Digitale Bibliotheek
Sluiten Bladeren door artikelen uit een tijdschrift
     Tijdschrift beschrijving
       Alle jaargangen van het bijbehorende tijdschrift
         Alle afleveringen van het bijbehorende jaargang
                                       Alle artikelen van de bijbehorende aflevering
 
                             21 gevonden resultaten
nr titel auteur tijdschrift jaar jaarg. afl. pagina('s) type
1 A CDMA/TDD approach for wireless mesh networks Al-wazedi, Imam
2010
36 5 p. 978-992
15 p.
artikel
2 Adaptive receiver-driven approach in P2P live streaming networks Chen, Tsung Hung
2010
36 5 p. 1002-1013
12 p.
artikel
3 A new error concealment method for consecutive frame loss based on CELP speech Yang, Jie
2010
36 5 p. 1014-1020
7 p.
artikel
4 A novel implementation of radix-4 floating-point division/square-root using comparison multiples Nikmehr, H.
2010
36 5 p. 850-863
14 p.
artikel
5 A PSO-based weighting method for linear combination of neural networks Nabavi-Kerizi, S.H.
2010
36 5 p. 886-894
9 p.
artikel
6 A scheme of test data compression based on coding of even bits marking and selective output inversion Zhan, Wenfa
2010
36 5 p. 969-977
9 p.
artikel
7 DMP-tree: A dynamic M-way prefix tree data structure for strings matching Yazdani, Nasser
2010
36 5 p. 818-834
17 p.
artikel
8 Dynamic routing of real-time jobs among parallel EDF queues: A performance study Kargahi, Mehdi
2010
36 5 p. 835-849
15 p.
artikel
9 Editorial Board 2010
36 5 p. IFC-
1 p.
artikel
10 Efficient bit-parallel multipliers over finite fields GF(2 m ) Lee, Chiou-Yng
2010
36 5 p. 955-968
14 p.
artikel
11 Forgery attacks on Kang et al.’s identity-based strong designated verifier signature scheme and its improvement with security proof Lee, Ji-Seon
2010
36 5 p. 948-954
7 p.
artikel
12 Improving responsiveness of soft aperiodic tasks using proportional slack time Kim, Heeheon
2010
36 5 p. 913-926
14 p.
artikel
13 Incremental labeling in closed-2PM model Rostamabadi, Farshad
2010
36 5 p. 895-901
7 p.
artikel
14 Modified self-shrinking generator Kanso, Ali
2010
36 5 p. 993-1001
9 p.
artikel
15 Parallel merged multiplier–accumulator coprocessor optimized for digital filters Parandeh-Afshar, H.
2010
36 5 p. 864-873
10 p.
artikel
16 Power-aware BTB for modern processors Deris, Kaveh Jokar
2010
36 5 p. 902-911
10 p.
artikel
17 Power-based multi-cell call admission control scheme for wideband-CDMA systems Al-nahari, A.Y.
2010
36 5 p. 935-947
13 p.
artikel
18 Segmenting and tracking multiple objects under occlusion using multi-label graph cut Wu, Mingjun
2010
36 5 p. 927-934
8 p.
artikel
19 Semantic web service composition testbed Yeganeh, Soheil Hassas
2010
36 5 p. 805-817
13 p.
artikel
20 Special section on advances in computing systems science and engineering Sarbazi-Azad, H.
2010
36 5 p. 803-804
2 p.
artikel
21 Vulnerability analysis of networks to detect multiphase attacks using the actor-based language Rebeca Shahriari, Hamid Reza
2010
36 5 p. 874-885
12 p.
artikel
                             21 gevonden resultaten
 
 Koninklijke Bibliotheek - Nationale Bibliotheek van Nederland