Digital Library
Close Browse articles from a journal
     Journal description
       All volumes of the corresponding journal
         All issues of the corresponding volume
                                       All articles of the corresponding issues
 
                             45 results found
no title author magazine year volume issue page(s) type
1 A continuous playing scheme on RESTful web service Kim, Kuinam J.
2016
19 1 p. 379-387
article
2 A decentralized fault tolerance model based on level of performance for grid environment Rebbah, Mohammed
2015
19 1 p. 13-27
article
3 A feature selection approach to find optimal feature subsets for the network intrusion detection system Kang, Seung-Ho
2016
19 1 p. 325-333
article
4 A forensic acquisition and analysis system for IaaS Alqahtany, Saad
2015
19 1 p. 439-453
article
5 A grid based simulation environment for agent-based models with vast parameter spaces Yang, Chao
2015
19 1 p. 183-195
article
6 A knee-based multi-objective evolutionary algorithm: an extension to network system optimization design problem Sudeng, Sufian
2015
19 1 p. 411-425
article
7 A methodology for developing clinical collaborative communication systems Park, Hwa Gyoo
2015
19 1 p. 223-235
article
8 An efficient approach to collaborative simulation of variable structure systems on multi-core machines Yang, Chen
2015
19 1 p. 29-46
article
9 An energy-efficient load balancing scheme to extend lifetime in wireless sensor networks Kim, Hye-Young
2016
19 1 p. 279-283
article
10 A novel evaluation framework for improving trust level of Infrastructure as a Service Alabool, Hamzeh Mohammad
2015
19 1 p. 389-410
article
11 Automatic facial emotion recognition using weber local descriptor for e-Healthcare system Alhussein, Musaed
2016
19 1 p. 99-108
article
12 Beacon-based active media control interface in indoor ubiquitous computing environment Sung, Yunsick
2016
19 1 p. 547-556
article
13 Belief propagation decoding assisted on-the-fly Gaussian elimination for short LT codes Cheong, Hoyoung
2016
19 1 p. 309-314
article
14 Consistency maintenance of Do and Undo/Redo operations in real-time collaborative bitmap editing systems Gao, Liping
2015
19 1 p. 255-267
article
15 Continuous and transparent multimodal authentication: reviewing the state of the art Al Abdulwahid, Abdulwahid
2015
19 1 p. 455-474
article
16 Data security rules/regulations based classification of file data using TsF-kNN algorithm Zardari, Munwar Ali
2016
19 1 p. 349-368
article
17 Demographic variables and risk factors in computer-crime: an empirical assessment Choi, Kyung-shick
2016
19 1 p. 369-377
article
18 Detecting for high speed flying object using image processing on target place Cho, Changhee
2016
19 1 p. 285-292
article
19 Distributed denial-of-service attacks against HTTP/2 services Adi, Erwin
2016
19 1 p. 79-86
article
20 Dynamic load balancing on heterogeneous clusters for parallel ant colony optimization Llanes, Antonio
2016
19 1 p. 1-11
article
21 Dynamic multimedia transmission control virtual machine using weighted Round-Robin Park, Sanghyun
2016
19 1 p. 293-300
article
22 Effects of patent indicators on national technological level: concentrated on mobile communication, network, and convergence technologies Oh, Jong-Hak
2016
19 1 p. 519-528
article
23 Efficient chameleon hashing-based privacy-preserving auditing in cloud storage Zhang, Jianhong
2015
19 1 p. 47-56
article
24 Efficient top-k similarity document search utilizing distributed file systems and cosine similarity Alewiwi, Mahmoud
2015
19 1 p. 109-126
article
25 Elastic resource provisioning for scientific workflow scheduling in cloud under budget and deadline constraints Shi, Jiyuan
2016
19 1 p. 167-182
article
26 Face recognition from a single image per person using deep architecture neural networks Zhuo, Tian
2015
19 1 p. 73-77
article
27 Factors affecting the continuous use of cloud service: focused on security risks Park, Seong-Taek
2015
19 1 p. 485-495
article
28 Fast implementation of block ciphers and PRNGs in Maxwell GPU architecture Lee, Wai-Kong
2016
19 1 p. 335-347
article
29 Frequent pagesets from web log by enhanced weighted association rule mining Malarvizhi, S. P.
2015
19 1 p. 269-277
article
30 Geographical information system parallelization for spatial big data processing: a review Zhao, Lingjun
2015
19 1 p. 139-152
article
31 High-dimentional data authentication protocol based on hash chain for Hadoop systems Jeong, Yoon-Su
2015
19 1 p. 475-484
article
32 IPad: ID-based public auditing for the outsourced data in the standard model Zhang, Jianhong
2015
19 1 p. 127-138
article
33 Meta-operation conflict resolution for human–human interaction in collaborative feature-based CAD systems Cheng, Yuan
2016
19 1 p. 237-253
article
34 Monte Carlo simulations of settlement dynamics in GPUs Millán, Emmanuel N.
2015
19 1 p. 557-566
article
35 Multiple-domain marine data utilization structure for e-navigation Park, Daewon
2016
19 1 p. 301-308
article
36 PEDAL: a dynamic analysis tool for efficient concurrency bug reproduction in big data environment Hu, Yan
2016
19 1 p. 153-166
article
37 PHR open platform based smart health service using distributed object group framework Chung, Kyungyong
2016
19 1 p. 505-517
article
38 Proposing and verifying a security protocol for hash function-based IoT communication system Han, Kun-Hee
2016
19 1 p. 497-504
article
39 Robust audio fingerprinting using peak-pair-based hash of non-repeating foreground audio in a real environment Kim, Hyoung-Gook
2015
19 1 p. 315-323
article
40 Scrutiny of unruly and abuse in wireless networks to mitigate physical layer threats using discriminate based misbehavior prevention Ratna, S. Raja
2016
19 1 p. 87-97
article
41 Similarity (range and kNN) queries processing on an Intel Xeon Phi coprocessor Toledo, Carlos M.
2015
19 1 p. 57-71
article
42 SIMPLE: a simplifying-ensembling framework for parallel community detection from large networks Wu, Zhiang
2015
19 1 p. 211-221
article
43 Task scheduling for MapReduce in heterogeneous networks Wang, Jia
2015
19 1 p. 197-210
article
44 Techniques and countermeasures of website/wireless traffic analysis and fingerprinting Ghaleb, Taher Ahmed
2015
19 1 p. 427-438
article
45 The analysis and application of an educational programming language (RUR-PLE) for a pre-introductory computer science course Yoon, IlKyu
2016
19 1 p. 529-546
article
                             45 results found
 
 Koninklijke Bibliotheek - National Library of the Netherlands