Digital Library
Close Browse articles from a journal
     Journal description
       All volumes of the corresponding journal
         All issues of the corresponding volume
                                       All articles of the corresponding issues
 
                             39 results found
no title author magazine year volume issue page(s) type
1 Adaptive gamification in Collaborative systems, a systematic mapping study Dalponte Ayastuy, María

39 C p.
article
2 Applicability of Blockchain smart contracts in securing Internet and IoT: A systematic literature review Lone, Auqib Hamid

39 C p.
article
3 A survey of android application and malware hardening Sihag, Vikas

39 C p.
article
4 A survey of data center consolidation in cloud computing systems Helali, Leila

39 C p.
article
5 A survey of malware detection in Android apps: Recommendations and perspectives for future research Razgallah, Asma

39 C p.
article
6 A survey of the modified Moran process and evolutionary graph theory Díaz, Josep

39 C p.
article
7 A systematic mapping review of context-aware analysis and its approach to mobile learning and ubiquitous learning processes Vallejo-Correa, Paola

39 C p.
article
8 Automatic hand gesture recognition using hybrid meta-heuristic-based feature selection and classification with Dynamic Time Warping Kowdiki, Manisha

39 C p.
article
9 Big data and IoT-based applications in smart environments: A systematic review Hajjaji, Yosra

39 C p.
article
10 Blockchain technology in the energy sector: From basic research to real world applications Wang, Qiang

39 C p.
article
11 Compactors for parameterized counting problems Thilikos, Dimitrios M.

39 C p.
article
12 Comparative analysis on cross-modal information retrieval: A review Kaur, Parminder

39 C p.
article
13 Considerations about the efficiency and sufficiency of the utilization of the Scrum methodology: A survey for analyzing results for development teams Morandini, Marcelo

39 C p.
article
14 Deep Learning Algorithms for Cybersecurity Applications: A Technological and Status Review Dixit, Priyanka

39 C p.
article
15 Distributed denial of service attacks in cloud: State-of-the-art of scientific and commercial solutions Bhardwaj, Aanshi

39 C p.
article
16 Editorial Board
39 C p.
article
17 Energy price prediction using data-driven models: A decade review Lu, Hongfang

39 C p.
article
18 Ensemble learning for intrusion detection systems: A systematic mapping study and cross-benchmark evaluation Tama, Bayu Adhi

39 C p.
article
19 Future FANET with application and enabling techniques: Anatomization and sustainability issues Srivastava, Ashish

39 C p.
article
20 How smart is e-tourism? A systematic review of smart tourism recommendation system applying data management Hamid, Rula A.

39 C p.
article
21 Influence decision models: From cooperative game theory to social network analysis Molinero, Xavier

39 C p.
article
22 Maria Serna and her years in Patras Spirakis, Paul G.

39 C p.
article
23 Maria Serna in Barcelona Àlvarez, Carme

39 C p.
article
24 Maria Serna’s contributions to adversarial queuing theory Blesa, Maria J.

39 C p.
article
25 Maximum cliques in graphs with small intersection number and random intersection graphs Nikoletseas, Sotiris E.

39 C p.
article
26 Modelling web-service uncertainty: The angel/daemon approach Gabarro, Joaquim

39 C p.
article
27 Nature-inspired algorithms for Wireless Sensor Networks: A comprehensive survey Singh, Abhilash

39 C p.
article
28 Ontology learning: Grand tour and challenges Khadir, Ahlem Chérifa

39 C p.
article
29 Open-source IP cores for space: A processor-level perspective on soft errors in the RISC-V era Di Mascio, Stefano

39 C p.
article
30 Prediction of Atrial Fibrillation using artificial intelligence on Electrocardiograms: A systematic review Matias, Igor

39 C p.
article
31 Preface Díaz, Josep

39 C p.
article
32 Real-time 3D reconstruction techniques applied in dynamic scenes: A systematic literature review Ingale, Anupama K.

39 C p.
article
33 Review of the use of human senses and capabilities in cryptography Halunen, Kimmo

39 C p.
article
34 Security of Power Line Communication systems: Issues, limitations and existing solutions Yaacoub, Jean Paul A.

39 C p.
article
35 Smart Farming in Europe Moysiadis, Vasileios

39 C p.
article
36 Some algorithms under non-parametric framework versus an unsupervised approach Ray, Bimal Kumar

39 C p.
article
37 Some results of Maria Serna on strategic games: Complexity of equilibria and models Àlvarez, Carme

39 C p.
article
38 Some Studies on Performability Analysis of Safety Critical Systems Ahamad, Shakeel

39 C p.
article
39 Successors of PEGASIS protocol: A comprehensive survey Khedr, Ahmed M.

39 C p.
article
                             39 results found
 
 Koninklijke Bibliotheek - National Library of the Netherlands