A security authorization scheme for smart home Internet of Things devices Fulltext Access 25 Pages 2018
Cloud-aided lightweight certificateless authentication protocol with anonymity for wireless body area networks Fulltext Access 25 Pages 2018
A computer simulation of traffic flow with on-street parking and drivers' behaviour based on cellular automata and a multi-agent system Fulltext Access 25 Pages 2018
Distributed coordination control of traffic network flow using adaptive genetic algorithm based on cloud computing Fulltext Access 25 Pages 2018
Automatic assignment of integrators to pull requests: The importance of selecting appropriate attributes Fulltext Access 25 Pages 2018
Enhanced dynamic programming approach for subunit modelling to handle segmentation and recognition ambiguities in sign language Fulltext Access 25 Pages 2018
A cross layer protocol for traffic management in Social Internet of Vehicles Fulltext Access 25 Pages 2018
A deep Recurrent Neural Network based approach for Internet of Things malware threat hunting Fulltext Access 25 Pages 2018
A modeling front-end for seamless design and generation of context-aware Dynamically Reconfigurable Systems-on-Chip Fulltext Access 25 Pages 2018
An efficient and secure recoverable data aggregation scheme for heterogeneous wireless sensor networks Fulltext Access 25 Pages 2018
A novel deep learning method for aircraft landing speed prediction based on cloud-based sensor data Fulltext Access 25 Pages 2018
Virtualization-based evaluation of backhaul performance in vehicular applications Fulltext Access 25 Pages 2018
Methodology, measurement and analysis of flow table update characteristics in hardware openflow switches Fulltext Access 25 Pages 2018
A Continuous-Time Markov decision process-based resource allocation scheme in vehicular cloud for mobile video services Fulltext Access 25 Pages 2018
Fractal based ultra-wideband antenna development for wireless personal area communication applications Fulltext Access 25 Pages 2018
A slot resonators based quintuple band-notched Y-shaped planar monopole ultra-wideband antenna Fulltext Access 25 Pages 2018
Countering cyber threats for industrial applications: An automated approach for malware evasion detection and analysis Fulltext Access 26 Pages 2018
Empirical analysis of attack graphs for mitigating critical paths and vulnerabilities Fulltext Access 26 Pages 2018
AutoPrivacy: Automatic privacy protection and tagging suggestion for mobile social photo Fulltext Access 26 Pages 2018
The effects of an Adaptive and Distributed Transmission Power Control on the performance of energy harvesting sensor networks Fulltext Access 26 Pages 2018
Energy efficient collaborative proactive routing protocol for Wireless Sensor Network Fulltext Access 26 Pages 2018
The effectiveness of involving users in digital innovation: Measuring the impact of living labs Fulltext Access 26 Pages 2018
Gradient based hybrid metaheuristics for robust tuning of power system stabilizers Fulltext Access 26 Pages 2018
Anomaly behavior detection and reliability assessment of control systems based on association rules Fulltext Access 26 Pages 2018
An Agent-based Spatial Urban Social Network Generator: A Case Study of Beijing, China Fulltext Access 26 Pages 2018
An anatomy of requirements engineering in software startups using multi-vocal literature and case survey Fulltext Access 26 Pages 2018
Evaluating practitioner cyber-security attack graph configuration preferences Fulltext Access 26 Pages 2018
Exploring the effects of specialist versus generalist embodied virtual agents in a multi-product category online store Fulltext Access 26 Pages 2018
Evaluation of the Alzheimer's disease clinical stages under the optics of hybrid approaches in Verbal Decision Analysis Fulltext Access 26 Pages 2018
Multi-objective scheduling for scientific workflow in multicloud environment Fulltext Access 26 Pages 2018
Wireless powered cooperative communications with direct links over correlated channels Fulltext Access 26 Pages 2018
Moves like Jagger: Exploiting variations in instantaneous gait for spontaneous device pairing Fulltext Access 26 Pages 2018
Memory resources aware run-time automated scheduling policy for multi-core systems Fulltext Access 26 Pages 2018
An elliptic curve cryptography based lightweight authentication scheme for smart grid communication Fulltext Access 26 Pages 2018
Integration of smart grid technologies in stochastic multi-objective unit commitment: An economic emission analysis Fulltext Access 26 Pages 2018
Compulsory traceable ciphertext-policy attribute-based encryption against privilege abuse in fog computing Fulltext Access 26 Pages 2018
An analysis of security systems for electronic information for establishing secure internet of things environments: Focusing on research trends in the security field in South Korea Fulltext Access 26 Pages 2018
Internet of agents framework for connected vehicles: A case study on distributed traffic control system Fulltext Access 26 Pages 2018
Low complexity resource allocation in the relay channels with energy harvesting transmitters Fulltext Access 26 Pages 2018
A new congestion control mechanism for transport protocol of cognitive radio sensor networks Fulltext Access 26 Pages 2018
Connectivity analysis of underground sensors in wireless underground sensor networks Fulltext Access 26 Pages 2018
Efficient error detection in soft data fusion for cooperative spectrum sensing Fulltext Access 26 Pages 2018
A secure user authentication and key-agreement scheme using wireless sensor networks for agriculture monitoring Fulltext Access 27 Pages 2018
In-memory big data analytics under space constraints using dynamic programming Fulltext Access 27 Pages 2018
Arcades: A deep model for adaptive decision making in voice controlled smart-home Fulltext Access 27 Pages 2018
A hyper-heuristic cost optimisation approach for Scientific Workflow Scheduling in cloud computing Fulltext Access 27 Pages 2018
Smartphone based approximate localization using user highlighted texts from images Fulltext Access 27 Pages 2018
Efficient algorithms for physical layer security in two-way relay systems Fulltext Access 27 Pages 2018
Performance analysis of underlay cooperative cognitive full-duplex networks with energy-harvesting relay Fulltext Access 27 Pages 2018
Privacy-preserving image retrieval for mobile devices with deep features on the cloud Fulltext Access 27 Pages 2018
Analysis of the essential factors for the adoption of mobile learning in higher education: A case study of students of the University of Technology Fulltext Access 27 Pages 2018
Smartphone application personality and its relationship to personalities of smartphone users and social capital accrued through use of smartphone social applications Fulltext Access 27 Pages 2018
News, search and stock co-movement: Investigating information diffusion in the financial market Fulltext Access 27 Pages 2018
Do reviews from friends and the crowd affect online consumer posting behaviour differently? Fulltext Access 27 Pages 2018
Alternating server with non-zero switch-over times and opposite-queue threshold-based switching policy Fulltext Access 27 Pages 2018
Dynamic workload patterns prediction for proactive auto-scaling of web applications Fulltext Access 27 Pages 2018
Heterogeneous incentive mechanism for time-sensitive and location-dependent crowdsensing networks with random arrivals Fulltext Access 27 Pages 2018
Prediction-based protocols for vehicular Ad Hoc Networks: Survey and taxonomy Fulltext Access 27 Pages 2018
Secure or usable computers? Revealing employees' perceptions and trade-offs by means of a discrete choice experiment Fulltext Access 27 Pages 2018
Secure beamforming for cognitive cyber-physical systems based on cognitive radio with wireless energy harvesting Fulltext Access 27 Pages 2018
Cybersecurity education: Evolution of the discipline and analysis of master programs Fulltext Access 27 Pages 2018
Sampling-based selection-decimation deployment approach for large-scale wireless sensor networks Fulltext Access 27 Pages 2018
Improving risk assessment model of cyber security using fuzzy logic inference system Fulltext Access 27 Pages 2018
Harnessing sliding-window execution semantics for parallel stream processing Fulltext Access 27 Pages 2018
Malware classification using self organising feature maps and machine activity data Fulltext Access 27 Pages 2018
Efficient data association to targets for tracking in passive wireless sensor networks Fulltext Access 27 Pages 2018
A scalable algorithm for simulating the structural plasticity of the brain Fulltext Access 27 Pages 2018
An efficient scheduling scheme for mobile charger in on-demand wireless rechargeable sensor networks Fulltext Access 27 Pages 2018
Multi-authority fine-grained access control with accountability and its application in cloud Fulltext Access 27 Pages 2018
Analysis of publication activity of computational science society in 2001-2017 using topic modelling and graph theory Fulltext Access 27 Pages 2018
Scalable and secure access control policy update for outsourced big data Fulltext Access 27 Pages 2018
A multi-criteria detection scheme of collusive fraud organization for reputation aggregation in social networks Fulltext Access 27 Pages 2018
Cascadable independently and electronically tunable voltage-mode universal filter with grounded passive components Fulltext Access 27 Pages 2018
Change impact analysis for evolving configuration decisions in product line use case models Fulltext Access 27 Pages 2018
An effective approach for software project effort and duration estimation with machine learning algorithms Fulltext Access 27 Pages 2018