Digitale Bibliotheek
Sluiten Bladeren door artikelen uit een tijdschrift
     Tijdschrift beschrijving
       Alle jaargangen van het bijbehorende tijdschrift
         Alle afleveringen van het bijbehorende jaargang
                                       Alle artikelen van de bijbehorende aflevering
 
                             45 gevonden resultaten
nr titel auteur tijdschrift jaar jaarg. afl. pagina('s) type
1 A continuous playing scheme on RESTful web service Kim, Kuinam J.
2016
19 1 p. 379-387
artikel
2 A decentralized fault tolerance model based on level of performance for grid environment Rebbah, Mohammed
2015
19 1 p. 13-27
artikel
3 A feature selection approach to find optimal feature subsets for the network intrusion detection system Kang, Seung-Ho
2016
19 1 p. 325-333
artikel
4 A forensic acquisition and analysis system for IaaS Alqahtany, Saad
2015
19 1 p. 439-453
artikel
5 A grid based simulation environment for agent-based models with vast parameter spaces Yang, Chao
2015
19 1 p. 183-195
artikel
6 A knee-based multi-objective evolutionary algorithm: an extension to network system optimization design problem Sudeng, Sufian
2015
19 1 p. 411-425
artikel
7 A methodology for developing clinical collaborative communication systems Park, Hwa Gyoo
2015
19 1 p. 223-235
artikel
8 An efficient approach to collaborative simulation of variable structure systems on multi-core machines Yang, Chen
2015
19 1 p. 29-46
artikel
9 An energy-efficient load balancing scheme to extend lifetime in wireless sensor networks Kim, Hye-Young
2016
19 1 p. 279-283
artikel
10 A novel evaluation framework for improving trust level of Infrastructure as a Service Alabool, Hamzeh Mohammad
2015
19 1 p. 389-410
artikel
11 Automatic facial emotion recognition using weber local descriptor for e-Healthcare system Alhussein, Musaed
2016
19 1 p. 99-108
artikel
12 Beacon-based active media control interface in indoor ubiquitous computing environment Sung, Yunsick
2016
19 1 p. 547-556
artikel
13 Belief propagation decoding assisted on-the-fly Gaussian elimination for short LT codes Cheong, Hoyoung
2016
19 1 p. 309-314
artikel
14 Consistency maintenance of Do and Undo/Redo operations in real-time collaborative bitmap editing systems Gao, Liping
2015
19 1 p. 255-267
artikel
15 Continuous and transparent multimodal authentication: reviewing the state of the art Al Abdulwahid, Abdulwahid
2015
19 1 p. 455-474
artikel
16 Data security rules/regulations based classification of file data using TsF-kNN algorithm Zardari, Munwar Ali
2016
19 1 p. 349-368
artikel
17 Demographic variables and risk factors in computer-crime: an empirical assessment Choi, Kyung-shick
2016
19 1 p. 369-377
artikel
18 Detecting for high speed flying object using image processing on target place Cho, Changhee
2016
19 1 p. 285-292
artikel
19 Distributed denial-of-service attacks against HTTP/2 services Adi, Erwin
2016
19 1 p. 79-86
artikel
20 Dynamic load balancing on heterogeneous clusters for parallel ant colony optimization Llanes, Antonio
2016
19 1 p. 1-11
artikel
21 Dynamic multimedia transmission control virtual machine using weighted Round-Robin Park, Sanghyun
2016
19 1 p. 293-300
artikel
22 Effects of patent indicators on national technological level: concentrated on mobile communication, network, and convergence technologies Oh, Jong-Hak
2016
19 1 p. 519-528
artikel
23 Efficient chameleon hashing-based privacy-preserving auditing in cloud storage Zhang, Jianhong
2015
19 1 p. 47-56
artikel
24 Efficient top-k similarity document search utilizing distributed file systems and cosine similarity Alewiwi, Mahmoud
2015
19 1 p. 109-126
artikel
25 Elastic resource provisioning for scientific workflow scheduling in cloud under budget and deadline constraints Shi, Jiyuan
2016
19 1 p. 167-182
artikel
26 Face recognition from a single image per person using deep architecture neural networks Zhuo, Tian
2015
19 1 p. 73-77
artikel
27 Factors affecting the continuous use of cloud service: focused on security risks Park, Seong-Taek
2015
19 1 p. 485-495
artikel
28 Fast implementation of block ciphers and PRNGs in Maxwell GPU architecture Lee, Wai-Kong
2016
19 1 p. 335-347
artikel
29 Frequent pagesets from web log by enhanced weighted association rule mining Malarvizhi, S. P.
2015
19 1 p. 269-277
artikel
30 Geographical information system parallelization for spatial big data processing: a review Zhao, Lingjun
2015
19 1 p. 139-152
artikel
31 High-dimentional data authentication protocol based on hash chain for Hadoop systems Jeong, Yoon-Su
2015
19 1 p. 475-484
artikel
32 IPad: ID-based public auditing for the outsourced data in the standard model Zhang, Jianhong
2015
19 1 p. 127-138
artikel
33 Meta-operation conflict resolution for human–human interaction in collaborative feature-based CAD systems Cheng, Yuan
2016
19 1 p. 237-253
artikel
34 Monte Carlo simulations of settlement dynamics in GPUs Millán, Emmanuel N.
2015
19 1 p. 557-566
artikel
35 Multiple-domain marine data utilization structure for e-navigation Park, Daewon
2016
19 1 p. 301-308
artikel
36 PEDAL: a dynamic analysis tool for efficient concurrency bug reproduction in big data environment Hu, Yan
2016
19 1 p. 153-166
artikel
37 PHR open platform based smart health service using distributed object group framework Chung, Kyungyong
2016
19 1 p. 505-517
artikel
38 Proposing and verifying a security protocol for hash function-based IoT communication system Han, Kun-Hee
2016
19 1 p. 497-504
artikel
39 Robust audio fingerprinting using peak-pair-based hash of non-repeating foreground audio in a real environment Kim, Hyoung-Gook
2015
19 1 p. 315-323
artikel
40 Scrutiny of unruly and abuse in wireless networks to mitigate physical layer threats using discriminate based misbehavior prevention Ratna, S. Raja
2016
19 1 p. 87-97
artikel
41 Similarity (range and kNN) queries processing on an Intel Xeon Phi coprocessor Toledo, Carlos M.
2015
19 1 p. 57-71
artikel
42 SIMPLE: a simplifying-ensembling framework for parallel community detection from large networks Wu, Zhiang
2015
19 1 p. 211-221
artikel
43 Task scheduling for MapReduce in heterogeneous networks Wang, Jia
2015
19 1 p. 197-210
artikel
44 Techniques and countermeasures of website/wireless traffic analysis and fingerprinting Ghaleb, Taher Ahmed
2015
19 1 p. 427-438
artikel
45 The analysis and application of an educational programming language (RUR-PLE) for a pre-introductory computer science course Yoon, IlKyu
2016
19 1 p. 529-546
artikel
                             45 gevonden resultaten
 
 Koninklijke Bibliotheek - Nationale Bibliotheek van Nederland