Digitale Bibliotheek
Sluiten Bladeren door artikelen uit een tijdschrift
     Tijdschrift beschrijving
       Alle jaargangen van het bijbehorende tijdschrift
         Alle afleveringen van het bijbehorende jaargang
                                       Alle artikelen van de bijbehorende aflevering
 
                             243 gevonden resultaten
nr titel auteur tijdschrift jaar jaarg. afl. pagina('s) type
1 A brief survey on probability distribution approximation Melucci, Massimo
2019
13-14 C p. 91-97
artikel
2 A comparative review of Urdu stemmers: Approaches and challenges Jabbar, Abdul

13-14 C p.
artikel
3 A comparative study on popular MAC protocols for mixed Wireless Sensor Networks: From implementation viewpoint Maitra, Tanmoy
2016
13-14 C p. 107-134
28 p.
artikel
4 A comprehensive and systematic look up into deep learning based object detection techniques: A review Sharma, Vipul

13-14 C p.
artikel
5 A comprehensive study of simulation frameworks and research directions in fog computing Gill, Monika

13-14 C p.
artikel
6 A comprehensive survey and analysis of generative models in machine learning GM, Harshvardhan

13-14 C p.
artikel
7 A comprehensive survey of service function chain provisioning approaches in SDN and NFV architecture Kaur, Karamjeet

13-14 C p.
artikel
8 A comprehensive survey on the Multiple Traveling Salesman Problem: Applications, approaches and taxonomy Cheikhrouhou, Omar

13-14 C p.
artikel
9 A comprehensive taxonomy of schemes to detect and mitigate blackhole attack and its variants in MANETs Khanna, Nitin
2019
13-14 C p. 24-44
artikel
10 A critical overview of outlier detection methods Smiti, Abir

13-14 C p.
artikel
11 Adaptive gamification in Collaborative systems, a systematic mapping study Dalponte Ayastuy, María

13-14 C p.
artikel
12 Adaptive user interfaces and universal usability through plasticity of user interface design Miraz, Mahdi H.

13-14 C p.
artikel
13 Advancement from neural networks to deep learning in software effort estimation: Perspective of two decades Suresh Kumar, P.

13-14 C p.
artikel
14 Aeronautical communication transition from analog to digital data: A network security survey Ben Mahmoud, Mohamed Slim
2014
13-14 C p. 1-29
29 p.
artikel
15 Affective recommender systems in the educational field. A systematic literature review Salazar, Camilo

13-14 C p.
artikel
16 Agent Based Modelling and Simulation tools: A review of the state-of-art software Abar, Sameera
2017
13-14 C p. 13-33
21 p.
artikel
17 Aiming at methods’ wider adoption: Applicability determinants and metrics Leszczyna, Rafał

13-14 C p.
artikel
18 An annotated bibliography on 1-planarity Kobourov, Stephen G.
2017
13-14 C p. 49-67
19 p.
artikel
19 Anonymity on blockchain based e-cash protocols—A survey Andola, Nitish

13-14 C p.
artikel
20 An overview of self-adaptive technologies within virtual reality training Vaughan, Neil
2016
13-14 C p. 65-87
23 p.
artikel
21 Applicability of Blockchain smart contracts in securing Internet and IoT: A systematic literature review Lone, Auqib Hamid

13-14 C p.
artikel
22 Applicability of mobile contact tracing in fighting pandemic (COVID-19): Issues, challenges and solutions Dar, Aaqib Bashir

13-14 C p.
artikel
23 Application of deep learning for retinal image analysis: A review Badar, Maryam

13-14 C p.
artikel
24 Approximation and online algorithms for multidimensional bin packing: A survey Christensen, Henrik I.
2017
13-14 C p. 63-79
17 p.
artikel
25 A PRISMA-compliant systematic review and analysis on color image encryption using DNA properties Sokouti, Massoud
2018
13-14 C p. 14-20
artikel
26 Arabic Machine Translation: A survey of the latest trends and challenges Ameur, Mohamed Seghir Hadj

13-14 C p.
artikel
27 A recent review of conventional vs. automated cybersecurity anti-phishing techniques Qabajeh, Issa
2018
13-14 C p. 44-55
artikel
28 A review of attack graph and attack tree visual syntax in cyber security Lallie, Harjinder Singh

13-14 C p.
artikel
29 A review of using object-orientation properties of C++ for designing expert system in strategic planning Ahmadi, Mohsen

13-14 C p.
artikel
30 A state-of-the-art review of FMEA/FMECA including patents Spreafico, Christian
2017
13-14 C p. 19-28
10 p.
artikel
31 A still simpler way of introducing interior-point method for linear programming Mehlhorn, Kurt
2016
13-14 C p. 1-11
11 p.
artikel
32 A survey of active learning in collaborative filtering recommender systems Elahi, Mehdi
2016
13-14 C p. 29-50
22 p.
artikel
33 A survey of android application and malware hardening Sihag, Vikas

13-14 C p.
artikel
34 A survey of data center consolidation in cloud computing systems Helali, Leila

13-14 C p.
artikel
35 A survey of identifier–locator split addressing architectures Komu, Miika
2015
13-14 C p. 25-42
18 p.
artikel
36 A survey of Konkani NLP resources Rajan, Annie

13-14 C p.
artikel
37 A survey of live Virtual Machine migration techniques Le, Tuan

13-14 C p.
artikel
38 A survey of low-latency transmission strategies in software defined networking Yan, Binghao

13-14 C p.
artikel
39 A survey of malware detection in Android apps: Recommendations and perspectives for future research Razgallah, Asma

13-14 C p.
artikel
40 A survey of memory management techniques in virtualized systems Mishra, Debadatta
2018
13-14 C p. 56-73
artikel
41 A survey of multidisciplinary domains contributing to affective computing Arya, Resham

13-14 C p.
artikel
42 A survey of neighborhood construction algorithms for clustering and classifying data points Pourbahrami, Shahin

13-14 C p.
artikel
43 A survey of safety and trustworthiness of deep neural networks: Verification, testing, adversarial attack and defence, and interpretability Huang, Xiaowei

13-14 C p.
artikel
44 A survey of the modified Moran process and evolutionary graph theory Díaz, Josep

13-14 C p.
artikel
45 A survey of timed automata for the development of real-time systems Waez, Md Tawhid Bin
2013
13-14 C p. 1-26
26 p.
artikel
46 A survey on deep learning and its applications Dong, Shi

13-14 C p.
artikel
47 A survey on design and implementation of protected searchable data in the cloud Dowsley, Rafael
2017
13-14 C p. 17-30
artikel
48 A survey on essential components of a self-sovereign identity Mühle, Alexander
2018
13-14 C p. 80-86
artikel
49 A Survey on malware analysis and mitigation techniques Sibi Chakkaravarthy, S.
2019
13-14 C p. 1-23
artikel
50 A survey on mobile affective computing Politou, Eugenia
2017
13-14 C p. 79-100
22 p.
artikel
51 A survey on parallel and distributed multi-agent systems for high performance computing simulations Rousset, Alban
2016
13-14 C p. 27-46
20 p.
artikel
52 A survey on privacy and security of Internet of Things Ogonji, Mark Mbock

13-14 C p.
artikel
53 A survey on privacy in decentralized online social networks De Salve, Andrea
2018
13-14 C p. 154-176
artikel
54 A Survey on quantum computing technology Gyongyosi, Laszlo
2019
13-14 C p. 51-71
artikel
55 A survey on semi-structured web data manipulations by non-expert users Tekli, Gilbert

13-14 C p.
artikel
56 A survey on socio-semantic information retrieval Schoefegger, Karin
2013
13-14 C p. 25-46
22 p.
artikel
57 A survey on the usability and practical applications of Graphical Security Models Hong, Jin B.
2017
13-14 C p. 1-16
artikel
58 A survey on tree matching and XML retrieval Tahraoui, Mohammed Amin
2013
13-14 C p. 1-23
23 p.
artikel
59 A systematic literature review on prototyping with Arduino: Applications, challenges, advantages, and limitations Kondaveeti, Hari Kishan

13-14 C p.
artikel
60 A systematic mapping review of context-aware analysis and its approach to mobile learning and ubiquitous learning processes Vallejo-Correa, Paola

13-14 C p.
artikel
61 A systematic mapping study of API usability evaluation methods Rauf, Irum
2019
13-14 C p. 49-68
artikel
62 A systematic mapping study of clone visualization Hammad, Muhammad

13-14 C p.
artikel
63 A systematic review on Deep Learning approaches for IoT security Aversano, Lerina

13-14 C p.
artikel
64 A taxonomy and survey of attacks against machine learning Pitropakis, Nikolaos

13-14 C p.
artikel
65 Attention to news and its dissemination on Twitter: A survey Orellana-Rodriguez, Claudia
2018
13-14 C p. 74-94
artikel
66 Automated knowledge base management: A survey Martinez-Gil, Jorge
2015
13-14 C p. 1-9
9 p.
artikel
67 Automatic hand gesture recognition using hybrid meta-heuristic-based feature selection and classification with Dynamic Time Warping Kowdiki, Manisha

13-14 C p.
artikel
68 Background subtraction in real applications: Challenges, current models and future directions Garcia-Garcia, Belmar

13-14 C p.
artikel
69 Big data and IoT-based applications in smart environments: A systematic review Hajjaji, Yosra

13-14 C p.
artikel
70 Big networks: A survey Bedru, Hayat Dino

13-14 C p.
artikel
71 Blockchain technology in the energy sector: From basic research to real world applications Wang, Qiang

13-14 C p.
artikel
72 Caching methodologies in Content centric networking (CCN): A survey Lal, Nidhi
2019
13-14 C p. 39-50
artikel
73 Catastrophic event phenomena in communication networks: A survey Dabrowski, Christopher
2015
13-14 C p. 10-45
36 p.
artikel
74 Change point detection in social networks—Critical review with experiments Kendrick, Lucy
2018
13-14 C p. 1-13
artikel
75 Characterizing DDoS attacks and flash events: Review, research gaps and future directions Behal, Sunny
2017
13-14 C p. 101-114
14 p.
artikel
76 Citations, research topics and active countries in software engineering: A bibliometrics study Garousi, Vahid
2016
13-14 C p. 56-77
22 p.
artikel
77 Cluster ensembles: A survey of approaches with recent extensions and applications Boongoen, Tossapon
2018
13-14 C p. 1-25
artikel
78 Clustering protocols in wireless sensor network: A survey, classification, issues, and future directions Rawat, Piyush

13-14 C p.
artikel
79 Combining UML and ontology: An exploratory survey Mejhed Mkhinini, Meriem

13-14 C p.
artikel
80 Community detection in node-attributed social networks: A survey Chunaev, Petr

13-14 C p.
artikel
81 Compactors for parameterized counting problems Thilikos, Dimitrios M.

13-14 C p.
artikel
82 Comparative analysis of Android and iOS from security viewpoint Garg, Shivi

13-14 C p.
artikel
83 Comparative analysis on cross-modal information retrieval: A review Kaur, Parminder

13-14 C p.
artikel
84 Comparative study for 8 computational intelligence algorithms for human identification Abdulrahman, Shaymaa Adnan

13-14 C p.
artikel
85 Conceptual and empirical comparison of dimensionality reduction algorithms (PCA, KPCA, LDA, MDS, SVD, LLE, ISOMAP, LE, ICA, t-SNE) Anowar, Farzana

13-14 C p.
artikel
86 Conjunctive and Boolean grammars: The true general case of the context-free grammars Okhotin, Alexander
2013
13-14 C p. 27-59
33 p.
artikel
87 Considerations about the efficiency and sufficiency of the utilization of the Scrum methodology: A survey for analyzing results for development teams Morandini, Marcelo

13-14 C p.
artikel
88 Content and link-structure perspective of ranking webpages: A review Ali, Fayyaz

13-14 C p.
artikel
89 Context Aware Recommendation Systems: A review of the state of the art techniques Kulkarni, Saurabh

13-14 C p.
artikel
90 Conversational agents in business: A systematic literature review and future research directions Bavaresco, Rodrigo

13-14 C p.
artikel
91 Corrigendum to “Catastrophic event phenomena in communication networks: A survey” [Comput. Sci. Rev. 18 (2015) 10–45] Dabrowski, Christopher
2016
13-14 C p. 51-
1 p.
artikel
92 Crowdsourcing: A taxonomy and systematic mapping study Hosseini, Mahmood
2015
13-14 C p. 43-69
27 p.
artikel
93 Current status and key issues in image steganography: A survey Subhedar, Mansi S.
2014
13-14 C p. 95-113
19 p.
artikel
94 Current trends in consumption of multimedia content using online streaming platforms: A user-centric survey Falkowski-Gilski, Przemysław

13-14 C p.
artikel
95 Cyber-insurance survey Marotta, Angelica
2017
13-14 C p. 35-61
27 p.
artikel
96 Cyber security training for critical infrastructure protection: A literature review Chowdhury, Nabin

13-14 C p.
artikel
97 DAG-based attack and defense modeling: Don’t miss the forest for the attack trees Kordy, Barbara
2014
13-14 C p. 1-38
38 p.
artikel
98 Data Mining and Information Retrieval in the 21st century: A bibliographic review Liu, Jiaying

13-14 C p.
artikel
99 Data mining of social networks represented as graphs Nettleton, David F.
2013
13-14 C p. 1-34
34 p.
artikel
100 Decomposition into low-rank plus additive matrices for background/foreground separation: A review for a comparative evaluation with a large-scale dataset Bouwmans, Thierry
2017
13-14 C p. 1-71
71 p.
artikel
101 Deep Learning Algorithms for Cybersecurity Applications: A Technological and Status Review Dixit, Priyanka

13-14 C p.
artikel
102 Deep Learning Methods for Multi-Species Animal Re-identification and Tracking – a Survey Ravoor, Prashanth C.

13-14 C p.
artikel
103 Detection and mitigation of DDoS attacks in SDN: A comprehensive review, research challenges and future directions Singh, Jagdeep

13-14 C p.
artikel
104 Development of improved whale optimization-based FCM clustering for image watermarking Soppari, Kavitha

13-14 C p.
artikel
105 DevOps and software quality: A systematic mapping Mishra, Alok

13-14 C p.
artikel
106 Digital audio steganography: Systematic review, classification, and analysis of the current state of the art AlSabhany, Ahmed A.

13-14 C p.
artikel
107 Digital watermarking: Applicability for developing trust in medical imaging workflows state of the art review Qasim, Asaad F.
2018
13-14 C p. 45-60
artikel
108 Distributed denial of service attacks in cloud: State-of-the-art of scientific and commercial solutions Bhardwaj, Aanshi

13-14 C p.
artikel
109 Distributed virtual machine consolidation: A systematic mapping study Ashraf, Adnan
2018
13-14 C p. 118-130
artikel
110 Eco-assessment software: A quantitative review involving papers and patents Spreafico, Christian

13-14 C p.
artikel
111 Editorial Board 2018
13-14 C p. ii
artikel
112 Editorial Board 2019
13-14 C p. ii
artikel
113 Editorial Board 2018
13-14 C p. ii
artikel
114 Editorial Board 2019
13-14 C p. ii
artikel
115 Editorial Board 2019
13-14 C p. ii
artikel
116 Editorial Board
13-14 C p.
artikel
117 Editorial Board
13-14 C p.
artikel
118 Editorial Board 2017
13-14 C p. IFC-
1 p.
artikel
119 Editorial Board 2018
13-14 C p. ii
artikel
120 Editorial Board 2017
13-14 C p. IFC
artikel
121 Editorial Board 2018
13-14 C p. ii
artikel
122 Editorial Board
13-14 C p.
artikel
123 Editorial Board
13-14 C p.
artikel
124 Editorial Board
13-14 C p.
artikel
125 Editorial Board
13-14 C p.
artikel
126 Editorial Board
13-14 C p.
artikel
127 Energy, performance and cost efficient cloud datacentres: A survey Khan, Ayaz Ali

13-14 C p.
artikel
128 Energy price prediction using data-driven models: A decade review Lu, Hongfang

13-14 C p.
artikel
129 Ensemble learning for intrusion detection systems: A systematic mapping study and cross-benchmark evaluation Tama, Bayu Adhi

13-14 C p.
artikel
130 Evaluation of information retrieval systems using structural equation modeling Melucci, Massimo
2019
13-14 C p. 1-18
artikel
131 Fault tree analysis: A survey of the state-of-the-art in modeling, analysis and tools Ruijters, Enno
2015
13-14 C p. 29-62
34 p.
artikel
132 Financial fraud detection applying data mining techniques: A comprehensive review from 2009 to 2019 Al-Hashedi, Khaled Gubran

13-14 C p.
artikel
133 Future FANET with application and enabling techniques: Anatomization and sustainability issues Srivastava, Ashish

13-14 C p.
artikel
134 General classification of the authenticated encryption schemes for the CAESAR competition Abed, Farzaneh
2016
13-14 C p. 13-26
14 p.
artikel
135 Generalizing input-driven languages: Theoretical and practical benefits Mandrioli, Dino
2018
13-14 C p. 61-87
artikel
136 Getting into the mind of an “in-auction” fraud perpetrator Trevathan, Jarrod
2018
13-14 C p. 1-15
artikel
137 Graph grammars according to the type of input and manipulated data: A survey Albane, Saadia
2018
13-14 C p. 178-203
artikel
138 Graph spanners: A tutorial review Ahmed, Reyan

13-14 C p.
artikel
139 Higher order mutation testing: A Systematic Literature Review Ghiduk, Ahmed S.
2017
13-14 C p. 29-48
20 p.
artikel
140 Homomorphic encryption systems statement: Trends and challenges Alaya, Bechir

13-14 C p.
artikel
141 How smart is e-tourism? A systematic review of smart tourism recommendation system applying data management Hamid, Rula A.

13-14 C p.
artikel
142 I2CE3: A dedicated and separated attack chain for ransomware offenses as the most infamous cyber extortion Keshavarzi, Masoudeh

13-14 C p.
artikel
143 Improved node localization using K-means clustering for Wireless Sensor Networks El Khediri, Salim

13-14 C p.
artikel
144 Indoor environment propagation review Obeidat, H.

13-14 C p.
artikel
145 Indoor location based services challenges, requirements and usability of current solutions Basiri, Anahid
2017
13-14 C p. 1-12
12 p.
artikel
146 Indoor location identification technologies for real-time IoT-based applications: An inclusive survey Oguntala, George
2018
13-14 C p. 55-79
artikel
147 Influence decision models: From cooperative game theory to social network analysis Molinero, Xavier

13-14 C p.
artikel
148 In praise of homomorphisms Hell, Pavol

13-14 C p.
artikel
149 Integrating blockchain technology into the energy sector — from theory of blockchain to research and application of energy blockchain Wang, Qiang

13-14 C p.
artikel
150 Intelligent food processing: Journey from artificial neural network to deep learning Nayak, Janmenjoy

13-14 C p.
artikel
151 Intelligent retrieval and classification in three-dimensional biomedical images — A systematic mapping Bergamasco, Leila Cristina C.
2019
13-14 C p. 19-38
artikel
152 Introducing article numbering to Computer Science Review Li, Jimeng

13-14 C p.
artikel
153 Julia language in machine learning: Algorithms, applications, and open issues Gao, Kaifeng

13-14 C p.
artikel
154 Leveraging Deep Learning and IoT big data analytics to support the smart cities development: Review and future directions Atitallah, Safa Ben

13-14 C p.
artikel
155 Localization schemes for Underwater Acoustic Sensor Networks - A Review Toky, Archana

13-14 C p.
artikel
156 Location management in mobile network: A survey Mukherjee, Anwesha
2016
13-14 C p. 1-14
14 p.
artikel
157 Logo and seal based administrative document image retrieval: A survey Alaei, Alireza
2016
13-14 C p. 47-63
17 p.
artikel
158 Machine learning algorithms for social media analysis: A survey T.K., Balaji

13-14 C p.
artikel
159 Machine Learning and Deep Learning in smart manufacturing: The Smart Grid paradigm Kotsiopoulos, Thanasis

13-14 C p.
artikel
160 Machine learning and multi-agent systems in oil and gas industry applications: A survey Hanga, Khadijah M.

13-14 C p.
artikel
161 Machine learning techniques for hate speech classification of twitter data: State-of-the-art, future challenges and research directions Ayo, Femi Emmanuel

13-14 C p.
artikel
162 Malicious application detection in android — A systematic literature review Sharma, Tejpal

13-14 C p.
artikel
163 Maria Serna and her years in Patras Spirakis, Paul G.

13-14 C p.
artikel
164 Maria Serna in Barcelona Àlvarez, Carme

13-14 C p.
artikel
165 Maria Serna’s contributions to adversarial queuing theory Blesa, Maria J.

13-14 C p.
artikel
166 Maximum cliques in graphs with small intersection number and random intersection graphs Nikoletseas, Sotiris E.

13-14 C p.
artikel
167 mHealth Authentication Approach Based 3D Touchscreen and Microphone Sensors for Real-Time Remote Healthcare Monitoring System: Comprehensive Review, Open Issues and Methodological Aspects Shuwandy, Moceheb Lazam

13-14 C p.
artikel
168 Model-based testing using UML activity diagrams: A systematic mapping study Ahmad, Tanwir
2019
13-14 C p. 98-112
artikel
169 Modelling web-service uncertainty: The angel/daemon approach Gabarro, Joaquim

13-14 C p.
artikel
170 Motif discovery in networks: A survey Yu, Shuo

13-14 C p.
artikel
171 Moving objects detection with a moving camera: A comprehensive review Chapel, Marie-Neige

13-14 C p.
artikel
172 Multidisciplinary Pattern Recognition applications: A review Paolanti, Marina

13-14 C p.
artikel
173 Multilayer network simplification: Approaches, models and methods Interdonato, Roberto

13-14 C p.
artikel
174 Named Data Networking: A survey Saxena, Divya
2016
13-14 C p. 15-55
41 p.
artikel
175 Nature-inspired algorithms for Wireless Sensor Networks: A comprehensive survey Singh, Abhilash

13-14 C p.
artikel
176 Near infrared face recognition: A literature survey Farokhi, Sajad
2016
13-14 C p. 1-17
17 p.
artikel
177 Network embedding: Taxonomies, frameworks and applications Hou, Mingliang

13-14 C p.
artikel
178 Neurological and physiological measures to evaluate the usability and user-experience (UX) of information systems: A systematic literature review Zaki, Tarannum

13-14 C p.
artikel
179 New trends in influence maximization models Azaouzi, Mehdi

13-14 C p.
artikel
180 New trends on moving object detection in video images captured by a moving camera: A survey Yazdi, Mehran
2018
13-14 C p. 157-177
artikel
181 [No title] Díaz, Josep

13-14 C p.
artikel
182 [No title] Bálek, Martin
2013
13-14 C p. 35-46
12 p.
artikel
183 [No title] Zuhair Mahmoud, Khaled
2013
13-14 C p. 31-34
4 p.
artikel
184 Offline recognition of handwritten Indic scripts: A state-of-the-art survey and future perspectives Sharma, Reya

13-14 C p.
artikel
185 Offline Script Identification from multilingual Indic-script documents: A state-of-the-art Singh, Pawan Kumar
2015
13-14 C p. 1-28
28 p.
artikel
186 On cloud security requirements, threats, vulnerabilities and countermeasures: A survey Kumar, Rakesh
2019
13-14 C p. 1-48
artikel
187 On the role and the importance of features for background modeling and foreground detection Bouwmans, Thierry
2018
13-14 C p. 26-91
artikel
188 Ontology learning: Grand tour and challenges Khadir, Ahlem Chérifa

13-14 C p.
artikel
189 Open-source IP cores for space: A processor-level perspective on soft errors in the RISC-V era Di Mascio, Stefano

13-14 C p.
artikel
190 Parametric survey on cross-layer designs for wireless sensor networks Sah, Dinesh Kumar
2018
13-14 C p. 112-134
artikel
191 Practical algorithms for MSO model-checking on tree-decomposable graphs Langer, Alexander
2014
13-14 C p. 39-74
36 p.
artikel
192 Prediction methods and applications in the science of science: A survey Hou, Jie

13-14 C p.
artikel
193 Prediction of Atrial Fibrillation using artificial intelligence on Electrocardiograms: A systematic review Matias, Igor

13-14 C p.
artikel
194 Preface Díaz, Josep

13-14 C p.
artikel
195 Privacy and verifiability in voting systems: Methods, developments and trends Jonker, Hugo
2013
13-14 C p. 1-30
30 p.
artikel
196 Privacy issues in intrusion detection systems: A taxonomy, survey and future directions Niksefat, Salman
2017
13-14 C p. 69-78
10 p.
artikel
197 Privacy preserving publication of relational and transaction data: Survey on the anonymization of patient data Puri, Vartika
2019
13-14 C p. 45-61
artikel
198 Progress in context-aware recommender systems — An overview Raza, Shaina
2019
13-14 C p. 84-97
artikel
199 Publication trends in gamification: A systematic mapping study Kasurinen, Jussi
2018
13-14 C p. 33-44
artikel
200 Publisher’s Note Faez, Telli
2017
13-14 C p. 31
artikel
201 Real-time detection of shill bidding in online auctions: A literature review Majadi, Nazia
2017
13-14 C p. 1-18
18 p.
artikel
202 Real-time 3D reconstruction techniques applied in dynamic scenes: A systematic literature review Ingale, Anupama K.

13-14 C p.
artikel
203 Recent Named Entity Recognition and Classification techniques: A systematic review Goyal, Archana
2018
13-14 C p. 21-43
artikel
204 Relational intelligence recognition in online social networks — A survey Zhang, Ji

13-14 C p.
artikel
205 Review of the use of human senses and capabilities in cryptography Halunen, Kimmo

13-14 C p.
artikel
206 Role of machine learning in medical research: A survey Garg, Arunim

13-14 C p.
artikel
207 Scenario analysis, from BigData to black swan Batrouni, Marwan
2018
13-14 C p. 131-139
artikel
208 Scheduling in distributed systems: A cloud computing perspective Bittencourt, Luiz F.
2018
13-14 C p. 31-54
artikel
209 Science of Scientific Team Science: A survey Yu, Shuo
2019
13-14 C p. 72-83
artikel
210 Security and privacy aspects in MapReduce on clouds: A survey Derbeko, Philip
2016
13-14 C p. 1-28
28 p.
artikel
211 Security of Power Line Communication systems: Issues, limitations and existing solutions Yaacoub, Jean Paul A.

13-14 C p.
artikel
212 Semantic Web Services testing: A Systematic Mapping study de Souza Neto, João B.
2018
13-14 C p. 140-156
artikel
213 Smart Farming in Europe Moysiadis, Vasileios

13-14 C p.
artikel
214 Smart grid communication and information technologies in the perspective of Industry 4.0: Opportunities and challenges Faheem, M.
2018
13-14 C p. 1-30
artikel
215 Social computing for software engineering: A mapping study Ardini, Amalia
2014
13-14 C p. 75-93
19 p.
artikel
216 Some algorithms under non-parametric framework versus an unsupervised approach Ray, Bimal Kumar

13-14 C p.
artikel
217 Some results of Maria Serna on strategic games: Complexity of equilibria and models Àlvarez, Carme

13-14 C p.
artikel
218 Some Studies on Performability Analysis of Safety Critical Systems Ahamad, Shakeel

13-14 C p.
artikel
219 Sorting on graphs by adjacent swaps using permutation groups Kim, Dohan
2016
13-14 C p. 89-105
17 p.
artikel
220 Storage, partitioning, indexing and retrieval in Big RDF frameworks: A survey Chawla, Tanvi

13-14 C p.
artikel
221 Strategies based on various aspects of clustering in wireless sensor networks using classical, optimization and machine learning techniques: Review, taxonomy, research findings, challenges and future directions Amutha, J.

13-14 C p.
artikel
222 Successors of PEGASIS protocol: A comprehensive survey Khedr, Ahmed M.

13-14 C p.
artikel
223 Summarization of legal documents: Where are we now and the way forward Jain, Deepali

13-14 C p.
artikel
224 Survey on 3D face reconstruction from uncalibrated images Morales, Araceli

13-14 C p.
artikel
225 Survey on hardware implementation of random number generators on FPGA: Theory and experimental analyses Bakiri, Mohammed
2018
13-14 C p. 135-153
artikel
226 Survey on Visualization and Visual Analytics pipeline-based models: Conceptual aspects, comparative studies and challenges Ltifi, Hela

13-14 C p.
artikel
227 Systematic analysis and review of stock market prediction techniques Gandhmal, Dattatray P.

13-14 C p.
artikel
228 Taxonomy, state-of-the-art, challenges and applications of visual understanding: A review Khanday, Nadeem Yousuf

13-14 C p.
artikel
229 The Critical Node Detection Problem in networks: A survey Lalou, Mohammed
2018
13-14 C p. 92-117
artikel
230 The evolution of sentiment analysis—A review of research topics, venues, and top cited papers Mäntylä, Mika V.
2018
13-14 C p. 16-32
artikel
231 The importance of selecting clustering parameters in VANETs: A survey Kaur, Ravneet

13-14 C p.
artikel
232 The journey of graph kernels through two decades Ghosh, Swarnendu
2018
13-14 C p. 88-111
artikel
233 Towards quantum computing based community detection Akbar, Sana

13-14 C p.
artikel
234 Towards Resilient Method: An exhaustive survey of fault tolerance methods in the cloud computing environment Shahid, Muhammad Asim

13-14 C p.
artikel
235 Traditional and recent approaches in background modeling for foreground detection: An overview Bouwmans, Thierry
2014
13-14 C p. 31-66
36 p.
artikel
236 Transaction scheduling protocols for controlling priority inversion: A review Pandey, Sarvesh

13-14 C p.
artikel
237 Tutorial and critical analysis of phishing websites methods Mohammad, Rami M.
2015
13-14 C p. 1-24
24 p.
artikel
238 Understandable Big Data: A survey Kacfah Emani, Cheikh
2015
13-14 C p. 70-81
12 p.
artikel
239 Usability, security and trust in password managers: A quest for user-centric properties and features Chaudhary, Sunil
2019
13-14 C p. 69-90
artikel
240 Vulnerability retrospection of security solutions for software-defined Cyber–Physical System against DDoS and IoT-DDoS attacks Snehi, Manish

13-14 C p.
artikel
241 When machine learning meets medical world: Current status and future challenges Smiti, Abir

13-14 C p.
artikel
242 Where is the research on connecting game ​ worlds?—A systematic mapping study Parkkila, Janne
2015
13-14 C p. 46-58
13 p.
artikel
243 XML data manipulation in conventional and temporal XML databases: A survey Brahmia, Zouhaier

13-14 C p.
artikel
                             243 gevonden resultaten
 
 Koninklijke Bibliotheek - Nationale Bibliotheek van Nederland