Search

Your search keyword '"TC 6"' showing total 972 results

Search Constraints

Start Over You searched for: Author "TC 6" Remove constraint Author: "TC 6"
972 results on '"TC 6"'

Search Results

151. Scream to Survive(S2S): Intelligent System to Life-Saving in Disasters Relief

152. Automatic Fairness Testing of Machine Learning Models

153. Assessing the Role of Trust in Merchant Adoption of Mobile Payments in Ghana

154. Inspecting Code Churns to Prioritize Test Cases

155. Happiness and Big Data – Theoretical Foundation and Empirical Insights for Africa

156. Understanding Rural Parents’ Behavioral Intention to Allow Their Children to Use Mobile Learning

157. Denoising Adversarial Autoencoder for Obfuscated Traffic Detection and Recovery

158. DeepRoute: Herding Elephant and Mice Flows with Reinforcement Learning

159. Association Rules Algorithms for Data Mining Process Based on Multi Agent System

160. GAMPAL: Anomaly Detection for Internet Backbone Traffic by Flow Prediction with LSTM-RNN

161. Internet of Things: Security Between Challenges and Attacks

162. A Comprehensive Analysis of Accuracies of Machine Learning Algorithms for Network Intrusion Detection

163. A New Approach to Determine the Optimal Number of Clusters Based on the Gap Statistic

164. A Novel Approach Towards Analysis of Attacker Behavior in DDoS Attacks

165. Socially and Biologically Inspired Computing for Self-organizing Communications Networks

166. Bayesian Classifiers in Intrusion Detection Systems

167. Jason-RS, a Collaboration between Agents and an IoT Platform

168. Flow-based detection of IPv6-specific network layer attacks

169. Evaluating the complexity of deriving adaptive homing, synchronizing and distinguishing sequences for nondeterministic FSMs

170. Multiple Mutation Testing for Timed Finite State Machine with Timed Guards and Timeouts

171. Industrial IoT security monitoring and test on Fed4Fire+ platforms

172. Regular Expression Learning with Evolutionary Testing and Repair

173. Attack tolerance for services-based applications in the cloud

174. Users’ Behavioral Strategies Toward Mobile App Problems: Fight or Flight

175. Internet of Things Business Models: The RAWFIE Case

176. Examining the Influence of Mobile Store Features on User E-Satisfaction: Extending UTAUT2 with Personalization, Responsiveness, and Perceived Security and Privacy

177. Investigating Factors that Influence the Adoption of BI Systems by End Users in the Mining Industry in Southern Africa

178. Smart Home Technology Acceptance: An Empirical Investigation

179. Exploring the Effects of Value Added Services on Perceived Value of Mobile Payment in the UK

180. Artificial Intelligence in the Public Sector: A Study of Challenges and Opportunities for Norwegian Municipalities

181. A Spatio-Temporal Data Imputation Model for Supporting Analytics at the Edge

182. Critical Success Factors for Dynamic Enterprise Risk Management in Responsive Organisations: A Factor Analysis Approach

183. Aspects of Personal Data Protection from State and Citizen Perspectives – Case of Georgia

184. Comparing Human Computation, Machine, and Hybrid Methods for Detecting Hotel Review Spam

185. Prioritizing Knowledge Transfer Conditions for Innovation Ecosystems: A Mixed-Method Approach

186. The Praxis of HR Analytics

187. Adoption of Transactional Service in Electronic Government – A Case of Pak-Identity Service

188. Demographic Factors in Cyber Security: An Empirical Study

189. Predicting Parking Demand with Open Data

190. Designing Laboratory Forensics

191. Digital Payment Adoption in India: Insights from Twitter Analytics

192. Aggressive Social Media Post Detection System Containing Symbolic Images

193. Care About Your Customer: A Use and Gratification Study Regarding Co-creation and Customer Engagement on Facebook

194. Use of Social Media by b2b Companies: Systematic Literature Review and Suggestions for Future Research

195. Winning of Hearts and Minds: Integrating Sentiment Analytics into the Analysis of Contradictions

196. Learning to Lead Online Collaborations: Insights from Student-Based Global Virtual Teams Between UK and Norway

197. ICT-Based Challenges of Repurposing a Single-Campus Course to Multi-campus Settings: A Pragmatic Case Study

198. D2C-SM: Designing a Distributed-to-Centralized Software Management Architecture for Smart Cities

199. Chief Digital Officers as Protagonists in Digital Transformation

200. Social Media Reporting and Firm Value

Catalog

Books, media, physical & digital resources