Speed-accuracy tradeoff of fingertip force control with visual/audio/haptic feedback Fulltext Access 23 Pages 2018
Multi-criteria based zone head selection in Internet of Things based wireless sensor networks Fulltext Access 23 Pages 2018
RINGA: Design and verification of finite state machine for self-adaptive software at runtime Fulltext Access 23 Pages 2018
Research on access control model of social network based on distributed logic Fulltext Access 23 Pages 2018
A look-up table method based on unstructured grids and its application to non-ideal compressible fluid dynamic simulations Fulltext Access 23 Pages 2018
An intelligent real-time cyber-physical toolset for energy and process prediction and optimisation in the future industrial Internet of Things Fulltext Access 23 Pages 2018
Dendron : Genetic trees driven rule induction for network intrusion detection systems Fulltext Access 23 Pages 2018
Big data driven outlier detection for soybean straw near infrared spectroscopy Fulltext Access 23 Pages 2018
Privacy-preserving deduplication of encrypted data with dynamic ownership management in fog computing Fulltext Access 23 Pages 2018
Fog-cloud based cyber-physical system for distinguishing, detecting and preventing mosquito borne diseases Fulltext Access 23 Pages 2018
A novel process-based association rule approach through maximal frequent itemsets for big data processing Fulltext Access 24 Pages 2018
Modeling of cross-disciplinary collaboration for potential field discovery and recommendation based on scholarly big data Fulltext Access 24 Pages 2018
Design and evaluation of military geographical intelligence system: An ergonomics case study Fulltext Access 24 Pages 2018
Design of four-band multispectral imaging system with one single-sensor Fulltext Access 24 Pages 2018
Performance prediction model for cloud service selection from smart data Fulltext Access 24 Pages 2018
Evolutionary radial basis function network for gestational diabetes data analytics Fulltext Access 24 Pages 2018
FAMOUS: Forensic Analysis of MObile devices Using Scoring of application permissions Fulltext Access 24 Pages 2018
An improved multi-cores parallel artificial Bee colony optimization algorithm for parameters calibration of hydrological model Fulltext Access 24 Pages 2018
Exploring the potential of a mobile eye tracker as an intuitive indoor pointing device: A case study in cultural heritage Fulltext Access 24 Pages 2018
A fast heuristic detection algorithm for visualizing structure of large community Fulltext Access 24 Pages 2018
Multimodel agent-based simulation environment for mass-gatherings and pedestrian dynamics Fulltext Access 24 Pages 2018
A novel face recognition algorithm via weighted kernel sparse representation Fulltext Access 24 Pages 2018
Storage tier-aware replicative data reorganization with prioritization for efficient workload processing Fulltext Access 24 Pages 2018
Towards a scenario-based solution for extreme metocean event simulation applying urgent computing Fulltext Access 24 Pages 2018
Innovation Initiatives in Large Software Companies: A Systematic Mapping Study Fulltext Access 24 Pages 2018
Image-type representation: A preliminary study on preferences of users with intellectual disabilities Fulltext Access 24 Pages 2018
Orchestrating experts' assumptions and children's values in the design of Virtual Heritage experiences Fulltext Access 24 Pages 2018
How do you feel about learning to code? Investigating the effect of children's attitudes towards coding using eye-tracking Fulltext Access 24 Pages 2018
Procedural feature generation for volumetric terrains using voxel grammars Fulltext Access 24 Pages 2018
Building predictive models of emotion with functional near-infrared spectroscopy Fulltext Access 24 Pages 2018
A view to a click: Pupil size changes as input command in eyes-only human-computer interaction Fulltext Access 24 Pages 2018
A cross layer protocol for traffic management in Social Internet of Vehicles Fulltext Access 25 Pages 2018
A computer simulation of traffic flow with on-street parking and drivers' behaviour based on cellular automata and a multi-agent system Fulltext Access 25 Pages 2018
Evaluating touch-screen vibration modality for blind users to access simple shapes and graphics Fulltext Access 25 Pages 2018
A novel crowd evaluation method for security and trustworthiness of online social networks platforms based on signaling theory Fulltext Access 25 Pages 2018
Understanding the role of culture and cultural attributes in digital game localization Fulltext Access 25 Pages 2018
Co-designing with children a collaborative augmented reality book based on a primary school textbook Fulltext Access 25 Pages 2018
Searching for violation of safety and liveness properties using knowledge discovery in complex systems specified through graph transformations Fulltext Access 25 Pages 2018
An architecture, system engineering, and acquisition approach for space system software resiliency Fulltext Access 25 Pages 2018
The use of artificial neural networks for extracting actions and actors from requirements document Fulltext Access 25 Pages 2018
Predicting host CPU utilization in the cloud using evolutionary neural networks Fulltext Access 25 Pages 2018
Energy and connectivity aware resource optimization of nodes traffic distribution in smart home networks Fulltext Access 25 Pages 2018
A novel deep learning method for aircraft landing speed prediction based on cloud-based sensor data Fulltext Access 25 Pages 2018
A security authorization scheme for smart home Internet of Things devices Fulltext Access 25 Pages 2018
A deep Recurrent Neural Network based approach for Internet of Things malware threat hunting Fulltext Access 25 Pages 2018
Efficient and robust attribute-based encryption supporting access policy hiding in Internet of Things Fulltext Access 25 Pages 2018
Dynamic fine-tuning stacked auto-encoder neural network for weather forecast Fulltext Access 25 Pages 2018
Analyzing data flow diagrams by combination of formal methods and visualization techniques Fulltext Access 26 Pages 2018
Parameterization of triangulated surface meshes based on constraints of distortion energy optimization Fulltext Access 26 Pages 2018
Multi-objective regression test selection in practice: An empirical study in the defense software industry Fulltext Access 26 Pages 2018
An Agent-based Spatial Urban Social Network Generator: A Case Study of Beijing, China Fulltext Access 26 Pages 2018
An empirical study on catalog of non-functional requirement templates: Usefulness and maintenance issues Fulltext Access 26 Pages 2018
Compulsory traceable ciphertext-policy attribute-based encryption against privilege abuse in fog computing Fulltext Access 26 Pages 2018
An elliptic curve cryptography based lightweight authentication scheme for smart grid communication Fulltext Access 26 Pages 2018
An analysis of security systems for electronic information for establishing secure internet of things environments: Focusing on research trends in the security field in South Korea Fulltext Access 26 Pages 2018
Supporting scientific modeling through curriculum-based making in elementary school science classes Fulltext Access 26 Pages 2018
Technical debt and agile software development practices and processes: An industry practitioner survey Fulltext Access 27 Pages 2018
Scalable and secure access control policy update for outsourced big data Fulltext Access 27 Pages 2018
A large-scale empirical study on the lifecycle of code smell co-occurrences Fulltext Access 27 Pages 2018
A hyper-heuristic cost optimisation approach for Scientific Workflow Scheduling in cloud computing Fulltext Access 27 Pages 2018
A secure user authentication and key-agreement scheme using wireless sensor networks for agriculture monitoring Fulltext Access 27 Pages 2018
In-memory big data analytics under space constraints using dynamic programming Fulltext Access 27 Pages 2018
A robust and anonymous patient monitoring system using wireless medical sensor networks Fulltext Access 27 Pages 2018
A multi-criteria detection scheme of collusive fraud organization for reputation aggregation in social networks Fulltext Access 27 Pages 2018
Analysis of publication activity of computational science society in 2001-2017 using topic modelling and graph theory Fulltext Access 27 Pages 2018
A perceptual and behavioral analysis of facial cues to deception in interactions between children and a virtual agent Fulltext Access 28 Pages 2018
Position based cryptography with location privacy: A step for Fog Computing Fulltext Access 28 Pages 2018
Recruitment, engagement and feedback in empirical software engineering studies in industrial contexts Fulltext Access 28 Pages 2018
A business model for commercial open source software: A systematic literature review Fulltext Access 28 Pages 2018
Balancing flow table occupancy and link utilization in software-defined networks Fulltext Access 28 Pages 2018
Paving the way towards high-level parallel pattern interfaces for data stream processing Fulltext Access 28 Pages 2018
Typeface size and weight and word location influence on relative size judgments in tag clouds Fulltext Access 28 Pages 2018
Keeping up with storage: Decentralized, write-enabled dynamic geo-replication Fulltext Access 28 Pages 2018
Context-Aware Multifaceted Trust Framework For Evaluating Trustworthiness of Cloud Providers Fulltext Access 28 Pages 2018
Multivariate fault detection and classification using interval principal component analysis Fulltext Access 28 Pages 2018