nr |
titel |
auteur |
tijdschrift |
jaar |
jaarg. |
afl. |
pagina('s) |
type |
1 |
A Distributed Variable Tap-length Algorithm within Diffusion Adaptive Networks
|
Li, Leilei |
|
2013 |
5 |
C |
p. 77-84 8 p. |
artikel |
2 |
A Location Temporal based Access Control Model for IoTs
|
Lee, Chao |
|
2013 |
5 |
C |
p. 15-20 6 p. |
artikel |
3 |
A Mobile Chinese Calligraphic Training System Using Virtual Reality Technology
|
Wu, Yingfei |
|
2013 |
5 |
C |
p. 200-208 9 p. |
artikel |
4 |
A Mode Shifting Resource Allocation Scheme for Device-to-Device Underlaying Cellular Network
|
Gao, Junshu |
|
2013 |
5 |
C |
p. 40-47 8 p. |
artikel |
5 |
Analysis of Reactive Routing Protocol Using Fuzzy Inference System
|
Doja, M.N. |
|
2013 |
5 |
C |
p. 164-169 6 p. |
artikel |
6 |
Analyzing Performance of the Parallel-based Fractal Image Compression Problem on Multicore Systems
|
Gomes, Roberto de Quadros |
|
2013 |
5 |
C |
p. 140-146 7 p. |
artikel |
7 |
An Efficient Distributed Anomaly Detection Model for Wireless Sensor Networks
|
Rassam, Murad A. |
|
2013 |
5 |
C |
p. 9-14 6 p. |
artikel |
8 |
A New Proposal for Distributed System Security Framework
|
Prakash, Vijay |
|
2013 |
5 |
C |
p. 183-188 6 p. |
artikel |
9 |
A New Recursive Decomposition Algorithm to Calculate IMDCT
|
Li, Hui |
|
2013 |
5 |
C |
p. 177-182 6 p. |
artikel |
10 |
A New Technique for Generating Minimal Cut Sets in Nontrivial Network
|
Rebaiaia, Mohamed-Larbi |
|
2013 |
5 |
C |
p. 67-76 10 p. |
artikel |
11 |
A Reputation-based Collaborative Approach for Spam Filtering
|
Shi, Wenxuan |
|
2013 |
5 |
C |
p. 220-227 8 p. |
artikel |
12 |
A User Preference and Service Time Mix-aware Resource Provisioning Strategy for Multi-tier Cloud Services
|
Hu, Dandan |
|
2013 |
5 |
C |
p. 235-242 8 p. |
artikel |
13 |
Bio-inspired Motion Attention for Gist Perception under Spatio-temporal Dimension
|
Xu, Jiawei |
|
2013 |
5 |
C |
p. 243-248 6 p. |
artikel |
14 |
Comparative Analysis of Active and Passive Indoor Localization Systems
|
Pirzada, Nasrullah |
|
2013 |
5 |
C |
p. 92-97 6 p. |
artikel |
15 |
Co-SRL: A Convex Optimization Algorithm for Anchor Localization in Wireless Sensor Networks
|
Liu, Wu |
|
2013 |
5 |
C |
p. 62-66 5 p. |
artikel |
16 |
Design and Implementation of Multi-sensor Integrated 3D Laser Scanning Data Acquisition System
|
Sun, Yibo |
|
2013 |
5 |
C |
p. 106-113 8 p. |
artikel |
17 |
Design Reusability and Adaptability for Concurrent Software
|
Netinant, Paniti |
|
2013 |
5 |
C |
p. 133-139 7 p. |
artikel |
18 |
Energy-efficient Relay Selection for Multicast Communication
|
Wang, Junxing |
|
2013 |
5 |
C |
p. 98-105 8 p. |
artikel |
19 |
False Alarm Detection in Cyber-physical Systems for Healthcare Applications
|
Haque, Shah Ahsanul |
|
2013 |
5 |
C |
p. 54-61 8 p. |
artikel |
20 |
Formal Modeling and Verification of Multi-agent System Architecture
|
Yuan, Ling |
|
2013 |
5 |
C |
p. 126-132 7 p. |
artikel |
21 |
Hierarchical Scheduling Mechanisms for Multilingual Information Resources in Cloud Computing
|
Han, Yaojun |
|
2013 |
5 |
C |
p. 268-273 6 p. |
artikel |
22 |
Implementation of DES Encryption Arithmetic based on FPGA
|
Liu, Cai-hong |
|
2013 |
5 |
C |
p. 209-213 5 p. |
artikel |
23 |
Improved Particle Filter for Target Tracing Application based on ChinaGrid
|
Li, Yuqiang |
|
2013 |
5 |
C |
p. 262-267 6 p. |
artikel |
24 |
Intra-symbol Piecewise Equalization for OFDM Systems in Fast Fading Channels
|
Chen, Zhigang |
|
2013 |
5 |
C |
p. 32-39 8 p. |
artikel |
25 |
Intuitionistic Fuzzy Real Time Multigraphs for Communication Networks: A Theoretical Model
|
Biswas, Siddhartha Sankar |
|
2013 |
5 |
C |
p. 114-119 6 p. |
artikel |
26 |
Large Distributed Arabic Handwriting Recognition System based on the Combination of FastDTW Algorithm and Map-reduce Programming Model via Cloud Computing Technologies
|
Hassen, Hamdi |
|
2013 |
5 |
C |
p. 156-163 8 p. |
artikel |
27 |
5-Layered Architecture of Cloud Database Management System
|
Alam, Bashir |
|
2013 |
5 |
C |
p. 194-199 6 p. |
artikel |
28 |
Managing Data Replication and Placement based on Availability
|
Meroufel, Bakhta |
|
2013 |
5 |
C |
p. 147-155 9 p. |
artikel |
29 |
Matrix Multiplication Using r-Train Data Structure
|
Alam, Bashir |
|
2013 |
5 |
C |
p. 189-193 5 p. |
artikel |
30 |
Micro-blog Information Regulatory Mechanism based on Ontology Modeling
|
Xu, Baoxiang |
|
2013 |
5 |
C |
p. 287-291 5 p. |
artikel |
31 |
Modeling and Simulation of Different System Topologies for DSTATCOM
|
Kumar, Pradeep |
|
2013 |
5 |
C |
p. 249-261 13 p. |
artikel |
32 |
Multi-node Repositioning Technique for Mobile Sensor Network
|
Khan, Muhammad Amir |
|
2013 |
5 |
C |
p. 85-91 7 p. |
artikel |
33 |
Parallel Construction of Variable Precision Concept Lattice in Fuzzy Formal Context
|
Yang, Yafeng |
|
2013 |
5 |
C |
p. 214-219 6 p. |
artikel |
34 |
Parallel Micro Blog Crawler Construction for Effective Opinion Leader Approximation
|
Deng, Xiaolong |
|
2013 |
5 |
C |
p. 170-176 7 p. |
artikel |
35 |
Parallel Processing of Sensor Network Data Using Column-oriented Databases
|
Kim, Kyung-Chang |
|
2013 |
5 |
C |
p. 2-8 7 p. |
artikel |
36 |
Preface
|
Deng, Wei |
|
2013 |
5 |
C |
p. 1- 1 p. |
artikel |
37 |
Quality Measurements for Association Rules Hiding
|
Wang, Hui |
|
2013 |
5 |
C |
p. 228-234 7 p. |
artikel |
38 |
Research of AODV Routing Protocol for Ad Hoc Networks1
|
Liu, Sheng |
|
2013 |
5 |
C |
p. 21-31 11 p. |
artikel |
39 |
The Analysis for Small-World Network's Evolution based on Network Entropy
|
Shuo, Liangxun |
|
2013 |
5 |
C |
p. 274-280 7 p. |
artikel |
40 |
The Method of Distribute Data Storage and Location on Weights of Jump Table
|
Shao, Bi-lin |
|
2013 |
5 |
C |
p. 120-125 6 p. |
artikel |
41 |
TrustP2PNet: P2P Social Network with Admission Control Model based on Trust
|
Liu, Wu |
|
2013 |
5 |
C |
p. 281-286 6 p. |
artikel |
42 |
Video Coding and Routing in Wireless Video Sensor Networks
|
Al-Zoubi, Hussein R. |
|
2013 |
5 |
C |
p. 48-53 6 p. |
artikel |