nr |
titel |
auteur |
tijdschrift |
jaar |
jaarg. |
afl. |
pagina('s) |
type |
1 |
A formal proof of the đťś–-optimality of discretized pursuit algorithms
|
Zhang, Xuan |
|
2015 |
44 |
2 |
p. 282-294 |
artikel |
2 |
Altruistic coordination for multi-robot cooperative pathfinding
|
Wei, Changyun |
|
2015 |
44 |
2 |
p. 269-281 |
artikel |
3 |
An anomaly detection approach for multiple monitoring data series based on latent correlation probabilistic model
|
Ding, Jianwei |
|
2015 |
44 |
2 |
p. 340-361 |
artikel |
4 |
An enhanced self-adaptive differential evolution based on simulated annealing for rule extraction and its application in recognizing oil reservoir
|
Guo, Haixiang |
|
2015 |
44 |
2 |
p. 414-436 |
artikel |
5 |
A novel multi-class SVM model using second-order cone constraints
|
LĂłpez, Julio |
|
2015 |
44 |
2 |
p. 457-469 |
artikel |
6 |
Citation count prediction as a link prediction problem
|
Pobiedina, Nataliia |
|
2015 |
44 |
2 |
p. 252-268 |
artikel |
7 |
Cricket behaviour-based evolutionary computation technique in solving engineering optimization problems
|
Canayaz, Murat |
|
2015 |
44 |
2 |
p. 362-376 |
artikel |
8 |
Exact multi-length scale and mean invariant motif discovery
|
Mohammad, Yasser |
|
2015 |
44 |
2 |
p. 322-339 |
artikel |
9 |
Fuzzy geographically weighted clustering using artificial bee colony: An efficient geo-demographic analysis algorithm and applications to the analysis of crime behavior in population
|
Wijayanto, Arie Wahyu |
|
2015 |
44 |
2 |
p. 377-398 |
artikel |
10 |
Integrated microblog sentiment analysis from users’ social interaction patterns and textual opinions
|
Kuo, Yau-Hwang |
|
2015 |
44 |
2 |
p. 399-413 |
artikel |
11 |
Kernel-based discriminative elastic embedding algorithm
|
Zheng, Jianwei |
|
2015 |
44 |
2 |
p. 449-456 |
artikel |
12 |
Optimizing channel selection for cognitive radio networks using a distributed Bayesian learning automata-based approach
|
Jiao, Lei |
|
2015 |
44 |
2 |
p. 307-321 |
artikel |
13 |
Preface
|
Pan, Jeng-Shyang |
|
2016 |
44 |
2 |
p. 251 |
artikel |
14 |
Privacy preservation through a greedy, distortion-based rule-hiding method
|
Cheng, Peng |
|
2015 |
44 |
2 |
p. 295-306 |
artikel |
15 |
Variable ordering and constraint propagation for constrained CP-nets
|
Alanazi, Eisa |
|
2015 |
44 |
2 |
p. 437-448 |
artikel |