Search Paper
Home
Login
Categories
Archive
Post URL
Academic Resources
Contact Us
Research Sharing System - Share URL
Title
Author
Category
Volume, Issue, Month, Year
Forecasting Stock Index with Multi-objective Optimization Model Based on Optimized Neural Network Architecture Avoiding Overfitting
Zhou Tao , Hou Muzhou , and Liu Chunhui
Computer Science & Information Technology
15, 1, January, 2018
Enhancing Spatial Keyword Preference Query with Linked Open Data
João Paulo Dias de Almeida
Computer Science & Information Technology
24, 11, December, 2018
Concurrency Within Ternary Galois Processing of Highly-regular 3D Networks Via Controlled Nano Switching
Anas N. Al-Rabadi
Computer Science & Information Technology
12, 1, February, 2020
DYNAMIC CURATIVE MECHANISM FOR GEOGRAPHIC ROUTING IN WIRELESS MULTIMEDIA SENSOR NETWORKS
Mohamed Nacer Bouatit
Computer Science & Information Technology
7, 5, April, 2017
HMC-ReliefF: Feature Ranking for Hierarchical Multi-label Classification
Ivica Slavkov , Jana Karcheska
Computer Science & Information Technology
15, 1, January, 2018
Open Domain Targeted Sentiment Classification Using Semi-Supervised Dynamic Generation of Feature Attributes
Shadi Abudalfa
Computer Science & Information Technology
24, 11, November, 2018
FLOODING ATTACKS DETECTION OF MOBILE AGENTS IN IP NETWORKS
Jean Tajer
Computer Science & Information Technology
7, 5, April, 2017
A ROUTING PROTOCOL ORPHAN-LEACH TO JOIN ORPHAN NODES IN WIRELESS SENSOR NETWORK
Wassim JERBI
Computer Science & Information Technology
6, 4, April, 2016
CSDSM: Cognitive Switch-based DDoS Sensing and Mitigation in SDN-driven CDNi Word
Nishat I Mowla, Inshil Doh, and Kijoon Chae
Computer Science & Information Technology
15, 1, January, 2018
Mining of Educational Opinions with Deep Learning
Ramón Zatarain Cabada
Computer Science & Information Technology
24, 11, November, 2018
ASSOCIATIVE REGRESSIVE DECISION RULE MINING FOR PREDICTING CUSTOMER SATISFACTORY PATTERNS
SHUBHA. S
Computer Science & Information Technology
6, 4, April, 2016
Evaluation of Takagi-Sugeno-Kang Fuzzy Method in Entropy-based Detection of DDoS attacks
Miodrag Petkovic, Ilija Basicevic, Dragan Kukolj, and Miroslav Popovic
Computer Science & Information Technology
15, 1, January, 2018
Community Detection Applied on Big Linked Data
Laura Po, Davide Malvezzi
Computer Science & Information Technology
24, 11, November, 2018
A CROSS-LAYER BASED SCALABLE CHANNEL SLOT RE-UTILIZATION TECHNIQUE FOR WIRELESS MESH NETWORK
Asha C N
Computer Science & Information Technology
6, 4, April, 2016
Prevention of Cross-update Privacy Leaks on Android
Beumjin Cho , Sangho Lee, Meng Xu
Computer Science & Information Technology
15, 1, January, 2018
Human Language Technologies: Key Issues for Representing Knowledge from Textual Information
Yoan Guti´errez,Elena Lloret
Computer Science & Information Technology
24, 11, November, 2018
Traditionalisation of Agile Processes: Architectural Aspects
Predrag Matkovic, Mirjana Maric, Pere Tumbas, and Marton Sakal
Computer Science & Information Technology
15, 1, January, 2018
1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33
34
35
36
37
38
39
40
41
42
43
44
45
46
47
48
49
50
51
52
53
54
55
56
57
58
59
60
61
62
63
64
65
66
67
68
69
70
71
72
73
74
75
76
77
78
79
80
81
82
83
84
85
86
87
88
89
90
91
92
93
94
95
96
97
98
99
100
101
102
103
104
105
106
107
108
109
110
111
112
113
114
115
116
117
118
119
120
121
122
123
124
125
126
127
128
129
130
131
132