An analysis of security systems for electronic information for establishing secure internet of things environments: Focusing on research trends in the security field in South Korea Fulltext Access 26 Pages 2018
Internet of agents framework for connected vehicles: A case study on distributed traffic control system Fulltext Access 26 Pages 2018
Memory resources aware run-time automated scheduling policy for multi-core systems Fulltext Access 26 Pages 2018
Moves like Jagger: Exploiting variations in instantaneous gait for spontaneous device pairing Fulltext Access 26 Pages 2018
Compulsory traceable ciphertext-policy attribute-based encryption against privilege abuse in fog computing Fulltext Access 26 Pages 2018
Wireless powered cooperative communications with direct links over correlated channels Fulltext Access 26 Pages 2018
Mobile application user behavior in the developing countries: A survey in Iran Fulltext Access 26 Pages 2018
A novel fault tolerant majority gate in quantum-dot cellular automata to create a revolution in design of fault tolerant nanostructures, with physical verification Fulltext Access 26 Pages 2018
Anomaly behavior detection and reliability assessment of control systems based on association rules Fulltext Access 26 Pages 2018
In-memory big data analytics under space constraints using dynamic programming Fulltext Access 27 Pages 2018
A robust and anonymous patient monitoring system using wireless medical sensor networks Fulltext Access 27 Pages 2018
A secure user authentication and key-agreement scheme using wireless sensor networks for agriculture monitoring Fulltext Access 27 Pages 2018
A multi-criteria detection scheme of collusive fraud organization for reputation aggregation in social networks Fulltext Access 27 Pages 2018
Scalable and secure access control policy update for outsourced big data Fulltext Access 27 Pages 2018
A scalable algorithm for simulating the structural plasticity of the brain Fulltext Access 27 Pages 2018
A hyper-heuristic cost optimisation approach for Scientific Workflow Scheduling in cloud computing Fulltext Access 27 Pages 2018
Harnessing sliding-window execution semantics for parallel stream processing Fulltext Access 27 Pages 2018
Smartphone based approximate localization using user highlighted texts from images Fulltext Access 27 Pages 2018
A low phase noise super-harmonic coupling quadrature VCO using an additional double frequency oscillator Fulltext Access 27 Pages 2018
Alternating server with non-zero switch-over times and opposite-queue threshold-based switching policy Fulltext Access 27 Pages 2018
Arcades: A deep model for adaptive decision making in voice controlled smart-home Fulltext Access 27 Pages 2018
Efficient algorithms for physical layer security in two-way relay systems Fulltext Access 27 Pages 2018
Generalized space modulation techniques: Hardware design and considerations Fulltext Access 28 Pages 2018
Context-Aware Multifaceted Trust Framework For Evaluating Trustworthiness of Cloud Providers Fulltext Access 28 Pages 2018
New scheduling approach using reinforcement learning for heterogeneous distributed systems Fulltext Access 28 Pages 2018
China's cybersecurity legislation, it's relevance to critical infrastructures and the challenges it faces Fulltext Access 28 Pages 2018
Marine depth mapping algorithm based on the edge computing in Internet of things Fulltext Access 28 Pages 2018
Scalable prediction-based online anomaly detection for smart meter data Fulltext Access 28 Pages 2018
Balancing flow table occupancy and link utilization in software-defined networks Fulltext Access 28 Pages 2018
Position based cryptography with location privacy: A step for Fog Computing Fulltext Access 28 Pages 2018
Keeping up with storage: Decentralized, write-enabled dynamic geo-replication Fulltext Access 28 Pages 2018
Attribute-based handshake protocol for mobile healthcare social networks Fulltext Access 28 Pages 2018
Paving the way towards high-level parallel pattern interfaces for data stream processing Fulltext Access 28 Pages 2018
Privacy-preserving wireless communications using bipartite matching in social big data Fulltext Access 28 Pages 2018
Lightweight chaotic image encryption algorithm for real-time embedded system: Implementation and analysis on 32-bit microcontroller Fulltext Access 29 Pages 2018
Combined pre-detection and sleeping for energy-efficient spectrum sensing in cognitive radio networks Fulltext Access 29 Pages 2018
Design of image steganographic architecture using quantum-dot cellular automata for secure nanocommunication networks Fulltext Access 29 Pages 2018
Optimization of dynamic spot-checking for collusion tolerance in grid computing Fulltext Access 29 Pages 2018
Using block copolymers as infiltration sites for development of future nanoelectronic devices: Achievements, barriers, and opportunities Fulltext Access 29 Pages 2018
Outdoor large-scale path loss characterization in an urban environment at 26, 28, 36, and 38 GHz Fulltext Access 29 Pages 2018
Evaluating the quality of a set of modelling languages used in combination: A method and a tool Fulltext Access 29 Pages 2018
Design and implementation of haptic virtual fixtures for preoperative surgical planning Fulltext Access 29 Pages 2018
Building web-based services for practical exercises in parallel and distributed computing Fulltext Access 29 Pages 2018
Real-time secure communication for Smart City in high-speed Big Data environment Fulltext Access 29 Pages 2018
Scalable parallel simulation of dynamical processes on large stochastic Kronecker graphs Fulltext Access 29 Pages 2018
Automated identification of shockable and non-shockable life-threatening ventricular arrhythmias using convolutional neural network Fulltext Access 29 Pages 2018
An efficient cost optimized scheduling for spot instances in heterogeneous cloud environment Fulltext Access 29 Pages 2018
Approaches for optimizing virtual machine placement and migration in cloud environments: A survey Fulltext Access 29 Pages 2018
Scheduling computation and communication on a software-defined photonic Network-on-Chip architecture for high-performance real-time systems Fulltext Access 29 Pages 2018
Shortest feasible paths with partial charging for battery-powered electric vehicles in smart cities Fulltext Access 30 Pages 2018
An analysis of players' personality type and preferences for game elements and mechanics Fulltext Access 30 Pages 2018
Enhanced connectivity index - A new measure for identifying critical points in urban public transportation networks Fulltext Access 30 Pages 2018
Cooperative data forwarding based on crowdsourcing in vehicular social networks Fulltext Access 30 Pages 2018
Improving random forests by neighborhood projection for effective text classification Fulltext Access 30 Pages 2018
Investment recommendation by discovering high-quality opinions in investor based social networks Fulltext Access 30 Pages 2018
A lightweight multi-layer authentication protocol for wireless body area networks Fulltext Access 30 Pages 2018
Optimizing security and quality of service in a real-time operating system using multi-objective Bat algorithm Fulltext Access 30 Pages 2018
Object-oriented convolutional features for fine-grained image retrieval in large surveillance datasets Fulltext Access 30 Pages 2018
Key-aggregate authentication cryptosystem for data sharing in dynamic cloud storage Fulltext Access 30 Pages 2018
A hybrid whale optimization algorithm based on local search strategy for the permutation flow shop scheduling problem Fulltext Access 30 Pages 2018
Modeling the Scalability of Real-Time Online Interactive Applications on Clouds Fulltext Access 30 Pages 2018
Implications of deep learning for the automation of design patterns organization Fulltext Access 30 Pages 2018
Incorporating both qualitative and quantitative preferences for service recommendation Fulltext Access 30 Pages 2018
Asymptotic performance evaluation of battery swapping and charging station for electric vehicles Fulltext Access 30 Pages 2018
Computing the expected makespan of task graphs in the presence of silent errors Fulltext Access 30 Pages 2018
Detection of seal and signature entities with hierarchical recovery based on watermark self embedding in tampered digital documents Fulltext Access 31 Pages 2018
Brownian Motus and Clustered Binary Insertion Sort methods: An efficient progress over traditional methods Fulltext Access 31 Pages 2018
A distributed image-retrieval method in multi-camera system of smart city based on cloud computing Fulltext Access 31 Pages 2018