Digital Library
Close Browse articles from a journal
     Journal description
       All volumes of the corresponding journal
         All issues of the corresponding volume
                                       All articles of the corresponding issues
 
                             243 results found
no title author magazine year volume issue page(s) type
1 A brief survey on probability distribution approximation Melucci, Massimo
2019
13-14 C p. 91-97
article
2 A comparative review of Urdu stemmers: Approaches and challenges Jabbar, Abdul

13-14 C p.
article
3 A comparative study on popular MAC protocols for mixed Wireless Sensor Networks: From implementation viewpoint Maitra, Tanmoy
2016
13-14 C p. 107-134
28 p.
article
4 A comprehensive and systematic look up into deep learning based object detection techniques: A review Sharma, Vipul

13-14 C p.
article
5 A comprehensive study of simulation frameworks and research directions in fog computing Gill, Monika

13-14 C p.
article
6 A comprehensive survey and analysis of generative models in machine learning GM, Harshvardhan

13-14 C p.
article
7 A comprehensive survey of service function chain provisioning approaches in SDN and NFV architecture Kaur, Karamjeet

13-14 C p.
article
8 A comprehensive survey on the Multiple Traveling Salesman Problem: Applications, approaches and taxonomy Cheikhrouhou, Omar

13-14 C p.
article
9 A comprehensive taxonomy of schemes to detect and mitigate blackhole attack and its variants in MANETs Khanna, Nitin
2019
13-14 C p. 24-44
article
10 A critical overview of outlier detection methods Smiti, Abir

13-14 C p.
article
11 Adaptive gamification in Collaborative systems, a systematic mapping study Dalponte Ayastuy, María

13-14 C p.
article
12 Adaptive user interfaces and universal usability through plasticity of user interface design Miraz, Mahdi H.

13-14 C p.
article
13 Advancement from neural networks to deep learning in software effort estimation: Perspective of two decades Suresh Kumar, P.

13-14 C p.
article
14 Aeronautical communication transition from analog to digital data: A network security survey Ben Mahmoud, Mohamed Slim
2014
13-14 C p. 1-29
29 p.
article
15 Affective recommender systems in the educational field. A systematic literature review Salazar, Camilo

13-14 C p.
article
16 Agent Based Modelling and Simulation tools: A review of the state-of-art software Abar, Sameera
2017
13-14 C p. 13-33
21 p.
article
17 Aiming at methods’ wider adoption: Applicability determinants and metrics Leszczyna, Rafał

13-14 C p.
article
18 An annotated bibliography on 1-planarity Kobourov, Stephen G.
2017
13-14 C p. 49-67
19 p.
article
19 Anonymity on blockchain based e-cash protocols—A survey Andola, Nitish

13-14 C p.
article
20 An overview of self-adaptive technologies within virtual reality training Vaughan, Neil
2016
13-14 C p. 65-87
23 p.
article
21 Applicability of Blockchain smart contracts in securing Internet and IoT: A systematic literature review Lone, Auqib Hamid

13-14 C p.
article
22 Applicability of mobile contact tracing in fighting pandemic (COVID-19): Issues, challenges and solutions Dar, Aaqib Bashir

13-14 C p.
article
23 Application of deep learning for retinal image analysis: A review Badar, Maryam

13-14 C p.
article
24 Approximation and online algorithms for multidimensional bin packing: A survey Christensen, Henrik I.
2017
13-14 C p. 63-79
17 p.
article
25 A PRISMA-compliant systematic review and analysis on color image encryption using DNA properties Sokouti, Massoud
2018
13-14 C p. 14-20
article
26 Arabic Machine Translation: A survey of the latest trends and challenges Ameur, Mohamed Seghir Hadj

13-14 C p.
article
27 A recent review of conventional vs. automated cybersecurity anti-phishing techniques Qabajeh, Issa
2018
13-14 C p. 44-55
article
28 A review of attack graph and attack tree visual syntax in cyber security Lallie, Harjinder Singh

13-14 C p.
article
29 A review of using object-orientation properties of C++ for designing expert system in strategic planning Ahmadi, Mohsen

13-14 C p.
article
30 A state-of-the-art review of FMEA/FMECA including patents Spreafico, Christian
2017
13-14 C p. 19-28
10 p.
article
31 A still simpler way of introducing interior-point method for linear programming Mehlhorn, Kurt
2016
13-14 C p. 1-11
11 p.
article
32 A survey of active learning in collaborative filtering recommender systems Elahi, Mehdi
2016
13-14 C p. 29-50
22 p.
article
33 A survey of android application and malware hardening Sihag, Vikas

13-14 C p.
article
34 A survey of data center consolidation in cloud computing systems Helali, Leila

13-14 C p.
article
35 A survey of identifier–locator split addressing architectures Komu, Miika
2015
13-14 C p. 25-42
18 p.
article
36 A survey of Konkani NLP resources Rajan, Annie

13-14 C p.
article
37 A survey of live Virtual Machine migration techniques Le, Tuan

13-14 C p.
article
38 A survey of low-latency transmission strategies in software defined networking Yan, Binghao

13-14 C p.
article
39 A survey of malware detection in Android apps: Recommendations and perspectives for future research Razgallah, Asma

13-14 C p.
article
40 A survey of memory management techniques in virtualized systems Mishra, Debadatta
2018
13-14 C p. 56-73
article
41 A survey of multidisciplinary domains contributing to affective computing Arya, Resham

13-14 C p.
article
42 A survey of neighborhood construction algorithms for clustering and classifying data points Pourbahrami, Shahin

13-14 C p.
article
43 A survey of safety and trustworthiness of deep neural networks: Verification, testing, adversarial attack and defence, and interpretability Huang, Xiaowei

13-14 C p.
article
44 A survey of the modified Moran process and evolutionary graph theory Díaz, Josep

13-14 C p.
article
45 A survey of timed automata for the development of real-time systems Waez, Md Tawhid Bin
2013
13-14 C p. 1-26
26 p.
article
46 A survey on deep learning and its applications Dong, Shi

13-14 C p.
article
47 A survey on design and implementation of protected searchable data in the cloud Dowsley, Rafael
2017
13-14 C p. 17-30
article
48 A survey on essential components of a self-sovereign identity Mühle, Alexander
2018
13-14 C p. 80-86
article
49 A Survey on malware analysis and mitigation techniques Sibi Chakkaravarthy, S.
2019
13-14 C p. 1-23
article
50 A survey on mobile affective computing Politou, Eugenia
2017
13-14 C p. 79-100
22 p.
article
51 A survey on parallel and distributed multi-agent systems for high performance computing simulations Rousset, Alban
2016
13-14 C p. 27-46
20 p.
article
52 A survey on privacy and security of Internet of Things Ogonji, Mark Mbock

13-14 C p.
article
53 A survey on privacy in decentralized online social networks De Salve, Andrea
2018
13-14 C p. 154-176
article
54 A Survey on quantum computing technology Gyongyosi, Laszlo
2019
13-14 C p. 51-71
article
55 A survey on semi-structured web data manipulations by non-expert users Tekli, Gilbert

13-14 C p.
article
56 A survey on socio-semantic information retrieval Schoefegger, Karin
2013
13-14 C p. 25-46
22 p.
article
57 A survey on the usability and practical applications of Graphical Security Models Hong, Jin B.
2017
13-14 C p. 1-16
article
58 A survey on tree matching and XML retrieval Tahraoui, Mohammed Amin
2013
13-14 C p. 1-23
23 p.
article
59 A systematic literature review on prototyping with Arduino: Applications, challenges, advantages, and limitations Kondaveeti, Hari Kishan

13-14 C p.
article
60 A systematic mapping review of context-aware analysis and its approach to mobile learning and ubiquitous learning processes Vallejo-Correa, Paola

13-14 C p.
article
61 A systematic mapping study of API usability evaluation methods Rauf, Irum
2019
13-14 C p. 49-68
article
62 A systematic mapping study of clone visualization Hammad, Muhammad

13-14 C p.
article
63 A systematic review on Deep Learning approaches for IoT security Aversano, Lerina

13-14 C p.
article
64 A taxonomy and survey of attacks against machine learning Pitropakis, Nikolaos

13-14 C p.
article
65 Attention to news and its dissemination on Twitter: A survey Orellana-Rodriguez, Claudia
2018
13-14 C p. 74-94
article
66 Automated knowledge base management: A survey Martinez-Gil, Jorge
2015
13-14 C p. 1-9
9 p.
article
67 Automatic hand gesture recognition using hybrid meta-heuristic-based feature selection and classification with Dynamic Time Warping Kowdiki, Manisha

13-14 C p.
article
68 Background subtraction in real applications: Challenges, current models and future directions Garcia-Garcia, Belmar

13-14 C p.
article
69 Big data and IoT-based applications in smart environments: A systematic review Hajjaji, Yosra

13-14 C p.
article
70 Big networks: A survey Bedru, Hayat Dino

13-14 C p.
article
71 Blockchain technology in the energy sector: From basic research to real world applications Wang, Qiang

13-14 C p.
article
72 Caching methodologies in Content centric networking (CCN): A survey Lal, Nidhi
2019
13-14 C p. 39-50
article
73 Catastrophic event phenomena in communication networks: A survey Dabrowski, Christopher
2015
13-14 C p. 10-45
36 p.
article
74 Change point detection in social networks—Critical review with experiments Kendrick, Lucy
2018
13-14 C p. 1-13
article
75 Characterizing DDoS attacks and flash events: Review, research gaps and future directions Behal, Sunny
2017
13-14 C p. 101-114
14 p.
article
76 Citations, research topics and active countries in software engineering: A bibliometrics study Garousi, Vahid
2016
13-14 C p. 56-77
22 p.
article
77 Cluster ensembles: A survey of approaches with recent extensions and applications Boongoen, Tossapon
2018
13-14 C p. 1-25
article
78 Clustering protocols in wireless sensor network: A survey, classification, issues, and future directions Rawat, Piyush

13-14 C p.
article
79 Combining UML and ontology: An exploratory survey Mejhed Mkhinini, Meriem

13-14 C p.
article
80 Community detection in node-attributed social networks: A survey Chunaev, Petr

13-14 C p.
article
81 Compactors for parameterized counting problems Thilikos, Dimitrios M.

13-14 C p.
article
82 Comparative analysis of Android and iOS from security viewpoint Garg, Shivi

13-14 C p.
article
83 Comparative analysis on cross-modal information retrieval: A review Kaur, Parminder

13-14 C p.
article
84 Comparative study for 8 computational intelligence algorithms for human identification Abdulrahman, Shaymaa Adnan

13-14 C p.
article
85 Conceptual and empirical comparison of dimensionality reduction algorithms (PCA, KPCA, LDA, MDS, SVD, LLE, ISOMAP, LE, ICA, t-SNE) Anowar, Farzana

13-14 C p.
article
86 Conjunctive and Boolean grammars: The true general case of the context-free grammars Okhotin, Alexander
2013
13-14 C p. 27-59
33 p.
article
87 Considerations about the efficiency and sufficiency of the utilization of the Scrum methodology: A survey for analyzing results for development teams Morandini, Marcelo

13-14 C p.
article
88 Content and link-structure perspective of ranking webpages: A review Ali, Fayyaz

13-14 C p.
article
89 Context Aware Recommendation Systems: A review of the state of the art techniques Kulkarni, Saurabh

13-14 C p.
article
90 Conversational agents in business: A systematic literature review and future research directions Bavaresco, Rodrigo

13-14 C p.
article
91 Corrigendum to “Catastrophic event phenomena in communication networks: A survey” [Comput. Sci. Rev. 18 (2015) 10–45] Dabrowski, Christopher
2016
13-14 C p. 51-
1 p.
article
92 Crowdsourcing: A taxonomy and systematic mapping study Hosseini, Mahmood
2015
13-14 C p. 43-69
27 p.
article
93 Current status and key issues in image steganography: A survey Subhedar, Mansi S.
2014
13-14 C p. 95-113
19 p.
article
94 Current trends in consumption of multimedia content using online streaming platforms: A user-centric survey Falkowski-Gilski, Przemysław

13-14 C p.
article
95 Cyber-insurance survey Marotta, Angelica
2017
13-14 C p. 35-61
27 p.
article
96 Cyber security training for critical infrastructure protection: A literature review Chowdhury, Nabin

13-14 C p.
article
97 DAG-based attack and defense modeling: Don’t miss the forest for the attack trees Kordy, Barbara
2014
13-14 C p. 1-38
38 p.
article
98 Data Mining and Information Retrieval in the 21st century: A bibliographic review Liu, Jiaying

13-14 C p.
article
99 Data mining of social networks represented as graphs Nettleton, David F.
2013
13-14 C p. 1-34
34 p.
article
100 Decomposition into low-rank plus additive matrices for background/foreground separation: A review for a comparative evaluation with a large-scale dataset Bouwmans, Thierry
2017
13-14 C p. 1-71
71 p.
article
101 Deep Learning Algorithms for Cybersecurity Applications: A Technological and Status Review Dixit, Priyanka

13-14 C p.
article
102 Deep Learning Methods for Multi-Species Animal Re-identification and Tracking – a Survey Ravoor, Prashanth C.

13-14 C p.
article
103 Detection and mitigation of DDoS attacks in SDN: A comprehensive review, research challenges and future directions Singh, Jagdeep

13-14 C p.
article
104 Development of improved whale optimization-based FCM clustering for image watermarking Soppari, Kavitha

13-14 C p.
article
105 DevOps and software quality: A systematic mapping Mishra, Alok

13-14 C p.
article
106 Digital audio steganography: Systematic review, classification, and analysis of the current state of the art AlSabhany, Ahmed A.

13-14 C p.
article
107 Digital watermarking: Applicability for developing trust in medical imaging workflows state of the art review Qasim, Asaad F.
2018
13-14 C p. 45-60
article
108 Distributed denial of service attacks in cloud: State-of-the-art of scientific and commercial solutions Bhardwaj, Aanshi

13-14 C p.
article
109 Distributed virtual machine consolidation: A systematic mapping study Ashraf, Adnan
2018
13-14 C p. 118-130
article
110 Eco-assessment software: A quantitative review involving papers and patents Spreafico, Christian

13-14 C p.
article
111 Editorial Board 2018
13-14 C p. ii
article
112 Editorial Board 2019
13-14 C p. ii
article
113 Editorial Board 2018
13-14 C p. ii
article
114 Editorial Board 2019
13-14 C p. ii
article
115 Editorial Board 2019
13-14 C p. ii
article
116 Editorial Board
13-14 C p.
article
117 Editorial Board
13-14 C p.
article
118 Editorial Board 2017
13-14 C p. IFC-
1 p.
article
119 Editorial Board 2018
13-14 C p. ii
article
120 Editorial Board 2017
13-14 C p. IFC
article
121 Editorial Board 2018
13-14 C p. ii
article
122 Editorial Board
13-14 C p.
article
123 Editorial Board
13-14 C p.
article
124 Editorial Board
13-14 C p.
article
125 Editorial Board
13-14 C p.
article
126 Editorial Board
13-14 C p.
article
127 Energy, performance and cost efficient cloud datacentres: A survey Khan, Ayaz Ali

13-14 C p.
article
128 Energy price prediction using data-driven models: A decade review Lu, Hongfang

13-14 C p.
article
129 Ensemble learning for intrusion detection systems: A systematic mapping study and cross-benchmark evaluation Tama, Bayu Adhi

13-14 C p.
article
130 Evaluation of information retrieval systems using structural equation modeling Melucci, Massimo
2019
13-14 C p. 1-18
article
131 Fault tree analysis: A survey of the state-of-the-art in modeling, analysis and tools Ruijters, Enno
2015
13-14 C p. 29-62
34 p.
article
132 Financial fraud detection applying data mining techniques: A comprehensive review from 2009 to 2019 Al-Hashedi, Khaled Gubran

13-14 C p.
article
133 Future FANET with application and enabling techniques: Anatomization and sustainability issues Srivastava, Ashish

13-14 C p.
article
134 General classification of the authenticated encryption schemes for the CAESAR competition Abed, Farzaneh
2016
13-14 C p. 13-26
14 p.
article
135 Generalizing input-driven languages: Theoretical and practical benefits Mandrioli, Dino
2018
13-14 C p. 61-87
article
136 Getting into the mind of an “in-auction” fraud perpetrator Trevathan, Jarrod
2018
13-14 C p. 1-15
article
137 Graph grammars according to the type of input and manipulated data: A survey Albane, Saadia
2018
13-14 C p. 178-203
article
138 Graph spanners: A tutorial review Ahmed, Reyan

13-14 C p.
article
139 Higher order mutation testing: A Systematic Literature Review Ghiduk, Ahmed S.
2017
13-14 C p. 29-48
20 p.
article
140 Homomorphic encryption systems statement: Trends and challenges Alaya, Bechir

13-14 C p.
article
141 How smart is e-tourism? A systematic review of smart tourism recommendation system applying data management Hamid, Rula A.

13-14 C p.
article
142 I2CE3: A dedicated and separated attack chain for ransomware offenses as the most infamous cyber extortion Keshavarzi, Masoudeh

13-14 C p.
article
143 Improved node localization using K-means clustering for Wireless Sensor Networks El Khediri, Salim

13-14 C p.
article
144 Indoor environment propagation review Obeidat, H.

13-14 C p.
article
145 Indoor location based services challenges, requirements and usability of current solutions Basiri, Anahid
2017
13-14 C p. 1-12
12 p.
article
146 Indoor location identification technologies for real-time IoT-based applications: An inclusive survey Oguntala, George
2018
13-14 C p. 55-79
article
147 Influence decision models: From cooperative game theory to social network analysis Molinero, Xavier

13-14 C p.
article
148 In praise of homomorphisms Hell, Pavol

13-14 C p.
article
149 Integrating blockchain technology into the energy sector — from theory of blockchain to research and application of energy blockchain Wang, Qiang

13-14 C p.
article
150 Intelligent food processing: Journey from artificial neural network to deep learning Nayak, Janmenjoy

13-14 C p.
article
151 Intelligent retrieval and classification in three-dimensional biomedical images — A systematic mapping Bergamasco, Leila Cristina C.
2019
13-14 C p. 19-38
article
152 Introducing article numbering to Computer Science Review Li, Jimeng

13-14 C p.
article
153 Julia language in machine learning: Algorithms, applications, and open issues Gao, Kaifeng

13-14 C p.
article
154 Leveraging Deep Learning and IoT big data analytics to support the smart cities development: Review and future directions Atitallah, Safa Ben

13-14 C p.
article
155 Localization schemes for Underwater Acoustic Sensor Networks - A Review Toky, Archana

13-14 C p.
article
156 Location management in mobile network: A survey Mukherjee, Anwesha
2016
13-14 C p. 1-14
14 p.
article
157 Logo and seal based administrative document image retrieval: A survey Alaei, Alireza
2016
13-14 C p. 47-63
17 p.
article
158 Machine learning algorithms for social media analysis: A survey T.K., Balaji

13-14 C p.
article
159 Machine Learning and Deep Learning in smart manufacturing: The Smart Grid paradigm Kotsiopoulos, Thanasis

13-14 C p.
article
160 Machine learning and multi-agent systems in oil and gas industry applications: A survey Hanga, Khadijah M.

13-14 C p.
article
161 Machine learning techniques for hate speech classification of twitter data: State-of-the-art, future challenges and research directions Ayo, Femi Emmanuel

13-14 C p.
article
162 Malicious application detection in android — A systematic literature review Sharma, Tejpal

13-14 C p.
article
163 Maria Serna and her years in Patras Spirakis, Paul G.

13-14 C p.
article
164 Maria Serna in Barcelona Àlvarez, Carme

13-14 C p.
article
165 Maria Serna’s contributions to adversarial queuing theory Blesa, Maria J.

13-14 C p.
article
166 Maximum cliques in graphs with small intersection number and random intersection graphs Nikoletseas, Sotiris E.

13-14 C p.
article
167 mHealth Authentication Approach Based 3D Touchscreen and Microphone Sensors for Real-Time Remote Healthcare Monitoring System: Comprehensive Review, Open Issues and Methodological Aspects Shuwandy, Moceheb Lazam

13-14 C p.
article
168 Model-based testing using UML activity diagrams: A systematic mapping study Ahmad, Tanwir
2019
13-14 C p. 98-112
article
169 Modelling web-service uncertainty: The angel/daemon approach Gabarro, Joaquim

13-14 C p.
article
170 Motif discovery in networks: A survey Yu, Shuo

13-14 C p.
article
171 Moving objects detection with a moving camera: A comprehensive review Chapel, Marie-Neige

13-14 C p.
article
172 Multidisciplinary Pattern Recognition applications: A review Paolanti, Marina

13-14 C p.
article
173 Multilayer network simplification: Approaches, models and methods Interdonato, Roberto

13-14 C p.
article
174 Named Data Networking: A survey Saxena, Divya
2016
13-14 C p. 15-55
41 p.
article
175 Nature-inspired algorithms for Wireless Sensor Networks: A comprehensive survey Singh, Abhilash

13-14 C p.
article
176 Near infrared face recognition: A literature survey Farokhi, Sajad
2016
13-14 C p. 1-17
17 p.
article
177 Network embedding: Taxonomies, frameworks and applications Hou, Mingliang

13-14 C p.
article
178 Neurological and physiological measures to evaluate the usability and user-experience (UX) of information systems: A systematic literature review Zaki, Tarannum

13-14 C p.
article
179 New trends in influence maximization models Azaouzi, Mehdi

13-14 C p.
article
180 New trends on moving object detection in video images captured by a moving camera: A survey Yazdi, Mehran
2018
13-14 C p. 157-177
article
181 [No title] Díaz, Josep

13-14 C p.
article
182 [No title] Bálek, Martin
2013
13-14 C p. 35-46
12 p.
article
183 [No title] Zuhair Mahmoud, Khaled
2013
13-14 C p. 31-34
4 p.
article
184 Offline recognition of handwritten Indic scripts: A state-of-the-art survey and future perspectives Sharma, Reya

13-14 C p.
article
185 Offline Script Identification from multilingual Indic-script documents: A state-of-the-art Singh, Pawan Kumar
2015
13-14 C p. 1-28
28 p.
article
186 On cloud security requirements, threats, vulnerabilities and countermeasures: A survey Kumar, Rakesh
2019
13-14 C p. 1-48
article
187 On the role and the importance of features for background modeling and foreground detection Bouwmans, Thierry
2018
13-14 C p. 26-91
article
188 Ontology learning: Grand tour and challenges Khadir, Ahlem Chérifa

13-14 C p.
article
189 Open-source IP cores for space: A processor-level perspective on soft errors in the RISC-V era Di Mascio, Stefano

13-14 C p.
article
190 Parametric survey on cross-layer designs for wireless sensor networks Sah, Dinesh Kumar
2018
13-14 C p. 112-134
article
191 Practical algorithms for MSO model-checking on tree-decomposable graphs Langer, Alexander
2014
13-14 C p. 39-74
36 p.
article
192 Prediction methods and applications in the science of science: A survey Hou, Jie

13-14 C p.
article
193 Prediction of Atrial Fibrillation using artificial intelligence on Electrocardiograms: A systematic review Matias, Igor

13-14 C p.
article
194 Preface Díaz, Josep

13-14 C p.
article
195 Privacy and verifiability in voting systems: Methods, developments and trends Jonker, Hugo
2013
13-14 C p. 1-30
30 p.
article
196 Privacy issues in intrusion detection systems: A taxonomy, survey and future directions Niksefat, Salman
2017
13-14 C p. 69-78
10 p.
article
197 Privacy preserving publication of relational and transaction data: Survey on the anonymization of patient data Puri, Vartika
2019
13-14 C p. 45-61
article
198 Progress in context-aware recommender systems — An overview Raza, Shaina
2019
13-14 C p. 84-97
article
199 Publication trends in gamification: A systematic mapping study Kasurinen, Jussi
2018
13-14 C p. 33-44
article
200 Publisher’s Note Faez, Telli
2017
13-14 C p. 31
article
201 Real-time detection of shill bidding in online auctions: A literature review Majadi, Nazia
2017
13-14 C p. 1-18
18 p.
article
202 Real-time 3D reconstruction techniques applied in dynamic scenes: A systematic literature review Ingale, Anupama K.

13-14 C p.
article
203 Recent Named Entity Recognition and Classification techniques: A systematic review Goyal, Archana
2018
13-14 C p. 21-43
article
204 Relational intelligence recognition in online social networks — A survey Zhang, Ji

13-14 C p.
article
205 Review of the use of human senses and capabilities in cryptography Halunen, Kimmo

13-14 C p.
article
206 Role of machine learning in medical research: A survey Garg, Arunim

13-14 C p.
article
207 Scenario analysis, from BigData to black swan Batrouni, Marwan
2018
13-14 C p. 131-139
article
208 Scheduling in distributed systems: A cloud computing perspective Bittencourt, Luiz F.
2018
13-14 C p. 31-54
article
209 Science of Scientific Team Science: A survey Yu, Shuo
2019
13-14 C p. 72-83
article
210 Security and privacy aspects in MapReduce on clouds: A survey Derbeko, Philip
2016
13-14 C p. 1-28
28 p.
article
211 Security of Power Line Communication systems: Issues, limitations and existing solutions Yaacoub, Jean Paul A.

13-14 C p.
article
212 Semantic Web Services testing: A Systematic Mapping study de Souza Neto, João B.
2018
13-14 C p. 140-156
article
213 Smart Farming in Europe Moysiadis, Vasileios

13-14 C p.
article
214 Smart grid communication and information technologies in the perspective of Industry 4.0: Opportunities and challenges Faheem, M.
2018
13-14 C p. 1-30
article
215 Social computing for software engineering: A mapping study Ardini, Amalia
2014
13-14 C p. 75-93
19 p.
article
216 Some algorithms under non-parametric framework versus an unsupervised approach Ray, Bimal Kumar

13-14 C p.
article
217 Some results of Maria Serna on strategic games: Complexity of equilibria and models Àlvarez, Carme

13-14 C p.
article
218 Some Studies on Performability Analysis of Safety Critical Systems Ahamad, Shakeel

13-14 C p.
article
219 Sorting on graphs by adjacent swaps using permutation groups Kim, Dohan
2016
13-14 C p. 89-105
17 p.
article
220 Storage, partitioning, indexing and retrieval in Big RDF frameworks: A survey Chawla, Tanvi

13-14 C p.
article
221 Strategies based on various aspects of clustering in wireless sensor networks using classical, optimization and machine learning techniques: Review, taxonomy, research findings, challenges and future directions Amutha, J.

13-14 C p.
article
222 Successors of PEGASIS protocol: A comprehensive survey Khedr, Ahmed M.

13-14 C p.
article
223 Summarization of legal documents: Where are we now and the way forward Jain, Deepali

13-14 C p.
article
224 Survey on 3D face reconstruction from uncalibrated images Morales, Araceli

13-14 C p.
article
225 Survey on hardware implementation of random number generators on FPGA: Theory and experimental analyses Bakiri, Mohammed
2018
13-14 C p. 135-153
article
226 Survey on Visualization and Visual Analytics pipeline-based models: Conceptual aspects, comparative studies and challenges Ltifi, Hela

13-14 C p.
article
227 Systematic analysis and review of stock market prediction techniques Gandhmal, Dattatray P.

13-14 C p.
article
228 Taxonomy, state-of-the-art, challenges and applications of visual understanding: A review Khanday, Nadeem Yousuf

13-14 C p.
article
229 The Critical Node Detection Problem in networks: A survey Lalou, Mohammed
2018
13-14 C p. 92-117
article
230 The evolution of sentiment analysis—A review of research topics, venues, and top cited papers Mäntylä, Mika V.
2018
13-14 C p. 16-32
article
231 The importance of selecting clustering parameters in VANETs: A survey Kaur, Ravneet

13-14 C p.
article
232 The journey of graph kernels through two decades Ghosh, Swarnendu
2018
13-14 C p. 88-111
article
233 Towards quantum computing based community detection Akbar, Sana

13-14 C p.
article
234 Towards Resilient Method: An exhaustive survey of fault tolerance methods in the cloud computing environment Shahid, Muhammad Asim

13-14 C p.
article
235 Traditional and recent approaches in background modeling for foreground detection: An overview Bouwmans, Thierry
2014
13-14 C p. 31-66
36 p.
article
236 Transaction scheduling protocols for controlling priority inversion: A review Pandey, Sarvesh

13-14 C p.
article
237 Tutorial and critical analysis of phishing websites methods Mohammad, Rami M.
2015
13-14 C p. 1-24
24 p.
article
238 Understandable Big Data: A survey Kacfah Emani, Cheikh
2015
13-14 C p. 70-81
12 p.
article
239 Usability, security and trust in password managers: A quest for user-centric properties and features Chaudhary, Sunil
2019
13-14 C p. 69-90
article
240 Vulnerability retrospection of security solutions for software-defined Cyber–Physical System against DDoS and IoT-DDoS attacks Snehi, Manish

13-14 C p.
article
241 When machine learning meets medical world: Current status and future challenges Smiti, Abir

13-14 C p.
article
242 Where is the research on connecting game ​ worlds?—A systematic mapping study Parkkila, Janne
2015
13-14 C p. 46-58
13 p.
article
243 XML data manipulation in conventional and temporal XML databases: A survey Brahmia, Zouhaier

13-14 C p.
article
                             243 results found
 
 Koninklijke Bibliotheek - National Library of the Netherlands