A two-phase software reliability modeling involving with software fault dependency and imperfect fault removal Fulltext Access 21 Pages 2018
A hybrid quantum-induced swarm intelligence clustering for the urban trip recommendation in smart city Fulltext Access 21 Pages 2018
Game theory-based Security Vulnerability Quantification for Social Internet of Things Fulltext Access 21 Pages 2018
Experimental and quantitative analysis of server power model for cloud data centers Fulltext Access 21 Pages 2018
A parallel self-organizing overlapping community detection algorithm based on swarm intelligence for large scale complex networks Fulltext Access 21 Pages 2018
Analysis of generalized semiparametric regression models for cumulative incidence functions with missing covariates Fulltext Access 21 Pages 2018
New efficient algorithms for multiple change-point detection with reproducing kernels Fulltext Access 21 Pages 2018
Best of two local models: Centralized local and distributed local algorithms Fulltext Access 21 Pages 2018
A two-stage locality-sensitive hashing based approach for privacy-preserving mobile service recommendation in cross-platform edge environment Fulltext Access 21 Pages 2018
Model comparison for Gibbs random fields using noisy reversible jump Markov chain Monte Carlo Fulltext Access 21 Pages 2018
Bestow and atomic: Concurrent programming using isolation, delegation and grouping Fulltext Access 22 Pages 2018
Cost-aware optimal data allocations for multiple dimensional heterogeneous memories using dynamic programming in big data Fulltext Access 22 Pages 2018
Subject-independent hand gesture recognition using normalization and machine learning algorithms Fulltext Access 22 Pages 2018
An experimental case study on the relationship between workload and resource consumption in a commercial web server Fulltext Access 22 Pages 2018
Anomaly-based intrusion detection system through feature selection analysis and building hybrid efficient model Fulltext Access 22 Pages 2018
Lightweight energy consumption analysis and prediction for Android applications Fulltext Access 22 Pages 2018
Formal methods and finite element analysis of hurricane storm surge: A case study in software verification Fulltext Access 22 Pages 2018
An ontology-based approach with which to assign human resources to software projects Fulltext Access 22 Pages 2018
A new technique for compacting ciphertext in multi-channel broadcast encryption and attribute-based encryption Fulltext Access 22 Pages 2018
Taxi-sharing: Parameterized complexity and approximability of the dial-a-ride problem with money as an incentive Fulltext Access 22 Pages 2018
Characterizing right inverses for spatial constraint systems with applications to modal logic Fulltext Access 22 Pages 2018
A unified face identification and resolution scheme using cloud computing in Internet of Things Fulltext Access 22 Pages 2018
Sentiment analysis of Chinese micro-blog text based on extended sentiment dictionary Fulltext Access 22 Pages 2018
Automatized integration of a contextual model into a process with data variability Fulltext Access 22 Pages 2018
Eagle+: A fast incremental approach to automaton and table online updates for cloud services Fulltext Access 22 Pages 2018
Optimization of memory use of fragment extension-based protein-ligand docking with an original fast minimum cost flow algorithm Fulltext Access 22 Pages 2018
Congestion control in high-speed lossless data center networks: A survey Fulltext Access 22 Pages 2018
Synthesis, biological evaluation and molecular dynamics studies of 1,2,4-triazole clubbed Mannich bases Fulltext Access 22 Pages 2018
A generic framework for checking semantic equivalences between pushdown automata and finite-state automata Fulltext Access 22 Pages 2018
Analyzing scientific context of researchers and communities by using complex network and semantic technologies Fulltext Access 22 Pages 2018
Constants and finite unary relations in qualitative constraint reasoning Fulltext Access 23 Pages 2018
Drawing subcubic planar graphs with four slopes and optimal angular resolution Fulltext Access 23 Pages 2018
An efficient algorithm for sparse inverse covariance matrix estimation based on dual formulation Fulltext Access 23 Pages 2018
A tool for publishing reproducible algorithms & A reproducible, elegant algorithm for sequential experiments Fulltext Access 23 Pages 2018
A look-up table method based on unstructured grids and its application to non-ideal compressible fluid dynamic simulations Fulltext Access 23 Pages 2018
Actor-based macroscopic modeling and simulation for smart urban planning Fulltext Access 23 Pages 2018
Fog-cloud based cyber-physical system for distinguishing, detecting and preventing mosquito borne diseases Fulltext Access 23 Pages 2018
Privacy-preserving deduplication of encrypted data with dynamic ownership management in fog computing Fulltext Access 23 Pages 2018
Characterizing polynomial and exponential complexity classes in elementary lambda-calculus Fulltext Access 23 Pages 2018
Big data driven outlier detection for soybean straw near infrared spectroscopy Fulltext Access 23 Pages 2018
Maximizing reliability of energy constrained parallel applications on heterogeneous distributed systems Fulltext Access 23 Pages 2018
Dendron : Genetic trees driven rule induction for network intrusion detection systems Fulltext Access 23 Pages 2018
An intelligent real-time cyber-physical toolset for energy and process prediction and optimisation in the future industrial Internet of Things Fulltext Access 23 Pages 2018
Sequence classification of the limit order book using recurrent neural networks Fulltext Access 23 Pages 2018
Scaling of a Fast Fourier Transform and a pseudo-spectral fluid solver up to 196608 cores Fulltext Access 23 Pages 2018
Research on access control model of social network based on distributed logic Fulltext Access 23 Pages 2018
Reducing resource consumption of expandable collections: The Pharo case Fulltext Access 23 Pages 2018
An approach to examine Magnetic Resonance Angiography based on Tsallis entropy and deformable snake model Fulltext Access 23 Pages 2018
Proof assisted bounded and unbounded symbolic model checking of software and system models Fulltext Access 23 Pages 2018
Research on data fusion algorithm and anti-collision algorithm based on internet of things Fulltext Access 23 Pages 2018
An automata-theoretic approach to the verification of distributed algorithms Fulltext Access 23 Pages 2018
Multi-criteria based zone head selection in Internet of Things based wireless sensor networks Fulltext Access 23 Pages 2018
A fast heuristic detection algorithm for visualizing structure of large community Fulltext Access 24 Pages 2018