nr |
titel |
auteur |
tijdschrift |
jaar |
jaarg. |
afl. |
pagina('s) |
type |
1 |
A new method for identifying influential nodes and important edges in complex networks
|
Zhang, Wei |
|
2016 |
21 |
3 |
p. 267-276 |
artikel |
2 |
A novel vulnerability prediction model to predict vulnerability loss based on probit regression
|
Geng, Jinkun |
|
2016 |
21 |
3 |
p. 214-220 |
artikel |
3 |
Capability-aware data placement for heterogeneous active storage systems
|
Li, Xiangyu |
|
2016 |
21 |
3 |
p. 249-256 |
artikel |
4 |
Construction of minimum bandwidth regenerating codes with combinatorial design
|
Cai, Feng |
|
2016 |
21 |
3 |
p. 229-234 |
artikel |
5 |
Cryptanalysis of schemes based on pseudoinverse matrix
|
Liu, Jinhui |
|
2016 |
21 |
3 |
p. 209-213 |
artikel |
6 |
Evaluation method of software reliability based on SPN model
|
Pan, Ping |
|
2016 |
21 |
3 |
p. 242-248 |
artikel |
7 |
Fault-tolerant cycles embedding in folded hypercubes
|
Liu, Hongmei |
|
2016 |
21 |
3 |
p. 191-198 |
artikel |
8 |
Generalized interior shock layer solution of nonlinear singularly perturbed elliptic equation for higher order
|
Shi, Juanrong |
|
2016 |
21 |
3 |
p. 204-208 |
artikel |
9 |
Gracefulness of several unconnected graphs with wheel
|
Wei, Jing |
|
2016 |
21 |
3 |
p. 199-203 |
artikel |
10 |
Inequalities for mixed width-integrals
|
Zhang, Ting |
|
2016 |
21 |
3 |
p. 185-190 |
artikel |
11 |
Multiple input multiple output CDSK chaotic communication system and its performance analysis
|
Duan, Junyi |
|
2016 |
21 |
3 |
p. 221-228 |
artikel |
12 |
Research and design of reconfigurable composite field multiplication in symmetric cipher algorithms
|
Su, Yang |
|
2016 |
21 |
3 |
p. 235-241 |
artikel |
13 |
Software watermarking scheme based on multivariate public key cryptosystem
|
Sun, Xiaoyan |
|
2016 |
21 |
3 |
p. 257-261 |
artikel |
14 |
Structural iMoSIFT for human action recognition
|
Chen, Huafeng |
|
2016 |
21 |
3 |
p. 262-266 |
artikel |