Works matching DE "IEEE Computer Society"
1
- Wireless Personal Communications, 2014, v. 79, n. 3, p. 1733, doi. 10.1007/s11277-014-1955-0
- Deng, Jianhua;
- Davis, Mark
- Article
2
- International Journal on Artificial Intelligence Tools, 2013, v. 22, n. 4, p. -1, doi. 10.1142/S021821301350022X
- NIU, YONGYONG;
- CAI, ZIXING;
- JIN, MIN
- Article
3
- Electrical Engineering, 2018, v. 100, n. 1, p. 333, doi. 10.1007/s00202-017-0508-4
- Article
4
- Mathematics of Operations Research, 2022, v. 47, n. 1, p. 643, doi. 10.1287/moor.2021.1144
- Giannakopoulos, Yiannis;
- Noarov, Georgy;
- Schulz, Andreas S.
- Article
5
- Asian-European Journal of Mathematics, 2022, v. 15, n. 1, p. 1, doi. 10.1142/S1793557122500140
- Article
6
- Scientia et Technica, 2021, v. 26, n. 2, p. 209, doi. 10.22517/23447214.24496
- Sánchez-Ramírez, N. J.;
- Muñoz-Rodríguez, J. E.;
- Rodríguez-Torres, L. D.;
- Cabrera-Reynaga, G. J.;
- Collazos, C. A.;
- Estrada-Esponda, R. D.
- Article
7
- IEEE Internet Computing, 2015, v. 19, n. 1, p. 85, doi. 10.1109/MIC.2015.13
- Article
8
- IEEE Internet Computing, 2014, v. 18, n. 2, p. c2, doi. 10.1109/MIC.2014.23
- Article
10
- IEEE Internet Computing, 2014, v. 18, n. 2, p. 88, doi. 10.1109/MIC.2014.24
- Article
11
- IEEE Internet Computing, 2014, v. 18, n. 2, p. 58, doi. 10.1109/MIC.2014.30
- Article
13
- IEEE Internet Computing, 2012, v. 16, n. 5, p. c2, doi. 10.1109/MIC.2012.106
- Article
14
- IEEE Internet Computing, 2012, v. 16, n. 5, p. c1, doi. 10.1109/MIC.2012.109
- Article
15
- IEEE Internet Computing, 2012, v. 16, n. 5, p. 59, doi. 10.1109/MIC.2012.112
- Article
16
- IEEE Internet Computing, 2012, v. 16, n. 5, p. 4, doi. 10.1109/MIC.2012.104
- Article
17
- IEEE Internet Computing, 2012, v. 16, n. 4, p. 7, doi. 10.1109/MIC.2012.91
- Article
18
- IEEE Internet Computing, 2012, v. 16, n. 4, p. 4, doi. 10.1109/MIC.2012.90
- Article
19
- IEEE Internet Computing, 2011, v. 15, n. 5, p. c4, doi. 10.1109/MIC.2011.114
- Article
20
- IEEE Internet Computing, 2011, v. 15, n. 5, p. 1, doi. 10.1109/MIC.2011.113
- Article
21
- IEEE Internet Computing, 2011, v. 15, n. 4, p. c4, doi. 10.1109/MIC.2011.86
- Article
22
- IEEE Internet Computing, 2011, v. 15, n. 4, p. c2, doi. 10.1109/MIC.2011.151
- Article
24
- IEEE Internet Computing, 2011, v. 15, n. 1, p. c4, doi. 10.1109/MIC.2011.10
- Article
25
- Journal of Grey System, 2013, v. 25, n. 1, p. 1
- Article
26
- Telecommunication Systems, 2014, v. 55, n. 4, p. 461, doi. 10.1007/s11235-013-9801-3
- Article
27
- Telecommunication Systems, 2012, v. 49, n. 3, p. 299, doi. 10.1007/s11235-010-9376-1
- Menachi, Eliav;
- Avin, Chen;
- Giladi, Ran
- Article
28
- Journal of Electronic Testing, 2014, v. 30, n. 6, p. 641, doi. 10.1007/s10836-014-5493-1
- Article
29
- Journal of Statistical Physics, 2019, v. 174, n. 6, p. 1161, doi. 10.1007/s10955-019-02228-0
- Article
30
- IEEE Internet Computing, 2008, v. 12, n. 4, p. 3, doi. 10.1109/MIC.2008.74
- Article
31
- Journal of Electronic Testing, 2022, v. 38, n. 4, p. 337, doi. 10.1007/s10836-022-06021-y
- Article
32
- EAI Endorsed Transactions on e-Learning, 2020, v. 6, n. 19, p. 1, doi. 10.4108/eai.13-7-2018.162289
- Article
33
- IADIS International Journal on Computer Science & Information Systems, 2014, v. 9, n. 1, p. 81
- Article
34
- Computer Journal, 2021, v. 64, n. 4, p. 534, doi. 10.1093/comjnl/bxaa076
- Article
35
- International Journal of Neural Systems, 2022, v. 32, n. 12, p. 1, doi. 10.1142/S0129065722500514
- Wu, Binyi;
- Waschneck, Bernd;
- Mayr, Christian Georg
- Article
36
- Data Mining & Knowledge Discovery, 2023, v. 37, n. 4, p. 1473, doi. 10.1007/s10618-023-00931-x
- Marques, Henrique O.;
- Swersky, Lorne;
- Sander, Jörg;
- Campello, Ricardo J. G. B.;
- Zimek, Arthur
- Article
37
- International Journal on Information Technologies & Security, 2014, v. 6, n. 2, p. 76
- Cico, Betim;
- Fetaji, Bekim;
- Porta, Marco
- Article
38
- Research in Higher Education, 2019, v. 60, n. 1, p. 64, doi. 10.1007/s11162-018-9503-5
- Lukács J., Ágnes;
- Dávid, Beáta
- Article
39
- IEEE Transactions on Dependable & Secure Computing, 2013, v. 10, n. 2, p. 128, doi. 10.1109/TDSC.2013.15
- Article
40
- IEEE Transactions on Dependable & Secure Computing, 2012, v. 9, n. 6, p. c4, doi. 10.1109/TDSC.2012.81
- Article
41
- IEEE Transactions on Dependable & Secure Computing, 2012, v. 9, n. 6, p. c2, doi. 10.1109/TDSC.2012.79
- Article
42
- IEEE Transactions on Dependable & Secure Computing, 2012, v. 9, n. 3, p. c2, doi. 10.1109/TDSC.2012.42
- Article
43
- IEEE Transactions on Dependable & Secure Computing, 2012, v. 9, n. 2, p. c4, doi. 10.1109/TDSC.2012.81
- Article
44
- IEEE Transactions on Dependable & Secure Computing, 2012, v. 9, n. 2, p. c2, doi. 10.1109/TDSC.2012.42
- Article
45
- IEEE Transactions on Dependable & Secure Computing, 2012, v. 9, n. 1, p. c4, doi. 10.1109/TDSC.2012.81
- Article
46
- IEEE Transactions on Dependable & Secure Computing, 2011, v. 8, n. 6, p. c4, doi. 10.1109/TDSC.2011.46
- Article
47
- IEEE Transactions on Dependable & Secure Computing, 2011, v. 8, n. 6, p. c3, doi. 10.1109/TDSC.2011.45
- Article
48
- IEEE Transactions on Dependable & Secure Computing, 2011, v. 8, n. 6, p. c2, doi. 10.1109/TDSC.2011.44
- Article
49
- IEEE Transactions on Dependable & Secure Computing, 2011, v. 8, n. 5, p. c4, doi. 10.1109/TDSC.2011.38
- Article
50
- IEEE Transactions on Dependable & Secure Computing, 2011, v. 8, n. 5, p. 783, doi. 10.1109/TDSC.2011.40
- Article