nr |
titel |
auteur |
tijdschrift |
jaar |
jaarg. |
afl. |
pagina('s) |
type |
1 |
A hybrid soft computing with big data analytics based protection and recovery strategy for security enhancement in large scale real world online social networks
|
Satish Kumar, A. |
|
|
927 |
C |
p. 15-30 |
artikel |
2 |
Combinatorics of minimal absent words for a sliding window
|
Akagi, Tooru |
|
|
927 |
C |
p. 109-119 |
artikel |
3 |
Computable model discovery and high-level-programming approximations to algorithmic complexity
|
Lemus, Vladimir |
|
|
927 |
C |
p. 31-41 |
artikel |
4 |
Computational aspects of sturdy and flimsy numbers
|
Clokie, Trevor |
|
|
927 |
C |
p. 65-86 |
artikel |
5 |
Deterministic top-down tree automata with Boolean deterministic look-ahead
|
Vágvölgyi, Sándor |
|
|
927 |
C |
p. 42-64 |
artikel |
6 |
Digital misinformation and fake news detection using WoT integration with Asian social networks fusion based feature extraction with text and image classification by machine learning architectures
|
Surekha, T. Lakshmi |
|
|
927 |
C |
p. 1-14 |
artikel |
7 |
Editorial Board
|
|
|
|
927 |
C |
p. ii |
artikel |
8 |
Gray codes for Fibonacci q-decreasing words
|
Baril, Jean-Luc |
|
|
927 |
C |
p. 120-132 |
artikel |
9 |
Lie complexity of words
|
Bell, Jason P. |
|
|
927 |
C |
p. 98-108 |
artikel |
10 |
Optimizing hybrid metaheuristic algorithm with cluster head to improve performance metrics on the IoT
|
Khan, Mohd Abdul Rahim |
|
|
927 |
C |
p. 87-97 |
artikel |
11 |
Preprocessing succinct non-interactive arguments for rank-1 constraint satisfiability from holographic proofs
|
Zhang, Shuangjun |
|
|
927 |
C |
p. 148-161 |
artikel |
12 |
String indexing for top-k close consecutive occurrences
|
Bille, Philip |
|
|
927 |
C |
p. 133-147 |
artikel |