nr |
titel |
auteur |
tijdschrift |
jaar |
jaarg. |
afl. |
pagina('s) |
type |
1 |
Accountable authority key policy attribute-based encryption
|
Wang, YongTao |
|
2012 |
55 |
7 |
p. 1631-1638 |
artikel |
2 |
A framework for multi-robot motion planning from temporal logic specifications
|
Koo, T. John |
|
2011 |
55 |
7 |
p. 1675-1692 |
artikel |
3 |
A logistic regression model for Semantic Web service matchmaking
|
Wei, DengPing |
|
2012 |
55 |
7 |
p. 1715-1720 |
artikel |
4 |
An adaptive control with optimal disturbances rejection
|
Li, ShengPing |
|
2012 |
55 |
7 |
p. 1704-1714 |
artikel |
5 |
A wireless secret key generation method based on Chinese remainder theorem in FDD systems
|
Wang, WenJie |
|
2012 |
55 |
7 |
p. 1605-1616 |
artikel |
6 |
CMQV+: An authenticated key exchange protocol from CMQV
|
Li, Hui |
|
2011 |
55 |
7 |
p. 1666-1674 |
artikel |
7 |
Contourlet HMT model with directional feature
|
Wang, XiangHai |
|
2012 |
55 |
7 |
p. 1563-1578 |
artikel |
8 |
Efficient construction of provably secure steganography under ordinary covert channels
|
Zhu, Yan |
|
2012 |
55 |
7 |
p. 1639-1649 |
artikel |
9 |
Further results on the margin explanation of boosting: new algorithm and experiments
|
Wang, LiWei |
|
2012 |
55 |
7 |
p. 1551-1562 |
artikel |
10 |
Human knowledge acquisition from 3D interaction in virtual environments
|
Cheng, Cheng |
|
2012 |
55 |
7 |
p. 1528-1540 |
artikel |
11 |
On semi-bent functions with Niho exponents
|
He, YeFeng |
|
2012 |
55 |
7 |
p. 1624-1630 |
artikel |
12 |
On the construction of multi-output Boolean functions with optimal algebraic immunity
|
Zhang, Jie |
|
2012 |
55 |
7 |
p. 1617-1623 |
artikel |
13 |
Perceptual video hashing robust against geometric distortions
|
Xiang, ShiJun |
|
2012 |
55 |
7 |
p. 1520-1527 |
artikel |
14 |
Polar differential power attacks and evaluation
|
Tang, Ming |
|
2012 |
55 |
7 |
p. 1588-1604 |
artikel |
15 |
P2P traffic optimization
|
Zhang, GuoQiang |
|
2011 |
55 |
7 |
p. 1475-1492 |
artikel |
16 |
Radiance-based color calibration for image-based modeling with multiple cameras
|
Zhao, Xu |
|
2012 |
55 |
7 |
p. 1509-1519 |
artikel |
17 |
Relay-assisted hierarchical adaptation scheme for multi-user scalable video delivery to heterogeneous mobile devices
|
Xiao, HongJiang |
|
2012 |
55 |
7 |
p. 1541-1550 |
artikel |
18 |
SCautz: a high performance and fault-tolerant datacenter network for modular datacenters
|
Huang, Feng |
|
2012 |
55 |
7 |
p. 1493-1508 |
artikel |
19 |
Symbolic algorithmic verification of intransitive generalized noninterference
|
Zhou, CongHua |
|
2011 |
55 |
7 |
p. 1650-1665 |
artikel |
20 |
Synchronization of multiple autonomous underwater vehicles without velocity measurements
|
Cui, RongXin |
|
2012 |
55 |
7 |
p. 1693-1703 |
artikel |
21 |
The upper bound of the minimal number of hidden neurons for the parity problem in binary neural networks
|
Lu, Yang |
|
2011 |
55 |
7 |
p. 1579-1587 |
artikel |