Digitale Bibliotheek
Sluiten Bladeren door artikelen uit een tijdschrift
     Tijdschrift beschrijving
       Alle jaargangen van het bijbehorende tijdschrift
         Alle afleveringen van het bijbehorende jaargang
                                       Alle artikelen van de bijbehorende aflevering
 
                             56 gevonden resultaten
nr titel auteur tijdschrift jaar jaarg. afl. pagina('s) type
1 A bipartite model for load balancing in grid computing environments Jiang, Wenchao
2009
4 p. 503-523
artikel
2 Algorithm and axiomatization of rough fuzzy sets based finite dimensional fuzzy vectors Wu, Mingfen
2009
4 p. 560-568
artikel
3 An efficient approach to representing and mining knowledge from Qing court medical records Wang, Weimin
2011
4 p. 395-404
artikel
4 An enhanced swarm intelligence clustering-based RBFNN classifier and its application in deep Web sources classification Feng, Yong
2010
4 p. 560-570
artikel
5 A new parallel scheduling system for multiple radio wireless mesh network Hu, Yun
2009
4 p. 550-559
artikel
6 An immune memory clonal algorithm for numerical and combinatorial optimization Liu, Ruochen
2010
4 p. 536-559
artikel
7 An improved algorithm for gray image representation using non-symmetry and anti-packing model with triangles and rectangles Zheng, Yunping
2008
4 p. 431-437
artikel
8 Answering contextual questions based on ontologies and question templates Wang, Dongsheng
2011
4 p. 405-418
artikel
9 A Petri net-based approach for supporting aspect-oriented modeling Guan, Lianwei
2008
4 p. 413-423
artikel
10 Approximation algorithm for constructing data aggregation trees for wireless sensor networks Li, Deying
2009
4 p. 524-534
artikel
11 Approximation operators based on vague relations and roughness measures of vague sets Wu, Mingfen
2011
4 p. 429-441
artikel
12 A PTS-PGATS based approach for data-intensive scheduling in data grids Li, Kenli
2011
4 p. 513-525
artikel
13 A recursive model for static empty container allocation Guo, Zijian
2011
4 p. 486-495
artikel
14 A robust extraction algorithm for biomedical signals from noisy mixtures Zhao, Yongjian
2011
4 p. 387-394
artikel
15 A robust localization algorithm in wireless sensor networks Li, Xin
2008
4 p. 438-450
artikel
16 Automated verification of pointer programs in pointer logic Wang, Zhifang
2008
4 p. 380-397
artikel
17 Certifying assembly programs with trails Wang, Wei
2011
4 p. 472-485
artikel
18 Compositional encoding for bounded model checking Sun, Jun
2008
4 p. 368-379
artikel
19 DeepComp: towards a balanced system design for high performance computer systems Zhu, Mingfa
2010
4 p. 475-479
artikel
20 Design and implementation of communication system of the Dawning 6000 supercomputer Li, Qiang
2010
4 p. 466-474
artikel
21 Detecting academic experts by topic-sensitive link analysis Wu, Hao
2009
4 p. 445-456
artikel
22 Evolution of supercomputers Xie, Xianghui
2010
4 p. 428-436
artikel
23 Fast motion and disparity estimation for multiview video coding Deng, Zhipin
2010
4 p. 571-579
artikel
24 Full and partial deniability for authentication schemes Liu, Jiqiang
2010
4 p. 516-521
artikel
25 Geometric algorithm for point projection and inversion onto Bézier surfaces Xu, Jinting
2009
4 p. 472-476
artikel
26 HPP controller: a system controller for high performance computing Chen, Fei
2010
4 p. 456-465
artikel
27 Human behavior classification by analyzing periodic motions Wang, Jiangtao
2010
4 p. 580-588
artikel
28 Identity-based key distribution for mobile Ad Hoc networks Lv, Xixiang
2011
4 p. 442-447
artikel
29 JASMIN: a parallel software infrastructure for scientific computing Mo, Zeyao
2010
4 p. 480-488
artikel
30 Knowledge fusion framework based on Web page texts Hu, Sikang
2009
4 p. 457-464
artikel
31 Linear complexity and autocorrelation values of a polyphase generalized cyclotomic sequence of length pq Chen, Zhixiong
2010
4 p. 529-535
artikel
32 Measurement of refinement and correctness Wu, Hengyang
2009
4 p. 465-471
artikel
33 Nearest-neighbor classifier motivated marginal discriminant projections for face recognition Huang, Pu
2011
4 p. 419-428
artikel
34 Network intrusion detection based on system calls and data mining Tian, Xinguang
2010
4 p. 522-528
artikel
35 Non-cooperative optimization games in market-oriented overlay networks: an integrated model of resource pricing and network formation Okaie, Yutaka
2011
4 p. 496-505
artikel
36 On automatic verification of self-stabilizing population protocols Pang, Jun
2008
4 p. 357-367
artikel
37 On cross-correlation indicators of an S-box Gao, Sheng
2011
4 p. 448-453
artikel
38 One-to-one communication in twisted cubes under restricted connectivity Fan, Jianxi
2010
4 p. 489-499
artikel
39 On the equal-weight symmetric Boolean functions Zhou, Yu
2009
4 p. 485-493
artikel
40 Perspectives of China’s HPC system development: a view from the 2009 China HPC TOP100 list Zhang, Yunquan
2010
4 p. 437-444
artikel
41 Petaflop supercomputers of China Chen, Guoliang
2010
4 p. 427
artikel
42 PopCap: popularity oriented proxy caching for peer-assisted Internet video-on-demand streaming services Tian, Ye
2010
4 p. 500-515
artikel
43 Pushing requirements changes through to changes in specifications Lin, Lan
2008
4 p. 331-343
artikel
44 RBF neural network based on q-Gaussian function in function approximation Zhao, Wei
2011
4 p. 381-386
artikel
45 Research of localization approach for the new comer in wireless sensor networks Qu, Wei
2009
4 p. 543-549
artikel
46 Research on resource allocation for multi-tier web applications in a virtualization environment Yang, Shuguo
2011
4 p. 506-512
artikel
47 Security evaluation against differential and linear cryptanalyses for Feistel ciphers Wang, Nianping
2009
4 p. 494-502
artikel
48 Socially inspired search and ranking in mobile social networking: concepts and challenges Wang, Yufeng
2009
4 p. 435-444
artikel
49 Style transformation in natural languages Hu, Yue
2008
4 p. 424-430
artikel
50 TH-1: China’s first petaflop supercomputer Yang, Xuejun
2010
4 p. 445-455
artikel
51 Two-thirds simulation indexes and modal logic characterization Ma, Yanfang
2011
4 p. 454-471
artikel
52 Types, structures and theories in NKI Zhang, Xiaoru
2008
4 p. 451-459
artikel
53 Validation indices for projective clustering Chen, Lifei
2009
4 p. 477-484
artikel
54 Verifying BPEL-like programs with Hoare logic Luo, Chenguang
2008
4 p. 344-356
artikel
55 Virtual node based adaptive routing in wireless ad hoc networks Li, Gang
2009
4 p. 535-542
artikel
56 Workflow-based semantics for peer-to-peer specifications Brogi, Antonio
2008
4 p. 398-412
artikel
                             56 gevonden resultaten
 
 Koninklijke Bibliotheek - Nationale Bibliotheek van Nederland