Digital Library
Close Browse articles from a journal
     Journal description
       All volumes of the corresponding journal
         All issues of the corresponding volume
                                       All articles of the corresponding issues
 
                             27 results found
no title author magazine year volume issue page(s) type
1 A burst-based unsupervised method for detecting review spammer groups Ji, Shu-juan

536 C p. 454-469
article
2 A coalition-structure’s generation method for solving cooperative computing problems in edge computing environments Zhang, Kejia

536 C p. 372-390
article
3 Adaptive online data-driven closed-loop parameter control strategy for swarm intelligence algorithm Lu, Hui

536 C p. 25-52
article
4 A GPU-based residual network for medical image classification in smart medicine Zhang, Qingchen

536 C p. 91-100
article
5 A likelihood-based multi-criteria sustainable supplier selection approach with complex preference information Hendiani, Sepehr

536 C p. 135-155
article
6 Almost periodic dynamics of memristive inertial neural networks with mixed delays Rajan, Rakkiyappan

536 C p. 332-350
article
7 An information-theoretic instance-based classifier Gokcay, Erhan

536 C p. 263-276
article
8 Attribute-based fine-grained access control for outscored private set intersection computation Ali, Mohammad

536 C p. 222-243
article
9 Dynamical analysis of rumor spreading model in multi-lingual environment and heterogeneous complex networks Li, Jiarong

536 C p. 391-408
article
10 Dynamic imaging inversion with double deep learning networks for cameras Li, Jin

536 C p. 317-331
article
11 Edge instability: A critical parameter for the propagation and robustness analysis of large networks Wang, Lei

536 C p. 358-371
article
12 Editorial Board
536 C p. ii
article
13 Enhanced pairwise IPVO-based reversible data hiding scheme using rhombus context Kumar, Rajeev

536 C p. 101-119
article
14 Event-triggered finite-time adaptive neural control for nonlinear non-strict-feedback time-delay systems with disturbances Gao, Chuang

536 C p. 1-24
article
15 Improved general attribute reduction algorithms Li, Baizhen

536 C p. 298-316
article
16 Incremental feature selection based on fuzzy rough sets Ni, Peng

536 C p. 185-204
article
17 Integrated data and knowledge driven methodology for human activity recognition Jia, Hairui

536 C p. 409-430
article
18 MAG-GAN: Massive attack generator via GAN Chen, Jinyin

536 C p. 67-90
article
19 Multiscale fusion and aggregation PCNN for 3D shape recovery Yan, Tao

536 C p. 277-297
article
20 NEC: A nested equivalence class-based dependency calculation approach for fast feature selection using rough set theory Zhao, Jie

536 C p. 431-453
article
21 Necessary and sufficient conditions for the existence of solution of generalized fuzzy relation equations A ⇔X = B Turunen, Esko

536 C p. 351-357
article
22 Negation scope detection for sentiment analysis: A reinforcement learning framework for replicating human interpretations Pröllochs, Nicolas

536 C p. 205-221
article
23 New technique to alleviate the cold start problem in recommender systems using information from social media and random decision forests Herce-Zelaya, J.

536 C p. 156-170
article
24 Privacy-Preserving Krawtchouk Moment feature extraction over encrypted image data Yang, Tengfei

536 C p. 244-262
article
25 Resampling ensemble model based on data distribution for imbalanced credit risk evaluation in P2P lending Niu, Kun

536 C p. 120-134
article
26 Semi-Supervised Multi-view clustering based on orthonormality-constrained nonnegative matrix factorization Cai, Hao

536 C p. 171-184
article
27 Single bus line timetable optimization with big data: A case study in Beijing Ma, Hongguang

536 C p. 53-66
article
                             27 results found
 
 Koninklijke Bibliotheek - National Library of the Netherlands