Digitale Bibliotheek
Sluiten Bladeren door artikelen uit een tijdschrift
     Tijdschrift beschrijving
       Alle jaargangen van het bijbehorende tijdschrift
         Alle afleveringen van het bijbehorende jaargang
                                       Alle artikelen van de bijbehorende aflevering
 
                             461 gevonden resultaten
nr titel auteur tijdschrift jaar jaarg. afl. pagina('s) type
1 Abelian combinatorics on words: A survey Fici, Gabriele

13-14 C p.
artikel
2 A brief survey on probability distribution approximation Melucci, Massimo
2019
13-14 C p. 91-97
artikel
3 Abstractive text summarization: A comprehensive survey of techniques, systems, and challenges Almohaimeed, Norah

13-14 C p.
artikel
4 A comparative review of Urdu stemmers: Approaches and challenges Jabbar, Abdul

13-14 C p.
artikel
5 A comparative study on popular MAC protocols for mixed Wireless Sensor Networks: From implementation viewpoint Maitra, Tanmoy
2016
13-14 C p. 107-134
28 p.
artikel
6 A comprehensive and systematic look up into deep learning based object detection techniques: A review Sharma, Vipal Kumar

13-14 C p.
artikel
7 A comprehensive review of cybersecurity vulnerabilities, threats, and solutions for the Internet of Things at the network-cum-application layer Razaque, Abdul

13-14 C p.
artikel
8 A comprehensive review of few-shot object detection on aerial imagery Nguyen, Khang

13-14 C p.
artikel
9 A comprehensive review of vulnerabilities and AI-enabled defense against DDoS attacks for securing cloud services Kumar, Surendra

13-14 C p.
artikel
10 A comprehensive review on applications of Raspberry Pi Mathe, Sudha Ellison

13-14 C p.
artikel
11 A comprehensive review on blockchains for Internet of Vehicles: Challenges and directions Hildebrand, Brian

13-14 C p.
artikel
12 A comprehensive review on current issues and advancements of Internet of Things in precision agriculture Dhanasekar, S.

13-14 C p.
artikel
13 A comprehensive review on machine learning-based VPN detection: Scenarios, methods, and open challenges Guerra-Manzanares, Alejandro

13-14 C p.
artikel
14 A comprehensive review on Software-Defined Networking (SDN) and DDoS attacks: Ecosystem, taxonomy, traffic engineering, challenges and research directions Kaur, Amandeep

13-14 C p.
artikel
15 A comprehensive review on transformer network for natural and medical image analysis Thirunavukarasu, Ramkumar

13-14 C p.
artikel
16 A comprehensive study of simulation frameworks and research directions in fog computing Gill, Monika

13-14 C p.
artikel
17 A comprehensive survey and analysis of generative models in machine learning GM, Harshvardhan

13-14 C p.
artikel
18 A comprehensive survey of service function chain provisioning approaches in SDN and NFV architecture Kaur, Karamjeet

13-14 C p.
artikel
19 A comprehensive survey of text classification techniques and their research applications: Observational and experimental insights Taha, Kamal

13-14 C p.
artikel
20 A comprehensive survey on authentication and privacy-preserving schemes in VANETs Mundhe, Pravin

13-14 C p.
artikel
21 A comprehensive survey on deep learning based malware detection techniques M., Gopinath

13-14 C p.
artikel
22 A comprehensive survey on sentiment analysis: Framework, techniques, and applications Chandan, Manish Kumar

13-14 C p.
artikel
23 A comprehensive survey on the Multiple Traveling Salesman Problem: Applications, approaches and taxonomy Cheikhrouhou, Omar

13-14 C p.
artikel
24 A comprehensive survey with critical analysis for deepfake speech detection Pham, Lam

13-14 C p.
artikel
25 A comprehensive taxonomy of schemes to detect and mitigate blackhole attack and its variants in MANETs Khanna, Nitin
2019
13-14 C p. 24-44
artikel
26 A conceptual framework to mitigate ransomware attacks on IoMT devices using threat intelligence: a systematic literature review Selvaraj, Kalaivani

13-14 C p.
artikel
27 A contemporary review on chatbots, AI-powered virtual conversational agents, ChatGPT: Applications, open challenges and future research directions Casheekar, Avyay

13-14 C p.
artikel
28 A critical overview of outlier detection methods Smiti, Abir

13-14 C p.
artikel
29 Adaptive gamification in Collaborative systems, a systematic mapping study Dalponte Ayastuy, María

13-14 C p.
artikel
30 Adaptive user interfaces and universal usability through plasticity of user interface design Miraz, Mahdi H.

13-14 C p.
artikel
31 Adding relevance to rigor: Assessing the contributions of SLRs in Software Engineering through Citation Context Analysis Díaz, Oscar

13-14 C p.
artikel
32 Addressing the challenges of modern DNS a comprehensive tutorial van der Toorn, Olivier

13-14 C p.
artikel
33 A decade: Review of scene text detection methods Rainarli, Ednawati

13-14 C p.
artikel
34 A decade systematic review of fusion techniques in financial market prediction Mehrmolaei, Soheila

13-14 C p.
artikel
35 Advancement from neural networks to deep learning in software effort estimation: Perspective of two decades Suresh Kumar, P.

13-14 C p.
artikel
36 Advancements in image encryption: A comprehensive review of design principles and performance metrics Yogi, Biswarup

13-14 C p.
artikel
37 Advances in nature-inspired metaheuristic optimization for feature selection problem: A comprehensive survey Nssibi, Maha

13-14 C p.
artikel
38 Advances in online handwritten recognition in the last decades Ghosh, Trishita

13-14 C p.
artikel
39 Advancing IoT-driven WSNs with context-aware routing: A comprehensive review Khedr, Ahmed M.

13-14 C p.
artikel
40 Aeronautical communication transition from analog to digital data: A network security survey Ben Mahmoud, Mohamed Slim
2014
13-14 C p. 1-29
29 p.
artikel
41 Affective recommender systems in the educational field. A systematic literature review Salazar, Camilo

13-14 C p.
artikel
42 Agent Based Modelling and Simulation tools: A review of the state-of-art software Abar, Sameera
2017
13-14 C p. 13-33
21 p.
artikel
43 AI-driven cluster-based routing protocols in WSNs: A survey of fuzzy heuristics, metaheuristics, and machine learning models Shokouhifar, Mohammad

13-14 C p.
artikel
44 AI-generated text detection: A comprehensive review of methods, datasets, and applications Kehkashan, Tanzila

13-14 C p.
artikel
45 Aiming at methods’ wider adoption: Applicability determinants and metrics Leszczyna, Rafał

13-14 C p.
artikel
46 AI techniques for IoT-based DDoS attack detection: Taxonomies, comprehensive review and research challenges Bala, Bindu

13-14 C p.
artikel
47 An annotated bibliography on 1-planarity Kobourov, Stephen G.
2017
13-14 C p. 49-67
19 p.
artikel
48 Anonymity on blockchain based e-cash protocols—A survey Andola, Nitish

13-14 C p.
artikel
49 An overview of self-adaptive technologies within virtual reality training Vaughan, Neil
2016
13-14 C p. 65-87
23 p.
artikel
50 Applicability of Blockchain smart contracts in securing Internet and IoT: A systematic literature review Lone, Auqib Hamid

13-14 C p.
artikel
51 Applicability of genetic algorithms for stock market prediction: A systematic survey of the last decade Thakkar, Ankit

13-14 C p.
artikel
52 Applicability of mobile contact tracing in fighting pandemic (COVID-19): Issues, challenges and solutions Dar, Aaqib Bashir

13-14 C p.
artikel
53 Application of deep learning for retinal image analysis: A review Badar, Maryam

13-14 C p.
artikel
54 Approximation and online algorithms for multidimensional bin packing: A survey Christensen, Henrik I.
2017
13-14 C p. 63-79
17 p.
artikel
55 A PRISMA-compliant systematic review and analysis on color image encryption using DNA properties Sokouti, Massoud
2018
13-14 C p. 14-20
artikel
56 Arabic Machine Translation: A survey of the latest trends and challenges Ameur, Mohamed Seghir Hadj

13-14 C p.
artikel
57 A recent review of conventional vs. automated cybersecurity anti-phishing techniques Qabajeh, Issa
2018
13-14 C p. 44-55
artikel
58 A review of attack graph and attack tree visual syntax in cyber security Lallie, Harjinder Singh

13-14 C p.
artikel
59 A review of background, methods, limitations and opportunities of knowledge graph completion Li, Daiyi

13-14 C p.
artikel
60 A review of using object-orientation properties of C++ for designing expert system in strategic planning Ahmadi, Mohsen

13-14 C p.
artikel
61 A review on fingerprint based authentication-its challenges and applications Maiti, Diptadip

13-14 C p.
artikel
62 A review on specification evaluation of broadcasting routing protocols in VANET Shah, Priyanka

13-14 C p.
artikel
63 Artificial intelligence in COVID-19 research: A comprehensive survey of innovations, challenges, and future directions Annan, Richard

13-14 C p.
artikel
64 A search for good pseudo-random number generators: Survey and empirical studies Bhattacharjee, Kamalika

13-14 C p.
artikel
65 Aspect based sentiment analysis using deep learning approaches: A survey Chauhan, Ganpat Singh

13-14 C p.
artikel
66 A state-of-the-art review of FMEA/FMECA including patents Spreafico, Christian
2017
13-14 C p. 19-28
10 p.
artikel
67 A still simpler way of introducing interior-point method for linear programming Mehlhorn, Kurt
2016
13-14 C p. 1-11
11 p.
artikel
68 A survey of active learning in collaborative filtering recommender systems Elahi, Mehdi
2016
13-14 C p. 29-50
22 p.
artikel
69 A survey of android application and malware hardening Sihag, Vikas

13-14 C p.
artikel
70 A survey of automated negotiation: Human factor, learning, and application Luo, Xudong

13-14 C p.
artikel
71 A survey of Beluga whale optimization and its variants: Statistical analysis, advances, and structural reviewing Lee, Sang-Woong

13-14 C p.
artikel
72 A survey of blockchain, artificial intelligence, and edge computing for Web 3.0 Zhu, Jianjun

13-14 C p.
artikel
73 A survey of Community Detection algorithms and its comparative performance analysis Singh, Dipika

13-14 C p.
artikel
74 A survey of data center consolidation in cloud computing systems Helali, Leila

13-14 C p.
artikel
75 A survey of deep learning techniques for detecting and recognizing objects in complex environments Dogra, Ashish Kumar

13-14 C p.
artikel
76 A survey of identifier–locator split addressing architectures Komu, Miika
2015
13-14 C p. 25-42
18 p.
artikel
77 A survey of Konkani NLP resources Rajan, Annie

13-14 C p.
artikel
78 A survey of lattice based expressive attribute based encryption Fu, Xingbing

13-14 C p.
artikel
79 A survey of live Virtual Machine migration techniques Le, Tuan

13-14 C p.
artikel
80 A survey of low-latency transmission strategies in software defined networking Yan, Binghao

13-14 C p.
artikel
81 A survey of malware detection in Android apps: Recommendations and perspectives for future research Razgallah, Asma

13-14 C p.
artikel
82 A survey of memory management techniques in virtualized systems Mishra, Debadatta
2018
13-14 C p. 56-73
artikel
83 A survey of multidisciplinary domains contributing to affective computing Arya, Resham

13-14 C p.
artikel
84 A survey of neighborhood construction algorithms for clustering and classifying data points Pourbahrami, Shahin

13-14 C p.
artikel
85 A survey of outlier detection in high dimensional data streams Souiden, Imen

13-14 C p.
artikel
86 A survey of parameterized algorithms and the complexity of edge modification Crespelle, Christophe

13-14 C p.
artikel
87 A survey of privacy-preserving mechanisms for heterogeneous data types Cunha, Mariana

13-14 C p.
artikel
88 A survey of safety and trustworthiness of deep neural networks: Verification, testing, adversarial attack and defence, and interpretability Huang, Xiaowei

13-14 C p.
artikel
89 A survey of set accumulators for blockchain systems Loporchio, Matteo

13-14 C p.
artikel
90 A survey of the European Open Science Cloud services for expanding the capacity and capabilities of multidisciplinary scientific applications Calatrava, Amanda

13-14 C p.
artikel
91 A survey of the modified Moran process and evolutionary graph theory Díaz, Josep

13-14 C p.
artikel
92 A survey of timed automata for the development of real-time systems Waez, Md Tawhid Bin
2013
13-14 C p. 1-26
26 p.
artikel
93 A survey on algorithms for Nash equilibria in finite normal-form games Li, Hanyu

13-14 C p.
artikel
94 A survey on aspect sentiment triplet extraction methods and challenges Zou, Wang

13-14 C p.
artikel
95 A survey on computation offloading in edge systems: From the perspective of deep reinforcement learning approaches Peng, Peng

13-14 C p.
artikel
96 A survey on decentralized identity management systems Xian, Jia

13-14 C p.
artikel
97 A survey on deep learning and its applications Dong, Shi

13-14 C p.
artikel
98 A survey on deep matrix factorizations De Handschutter, Pierre

13-14 C p.
artikel
99 A survey on design and implementation of protected searchable data in the cloud Dowsley, Rafael
2017
13-14 C p. 17-30
artikel
100 A survey on detecting mental disorders with natural language processing: Literature review, trends and challenges Montejo-Ráez, Arturo

13-14 C p.
artikel
101 A survey on essential components of a self-sovereign identity Mühle, Alexander
2018
13-14 C p. 80-86
artikel
102 A survey on GANs for computer vision: Recent research, analysis and taxonomy Iglesias, Guillermo

13-14 C p.
artikel
103 A survey on graph problems parameterized above and below guaranteed values Gutin, Gregory

13-14 C p.
artikel
104 A survey on Hedetniemi’s conjecture Zhu, Xuding

13-14 C p.
artikel
105 A survey on image cryptography mechanisms: hitherto, and future directions Gupta, Tanisha

13-14 C p.
artikel
106 A survey on legal question–answering systems Martinez-Gil, Jorge

13-14 C p.
artikel
107 A Survey on malware analysis and mitigation techniques Sibi Chakkaravarthy, S.
2019
13-14 C p. 1-23
artikel
108 A survey on mobile affective computing Politou, Eugenia
2017
13-14 C p. 79-100
22 p.
artikel
109 A survey on modeling for behaviors of complex intelligent systems based on generative adversarial networks Lv, Yali

13-14 C p.
artikel
110 A survey on parallel and distributed multi-agent systems for high performance computing simulations Rousset, Alban
2016
13-14 C p. 27-46
20 p.
artikel
111 A survey on privacy and security of Internet of Things Ogonji, Mark Mbock

13-14 C p.
artikel
112 A survey on privacy in decentralized online social networks De Salve, Andrea
2018
13-14 C p. 154-176
artikel
113 A Survey on quantum computing technology Gyongyosi, Laszlo
2019
13-14 C p. 51-71
artikel
114 A survey on quantum-safe blockchain security infrastructure Wicaksana, Arya

13-14 C p.
artikel
115 A survey on reconfigurable intelligent surfaces assisted multi-access edge computing networks: State of the art and future challenges Ahmed, Manzoor

13-14 C p.
artikel
116 A survey on semi-structured web data manipulations by non-expert users Tekli, Gilbert

13-14 C p.
artikel
117 A survey on socio-semantic information retrieval Schoefegger, Karin
2013
13-14 C p. 25-46
22 p.
artikel
118 A survey on system level energy optimisation for MPSoCs in IoT and consumer electronics Ali, Haider

13-14 C p.
artikel
119 A survey on the Distributed Computing stack Ramon-Cortes, Cristian

13-14 C p.
artikel
120 A survey on the parameterized complexity of reconfiguration problems Bousquet, Nicolas

13-14 C p.
artikel
121 A survey on the usability and practical applications of Graphical Security Models Hong, Jin B.
2017
13-14 C p. 1-16
artikel
122 A survey on tree matching and XML retrieval Tahraoui, Mohammed Amin
2013
13-14 C p. 1-23
23 p.
artikel
123 A survey: When moving target defense meets game theory Tan, Jinglei

13-14 C p.
artikel
124 A systematic literature review on chaotic maps-based image security techniques Singh, Dilbag

13-14 C p.
artikel
125 A systematic literature review on cross-language source code clone detection Alshabib, Asra Sulaiman

13-14 C p.
artikel
126 A systematic literature review on machine learning applications for consumer sentiment analysis using online reviews Jain, Praphula Kumar

13-14 C p.
artikel
127 A systematic literature review on prototyping with Arduino: Applications, challenges, advantages, and limitations Kondaveeti, Hari Kishan

13-14 C p.
artikel
128 A systematic literature review on the use of machine learning in code clone research Kaur, Manpreet

13-14 C p.
artikel
129 A systematic literature review on web service clustering approaches to enhance service discovery, selection and recommendation Agarwal, Neha

13-14 C p.
artikel
130 A systematic mapping review of context-aware analysis and its approach to mobile learning and ubiquitous learning processes Vallejo-Correa, Paola

13-14 C p.
artikel
131 A systematic mapping study of API usability evaluation methods Rauf, Irum
2019
13-14 C p. 49-68
artikel
132 A systematic mapping study of clone visualization Hammad, Muhammad

13-14 C p.
artikel
133 A systematic review of explainability in computational intelligence for optimization Almeida, José

13-14 C p.
artikel
134 A systematic review of quantum image processing: Representation, applications and future perspectives Farooq, Umar

13-14 C p.
artikel
135 A systematic review on Deep Learning approaches for IoT security Aversano, Lerina

13-14 C p.
artikel
136 A systematic review on moving objects’ trajectory data and trajectory data warehouse modeling Oueslati, Wided

13-14 C p.
artikel
137 A systematic review on security aspects of fog computing environment: Challenges, solutions and future directions Kaur, Navjeet

13-14 C p.
artikel
138 A systematic survey on fault-tolerant solutions for distributed data analytics: Taxonomy, comparison, and future directions Isukapalli, Sucharitha

13-14 C p.
artikel
139 A taxonomy and survey of attacks against machine learning Pitropakis, Nikolaos

13-14 C p.
artikel
140 Attention-based transformer models for image captioning across languages: An in-depth survey and evaluation Albadarneh, Israa A.

13-14 C p.
artikel
141 Attention to news and its dissemination on Twitter: A survey Orellana-Rodriguez, Claudia
2018
13-14 C p. 74-94
artikel
142 Automated knowledge base management: A survey Martinez-Gil, Jorge
2015
13-14 C p. 1-9
9 p.
artikel
143 Automatic hand gesture recognition using hybrid meta-heuristic-based feature selection and classification with Dynamic Time Warping Kowdiki, Manisha

13-14 C p.
artikel
144 Auto-scaling mechanisms in serverless computing: A comprehensive review Tari, Mohammad

13-14 C p.
artikel
145 Autoscaling techniques in cloud-native computing: A comprehensive survey Jeong, Byeonghui

13-14 C p.
artikel
146 Backbones-review: Feature extractor networks for deep learning and deep reinforcement learning approaches in computer vision Elharrouss, Omar

13-14 C p.
artikel
147 Background subtraction in real applications: Challenges, current models and future directions Garcia-Garcia, Belmar

13-14 C p.
artikel
148 Beyond linear subspace clustering: A comparative study of nonlinear manifold clustering algorithms Abdolali, Maryam

13-14 C p.
artikel
149 Big data and IoT-based applications in smart environments: A systematic review Hajjaji, Yosra

13-14 C p.
artikel
150 Big networks: A survey Bedru, Hayat Dino

13-14 C p.
artikel
151 Blockchain-based recommender systems: Applications, challenges and future opportunities Himeur, Yassine

13-14 C p.
artikel
152 Blockchain technology in the energy sector: From basic research to real world applications Wang, Qiang

13-14 C p.
artikel
153 Blockchain verification and validation: Techniques, challenges, and research directions Marijan, Dusica

13-14 C p.
artikel
154 Bridging the gap: A survey of document retrieval techniques for high-resource and low-resource languages Kazi, Samreen

13-14 C p.
artikel
155 Building blocks of sharding blockchain systems: Concepts, approaches, and open problems Liu, Yizhong

13-14 C p.
artikel
156 Caching methodologies in Content centric networking (CCN): A survey Lal, Nidhi
2019
13-14 C p. 39-50
artikel
157 Catastrophic event phenomena in communication networks: A survey Dabrowski, Christopher
2015
13-14 C p. 10-45
36 p.
artikel
158 Change point detection in social networks—Critical review with experiments Kendrick, Lucy
2018
13-14 C p. 1-13
artikel
159 Chaos-based video encryption techniques: A review Gao, Suo

13-14 C p.
artikel
160 Chaos Game Optimization: A comprehensive study of its variants, applications, and future directions Oueslati, Raja

13-14 C p.
artikel
161 Characterising harmful API uses and repair techniques: Insights from a systematic review Ochoa, Lina

13-14 C p.
artikel
162 Characterizing DDoS attacks and flash events: Review, research gaps and future directions Behal, Sunny
2017
13-14 C p. 101-114
14 p.
artikel
163 Citations, research topics and active countries in software engineering: A bibliometrics study Garousi, Vahid
2016
13-14 C p. 56-77
22 p.
artikel
164 Cloud services selection: A systematic review and future research directions Thakur, Neha

13-14 C p.
artikel
165 Cluster ensembles: A survey of approaches with recent extensions and applications Boongoen, Tossapon
2018
13-14 C p. 1-25
artikel
166 Clustering protocols in wireless sensor network: A survey, classification, issues, and future directions Rawat, Piyush

13-14 C p.
artikel
167 Combining UML and ontology: An exploratory survey Mejhed Mkhinini, Meriem

13-14 C p.
artikel
168 Community detection in node-attributed social networks: A survey Chunaev, Petr

13-14 C p.
artikel
169 Compactors for parameterized counting problems Thilikos, Dimitrios M.

13-14 C p.
artikel
170 Comparative analysis of Android and iOS from security viewpoint Garg, Shivi

13-14 C p.
artikel
171 Comparative analysis on cross-modal information retrieval: A review Kaur, Parminder

13-14 C p.
artikel
172 Comparative study for 8 computational intelligence algorithms for human identification Abdulrahman, Shaymaa Adnan

13-14 C p.
artikel
173 Comprehensive analysis of embeddings and pre-training in NLP Tripathy, Jatin Karthik

13-14 C p.
artikel
174 Comprehensive survey on resource allocation for edge-computing-enabled metaverse Baidya, Tanmay

13-14 C p.
artikel
175 Conceptual and empirical comparison of dimensionality reduction algorithms (PCA, KPCA, LDA, MDS, SVD, LLE, ISOMAP, LE, ICA, t-SNE) Anowar, Farzana

13-14 C p.
artikel
176 Conjunctive and Boolean grammars: The true general case of the context-free grammars Okhotin, Alexander
2013
13-14 C p. 27-59
33 p.
artikel
177 Considerations about the efficiency and sufficiency of the utilization of the Scrum methodology: A survey for analyzing results for development teams Morandini, Marcelo

13-14 C p.
artikel
178 Content and link-structure perspective of ranking webpages: A review Ali, Fayyaz

13-14 C p.
artikel
179 Content-driven music recommendation: Evolution, state of the art, and challenges Deldjoo, Yashar

13-14 C p.
artikel
180 Context Aware Recommendation Systems: A review of the state of the art techniques Kulkarni, Saurabh

13-14 C p.
artikel
181 Conversational agents in business: A systematic literature review and future research directions Bavaresco, Rodrigo

13-14 C p.
artikel
182 Corrigendum to “Catastrophic event phenomena in communication networks: A survey” [Comput. Sci. Rev. 18 (2015) 10–45] Dabrowski, Christopher
2016
13-14 C p. 51-
1 p.
artikel
183 Crowdsourcing: A taxonomy and systematic mapping study Hosseini, Mahmood
2015
13-14 C p. 43-69
27 p.
artikel
184 Current status and key issues in image steganography: A survey Subhedar, Mansi S.
2014
13-14 C p. 95-113
19 p.
artikel
185 Current trends in consumption of multimedia content using online streaming platforms: A user-centric survey Falkowski-Gilski, Przemysław

13-14 C p.
artikel
186 Cyber-insurance survey Marotta, Angelica
2017
13-14 C p. 35-61
27 p.
artikel
187 Cyber security training for critical infrastructure protection: A literature review Chowdhury, Nabin

13-14 C p.
artikel
188 DAG-based attack and defense modeling: Don’t miss the forest for the attack trees Kordy, Barbara
2014
13-14 C p. 1-38
38 p.
artikel
189 Data Mining and Information Retrieval in the 21st century: A bibliographic review Liu, Jiaying

13-14 C p.
artikel
190 Data mining of social networks represented as graphs Nettleton, David F.
2013
13-14 C p. 1-34
34 p.
artikel
191 DDoS attacks & defense mechanisms in SDN-enabled cloud: Taxonomy, review and research challenges Chahal, Jasmeen Kaur

13-14 C p.
artikel
192 Dealing with high dimensional multi-view data: A comprehensive review of non-negative matrix factorization approaches in data mining and machine learning Soleymani, Nafiseh

13-14 C p.
artikel
193 Decentralization trends in identity management: From federated to Self-Sovereign Identity Management Systems Manimaran, Praveensankar

13-14 C p.
artikel
194 Decomposition into low-rank plus additive matrices for background/foreground separation: A review for a comparative evaluation with a large-scale dataset Bouwmans, Thierry
2017
13-14 C p. 1-71
71 p.
artikel
195 Deep anomaly detection for time series: A survey Jia, Xudong

13-14 C p.
artikel
196 Deep Learning Algorithms for Cybersecurity Applications: A Technological and Status Review Dixit, Priyanka

13-14 C p.
artikel
197 Deep learning for hyperspectral image classification: A survey Kumar, Vinod

13-14 C p.
artikel
198 Deep learning for intelligent demand response and smart grids: A comprehensive survey Boopathy, Prabadevi

13-14 C p.
artikel
199 Deep learning for unmanned aerial vehicles detection: A review Al-lQubaydhi, Nader

13-14 C p.
artikel
200 Deep Learning Methods for Multi-Species Animal Re-identification and Tracking – a Survey Ravoor, Prashanth C.

13-14 C p.
artikel
201 Deep learning models for cloud, edge, fog, and IoT computing paradigms: Survey, recent advances, and future directions Ahmad, Shahnawaz

13-14 C p.
artikel
202 Deep learning with the generative models for recommender systems: A survey Nahta, Ravi

13-14 C p.
artikel
203 Deep study on autonomous learning techniques for complex pattern recognition in interconnected information systems Amiri, Zahra

13-14 C p.
artikel
204 Defense strategies for Adversarial Machine Learning: A survey Bountakas, Panagiotis

13-14 C p.
artikel
205 Denoising and completion filters for human motion software: A survey with code Martini, Enrico

13-14 C p.
artikel
206 Detection and mitigation of DDoS attacks in SDN: A comprehensive review, research challenges and future directions Singh, Jagdeep

13-14 C p.
artikel
207 Developing future human-centered smart cities: Critical analysis of smart city security, Data management, and Ethical challenges Ahmad, Kashif

13-14 C p.
artikel
208 Development of improved whale optimization-based FCM clustering for image watermarking Soppari, Kavitha

13-14 C p.
artikel
209 DevOps and software quality: A systematic mapping Mishra, Alok

13-14 C p.
artikel
210 Digital audio steganography: Systematic review, classification, and analysis of the current state of the art AlSabhany, Ahmed A.

13-14 C p.
artikel
211 Digital image watermarking using deep learning: A survey Hosny, Khalid M.

13-14 C p.
artikel
212 Digital to quantum watermarking: A journey from past to present and into the future Dhar, Swapnaneel

13-14 C p.
artikel
213 Digital watermarking: Applicability for developing trust in medical imaging workflows state of the art review Qasim, Asaad F.
2018
13-14 C p. 45-60
artikel
214 Distributed denial of service attacks in cloud: State-of-the-art of scientific and commercial solutions Bhardwaj, Aanshi

13-14 C p.
artikel
215 Distributed virtual machine consolidation: A systematic mapping study Ashraf, Adnan
2018
13-14 C p. 118-130
artikel
216 Dynamic computation offloading for ground and flying robots: Taxonomy, state of art, and future directions Chaâri, Rihab

13-14 C p.
artikel
217 Eco-assessment software: A quantitative review involving papers and patents Spreafico, Christian

13-14 C p.
artikel
218 Edge-AI empowered Cyber-Physical Systems: A comprehensive review on performance analysis Singh, Raj Kumar Baliyar

13-14 C p.
artikel
219 Editorial Board
13-14 C p.
artikel
220 Editorial Board
13-14 C p.
artikel
221 Editorial Board
13-14 C p.
artikel
222 Editorial Board 2017
13-14 C p. IFC-
1 p.
artikel
223 Editorial Board 2018
13-14 C p. ii
artikel
224 Editorial Board 2017
13-14 C p. IFC
artikel
225 Editorial Board 2018
13-14 C p. ii
artikel
226 Editorial Board 2018
13-14 C p. ii
artikel
227 Editorial Board 2019
13-14 C p. ii
artikel
228 Editorial Board 2018
13-14 C p. ii
artikel
229 Editorial Board 2019
13-14 C p. ii
artikel
230 Editorial Board 2019
13-14 C p. ii
artikel
231 Editorial Board
13-14 C p.
artikel
232 Editorial Board
13-14 C p.
artikel
233 Editorial Board
13-14 C p.
artikel
234 Editorial Board
13-14 C p.
artikel
235 Editorial Board
13-14 C p.
artikel
236 Editorial Board
13-14 C p.
artikel
237 Editorial Board
13-14 C p.
artikel
238 Editorial Board
13-14 C p.
artikel
239 Editorial Board
13-14 C p.
artikel
240 Editorial Board
13-14 C p.
artikel
241 Editorial Board
13-14 C p.
artikel
242 Editorial Board
13-14 C p.
artikel
243 Editorial Board
13-14 C p.
artikel
244 Editorial Board
13-14 C p.
artikel
245 Editorial Board
13-14 C p.
artikel
246 Editorial Board
13-14 C p.
artikel
247 Editorial Board
13-14 C p.
artikel
248 Editorial Board
13-14 C p.
artikel
249 Editorial Board
13-14 C p.
artikel
250 Editorial Board
13-14 C p.
artikel
251 Elliptic Curve Cryptography; Applications, challenges, recent advances, and future trends: A comprehensive survey Ullah, Shamsher

13-14 C p.
artikel
252 Empowering large language models to edge intelligence: A survey of edge efficient LLMs and techniques Wang, Rui

13-14 C p.
artikel
253 Empowering multimodal analysis with visualization: A survey Wang, Jiachen

13-14 C p.
artikel
254 Energy aware optimized clustering for hierarchical routing in wireless sensor network Yadav, Rakesh Kumar

13-14 C p.
artikel
255 Energy, performance and cost efficient cloud datacentres: A survey Khan, Ayaz Ali

13-14 C p.
artikel
256 Energy price prediction using data-driven models: A decade review Lu, Hongfang

13-14 C p.
artikel
257 Ensemble learning for intrusion detection systems: A systematic mapping study and cross-benchmark evaluation Tama, Bayu Adhi

13-14 C p.
artikel
258 Evaluation of information retrieval systems using structural equation modeling Melucci, Massimo
2019
13-14 C p. 1-18
artikel
259 Event detection in online social network: Methodologies, state-of-art, and evolution Hu, Xiangyu

13-14 C p.
artikel
260 Facial expression and body gesture emotion recognition: A systematic review on the use of visual data in affective computing Leong, Sze Chit

13-14 C p.
artikel
261 Facial privacy in the digital era: A comprehensive survey on methods, evaluation, and future directions Wang, Miaomiao

13-14 C p.
artikel
262 Fault tree analysis: A survey of the state-of-the-art in modeling, analysis and tools Ruijters, Enno
2015
13-14 C p. 29-62
34 p.
artikel
263 Financial fraud detection applying data mining techniques: A comprehensive review from 2009 to 2019 Al-Hashedi, Khaled Gubran

13-14 C p.
artikel
264 Fog computing for next-generation Internet of Things: Fundamental, state-of-the-art and research challenges Hazra, Abhishek

13-14 C p.
artikel
265 From accuracy to approximation: A survey on approximate homomorphic encryption and its applications Liu, Weinan

13-14 C p.
artikel
266 From past to present: A survey of malicious URL detection techniques, datasets and code repositories Tian, Ye

13-14 C p.
artikel
267 Fundamental design aspects of UAV-enabled MEC systems: A review on models, challenges, and future opportunities Adnan, Mohd Hirzi

13-14 C p.
artikel
268 Future FANET with application and enabling techniques: Anatomization and sustainability issues Srivastava, Ashish

13-14 C p.
artikel
269 Future of cyberspace: A critical review of standard security protocols in the post-quantum era Taleby Ahvanooey, Milad

13-14 C p.
artikel
270 General classification of the authenticated encryption schemes for the CAESAR competition Abed, Farzaneh
2016
13-14 C p. 13-26
14 p.
artikel
271 Generalizing input-driven languages: Theoretical and practical benefits Mandrioli, Dino
2018
13-14 C p. 61-87
artikel
272 Getting into the mind of an “in-auction” fraud perpetrator Trevathan, Jarrod
2018
13-14 C p. 1-15
artikel
273 Graph grammars according to the type of input and manipulated data: A survey Albane, Saadia
2018
13-14 C p. 178-203
artikel
274 Graph spanners: A tutorial review Ahmed, Reyan

13-14 C p.
artikel
275 Harnessing Heterogeneous Information Networks: A systematic literature review Outemzabet, Leila

13-14 C p.
artikel
276 Hazy to hazy free: A comprehensive survey of multi-image, single-image, and CNN-based algorithms for dehazing Jackson, Jehoiada

13-14 C p.
artikel
277 Higher order mutation testing: A Systematic Literature Review Ghiduk, Ahmed S.
2017
13-14 C p. 29-48
20 p.
artikel
278 Homomorphic encryption systems statement: Trends and challenges Alaya, Bechir

13-14 C p.
artikel
279 How smart is e-tourism? A systematic review of smart tourism recommendation system applying data management Hamid, Rula A.

13-14 C p.
artikel
280 Hybridizations of evolutionary algorithms with Large Neighborhood Search Blum, Christian

13-14 C p.
artikel
281 Hyperbolic geometric graph representation learning: A survey Wang, Siman

13-14 C p.
artikel
282 I2CE3: A dedicated and separated attack chain for ransomware offenses as the most infamous cyber extortion Keshavarzi, Masoudeh

13-14 C p.
artikel
283 Image processing and artificial intelligence for apple detection and localization: A comprehensive review Azizi, Afshin

13-14 C p.
artikel
284 Improved node localization using K-means clustering for Wireless Sensor Networks El Khediri, Salim

13-14 C p.
artikel
285 Indoor environment propagation review Obeidat, H.

13-14 C p.
artikel
286 Indoor location based services challenges, requirements and usability of current solutions Basiri, Anahid
2017
13-14 C p. 1-12
12 p.
artikel
287 Indoor location identification technologies for real-time IoT-based applications: An inclusive survey Oguntala, George
2018
13-14 C p. 55-79
artikel
288 Influence decision models: From cooperative game theory to social network analysis Molinero, Xavier

13-14 C p.
artikel
289 In praise of homomorphisms Hell, Pavol

13-14 C p.
artikel
290 Insight into code clone management through refactoring: a systematic literature review Kaur, Manpreet

13-14 C p.
artikel
291 Integrating blockchain technology into the energy sector — from theory of blockchain to research and application of energy blockchain Wang, Qiang

13-14 C p.
artikel
292 Integration of SDN into UAV, edge computing, & Blockchain: A review, challenges, & future directions Modi, Tejas M.

13-14 C p.
artikel
293 Intelligent computational techniques for physical object properties discovery, detection, and prediction: A comprehensive survey Mishra, Shaili

13-14 C p.
artikel
294 Intelligent food processing: Journey from artificial neural network to deep learning Nayak, Janmenjoy

13-14 C p.
artikel
295 Intelligent retrieval and classification in three-dimensional biomedical images — A systematic mapping Bergamasco, Leila Cristina C.
2019
13-14 C p. 19-38
artikel
296 Intelligent visual analytics for food safety: A comprehensive review Zhang, Qinghui

13-14 C p.
artikel
297 Internet of everything meets the metaverse: Bridging physical and virtual worlds with blockchain Rafique, Wajid

13-14 C p.
artikel
298 Intervention scenarios and robot capabilities for support, guidance and health monitoring for the elderly Aldawsari, Saja

13-14 C p.
artikel
299 Introducing article numbering to Computer Science Review Li, Jimeng

13-14 C p.
artikel
300 ISO/IEC quality standards for AI engineering Oviedo, Jesús

13-14 C p.
artikel
301 Julia language in machine learning: Algorithms, applications, and open issues Gao, Kaifeng

13-14 C p.
artikel
302 Landscape of IoT security Schiller, Eryk

13-14 C p.
artikel
303 Leveraging Deep Learning and IoT big data analytics to support the smart cities development: Review and future directions Atitallah, Safa Ben

13-14 C p.
artikel
304 Leveraging 6G, extended reality, and IoT big data analytics for healthcare: A review Ahmad, Hafiz Farooq

13-14 C p.
artikel
305 Localization schemes for Underwater Acoustic Sensor Networks - A Review Toky, Archana

13-14 C p.
artikel
306 Location management in mobile network: A survey Mukherjee, Anwesha
2016
13-14 C p. 1-14
14 p.
artikel
307 Logo and seal based administrative document image retrieval: A survey Alaei, Alireza
2016
13-14 C p. 47-63
17 p.
artikel
308 Low-light multimodal object detection: A survey Li, Gang

13-14 C p.
artikel
309 Machine learning algorithms for social media analysis: A survey T.K., Balaji

13-14 C p.
artikel
310 Machine Learning and Deep Learning in smart manufacturing: The Smart Grid paradigm Kotsiopoulos, Thanasis

13-14 C p.
artikel
311 Machine learning and multi-agent systems in oil and gas industry applications: A survey Hanga, Khadijah M.

13-14 C p.
artikel
312 Machine learning techniques for hate speech classification of twitter data: State-of-the-art, future challenges and research directions Ayo, Femi Emmanuel

13-14 C p.
artikel
313 Machine learning through the lens of e-commerce initiatives: An up-to-date systematic literature review Micol Policarpo, Lucas

13-14 C p.
artikel
314 Malicious application detection in android — A systematic literature review Sharma, Tejpal

13-14 C p.
artikel
315 Maria Serna and her years in Patras Spirakis, Paul G.

13-14 C p.
artikel
316 Maria Serna in Barcelona Àlvarez, Carme

13-14 C p.
artikel
317 Maria Serna’s contributions to adversarial queuing theory Blesa, Maria J.

13-14 C p.
artikel
318 Maritime search and rescue missions with aerial images: A survey Martinez-Esteso, Juan P.

13-14 C p.
artikel
319 Maximal cliques summarization: Principles, problem classification, and algorithmic approaches D’Elia, Marco

13-14 C p.
artikel
320 Maximum cliques in graphs with small intersection number and random intersection graphs Nikoletseas, Sotiris E.

13-14 C p.
artikel
321 mHealth Authentication Approach Based 3D Touchscreen and Microphone Sensors for Real-Time Remote Healthcare Monitoring System: Comprehensive Review, Open Issues and Methodological Aspects Shuwandy, Moceheb Lazam

13-14 C p.
artikel
322 Mobile robot localization: Current challenges and future prospective Ullah, Inam

13-14 C p.
artikel
323 Model-based testing using UML activity diagrams: A systematic mapping study Ahmad, Tanwir
2019
13-14 C p. 98-112
artikel
324 Modelling web-service uncertainty: The angel/daemon approach Gabarro, Joaquim

13-14 C p.
artikel
325 More than a framework: Sketching out technical enablers for natural language-based source code generation Yang, Chen

13-14 C p.
artikel
326 Motif discovery in networks: A survey Yu, Shuo

13-14 C p.
artikel
327 Moving objects detection with a moving camera: A comprehensive review Chapel, Marie-Neige

13-14 C p.
artikel
328 Multidisciplinary Pattern Recognition applications: A review Paolanti, Marina

13-14 C p.
artikel
329 Multilayer network simplification: Approaches, models and methods Interdonato, Roberto

13-14 C p.
artikel
330 Multiple clusterings: Recent advances and perspectives Yu, Guoxian

13-14 C p.
artikel
331 Named Data Networking: A survey Saxena, Divya
2016
13-14 C p. 15-55
41 p.
artikel
332 Nature-inspired algorithms for Wireless Sensor Networks: A comprehensive survey Singh, Abhilash

13-14 C p.
artikel
333 Near infrared face recognition: A literature survey Farokhi, Sajad
2016
13-14 C p. 1-17
17 p.
artikel
334 Negative selection in anomaly detection—A survey Saurabh, Praneet

13-14 C p.
artikel
335 Network embedding: Taxonomies, frameworks and applications Hou, Mingliang

13-14 C p.
artikel
336 Network resource management mechanisms in SDN enabled WSNs: A comprehensive review Tyagi, Vikas

13-14 C p.
artikel
337 Neural Natural Language Processing for unstructured data in electronic health records: A review Li, Irene

13-14 C p.
artikel
338 Neurological and physiological measures to evaluate the usability and user-experience (UX) of information systems: A systematic literature review Zaki, Tarannum

13-14 C p.
artikel
339 New trends in influence maximization models Azaouzi, Mehdi

13-14 C p.
artikel
340 New trends on moving object detection in video images captured by a moving camera: A survey Yazdi, Mehran
2018
13-14 C p. 157-177
artikel
341 NLP-based techniques for Cyber Threat Intelligence Arazzi, Marco

13-14 C p.
artikel
342 [No title] Bálek, Martin
2013
13-14 C p. 35-46
12 p.
artikel
343 [No title] Zuhair Mahmoud, Khaled
2013
13-14 C p. 31-34
4 p.
artikel
344 [No title] Díaz, Josep

13-14 C p.
artikel
345 Offline recognition of handwritten Indic scripts: A state-of-the-art survey and future perspectives Sharma, Reya

13-14 C p.
artikel
346 Offline Script Identification from multilingual Indic-script documents: A state-of-the-art Singh, Pawan Kumar
2015
13-14 C p. 1-28
28 p.
artikel
347 On cloud security requirements, threats, vulnerabilities and countermeasures: A survey Kumar, Rakesh
2019
13-14 C p. 1-48
artikel
348 On the role and the importance of features for background modeling and foreground detection Bouwmans, Thierry
2018
13-14 C p. 26-91
artikel
349 Ontology learning: Grand tour and challenges Khadir, Ahlem Chérifa

13-14 C p.
artikel
350 Open-source IP cores for space: A processor-level perspective on soft errors in the RISC-V era Di Mascio, Stefano

13-14 C p.
artikel
351 Optimized traffic engineering in Software Defined Wireless Network based IoT (SDWN-IoT): State-of-the-art, research opportunities and challenges Kumar, Rohit

13-14 C p.
artikel
352 Parameterized algorithms on geometric intersection graphs Xue, Jie

13-14 C p.
artikel
353 Parameterized analysis and crossing minimization problems Zehavi, Meirav

13-14 C p.
artikel
354 Parametric survey on cross-layer designs for wireless sensor networks Sah, Dinesh Kumar
2018
13-14 C p. 112-134
artikel
355 PCG signals for biometric authentication systems: An in-depth review El-Dahshan, El-Sayed A.

13-14 C p.
artikel
356 Polynomial property testing Gishboliner, Lior

13-14 C p.
artikel
357 Practical algorithms for MSO model-checking on tree-decomposable graphs Langer, Alexander
2014
13-14 C p. 39-74
36 p.
artikel
358 Prediction methods and applications in the science of science: A survey Hou, Jie

13-14 C p.
artikel
359 Prediction of Atrial Fibrillation using artificial intelligence on Electrocardiograms: A systematic review Matias, Igor

13-14 C p.
artikel
360 Preface Díaz, Josep

13-14 C p.
artikel
361 Privacy and verifiability in voting systems: Methods, developments and trends Jonker, Hugo
2013
13-14 C p. 1-30
30 p.
artikel
362 Privacy issues in intrusion detection systems: A taxonomy, survey and future directions Niksefat, Salman
2017
13-14 C p. 69-78
10 p.
artikel
363 Privacy preserving publication of relational and transaction data: Survey on the anonymization of patient data Puri, Vartika
2019
13-14 C p. 45-61
artikel
364 Private set intersection: A systematic literature review Morales, Daniel

13-14 C p.
artikel
365 Progress in context-aware recommender systems — An overview Raza, Shaina
2019
13-14 C p. 84-97
artikel
366 Publication trends in gamification: A systematic mapping study Kasurinen, Jussi
2018
13-14 C p. 33-44
artikel
367 Publisher’s Note Faez, Telli
2017
13-14 C p. 31
artikel
368 Quantum secure authentication and key agreement protocols for IoT-enabled applications: A comprehensive survey and open challenges Babu, Ponnuru Raveendra

13-14 C p.
artikel
369 Quantum walk and its application domains: A systematic review Kadian, Karuna

13-14 C p.
artikel
370 Real-time detection of shill bidding in online auctions: A literature review Majadi, Nazia
2017
13-14 C p. 1-18
18 p.
artikel
371 Real-time 3D reconstruction techniques applied in dynamic scenes: A systematic literature review Ingale, Anupama K.

13-14 C p.
artikel
372 Recent advances in anomaly detection in Internet of Things: Status, challenges, and perspectives Adhikari, Deepak

13-14 C p.
artikel
373 Recent Named Entity Recognition and Classification techniques: A systematic review Goyal, Archana
2018
13-14 C p. 21-43
artikel
374 Relational intelligence recognition in online social networks — A survey Zhang, Ji

13-14 C p.
artikel
375 Remarks on some misconceptions about unequal probability sampling without replacement Tillé, Yves

13-14 C p.
artikel
376 Reproducibility, Replicability and Repeatability: A survey of reproducible research with a focus on high performance computing Antunes, Benjamin

13-14 C p.
artikel
377 Research communities in cyber security: A comprehensive literature review Katsikeas, Sotirios

13-14 C p.
artikel
378 Research communities in cyber security vulnerability assessments: A comprehensive literature review Heiding, Fredrik

13-14 C p.
artikel
379 Resilience of deep learning applications: A systematic literature review of analysis and hardening techniques Bolchini, Cristiana

13-14 C p.
artikel
380 Review of Distributed Quantum Computing: From single QPU to High Performance Quantum Computing Barral, David

13-14 C p.
artikel
381 Review of the use of human senses and capabilities in cryptography Halunen, Kimmo

13-14 C p.
artikel
382 Revolutionizing textual data insights: A comprehensive review of the dual relationship between transformers and clustering in textual data analysis Aghayengejeh, Nazila Pourhaji

13-14 C p.
artikel
383 Robust defense mechanisms for protecting Wireless Sensor Networks from Denial-of-Service Threats, A comprehensive in-depth analysis Osamy, Walid

13-14 C p.
artikel
384 Role of human physiology and facial biomechanics towards building robust deepfake detectors: A comprehensive survey and analysis Chakraborty, Rajat

13-14 C p.
artikel
385 Role of machine learning in medical research: A survey Garg, Arunim

13-14 C p.
artikel
386 Routing optimization strategies in data center networks: A survey Xu, Bin

13-14 C p.
artikel
387 Sand cat swarm optimization: A comprehensive review of algorithmic advances, structural enhancements, and engineering applications Hosseinzadeh, Mehdi

13-14 C p.
artikel
388 Scenario analysis, from BigData to black swan Batrouni, Marwan
2018
13-14 C p. 131-139
artikel
389 Scheduling in distributed systems: A cloud computing perspective Bittencourt, Luiz F.
2018
13-14 C p. 31-54
artikel
390 Science of Scientific Team Science: A survey Yu, Shuo
2019
13-14 C p. 72-83
artikel
391 Secret sharing: A comprehensive survey, taxonomy and applications Chattopadhyay, Arup Kumar

13-14 C p.
artikel
392 Secure and privacy-preserving crowdsensing using smart contracts: Issues and solutions Perez, Alfredo J.

13-14 C p.
artikel
393 Secure storage—Confidentiality and authentication Benadjila, Ryad

13-14 C p.
artikel
394 Securing microservices and microservice architectures: A systematic mapping study Hannousse, Abdelhakim

13-14 C p.
artikel
395 Securing Tomorrow of Next-Generation Technologies with Biometrics, State-of-The-Art Techniques, Open Challenges, and Future Research Directions Adil, Muhammad

13-14 C p.
artikel
396 Security and privacy aspects in MapReduce on clouds: A survey Derbeko, Philip
2016
13-14 C p. 1-28
28 p.
artikel
397 Security in fog computing: A systematic review on issues, challenges and solutions Rezapour, Ronita

13-14 C p.
artikel
398 Security of Power Line Communication systems: Issues, limitations and existing solutions Yaacoub, Jean Paul A.

13-14 C p.
artikel
399 Semantic Web Services testing: A Systematic Mapping study de Souza Neto, João B.
2018
13-14 C p. 140-156
artikel
400 Server placement in mobile cloud computing: A comprehensive survey for edge computing, fog computing and cloudlet Asghari, Ali

13-14 C p.
artikel
401 Smart Farming in Europe Moysiadis, Vasileios

13-14 C p.
artikel
402 Smart grid communication and information technologies in the perspective of Industry 4.0: Opportunities and challenges Faheem, M.
2018
13-14 C p. 1-30
artikel
403 Social computing for software engineering: A mapping study Ardini, Amalia
2014
13-14 C p. 75-93
19 p.
artikel
404 Software as storytelling: A systematic literature review Ciancarini, Paolo

13-14 C p.
artikel
405 Some algorithms under non-parametric framework versus an unsupervised approach Ray, Bimal Kumar

13-14 C p.
artikel
406 Some results of Maria Serna on strategic games: Complexity of equilibria and models Àlvarez, Carme

13-14 C p.
artikel
407 Some Studies on Performability Analysis of Safety Critical Systems Ahamad, Shakeel

13-14 C p.
artikel
408 Sorting on graphs by adjacent swaps using permutation groups Kim, Dohan
2016
13-14 C p. 89-105
17 p.
artikel
409 State of the art on quality control for data streams: A systematic literature review Mirzaie, Mostafa

13-14 C p.
artikel
410 Storage, partitioning, indexing and retrieval in Big RDF frameworks: A survey Chawla, Tanvi

13-14 C p.
artikel
411 Strategies based on various aspects of clustering in wireless sensor networks using classical, optimization and machine learning techniques: Review, taxonomy, research findings, challenges and future directions Amutha, J.

13-14 C p.
artikel
412 Studying fake news spreading, polarisation dynamics, and manipulation by bots: A tale of networks and language Ruffo, Giancarlo

13-14 C p.
artikel
413 Successors of PEGASIS protocol: A comprehensive survey Khedr, Ahmed M.

13-14 C p.
artikel
414 Summarization of legal documents: Where are we now and the way forward Jain, Deepali

13-14 C p.
artikel
415 Survey on 3D face reconstruction from uncalibrated images Morales, Araceli

13-14 C p.
artikel
416 Survey on hardware implementation of random number generators on FPGA: Theory and experimental analyses Bakiri, Mohammed
2018
13-14 C p. 135-153
artikel
417 Survey on Visualization and Visual Analytics pipeline-based models: Conceptual aspects, comparative studies and challenges Ltifi, Hela

13-14 C p.
artikel
418 Sustainable computing across datacenters: A review of enabling models and techniques Zakarya, Muhammad

13-14 C p.
artikel
419 Synthetic data generation: State of the art in health care domain Murtaza, Hajra

13-14 C p.
artikel
420 Systematic analysis and review of path optimization techniques in WSN with mobile sink Kamble, Aparna Ashok

13-14 C p.
artikel
421 Systematic analysis and review of stock market prediction techniques Gandhmal, Dattatray P.

13-14 C p.
artikel
422 Systematic literature review: Quantum machine learning and its applications Peral-García, David

13-14 C p.
artikel
423 Systematic review on privacy categorisation Inverardi, Paola

13-14 C p.
artikel
424 Systematic review on weapon detection in surveillance footage through deep learning Santos, Tomás

13-14 C p.
artikel
425 System security assurance: A systematic literature review Shukla, Ankur

13-14 C p.
artikel
426 Task scheduling in fog environment — Challenges, tools & methodologies: A review Jalali Khalil Abadi, Zahra

13-14 C p.
artikel
427 Taxonomy, state-of-the-art, challenges and applications of visual understanding: A review Khanday, Nadeem Yousuf

13-14 C p.
artikel
428 The Beauty and the Beast: A survey on process algebras and cybersecurity Costa, Gabriele

13-14 C p.
artikel
429 The computing continuum: Past, present, and future Bittencourt, Luiz F.

13-14 C p.
artikel
430 The Critical Node Detection Problem in networks: A survey Lalou, Mohammed
2018
13-14 C p. 92-117
artikel
431 The evolution of sentiment analysis—A review of research topics, venues, and top cited papers Mäntylä, Mika V.
2018
13-14 C p. 16-32
artikel
432 The future of computing paradigms for medical and emergency applications Alekseeva, Daria

13-14 C p.
artikel
433 The importance of selecting clustering parameters in VANETs: A survey Kaur, Ravneet

13-14 C p.
artikel
434 The interaction design of 3D virtual humans: A survey Wang, Xueyang

13-14 C p.
artikel
435 The journey of graph kernels through two decades Ghosh, Swarnendu
2018
13-14 C p. 88-111
artikel
436 The Lonely Runner Conjecture turns 60 Perarnau, Guillem

13-14 C p.
artikel
437 The ML-based sensor data deception targeting cyber–physical systems: A review Kaloudi, Nektaria

13-14 C p.
artikel
438 Towards accessible chart visualizations for the non-visuals: Research, applications and gaps Singh, Mandhatya

13-14 C p.
artikel
439 Towards data augmentation in graph neural network: An overview and evaluation Adjeisah, Michael

13-14 C p.
artikel
440 Towards quantum computing based community detection Akbar, Sana

13-14 C p.
artikel
441 Towards Resilient Method: An exhaustive survey of fault tolerance methods in the cloud computing environment Shahid, Muhammad Asim

13-14 C p.
artikel
442 Traditional and recent approaches in background modeling for foreground detection: An overview Bouwmans, Thierry
2014
13-14 C p. 31-66
36 p.
artikel
443 Traffic load balancing in data center networks: A comprehensive survey Liu, Guisheng

13-14 C p.
artikel
444 Transaction scheduling protocols for controlling priority inversion: A review Pandey, Sarvesh

13-14 C p.
artikel
445 Transformers in speech processing: Overcoming challenges and paving the future Latif, Siddique

13-14 C p.
artikel
446 Tutorial and critical analysis of phishing websites methods Mohammad, Rami M.
2015
13-14 C p. 1-24
24 p.
artikel
447 Twenty-two years since revealing cross-site scripting attacks: A systematic mapping and a comprehensive survey Hannousse, Abdelhakim

13-14 C p.
artikel
448 Understandable Big Data: A survey Kacfah Emani, Cheikh
2015
13-14 C p. 70-81
12 p.
artikel
449 Unleashing the prospective of blockchain-federated learning fusion for IoT security: A comprehensive review Gupta, Mansi

13-14 C p.
artikel
450 Unsupervised affinity learning based on manifold analysis for image retrieval: A survey Pereira-Ferrero, V.H.

13-14 C p.
artikel
451 Usability, security and trust in password managers: A quest for user-centric properties and features Chaudhary, Sunil
2019
13-14 C p. 69-90
artikel
452 Virtual Customer Assistants in finance: From state of the art and practices to design guidelines Iovine, Andrea

13-14 C p.
artikel
453 Visibility enhancement and dehazing: Research contribution challenges and direction Singh, Mohit

13-14 C p.
artikel
454 Vision-based approaches towards person identification using gait Khan, Muhammad Hassan

13-14 C p.
artikel
455 Visual language integration: A survey and open challenges Park, Sang-Min

13-14 C p.
artikel
456 Visual SLAM for underwater vehicles: A survey Zhang, Song

13-14 C p.
artikel
457 Vulnerability retrospection of security solutions for software-defined Cyber–Physical System against DDoS and IoT-DDoS attacks Snehi, Manish

13-14 C p.
artikel
458 Web service adaptation: A decade’s overview Mezni, Haithem

13-14 C p.
artikel
459 When machine learning meets medical world: Current status and future challenges Smiti, Abir

13-14 C p.
artikel
460 Where is the research on connecting game ​ worlds?—A systematic mapping study Parkkila, Janne
2015
13-14 C p. 46-58
13 p.
artikel
461 XML data manipulation in conventional and temporal XML databases: A survey Brahmia, Zouhaier

13-14 C p.
artikel
                             461 gevonden resultaten
 
 Koninklijke Bibliotheek - Nationale Bibliotheek van Nederland