nr |
titel |
auteur |
tijdschrift |
jaar |
jaarg. |
afl. |
pagina('s) |
type |
1 |
An upper (lower) bound for Max (Min) CSP
|
Huang, Ping |
|
2014 |
57 |
7 |
p. 1-9 |
artikel |
2 |
Binary compatibility for embedded systems using greedy subgraph mapping
|
Chen, XuHao |
|
2014 |
57 |
7 |
p. 1-16 |
artikel |
3 |
Content-based image retrieval using high-dimensional information geometry
|
Cao, WenMing |
|
2014 |
57 |
7 |
p. 1-11 |
artikel |
4 |
Correlations between characteristics of maximum influence and degree distributions in software networks
|
Gu, Qing |
|
2014 |
57 |
7 |
p. 1-12 |
artikel |
5 |
Cryptanalysis of a signcryption scheme with fast online signing and short signcryptext
|
Zhou, DeHua |
|
2014 |
57 |
7 |
p. 1-5 |
artikel |
6 |
Fractional partial differential equation denoising models for texture image
|
Pu, YiFei |
|
2014 |
57 |
7 |
p. 1-19 |
artikel |
7 |
Further results on state feedback stabilization of stochastic high-order nonlinear systems
|
Xie, XueJun |
|
2014 |
57 |
7 |
p. 1-14 |
artikel |
8 |
Gaussian sampling of lattices for cryptographic applications
|
Hu, YuPu |
|
2014 |
57 |
7 |
p. 1-8 |
artikel |
9 |
Generating Lorenz-like and Chen-like attractors from a simple algebraic structure
|
Wang, Xiong |
|
2014 |
57 |
7 |
p. 1-7 |
artikel |
10 |
Global core, and galaxy structure of networks
|
Zhang, Wei |
|
2014 |
57 |
7 |
p. 1-20 |
artikel |
11 |
Identifying extract class refactoring opportunities for internetware
|
Chen, Lin |
|
2014 |
57 |
7 |
p. 1-18 |
artikel |
12 |
Implementation decision making for internetware driven by quality requirements
|
Wei, Bo |
|
2014 |
57 |
7 |
p. 1-19 |
artikel |
13 |
On the parameterized vertex cover problem for graphs with perfect matching
|
Wang, JianXin |
|
2014 |
57 |
7 |
p. 1-12 |
artikel |
14 |
Profiling selected paths with loops
|
Li, BiXin |
|
2014 |
57 |
7 |
p. 1-15 |
artikel |
15 |
Proof systems for planning under 0-approximation semantics
|
Shen, YuPing |
|
2014 |
57 |
7 |
p. 1-12 |
artikel |
16 |
Real-time control of human actions using inertial sensors
|
Liu, HuaJun |
|
2013 |
57 |
7 |
p. 1-11 |
artikel |
17 |
Sequence memory based on an oscillatory neural network
|
Xia, Min |
|
2014 |
57 |
7 |
p. 1-12 |
artikel |
18 |
System lifecycle processes for cyber security in a research reactor facility
|
Park, JaeKwan |
|
2014 |
57 |
7 |
p. 1-12 |
artikel |
19 |
Video color conceptualization using optimization
|
Cao, XiaoChun |
|
2014 |
57 |
7 |
p. 1-11 |
artikel |
20 |
What is the effective key length for a block cipher: an attack on every practical block cipher
|
Huang, JiaLin |
|
2014 |
57 |
7 |
p. 1-11 |
artikel |