Works matching DE "IEEE Computer Society"
1
- IEEE Transactions on Dependable & Secure Computing, 2012, v. 9, n. 6, p. c4, doi. 10.1109/TDSC.2012.81
- Article
2
- IEEE Transactions on Dependable & Secure Computing, 2012, v. 9, n. 6, p. c2, doi. 10.1109/TDSC.2012.79
- Article
3
- IEEE Transactions on Dependable & Secure Computing, 2012, v. 9, n. 5, p. 784, doi. 10.1109/TDSC.2012.57
- Article
4
- IEEE Transactions on Dependable & Secure Computing, 2012, v. 9, n. 5, p. 783, doi. 10.1109/TDSC.2012.61
- Article
5
- IEEE Transactions on Dependable & Secure Computing, 2012, v. 9, n. 5, p. 782, doi. 10.1109/TDSC.2012.60
- Article
6
- IEEE Transactions on Dependable & Secure Computing, 2012, v. 9, n. 5, p. 781, doi. 10.1109/TDSC.2012.62
- Article
7
- IEEE Transactions on Dependable & Secure Computing, 2012, v. 9, n. 5, p. 780, doi. 10.1109/TDSC.2012.59
- Article
8
- IEEE Transactions on Dependable & Secure Computing, 2012, v. 9, n. 5, p. 779, doi. 10.1109/TDSC.2012.63
- Article
9
- IEEE Transactions on Dependable & Secure Computing, 2012, v. 9, n. 5, p. c2, doi. 10.1109/TDSC.2012.42
- Article
10
- IEEE Transactions on Dependable & Secure Computing, 2012, v. 9, n. 4, p. c4, doi. 10.1109/TDSC.2012.81
- Article
11
- IEEE Transactions on Dependable & Secure Computing, 2012, v. 9, n. 4, p. c2, doi. 10.1109/TDSC.2012.42
- Article
12
- IEEE Transactions on Dependable & Secure Computing, 2012, v. 9, n. 3, p. c2, doi. 10.1109/TDSC.2012.42
- Article
13
- IEEE Transactions on Dependable & Secure Computing, 2012, v. 9, n. 2, p. c4, doi. 10.1109/TDSC.2012.81
- Article
14
- IEEE Transactions on Dependable & Secure Computing, 2012, v. 9, n. 2, p. c2, doi. 10.1109/TDSC.2012.42
- Article
15
- IEEE Transactions on Dependable & Secure Computing, 2012, v. 9, n. 1, p. c4, doi. 10.1109/TDSC.2012.81
- Article
16
- IEEE Transactions on Dependable & Secure Computing, 2011, v. 8, n. 6, p. c4, doi. 10.1109/TDSC.2011.46
- Article
17
- IEEE Transactions on Dependable & Secure Computing, 2011, v. 8, n. 6, p. c3, doi. 10.1109/TDSC.2011.45
- Article
18
- IEEE Transactions on Dependable & Secure Computing, 2011, v. 8, n. 6, p. c2, doi. 10.1109/TDSC.2011.44
- Article
19
- IEEE Transactions on Dependable & Secure Computing, 2011, v. 8, n. 5, p. c4, doi. 10.1109/TDSC.2011.38
- Article
20
- IEEE Transactions on Dependable & Secure Computing, 2011, v. 8, n. 5, p. 783, doi. 10.1109/TDSC.2011.40
- Article
21
- IEEE Transactions on Dependable & Secure Computing, 2011, v. 8, n. 5, p. c2, doi. 10.1109/TDSC.2011.36
- Article
23
- IEEE Transactions on Dependable & Secure Computing, 2011, v. 8, n. 4, p. c2, doi. 10.1109/TDSC.2011.26
- Article
24
- IEEE Transactions on Dependable & Secure Computing, 2011, v. 8, n. 3, p. c4, doi. 10.1109/TDSC.2011.23
- Article
25
- IEEE Transactions on Dependable & Secure Computing, 2011, v. 8, n. 3, p. c2, doi. 10.1109/TDSC.2011.21
- Article
27
- IEEE Transactions on Dependable & Secure Computing, 2011, v. 8, n. 2, p. c4, doi. 10.1109/TDSC.2011.11
- Article
28
- IEEE Transactions on Dependable & Secure Computing, 2011, v. 8, n. 2, p. 320, doi. 10.1109/TDSC.2011.13
- Article
29
- IEEE Transactions on Dependable & Secure Computing, 2011, v. 8, n. 1, p. c4, doi. 10.1109/TDSC.2011.4
- Article
30
- IEEE Transactions on Dependable & Secure Computing, 2010, v. 7, n. 4, p. c4, doi. 10.1109/TDSC.2010.65
- Article
31
- IEEE Transactions on Dependable & Secure Computing, 2010, v. 7, n. 4, p. 448, doi. 10.1109/TDSC.2010.66
- Article
32
- IEEE Transactions on Dependable & Secure Computing, 2010, v. 7, n. 4, p. 447, doi. 10.1109/TDSC.2010.68
- Article
33
- IEEE Transactions on Dependable & Secure Computing, 2010, v. 7, n. 3, p. c2, doi. 10.1109/TDSC.2010.63
- Article
34
- Insight: Non-Destructive Testing & Condition Monitoring, 2012, v. 54, n. 5, p. 284
- Article
35
- Data Mining & Knowledge Discovery, 2023, v. 37, n. 4, p. 1473, doi. 10.1007/s10618-023-00931-x
- Marques, Henrique O.;
- Swersky, Lorne;
- Sander, Jörg;
- Campello, Ricardo J. G. B.;
- Zimek, Arthur
- Article
36
- Quality & Reliability Engineering International, 1996, v. 12, n. 3, p. 211, doi. 10.1002/(SICI)1099-1638(199605)12:3<211::AID-QRE9>3.0.CO;2-C
- Article
37
- Journal of Electrical & Computer Engineering, 2012, p. 1, doi. 10.1155/2012/962402
- Article
38
- Neural Computing & Applications, 2013, v. 23, n. 3/4, p. 1185, doi. 10.1007/s00521-012-0980-8
- Sheikhan, Mansour;
- Mohammadi, Najmeh
- Article
39
- IEEE Internet Computing, 2015, v. 19, n. 1, p. 85, doi. 10.1109/MIC.2015.13
- Article
41
- IEEE Internet Computing, 2014, v. 18, n. 5, p. c3, doi. 10.1109/MIC.2014.97
- Article
42
- IEEE Internet Computing, 2014, v. 18, n. 4, p. c2, doi. 10.1109/MIC.2014.74
- Article
43
- IEEE Internet Computing, 2014, v. 18, n. 4, p. c3, doi. 10.1109/MIC.2014.70
- Article
45
- IEEE Internet Computing, 2014, v. 18, n. 3, p. 45, doi. 10.1109/MIC.2014.61
- Article
46
- IEEE Internet Computing, 2014, v. 18, n. 3, p. 89, doi. 10.1109/MIC.2014.59
- Article
47
- IEEE Internet Computing, 2014, v. 18, n. 3, p. 7, doi. 10.1109/MIC.2014.54
- Article
49
- IEEE Internet Computing, 2014, v. 18, n. 3, p. c2, doi. 10.1109/MIC.2014.93
- Article
50
- IEEE Internet Computing, 2014, v. 18, n. 3, p. 19, doi. 10.1109/MIC.2014.50
- Article