nr |
titel |
auteur |
tijdschrift |
jaar |
jaarg. |
afl. |
pagina('s) |
type |
1 |
A Chinese-English patent machine translation system based on the theory of hierarchical network of concepts
|
ZHU, Yun |
|
2012 |
19 |
S2 |
p. 140-146 7 p. |
artikel |
2 |
Adaptively fault-tolerant topology control algorithm for wireless sensor networks
|
YIN, Rong-rong |
|
2012 |
19 |
S2 |
p. 13-18 6 p. |
artikel |
3 |
A GOP-aware multipath source routing protocol for MPEG video delivery over mobile ad hoc networks
|
SHEN, Hang |
|
2012 |
19 |
S2 |
p. 23-35 13 p. |
artikel |
4 |
Analysis and detection on long-time quasi-periodic communication behavior of network applications
|
LIU, Fang |
|
2012 |
19 |
S2 |
p. 80-85 6 p. |
artikel |
5 |
Analysis on preference patterns of ADSL users
|
GUO, Min-jie |
|
2012 |
19 |
S2 |
p. 73-79 7 p. |
artikel |
6 |
Application of Dempster-Shafer theory for network selection in heterogeneous wireless networks
|
WANG, Yu-mei |
|
2012 |
19 |
S2 |
p. 86-91 6 p. |
artikel |
7 |
Cluster-based mobility adaptive MAC scheme for wireless sensor networks
|
CHENG, Bin |
|
2012 |
19 |
S2 |
p. 36-41 6 p. |
artikel |
8 |
Content extraction from Chinese web page based on title and content dependency tree
|
ZHANG, Bin |
|
2012 |
19 |
S2 |
p. 147-151 5 p. |
artikel |
9 |
Context-aware adaptive active queue management mechanism for improving video transmission over IEEE 802.11E WLAN
|
ZHAO, Min-cheng |
|
2012 |
19 |
S2 |
p. 65-72 8 p. |
artikel |
10 |
Device-clustering algorithm in crowdsourcing-based localization
|
CHENG, Huang |
|
2012 |
19 |
S2 |
p. 114-121 8 p. |
artikel |
11 |
Efficient short proxy signature scheme based on multilinear map
|
ZHANG, Jian-hong |
|
2012 |
19 |
S2 |
p. 109-113 5 p. |
artikel |
12 |
Energy attenuation-based time synchronization for mobile underwater sensor networks
|
GUO, Ying |
|
2012 |
19 |
S2 |
p. 57-64 8 p. |
artikel |
13 |
Experimental study on visible light communication based on LED
|
WANG, Jia-yuan |
|
2012 |
19 |
S2 |
p. 197-200 4 p. |
artikel |
14 |
Handwritten character recognition via direction string and nearest neighbor matching
|
LI, Lei |
|
2012 |
19 |
S2 |
p. 160-165 6 p. |
artikel |
15 |
Hierarchical Dirichlet process with user's preference
|
LI, Wen-feng |
|
2012 |
19 |
S2 |
p. 152-159 8 p. |
artikel |
16 |
Hybrid multi-selection based on swarm intelligence and decision tree
|
XIONG, Wen |
|
2012 |
19 |
S2 |
p. 128-134 7 p. |
artikel |
17 |
Improved three-dimensional localization algorithm based on volume-test scan for wireless sensor networks
|
SHU, Jian |
|
2012 |
19 |
S2 |
p. 1-6 6 p. |
artikel |
18 |
Improving bag-of-words scheme for scene categorization
|
LI, Qun |
|
2012 |
19 |
S2 |
p. 166-171 6 p. |
artikel |
19 |
MPDF: mobile pulse data format for traditional Chinese medical mHealthcare
|
CUI, Jian |
|
2012 |
19 |
S2 |
p. 190-196 7 p. |
artikel |
20 |
Multi-sample clustering decision fusion for distributed target detection in wireless sensor networks
|
CHEN, Lei |
|
2012 |
19 |
S2 |
p. 42-46 5 p. |
artikel |
21 |
Novel self-renewal Hash chain based on Ito-Saito-Nishizeki secret sharing scheme
|
DAI, Ting |
|
2012 |
19 |
S2 |
p. 122-127 6 p. |
artikel |
22 |
On the placement of controllers in software-defined networks
|
HU, Yan-nan |
|
2012 |
19 |
S2 |
p. 92-97 6 p. |
artikel |
23 |
Passive sentence transformation in Chinese-English patent machine translation
|
LIU, Zhi-ying |
|
2012 |
19 |
S2 |
p. 135-139 5 p. |
artikel |
24 |
Probabilistic latent tensor factorization model for link pattern prediction in multi-relational networks
|
GAO, Sheng |
|
2012 |
19 |
S2 |
p. 172-181 10 p. |
artikel |
25 |
Secure cloud storage based on cryptographic techniques
|
PENG, Yong |
|
2012 |
19 |
S2 |
p. 182-189 8 p. |
artikel |
26 |
Spectrum-driven sleep scheduling algorithm based on reliable theory in cognitive radio sensor networks
|
QIAO, Ju-yi |
|
2012 |
19 |
S2 |
p. 47-51 5 p. |
artikel |
27 |
Study of impacts of duty-cycle on overlapping multi-hop clustering in wireless sensor networks
|
XU, Jia-qi |
|
2012 |
19 |
S2 |
p. 19-22 4 p. |
artikel |
28 |
The detection and defence of DoS attack for wireless sensor network
|
ZHANG, Yi-ying |
|
2012 |
19 |
S2 |
p. 52-56 5 p. |
artikel |
29 |
The impact of typical applications on network traffic
|
YANG, Jie |
|
2012 |
19 |
S2 |
p. 98-103 6 p. |
artikel |
30 |
The key technology research of web service selection
|
MA, Lin |
|
2012 |
19 |
S2 |
p. 104-108 5 p. |
artikel |
31 |
Three-dimensional localization algorithm of wireless sensor networks base on particle swarm optimization
|
WEI, Nuo |
|
2012 |
19 |
S2 |
p. 7-12 6 p. |
artikel |