Digital Library
Close Browse articles from a journal
     Journal description
       All volumes of the corresponding journal
         All issues of the corresponding volume
                                       All articles of the corresponding issues
 
                             75 results found
no title author magazine year volume issue page(s) type
1 A BGP session takeover method for high availability based on virtualization technique Kim, Hwasung
2017
20 1 p. 817-833
article
2 A collaborative power control and resources allocation for D2D (device-to-device) communication underlaying LTE cellular networks Lee, Chongdeuk
2016
20 1 p. 559-567
article
3 A corpus-based approach to classifying emotions using Korean linguistic features Jung, Younghee
2017
20 1 p. 583-595
article
4 A dynamic CTA scheduling scheme for massive parallel computing Son, Dong Oh
2017
20 1 p. 781-787
article
5 A genetic algorithm using K-path initialization for community detection in complex networks Meng, Xiangyu
2016
20 1 p. 311-320
article
6 A hybrid heuristic algorithm for flowshop inverse scheduling problem under a dynamic environment Mou, Jianhui
2017
20 1 p. 439-453
article
7 A load balancing scheme based on deep-learning in IoT Kim, Hye-Young
2016
20 1 p. 873-878
article
8 An analysis work on correlation of internet addiction and school age groups Jun, Woochun
2016
20 1 p. 879-882
article
9 An analytical study of blasting vibration using deep mining and drivage rules Li, Xianglong
2017
20 1 p. 109-120
article
10 A nanocommunication system for endocrine diseases Ferreira, Diogo Caldeira
2017
20 1 p. 689-706
article
11 An approach for scaling cloud resource management Marinescu, Dan C.
2017
20 1 p. 909-924
article
12 An artifact detection scheme with CUDA-based image operations Baek, Nakhoon
2017
20 1 p. 749-755
article
13 A novel bi-subgroup adaptive evolutionary algorithm for optimizing degree of hybridization of HEV bus Yan, Wei
2017
20 1 p. 497-505
article
14 A novel dual authentication protocol (DAP) for multi-owners in cloud computing Shajina, A. R.
2017
20 1 p. 507-523
article
15 Applying the locality principle to improve the shortest path algorithm Xinghui, Wang
2016
20 1 p. 301-309
article
16 A study of formative and continuous models for umbrella water curtain based on wall-attaching jets Chen, Jian
2017
20 1 p. 455-469
article
17 A terms mining and clustering technique for surveying network and content analysis of academic groups exploration Chen, Cheng-Chung
2016
20 1 p. 43-52
article
18 A visualization method for multi-relation in dataset Li, Hui
2017
20 1 p. 225-237
article
19 Bi-level programming model for multi-modal regional bus timetable and vehicle dispatch with stochastic travel time Wei, Ming
2017
20 1 p. 401-411
article
20 Building thesaurus-based knowledge graph based on schema layer Qiao, Bo
2017
20 1 p. 81-91
article
21 CBR-based network performance management with multi-agent approach Cho, Buseung
2017
20 1 p. 757-767
article
22 Cloud service platform of electronic identity in cyberspace Chen, Bing
2017
20 1 p. 413-425
article
23 Decision-making model based vertical transportation channel for super high-rise construction waste Yang, Lin
2016
20 1 p. 253-262
article
24 Decision support based automatic container sequencing system using heuristic rules Ding, Yi
2016
20 1 p. 239-252
article
25 Deep data analyzing algorithm based on scale space theory Zhu, Yiwei
2016
20 1 p. 1-11
article
26 Denial of service attacks, defences and research challenges Zlomislić, Vinko
2017
20 1 p. 661-671
article
27 DFA-AD: a distributed framework architecture for the detection of advanced persistent threats Sharma, Pradip Kumar
2016
20 1 p. 597-609
article
28 Discrete element method simulation of random Voronoi grain-based models Lv, Yanxin
2016
20 1 p. 335-345
article
29 Distributed hybrid cloud for profit driven content provisioning using user requirements and content popularity Daniel, D.
2017
20 1 p. 525-538
article
30 Domain-specific diagrammatic modelling: a source of machine-readable semantics for the Internet of Things Buchmann, Robert Andrei
2016
20 1 p. 895-908
article
31 Efficient and robust frame-synchronized blind audio watermarking by featuring multilevel DWT and DCT Hu, Hwai-Tsu
2017
20 1 p. 805-816
article
32 Emerging risk forecast system using associative index mining analysis Kim, Joo-Chang
2016
20 1 p. 547-558
article
33 ER model based supervision system analysis using information disclosure Sun, Ziyuan
2017
20 1 p. 215-224
article
34 Estimating reliability of the retrieval systems effectiveness rank based on performance in multiple experiments Zhang, Shuxiang
2016
20 1 p. 925-940
article
35 Expansion slot backfill scheduling for concurrent workflows with deadline on heterogeneous resources Xu, Xiujie
2017
20 1 p. 471-483
article
36 Exploratory testing supported by automated reengineering of model of the system under test Frajtak, Karel
2017
20 1 p. 855-865
article
37 Fish swarm window selection algorithm based on cell microscopic automatic focus Zhang, Feng-shou
2017
20 1 p. 485-495
article
38 Fundamental analysis and technical analysis integrated system for stock filtration Eiamkanitchat, Narissara
2016
20 1 p. 883-894
article
39 Fuzzy neural network based prediction model applied in primary component analysis Peng, Xiaohong
2017
20 1 p. 131-140
article
40 Generating test case for algebraic specification based on Tabu search and genetic algorithm Yu, Bo
2016
20 1 p. 277-289
article
41 Geometric primitive extraction from LiDAR-scanned point clouds Baek, Nakhoon
2017
20 1 p. 741-748
article
42 Herfindahl–Hirschman Index based performance analysis on the convergence development Lu, Chao
2017
20 1 p. 121-129
article
43 High-dimensionality priority selection scheme of bioinformatics information using Bernoulli distribution Jeong, Yoon-Su
2016
20 1 p. 539-546
article
44 Hybrid genetic algorithm for engineering design problems Yan, Xuesong
2016
20 1 p. 263-275
article
45 Improved protocols for spreading vehicle emergency messages in mobile ad hoc networks Park, Soonju
2017
20 1 p. 731-739
article
46 Influence mechanism of multi-network embeddedness to enterprises innovation performance based on knowledge management perspective Cong, Haibin
2017
20 1 p. 93-108
article
47 Internal model control for structured rank deficient system based on full rank decomposition Jiang, Meiying
2016
20 1 p. 13-24
article
48 Model and forecast stock market behavior integrating investor sentiment analysis and transaction data Zhang, Gaowei
2017
20 1 p. 789-803
article
49 Motif identification method based on Gibbs sampling and genetic algorithm Sheng, Xiaochun
2016
20 1 p. 33-41
article
50 Multidimensional test coverage analysis: PARADIGM-COV tool Paiva, Ana C. R.
2017
20 1 p. 633-649
article
51 Multi-model recursive identification for nonlinear systems with non-uniformly sampling Liu, Ranran
2016
20 1 p. 25-32
article
52 Multi-objective inverse scheduling optimization of single-machine shop system with uncertain due-dates and processing times Mou, Jianhui
2017
20 1 p. 371-390
article
53 Multi-objective optimization and decision making for greenhouse climate control system considering user preference and data clustering Mahdavian, Mehdi
2017
20 1 p. 835-853
article
54 Performance optimization algorithm of radar signal processing system Li, Xiang
2016
20 1 p. 359-370
article
55 Principal agent model based design and outsourcing of information value Zhang, Zongming
2017
20 1 p. 67-79
article
56 Priority queue based polling mechanism on seismic equipment cluster monitoring Wang, Xiaoming
2017
20 1 p. 611-619
article
57 Recognizing individuals in groups in outdoor environments combining stereo vision, RFID and BLE Llorca, D. F.
2017
20 1 p. 769-779
article
58 Research on peak shaving costs and allocation of wind power integration using scalable computing method Dong, Jun
2017
20 1 p. 391-400
article
59 Security analysis of a proposed internet of things middleware Ferreira, Hiro Gabriel Cerqueira
2017
20 1 p. 651-660
article
60 Semantic classification method for network Tibetan corpus Xu, Gui-Xian
2017
20 1 p. 155-165
article
61 Serious games for the human behaviour analysis in emergency evacuation scenarios Almeida, João Emílio
2017
20 1 p. 707-720
article
62 Shift based adaptive differential evolution for PID controller designs using swarm intelligence algorithm Zhang, Xiu
2016
20 1 p. 291-299
article
63 Sky Computing: exploring the aggregated Cloud resources Monteiro, André
2017
20 1 p. 621-631
article
64 Software model checking for resources race Wang, Hong
2017
20 1 p. 179-193
article
65 Spatiotemporal regression Kriging to predict precipitation using time-series MODIS data Hu, Dangui
2017
20 1 p. 347-357
article
66 Study on similarity based on connection degree in social network Chen, Xiao
2017
20 1 p. 167-178
article
67 Susceptibility area regionalization of land subsidence based on extenics theory Jia, Chao
2017
20 1 p. 53-66
article
68 Syntactic-level integration and display of multiple domains’ S-100-based data for e-navigation Park, Daewon
2017
20 1 p. 721-730
article
69 Temporal transaction integrity constraints management Kvet, Michal
2017
20 1 p. 673-688
article
70 The development of a frame model for management strategies selection using fuzzy proximity Jing, Shuwei
2017
20 1 p. 141-153
article
71 The impact of social factors on excessive online game usage, moderated by online self-identity Kim, Yong-Young
2017
20 1 p. 569-582
article
72 The research on the mechanism and spatial–temporal differentiation of the coupling coordination development based on industrial cluster agglomeration Cong, Haibin
2017
20 1 p. 195-213
article
73 The study of exercise and health services platform for prevention of dementia Kang, Sunyoung
2017
20 1 p. 867-872
article
74 Trend prediction of wear fault of wind generator high-speed gear using a fusion of UICA and PE method Zhao, Xiwei
2017
20 1 p. 427-437
article
75 UPQC voltage sag detection based on chaotic immune gentic algorithm Ni, Fuyin
2016
20 1 p. 321-333
article
                             75 results found
 
 Koninklijke Bibliotheek - National Library of the Netherlands