nr |
titel |
auteur |
tijdschrift |
jaar |
jaarg. |
afl. |
pagina('s) |
type |
1 |
A Co-processor for Computing the Euler Number of a Binary Image using Divide-and-Conquer Strategy
|
Dey, Sabyasachi |
|
2007 |
76 |
1-2 |
p. 75-89 |
artikel |
2 |
Advances in Symmetric Sandpiles
|
Formenti, Enrico |
|
2007 |
76 |
1-2 |
p. 91-112 |
artikel |
3 |
A Pricing Approach For Grid Resource Scheduling With QoS Guarantees
|
Chunlin, Li |
|
2007 |
76 |
1-2 |
p. 59-73 |
artikel |
4 |
Full-Searching-Equivalent Vector Quantization Using Two-Bounds Triangle Inequality
|
Chang, Chin-Chen |
|
2007 |
76 |
1-2 |
p. 25-37 |
artikel |
5 |
Intercode Regular Languages
|
Han, Yo-Sub |
|
2007 |
76 |
1-2 |
p. 113-128 |
artikel |
6 |
Modal-Like Operators in Boolean Lattices, Galois Connections and Fixed Points
|
Järvinen, Jouni |
|
2007 |
76 |
1-2 |
p. 129-145 |
artikel |
7 |
On the Optimality of the Binary Algorithm for the Jacobi Symbol
|
Busch, J. |
|
2007 |
76 |
1-2 |
p. 1-11 |
artikel |
8 |
Particle Swarms for Linearly Constrained Optimisation
|
Paquet, Ulrich |
|
2007 |
76 |
1-2 |
p. 147-170 |
artikel |
9 |
Rough set Based Ensemble Classifier forWeb Page Classification
|
Saha, Suman |
|
2007 |
76 |
1-2 |
p. 171-187 |
artikel |
10 |
Stochastic Petri Box Calculus with Discrete Time
|
Tarasyuk, Igor V. |
|
2007 |
76 |
1-2 |
p. 189-218 |
artikel |
11 |
Tolerant Key Assignment for Enforcing Complicated Access Control Policies in a Hierarchy
|
Chang, Ya-Fen |
|
2007 |
76 |
1-2 |
p. 13-23 |
artikel |
12 |
VQ Codebook Searching Algorithm Based on Correlation Property
|
Chang, Chin-Chen |
|
2007 |
76 |
1-2 |
p. 39-57 |
artikel |