nr |
titel |
auteur |
tijdschrift |
jaar |
jaarg. |
afl. |
pagina('s) |
type |
1 |
A Novel Classification Algorithm for New and Used Banknotes
|
Tong, Chao |
|
2016 |
22 |
3 |
p. 395-404 |
artikel |
2 |
A Survey of Verifiable Computation
|
Yu, Xixun |
|
2017 |
22 |
3 |
p. 438-453 |
artikel |
3 |
Dormancy Mechanism Based Power Allocation in Heterogeneous Networks: A Stackelberg Game Approach
|
Chen, Yu |
|
2016 |
22 |
3 |
p. 552-563 |
artikel |
4 |
Editorial: Game Theory for 5G Wireless Networks
|
Zhang, Haijun |
|
2017 |
22 |
3 |
p. 526-528 |
artikel |
5 |
Editorial: Mobile Multimedia Communications
|
Yan, Zheng |
|
2017 |
22 |
3 |
p. 435-437 |
artikel |
6 |
Editorial: Multimedia in Technology Enhanced Learning
|
Zheng, Zhigao |
|
2016 |
22 |
3 |
p. 367-369 |
artikel |
7 |
EHR: a Sensing Technology Readiness Model for Lifestyle Changes
|
Chen, Yu |
|
2017 |
22 |
3 |
p. 478-492 |
artikel |
8 |
Energy Efficient Clustering and Beamforming for Cloud Radio Access Networks
|
Chen, Yawen |
|
2016 |
22 |
3 |
p. 589-601 |
artikel |
9 |
Equilibrium Price and Dynamic Virtual Resource Allocation for Wireless Network Virtualization
|
Zhang, Guopeng |
|
2016 |
22 |
3 |
p. 564-576 |
artikel |
10 |
Erratum to: Editorial: Multimedia in Technology Enhanced Learning
|
Zheng, Zhigao |
|
2017 |
22 |
3 |
p. 370 |
artikel |
11 |
Greedy Block Coordinate Descent under Restricted Isometry Property
|
Wen, Jinming |
|
2016 |
22 |
3 |
p. 371-376 |
artikel |
12 |
Haze Removal via Edge Weighted Pixel-to-Patch Fusion
|
Wang, Keyan |
|
2017 |
22 |
3 |
p. 464-477 |
artikel |
13 |
Isolating Misbehaving Nodes in MANETs with an Adaptive Trust Threshold Strategy
|
Khan, Muhammad Saleem |
|
2017 |
22 |
3 |
p. 493-509 |
artikel |
14 |
Joint Resource Block and Power Allocation for Interference Management in Device to Device Underlay Cellular Networks: A Game Theoretic Approach
|
Katsinis, Georgios |
|
2016 |
22 |
3 |
p. 539-551 |
artikel |
15 |
LTE-EMU: A High Fidelity LTE Cellar Network Testbed for Mobile Video Streaming
|
Du, Haipeng |
|
2017 |
22 |
3 |
p. 454-463 |
artikel |
16 |
Moderate Incentive Design for Delay-Constrained Device-to-Device Relaying
|
Zhou, Xuying |
|
2016 |
22 |
3 |
p. 577-588 |
artikel |
17 |
Oblique Projection Matching Pursuit
|
Wang, Jian |
|
2016 |
22 |
3 |
p. 377-382 |
artikel |
18 |
QR Code Authentication with Embedded Message Authentication Code
|
Chen, Changsheng |
|
2016 |
22 |
3 |
p. 383-394 |
artikel |
19 |
Research and Citation Analysis of Data Mining Technology Based on Bayes Algorithm
|
Liu, Mingyang |
|
2016 |
22 |
3 |
p. 418-426 |
artikel |
20 |
Robust DMPC for Power System Load Frequency Control with State-Error
|
Liu, Xiangjie |
|
2016 |
22 |
3 |
p. 405-417 |
artikel |
21 |
Stochastic Time Series Analysis for Energy System Based on Markov Chain Model
|
Ruan, Zhengshun |
|
2016 |
22 |
3 |
p. 427-434 |
artikel |
22 |
Tracking Areas Planning Based on Community Detection in Heterogeneous and Small Cell Networks
|
Ning, Lei |
|
2016 |
22 |
3 |
p. 529-538 |
artikel |
23 |
UAKA-D2D: Universal Authentication and Key Agreement Protocol in D2D Communications
|
Wang, Mingjun |
|
2017 |
22 |
3 |
p. 510-525 |
artikel |