu, Jaehong

465 C p. 265-284
article
7 DeepPIM: A deep neural point-of-interest imputation model Chang, Buru

465 C p. 61-71
article
8 Design of optimal lighting control strategy based on multi-variable fractional-order extremum seeking method Yin, Chun

465 C p. 38-60
article
9 Editorial Board
465 C p. ii
article
10 Efficient and effective influence maximization in social networks: A hybrid-approach Ko, Yun-Yong

465 C p. 144-161
article
11 Efficient biometric identity-based encryption Li, Xiaoguo

465 C p. 248-264
article
12 Enabling verifiable multiple keywords search over encrypted cloud data Miao, Yinbin

465 C p. 21-37
article
13 Entropy based evolutionary algorithm with adaptive reference points for many-objective optimization problems Zhou, Chong

465 C p. 232-247
article
14 Event-triggered resilient control for cyber-physical systems under asynchronous DoS attacks Sun, Yuan-Cheng

465 C p. 340-352
article
15 Exploiting lower bounds to accelerate approximate nearest neighbor search on high-dimensional data Liu, Yingfan

465 C p. 484-504
article
16 Hesitant fuzzy preference envelopment analysis and alternative improvement Zhou, Wei

465 C p. 105-117
article
17 Improving exploration property of velocity-based artificial bee colony algorithm using chaotic systems Moradi, Parham

465 C p. 130-143
article
18 Improving imbalanced learning through a heuristic oversampling method based on k-means and SMOTE Douzas, Georgios

465 C p. 1-20
article
19 Multiattribute decision making based on Shannon's information entropy, non-linear programming methodology, and interval-valued intuitionistic fuzzy values Chen, Shyi-Ming

465 C p. 404-424
article
20 Multi-label semi-supervised classification through optimum-path forest Amorim, Willian P.

465 C p. 86-104
article
21 Person name disambiguation on the web in a multilingual context Delgado, Agustín D.

465 C p. 373-387
article
22 Preselection via classification: A case study on evolutionary multiobjective optimization Zhang, Jinyuan

465 C p. 388-403
article
23 Relational data imputation with quality guarantee Fan, Fengfeng

465 C p. 305-322
article
24 Relational regularized risk prediction of acute coronary syndrome using electronic health records Huang, Zhengxing

465 C p. 118-129
article
25 Reversible data hiding in encrypted image with separable capability and high embedding capacity Qin, Chuan

465 C p. 285-304
article
26 Scaling up twin support vector regression with safe screening rule Wang, Hongmei

465 C p. 174-190
article
27 Stability analysis of nonlinear telerobotic systems with time-varying communication channel delays using general integral inequalities Baranitha, R.

465 C p. 353-372
article
28 Supervisory control of state-tree structures with partial observation Gu, Chan

465 C p. 523-544
article
29 Switched systems approach to state bounding for time delay systems Chen, Yong

465 C p. 191-201
article
30 Tolerance rough fuzzy decision tree Zhai, Junhai

465 C p. 425-438
article
31 UnPART: PART without the ‘partial’ condition of it Ibarguren, Igor

465 C p. 505-522
article
32 Using Compressed Suffix-Arrays for a compact representation of temporal-graphs R. Brisaboa, Nieves

465 C p. 459-483
article
33 Wavelet-denoising multiple echo state networks for multivariate time series prediction Xu, Meiling

465 C p. 439-458
article
                             33 results found
 
 Koninklijke Bibliotheek - National Library of the Netherlands