nr |
titel |
auteur |
tijdschrift |
jaar |
jaarg. |
afl. |
pagina('s) |
type |
1 |
A decomposition based algorithm for maximal contractions
|
Jiang, Dongchen |
|
2013 |
7 |
6 |
p. 801-811 |
artikel |
2 |
An automatic subdigraph renovation plan for failure recovery of composite semantic Web services
|
Saboohi, Hadi |
|
2013 |
7 |
6 |
p. 894-913 |
artikel |
3 |
A novel architecture for ahead branch prediction
|
Jin, Wenbing |
|
2013 |
7 |
6 |
p. 914-923 |
artikel |
4 |
Classifying and clustering in negative databases
|
Liu, Ran |
|
2013 |
7 |
6 |
p. 864-874 |
artikel |
5 |
Context-sensitive Web service discovery over the bipartite graph model
|
Zhang, Rong |
|
2013 |
7 |
6 |
p. 875-893 |
artikel |
6 |
Generating test data for both path coverage and fault detection using genetic algorithms
|
Gong, Dunwei |
|
2013 |
7 |
6 |
p. 822-837 |
artikel |
7 |
Hybrid Bayesian estimation tree learning with discrete and fuzzy labels
|
Qin, Zengchang |
|
2013 |
7 |
6 |
p. 852-863 |
artikel |
8 |
Image categorization using a semantic hierarchy model with sparse set of salient regions
|
Liu, Chunping |
|
2013 |
7 |
6 |
p. 838-851 |
artikel |
9 |
Integrity constraints in OWL ontologies based on grounded circumscription
|
Ouyang, Dantong |
|
2013 |
7 |
6 |
p. 812-821 |
artikel |
10 |
On applying stochastic network calculus
|
Lin, Chuang |
|
2013 |
7 |
6 |
p. 924-942 |
artikel |
11 |
Threshold public key encryption scheme resilient against continual leakage without random oracles
|
Zhang, Xiujie |
|
2013 |
7 |
6 |
p. 955-968 |
artikel |
12 |
Towards estimating computer users’ mood from interaction behaviour with keyboard and mouse
|
Khan, Iftikhar Ahmed |
|
2013 |
7 |
6 |
p. 943-954 |
artikel |