Search

Showing total 972 results

Search Constraints

Start Over You searched for: Topic computer science Remove constraint Topic: computer science Topic computer.software_genre Remove constraint Topic: computer.software_genre Publisher springer-verlag Remove constraint Publisher: springer-verlag
972 results

Search Results

1. Overlaying Paper Maps with Digital Information Services for Tourists

4. Network immunization and virus propagation in email networks: experimental evaluation and analysis

5. Caching Trust Rather Than Content

6. The KCM system: Speeding-up logic programming through hardware support

7. Improving SIEM for critical SCADA water infrastructures using machine learning

8. Comparative study of AR versus video tutorials for minor maintenance operations

9. Utilizing geospatial information to implement SDGs and monitor their Progress

10. A novel stateless authentication protocol

11. A neural network filtering approach for similarity-based remaining useful life estimation

12. On the effects of the fix geometric constraint in 2D profiles on the reusability of parametric 3D CAD models

13. Sparse analytic hierarchy process: an experimental analysis

14. Proxy-based near real-time TV content transmission in mobility over 4G with MPEG-DASH transcoding on the cloud

15. Limits to anonymity when using credentials

16. Exploring Functional Acceleration of OpenCL on FPGAs and GPUs Through Platform-Independent Optimizations

17. An LSH-Based Model-Words-Driven Product Duplicate Detection Method

18. A Multilevel Approach to Sentiment Analysis of Figurative Language in Twitter

19. Cross-language transfer of semantic annotation via targeted crowdsourcing: task design and evaluation

20. Structural Feature Selection for Event Logs

21. Discovering High-Utility Itemsets at Multiple Abstraction Levels

22. Slicing concurrent constraint programs

23. Evidence analysis method using Bloom filter for MANET forensics

24. Feature-space transformation improves supervised segmentation across scanners

25. Security Analysis of CRT-Based Cryptosystems

26. Further Security Analysis of XTR

27. Artificial intelligent system for multimedia services in smart home environments

28. Towards a framework for the development of adaptable service-based applications

29. Building general purpose security services on trusted computing

30. A General-Purpose Virtualization Service for HPC on Cloud Computing: An Application to GPUs

31. Evaluation of Link System between Repository and Researcher Database

32. Challenges and trends in wireless ubiquitous computing systems

33. Meet-in-the-Middle Attacks on Reduced-Round XTEA

34. Artificial evolution in computer aided design: from the optimization of parameters to the creation of assembly programs

35. NTRULO: A Tunneling Architecture for Multimedia Conferencing over IP

36. Precise specification of design pattern structure and behaviour

37. Do you trust your phone?

38. The Append-only Web Bulletin Board

39. Securing Real-time Sessions in an IMS-based Architecture

40. UML-Based Modeling for What-If Analysis

41. BPMN: How Much Does It Cost? An Incremental Approach

42. Structural patterns for descriptive documents

43. Multi-agent and Data Mining Technologies for Situation Assessment in Security-related Applications

44. The Efficiency of the Rules’ Classification Based on the Cluster Analysis Method and Salton’s Method

45. Feature Selection by Combining Multiple Methods

46. Taming the Curse of Dimensionality in Kernels and Novelty Detection

47. Ontology-Based Automatic Classification of Web Pages

48. An Adaptive PC to Mobile Web Contents Transcoding System Based on MPEG-21 Multimedia Framework

49. Introducing COGAIN — Communication by Gaze Interaction

50. Fault tolerance in distributed UNIX