nr |
titel |
auteur |
tijdschrift |
jaar |
jaarg. |
afl. |
pagina('s) |
type |
1 |
A lower dimension lattice attack on NTRU
|
Yang, Zhichao |
|
2017 |
61 |
5 |
p. 1-3 |
artikel |
2 |
A non-alternate 3D structure and its practical security evaluation against differential and linear cryptanalysis
|
Wang, Qian |
|
2017 |
61 |
5 |
p. 1-3 |
artikel |
3 |
Anti-chain based algorithms for timed/probabilistic refinement checking
|
Wang, Ting |
|
2017 |
61 |
5 |
p. 1-17 |
artikel |
4 |
autoC: an efficient translator for model checking deterministic scheduler based OSEK/VDX applications
|
Zhang, Haitao |
|
2017 |
61 |
5 |
p. 1-15 |
artikel |
5 |
Can big data bring a breakthrough for software automation?
|
Mei, Hong |
|
2018 |
61 |
5 |
p. 1-3 |
artikel |
6 |
3D shape co-segmentation via sparse and low rank representations
|
Yin, Liyuan |
|
2018 |
61 |
5 |
p. 1-3 |
artikel |
7 |
Fingerprint-based access to personally controlled health records in emergency situations
|
Guan, Shaopeng |
|
2017 |
61 |
5 |
p. 1-3 |
artikel |
8 |
Finger vein recognition based on deformation information
|
Meng, Xianjing |
|
2017 |
61 |
5 |
p. 1-15 |
artikel |
9 |
Formula for computing knots with minimum stress and stretching energies
|
Li, Xuemei |
|
2017 |
61 |
5 |
p. 1-15 |
artikel |
10 |
Guaranteed cost boundary control for cluster synchronization of complex spatio-temporal dynamical networks with community structure
|
Yang, Chengdong |
|
2017 |
61 |
5 |
p. 1-13 |
artikel |
11 |
IO dependent SSD cache allocation for elastic Hadoop applications
|
Tang, Zhen |
|
2018 |
61 |
5 |
p. 1-17 |
artikel |
12 |
Learning dynamic dependency network structure with time lag
|
Du, Sizhen |
|
2017 |
61 |
5 |
p. 1-16 |
artikel |
13 |
LogPruner: detect, analyze and prune logging calls in Android apps
|
Zhou, Xin |
|
2018 |
61 |
5 |
p. 1-3 |
artikel |
14 |
LR-RRA-CCA secure functional encryption for randomized functionalities from trapdoor HPS and LAF
|
Wang, Huige |
|
2017 |
61 |
5 |
p. 1-3 |
artikel |
15 |
Mining API usage change rules for software framework evolution
|
Yu, Ping |
|
2018 |
61 |
5 |
p. 1-3 |
artikel |
16 |
Modern physiognomy: an investigation on predicting personality traits and intelligence from the human face
|
Qin, Rizhen |
|
2017 |
61 |
5 |
p. 1-3 |
artikel |
17 |
NavyDroid: an efficient tool of energy inefficiency problem diagnosis for Android applications
|
Liu, Yi |
|
2018 |
61 |
5 |
p. 1-20 |
artikel |
18 |
New constructions for (multiparty) one-round key exchange with strong security
|
Yang, Zheng |
|
2017 |
61 |
5 |
p. 1-3 |
artikel |
19 |
Non-fragility of multi-agent controllability
|
Zhao, Bin |
|
2017 |
61 |
5 |
p. 1-15 |
artikel |
20 |
On the structural controllability of distributed systems with local structure changes
|
Mu, Jianbin |
|
2017 |
61 |
5 |
p. 1-13 |
artikel |
21 |
Path planning for mobile robot using self-adaptive learning particle swarm optimization
|
Li, Guangsheng |
|
2017 |
61 |
5 |
p. 1-18 |
artikel |
22 |
Personalized project recommendation on GitHub
|
Sun, Xiaobing |
|
2018 |
61 |
5 |
p. 1-14 |
artikel |
23 |
RoboCloud: augmenting robotic visions for open environment modeling using Internet knowledge
|
Li, Yiying |
|
2018 |
61 |
5 |
p. 1-16 |
artikel |
24 |
Securely min and k-th min computations with fully homomorphic encryption
|
Jiang, Bingbing |
|
2017 |
61 |
5 |
p. 1-3 |
artikel |
25 |
Situation analytics — at the dawn of a new software engineering paradigm
|
Chang, Carl K. |
|
2018 |
61 |
5 |
p. 1-14 |
artikel |
26 |
Spatial image encryption algorithm based on chaotic map and pixel frequency
|
Ye, Guodong |
|
2017 |
61 |
5 |
p. 1-3 |
artikel |
27 |
Survey of recent progress in semantic image segmentation with CNNs
|
Geng, Qichuan |
|
2017 |
61 |
5 |
p. 1-18 |
artikel |
28 |
Symbolic model checking for discrete real-time systems
|
Luo, Xiangyu |
|
2017 |
61 |
5 |
p. 1-23 |
artikel |
29 |
Toward accurate link between code and software documentation
|
Cao, Yingkui |
|
2018 |
61 |
5 |
p. 1-15 |
artikel |