Search

Showing total 25 results

Search Constraints

Start Over You searched for: Topic computer science Remove constraint Topic: computer science Publication Year Range Last 10 years Remove constraint Publication Year Range: Last 10 years Journal plos one Remove constraint Journal: plos one Database Academic Search Index Remove constraint Database: Academic Search Index
25 results

Search Results

1. An analysis of retracted papers in Computer Science.

2. Peer-Selected “Best Papers”—Are They Really That “Good”?

3. The role of author identities in peer review.

4. Explicit solution of divide-and-conquer dividing by a half recurrences with polynomial independent term.

5. Network diffusion of gender diversity on boards: A process of two-speed opposing forces.

6. Information theory inspired optimization algorithm for efficient service orchestration in distributed systems.

7. Quantifying the rise and fall of scientific fields.

8. Underrepresentation of women in computer systems research.

9. Fe-based superconducting transition temperature modeling by machine learning: A computer science method.

10. Directions in abusive language training data, a systematic review: Garbage in, garbage out.

11. Comparison of researchers' impact indices.

12. Information diffusion in signed networks.

13. Research on OpenCL optimization for FPGA deep learning application.

14. A device binding method based on content illumination pattern in public display environments.

15. A short certificateless aggregate signature against coalition attacks.

16. Enhancing the robustness of recommender systems against spammers.

17. An improved memory-based collaborative filtering method based on the TOPSIS technique.

18. Dormitory of Physical and Engineering Sciences: Sleeping Beauties May Be Sleeping Innovations.

19. A Bridge Role Metric Model for Nodes in Software Networks.

20. Intrusion detection system using Online Sequence Extreme Learning Machine (OS-ELM) in advanced metering infrastructure of smart grid.

21. Performance Evaluation Model for Application Layer Firewalls.

22. LiPISC: A Lightweight and Flexible Method for Privacy-Aware Intersection Set Computation.

23. Topological Vulnerability Evaluation Model Based on Fractal Dimension of Complex Networks.

24. Shilling Attacks Detection in Recommender Systems Based on Target Item Analysis.

25. A Modified Particle Swarm Optimization Technique for Finding Optimal Designs for Mixture Models.