Search

Showing total 340 results

Search Constraints

Start Over You searched for: Search Limiters Academic (Peer-Reviewed) Journals Remove constraint Search Limiters: Academic (Peer-Reviewed) Journals Topic computer science Remove constraint Topic: computer science Publication Year Range Last 10 years Remove constraint Publication Year Range: Last 10 years Publisher elsevier b.v. Remove constraint Publisher: elsevier b.v.
340 results

Search Results

151. A review of Earth Artificial Intelligence.

152. Method and dataset entity mining in scientific literature: A CNN + BiLSTM model with self-attention.

153. Fileless malware threats: Recent advances, analysis approach through memory forensics and research challenges.

154. Automation and artificial intelligence in filamentous fungi-based bioprocesses: A review.

155. Joint distributions of random sets and their relation to copulas.

156. Higher order sliding modes manifold design via singular LQ control.

157. Comment on “DSKmeans: A new kmeans-type approach to discriminative subspace clustering” by X. Huang et al. [Knowledge-Based Systems, Vol. 70, pp. 293–300, 2014].

158. From different ZFs to different ZNN models accelerated via Li activation functions to finite-time convergence for time-varying matrix pseudoinversion.

159. Laplace-domain wave-equation modeling and full waveform inversion in 3D isotropic elastic media.

160. Hybrid recommendation system combined content-based filtering and collaborative prediction using artificial neural network.

161. Teacher agency and learner agency in teaching and learning a new school subject, Leaving Certificate Computer Science, in Ireland: Considerations for teacher education.

162. Entailment and symmetry in confirmation measures of interestingness.

163. [formula omitted] filtering for descriptor systems with strict LMI conditions.

164. GA-LP: A genetic algorithm based on Label Propagation to detect communities in directed networks.

165. Learning general model for activity recognition with limited labelled data.

166. Paired 2-disjoint path covers of multi-dimensional torus networks with 2n − 3 faulty edges.

167. Tangible images of real life scenes.

168. Global stability and attractivity of a network-based SIS epidemic model with nonmonotone incidence rate.

169. Fuzzy time series forecasting based on optimal partitions of intervals and optimal weighting vectors.

170. An analysis of safety evidence management with the Structured Assurance Case Metamodel.

171. Exploring software security approaches in software development lifecycle: A systematic mapping study.

172. Revealing structure in large graphs: Szemerédi’s regularity lemma and its use in pattern recognition.

173. Lessons from collecting a million biometric samples.

174. Network connectivity assessment and improvement through relay node deployment.

175. log-Lists and their applications to sorting by transpositions, reversals and block-interchanges.

176. Conditional diagnosability of the round matching composition networks.

177. iCETD: An improved tag generation design for memory data authentication in embedded processor systems.

178. Properties of the Box–Cox transformation for pattern classification.

179. Ordered multi-stack visibly pushdown automata.

180. On deciding synchronizability for asynchronously communicating systems.

181. Design optimization of compressor reed valve based on axiomatic design.

182. SAT Race 2015.

183. Efficient multiple bichromatic mutual nearest neighbor query processing.

184. Semantic catalogs for life cycle assessment data.

185. Specifying and executing optimizations for generalized control flow graphs.

186. Visual tracking via adaptive multi-task feature learning with calibration and identification.

187. A spectral graph wavelet approach for nonrigid 3D shape retrieval.

188. Hierarchical image simplification and segmentation based on Mumford–Shah-salient level line selection.

189. Co-spectral for robust shape clustering.

190. Classification of human actions using pose-based features and stacked auto encoder.

191. TOSI: A trust-oriented social influence evaluation method in contextual social networks.

192. Uncovering fuzzy communities in networks with structural similarity.

193. Modern meta-heuristics based on nonlinear physics processes: A review of models and design procedures.

194. Parameterized approximation algorithms for packing problems.

195. Maximum number of distinct and nonequivalent nonstandard squares in a word.

196. Containment of competitive influence spread in social networks.

197. An efficient method to evaluate intersections on big data sets.

198. Preference-oriented fixed-priority scheduling for periodic real-time tasks.

199. Automatic creation of scenarios for evaluating spoken dialogue systems via user-simulation.

200. SuMoTED: An intuitive edit distance between rooted unordered uniquely-labelled trees.