High performance continuous variable bandwidth digital filter design for hearing aid application Fulltext Access 35 Pages 2018
Artificial Bee Colony for optimization of cloud-ready and survivable elastic optical networks Fulltext Access 35 Pages 2018
Joint spectrum allocation and energy harvesting optimization in green powered heterogeneous cognitive radio networks Fulltext Access 35 Pages 2018
Trust-based mechanism design for cooperative spectrum sensing in cognitive radio networks Fulltext Access 35 Pages 2018
Cooperative sensing for improved traffic efficiency: The highway field trial Fulltext Access 35 Pages 2018
Queue management for two-user cognitive radio with delay-constrained primary user Fulltext Access 35 Pages 2018
Characterisation and comparison of spatial patterns in urban systems: A case study of U.S. cities Fulltext Access 35 Pages 2018
A learning automata-based ensemble resource usage prediction algorithm for cloud computing environment Fulltext Access 35 Pages 2018
Improving network resources allocation in smart cities video surveillance Fulltext Access 35 Pages 2018
Cost optimization for deadline-aware scheduling of big-data processing jobs on clouds Fulltext Access 35 Pages 2018
Efficient auditing for shared data in the cloud with secure user revocation and computations outsourcing Fulltext Access 35 Pages 2018
Rise of spam and compromised accounts in online social networks: A state-of-the-art review of different combating approaches Fulltext Access 35 Pages 2018
A time synchronization protocol for large-scale distributed embedded systems with low-precision clocks and neighbor-to-neighbor communications Fulltext Access 35 Pages 2018
Doubling algorithms for stationary distributions of fluid queues: A probabilistic interpretation Fulltext Access 35 Pages 2018
A distributed multi-level model with dynamic replacement for the storage of smart edge computing Fulltext Access 35 Pages 2018
Quality of software requirements specification in agile projects: A cross-case analysis of six companies Fulltext Access 35 Pages 2018
Developing an integrated framework for using data mining techniques and ontology concepts for process improvement Fulltext Access 35 Pages 2018
Anomaly detection and diagnosis for cloud services: Practical experiments and lessons learned Fulltext Access 36 Pages 2018
Agile values or plan-driven aspects: Which factor contributes more toward the success of data warehousing, business intelligence, and analytics project development? Fulltext Access 36 Pages 2018
How does Facebook news use lead to actions in South Korea? The role of Facebook discussion network heterogeneity, political interest, and conflict avoidance in predicting political participation Fulltext Access 36 Pages 2018
To use or not to use ad blockers? The roles of knowledge of ad blockers and attitude toward online advertising Fulltext Access 36 Pages 2018
Efficient data perturbation for privacy preserving and accurate data stream mining Fulltext Access 36 Pages 2018
Incentives-based preferences and mobility-aware task assignment in participatory sensing systems Fulltext Access 36 Pages 2018
Combining heterogeneous anomaly detectors for improved software security Fulltext Access 36 Pages 2018
Performance analysis of underlay two-way relay cooperation in cognitive radio networks with energy harvesting Fulltext Access 36 Pages 2018
Shedding Light on the Dark Corners of the Internet: A Survey of Tor Research Fulltext Access 36 Pages 2018
Enforcing network policy in heterogeneous network function box environment Fulltext Access 36 Pages 2018
Online machine learning algorithms to predict link quality in community wireless mesh networks Fulltext Access 36 Pages 2018
Formal verification approaches and standards in the cloud computing: A comprehensive and systematic review Fulltext Access 36 Pages 2018
Dynamic effects of customer experience levels on durable product satisfaction: Price and popularity moderation Fulltext Access 36 Pages 2018
Wireless Sensor Networks in oil and gas industry: Recent advances, taxonomy, requirements, and open challenges Fulltext Access 36 Pages 2018
A survey of real-time approximate nearest neighbor query over streaming data for fog computing Fulltext Access 36 Pages 2018
Attribute-based cloud storage with secure provenance over encrypted data Fulltext Access 36 Pages 2018
Managing resources continuity from the edge to the cloud: Architecture and performance Fulltext Access 36 Pages 2018
Fuzzy adaptive cognitive stimulation therapy generation for Alzheimer's sufferers: Towards a pervasive dementia care monitoring platform Fulltext Access 36 Pages 2018
Tomogravity space based traffic matrix estimation in data center networks Fulltext Access 36 Pages 2018
Measuring stream processing systems adaptability under dynamic workloads Fulltext Access 36 Pages 2018
A novel fuzzy similarity measure and prevalence estimation approach for similarity profiled temporal association pattern mining Fulltext Access 36 Pages 2018
An event-extraction approach for business analysis from online Chinese news Fulltext Access 36 Pages 2018
Completely Automated Public Physical test to tell Computers and Humans Apart: A usability study on mobile devices Fulltext Access 36 Pages 2018
On minimizing total energy consumption in the scheduling of virtual machine reservations Fulltext Access 37 Pages 2018
Prerequisites between learning objects: Automatic extraction based on a machine learning approach Fulltext Access 37 Pages 2018
Multiple watermarking technique for securing online social network contents using Back Propagation Neural Network Fulltext Access 37 Pages 2018
Process mining and hierarchical clustering to help intrusion alert visualization Fulltext Access 37 Pages 2018
Optimization of live virtual machine migration in cloud computing: A survey and future directions Fulltext Access 37 Pages 2018
A multi-layered performance analysis for cloud-based topic detection and tracking in Big Data applications Fulltext Access 37 Pages 2018
An affective and Web 3.0-based learning environment for a programming language Fulltext Access 37 Pages 2018
Multi-source fusion-based security detection method for heterogeneous networks Fulltext Access 37 Pages 2018
Gamification for enhancing Web 2.0 based educational activities: The case of pre-service grade school teachers using educational Wiki pages Fulltext Access 37 Pages 2018
Understanding social viewing through discussion network and emotion: A focus on South Korean presidential debates Fulltext Access 37 Pages 2018
Quantum genetic algorithm based scheduler for batch of precedence constrained jobs on heterogeneous computing systems Fulltext Access 37 Pages 2018
A new design and implementation of hardware accelerator for line detection Fulltext Access 37 Pages 2018
Outage probability of non-orthogonal multiple access with partial relay selection over Nakagami-m fading channels Fulltext Access 37 Pages 2018
A smart artificial bee colony algorithm with distance-fitness-based neighbor search and its application Fulltext Access 37 Pages 2018
Event-based sensor data exchange and fusion in the Internet of Things environments Fulltext Access 37 Pages 2018
Dynamic allocation of power delivery paths in consolidated data centers based on adaptive UPS switching Fulltext Access 37 Pages 2018
Augmenting computing capabilities at the edge by jointly exploiting mobile devices: A survey Fulltext Access 37 Pages 2018
Improving the performance of hybrid multiple access scheme in millimeter wave wireless personal area networks Fulltext Access 37 Pages 2018
Fairness-constrained optimized time-window controllers for secondary-users with primary-user reliability guarantees Fulltext Access 37 Pages 2018
A visual programming environment for introducing distributed computing to secondary education Fulltext Access 37 Pages 2018
Realtime intrusion risk assessment model based on attack and service dependency graphs Fulltext Access 37 Pages 2018
Reproducing dynamics related to an Internet of Things framework: A numerical and statistical approach Fulltext Access 37 Pages 2018
A new risk-based authentication management model oriented on user's experience Fulltext Access 37 Pages 2018
A hierarchical framework for ad inventory allocation in programmatic advertising markets Fulltext Access 37 Pages 2018
Lightweight attribute based encryption scheme for mobile cloud assisted cyber-physical systems Fulltext Access 37 Pages 2018
Towards the multi-request mechanism in pull-based peer-to-peer live streaming systems Fulltext Access 37 Pages 2018
Structure aware resource estimation for effective scheduling and execution of data intensive workflows in cloud Fulltext Access 37 Pages 2018
Does social media use really make people politically polarized? Direct and indirect effects of social media use on political polarization in South Korea Fulltext Access 37 Pages 2018
Optimal deployment of heterogeneous sensor networks for a hybrid point and barrier coverage application Fulltext Access 37 Pages 2018
Unstructured big data analytics for retrieving e-commerce logistics knowledge Fulltext Access 37 Pages 2018
Drone delivery: Factors affecting the public's attitude and intention to adopt Fulltext Access 38 Pages 2018
Subscription price and advertising space decisions for online content firms with reference effect Fulltext Access 38 Pages 2018
Developing and using checklists to improve software effort estimation: A multi-case study Fulltext Access 38 Pages 2018
Attitude estimation for indoor navigation and augmented reality with smartphones Fulltext Access 38 Pages 2018
Low-power portable devices for metagenomics analysis: Fog computing makes bioinformatics ready for the Internet of Things Fulltext Access 38 Pages 2018
Coordinated actor model of self-adaptive track-based traffic control systems Fulltext Access 38 Pages 2018
Filtering irrelevant sequential data out of game session telemetry though similarity collapses Fulltext Access 38 Pages 2018
Single-pass based efficient erasable pattern mining using list data structure on dynamic incremental databases Fulltext Access 38 Pages 2018
Social collaborative service recommendation approach based on user's trust and domain-specific expertise Fulltext Access 38 Pages 2018
Rethink data dissemination in opportunistic mobile networks with mutually exclusive requirement Fulltext Access 38 Pages 2018
Provably secure group authentication and key agreement for machine type communication using Chebyshev's polynomial Fulltext Access 38 Pages 2018
Drone Cellular Networks: Enhancing the Quality Of Experience of video streaming applications Fulltext Access 38 Pages 2018