Search Paper
Home
Login
Categories
Archive
Post URL
Academic Resources
Contact Us
Research Sharing System - Share URL
Title
Author
Category
Volume, Issue, Month, Year
A SECURE DIGITAL SIGNATURE SCHEME WITH FAULT TOLERANCE BASED ON THE IMPROVED RSA SYSTEM
H. Elkamchouchi
Computer Science & Information Technology
6, 7, November, 2016
Lexicon Based Chinese Language Sentiment Analysis Method
Jinyan Chen , Susanne Becken, and Bela Stantic
Computer Science & Information Technology
16, 2, June, 2019
On the Automated and Reactive Optimization of Highly-Dynamic Communication Network Infrastructures
Robin Mueller-Bady,Inmaculada Medina-Bulo
Computer Science & Information Technology
25, 7, July, 2019
A PROXY SIGNATURE SCHEME BASED ON NEW SECURE AUTHENTICATED KEY AGREEMENT PROTOCOL
H. Elkamchouchi
Computer Science & Information Technology
6, 7, November, 2016
On Approximate k-Nearest Neighbor Searches Based on the Earth Mover’s Distance for Efficient Content-Based Multimedia Information Retrieval
Min-Hee Jang, Sang-Wook Kim, Woong-Kee Loh, Jung-Im Won
Computer Science & Information Technology
16, 2, June, 2019
Improving Ontology Matching Using Application Requirements for Segmenting Ontologies
Diego Pessoa, Ana Carolina Salgado, Bernadette Farias Lóscio
Computer Science & Information Technology
25, 7, July, 2019
AVOIDING DUPLICATED COMPUTATION TO IMPROVE THE PERFORMANCE OF PFSP ON CUDA GPUSAVOIDING DUPLICATED COMPUTATION TO IMPROVE THE PERFORMANCE OF PFSP ON CUDA GPUS
Chao-Chin Wu
Computer Science & Information Technology
6, 7, November, 2016
How Much Topological Structure Is Preserved by Graph Embeddings
Xin Liu, Chenyi Zhuang, Tsuyoshi Murata, Kyoung-Sook Kim, Natthawut Kertkeidkachorn
Computer Science & Information Technology
16, 2, June, 2019
Effectiveness of Games in Software Project Management Education: An Experimental Study
Giani Petri,Christiane Gresse von Wangenheim,Jean Carlo Rossa Hauck ,Adriano Ferreti Borgatto
Computer Science & Information Technology
25, 7, July, 2019
Outlier Detection in Graphs: A Study on the Impact of Multiple Graph Models
Guilherme Oliveira Campos,Edre Moreira,Wagner Meira Jr, Arthur Zimek
Computer Science & Information Technology
16, 2, June, 2019
Towards Secure and Efficient "white-box" Encryption
Gurgen Khachatrian,Sergey Abrahamyan
Computer Science & Information Technology
25, 8, August, 2019
“USABILITY TESTING IN MOBILE APPLICATIONS INVOLVING PEOPLE WITH DOWN SYNDROME: A LITERATURE REVIEW”
Doris Cáliz
Computer Science & Information Technology
6, 7, November, 2016
Reducing energy usage in resource-intensive Java-based scientific applications via micro-benchmark based code refactorings
Mathias Longo , Ana Rodriguez , Cristian Mateos , and Alejandro Zunino
Computer Science & Information Technology
16, 2, June, 2019
A New Information-Theoretical Distance Measure for Evaluating Community Detection Algorithms
Mariam Haroutunian,Karen Mkhitaryan,Josiane Mothe
Computer Science & Information Technology
25, 8, August, 2019
Majority Vote Feature Selection Algorithm in Software Fault Prediction
Emin Borandag, Akin Ozcift, Deniz Kilinc, Fatih Yucalar
Computer Science & Information Technology
16, 2, June, 2019
BIG GRAPH: TOOLS, TECHNIQUES, ISSUES, CHALLENGES AND FUTURE DIRECTIONS
Dhananjay Kumar Singh
Computer Science & Information Technology
6, 9, November, 2016
Secrecy over Multiple-Access Channel: A Game of Competition and Cooperation
Yanling Chen,O. Ozan Koyluoglu,A. J. Han Vinck
Computer Science & Information Technology
25, 8, August, 2019
1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33
34
35
36
37
38
39
40
41
42
43
44
45
46
47
48
49
50
51
52
53
54
55
56
57
58
59
60
61
62
63
64
65
66
67
68
69
70
71
72
73
74
75
76
77
78
79
80
81
82
83
84
85
86
87
88
89
90
91
92
93
94
95
96
97
98
99
100
101
102
103
104
105
106
107
108
109
110
111
112
113
114
115
116
117
118
119