Digitale Bibliotheek
Sluiten Bladeren door artikelen uit een tijdschrift
     Tijdschrift beschrijving
       Alle jaargangen van het bijbehorende tijdschrift
         Alle afleveringen van het bijbehorende jaargang
                                       Alle artikelen van de bijbehorende aflevering
 
                             92 gevonden resultaten
nr titel auteur tijdschrift jaar jaarg. afl. pagina('s) type
1 A blind video watermarking scheme based on ICA and shot segmentation Sun, Jiande
2006
3 p. 302-312
artikel
2 A chaos-based image encryption algorithm using alternate structure Zhang, YiWei
2007
3 p. 334-341
artikel
3 A digital authentication watermarking scheme for JPEG images with superior localization and security Yu, Miao
2007
3 p. 491-509
artikel
4 A formal model for access control with supporting spatial context Zhang, Hong
2007
3 p. 419-439
artikel
5 A hybrid rendering algorithm for textile objects Zhang, MingMin
2009
3 p. 490-499
artikel
6 A micro amperometric immunosensor for detection of human immunoglobulin Xu, Yuanyuan
2006
3 p. 397-408
artikel
7 A mobile-agent-based approach to software coordination in the HOOPE system Ma, Xiaoxing

3 p. 203-219
artikel
8 An algebraic approach to revising propositional rule-based knowledge bases Luan, ShangMin
2008
3 p. 240-257
artikel
9 Analysis of affinely equivalent Boolean functions Meng, QingShu
2007
3 p. 299-306
artikel
10 Analysis of fault detection method based on predictive filter approach Li, Ji

3 p. 335-353
artikel
11 Analysis of time and frequency synchronization error for wireless systems using OFDM Shu, Feng

3 p. 379-396
artikel
12 An estimation method for InSAR interferometric phase combined with image auto-coregistration Li, Hai
2006
3 p. 386-396
artikel
13 A new fast friendly window-based congestion control for real-time streaming media transmission Li, Yongli

3 p. 273-284
artikel
14 A new numerical method on American option pricing Gu, Yonggeng

3 p. 181-188
artikel
15 An extension of Harrington’s noncupping theorem Yu, Liang

3 p. 199-209
artikel
16 An improved description method of the bumpy texture Gao, RongHua
2009
3 p. 523-528
artikel
17 A novel fuzzy neural network and its approximation capability Liu, Puyin

3 p. 184-194
artikel
18 A novel space-borne antenna anti-jamming technique based on immunity genetic algorithm-maximum likelihood Tao, Haihong

3 p. 397-408
artikel
19 A predicate spatial logic for mobile processes Lin, Huimin

3 p. 394-408
artikel
20 A proof of image Euler Number formula Lin, Xiaozhu

3 p. 364-371
artikel
21 A proof of image Euler Number formula Lin, Xiaozhu
2006
3 p. 364-371
artikel
22 A survey on virtual reality Zhao, QinPing
2009
3 p. 348-400
artikel
23 A trinomial type of σ-LFSR oriented toward software implementation Zeng, Guang
2007
3 p. 359-372
artikel
24 Autonomy-subnet based structural synthesis and liveness guarantying policy of Petri net model of flexible manufacturing system Xue, Lei

3 p. 273-286
artikel
25 Blind reconnaissance of the pseudo-random sequence in DS/SS signal with negative SNR Huang, XianGao
2007
3 p. 510-520
artikel
26 Boolean functions of an odd number of variables with maximum algebraic immunity Li, Na
2007
3 p. 307-317
artikel
27 Building enterprise reuse program Mei, Hong

3 p. 161-173
artikel
28 Chaotic laser synchronization and its application in optical fiber secure communication Yan, Senlin

3 p. 332-347
artikel
29 Classification and counting on multi-continued fractions and its application to multi-sequences Dai, ZongDuo
2007
3 p. 351-358
artikel
30 Color-image retrieval based on fuzzy correlation Zhai, Hongchen

3 p. 295-300
artikel
31 Constructing iterative non-uniform B-spline curve and surface to fit data points Lin, Hongwei

3 p. 315-331
artikel
32 Construction of compactly supported orthonormal wavelets with beautiful structure Peng, Lizhong

3 p. 372-383
artikel
33 Convergence analysis of cautious control Zhang, Yanxia
2006
3 p. 328-338
artikel
34 Design of secure operating systems with high security levels Qing, SiHan
2007
3 p. 399-418
artikel
35 Differential negative resistance effect of output characteristics in deep sub-micrometer wurtzite AlGaN/GaN MODFETs Guo, Baozeng

3 p. 187-198
artikel
36 Directional EMD and its application to texture segmentation Liu, Zhongxuan

3 p. 354-365
artikel
37 Editor’s note Zhao, QinPing
2009
3 p. 347
artikel
38 Electroluminescence in organic single-layer light-emitting diodes at high fields Yang, Shengyi

3 p. 168-175
artikel
39 Estimating differential quantities from point cloud based on a linear fitting of normal vectors Cheng, ZhangLin
2009
3 p. 431-444
artikel
40 Existence of 3-round zero-knowledge proof systems for NP Li, HongDa
2008
3 p. 273-282
artikel
41 Filtering images contaminated with pep and salt type noise with pulse-coupled neural networks Zhang, Junying

3 p. 322-334
artikel
42 Fuzzy metric based on the distance function of plane and its application in optimal scheduling problems Liu, Min

3 p. 210-224
artikel
43 Gaits-transferable CPG controller for a snake-like robot Lu, ZhenLi
2008
3 p. 293-305
artikel
44 Generalized L systems Lu, Ruqian

3 p. 220-231
artikel
45 Gene selection in class space for molecular classification of cancer Zhang, Junying

3 p. 301-314
artikel
46 Geometrically robust video watermarking based on wavelet transform Zhao, Yao
2006
3 p. 313-327
artikel
47 Globally exponentially attractive sets of the family of Lorenz systems Liao, XiaoXin
2008
3 p. 283-292
artikel
48 Haptic rendering for dental training system Wang, DangXiao
2009
3 p. 529-546
artikel
49 Identity-based signature scheme based on quadratic residues Chai, ZhenChuan
2007
3 p. 373-380
artikel
50 Impossible differential cryptanalysis of Advanced Encryption Standard Chen, Jie
2007
3 p. 342-350
artikel
51 Integrating advanced reasoning into a SAT solver Ding, Min

3 p. 366-378
artikel
52 Intelligent control based on intelligent characteristic model and its application Wu, Hongxin

3 p. 225-240
artikel
53 Joint frequency, 2-D AOA and polarization estimation in broad-band Wang, Jianying

3 p. 161-167
artikel
54 Log-scaling magnitude modulated watermarking scheme Ling, HeFei
2007
3 p. 470-490
artikel
55 LoI: Efficient relevance evaluation and filtering for distributed simulation Zhou, Zhong
2009
3 p. 470-489
artikel
56 Low power DCVSL circuits employing AC power supply Wu, Xunwei

3 p. 232-240
artikel
57 Maximum-likelihood detection based on branch and bound algorithm for MIMO systems Li, Zi
2008
3 p. 306-319
artikel
58 Meshless methods for physics-based modeling and simulation of deformable models Guo, XiaoHu
2009
3 p. 401-417
artikel
59 Modeling plants with sensor data Ma, Wei
2009
3 p. 500-511
artikel
60 Modular approach to the design and analysis of password-based security protocols Feng, DengGuo
2007
3 p. 381-398
artikel
61 MRF based construction of statistical operator and its application Li, Hongliang

3 p. 287-294
artikel
62 Multiuser detection algorithm based on belief propagation in multiple-input multiple-output systems Jiang, Wei

3 p. 384-393
artikel
63 New strategy of modeling inversion layer characteristics in MOS structure for ULSI applications Ma, Yutao

3 p. 176-183
artikel
64 Nonexistence of cross-term free time-frequency distribution with concentration of Wigner-Ville distribution Zou, Hongxing

3 p. 174-180
artikel
65 Online approach to feature interaction problems in middleware based system Huang, Gang
2008
3 p. 225-239
artikel
66 On the new results of global attractive set and positive invariant set of the Lorenz chaotic system and the applications to chaos control and synchronization Liao, Xiaoxin

3 p. 304-321
artikel
67 Parameterization of 3-channel non-separable 2-D wavelets and filters Gao, Xieping

3 p. 362-371
artikel
68 Pirate decoder for the broadcast encryption schemes from Crypto 2005 Weng, Jian
2007
3 p. 318-323
artikel
69 Polynomial-time algorithm for the legal firing sequences problem of a type of synchronous composition Petri nets Jiang, Changjun

3 p. 226-233
artikel
70 Probability representations of fuzzy systems Li, Hongxing

3 p. 339-363
artikel
71 Probability representations of fuzzy systems Li, Hongxing
2006
3 p. 339-363
artikel
72 Removing local irregularities of triangular meshes with highlight line models Yong, JunHai
2009
3 p. 418-430
artikel
73 Robust DOA estimation and array calibration in the presence of mutual coupling for uniform linear array Wang, Buhong

3 p. 348-361
artikel
74 Security analysis of a new stream cipher Zhang, Bin
2006
3 p. 286-301
artikel
75 Semi-tensor product of matrices and its application to Morgen’s problem Cheng, Daizhan

3 p. 195-212
artikel
76 Solving and analyzing PD0L inverse process Fan, Yongbing

3 p. 234-240
artikel
77 Star-sensor-based predictive Kalman filter for satellite attitude estimation Lin, Yurong

3 p. 189-195
artikel
78 Steganalysis of stochastic modulation steganography He, Junhui
2006
3 p. 273-285
artikel
79 Survey of information security Shen, ChangXiang
2007
3 p. 273-298
artikel
80 Symmetric-key cryptosystem with DNA technology Lu, MingXin
2007
3 p. 324-333
artikel
81 Task scheduling of parallel programs to optimize communications for cluster of SMPs Zheng, Weimin

3 p. 213-225
artikel
82 Texture synthesis via the matching compatibility between patches Wang, WenCheng
2009
3 p. 512-522
artikel
83 The key theorem and the bounds on the rate of uniform convergence of learning theory on Sugeno measure space Ha, Minghu
2006
3 p. 372-385
artikel
84 The proportional fairness scheduling algorithm on multi-classes Jiang, Yong

3 p. 161-174
artikel
85 Time-varying clustering for local lighting and material design Huang, PeiJie
2009
3 p. 445-456
artikel
86 Trusted dynamic level scheduling based on Bayes trust model Wei, Wang
2007
3 p. 456-469
artikel
87 Universally composable anonymous Hash certification model Zhang, Fan
2007
3 p. 440-455
artikel
88 Virtual hairy brush for digital painting and calligraphy Xu, Songhua

3 p. 285-303
artikel
89 Virtual hairy brush for digital painting and calligraphy Xu, Songhua

3 p. 285-303
artikel
90 ViWoSG: A distributed scene graph of ultramassive distributed virtual environments Wang, GuoPing
2009
3 p. 457-469
artikel
91 WDM star single-hop network reusing wavelengths Gan, Chaoqin

3 p. 196-202
artikel
92 Weight hierarchies of linear codes satisfying the almost chain condition Chen, Wende

3 p. 175-186
artikel
                             92 gevonden resultaten
 
 Koninklijke Bibliotheek - Nationale Bibliotheek van Nederland