Secure and fine-grained access control on e-healthcare records in mobile cloud computing Fulltext Access 32 Pages 2018
An on-demand coverage based self-deployment algorithm for big data perception in mobile sensing networks Fulltext Access 32 Pages 2018
An optimization of virtual machine selection and placement by using memory content similarity for server consolidation in cloud Fulltext Access 32 Pages 2018
Image steganography using uncorrelated color space and its application for security of visual contents in online social networks Fulltext Access 32 Pages 2018
Cloud infrastructure provenance collection and management to reproduce scientific workflows execution Fulltext Access 32 Pages 2018
Resource provisioning for data-intensive applications with deadline constraints on hybrid clouds using Aneka Fulltext Access 32 Pages 2018
Consensus vote models for detecting and filtering neutrality in sentiment analysis Fulltext Access 32 Pages 2018
Joint consensus evaluation of multiple objects on an ordinal scale: An approach driven by monotonicity Fulltext Access 32 Pages 2018
Leveraging organizational climate theory for understanding industry-academia collaboration Fulltext Access 32 Pages 2018
An improved differential evolution algorithm using efficient adapted surrogate model for numerical optimization Fulltext Access 32 Pages 2018
Leveraging ontologies and machine-learning techniques for malware analysis into Android permissions ecosystems Fulltext Access 32 Pages 2018
A proposed model for solving fuzzy linear fractional programming problem: Numerical Point of View Fulltext Access 32 Pages 2018
A reducibility method for the weak linear bilevel programming problems and a case study in principal-agent Fulltext Access 33 Pages 2018
A deep heterogeneous feature fusion approach for automatic land-use classification Fulltext Access 33 Pages 2018
Software sustainability: Research and practice from a software architecture viewpoint Fulltext Access 33 Pages 2018
Socio evolution & learning optimization algorithm: A socio-inspired optimization methodology Fulltext Access 33 Pages 2018
Answering differentially private queries for continual datasets release Fulltext Access 33 Pages 2018
CHAIN: Developing model-driven contextual help for adaptive user interfaces Fulltext Access 33 Pages 2018
Recomposing conformance: Closing the circle on decomposed alignment-based conformance checking in process mining Fulltext Access 33 Pages 2018
Method based on the Laplace equations to reconstruct the river terrain for two-dimensional hydrodynamic numerical modeling Fulltext Access 33 Pages 2018
A survey towards an integration of big data analytics to big insights for value-creation Fulltext Access 33 Pages 2018
Exploiting lower bounds to accelerate approximate nearest neighbor search on high-dimensional data Fulltext Access 33 Pages 2018
Zero-day malware detection using transferred generative adversarial networks based on deep autoencoders Fulltext Access 33 Pages 2018
Reproducibility and replicability of software defect prediction studies Fulltext Access 33 Pages 2018
Exploring New Vista of intelligent collaborative filtering: A restaurant recommendation paradigm Fulltext Access 33 Pages 2018
A conceptual model of agile software development in a safety-critical context: A systematic literature review Fulltext Access 33 Pages 2018
Event-triggered network-based state observer design of positive systems Fulltext Access 33 Pages 2018
Image segmentation based on an active contour model of partial image restoration with local cosine fitting energy Fulltext Access 33 Pages 2018
A hybrid grey wolf optimizer and artificial bee colony algorithm for enhancing the performance of complex systems Fulltext Access 33 Pages 2018
Observer-based adaptive fuzzy output constrained control for uncertain nonlinear multi-agent systems Fulltext Access 33 Pages 2018
Mining maximal frequent patterns in transactional databases and dynamic data streams: A spark-based approach Fulltext Access 33 Pages 2018
Sparse representation based stereoscopic image quality assessment accounting for perceptual cognitive process Fulltext Access 33 Pages 2018
Priority assignment in queuing systems with unknown characteristics using learning automata and adaptive stochastic petri nets Fulltext Access 34 Pages 2018
Secure and efficient two-factor zero-knowledge authentication solution for access control systems Fulltext Access 34 Pages 2018
Anomaly intrusion detection method for vehicular networks based on survival analysis Fulltext Access 34 Pages 2018
Link prediction in stochastic social networks: Learning automata approach Fulltext Access 34 Pages 2018
Software engineering problems and their relationship to perceived learning and customer satisfaction on a software capstone project Fulltext Access 34 Pages 2018
Information extraction and knowledge graph construction from geoscience literature Fulltext Access 34 Pages 2018
Stakeholder quantification and prioritisation research: A systematic literature review Fulltext Access 34 Pages 2018
Decision support to product configuration considering component replenishment uncertainty: A stochastic programming approach Fulltext Access 34 Pages 2018
Criteria for Selecting Cloud Service Providers: A Delphi Study of Quality-of-Service Attributes Fulltext Access 34 Pages 2018
A valuation-based system approach for risk assessment of belief rule-based expert systems Fulltext Access 34 Pages 2018
Cloud computing based bushfire prediction for cyber-physical emergency applications Fulltext Access 34 Pages 2018
Survey of publicly available reports on advanced persistent threat actors Fulltext Access 34 Pages 2018
Inertial/magnetic sensors based pedestrian dead reckoning by means of multi-sensor fusion Fulltext Access 34 Pages 2018
Insensitive stochastic gradient twin support vector machines for large scale problems Fulltext Access 34 Pages 2018
Leveraging sentiment analysis at the aspects level to predict ratings of reviews Fulltext Access 34 Pages 2018
Enhancing social network privacy with accumulated non-zero prior knowledge Fulltext Access 34 Pages 2018
Effective lossless condensed representation and discovery of spatial co-location patterns Fulltext Access 34 Pages 2018
Don't just sign use brain too: A novel multimodal approach for user identification and verification Fulltext Access 34 Pages 2018
Understanding influence power of opinion leaders in e-commerce networks: An opinion dynamics theory perspective Fulltext Access 34 Pages 2018
A thin client friendly trusted execution framework for infrastructure-as-a-service clouds Fulltext Access 34 Pages 2018
Multi-spectral and panchromatic image fusion approach using stationary wavelet transform and swarm flower pollination optimization for remote sensing applications Fulltext Access 34 Pages 2018
Wireless Integrated Sensor Network: Boundary Intellect system for elephant detection via cognitive theory and Fuzzy Cognitive Maps Fulltext Access 34 Pages 2018
Using machine learning to optimize parallelism in big data applications Fulltext Access 34 Pages 2018
Profiling distributed graph processing systems through visual analytics Fulltext Access 34 Pages 2018
Software engineering process models for mobile app development: A systematic literature review Fulltext Access 35 Pages 2018
Approximating non-Gaussian Bayesian networks using minimum information vine model with applications in financial modelling Fulltext Access 35 Pages 2018
Internet-based self-monitoring interventions for overweight and obese adolescents: A systematic review and meta-analysis Fulltext Access 35 Pages 2018
A learning automata-based ensemble resource usage prediction algorithm for cloud computing environment Fulltext Access 35 Pages 2018
Cost optimization for deadline-aware scheduling of big-data processing jobs on clouds Fulltext Access 35 Pages 2018
Handling veracity in multi-criteria decision-making: A multi-dimensional approach Fulltext Access 35 Pages 2018
Remote sensing image magnification study based on the adaptive mixture diffusion model Fulltext Access 35 Pages 2018
Semi-supervised active learning for support vector machines: A novel approach that exploits structure information in data Fulltext Access 35 Pages 2018
Pareto-aware strategies for faster convergence in multi-objective multi-scale search optimization Fulltext Access 35 Pages 2018
Identifying people at risk of developing type 2 diabetes: A comparison of predictive analytics techniques and predictor variables Fulltext Access 35 Pages 2018
Automated deduction of cross-organizational collaborative business processes Fulltext Access 35 Pages 2018
Efficient auditing for shared data in the cloud with secure user revocation and computations outsourcing Fulltext Access 35 Pages 2018
Test case prioritization approaches in regression testing: A systematic literature review Fulltext Access 35 Pages 2018
Exploring the links between software development task type, team attitudes and task completion performance: Insights from the Jazz repository Fulltext Access 35 Pages 2018
Quality of software requirements specification in agile projects: A cross-case analysis of six companies Fulltext Access 35 Pages 2018
Software traceability in the automotive domain: Challenges and solutions Fulltext Access 35 Pages 2018
Selective bit embedding scheme for robust blind color image watermarking Fulltext Access 35 Pages 2018
An efficient multi-party scheme for privacy preserving collaborative filtering for healthcare recommender system Fulltext Access 35 Pages 2018
A new scripting library for modeling flow and transport in fractured rock with channel networks Fulltext Access 35 Pages 2018