Search

Showing total 104 results

Search Constraints

Start Over You searched for: Topic computer science Remove constraint Topic: computer science Journal aip conference proceedings Remove constraint Journal: aip conference proceedings Database Complementary Index Remove constraint Database: Complementary Index
104 results

Search Results

1. A study of Bitcoin using scientometric analysis from 2011-2019.

2. A review paper on context: Awareness system of mobile computing.

3. Virtual reality application on mental health: A review on functionality.

4. The evaluation of abstractive text summarization using deep learning.

5. A review on evolution, application and future of cloud computing.

6. Use of ICT to support the application of contemporary pedagogical models in computer science.

7. Analysis and visualization of project system.

8. Fundamentals of text-to-image synthesis - A survey.

9. Software reengineering: Effects on software reliability and stability: Review.

10. The influence of block-based programming to computational thinking skills: A systematic review.

11. Lesson from bibliometric overview of WeChat research.

12. A bibliometric mapping overview of Fintech academic literature between 1984 and 2019.

13. A survey on symmetric text encryption techniques.

14. Analysis of scientometric trends in contemporary russian research in computer sciences: Catching-up development.

15. Artificial intelligence and machine learning in the fields of education, medical, and smart phones.

16. Low cost face detection and tracking using Arduino UNO and processing.

17. A study of Bitcoin using scientometric analysis from 2011-2019.

18. Lesson from bibliometric overview of WeChat research.

19. A bibliometric mapping overview of Fintech academic literature between 1984 and 2019.

20. Teaching Lexis via mobile applications and online platforms: Computer science case study.

21. Generalized k−Modulo graph.

22. Python optimization code for solving a mathematical modeling of COVID_19.

23. Paper-based vs. AI computer-based test results.

24. Challenges in collecting and transmitting data from resource-constrained IoT devices.

25. Flow optimization in network systems with graph theory.

26. Research methodology for computer science.

27. Information science vis-à-vis physical science—the areas, scope and changing scenario.

28. Uses and Misuses of Bayes' Rule and Bayesian Classifiers in Cybersecurity.

29. To improve the Chunks delivery of live streaming using an adaptive buffer management algorithm over a video on demand service.

30. Ontological Syntax Highlighting.

31. Modeling activities in the framework of an interdisciplinary subject Informatics in science and mathematics.

32. Molecular dynamics method as an additional educational tool in the course of solid state physics.

33. Construction of symmetric balanced incomplete block design (k + 1, k, k - 1) using circulant rhotrices.

34. Proposal of a Model of Searching over NoSQL Databases Working with Indeterminacy.

35. Generating Finite Cyclic and Dihedral Groups using Sequential Insertion Systems with Interactions.

36. A Cognitive Model for Routing in Agent-Based Modelling.

37. Water Flow Algorithm Decision Support Tool for Travelling Salesman Problem.

38. On Dichotomy and Splitting Issues for Evolution Equations.

39. Bringing Together Manual and Automated Code Assessment.

40. Absorption of Language Concepts in the Machine Mind.

41. Future Evolution of Distributed Systems for Smart Grid - the Challenges and Opportunities to Using Decentralized Energy System.

42. UML Activity Diagrams in Requirements Specification of Logic Controllers.

43. Neural Approaches to Machine Consciousness.

44. Hybrid Water Flow-like Algorithm with Tabu Search for Traveling Salesman Problem.

45. Software for the Occupational Health and Safety Integrated Management System.

46. Specifying Structural Constraints of Architectural Patterns in the ARCHERY Language.

47. Comprehensible Presentation of Clone Detection Results.

48. WEBtop (Operating Systems on Web).

49. Philosophical Approaches towards Sciences of Life in Early Cybernetics.

50. Modular Logic of Authentication Using Dynamic Keystroke Pattern Analysis.