nr |
titel |
auteur |
tijdschrift |
jaar |
jaarg. |
afl. |
pagina('s) |
type |
1 |
An anonymization technique using intersected decision trees
|
Fletcher, Sam |
|
2015 |
27 |
3 |
p. 297-304 8 p. |
artikel |
2 |
A new greedy search method for the design of digital IIR filter
|
Kaur, Ranjit |
|
2015 |
27 |
3 |
p. 278-287 10 p. |
artikel |
3 |
A novel hybrid algorithm of GSA with Kepler algorithm for numerical optimization
|
Sarafrazi, Soroor |
|
2015 |
27 |
3 |
p. 288-296 9 p. |
artikel |
4 |
Bootstrapping quality of Web Services
|
Aljazzaf, Zainab |
|
2015 |
27 |
3 |
p. 323-333 11 p. |
artikel |
5 |
Cuckoo search based optimal mask generation for noise suppression and enhancement of speech signal
|
Garg, Anil |
|
2015 |
27 |
3 |
p. 269-277 9 p. |
artikel |
6 |
HonestPeer: An enhanced EigenTrust algorithm for reputation management in P2P systems
|
Kurdi, Heba A. |
|
2015 |
27 |
3 |
p. 315-322 8 p. |
artikel |
7 |
Message from the Editor
|
Rikli, Nasser-Eddine |
|
2015 |
27 |
3 |
p. 237- 1 p. |
artikel |
8 |
QEFSM model and Markov Algorithm for translating Quran reciting rules into Braille code
|
Abualkishik, Abdallah M. |
|
2015 |
27 |
3 |
p. 238-247 10 p. |
artikel |
9 |
Source localization algorithms to find attention and memory circuits in the brain
|
Sabeti, M. |
|
2015 |
27 |
3 |
p. 334-343 10 p. |
artikel |
10 |
Threshold-based generic scheme for encrypted and tunneled Voice Flows Detection over IP Networks
|
Rathore, M. Mazhar U. |
|
2015 |
27 |
3 |
p. 305-314 10 p. |
artikel |
11 |
Uncovering highly obfuscated plagiarism cases using fuzzy semantic-based similarity model
|
Alzahrani, Salha M. |
|
2015 |
27 |
3 |
p. 248-268 21 p. |
artikel |
12 |
Virtual reality and the CAVE: Taxonomy, interaction challenges and research directions
|
Muhanna, Muhanna A. |
|
2015 |
27 |
3 |
p. 344-361 18 p. |
artikel |