Search Paper
Home
Login
Categories
Archive
Post URL
Academic Resources
Contact Us
Research Sharing System - Share URL
Title
Author
Category
Volume, Issue, Month, Year
Semantic management of enterprise information systems through ontologies
Valentina Casola and Rosario Catelli
Computer Science & Information Technology
10, 14, November, 2020
ENHANCING COMPUTER NETWORK SECURITY ENVIRONMENT BY IMPLEMENTING THE SIX-WARE NETWORK SECURITY FRAMEWORK (SWNSF)
Rudy Agus Gemilang Gultom
Computer Science & Information Technology
8, 17, December, 2018
Chinese Medical Question Answer Matching Based on Interactive Sentence Representation Learning
Xiongtao Cui and Jungang Han
Computer Science & Information Technology
10, 14, November, 2020
ANTI-VIRUS TOOLS ANALYSIS USING DEEP WEB MALWARES
Igor Mishkovski
Computer Science & Information Technology
8, 17, December, 2018
MRI AND CT IMAGE FUSION BASED STRUCTURE-PRESERVING FILTER
Qiaoqiao Li
Computer Science & Information Technology
8, 17, December, 2018
REAL-TIME P2P STREAMING BASED ON PLAYBACK-RATE IN MANETS
Chia-Cheng Hu
Computer Science & Information Technology
8, 17, December, 2018
Deep Learning Roles Based Approach to Link Prediction in Networks
Aman Gupta and Yadul Raghav
Computer Science & Information Technology
Volume 10,, AIRCC Publ, November, 2020
Time Series Classification with Meta Learning
Aman Gupta and Yadul Raghav
Computer Science & Information Technology
Volume 10,, AIRCC Publ, November, 2020
SAITE STORE 2.0: EXPERIENCE REPORT ON THE DEVELOPMENT OF AN IMPROVED VERSION OF A DIGITAL LIBRARY APPLICATION
Ana Emilia Figueiredo de Oliveira
Computer Science & Information Technology
8, 17, December, 2018
ANDROID MALWARE DETECTION USING MACHINE LEARNING AND REVERSE ENGINEERING
Michal Kedziora
Computer Science & Information Technology
8, 17, December, 2018
CYBER-ATTACKS ON THE DATA COMMUNICATION OF DRONES MONITORING CRITICAL INFRASTRUCTURE
Hadjer Benkraouda
Computer Science & Information Technology
8, 17, December, 2018
ADAPTABASE - ADAPTIVE MACHINE LEARNING BASED DATABASE CROSSTECHNOLOGY SELECTION
Shay Horovitz
Computer Science & Information Technology
8, 17, December, 2018
PHISHING DETECTION FROM URLS BY USING NEURAL NETWORKS
Ozgur Koray Sahingoz
Computer Science & Information Technology
8, 17, December, 2018
POSSIBILITIES OF PYTHON BASED EMOTION RECOGNITION
Primož Podržaj
Computer Science & Information Technology
8, 17, February, 2018
A POST-PROCESSING METHOD BASED ON FULLY CONNECTED CRFS FOR CHRONIC WOUND IMAGES SEGMENTATION AND IDENTIFICATION
Junnan Zhang
Computer Science & Information Technology
8, 17, February, 2018
A PSEUDO-SPLICING ALGORITHM FOR PARTIAL FINGERPRINT RECOGNITION BASED ON SIFT
Zheng Zhu, Aiping Li
Computer Science & Information Technology
8, 17, February, 2018
TOMOGRAPHIC SAR INVERSION FOR URBAN RECONSTRUCTION
Karima Hadj-Rabah
Computer Science & Information Technology
8, 17, December, 2018
1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33
34
35
36
37
38
39
40
41
42
43
44
45
46
47
48
49
50
51
52
53
54
55
56
57
58
59
60
61
62
63
64
65
66
67
68
69
70
71
72
73
74
75
76
77
78
79
80
81
82
83
84
85
86
87
88
89
90
91
92
93
94
95
96
97
98
99
100
101
102
103
104
105
106
107
108
109
110
111
112
113
114
115
116
117
118
119