Digitale Bibliotheek
Sluiten Bladeren door artikelen uit een tijdschrift
     Tijdschrift beschrijving
       Alle jaargangen van het bijbehorende tijdschrift
         Alle afleveringen van het bijbehorende jaargang
                                       Alle artikelen van de bijbehorende aflevering
 
                             21 gevonden resultaten
nr titel auteur tijdschrift jaar jaarg. afl. pagina('s) type
1 AIOLOS: Middleware for improving mobile application performance through cyber foraging Verbelen, Tim
2012
85 11 p. 2629-2639
11 p.
artikel
2 An endurance solution for solid state drives with cache Wang, Wei-neng
2012
85 11 p. 2553-2558
6 p.
artikel
3 Authentication of images for 3D cameras: Reversibly embedding information using intelligent approaches Malik, Sana Ambreen
2012
85 11 p. 2665-2673
9 p.
artikel
4 A variable-length model for masquerade detection Xiao, Xi
2012
85 11 p. 2470-2478
9 p.
artikel
5 Cross-layer end-to-end label switching protocol for WiMAX–MPLS heterogeneous networks Chen, Jenhui
2012
85 11 p. 2459-2469
11 p.
artikel
6 Editorial Board 2012
85 11 p. CO2-
1 p.
artikel
7 Execution of natural language requirements using State Machines synthesised from Behavior Trees Kim, Soon-Kyeong
2012
85 11 p. 2652-2664
13 p.
artikel
8 From Teleo-Reactive specifications to architectural components: A model-driven approach Sánchez, Pedro
2012
85 11 p. 2504-2518
15 p.
artikel
9 Grouping target paths for evolutionary generation of test data in parallel Gong, Dunwei
2012
85 11 p. 2531-2540
10 p.
artikel
10 Improved results on impossible differential cryptanalysis of reduced-round Camellia-192/256 Liu, Ya
2012
85 11 p. 2451-2458
8 p.
artikel
11 Interpretation problems related to the use of regression models to decide on economy of scale in software development Jørgensen, Magne
2012
85 11 p. 2494-2503
10 p.
artikel
12 JCSI: A tool for checking secure information flow in Java Card applications Avvenuti, Marco
2012
85 11 p. 2479-2493
15 p.
artikel
13 Managing data dependencies in service compositions Monsieur, Geert
2012
85 11 p. 2604-2628
25 p.
artikel
14 Masquerade attacks based on user's profile Razo-Zapata, Iván S.
2012
85 11 p. 2640-2651
12 p.
artikel
15 Nearest neighbor selection for iteratively kNN imputation Zhang, Shichao
2012
85 11 p. 2541-2552
12 p.
artikel
16 Ontology driven bee's foraging approach based self adaptive online recommendation system Mohanraj, V.
2012
85 11 p. 2439-2450
12 p.
artikel
17 Optimizing virtual machines using hybrid virtualization Lin, Qian
2012
85 11 p. 2593-2603
11 p.
artikel
18 Percolation-based routing in the Internet Palmieri, Francesco
2012
85 11 p. 2559-2573
15 p.
artikel
19 Performance analysis of SCOOP programs Morandi, Benjamin
2012
85 11 p. 2519-2530
12 p.
artikel
20 Software architecture evolution through evolvability analysis Breivold, Hongyu Pei
2012
85 11 p. 2574-2592
19 p.
artikel
21 Strong fuzzy c-means in medical image data analysis Kannan, S.R.
2012
85 11 p. 2425-2438
14 p.
artikel
                             21 gevonden resultaten
 
 Koninklijke Bibliotheek - Nationale Bibliotheek van Nederland