nr |
titel |
auteur |
tijdschrift |
jaar |
jaarg. |
afl. |
pagina('s) |
type |
1 |
A fuzzy extension for SHOIQ based on comparisons between degrees of membership
|
Kang, DaZhou |
|
2012 |
56 |
8 |
p. 1-11 |
artikel |
2 |
A negative selection algorithm based on hierarchical clustering of self set
|
Chen, Wen |
|
2011 |
56 |
8 |
p. 1-13 |
artikel |
3 |
A new digital algorithm for the velocity translation vector
|
Song, Min |
|
2013 |
56 |
8 |
p. 1-13 |
artikel |
4 |
Coverage probability driven dynamic spectrum allocation in heterogeneous wireless networks
|
Shi, Hua |
|
2013 |
56 |
8 |
p. 1-7 |
artikel |
5 |
Data-driven synthesis of multiple recommendation patterns to create situational Web mashups
|
Ma, Yun |
|
2013 |
56 |
8 |
p. 1-16 |
artikel |
6 |
Detecting performance anomaly with correlation analysis for Internetware
|
Wang, Tao |
|
2013 |
56 |
8 |
p. 1-15 |
artikel |
7 |
Editor’s note
|
Huang, Gang |
|
2013 |
56 |
8 |
p. 1 |
artikel |
8 |
Feature-oriented stigmergy-based collaborative requirements modeling: an exploratory approach for requirements elicitation and evolution based on web-enabled collective intelligence
|
Zhang, Wei |
|
2013 |
56 |
8 |
p. 1-18 |
artikel |
9 |
Golden age: on multi-source software update propagation in pervasive networking environments
|
Li, WenZhong |
|
2013 |
56 |
8 |
p. 1-15 |
artikel |
10 |
How commercial involvement affects open source projects: three case studies on issue reporting
|
Ma, XiuJuan |
|
2013 |
56 |
8 |
p. 1-13 |
artikel |
11 |
IDSRadar: a real-time visualization framework for IDS alerts
|
Zhao, Ying |
|
2013 |
56 |
8 |
p. 1-12 |
artikel |
12 |
Model-based cross-layer monitoring and adaptation of multilayer systems
|
Song, Hui |
|
2013 |
56 |
8 |
p. 1-15 |
artikel |
13 |
Model-based system configuration approach for Internetware
|
Li, Ying |
|
2013 |
56 |
8 |
p. 1-20 |
artikel |
14 |
Real-time rendering of flames on arbitrary deformable objects
|
Wang, Lei |
|
2013 |
56 |
8 |
p. 1-9 |
artikel |
15 |
Requirements monitoring for Internetware: an interaction based approach
|
Chen, XiaoHong |
|
2013 |
56 |
8 |
p. 1-15 |
artikel |
16 |
Strongly secure identity-based authenticated key agreement protocols in the escrow mode
|
Ni, Liang |
|
2012 |
56 |
8 |
p. 1-14 |
artikel |
17 |
Syntax theory of finite lattice-valued propositional logic
|
Pan, XiaoDong |
|
2012 |
56 |
8 |
p. 1-12 |
artikel |
18 |
Three novel opportunistic scheduling algorithms in CoMP-CSB scenario
|
Wang, Hao |
|
2013 |
56 |
8 |
p. 1-12 |
artikel |
19 |
Toward a seamless adaptation platform for Internetware
|
Cao, Chun |
|
2013 |
56 |
8 |
p. 1-13 |
artikel |
20 |
Towards context consistency by concurrent checking for Internetware applications
|
Xu, Chang |
|
2013 |
56 |
8 |
p. 1-20 |
artikel |