Digitale Bibliotheek
Sluiten Bladeren door artikelen uit een tijdschrift
     Tijdschrift beschrijving
       Alle jaargangen van het bijbehorende tijdschrift
         Alle afleveringen van het bijbehorende jaargang
                                       Alle artikelen van de bijbehorende aflevering
 
                             30 gevonden resultaten
nr titel auteur tijdschrift jaar jaarg. afl. pagina('s) type
1 Adaptive XACML access policies for heterogeneous distributed IoT environments Riad, Khaled

548 C p. 135-152
artikel
2 A hybrid interval type-2 semi-supervised possibilistic fuzzy c-means clustering and particle swarm optimization for satellite image analysis Mai, Dinh Sinh

548 C p. 398-422
artikel
3 A novel multi-scale fusion framework for detail-preserving low-light image enhancement Xu, Yadong

548 C p. 378-397
artikel
4 A periodic iterative learning scheme for finite-iteration tracking of discrete networks based on FlexRay communication protocol Xiong, Wenjun

548 C p. 344-356
artikel
5 A robust data simulation technique to improve early detection performance of a classifier in control chart pattern recognition systems Ünlü, Ramazan

548 C p. 18-36
artikel
6 Bayesian regression and classification using Gaussian process priors indexed by probability density functions Fradi, A.

548 C p. 56-68
artikel
7 Detectability vverification of probabilistic Boolean networks Han, Xiao-Guang

548 C p. 313-327
artikel
8 Editorial Board
548 C p. ii
artikel
9 EGC: Entropy-based gradient compression for distributed deep learning Xiao, Danyang

548 C p. 118-134
artikel
10 Exploiting the potentialities of features for speech emotion recognition Li, Dongdong

548 C p. 328-343
artikel
11 Finding influential communities in networks with multiple influence types Seo, Jung Hyuk

548 C p. 254-274
artikel
12 Fusion of heterogeneous attention mechanisms in multi-view convolutional neural network for text classification Liang, Yunji

548 C p. 295-312
artikel
13 Fuzzy approximation-based adaptive finite-time control for nonstrict feedback nonlinear systems with state constraints Liu, Yongchao

548 C p. 101-117
artikel
14 Hybrid-triggered-based security controller design for networked control system under multiple cyber attacks Cao, Jie

548 C p. 69-84
artikel
15 Improved I-nice clustering algorithm based on density peaks mechanism He, Yulin

548 C p. 177-190
artikel
16 Information synergy entropy based multi-feature information fusion for the operating condition identification in aluminium electrolysis Chen, Zuguo

548 C p. 275-294
artikel
17 Link prediction based on feature representation and fusion Xiao, Yunpeng

548 C p. 1-17
artikel
18 LPQ++: A discriminative blur-insensitive textural descriptor with spatial-channel interaction Zhu, Zihao

548 C p. 191-211
artikel
19 Membership-function-dependent stability analysis and local controller design for T–S fuzzy systems: A space-enveloping approach Zheng, Hua

548 C p. 233-253
artikel
20 Microaggregation heuristic applied to statistical disclosure control Fadel, Augusto César

548 C p. 37-55
artikel
21 Mobility and marginal gain based content caching and placement for cooperative edge-cloud computing Li, Chunlin

548 C p. 153-176
artikel
22 Objective function-based rough membership C-means clustering Ubukata, Seiki

548 C p. 479-496
artikel
23 Optimal sensor attacks in cyber-physical systems with Round-Robin protocol Zhang, Xiao-Guang

548 C p. 85-100
artikel
24 Pattern classification with Evolving Long-term Cognitive Networks Nápoles, Gonzalo

548 C p. 461-478
artikel
25 PPCL: Privacy-preserving collaborative learning for mitigating indirect information leakage Yan, Hongyang

548 C p. 423-437
artikel
26 Privacy-preserving and verifiable online crowdsourcing with worker updates Zhang, Xiaoyu

548 C p. 212-232
artikel
27 Quantum resistant key-exposure free chameleon hash and applications in redactable blockchain Wu, Chunhui

548 C p. 438-449
artikel
28 Selecting green third party logistics providers for a loss-averse fourth party logistics provider in a multiattribute reverse auction Qian, Xiaohu

548 C p. 357-377
artikel
29 Transfer learning based countermeasure against label flipping poisoning attack Chan, Patrick P.K.

548 C p. 450-460
artikel
30 Why you should stop predicting customer churn and start using uplift models Devriendt, Floris

548 C p. 497-515
artikel
                             30 gevonden resultaten
 
 Koninklijke Bibliotheek - Nationale Bibliotheek van Nederland