|
Issue |
Title |
|
Vol 33, No 3 (2009) |
Robustness and Visualization of Decision Models |
Abstract
PDF
|
A. Bregar, J. Györkös, M.B. Juric |
|
Vol 40, No 3 (2016) |
Rough-Mereology Framework for Making Medical Treatment Decisions Based on Granular Computing |
Abstract
PDF
|
Mohammed M. Eissa, Mohammed Mahfouz Elmogy, Mohamed Hashem |
|
Vol 45, No 2 (2021) |
Routing Algorithm in Networks on the Globe |
Abstract
PDF
|
Sujit Kumar Bose |
|
Vol 33, No 2 (2009) |
Routing Scalability in Multicore-Based Ad Hoc Networks |
Abstract
PDF
|
A. Marowka |
|
Vol 48, No 18 (2024): Online-only issue |
RREASO Building Structure Physical Parameter Identification Algorithm for Structural Damage Identification |
Abstract
PDF
|
Xin Li |
|
Vol 33, No 3 (2009) |
Run-time Manipulation of Programs in a Statically-Typed Language |
Abstract
PDF
|
S. Greiner |
|
Vol 46, No 9 (2022): Online-only issue |
SADetection: Security Mechanisms to Detect SLAAC Attack in IPv6 Link-Local Network |
Abstract
PDF
|
Mahmood A. Al-Shareeda, Selvakumar Manickam, Murtaja Ali Saare, Nazrool Bin Omar |
|
Vol 49, No 7 (2025): Online-only issue |
SBPM Model for Analyzing Students’ Learning Behavior Based on Fine Grained Emotion Analysis and Emotion Assessment |
Abstract
PDF
|
Xianzhong Wang, Jian Li |
|
Vol 49, No 1 (2025) |
Scalable Front-End Architecture: Building for Growth and Sustainability |
Abstract
PDF
|
Oleksandr Tkachenko, Aleksei Chechet, Maksim Chernykh, Sergei Bunas, Przemyslaw Jatkiewicz |
|
Vol 49, No 13 (2025): Online-only issue |
SDN-DRLTE Algorithm Based on DRL in Computer Network Traffic Control |
Abstract
PDF
|
Cuijie Yang, Biyan Li |
|
Vol 48, No 21 (2024): Online-only issue |
SD-WSN Network Security Detection Methods for Online Network Education |
Abstract
PDF
|
Zhenpeng Zhang |
|
Vol 37, No 3 (2013) |
Searching for Credible Relations in Machine Learning |
Abstract
PDF
|
V. Vidulin |
|
Vol 47, No 6 (2023): Online-only issue |
Secure and Low-Complexity Medical Image Exchange Based on Compressive Sensing and LSB Audio Steganography |
Abstract
PDF
|
Wafaa Al-Chaab, Zaid Ameen Abduljabbar, Enas Wahab Abood, Vincent Omollo Nyangaresi, Hussein M. Mohammed, Junchao Ma |
|
Vol 33, No 4 (2009) |
Secure Convertible Authenticated Encryption Scheme Based on RSA |
Abstract
PDF
|
T.-S. Wu, H.-Y. Lin |
|
Vol 48, No 18 (2024): Online-only issue |
Secure Face Recognition Using Fully Homomorphic Encryption and Convolutional Neural Networks |
Abstract
PDF
|
Tao Liu |
|
Vol 36, No 1 (2012) |
Secure Key Exchange Scheme for IPTV Broadcasting |
Abstract
PDF
|
R.S. Pippal, S. Tapaswi, C.D. Jaidhar |
|
Vol 33, No 1 (2009) |
Secure, Portable, and Customizable Video Lectures for E-learning on the Move |
Abstract
PDF
|
M. Furini |
|
Vol 46, No 8 (2022): Online-only issue |
Secure Routing Protocol for WSNs Using Bacterial Foraging Optimization and Improved RC4 |
Abstract
PDF
|
Imad Alshawi, Hasan Al-badrei |
|
Vol 40, No 1 (2016) |
Secured Storage for Dynamic Data in Cloud |
Abstract
PDF
|
Veeralakshmi Ponnuramu, Latha Tamilselvan |
|
Vol 48, No 2 (2024) |
Seepage Detection Using Passive Temperature Measurements by Fiber Optic DTS |
Abstract
PDF
|
Yaser Ghafoori |
|
Vol 49, No 14 (2025): Online-only issue |
Self-Learning Model for Pattern Recognition in Vision System Based on Adaptive Kernel |
Abstract
PDF
|
Aradea Aradea, Rianto Rianto, Nina Herlina, Irani Hoeronis |
|
Vol 30, No 1 (2006) |
Self-Organisation and Emergence in MAS: An Overview |
Abstract
PDF
|
G. Di M. Serugendo, M.-P. G. Irit, A. Karageorgos |
|
Vol 30, No 1 (2006) |
Self-Organising Mechanisms from Social and Business/Economics Approaches |
Abstract
PDF
|
S. Hassas, G. Di Marzo-Serugendo, A. Karageorgos, C. Castelfranchi |
|
Vol 42, No 1 (2018) |
Semantic Annotation of Documents Based on Wikipedia Concepts |
Abstract
PDF
|
Janez Brank, Gregor Leban, Marko Grobelnik |
|
Vol 38, No 4 (2014) |
Semantic Annotations for Workflow Interoperability |
Abstract
PDF
|
Hamri Salah, Boudjlida Nacer, Boufaida Mahmoud |
|
1551 - 1575 of 1805 Items |
<< < 58 59 60 61 62 63 64 65 66 67 > >> |