Digital Library
Close Browse articles from a journal
     Journal description
       All volumes of the corresponding journal
         All issues of the corresponding volume
                                       All articles of the corresponding issues
 
                             18 results found
no title author magazine year volume issue page(s) type
1 A dynamic trust model exploiting the time slice in WSNs Wu, Guowei
2014
18 9 p. 1829-1840
article
2 A fuzzy MCDM method and an application to solid transportation problem with mode preference Kundu, Pradip
2013
18 9 p. 1853-1864
article
3 A method of DDoS attack detection using HTTP packet pattern and rule engine in cloud computing environment Choi, Junho
2014
18 9 p. 1697-1703
article
4 An efficient PHR service system supporting fuzzy keyword search and fine-grained access control Xhafa, Fatos
2013
18 9 p. 1795-1802
article
5 A quantum-inspired Tabu search algorithm for solving combinatorial optimization problems Chiang, Hua-Pei
2013
18 9 p. 1771-1781
article
6 A soft computing based location-aware access control for smart buildings Hernández, José L.
2014
18 9 p. 1659-1674
article
7 Binary and m-ary encoding in applications of tree-based genetic algorithms for QoS routing Maniscalco, Vincenzo
2014
18 9 p. 1705-1714
article
8 Case-based context ontology construction using fuzzy set theory for personalized service in a smart home environment Sohn, Mye
2014
18 9 p. 1715-1728
article
9 Cooperative-Filter: countering Interest flooding attacks in named data networking Wang, Kai
2014
18 9 p. 1803-1813
article
10 Hybrid P2P traffic classification with heuristic rules and machine learning Ye, Wujian
2014
18 9 p. 1815-1827
article
11 Multi-objective performance optimization of a probabilistic similarity/dissimilarity-based broadcasting scheme for mobile ad hoc networks in disaster response scenarios Reina, D. G.
2013
18 9 p. 1745-1756
article
12 Network security management with traffic pattern clustering Chiou, Tao-Wei
2014
18 9 p. 1757-1770
article
13 Opportunistic sharing scheme for spectrum allocation in wireless virtualization Yang, Mao
2014
18 9 p. 1685-1696
article
14 Soft computing for security services in smart and ubiquitous environments Ogiela, Marek R.
2014
18 9 p. 1655-1658
article
15 State filters on fuzzy structures with internal states Constantinescu, N. M.
2014
18 9 p. 1841-1852
article
16 The simulation of an emotional robot implemented with fuzzy logic Leu, Fang-Yie
2014
18 9 p. 1729-1743
article
17 Towards cognitive economy Ogiela, Lidia
2014
18 9 p. 1675-1683
article
18 Trustworthiness in P2P: performance behaviour of two fuzzy-based systems for JXTA-overlay platform Spaho, Evjola
2013
18 9 p. 1783-1793
article
                             18 results found
 
 Koninklijke Bibliotheek - National Library of the Netherlands