Digitale Bibliotheek
Sluiten Bladeren door artikelen uit een tijdschrift
     Tijdschrift beschrijving
       Alle jaargangen van het bijbehorende tijdschrift
         Alle afleveringen van het bijbehorende jaargang
                                       Alle artikelen van de bijbehorende aflevering
 
                             208 gevonden resultaten
nr titel auteur tijdschrift jaar jaarg. afl. pagina('s) type
1 A brief survey on probability distribution approximation Melucci, Massimo
2019
11-12 C p. 91-97
artikel
2 A comparative review of Urdu stemmers: Approaches and challenges Jabbar, Abdul

11-12 C p.
artikel
3 A comparative study on popular MAC protocols for mixed Wireless Sensor Networks: From implementation viewpoint Maitra, Tanmoy
2016
11-12 C p. 107-134
28 p.
artikel
4 A comprehensive and systematic look up into deep learning based object detection techniques: A review Sharma, Vipul

11-12 C p.
artikel
5 A comprehensive survey and analysis of generative models in machine learning GM, Harshvardhan

11-12 C p.
artikel
6 A comprehensive survey of service function chain provisioning approaches in SDN and NFV architecture Kaur, Karamjeet

11-12 C p.
artikel
7 A comprehensive taxonomy of schemes to detect and mitigate blackhole attack and its variants in MANETs Khanna, Nitin
2019
11-12 C p. 24-44
artikel
8 A critical overview of outlier detection methods Smiti, Abir

11-12 C p.
artikel
9 Adaptive gamification in Collaborative systems, a systematic mapping study Dalponte Ayastuy, María

11-12 C p.
artikel
10 Advancement from neural networks to deep learning in software effort estimation: Perspective of two decades Suresh Kumar, P.

11-12 C p.
artikel
11 Aeronautical communication transition from analog to digital data: A network security survey Ben Mahmoud, Mohamed Slim
2014
11-12 C p. 1-29
29 p.
artikel
12 Agent Based Modelling and Simulation tools: A review of the state-of-art software Abar, Sameera
2017
11-12 C p. 13-33
21 p.
artikel
13 An annotated bibliography on 1-planarity Kobourov, Stephen G.
2017
11-12 C p. 49-67
19 p.
artikel
14 An overview of self-adaptive technologies within virtual reality training Vaughan, Neil
2016
11-12 C p. 65-87
23 p.
artikel
15 Applicability of Blockchain smart contracts in securing Internet and IoT: A systematic literature review Lone, Auqib Hamid

11-12 C p.
artikel
16 Applicability of mobile contact tracing in fighting pandemic (COVID-19): Issues, challenges and solutions Dar, Aaqib Bashir

11-12 C p.
artikel
17 Application of deep learning for retinal image analysis: A review Badar, Maryam

11-12 C p.
artikel
18 Approximation and online algorithms for multidimensional bin packing: A survey Christensen, Henrik I.
2017
11-12 C p. 63-79
17 p.
artikel
19 A PRISMA-compliant systematic review and analysis on color image encryption using DNA properties Sokouti, Massoud
2018
11-12 C p. 14-20
artikel
20 Arabic Machine Translation: A survey of the latest trends and challenges Ameur, Mohamed Seghir Hadj

11-12 C p.
artikel
21 A recent review of conventional vs. automated cybersecurity anti-phishing techniques Qabajeh, Issa
2018
11-12 C p. 44-55
artikel
22 A review of attack graph and attack tree visual syntax in cyber security Lallie, Harjinder Singh

11-12 C p.
artikel
23 A review of using object-orientation properties of C++ for designing expert system in strategic planning Ahmadi, Mohsen

11-12 C p.
artikel
24 A state-of-the-art review of FMEA/FMECA including patents Spreafico, Christian
2017
11-12 C p. 19-28
10 p.
artikel
25 A still simpler way of introducing interior-point method for linear programming Mehlhorn, Kurt
2016
11-12 C p. 1-11
11 p.
artikel
26 A survey of active learning in collaborative filtering recommender systems Elahi, Mehdi
2016
11-12 C p. 29-50
22 p.
artikel
27 A survey of android application and malware hardening Sihag, Vikas

11-12 C p.
artikel
28 A survey of data center consolidation in cloud computing systems Helali, Leila

11-12 C p.
artikel
29 A survey of identifier–locator split addressing architectures Komu, Miika
2015
11-12 C p. 25-42
18 p.
artikel
30 A survey of Konkani NLP resources Rajan, Annie

11-12 C p.
artikel
31 A survey of live Virtual Machine migration techniques Le, Tuan

11-12 C p.
artikel
32 A survey of malware detection in Android apps: Recommendations and perspectives for future research Razgallah, Asma

11-12 C p.
artikel
33 A survey of memory management techniques in virtualized systems Mishra, Debadatta
2018
11-12 C p. 56-73
artikel
34 A survey of neighborhood construction algorithms for clustering and classifying data points Pourbahrami, Shahin

11-12 C p.
artikel
35 A survey of safety and trustworthiness of deep neural networks: Verification, testing, adversarial attack and defence, and interpretability Huang, Xiaowei

11-12 C p.
artikel
36 A survey of the modified Moran process and evolutionary graph theory Díaz, Josep

11-12 C p.
artikel
37 A survey of timed automata for the development of real-time systems Waez, Md Tawhid Bin
2013
11-12 C p. 1-26
26 p.
artikel
38 A survey on design and implementation of protected searchable data in the cloud Dowsley, Rafael
2017
11-12 C p. 17-30
artikel
39 A survey on essential components of a self-sovereign identity Mühle, Alexander
2018
11-12 C p. 80-86
artikel
40 A Survey on malware analysis and mitigation techniques Sibi Chakkaravarthy, S.
2019
11-12 C p. 1-23
artikel
41 A survey on mobile affective computing Politou, Eugenia
2017
11-12 C p. 79-100
22 p.
artikel
42 A survey on parallel and distributed multi-agent systems for high performance computing simulations Rousset, Alban
2016
11-12 C p. 27-46
20 p.
artikel
43 A survey on privacy and security of Internet of Things Ogonji, Mark Mbock

11-12 C p.
artikel
44 A survey on privacy in decentralized online social networks De Salve, Andrea
2018
11-12 C p. 154-176
artikel
45 A Survey on quantum computing technology Gyongyosi, Laszlo
2019
11-12 C p. 51-71
artikel
46 A survey on socio-semantic information retrieval Schoefegger, Karin
2013
11-12 C p. 25-46
22 p.
artikel
47 A survey on the usability and practical applications of Graphical Security Models Hong, Jin B.
2017
11-12 C p. 1-16
artikel
48 A survey on tree matching and XML retrieval Tahraoui, Mohammed Amin
2013
11-12 C p. 1-23
23 p.
artikel
49 A systematic mapping review of context-aware analysis and its approach to mobile learning and ubiquitous learning processes Vallejo-Correa, Paola

11-12 C p.
artikel
50 A systematic mapping study of API usability evaluation methods Rauf, Irum
2019
11-12 C p. 49-68
artikel
51 A systematic mapping study of clone visualization Hammad, Muhammad

11-12 C p.
artikel
52 A taxonomy and survey of attacks against machine learning Pitropakis, Nikolaos

11-12 C p.
artikel
53 Attention to news and its dissemination on Twitter: A survey Orellana-Rodriguez, Claudia
2018
11-12 C p. 74-94
artikel
54 Automated knowledge base management: A survey Martinez-Gil, Jorge
2015
11-12 C p. 1-9
9 p.
artikel
55 Automatic hand gesture recognition using hybrid meta-heuristic-based feature selection and classification with Dynamic Time Warping Kowdiki, Manisha

11-12 C p.
artikel
56 Background subtraction in real applications: Challenges, current models and future directions Garcia-Garcia, Belmar

11-12 C p.
artikel
57 Big data and IoT-based applications in smart environments: A systematic review Hajjaji, Yosra

11-12 C p.
artikel
58 Big networks: A survey Bedru, Hayat Dino

11-12 C p.
artikel
59 Blockchain technology in the energy sector: From basic research to real world applications Wang, Qiang

11-12 C p.
artikel
60 Caching methodologies in Content centric networking (CCN): A survey Lal, Nidhi
2019
11-12 C p. 39-50
artikel
61 Catastrophic event phenomena in communication networks: A survey Dabrowski, Christopher
2015
11-12 C p. 10-45
36 p.
artikel
62 Change point detection in social networks—Critical review with experiments Kendrick, Lucy
2018
11-12 C p. 1-13
artikel
63 Characterizing DDoS attacks and flash events: Review, research gaps and future directions Behal, Sunny
2017
11-12 C p. 101-114
14 p.
artikel
64 Citations, research topics and active countries in software engineering: A bibliometrics study Garousi, Vahid
2016
11-12 C p. 56-77
22 p.
artikel
65 Cluster ensembles: A survey of approaches with recent extensions and applications Boongoen, Tossapon
2018
11-12 C p. 1-25
artikel
66 Combining UML and ontology: An exploratory survey Mejhed Mkhinini, Meriem

11-12 C p.
artikel
67 Community detection in node-attributed social networks: A survey Chunaev, Petr

11-12 C p.
artikel
68 Compactors for parameterized counting problems Thilikos, Dimitrios M.

11-12 C p.
artikel
69 Comparative analysis on cross-modal information retrieval: A review Kaur, Parminder

11-12 C p.
artikel
70 Comparative study for 8 computational intelligence algorithms for human identification Abdulrahman, Shaymaa Adnan

11-12 C p.
artikel
71 Conjunctive and Boolean grammars: The true general case of the context-free grammars Okhotin, Alexander
2013
11-12 C p. 27-59
33 p.
artikel
72 Considerations about the efficiency and sufficiency of the utilization of the Scrum methodology: A survey for analyzing results for development teams Morandini, Marcelo

11-12 C p.
artikel
73 Context Aware Recommendation Systems: A review of the state of the art techniques Kulkarni, Saurabh

11-12 C p.
artikel
74 Conversational agents in business: A systematic literature review and future research directions Bavaresco, Rodrigo

11-12 C p.
artikel
75 Corrigendum to “Catastrophic event phenomena in communication networks: A survey” [Comput. Sci. Rev. 18 (2015) 10–45] Dabrowski, Christopher
2016
11-12 C p. 51-
1 p.
artikel
76 Crowdsourcing: A taxonomy and systematic mapping study Hosseini, Mahmood
2015
11-12 C p. 43-69
27 p.
artikel
77 Current status and key issues in image steganography: A survey Subhedar, Mansi S.
2014
11-12 C p. 95-113
19 p.
artikel
78 Current trends in consumption of multimedia content using online streaming platforms: A user-centric survey Falkowski-Gilski, Przemysław

11-12 C p.
artikel
79 Cyber-insurance survey Marotta, Angelica
2017
11-12 C p. 35-61
27 p.
artikel
80 DAG-based attack and defense modeling: Don’t miss the forest for the attack trees Kordy, Barbara
2014
11-12 C p. 1-38
38 p.
artikel
81 Data Mining and Information Retrieval in the 21st century: A bibliographic review Liu, Jiaying

11-12 C p.
artikel
82 Data mining of social networks represented as graphs Nettleton, David F.
2013
11-12 C p. 1-34
34 p.
artikel
83 Decomposition into low-rank plus additive matrices for background/foreground separation: A review for a comparative evaluation with a large-scale dataset Bouwmans, Thierry
2017
11-12 C p. 1-71
71 p.
artikel
84 Deep Learning Algorithms for Cybersecurity Applications: A Technological and Status Review Dixit, Priyanka

11-12 C p.
artikel
85 Deep Learning Methods for Multi-Species Animal Re-identification and Tracking – a Survey Ravoor, Prashanth C.

11-12 C p.
artikel
86 Detection and mitigation of DDoS attacks in SDN: A comprehensive review, research challenges and future directions Singh, Jagdeep

11-12 C p.
artikel
87 Development of improved whale optimization-based FCM clustering for image watermarking Soppari, Kavitha

11-12 C p.
artikel
88 DevOps and software quality: A systematic mapping Mishra, Alok

11-12 C p.
artikel
89 Digital audio steganography: Systematic review, classification, and analysis of the current state of the art AlSabhany, Ahmed A.

11-12 C p.
artikel
90 Digital watermarking: Applicability for developing trust in medical imaging workflows state of the art review Qasim, Asaad F.
2018
11-12 C p. 45-60
artikel
91 Distributed denial of service attacks in cloud: State-of-the-art of scientific and commercial solutions Bhardwaj, Aanshi

11-12 C p.
artikel
92 Distributed virtual machine consolidation: A systematic mapping study Ashraf, Adnan
2018
11-12 C p. 118-130
artikel
93 Editorial Board 2018
11-12 C p. ii
artikel
94 Editorial Board 2019
11-12 C p. ii
artikel
95 Editorial Board 2018
11-12 C p. ii
artikel
96 Editorial Board 2019
11-12 C p. ii
artikel
97 Editorial Board 2019
11-12 C p. ii
artikel
98 Editorial Board
11-12 C p.
artikel
99 Editorial Board
11-12 C p.
artikel
100 Editorial Board 2017
11-12 C p. IFC-
1 p.
artikel
101 Editorial Board 2018
11-12 C p. ii
artikel
102 Editorial Board 2017
11-12 C p. IFC
artikel
103 Editorial Board 2018
11-12 C p. ii
artikel
104 Editorial Board
11-12 C p.
artikel
105 Editorial Board
11-12 C p.
artikel
106 Editorial Board
11-12 C p.
artikel
107 Editorial Board
11-12 C p.
artikel
108 Energy price prediction using data-driven models: A decade review Lu, Hongfang

11-12 C p.
artikel
109 Ensemble learning for intrusion detection systems: A systematic mapping study and cross-benchmark evaluation Tama, Bayu Adhi

11-12 C p.
artikel
110 Evaluation of information retrieval systems using structural equation modeling Melucci, Massimo
2019
11-12 C p. 1-18
artikel
111 Fault tree analysis: A survey of the state-of-the-art in modeling, analysis and tools Ruijters, Enno
2015
11-12 C p. 29-62
34 p.
artikel
112 Future FANET with application and enabling techniques: Anatomization and sustainability issues Srivastava, Ashish

11-12 C p.
artikel
113 General classification of the authenticated encryption schemes for the CAESAR competition Abed, Farzaneh
2016
11-12 C p. 13-26
14 p.
artikel
114 Generalizing input-driven languages: Theoretical and practical benefits Mandrioli, Dino
2018
11-12 C p. 61-87
artikel
115 Getting into the mind of an “in-auction” fraud perpetrator Trevathan, Jarrod
2018
11-12 C p. 1-15
artikel
116 Graph grammars according to the type of input and manipulated data: A survey Albane, Saadia
2018
11-12 C p. 178-203
artikel
117 Graph spanners: A tutorial review Ahmed, Reyan

11-12 C p.
artikel
118 Higher order mutation testing: A Systematic Literature Review Ghiduk, Ahmed S.
2017
11-12 C p. 29-48
20 p.
artikel
119 Homomorphic encryption systems statement: Trends and challenges Alaya, Bechir

11-12 C p.
artikel
120 How smart is e-tourism? A systematic review of smart tourism recommendation system applying data management Hamid, Rula A.

11-12 C p.
artikel
121 I2CE3: A dedicated and separated attack chain for ransomware offenses as the most infamous cyber extortion Keshavarzi, Masoudeh

11-12 C p.
artikel
122 Improved node localization using K-means clustering for Wireless Sensor Networks El Khediri, Salim

11-12 C p.
artikel
123 Indoor environment propagation review Obeidat, H.

11-12 C p.
artikel
124 Indoor location based services challenges, requirements and usability of current solutions Basiri, Anahid
2017
11-12 C p. 1-12
12 p.
artikel
125 Indoor location identification technologies for real-time IoT-based applications: An inclusive survey Oguntala, George
2018
11-12 C p. 55-79
artikel
126 Influence decision models: From cooperative game theory to social network analysis Molinero, Xavier

11-12 C p.
artikel
127 Integrating blockchain technology into the energy sector — from theory of blockchain to research and application of energy blockchain Wang, Qiang

11-12 C p.
artikel
128 Intelligent food processing: Journey from artificial neural network to deep learning Nayak, Janmenjoy

11-12 C p.
artikel
129 Intelligent retrieval and classification in three-dimensional biomedical images — A systematic mapping Bergamasco, Leila Cristina C.
2019
11-12 C p. 19-38
artikel
130 Introducing article numbering to Computer Science Review Li, Jimeng

11-12 C p.
artikel
131 Julia language in machine learning: Algorithms, applications, and open issues Gao, Kaifeng

11-12 C p.
artikel
132 Leveraging Deep Learning and IoT big data analytics to support the smart cities development: Review and future directions Atitallah, Safa Ben

11-12 C p.
artikel
133 Localization schemes for Underwater Acoustic Sensor Networks - A Review Toky, Archana

11-12 C p.
artikel
134 Location management in mobile network: A survey Mukherjee, Anwesha
2016
11-12 C p. 1-14
14 p.
artikel
135 Logo and seal based administrative document image retrieval: A survey Alaei, Alireza
2016
11-12 C p. 47-63
17 p.
artikel
136 Machine learning and multi-agent systems in oil and gas industry applications: A survey Hanga, Khadijah M.

11-12 C p.
artikel
137 Machine learning techniques for hate speech classification of twitter data: State-of-the-art, future challenges and research directions Ayo, Femi Emmanuel

11-12 C p.
artikel
138 Maria Serna and her years in Patras Spirakis, Paul G.

11-12 C p.
artikel
139 Maria Serna in Barcelona Àlvarez, Carme

11-12 C p.
artikel
140 Maria Serna’s contributions to adversarial queuing theory Blesa, Maria J.

11-12 C p.
artikel
141 Maximum cliques in graphs with small intersection number and random intersection graphs Nikoletseas, Sotiris E.

11-12 C p.
artikel
142 mHealth Authentication Approach Based 3D Touchscreen and Microphone Sensors for Real-Time Remote Healthcare Monitoring System: Comprehensive Review, Open Issues and Methodological Aspects Shuwandy, Moceheb Lazam

11-12 C p.
artikel
143 Model-based testing using UML activity diagrams: A systematic mapping study Ahmad, Tanwir
2019
11-12 C p. 98-112
artikel
144 Modelling web-service uncertainty: The angel/daemon approach Gabarro, Joaquim

11-12 C p.
artikel
145 Motif discovery in networks: A survey Yu, Shuo

11-12 C p.
artikel
146 Moving objects detection with a moving camera: A comprehensive review Chapel, Marie-Neige

11-12 C p.
artikel
147 Multidisciplinary Pattern Recognition applications: A review Paolanti, Marina

11-12 C p.
artikel
148 Multilayer network simplification: Approaches, models and methods Interdonato, Roberto

11-12 C p.
artikel
149 Named Data Networking: A survey Saxena, Divya
2016
11-12 C p. 15-55
41 p.
artikel
150 Nature-inspired algorithms for Wireless Sensor Networks: A comprehensive survey Singh, Abhilash

11-12 C p.
artikel
151 Near infrared face recognition: A literature survey Farokhi, Sajad
2016
11-12 C p. 1-17
17 p.
artikel
152 Network embedding: Taxonomies, frameworks and applications Hou, Mingliang

11-12 C p.
artikel
153 New trends on moving object detection in video images captured by a moving camera: A survey Yazdi, Mehran
2018
11-12 C p. 157-177
artikel
154 [No title] Díaz, Josep

11-12 C p.
artikel
155 [No title] Bálek, Martin
2013
11-12 C p. 35-46
12 p.
artikel
156 [No title] Zuhair Mahmoud, Khaled
2013
11-12 C p. 31-34
4 p.
artikel
157 Offline recognition of handwritten Indic scripts: A state-of-the-art survey and future perspectives Sharma, Reya

11-12 C p.
artikel
158 Offline Script Identification from multilingual Indic-script documents: A state-of-the-art Singh, Pawan Kumar
2015
11-12 C p. 1-28
28 p.
artikel
159 On cloud security requirements, threats, vulnerabilities and countermeasures: A survey Kumar, Rakesh
2019
11-12 C p. 1-48
artikel
160 On the role and the importance of features for background modeling and foreground detection Bouwmans, Thierry
2018
11-12 C p. 26-91
artikel
161 Ontology learning: Grand tour and challenges Khadir, Ahlem Chérifa

11-12 C p.
artikel
162 Open-source IP cores for space: A processor-level perspective on soft errors in the RISC-V era Di Mascio, Stefano

11-12 C p.
artikel
163 Parametric survey on cross-layer designs for wireless sensor networks Sah, Dinesh Kumar
2018
11-12 C p. 112-134
artikel
164 Practical algorithms for MSO model-checking on tree-decomposable graphs Langer, Alexander
2014
11-12 C p. 39-74
36 p.
artikel
165 Prediction methods and applications in the science of science: A survey Hou, Jie

11-12 C p.
artikel
166 Prediction of Atrial Fibrillation using artificial intelligence on Electrocardiograms: A systematic review Matias, Igor

11-12 C p.
artikel
167 Preface Díaz, Josep

11-12 C p.
artikel
168 Privacy and verifiability in voting systems: Methods, developments and trends Jonker, Hugo
2013
11-12 C p. 1-30
30 p.
artikel
169 Privacy issues in intrusion detection systems: A taxonomy, survey and future directions Niksefat, Salman
2017
11-12 C p. 69-78
10 p.
artikel
170 Privacy preserving publication of relational and transaction data: Survey on the anonymization of patient data Puri, Vartika
2019
11-12 C p. 45-61
artikel
171 Progress in context-aware recommender systems — An overview Raza, Shaina
2019
11-12 C p. 84-97
artikel
172 Publication trends in gamification: A systematic mapping study Kasurinen, Jussi
2018
11-12 C p. 33-44
artikel
173 Publisher’s Note Faez, Telli
2017
11-12 C p. 31
artikel
174 Real-time detection of shill bidding in online auctions: A literature review Majadi, Nazia
2017
11-12 C p. 1-18
18 p.
artikel
175 Real-time 3D reconstruction techniques applied in dynamic scenes: A systematic literature review Ingale, Anupama K.

11-12 C p.
artikel
176 Recent Named Entity Recognition and Classification techniques: A systematic review Goyal, Archana
2018
11-12 C p. 21-43
artikel
177 Relational intelligence recognition in online social networks — A survey Zhang, Ji

11-12 C p.
artikel
178 Review of the use of human senses and capabilities in cryptography Halunen, Kimmo

11-12 C p.
artikel
179 Scenario analysis, from BigData to black swan Batrouni, Marwan
2018
11-12 C p. 131-139
artikel
180 Scheduling in distributed systems: A cloud computing perspective Bittencourt, Luiz F.
2018
11-12 C p. 31-54
artikel
181 Science of Scientific Team Science: A survey Yu, Shuo
2019
11-12 C p. 72-83
artikel
182 Security and privacy aspects in MapReduce on clouds: A survey Derbeko, Philip
2016
11-12 C p. 1-28
28 p.
artikel
183 Security of Power Line Communication systems: Issues, limitations and existing solutions Yaacoub, Jean Paul A.

11-12 C p.
artikel
184 Semantic Web Services testing: A Systematic Mapping study de Souza Neto, João B.
2018
11-12 C p. 140-156
artikel
185 Smart Farming in Europe Moysiadis, Vasileios

11-12 C p.
artikel
186 Smart grid communication and information technologies in the perspective of Industry 4.0: Opportunities and challenges Faheem, M.
2018
11-12 C p. 1-30
artikel
187 Social computing for software engineering: A mapping study Ardini, Amalia
2014
11-12 C p. 75-93
19 p.
artikel
188 Some algorithms under non-parametric framework versus an unsupervised approach Ray, Bimal Kumar

11-12 C p.
artikel
189 Some results of Maria Serna on strategic games: Complexity of equilibria and models Àlvarez, Carme

11-12 C p.
artikel
190 Some Studies on Performability Analysis of Safety Critical Systems Ahamad, Shakeel

11-12 C p.
artikel
191 Sorting on graphs by adjacent swaps using permutation groups Kim, Dohan
2016
11-12 C p. 89-105
17 p.
artikel
192 Storage, partitioning, indexing and retrieval in Big RDF frameworks: A survey Chawla, Tanvi

11-12 C p.
artikel
193 Successors of PEGASIS protocol: A comprehensive survey Khedr, Ahmed M.

11-12 C p.
artikel
194 Survey on hardware implementation of random number generators on FPGA: Theory and experimental analyses Bakiri, Mohammed
2018
11-12 C p. 135-153
artikel
195 Survey on Visualization and Visual Analytics pipeline-based models: Conceptual aspects, comparative studies and challenges Ltifi, Hela

11-12 C p.
artikel
196 Systematic analysis and review of stock market prediction techniques Gandhmal, Dattatray P.

11-12 C p.
artikel
197 The Critical Node Detection Problem in networks: A survey Lalou, Mohammed
2018
11-12 C p. 92-117
artikel
198 The evolution of sentiment analysis—A review of research topics, venues, and top cited papers Mäntylä, Mika V.
2018
11-12 C p. 16-32
artikel
199 The journey of graph kernels through two decades Ghosh, Swarnendu
2018
11-12 C p. 88-111
artikel
200 Towards quantum computing based community detection Akbar, Sana

11-12 C p.
artikel
201 Traditional and recent approaches in background modeling for foreground detection: An overview Bouwmans, Thierry
2014
11-12 C p. 31-66
36 p.
artikel
202 Transaction scheduling protocols for controlling priority inversion: A review Pandey, Sarvesh

11-12 C p.
artikel
203 Tutorial and critical analysis of phishing websites methods Mohammad, Rami M.
2015
11-12 C p. 1-24
24 p.
artikel
204 Understandable Big Data: A survey Kacfah Emani, Cheikh
2015
11-12 C p. 70-81
12 p.
artikel
205 Usability, security and trust in password managers: A quest for user-centric properties and features Chaudhary, Sunil
2019
11-12 C p. 69-90
artikel
206 When machine learning meets medical world: Current status and future challenges Smiti, Abir

11-12 C p.
artikel
207 Where is the research on connecting game ​ worlds?—A systematic mapping study Parkkila, Janne
2015
11-12 C p. 46-58
13 p.
artikel
208 XML data manipulation in conventional and temporal XML databases: A survey Brahmia, Zouhaier

11-12 C p.
artikel
                             208 gevonden resultaten
 
 Koninklijke Bibliotheek - Nationale Bibliotheek van Nederland