nr |
titel |
auteur |
tijdschrift |
jaar |
jaarg. |
afl. |
pagina('s) |
type |
1 |
A comparative performance evaluation of intrusion detection techniques for hierarchical wireless sensor networks
|
Soliman, H.H. |
|
2012 |
13 |
3 |
p. 225-238 14 p. |
artikel |
2 |
Agent-based web search personalization approach using dynamic user profile
|
Moawad, Ibrahim F. |
|
2012 |
13 |
3 |
p. 191-198 8 p. |
artikel |
3 |
A secure and efficient cryptographic hash function based on NewFORK-256
|
Tiwari, Harshvardhan |
|
2012 |
13 |
3 |
p. 199-208 10 p. |
artikel |
4 |
Designing a local path repair algorithm for directed diffusion protocol
|
Mohammad El-Basioni, Basma M. |
|
2012 |
13 |
3 |
p. 155-169 15 p. |
artikel |
5 |
Efficient combined security system for wireless sensor network
|
Fayed, N.S. |
|
2012 |
13 |
3 |
p. 185-190 6 p. |
artikel |
6 |
Efficient evaluation of reachability query for directed acyclic XML graph based on a prime number labelling schema
|
Sayed, Awny |
|
2012 |
13 |
3 |
p. 209-216 8 p. |
artikel |
7 |
GPGPU accelerated Krylov methods for compact modeling of on-chip passive integrated structures within the Chameleon-RF workflow
|
Gim, Sebastian |
|
2012 |
13 |
3 |
p. 171-176 6 p. |
artikel |
8 |
IFC: Editorial
|
|
|
2012 |
13 |
3 |
p. IFC- 1 p. |
artikel |
9 |
LDPC and SHA based iris recognition for image authentication
|
Seetharaman, K. |
|
2012 |
13 |
3 |
p. 217-224 8 p. |
artikel |
10 |
Shape preserving rational bi-cubic function
|
Hussain, Malik Zawwar |
|
2012 |
13 |
3 |
p. 147-154 8 p. |
artikel |
11 |
Support Vector Machines (SVMs) versus Multilayer Perception (MLP) in data classification
|
Zanaty, E.A. |
|
2012 |
13 |
3 |
p. 177-183 7 p. |
artikel |