Digital Library
Close Browse articles from a journal
     Journal description
       All volumes of the corresponding journal
         All issues of the corresponding volume
                                       All articles of the corresponding issues
 
                             27 results found
no title author magazine year volume issue page(s) type
1 Adaptively secure certificate-based broadcast encryption and its application to cloud storage service Chen, Liqing

538 C p. 273-289
article
2 Adaptive stock trading strategies with deep reinforcement learning methods Wu, Xing

538 C p. 142-158
article
3 A multilevel neighborhood sequential decision approach of three-way granular computing Yang, Xin

538 C p. 119-141
article
4 An accurate and dynamic predictive model for a smart M-Health system using machine learning Naseer Qureshi, Kashif

538 C p. 486-502
article
5 Bi-objective optimization of biclustering with binary data Hanafi, Saïd

538 C p. 444-466
article
6 Covering-based variable precision fuzzy rough sets with PROMETHEE-EDAS methods Zhan, Jianming

538 C p. 314-336
article
7 Differentially private distributed optimization for multi-agent systems via the augmented Lagrangian algorithm Lv, Yuan-Wei

538 C p. 39-53
article
8 Differentially private publication of streaming trajectory data Ding, Xiaofeng

538 C p. 159-175
article
9 Editorial Board
538 C p. ii
article
10 Efficient ciphertext-policy attribute-based encryption with blackbox traceability Xu, Shengmin

538 C p. 19-38
article
11 Error-tolerant label prior for interactive image segmentation Wang, Tao

538 C p. 384-395
article
12 Exponential operational laws and new aggregation operators for intuitionistic multiplicative set in multiple-attribute group decision making process Garg, Harish

538 C p. 245-272
article
13 Generalized decomposition integral Horanská, L'ubomíra

538 C p. 415-427
article
14 Improved recurrent generative adversarial networks with regularization techniques and a controllable framework Lee, Minhyeok

538 C p. 428-443
article
15 Intent-based resource matching strategy in cloud He, Li

538 C p. 1-18
article
16 Measures associated with granularity and rough approximations in interval-valued information tables based on kernel similarity relations Ma, Xi-Ao

538 C p. 337-357
article
17 Multiattribute decision method for comprehensive logistics distribution center location selection based on 2-dimensional linguistic information Liu, Peide

538 C p. 209-244
article
18 On relationship between three-way concept lattices Zhao, Xuerong

538 C p. 396-414
article
19 Ordered pair of normalized real numbers Zhou, Lei

538 C p. 290-313
article
20 Pareto dominance based Multiobjective Cohort Intelligence algorithm Patil, Mukundraj V.

538 C p. 69-118
article
21 Posterior concentration and fast convergence rates for generalized Bayesian learning Ho, Lam Si Tung

538 C p. 372-383
article
22 Publisher’s Note
538 C p. iii
article
23 Quantum generative adversarial network for generating discrete distribution Situ, Haozhen

538 C p. 193-208
article
24 Ranking via partial ordering for answer selection Jin, Zan-Xia

538 C p. 358-371
article
25 Remarks on the cryptanalysis of common prime RSA for IoT constrained low power devices Mumtaz, Majid

538 C p. 54-68
article
26 Resilient decentralized sampled-data H ∞ filter design for linear interconnected systems subject to denial-of-service attacks Gao, Rui

538 C p. 467-485
article
27 Semantic trajectory representation and retrieval via hierarchical embedding Gao, Chongming

538 C p. 176-192
article
                             27 results found
 
 Koninklijke Bibliotheek - National Library of the Netherlands