Digital Library
Close Browse articles from a journal
     Journal description
       All volumes of the corresponding journal
         All issues of the corresponding volume
                                       All articles of the corresponding issues
 
                             15 results found
no title author magazine year volume issue page(s) type
1 A further study on the inequality constraints in stochastic configuration networks Zhu, Xiaolong
2019
487 C p. 77-83
article
2 A matrix completion-based multiview learning method for imputing missing values in buoy monitoring data Qin, Mengjiao
2019
487 C p. 18-30
article
3 An efficient coding scheme for reversible data hiding in encrypted image with redundancy transfer Qin, Chuan
2019
487 C p. 176-192
article
4 A sub-one quasi-norm-based similarity measure for collaborative filtering in recommender systems Jiang, Shan
2019
487 C p. 142-155
article
5 Editorial Board 2019
487 C p. ii
article
6 Event-triggered control for networked nonlinear semi-Markovian jump systems with randomly occurring uncertainties and transmission delay Wu, Xihui
2019
487 C p. 84-96
article
7 External clustering validity index based on chi-squared statistical test Luna-Romera, José María
2019
487 C p. 1-17
article
8 Extreme biconic copulas: Characterization, properties and extensions to aggregation functions Durante, Fabrizio
2019
487 C p. 128-141
article
9 Finite-time asynchronous H ∞ resilient filtering for switched delayed neural networks with memory unideal measurements Xie, Wenqian
2019
487 C p. 156-175
article
10 Interval type-2 fuzzy sampled-data control of time-delay systems Du, Zhenbin
2019
487 C p. 193-207
article
11 Large scale anomaly detection in mixed numerical and categorical input spaces Eiras-Franco, Carlos
2019
487 C p. 115-127
article
12 Self-adaptive cost weights-based support vector machine cost-sensitive ensemble for imbalanced data classification Tao, Xinmin
2019
487 C p. 31-56
article
13 Special Issue on Security and Privacy in Machine Learning Li, Jin
2019
487 C p. 208-209
article
14 Two-level Tabu-predatory search for schedule risk control of IT outsourcing projects Lu, Fuqiang
2019
487 C p. 57-76
article
15 Unrestricted and compact certificateless aggregate signature scheme Hashimoto, Keitaro
2019
487 C p. 97-114
article
                             15 results found
 
 Koninklijke Bibliotheek - National Library of the Netherlands