Digital Library
Close Browse articles from a journal
     Journal description
       All volumes of the corresponding journal
         All issues of the corresponding volume
                                       All articles of the corresponding issues
 
                             30 results found
no title author magazine year volume issue page(s) type
1 Adaptive XACML access policies for heterogeneous distributed IoT environments Riad, Khaled

548 C p. 135-152
article
2 A hybrid interval type-2 semi-supervised possibilistic fuzzy c-means clustering and particle swarm optimization for satellite image analysis Mai, Dinh Sinh

548 C p. 398-422
article
3 A novel multi-scale fusion framework for detail-preserving low-light image enhancement Xu, Yadong

548 C p. 378-397
article
4 A periodic iterative learning scheme for finite-iteration tracking of discrete networks based on FlexRay communication protocol Xiong, Wenjun

548 C p. 344-356
article
5 A robust data simulation technique to improve early detection performance of a classifier in control chart pattern recognition systems Ünlü, Ramazan

548 C p. 18-36
article
6 Bayesian regression and classification using Gaussian process priors indexed by probability density functions Fradi, A.

548 C p. 56-68
article
7 Detectability vverification of probabilistic Boolean networks Han, Xiao-Guang

548 C p. 313-327
article
8 Editorial Board
548 C p. ii
article
9 EGC: Entropy-based gradient compression for distributed deep learning Xiao, Danyang

548 C p. 118-134
article
10 Exploiting the potentialities of features for speech emotion recognition Li, Dongdong

548 C p. 328-343
article
11 Finding influential communities in networks with multiple influence types Seo, Jung Hyuk

548 C p. 254-274
article
12 Fusion of heterogeneous attention mechanisms in multi-view convolutional neural network for text classification Liang, Yunji

548 C p. 295-312
article
13 Fuzzy approximation-based adaptive finite-time control for nonstrict feedback nonlinear systems with state constraints Liu, Yongchao

548 C p. 101-117
article
14 Hybrid-triggered-based security controller design for networked control system under multiple cyber attacks Cao, Jie

548 C p. 69-84
article
15 Improved I-nice clustering algorithm based on density peaks mechanism He, Yulin

548 C p. 177-190
article
16 Information synergy entropy based multi-feature information fusion for the operating condition identification in aluminium electrolysis Chen, Zuguo

548 C p. 275-294
article
17 Link prediction based on feature representation and fusion Xiao, Yunpeng

548 C p. 1-17
article
18 LPQ++: A discriminative blur-insensitive textural descriptor with spatial-channel interaction Zhu, Zihao

548 C p. 191-211
article
19 Membership-function-dependent stability analysis and local controller design for T–S fuzzy systems: A space-enveloping approach Zheng, Hua

548 C p. 233-253
article
20 Microaggregation heuristic applied to statistical disclosure control Fadel, Augusto César

548 C p. 37-55
article
21 Mobility and marginal gain based content caching and placement for cooperative edge-cloud computing Li, Chunlin

548 C p. 153-176
article
22 Objective function-based rough membership C-means clustering Ubukata, Seiki

548 C p. 479-496
article
23 Optimal sensor attacks in cyber-physical systems with Round-Robin protocol Zhang, Xiao-Guang

548 C p. 85-100
article
24 Pattern classification with Evolving Long-term Cognitive Networks Nápoles, Gonzalo

548 C p. 461-478
article
25 PPCL: Privacy-preserving collaborative learning for mitigating indirect information leakage Yan, Hongyang

548 C p. 423-437
article
26 Privacy-preserving and verifiable online crowdsourcing with worker updates Zhang, Xiaoyu

548 C p. 212-232
article
27 Quantum resistant key-exposure free chameleon hash and applications in redactable blockchain Wu, Chunhui

548 C p. 438-449
article
28 Selecting green third party logistics providers for a loss-averse fourth party logistics provider in a multiattribute reverse auction Qian, Xiaohu

548 C p. 357-377
article
29 Transfer learning based countermeasure against label flipping poisoning attack Chan, Patrick P.K.

548 C p. 450-460
article
30 Why you should stop predicting customer churn and start using uplift models Devriendt, Floris

548 C p. 497-515
article
                             30 results found
 
 Koninklijke Bibliotheek - National Library of the Netherlands