Digitale Bibliotheek
Sluiten Bladeren door artikelen uit een tijdschrift
     Tijdschrift beschrijving
       Alle jaargangen van het bijbehorende tijdschrift
         Alle afleveringen van het bijbehorende jaargang
                                       Alle artikelen van de bijbehorende aflevering
 
                             35 gevonden resultaten
nr titel auteur tijdschrift jaar jaarg. afl. pagina('s) type
1 A comprehensive study of simulation frameworks and research directions in fog computing Gill, Monika

40 C p.
artikel
2 A comprehensive survey on the Multiple Traveling Salesman Problem: Applications, approaches and taxonomy Cheikhrouhou, Omar

40 C p.
artikel
3 Adaptive user interfaces and universal usability through plasticity of user interface design Miraz, Mahdi H.

40 C p.
artikel
4 Affective recommender systems in the educational field. A systematic literature review Salazar, Camilo

40 C p.
artikel
5 Aiming at methods’ wider adoption: Applicability determinants and metrics Leszczyna, Rafał

40 C p.
artikel
6 Anonymity on blockchain based e-cash protocols—A survey Andola, Nitish

40 C p.
artikel
7 A survey of low-latency transmission strategies in software defined networking Yan, Binghao

40 C p.
artikel
8 A survey of multidisciplinary domains contributing to affective computing Arya, Resham

40 C p.
artikel
9 A survey on deep learning and its applications Dong, Shi

40 C p.
artikel
10 A survey on semi-structured web data manipulations by non-expert users Tekli, Gilbert

40 C p.
artikel
11 A systematic literature review on prototyping with Arduino: Applications, challenges, advantages, and limitations Kondaveeti, Hari Kishan

40 C p.
artikel
12 A systematic review on Deep Learning approaches for IoT security Aversano, Lerina

40 C p.
artikel
13 Clustering protocols in wireless sensor network: A survey, classification, issues, and future directions Rawat, Piyush

40 C p.
artikel
14 Comparative analysis of Android and iOS from security viewpoint Garg, Shivi

40 C p.
artikel
15 Conceptual and empirical comparison of dimensionality reduction algorithms (PCA, KPCA, LDA, MDS, SVD, LLE, ISOMAP, LE, ICA, t-SNE) Anowar, Farzana

40 C p.
artikel
16 Content and link-structure perspective of ranking webpages: A review Ali, Fayyaz

40 C p.
artikel
17 Cyber security training for critical infrastructure protection: A literature review Chowdhury, Nabin

40 C p.
artikel
18 Eco-assessment software: A quantitative review involving papers and patents Spreafico, Christian

40 C p.
artikel
19 Editorial Board
40 C p.
artikel
20 Energy, performance and cost efficient cloud datacentres: A survey Khan, Ayaz Ali

40 C p.
artikel
21 Financial fraud detection applying data mining techniques: A comprehensive review from 2009 to 2019 Al-Hashedi, Khaled Gubran

40 C p.
artikel
22 In praise of homomorphisms Hell, Pavol

40 C p.
artikel
23 Machine learning algorithms for social media analysis: A survey T.K., Balaji

40 C p.
artikel
24 Machine Learning and Deep Learning in smart manufacturing: The Smart Grid paradigm Kotsiopoulos, Thanasis

40 C p.
artikel
25 Malicious application detection in android — A systematic literature review Sharma, Tejpal

40 C p.
artikel
26 Neurological and physiological measures to evaluate the usability and user-experience (UX) of information systems: A systematic literature review Zaki, Tarannum

40 C p.
artikel
27 New trends in influence maximization models Azaouzi, Mehdi

40 C p.
artikel
28 Role of machine learning in medical research: A survey Garg, Arunim

40 C p.
artikel
29 Strategies based on various aspects of clustering in wireless sensor networks using classical, optimization and machine learning techniques: Review, taxonomy, research findings, challenges and future directions Amutha, J.

40 C p.
artikel
30 Summarization of legal documents: Where are we now and the way forward Jain, Deepali

40 C p.
artikel
31 Survey on 3D face reconstruction from uncalibrated images Morales, Araceli

40 C p.
artikel
32 Taxonomy, state-of-the-art, challenges and applications of visual understanding: A review Khanday, Nadeem Yousuf

40 C p.
artikel
33 The importance of selecting clustering parameters in VANETs: A survey Kaur, Ravneet

40 C p.
artikel
34 Towards Resilient Method: An exhaustive survey of fault tolerance methods in the cloud computing environment Shahid, Muhammad Asim

40 C p.
artikel
35 Vulnerability retrospection of security solutions for software-defined Cyber–Physical System against DDoS and IoT-DDoS attacks Snehi, Manish

40 C p.
artikel
                             35 gevonden resultaten
 
 Koninklijke Bibliotheek - Nationale Bibliotheek van Nederland