Digital Library
Close Browse articles from a journal
     Journal description
       All volumes of the corresponding journal
         All issues of the corresponding volume
                                       All articles of the corresponding issues
 
                             28 results found
no title author magazine year volume issue page(s) type
1 An artificial moment method for conflict resolutions with robots being close to their targets Xu, Wangbao

542 C p. 286-301
article
2 An effective recommendation model based on deep representation learning Ni, Juan

542 C p. 324-342
article
3 A privacy-preserving public integrity check scheme for outsourced EHRs Su, Yuan

542 C p. 112-130
article
4 A process mining algorithm to mixed multiple-concurrency short-loop structures Sun, HongWei

542 C p. 453-475
article
5 Bayesian personalized ranking based on multiple-layer neighborhoods Hu, Yutian

542 C p. 156-176
article
6 Callback2Vec: Callback-aware hierarchical embedding for mobile application Guo, Chenkai

542 C p. 131-155
article
7 C y : Chaotic yolo for user intended image encryption and sharing in social media Asgari-Chenaghlu, Meysam

542 C p. 212-227
article
8 Describing hierarchy of concept lattice by using matrix Hong Pak, Chol

542 C p. 58-70
article
9 Design of stabilized polynomial-based ensemble fuzzy neural networks based on heterogeneous neurons and synergy of multiple techniques Zhang, Congcong

542 C p. 425-452
article
10 Discussing discrete 2-uninorms using lower and upper ordinal sums Wang, Zhudeng

542 C p. 317-323
article
11 Distributed-ensemble stacked autoencoder model for non-linear process monitoring Li, Zhichao

542 C p. 302-316
article
12 Distributed event-triggered control for multi-agent systems under intermittently random denial-of-service attacks Zhang, Tian-Yu

542 C p. 380-390
article
13 Editorial Board
542 C p. ii
article
14 Efficient hierarchical surrogate-assisted differential evolution for high-dimensional expensive optimization Chen, Guodong

542 C p. 228-246
article
15 Efficiently mining maximal co-locations in a spatial continuous field under directed road networks Yao, Xiaojing

542 C p. 357-379
article
16 Event-triggered predictive control for networked control systems with DoS attacks Deng, Yurou

542 C p. 71-91
article
17 Extreme clustering – A clustering method via density extreme points Wang, Shuliang

542 C p. 24-39
article
18 FaultFace: Deep Convolutional Generative Adversarial Network (DCGAN) based Ball-Bearing failure detection method Viola, Jairo

542 C p. 195-211
article
19 Fuzzy modeling of boiler efficiency in power plants Wang, Y.F.

542 C p. 391-405
article
20 Group consensus via pinning control for a class of heterogeneous multi-agent systems with input constraints Li, Xiaobo

542 C p. 247-262
article
21 HNS: Hierarchical negative sampling for network representation learning Chen, Junyang

542 C p. 343-356
article
22 k-Mnv-Rep: A k-type clustering algorithm for matrix-object data Yu, Liqin

542 C p. 40-57
article
23 Multiple local 3D CNNs for region-based prediction in smart cities Chen, Yibi

542 C p. 476-491
article
24 Novel binary differential evolution algorithm for knapsack problems Ali, Ismail M.

542 C p. 177-194
article
25 Overlap and grouping functions on complete lattices Qiao, Junsheng

542 C p. 406-424
article
26 RCSMOTE: Range-Controlled synthetic minority over-sampling technique for handling the class imbalance problem Soltanzadeh, Paria

542 C p. 92-111
article
27 Robust and discriminative zero-watermark scheme based on invariant features and similarity-based retrieval to protect large-scale DIBR 3D videos Liu, Xiyao

542 C p. 263-285
article
28 Sequential dynamic event recommendation in event-based social networks: An upper confidence bound approach Liang, Yuan

542 C p. 1-23
article
                             28 results found
 
 Koninklijke Bibliotheek - National Library of the Netherlands