Search Paper
  • Home
  • Login
  • Categories
  • Archive
  • Post URL
  • Academic Resources
  • Contact Us

 

Research Sharing System - Share URL

  • Title
  • Author
  • Category
  • Volume, Issue, Month, Year
  • Semantic management of enterprise information systems through ontologies
  • Valentina Casola and Rosario Catelli
  • Computer Science & Information Technology
  • 10, 14, November, 2020

  • ENHANCING COMPUTER NETWORK SECURITY ENVIRONMENT BY IMPLEMENTING THE SIX-WARE NETWORK SECURITY FRAMEWORK (SWNSF)
  • Rudy Agus Gemilang Gultom
  • Computer Science & Information Technology
  • 8, 17, December, 2018

  • Chinese Medical Question Answer Matching Based on Interactive Sentence Representation Learning
  • Xiongtao Cui and Jungang Han
  • Computer Science & Information Technology
  • 10, 14, November, 2020

  • ANTI-VIRUS TOOLS ANALYSIS USING DEEP WEB MALWARES
  • Igor Mishkovski
  • Computer Science & Information Technology
  • 8, 17, December, 2018

  • MRI AND CT IMAGE FUSION BASED STRUCTURE-PRESERVING FILTER
  • Qiaoqiao Li
  • Computer Science & Information Technology
  • 8, 17, December, 2018

  • REAL-TIME P2P STREAMING BASED ON PLAYBACK-RATE IN MANETS
  • Chia-Cheng Hu
  • Computer Science & Information Technology
  • 8, 17, December, 2018

  • Deep Learning Roles Based Approach to Link Prediction in Networks
  • Aman Gupta and Yadul Raghav
  • Computer Science & Information Technology
  • Volume 10,, AIRCC Publ, November, 2020

  • Time Series Classification with Meta Learning
  • Aman Gupta and Yadul Raghav
  • Computer Science & Information Technology
  • Volume 10,, AIRCC Publ, November, 2020

  • SAITE STORE 2.0: EXPERIENCE REPORT ON THE DEVELOPMENT OF AN IMPROVED VERSION OF A DIGITAL LIBRARY APPLICATION
  • Ana Emilia Figueiredo de Oliveira
  • Computer Science & Information Technology
  • 8, 17, December, 2018

  • ANDROID MALWARE DETECTION USING MACHINE LEARNING AND REVERSE ENGINEERING
  • Michal Kedziora
  • Computer Science & Information Technology
  • 8, 17, December, 2018

  • CYBER-ATTACKS ON THE DATA COMMUNICATION OF DRONES MONITORING CRITICAL INFRASTRUCTURE
  • Hadjer Benkraouda
  • Computer Science & Information Technology
  • 8, 17, December, 2018

  • ADAPTABASE - ADAPTIVE MACHINE LEARNING BASED DATABASE CROSSTECHNOLOGY SELECTION
  • Shay Horovitz
  • Computer Science & Information Technology
  • 8, 17, December, 2018

  • PHISHING DETECTION FROM URLS BY USING NEURAL NETWORKS
  • Ozgur Koray Sahingoz
  • Computer Science & Information Technology
  • 8, 17, December, 2018

  • POSSIBILITIES OF PYTHON BASED EMOTION RECOGNITION
  • Primož Podržaj
  • Computer Science & Information Technology
  • 8, 17, February, 2018

  • A POST-PROCESSING METHOD BASED ON FULLY CONNECTED CRFS FOR CHRONIC WOUND IMAGES SEGMENTATION AND IDENTIFICATION
  • Junnan Zhang
  • Computer Science & Information Technology
  • 8, 17, February, 2018

  • A PSEUDO-SPLICING ALGORITHM FOR PARTIAL FINGERPRINT RECOGNITION BASED ON SIFT
  • Zheng Zhu, Aiping Li
  • Computer Science & Information Technology
  • 8, 17, February, 2018

  • TOMOGRAPHIC SAR INVERSION FOR URBAN RECONSTRUCTION
  • Karima Hadj-Rabah
  • Computer Science & Information Technology
  • 8, 17, December, 2018

1  2  3  4  5  6  7  8  9  10  11  12  13  14  15  16  17  18  19  20  21  22  23  24  25  26  27  28  29  30  31  32  33  34  35  36  37  38  39  40  41  42  43  44  45  46  47  48  49  50  51  52  53  54  55  56  57  58  59  60  61  62  63  64  65  66  67  68  69  70  71  72  73  74  75  76  77  78  79  80  81  82  83  84  85  86  87  88  89  90  91  92  93  94  95  96  97  98  99  100  101  102  103  104  105  106  107  108  109  110  111  112  113  114  115  116  117  118  119 

 

About Us | Post Cfp | Share URL Main | Share URL category | Post URL
All Rights Reserved @ Call for Papers - Conference & Journals