|
Issue |
Title |
|
Vol 45, No 2 (2021) |
Routing Algorithm in Networks on the Globe |
Abstract
PDF
|
Sujit Kumar Bose |
|
Vol 33, No 2 (2009) |
Routing Scalability in Multicore-Based Ad Hoc Networks |
Abstract
PDF
|
A. Marowka |
|
Vol 48, No 18 (2024): Online-only issue |
RREASO Building Structure Physical Parameter Identification Algorithm for Structural Damage Identification |
Abstract
PDF
|
Xin Li |
|
Vol 33, No 3 (2009) |
Run-time Manipulation of Programs in a Statically-Typed Language |
Abstract
PDF
|
S. Greiner |
|
Vol 46, No 9 (2022): Online-only issue |
SADetection: Security Mechanisms to Detect SLAAC Attack in IPv6 Link-Local Network |
Abstract
PDF
|
Mahmood A. Al-Shareeda, Selvakumar Manickam, Murtaja Ali Saare, Nazrool Bin Omar |
|
Vol 48, No 21 (2024): Online-only issue |
SD-WSN Network Security Detection Methods for Online Network Education |
Abstract
PDF
|
Zhenpeng Zhang |
|
Vol 37, No 3 (2013) |
Searching for Credible Relations in Machine Learning |
Abstract
PDF
|
V. Vidulin |
|
Vol 47, No 6 (2023): Online-only issue |
Secure and Low-Complexity Medical Image Exchange Based on Compressive Sensing and LSB Audio Steganography |
Abstract
PDF
|
Wafaa Al-Chaab, Zaid Ameen Abduljabbar, Enas Wahab Abood, Vincent Omollo Nyangaresi, Hussein M. Mohammed, Junchao Ma |
|
Vol 33, No 4 (2009) |
Secure Convertible Authenticated Encryption Scheme Based on RSA |
Abstract
PDF
|
T.-S. Wu, H.-Y. Lin |
|
Vol 48, No 18 (2024): Online-only issue |
Secure Face Recognition Using Fully Homomorphic Encryption and Convolutional Neural Networks |
Abstract
PDF
|
Tao Liu |
|
Vol 36, No 1 (2012) |
Secure Key Exchange Scheme for IPTV Broadcasting |
Abstract
PDF
|
R.S. Pippal, S. Tapaswi, C.D. Jaidhar |
|
Vol 33, No 1 (2009) |
Secure, Portable, and Customizable Video Lectures for E-learning on the Move |
Abstract
PDF
|
M. Furini |
|
Vol 46, No 8 (2022): Online-only issue |
Secure Routing Protocol for WSNs Using Bacterial Foraging Optimization and Improved RC4 |
Abstract
PDF
|
Imad Alshawi, Hasan Al-badrei |
|
Vol 40, No 1 (2016) |
Secured Storage for Dynamic Data in Cloud |
Abstract
PDF
|
Veeralakshmi Ponnuramu, Latha Tamilselvan |
|
Vol 48, No 2 (2024) |
Seepage Detection Using Passive Temperature Measurements by Fiber Optic DTS |
Abstract
PDF
|
Yaser Ghafoori |
|
Vol 30, No 1 (2006) |
Self-Organisation and Emergence in MAS: An Overview |
Abstract
PDF
|
G. Di M. Serugendo, M.-P. G. Irit, A. Karageorgos |
|
Vol 30, No 1 (2006) |
Self-Organising Mechanisms from Social and Business/Economics Approaches |
Abstract
PDF
|
S. Hassas, G. Di Marzo-Serugendo, A. Karageorgos, C. Castelfranchi |
|
Vol 42, No 1 (2018) |
Semantic Annotation of Documents Based on Wikipedia Concepts |
Abstract
PDF
|
Janez Brank, Gregor Leban, Marko Grobelnik |
|
Vol 38, No 4 (2014) |
Semantic Annotations for Workflow Interoperability |
Abstract
PDF
|
Hamri Salah, Boudjlida Nacer, Boufaida Mahmoud |
|
Vol 33, No 3 (2009) |
Semantic Graphs Derived From Triplets pplicwith Aation in Document Summarization |
Abstract
PDF
|
D. Rusu, B. Fortuna, M. Grobelnik, D. Mladenić |
|
Vol 32, No 1 (2008) |
Semantic Grid Platform in Support of Engineering Virtual Organisations |
Abstract
PDF
|
M. Dolenc, R. Klinc, Ž. Turk, P. Katranuschkov, K. Kurowski |
|
Vol 30, No 2 (2006) |
Semantic Search in Tabular Structures |
Abstract
PDF
|
A. Pivk, M. Gams, M. Luštrek |
|
Vol 38, No 1 (2014) |
Semantic Searching Of Biological Documents Using Gene Ontology |
Abstract
PDF
|
M. Mostafa, E.M.F. El Houby, A. Salah |
|
Vol 31, No 1 (2007) |
Semantic Web Based Integration of Knowledge Resources for Supporting Collaboration |
Abstract
PDF
|
V. Podgorelec, L. Pavlic, M. Hericko |
|
Vol 38, No 3 (2014) |
Semi-automated Knowledge Elicitation for Modelling Plant Defence Response |
Abstract
PDF
|
Dragana Miljkovic |
|
1326 - 1350 of 1548 Items |
<< < 49 50 51 52 53 54 55 56 57 58 > >> |