Search

Showing total 1,541 results

Search Constraints

Start Over You searched for: Journal computer journal Remove constraint Journal: computer journal Publisher oxford university press / usa Remove constraint Publisher: oxford university press / usa
1,541 results

Search Results

101. Link Prediction Based On Local Structure And Node Information Along Local Paths.

102. Deep Hashing and Sparse Representation of Abnormal Events Detection.

103. Communication-Aware Energy Consumption Model in Heterogeneous Computing Systems.

104. An Asynchronous Maximum Independent Set Algorithm By Myopic Luminous Robots On Grids.

105. LAM: Scrutinizing Leading APIs For Detecting Suspicious Call Sequences.

106. ImposeSVD: Incrementing PureSVD For Top-N Recommendations for Cold-Start Problems and Sparse Datasets.

107. Robust Image Hashing Combining 3D Space Contour and Vector Angle Features.

108. A Novel Construction Of Certificateless Aggregate Signature Scheme For Healthcare Wireless Medical Sensor Networks.

109. Adaptive Federated Learning With Non-IID Data.

110. RTIM Hashing: Robust and Compact Video Hashing With a Rotation- and Translation-Invariant Model.

111. Ensemble Framework Combining Family Information for Android Malware Detection.

112. Trapezoidal Sketch: A Sketch Structure for Frequency Estimation of Data Streams.

113. Sentiment Classification of Tourist's Opinion on Tourist Places of Interest in South India using Tweet Reviews.

114. Efficient Parameter Server Placement for Distributed Deep Learning in Edge Computing.

115. Smart Multimedia Compressor—Intelligent Algorithms for Text and Image Compression.

116. Understanding Performance of a Vulnerable Heterogeneous Edge Data Center: A Modeling Approach.

117. Practical Attacks of Round-Reduced SIMON Based on Deep Learning.

118. On The Maximum Cliques Of The Subgraphs Induced By Binary Constant Weight Codes In Powers Of Hypercubes.

119. Neural-Aided Statistical Attack for Cryptanalysis.

120. Anti-Occlusion Target Tracking Based on Joint Confidence.

121. Modified Multi-Key Fully Homomorphic Encryption Scheme in the Plain Model.

122. A Clothoid Curve-Based Intersection Collision Warning Scheme in Internet of Vehicles.

123. Verifiable Conjunctive Dynamic Searchable Symmetric Encryption With Forward and Backward Privacy.

124. Multiple Blind Signature for e-Voting and e-Cash.

125. Federated Learning Communication-Efficiency Framework via Corset Construction.

126. Geometric Searchable Encryption Without False Positive And Its Applications.

127. Semantic-Based Hybrid Query Reformulation for Biomedical Information Retrieval.

128. Path-Rank-Based Data Chunk Scheduling for Concurrent Multipath Transmission.

129. New Strategies To Improve Differential-Linear Attacks With Applications To Chaskey.

130. Forward Secure Public-key Authenticated Encryption with Conjunctive Keyword Search.

131. The a-average Degree Edge-Connectivity of Bijective Connection Networks.

132. Construction and Validation of Early Software Size Estimation Models Based on ADAF-Adjusted ACD Metrics.

133. Relationship Between Component Connectivity And Component Diagnosability Of Some Regular Networks.

134. An Optimized Deep Belief Network for Land Cover Classification Using Synthetic-Aperture Radar Images and Landsat Images.

135. The Diagnosability of Interconnection Networks with Missing Edges and Broken-Down Nodes Under the PMC and MM* Models.

136. Development of Adaptive Time-Weighted Dynamic Time Warping for Time Series Vegetation Classification Using Satellite Images in Solapur District.

137. 3D Flattering Amplified Neural Network-Based Segmentation of Amygdala and Hippocampus.

138. Hamiltonian Properties of the Data Center Network HSDC with Faulty Elements.

139. Crime Type Prediction in Saudi Arabia Based on Intelligence Gathering.

140. Resistance Distances In Simplicial Networks.

141. The Local Diagnosability of a Class of Cayley Graphs with Conditional Faulty Edges Under the PMC Model.

142. Tactics And Techniques Classification In Cyber Threat Intelligence.

143. Gambling Domain Name Recognition via Certificate and Textual Analysis.

144. An Unobtrusive Approach to Emotion Detection in E-Learning Systems.

145. Flush+Reload Attacks on SEED.

146. Automatic Detection of Autism in Young Children Using Weighted Logarithmic Transformed Data with Optimized Deep Learning.

147. Experimental Approach to Exact and Random Boolean-Widths and Their Comparison with Other Width Parameters.

148. DCAF: Dynamic Cross-Chain Anchoring Framework using Smart Contracts.

149. A Novel Representation and Prediction Initiative for Underground Water by Using Deep Learning Technique of Remote Sensing Images.

150. An Improved Hill Climbing Algorithm for Graph Partitioning.