Search Paper
Home
Login
Categories
Archive
Post URL
Academic Resources
Contact Us
Research Sharing System - Share URL
Title
Author
Category
Volume, Issue, Month, Year
RESEARCH ON CRO'S DILEMMA IN SAPIENS CHAIN: A GAME THEORY METHOD
Jinyu Shi
Computer Science & Information Technology
8, 15, November, 2018
AUDIO ENCRYPTION ALGORITHM USING HYPERCHAOTIC SYSTEMS OF DIFFERENT DIMENSIONS
S. N. Lagmiri
Computer Science & Information Technology
8, 15, November, 2018
AN INTELLIGENT APPROACH OF THE FISH FEEDING SYSTEM
Mohammed M. Alammar
Computer Science & Information Technology
8, 15, November, 2018
LEARNING TRAJECTORY PATTERNS BY SEQUENTIAL PATTERN MINING FROM PROBABILISTIC DATABASES
Josky Aïzan
Computer Science & Information Technology
8, 15, November, 2018
DISASTER INITIAL RESPONSES MINING DAMAGES USING FEATURE EXTRACTION AND BAYESIAN OPTIMIZED SUPPORT VECTOR CLASSIFIERS
Yasuno Takato
Computer Science & Information Technology
8, 15, November, 2018
A Proactive Flow Admission and Re-Routing Scheme for Load Balancing and Mitigation of Congestion Propagation in SDN Data Plane
Sminesh C. N., Grace Mary Kanaga E., and Ranjitha K.
Computer Science & Information Technology
10, 6, November, 2018
ENHANCE NMF-BASED RECOMMENDATION SYSTEMS WITH SOCIAL INFORMATION IMPUTATION
Fatemah Alghamedy
Computer Science & Information Technology
8, 15, November, 2018
IMPUTING ITEM AUXILIARY INFORMATION IN NMF-BASED COLLABORATIVE FILTERING
Fatemah Alghamedy
Computer Science & Information Technology
8, 15, November, 2018
COMPARISON OF FOUR ALGORITHMS FOR ONLINE CLUSTERING
Xinchun Yang
Computer Science & Information Technology
8, 15, November, 2018
SECURE OUTSOURCED CALCUALTIONS WITH HOMOMORPHIC ENCRYPTION
Qi Wang, Dehua Zhou and Yanling Li
Computer Science & Information Technology
Volume 9, Number 6, November, 2018
CONCEALED DATA AGGREGATION WITH DYNAMIC INTRUSION DETECTION SYSTEM TO REMOVE VULNERABILITIES IN WIRELESS SENSOR NETWORKS
Bharat Bhushan
Computer Science & Information Technology
6, 9, July, 2016
OBIA ON COASTAL LANDFORM BASED ON STRUCTURE TENSOR
Sun Shuting
Computer Science & Information Technology
6, 9, July, 2016
DENGUE DETECTION AND PREDICTION SYSTEM USING DATA MINING WITH FREQUENCY ANALYSIS
Nandini. V
Computer Science & Information Technology
6, 9, July, 2016
AUTOMATED VISUALIZATION OF INPUT/ OUTPUT FOR PROCESSES IN SOFL FORMAL SPECIFICATIONS
Yu Chen
Computer Science & Information Technology
8, 9, June, 2018
SIMULATION AND MODELING OF ANNBASED PROGNOSIS TOOL FOR A TYPICAL AIRCRAFT FUEL SYSTEM HEALTH MANAGEMENT
Vijaylakshmi S. Jigajinni
Computer Science & Information Technology
8, 10, July, 2018
RESEARCH ON CRO'S DILEMMA IN SAPIENS CHAIN: A GAME THEORY METHOD
Jinyu Shi, Zhongru Wang, Qiang Ruan, Yue Wu and Binxing Fang
Computer Science & Information Technology
8, 15, November, 2018
Sapiens Chain: A Blockchain-based Cybersecurity Framework
Yu Han, Zhongru Wang, Qiang Ruan and Binxing Fang
Computer Science & Information Technology
8, 15, November, 2018
1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33
34
35
36
37
38
39
40
41
42
43
44
45
46
47
48
49
50
51
52
53
54
55
56
57
58
59
60
61
62
63
64
65
66
67
68
69
70
71
72
73
74
75
76
77
78
79
80
81
82
83
84
85
86
87
88
89
90
91
92
93
94
95
96
97
98
99
100
101
102
103
104
105
106
107
108
109
110
111
112
113
114
115
116
117
118
119
120
121
122
123
124
125
126
127
128
129