Search

Showing total 1,541 results

Search Constraints

Start Over You searched for: Journal computer journal Remove constraint Journal: computer journal Publisher oxford university press / usa Remove constraint Publisher: oxford university press / usa
1,541 results

Search Results

1. Social Network Analysis of the Panama Papers Concentrating on the MENA Region.

2. Gathering Over Heterogeneous Meeting Nodes.

3. Coalitional Double Auction For Ridesharing With Desired Benefit And QoE Constraints.

4. Revisiting the Software-Efficient Stream Ciphers RCR-64 and RCR-32.

5. Improving Science That Uses Code.

6. A Hybrid Scheme Combining Duplications and LDPC Decoding to Reduce NAND Flash.

7. A Comprehensive Review of Brain Tumour Detection Mechanisms.

8. Dynamic Virtual Machine Scheduling Using Residual Optimum Power-Efficiency In The Cloud Data Center.

9. New Integral Distinguishers On Permutation Of Whirlpool.

10. On Conditional Edge-Fault-Tolerant Strong Menger Edge Connectivity Of Folded Hypercubes.

11. Adversarial Attacks on Network Intrusion Detection Systems Using Flow Containers.

12. A Deep Learning Model for Energy-Aware Task Scheduling Algorithm Based on Learning Automata for Fog Computing.

13. A Smart Contract-Based Access Control Framework For Smart Healthcare Systems.

14. Improved Linear Cryptanalysis of Block Cipher BORON.

15. Privacy-Preserving Confidential Reporting System With Designated Reporters.

16. API Recommendation For Mashup Creation: A Comprehensive Survey.

17. Stealthy Backdoor Attacks On Deep Point Cloud Recognization Networks.

18. Keyframe-guided Video Swin Transformer with Multi-path Excitation for Violence Detection.

19. Policy-Based Remote User Authentication From Multi-Biometrics.

20. Sparse Backdoor Attack Against Neural Networks.

21. The Orbits of Folded Crossed Cubes.

22. Cryptanalysis Of A Type Of White-Box Implementations Of The SM4 Block Cipher.

23. Enumeration Of Subtrees Of Two Families Of Self-Similar Networks Based On Novel Two-Forest Dual Transformations.

24. Online Optimization Method of Learning Process for Meta-Learning.

25. A Chinese Grammatical Error Correction Model Based On Grammatical Generalization And Parameter Sharing.

26. AKGF: Automatic Kernel Generation for DNN on CPU-FPGA.

27. Knowledge-Aware Dual-Channel Graph Neural Networks For Denoising Recommendation.

28. An Evaluation On The Entropy Supplying Capability Of Smartphone Sensors.

29. A Blockchain-Based Public Key Infrastructure For IoT-Based Healthcare Systems.

30. CDNM: Clustering-Based Data Normalization Method For Automated Vulnerability Detection.

31. NDN-RBE: An Accountable Privacy Aware Access Control Framework For NDN.

32. Super Structure Fault-Tolerance Assessment of the Generalized Hypercube.

33. A Large-Scale Mobile Traffic Dataset For Mobile Application Identification.

34. KEFSAR: A Solar-Aware Routing Strategy For Rechargeable IoT Based On High-Accuracy Prediction.

35. Truncated Differential Attacks On Symmetric Primitives With Linear Key Schedule: WARP And Orthros.

36. Improved Related-Key Rectangle Attacks On GIFT.

37. A Break Of Barrier To Classical Differential Fault Attack On The Nonce-Based Authenticated Encryption Algorithm.

38. Towards Accurate Smartphone Localization Using CSI Measurements.

39. Spatial-Aware Multi-Directional Autoencoder For Pre-Training.

40. A Toolbox for Migrating the Blockchain-Based Application From Ethereum to Hyperledger Fabric.

41. A Genetic Algorithm Based Scheduling Method With Carrier Aggregation In 5G Networks.

42. Bandwidth-Efficient Zero-Knowledge Proofs For Threshold ECDSA.

43. Hybrid Optimal Ensemble SVM Forest Classifier for Task Offloading in Mobile Cloud Computing.

44. Pancyclic And Hamiltonian Properties Of Dragonfly Networks.

45. A Multiple QoS Metrics-Aware Virtual Network Embedding Algorithm.

46. Chronos: An Efficient Asynchronous Byzantine Ordered Consensus.

47. Quantum Bit Commitment Without Quantum Memory.

48. A White-box Implementation of SM4 with Self-equivalence Encoding.

49. Analysis and Construction of Zero-Knowledge Proofs for the MinRank Problem.

50. Resilient Vector Consensus Over Random Dynamic Networks Under Mobile Malicious Attacks.