Search

Showing total 223 results

Search Constraints

Start Over You searched for: Topic computer science Remove constraint Topic: computer science Journal plos one Remove constraint Journal: plos one Database Academic Search Index Remove constraint Database: Academic Search Index
223 results

Search Results

1. An analysis of retracted papers in Computer Science.

2. The Carbon Footprint of Conference Papers.

3. Peer-Selected “Best Papers”—Are They Really That “Good”?

4. Interactive Informed Consent: Randomized Comparison with Paper Consents.

5. The role of author identities in peer review.

6. Explicit solution of divide-and-conquer dividing by a half recurrences with polynomial independent term.

7. Network diffusion of gender diversity on boards: A process of two-speed opposing forces.

8. Information theory inspired optimization algorithm for efficient service orchestration in distributed systems.

9. Quantifying the rise and fall of scientific fields.

10. Underrepresentation of women in computer systems research.

11. Fe-based superconducting transition temperature modeling by machine learning: A computer science method.

12. Directions in abusive language training data, a systematic review: Garbage in, garbage out.

13. Comparison of researchers' impact indices.

14. Information diffusion in signed networks.

15. Research on OpenCL optimization for FPGA deep learning application.

16. A device binding method based on content illumination pattern in public display environments.

17. A short certificateless aggregate signature against coalition attacks.

18. Enhancing the robustness of recommender systems against spammers.

19. An improved memory-based collaborative filtering method based on the TOPSIS technique.

20. Dormitory of Physical and Engineering Sciences: Sleeping Beauties May Be Sleeping Innovations.

21. A Bridge Role Metric Model for Nodes in Software Networks.

22. Intrusion detection system using Online Sequence Extreme Learning Machine (OS-ELM) in advanced metering infrastructure of smart grid.

23. Uncovering Randomness and Success in Society.

24. AHaH Computing–From Metastable Switches to Attractors to Machine Learning.

25. Linear Mixed Effects Models under Inequality Constraints with Applications.

26. Overlapping Structures in Sensory-Motor Mappings.

27. Different Approaches for Extracting Information from the Co-Occurrence Matrix.

28. Small and Dim Target Detection via Lateral Inhibition Filtering and Artificial Bee Colony Based Selective Visual Attention.

29. Find Duplicates among the PubMed, EMBASE, and Cochrane Library Databases in Systematic Review.

30. To Supplement or Not to Supplement: A Metabolic Network Framework for Human Nutritional Supplements.

31. Load Index Metrics for an Optimized Management of Web Services: A Systematic Evaluation.

32. Enlarge the Training Set Based on Inter-Class Relationship for Face Recognition from One Image per Person.

33. LabTrove: A Lightweight, Web Based, Laboratory “Blog” as a Route towards a Marked Up Record of Work in a Bioscience Research Laboratory.

34. Applying Pebble-Rotating Game to Enhance the Robustness of DHTs.

35. Structural Similarities between Brain and Linguistic Data Provide Evidence of Semantic Relations in the Brain.

36. Dynamics of Nanoparticle-Protein Corona Complex Formation: Analytical Results from Population Balance Equations

37. The Multi-Player Performance-Enhancing Drug Game

38. Metaphor Identification in Large Texts Corpora.

39. Cytoplasmic Electric Fields and Electroosmosis: Possible Solution for the Paradoxes of the Intracellular Transport of Biomolecules.

40. A Plea for Neutral Comparison Studies in Computational Sciences.

41. An Improved Swarm Optimization for Parameter Estimation and Biological Model Selection.

42. Exploring Default Mode and Information Flow on the Web.

43. Accelerating Bayesian Hierarchical Clustering of Time Series Data with a Randomised Algorithm.

44. Macro-Indicators of Citation Impacts of Six Prolific Countries: InCites Data and the Statistical Significance of Trends.

45. Structural Properties and Complexity of a New Network Class: Collatz Step Graphs.

46. Automated Authorship Attribution Using Advanced Signal Classification Techniques.

47. Performance Evaluation Model for Application Layer Firewalls.

48. LiPISC: A Lightweight and Flexible Method for Privacy-Aware Intersection Set Computation.

49. Topological Vulnerability Evaluation Model Based on Fractal Dimension of Complex Networks.

50. Shilling Attacks Detection in Recommender Systems Based on Target Item Analysis.