Universal and secure object ownership transfer protocol for the Internet of Things Fulltext Access 18 Pages 2018
Fingers' vibration transmission and grip strength preservation performance of vibration reducing gloves Fulltext Access 18 Pages 2018
Design and hardware implementation of a security-enhanced elliptic curve cryptography based lightweight authentication scheme for smart grid communications Fulltext Access 19 Pages 2018
Spectrum bounds for the scattering number, integrity, tenacity of regular graphs Fulltext Access 19 Pages 2018
Service-aware adaptive link load balancing mechanism for Software-Defined Networking Fulltext Access 19 Pages 2018
Evaluation of spatial interaction techniques for virtual heritage applications: A case study of an interactive holographic projection Fulltext Access 19 Pages 2018
Virtual machine placement for elastic infrastructures in overbooked cloud computing datacenters under uncertainty Fulltext Access 19 Pages 2018
Deep Recurrent neural network vs. support vector machine for aspect-based sentiment analysis of Arabic hotels' reviews Fulltext Access 19 Pages 2018
Bi-level programming optimization method for cloud manufacturing service composition based on harmony search Fulltext Access 19 Pages 2018
Makespan reduction for dynamic workloads in cluster-based data grids using reinforcement-learning based scheduling Fulltext Access 19 Pages 2018
Barriers for implementation of successful change to prevent musculoskeletal disorders and how to systematically address them Fulltext Access 19 Pages 2018
Risk factors associated with self-reported musculoskeletal pain among short and long distance industrial gas delivery truck drivers Fulltext Access 19 Pages 2018
Measuring mental workload and physiological reactions in marine pilots: Building bridges towards redlines of performance Fulltext Access 19 Pages 2018
Non-technical individual skills are weakly connected to the maturity of agile practices Fulltext Access 19 Pages 2018
Fixing class design inconsistencies using self regulating particle swarm optimization Fulltext Access 19 Pages 2018
Do the informal & formal software modeling notations satisfy practitioners for software architecture modeling? Fulltext Access 19 Pages 2018
Makerspace in school-Considerations from a large-scale national testbed Fulltext Access 19 Pages 2018
Existential video games: Proposal and evaluation of an interactive reflection about death Fulltext Access 19 Pages 2018
Role of embodiment and presence in human perception of robots' facial cues Fulltext Access 19 Pages 2018
Machine learning based heterogeneous web advertisements detection using a diverse feature set Fulltext Access 19 Pages 2018
Osseous and digital subtraction angiography image fusion via various enhancement schemes and Laplacian pyramid transformations Fulltext Access 20 Pages 2018
Congestion-aware core mapping for Network-on-Chip based systems using betweenness centrality Fulltext Access 20 Pages 2018
Attention allocation for human multi-robot control: Cognitive analysis based on behavior data and hidden states Fulltext Access 20 Pages 2018
Physically based optical parameter database obtained from real materials for real-time material rendering Fulltext Access 20 Pages 2018
On expediency of Closed Asynchronous Dynamic Cellular Learning Automata Fulltext Access 20 Pages 2018
Massively parallel simulations of neurovascular coupling with extracellular diffusion Fulltext Access 20 Pages 2018
A cascade information diffusion based label propagation algorithm for community detection in dynamic social networks Fulltext Access 20 Pages 2018
Software Defined Network-based control system for an efficient traffic management for emergency situations in smart cities Fulltext Access 20 Pages 2018
Energy efficient and load balanced priority queue algorithm for Wireless Body Area Network Fulltext Access 20 Pages 2018
What happened to my application? Helping end users comprehend evolution through variation management Fulltext Access 20 Pages 2018
An autonomic resource provisioning approach for service-based cloud applications: A hybrid approach Fulltext Access 20 Pages 2018
Big data analysis for brain tumor detection: Deep convolutional neural networks Fulltext Access 20 Pages 2018
Toward service selection for workflow reconfiguration:An interface-based computing solution Fulltext Access 20 Pages 2018
Low illumination underwater light field images reconstruction using deep convolutional neural networks Fulltext Access 20 Pages 2018
Duplex output software effort estimation model with self-guided interpretation Fulltext Access 20 Pages 2018
Systematic literature review on agile practices in global software development Fulltext Access 20 Pages 2018
How block-based, text-based, and hybrid block/text modalities shape novice programming practices Fulltext Access 20 Pages 2018
Physical computing with plug-and-play toolkits:Key recommendations for collaborative learning implementations Fulltext Access 21 Pages 2018
Socializers, achievers or both? Value-based roles of children in technology design projects Fulltext Access 21 Pages 2018
An effective computational technique for taxonomic position of security vulnerability in software development Fulltext Access 21 Pages 2018
A privacy-preserving mobile application recommender system based on trust evaluation Fulltext Access 21 Pages 2018
Rethinking children's roles in Participatory Design: The child as a process designer Fulltext Access 21 Pages 2018
A two-stage locality-sensitive hashing based approach for privacy-preserving mobile service recommendation in cross-platform edge environment Fulltext Access 21 Pages 2018
A Cloud-based platform for the emulation of complex cybersecurity scenarios Fulltext Access 21 Pages 2018
A parallel self-organizing overlapping community detection algorithm based on swarm intelligence for large scale complex networks Fulltext Access 21 Pages 2018
Partitioning big graph with respect to arbitrary proportions in a streaming manner Fulltext Access 21 Pages 2018
Game theory-based Security Vulnerability Quantification for Social Internet of Things Fulltext Access 21 Pages 2018
A hybrid quantum-induced swarm intelligence clustering for the urban trip recommendation in smart city Fulltext Access 21 Pages 2018
A pattern-based approach for developing creativity applications supported by surface computing Fulltext Access 21 Pages 2018
Towards a service-oriented cyber-physical systems of systems for smart city mobility applications Fulltext Access 21 Pages 2018
Experimental and quantitative analysis of server power model for cloud data centers Fulltext Access 21 Pages 2018
Distributed data-driven platform for urgent decision making in cardiological ambulance control Fulltext Access 21 Pages 2018
Advance reservation access control using software-defined networking and tokens Fulltext Access 21 Pages 2018
How to ask for technical help? Evidence-based guidelines for writing questions on Stack Overflow Fulltext Access 22 Pages 2018
Analyzing scientific context of researchers and communities by using complex network and semantic technologies Fulltext Access 22 Pages 2018
Sentiment analysis of Chinese micro-blog text based on extended sentiment dictionary Fulltext Access 22 Pages 2018
A Mixed Reality neighborhood tour: Understanding visitor experience and perceptions Fulltext Access 22 Pages 2018
Congestion control in high-speed lossless data center networks: A survey Fulltext Access 22 Pages 2018
Subject-independent hand gesture recognition using normalization and machine learning algorithms Fulltext Access 22 Pages 2018
A unified face identification and resolution scheme using cloud computing in Internet of Things Fulltext Access 22 Pages 2018
Eagle+: A fast incremental approach to automaton and table online updates for cloud services Fulltext Access 22 Pages 2018
Designing mobile based computational support for low-literate community health workers Fulltext Access 22 Pages 2018
An experimental case study on the relationship between workload and resource consumption in a commercial web server Fulltext Access 22 Pages 2018
Cost-aware optimal data allocations for multiple dimensional heterogeneous memories using dynamic programming in big data Fulltext Access 22 Pages 2018
Anomaly-based intrusion detection system through feature selection analysis and building hybrid efficient model Fulltext Access 22 Pages 2018
Dendron : Genetic trees driven rule induction for network intrusion detection systems Fulltext Access 23 Pages 2018
A look-up table method based on unstructured grids and its application to non-ideal compressible fluid dynamic simulations Fulltext Access 23 Pages 2018
Multi-criteria based zone head selection in Internet of Things based wireless sensor networks Fulltext Access 23 Pages 2018
Privacy-preserving deduplication of encrypted data with dynamic ownership management in fog computing Fulltext Access 23 Pages 2018
Big data driven outlier detection for soybean straw near infrared spectroscopy Fulltext Access 23 Pages 2018