Digital Library
Close Browse articles from a journal
     Journal description
       All volumes of the corresponding journal
         All issues of the corresponding volume
                                       All articles of the corresponding issues
 
                             52 results found
no title author magazine year volume issue page(s) type
1 A capability-based security approach to manage access control in the Internet of Things Gusmeroli, Sergio
2013
58 5-6 p. 1189-1205
17 p.
article
2 A cognitive RBAC model with handover functions in small heterogeneous networks Chen, Hsing-Chung
2013
58 5-6 p. 1267-1288
22 p.
article
3 A complete ranking of DMUs with undesirable outputs using restrictions in DEA models Guo, Dong
2013
58 5-6 p. 1102-1109
8 p.
article
4 A DEA-based approach for fair reduction and reallocation of emission permits Wu, Huaqing
2013
58 5-6 p. 1095-1101
7 p.
article
5 A Malmquist CO2 emission performance index based on a metafrontier approach Wang, Qunwei
2013
58 5-6 p. 1068-1073
6 p.
article
6 A method for producing requirement-specific protocol graphs in a flexible network architecture Günther, Daniel
2013
58 5-6 p. 1379-1388
10 p.
article
7 A multilevel information fusion approach for road congestion detection in VANETs Zhang, Linjuan
2013
58 5-6 p. 1206-1221
16 p.
article
8 Analysis of Beijing’s environmental efficiency and related factors using a DEA model that considers undesirable outputs Li, Xian-Guo
2013
58 5-6 p. 956-960
5 p.
article
9 A non-delegatable strong designated verifier signature in ID-based setting for mobile environment Tian, Haibo
2013
58 5-6 p. 1289-1300
12 p.
article
10 Anonymously accessing JXTA community services through split message forwarding Arnedo-Moreno, Joan
2013
58 5-6 p. 1313-1327
15 p.
article
11 A privacy preserving authentication scheme with flexible identity revocation in people-centric sensing Cao, Dan
2013
58 5-6 p. 1175-1188
14 p.
article
12 A secure communication over wireless environments by using a data connection core Huang, Yi-Li
2013
58 5-6 p. 1459-1474
16 p.
article
13 A stochastic DEA model considering undesirable outputs with weak disposability Wu, Chong
2013
58 5-6 p. 980-989
10 p.
article
14 Calculation of China’s environmental efficiency and relevant hierarchical cluster analysis from the perspective of regional differences Song, Malin
2013
58 5-6 p. 1084-1094
11 p.
article
15 China’s provincial industrial energy efficiency and its determinants Pan, Huifeng
2013
58 5-6 p. 1032-1039
8 p.
article
16 China’s regional energy and environmental efficiency: A DEA window analysis based dynamic evaluation Wang, Ke
2013
58 5-6 p. 1117-1127
11 p.
article
17 Cognitive analysis system for description and recognition of pathological changes in coronary arteries structure Trzupek, Mirosław
2013
58 5-6 p. 1441-1448
8 p.
article
18 Conjoint trust assessment for secure communication in cognitive radio networks Parvin, Sazia
2013
58 5-6 p. 1340-1350
11 p.
article
19 DEA based resource allocation considering environmental factors Wu, Jie
2013
58 5-6 p. 1128-1137
10 p.
article
20 Deadlock detection and recovery for component-based systems Li, Chen
2013
58 5-6 p. 1362-1378
17 p.
article
21 D-PMIPv6: A distributed mobility management scheme supported by data and control plane separation Yi, Li
2013
58 5-6 p. 1415-1426
12 p.
article
22 Economic evaluation of forestry industry based on ecosystem coupling Dong, Pei-wu
2013
58 5-6 p. 1010-1017
8 p.
article
23 Editorial Board 2013
58 5-6 p. iii-iv
nvt p.
article
24 ENDMal: An anti-obfuscation and collaborative malware detection system using syscall sequences Lu, Huabiao
2013
58 5-6 p. 1140-1154
15 p.
article
25 Energy-efficient carpool policy for wireless interfaces of mobile devices in ubiquitous environments Lim, Sung-Hwa
2013
58 5-6 p. 1301-1312
12 p.
article
26 Energy efficient virtual machine placement algorithm with balanced and improved resource utilization in a data center Li, Xin
2013
58 5-6 p. 1222-1235
14 p.
article
27 Environmental efficiency evaluation considering the maximization of desirable outputs and its application Song, Malin
2013
58 5-6 p. 1110-1116
7 p.
article
28 Environmental efficiency of electric power industry in the Yangtze River Delta Tao, Ye
2013
58 5-6 p. 927-935
9 p.
article
29 Environmental efficiency of industrial sectors in China: An improved weighted SBM model Zhou, Yan
2013
58 5-6 p. 990-999
10 p.
article
30 Evaluation of single and additive interference models for RFID collisions Zhang, Linchao
2013
58 5-6 p. 1236-1248
13 p.
article
31 Foreign investment, innovation capacity and environmental efficiency in China Gao, Xia
2013
58 5-6 p. 1040-1046
7 p.
article
32 iKRISTAL: An integrated information retrieval system using metadata on distributed environments Seo, Jeong-Hyeon
2013
58 5-6 p. 1351-1361
11 p.
article
33 LEAS: Localized efficient authentication scheme for multi-operator wireless mesh network with identity-based proxy signature Gao, Tianhan
2013
58 5-6 p. 1427-1440
14 p.
article
34 Measurement and evaluation of Chinese regional energy efficiency based on provincial panel data Zou, Gaofeng
2013
58 5-6 p. 1000-1009
10 p.
article
35 Measuring environmental performance in China’s industrial sectors with non-radial DEA Meng, F.Y.
2013
58 5-6 p. 1047-1056
10 p.
article
36 Measuring the environmental efficiency of the Chinese industrial sector: A directional distance function approach Yuan, Peng
2013
58 5-6 p. 936-947
12 p.
article
37 Modeling energy consumption in next-generation wireless access-over-WDM networks with hybrid power sources Ricciardi, Sergio
2013
58 5-6 p. 1389-1404
16 p.
article
38 On finding safe regions for moving range queries AL-Khalidi, Haidar
2013
58 5-6 p. 1449-1458
10 p.
article
39 Power consumption and processing models of servers in computation and storage based applications Inoue, Takuro
2013
58 5-6 p. 1475-1488
14 p.
article
40 Production efficiency evaluation of energy companies based on the improved super-efficiency data envelopment analysis considering undesirable outputs Li, Lei
2013
58 5-6 p. 1057-1067
11 p.
article
41 Regional differences of environmental efficiency of China’s energy utilization and environmental regulation cost based on provincial panel data and DEA method Yang, Li
2013
58 5-6 p. 1074-1083
10 p.
article
42 Regional environmental efficiency evaluation in China: Analysis based on the Super-SBM model with undesirable outputs Li, Hong
2013
58 5-6 p. 1018-1031
14 p.
article
43 Resource allocation models’ construction for the reduction of undesirable outputs based on DEA methods Li, Hong
2013
58 5-6 p. 913-926
14 p.
article
44 Semantic analysis and biological modelling in selected classes of cognitive information systems Ogiela, Lidia
2013
58 5-6 p. 1405-1414
10 p.
article
45 Shifting primes: Optimizing elliptic curve cryptography for 16-bit devices without hardware multiplier Marin, Leandro
2013
58 5-6 p. 1155-1174
20 p.
article
46 Special Issue on “Advances in mobile, ubiquitous and cognitive computing” Ogiela, Marek R.
2013
58 5-6 p. 1138-1139
2 p.
article
47 The convergence test of transformation performance of resource cities in China considering undesirable output Dong, Feng
2013
58 5-6 p. 948-955
8 p.
article
48 The measurement of undesirable output based-on DEA in E&E: Models development and empirical analysis Lv, Wendong
2013
58 5-6 p. 907-912
6 p.
article
49 Transverse and longitudinal analysis of the environmental efficiency of Chinese industries Wang, Hongqi
2013
58 5-6 p. 961-970
10 p.
article
50 Understanding urban dynamics based on pervasive sensing: An experimental study on traffic density and air pollution Yu, Xiaoxiao
2013
58 5-6 p. 1328-1339
12 p.
article
51 Undesirable input–output two-phase DEA model in an environmental performance audit Huang, Rongbing
2013
58 5-6 p. 971-979
9 p.
article
52 Utilizing artificial neural networks and genetic algorithms to build an algo-trading model for intra-day foreign exchange speculation Evans, Cain
2013
58 5-6 p. 1249-1266
18 p.
article
                             52 results found
 
 Koninklijke Bibliotheek - National Library of the Netherlands