nr |
titel |
auteur |
tijdschrift |
jaar |
jaarg. |
afl. |
pagina('s) |
type |
1 |
Adaptive Depth Control for Autonomous Underwater Vehicles Based on Feedforward Neural Networks
|
Yang Shi , |
|
2007 |
|
3 |
p. 107-118 |
artikel |
2 |
A Fault Management and Monitoring Mechanism for Secure Medical Sensor Network.
|
Hayoung Oh, |
|
2009 |
|
3 |
p. 43-56 |
artikel |
3 |
A Forensic Logging System Based on a Secure OS.
|
Ilkyeun Ra, |
|
2009 |
|
3 |
p. 75-91 |
artikel |
4 |
A Hybrid Optimization Algorithm Based on Ant Colony and Immune Principles.
|
X. Wang , |
|
2007 |
|
3 |
p. 30-44 |
artikel |
5 |
A More Secure MFE Multivariate Public Key Encryption Scheme
|
Xin Wang, |
|
2009 |
|
3 |
p. 1-9 |
artikel |
6 |
A MULTIMEDIA DATABASE SERVER: IMPLEMENTATION AND FUNCTIONS
|
Cosmin Stoica Spahiu |
|
2010 |
|
3 |
p. 140-155 |
artikel |
7 |
A Neural Architecture Based on the Adaptive Resonant Theory and Recurrent Neural Networks.
|
Flávio Henrique Teles Vieira, |
|
2007 |
|
3 |
p. 45-56 |
artikel |
8 |
AN OBJECT ORIENTED GRAPH APPROACH FOR IMAGE REPRESENTATION AND QUERY BASED ON CONTENT
|
Eugen Ganea, |
|
2010 |
|
3 |
p. 45-59 |
artikel |
9 |
Applying SVD on Generalized Item-based Filtering
|
Manolis G. Vozalis |
|
2006 |
|
3 |
p. 27-51 |
artikel |
10 |
Attack Classification Based on Data Mining Technique and Its Application for Reliable Medical Sensor Communication.
|
Hayoung Oh, |
|
2009 |
|
3 |
p. 20-32 |
artikel |
11 |
Binary Particle Swarm Optimization Based Defensive Islanding Of Large Scale Power Systems.
|
Wenxin Liu , |
|
2007 |
|
3 |
p. 69-83 |
artikel |
12 |
CHARACTERIZING APPLICATION ATTENTIVENESS TO ITS USERS: A METHOD AND POSSIBLE USE CASES
|
Milan Z. Bjelica, |
|
2010 |
|
3 |
p. 60-83 |
artikel |
13 |
COLLUSION-RESISTANT FINGERPRINTS BASED ON REAL SUPERIMPOSED CODES
|
Valery Korzhik, |
|
2010 |
|
3 |
p. 1-8 |
artikel |
14 |
DISCONTINUITY IN SVD EMBEDDING MAPPING USED FOR WATERMARKS
|
Kazuo Ohzeki, |
|
2010 |
|
3 |
p. 9-17 |
artikel |
15 |
Editorial & Cover Page
|
Dumitru Dan Burdescu |
|
2010 |
|
3 |
p. iii |
artikel |
16 |
Editorial: Natural Inspired Computation
|
Hai-Bin DUAN |
|
2007 |
|
3 |
p. i-iv |
artikel |
17 |
Editorial: Network Security and Applications
|
Natarajan Meghanathan |
|
2009 |
|
3 |
p. i-iii |
artikel |
18 |
Editorial: 5th ANNIVERSARY SPECIAL ISSUE
|
Rajendra Akerkar |
|
2008 |
|
3 |
p. i-v |
artikel |
19 |
Editorial: Web-based Recommender System
|
Przemyslaw Kazienko |
|
2006 |
|
3 |
p. i-v |
artikel |
20 |
Explaining Object Oriented Analysis (OOA) Concepts to Managers of an Organization
|
K. V. Dinesha |
|
2008 |
|
3 |
p. 9-22 |
artikel |
21 |
EXPLOITING AUDIO-VISUAL CORRELATION BY MEANS OF GAZE TRACKING
|
Bartosz Kunka, |
|
2010 |
|
3 |
p. 104-123 |
artikel |
22 |
Feature Extraction Using Fuzzy Rule Based System
|
Narendra S. Chaudhari |
|
2008 |
|
3 |
p. 1-8 |
artikel |
23 |
Grid Computing with Globus : An Overview and Research Challenges
|
Rajeev Wankar |
|
2008 |
|
3 |
p. 56-69 |
artikel |
24 |
HUMAN-COMPUTER INTERFACE BASED ON VISUAL LIP MOVEMENT AND GESTURE RECOGNITION
|
Piotr Dalka, |
|
2010 |
|
3 |
p. 124-139 |
artikel |
25 |
Implementations of Web-based Recommender Systems Using Hybrid Methods.
|
Janusz Sobecki |
|
2006 |
|
3 |
p. 52-64 |
artikel |
26 |
Improved Ant Colony Algorithm for Global Optimal Trajectory Planning of UAV under Complex Environment.
|
Guanjun Ma, |
|
2007 |
|
3 |
p. 57-68 |
artikel |
27 |
Improvement of Carrier Sorting Rate of Letter in Postal Logistics.
|
Boo-Hyung Lee, |
|
2009 |
|
3 |
p. 33-42 |
artikel |
28 |
Intelligent Robotics: Past, Present and Future .
|
Ray Jarvis |
|
2008 |
|
3 |
p. 23-35 |
artikel |
29 |
Mobile Node Authentication Protocol for Proxy Mobile.
|
Jungwook Song, |
|
2009 |
|
3 |
p. 10-19 |
artikel |
30 |
Multiprocessor Scheduling Using Hybrid Particle Swarm Optimization with Dynamically Varying Inertia.
|
S.N.Sivanandam , |
|
2007 |
|
3 |
p. 95-106 |
artikel |
31 |
Natural Language Interface Using Shallow Parsing
|
Rajendra Akerkar |
|
2008 |
|
3 |
p. 70-90 |
artikel |
32 |
Novel Authentication & Authorization Management for Sensitive Information Privacy Protection Using Dynamic Key Based Group Key Management.
|
Xianping Wu, |
|
2009 |
|
3 |
p. 57-74 |
artikel |
33 |
On Ubiquitous Integrated Computing.
|
Kari Anne Haaland Thorsen |
|
2008 |
|
3 |
p. 46-55 |
artikel |
34 |
Personalized Integration of Recommendation Methods for E-commerce.
|
Przemysław Kazienko |
|
2006 |
|
3 |
p. 12-26 |
artikel |
35 |
Purposeful Deployment via Self -Organizing Flocking Coalition in Sensor Networks .
|
Yee Ming Chen , |
|
2007 |
|
3 |
p. 84-94 |
artikel |
36 |
RADON TRANSFORMATION AND PRINCIPAL COMPONENT ANALYSIS METHOD APPLIED IN POSTAL ADDRESS RECOGNITION TASK
|
Mirosław Miciak |
|
2010 |
|
3 |
p. 33-44 |
artikel |
37 |
Solving the Satisfiability Problem Using Finite Learning Automata.
|
Ole-Christoffer Granmo , |
|
2007 |
|
3 |
p. 15-29 |
artikel |
38 |
STRUCTURE BASED FEATURE EXTRACTION IN BASKETBALL ZONE-DEFENSE STRATEGIES
|
Aihua Zheng, |
|
2010 |
|
3 |
p. 18-32 |
artikel |
39 |
Swarm-based Sequencing Recommendations in E-learning
|
Bert van den Berg |
|
2006 |
|
3 |
p. 1-11 |
artikel |
40 |
The Recommendation Mechanism in an Internet Information System with Time Impact Coefficient
|
Dariusz Król, |
|
2006 |
|
3 |
p. 65-80 |
artikel |
41 |
THE SIMULATION OF THE IMPACT OF THE POLLUTION FACTORS ON THE PHYSICAL AND CHEMICAL PARAMETERS OF THE AIR QUALITY ALONG THE ROMANIAN COAST OF BLACK SEA USING NEURAL MODELS.
|
Nicolae Tudoroiu, |
|
2010 |
|
3 |
p. 84-103 |
artikel |
42 |
Towards Effective Solutions for Pattern Management.
|
Barbara Catania |
|
2008 |
|
3 |
p. 36-45 |
artikel |
43 |
Using Artificial Neural networks for the modelling of a distillation column
|
Yahya Chetouani |
|
2007 |
|
3 |
p. 119-133 |
artikel |
44 |
Wing Pattern-Based Classification of the Rhagoletis pomonella Species Complex Using Genetic Neural Networks.
|
Chengpeng Bi, |
|
2007 |
|
3 |
p. 1-14 |
artikel |