Search

Showing total 1,575 results

Search Constraints

Start Over You searched for: Journal computer journal Remove constraint Journal: computer journal Database Academic Search Index Remove constraint Database: Academic Search Index
1,575 results

Search Results

1. Social Network Analysis of the Panama Papers Concentrating on the MENA Region.

2. EFTA: An Efficient and Fault-Tolerant Data Aggregation Scheme without TTP in Smart Grid.

3. Visual Intrusion Detection Based On CBAM-Capsule Networks.

4. Panoptic Segmentation with Convex Object Representation.

5. Gathering Over Heterogeneous Meeting Nodes.

6. Coalitional Double Auction For Ridesharing With Desired Benefit And QoE Constraints.

7. Deep Learning Model for Tamil Part-of-Speech Tagging.

8. Cross-Domain Recommendation To Cold-Start Users Via Categorized Preference Transfer.

9. Human Activity Recognition Based On Video Summarization And Deep Convolutional Neural Network.

10. Software Failure Prediction Based On Program State and First-Error Characteristics.

11. Failing to Hash Into Supersingular Isogeny Graphs.

12. Tor Trace in Images: A Novel Multi-Tab Website Fingerprinting Attack With Object Detection.

13. Prediction of Student Performance Using Random Forest Combined With Naïve Bayes.

14. Privacy-Preserving Breast Cancer Prediction Based on Logistic Regression.

15. Hardware Addition Over Finite Fields Based On Booth–Karatsuba Algorithm.

16. Liveness Attacks On HotStuff: The Vulnerability Of Timer Doubling Mechanism.

17. SDTA: Secure Decentralized Trading Alliance for Electronic Medical Data.

18. Revisiting the Software-Efficient Stream Ciphers RCR-64 and RCR-32.

19. Improving Science That Uses Code.

20. A Hybrid Scheme Combining Duplications and LDPC Decoding to Reduce NAND Flash.

21. Dynamic Virtual Machine Scheduling Using Residual Optimum Power-Efficiency In The Cloud Data Center.

22. A Comprehensive Review of Brain Tumour Detection Mechanisms.

23. New Integral Distinguishers On Permutation Of Whirlpool.

24. On Conditional Edge-Fault-Tolerant Strong Menger Edge Connectivity Of Folded Hypercubes.

25. Adversarial Attacks on Network Intrusion Detection Systems Using Flow Containers.

26. A Deep Learning Model for Energy-Aware Task Scheduling Algorithm Based on Learning Automata for Fog Computing.

27. A Smart Contract-Based Access Control Framework For Smart Healthcare Systems.

28. Service Function Placement Optimization For Cloud Service With End-to-End Delay Constraints.

29. An Improved Density Peaks Clustering Algorithm Based On Density Ratio.

30. Deep Learning-Based Cyberbullying Detection in Kurdish Language.

31. CM-UTC: A Cost-sensitive Matrix based Method for Unknown Encrypted Traffic Classification.

32. CNN-LSTM Base Station Traffic Prediction Based On Dual Attention Mechanism and Timing Application.

33. Multimodal Sentiment Analysis Based on Composite Hierarchical Fusion.

34. Video Hashing with Tensor Robust PCA and Histogram of Optical Flow for Copy Detection.

35. CFAuditChain: Audit BlockChain Based On Cuckoo Filter.

36. SEDD: Robust Blind Image Watermarking With Single Encoder And Dual Decoders.

37. Discrete-Time Quantum Walks Community Detection in Multi-Domain Networks.

38. Color Patterns And Enhanced Texture Learning For Detecting Computer-Generated Images.

39. Link Residual Closeness of Graphs with Fixed Parameters.

40. A Light Weight Depthwise Separable Layer Optimized CNN Architecture for Object-Based Forgery Detection in Surveillance Videos.

41. Enhancing Aspect Category Detection Through Hybridised Contextualised Neural Language Models: A Case Study In Multi-Label Text Classification.

42. Partitioned 2D Set-Pruning Segment Trees with Compressed Buckets for Multi-Dimensional Packet Classification.

43. Hybrid ITÖ Algorithm for Maximum Scatter Colored Traveling Salesman Problem.

44. Menger-Type Connectivity of Line Graphs of Generalized Hypercubes With Faulty Edges.

45. From Stars to Diamonds: Counting and Listing Almost Complete Subgraphs in Large Networks.

46. Laws of Timed State Machines.

47. Strongly Menger Connectedness of a Class of Recursive Networks.

48. Privacy-Preserving Confidential Reporting System With Designated Reporters.

49. The Orbits of Folded Crossed Cubes.

50. API Recommendation For Mashup Creation: A Comprehensive Survey.