nr |
titel |
auteur |
tijdschrift |
jaar |
jaarg. |
afl. |
pagina('s) |
type |
1 |
A bipartite model for load balancing in grid computing environments
|
Jiang, Wenchao |
|
2009 |
|
4 |
p. 503-523 |
artikel |
2 |
Algorithm and axiomatization of rough fuzzy sets based finite dimensional fuzzy vectors
|
Wu, Mingfen |
|
2009 |
|
4 |
p. 560-568 |
artikel |
3 |
An efficient approach to representing and mining knowledge from Qing court medical records
|
Wang, Weimin |
|
2011 |
|
4 |
p. 395-404 |
artikel |
4 |
An enhanced swarm intelligence clustering-based RBFNN classifier and its application in deep Web sources classification
|
Feng, Yong |
|
2010 |
|
4 |
p. 560-570 |
artikel |
5 |
A new parallel scheduling system for multiple radio wireless mesh network
|
Hu, Yun |
|
2009 |
|
4 |
p. 550-559 |
artikel |
6 |
An immune memory clonal algorithm for numerical and combinatorial optimization
|
Liu, Ruochen |
|
2010 |
|
4 |
p. 536-559 |
artikel |
7 |
An improved algorithm for gray image representation using non-symmetry and anti-packing model with triangles and rectangles
|
Zheng, Yunping |
|
2008 |
|
4 |
p. 431-437 |
artikel |
8 |
Answering contextual questions based on ontologies and question templates
|
Wang, Dongsheng |
|
2011 |
|
4 |
p. 405-418 |
artikel |
9 |
A Petri net-based approach for supporting aspect-oriented modeling
|
Guan, Lianwei |
|
2008 |
|
4 |
p. 413-423 |
artikel |
10 |
Approximation algorithm for constructing data aggregation trees for wireless sensor networks
|
Li, Deying |
|
2009 |
|
4 |
p. 524-534 |
artikel |
11 |
Approximation operators based on vague relations and roughness measures of vague sets
|
Wu, Mingfen |
|
2011 |
|
4 |
p. 429-441 |
artikel |
12 |
A PTS-PGATS based approach for data-intensive scheduling in data grids
|
Li, Kenli |
|
2011 |
|
4 |
p. 513-525 |
artikel |
13 |
A recursive model for static empty container allocation
|
Guo, Zijian |
|
2011 |
|
4 |
p. 486-495 |
artikel |
14 |
A robust extraction algorithm for biomedical signals from noisy mixtures
|
Zhao, Yongjian |
|
2011 |
|
4 |
p. 387-394 |
artikel |
15 |
A robust localization algorithm in wireless sensor networks
|
Li, Xin |
|
2008 |
|
4 |
p. 438-450 |
artikel |
16 |
Automated verification of pointer programs in pointer logic
|
Wang, Zhifang |
|
2008 |
|
4 |
p. 380-397 |
artikel |
17 |
Certifying assembly programs with trails
|
Wang, Wei |
|
2011 |
|
4 |
p. 472-485 |
artikel |
18 |
Compositional encoding for bounded model checking
|
Sun, Jun |
|
2008 |
|
4 |
p. 368-379 |
artikel |
19 |
DeepComp: towards a balanced system design for high performance computer systems
|
Zhu, Mingfa |
|
2010 |
|
4 |
p. 475-479 |
artikel |
20 |
Design and implementation of communication system of the Dawning 6000 supercomputer
|
Li, Qiang |
|
2010 |
|
4 |
p. 466-474 |
artikel |
21 |
Detecting academic experts by topic-sensitive link analysis
|
Wu, Hao |
|
2009 |
|
4 |
p. 445-456 |
artikel |
22 |
Evolution of supercomputers
|
Xie, Xianghui |
|
2010 |
|
4 |
p. 428-436 |
artikel |
23 |
Fast motion and disparity estimation for multiview video coding
|
Deng, Zhipin |
|
2010 |
|
4 |
p. 571-579 |
artikel |
24 |
Full and partial deniability for authentication schemes
|
Liu, Jiqiang |
|
2010 |
|
4 |
p. 516-521 |
artikel |
25 |
Geometric algorithm for point projection and inversion onto Bézier surfaces
|
Xu, Jinting |
|
2009 |
|
4 |
p. 472-476 |
artikel |
26 |
HPP controller: a system controller for high performance computing
|
Chen, Fei |
|
2010 |
|
4 |
p. 456-465 |
artikel |
27 |
Human behavior classification by analyzing periodic motions
|
Wang, Jiangtao |
|
2010 |
|
4 |
p. 580-588 |
artikel |
28 |
Identity-based key distribution for mobile Ad Hoc networks
|
Lv, Xixiang |
|
2011 |
|
4 |
p. 442-447 |
artikel |
29 |
JASMIN: a parallel software infrastructure for scientific computing
|
Mo, Zeyao |
|
2010 |
|
4 |
p. 480-488 |
artikel |
30 |
Knowledge fusion framework based on Web page texts
|
Hu, Sikang |
|
2009 |
|
4 |
p. 457-464 |
artikel |
31 |
Linear complexity and autocorrelation values of a polyphase generalized cyclotomic sequence of length pq
|
Chen, Zhixiong |
|
2010 |
|
4 |
p. 529-535 |
artikel |
32 |
Measurement of refinement and correctness
|
Wu, Hengyang |
|
2009 |
|
4 |
p. 465-471 |
artikel |
33 |
Nearest-neighbor classifier motivated marginal discriminant projections for face recognition
|
Huang, Pu |
|
2011 |
|
4 |
p. 419-428 |
artikel |
34 |
Network intrusion detection based on system calls and data mining
|
Tian, Xinguang |
|
2010 |
|
4 |
p. 522-528 |
artikel |
35 |
Non-cooperative optimization games in market-oriented overlay networks: an integrated model of resource pricing and network formation
|
Okaie, Yutaka |
|
2011 |
|
4 |
p. 496-505 |
artikel |
36 |
On automatic verification of self-stabilizing population protocols
|
Pang, Jun |
|
2008 |
|
4 |
p. 357-367 |
artikel |
37 |
On cross-correlation indicators of an S-box
|
Gao, Sheng |
|
2011 |
|
4 |
p. 448-453 |
artikel |
38 |
One-to-one communication in twisted cubes under restricted connectivity
|
Fan, Jianxi |
|
2010 |
|
4 |
p. 489-499 |
artikel |
39 |
On the equal-weight symmetric Boolean functions
|
Zhou, Yu |
|
2009 |
|
4 |
p. 485-493 |
artikel |
40 |
Perspectives of China’s HPC system development: a view from the 2009 China HPC TOP100 list
|
Zhang, Yunquan |
|
2010 |
|
4 |
p. 437-444 |
artikel |
41 |
Petaflop supercomputers of China
|
Chen, Guoliang |
|
2010 |
|
4 |
p. 427 |
artikel |
42 |
PopCap: popularity oriented proxy caching for peer-assisted Internet video-on-demand streaming services
|
Tian, Ye |
|
2010 |
|
4 |
p. 500-515 |
artikel |
43 |
Pushing requirements changes through to changes in specifications
|
Lin, Lan |
|
2008 |
|
4 |
p. 331-343 |
artikel |
44 |
RBF neural network based on q-Gaussian function in function approximation
|
Zhao, Wei |
|
2011 |
|
4 |
p. 381-386 |
artikel |
45 |
Research of localization approach for the new comer in wireless sensor networks
|
Qu, Wei |
|
2009 |
|
4 |
p. 543-549 |
artikel |
46 |
Research on resource allocation for multi-tier web applications in a virtualization environment
|
Yang, Shuguo |
|
2011 |
|
4 |
p. 506-512 |
artikel |
47 |
Security evaluation against differential and linear cryptanalyses for Feistel ciphers
|
Wang, Nianping |
|
2009 |
|
4 |
p. 494-502 |
artikel |
48 |
Socially inspired search and ranking in mobile social networking: concepts and challenges
|
Wang, Yufeng |
|
2009 |
|
4 |
p. 435-444 |
artikel |
49 |
Style transformation in natural languages
|
Hu, Yue |
|
2008 |
|
4 |
p. 424-430 |
artikel |
50 |
TH-1: China’s first petaflop supercomputer
|
Yang, Xuejun |
|
2010 |
|
4 |
p. 445-455 |
artikel |
51 |
Two-thirds simulation indexes and modal logic characterization
|
Ma, Yanfang |
|
2011 |
|
4 |
p. 454-471 |
artikel |
52 |
Types, structures and theories in NKI
|
Zhang, Xiaoru |
|
2008 |
|
4 |
p. 451-459 |
artikel |
53 |
Validation indices for projective clustering
|
Chen, Lifei |
|
2009 |
|
4 |
p. 477-484 |
artikel |
54 |
Verifying BPEL-like programs with Hoare logic
|
Luo, Chenguang |
|
2008 |
|
4 |
p. 344-356 |
artikel |
55 |
Virtual node based adaptive routing in wireless ad hoc networks
|
Li, Gang |
|
2009 |
|
4 |
p. 535-542 |
artikel |
56 |
Workflow-based semantics for peer-to-peer specifications
|
Brogi, Antonio |
|
2008 |
|
4 |
p. 398-412 |
artikel |