Found: 32
Select item for more details and to access through your institution.
VRKSHA: a novel tree structure for time-profiled temporal association mining.
- Published in:
- Neural Computing & Applications, 2020, v. 32, n. 21, p. 16337, doi. 10.1007/s00521-018-3776-7
- By:
- Publication type:
- Article
Secure Communication: A Proposed Public Key Watermark System.
- Published in:
- International Journal of Information Security & Privacy, 2013, v. 7, n. 4, p. 1, doi. 10.4018/ijisp.2013100101
- By:
- Publication type:
- Article
A novel fuzzy gaussian-based dissimilarity measure for discovering similarity temporal association patterns.
- Published in:
- Soft Computing - A Fusion of Foundations, Methodologies & Applications, 2018, v. 22, n. 6, p. 1903, doi. 10.1007/s00500-016-2445-y
- By:
- Publication type:
- Article
Towards SLA-Driven Autoscaling of Cloud Distributed Services for Mobile Communications.
- Published in:
- Mobile Information Systems, 2022, v. 2022, p. 1, doi. 10.1155/2022/3725657
- By:
- Publication type:
- Article
The Paternity of the Modern Computer.
- Published in:
- Foundations of Science, 2022, v. 27, n. 3, p. 1029, doi. 10.1007/s10699-021-09797-y
- By:
- Publication type:
- Article
Hybrid Real-Time Protection System for Online Social Networks.
- Published in:
- Foundations of Science, 2020, v. 25, n. 4, p. 1095, doi. 10.1007/s10699-019-09595-7
- By:
- Publication type:
- Article
Ultimate: Unearthing Latent Time Profiled Temporal Associations.
- Published in:
- Foundations of Science, 2020, v. 25, n. 4, p. 1147, doi. 10.1007/s10699-019-09594-8
- By:
- Publication type:
- Article
Krishna Sudarsana—A Z-Space Interest Measure for Mining Similarity Profiled Temporal Association Patterns.
- Published in:
- Foundations of Science, 2020, v. 25, n. 4, p. 1027, doi. 10.1007/s10699-019-09590-y
- By:
- Publication type:
- Article
Special Issue on the Foundations of Software Science and Computation Structures.
- Published in:
- 2020
- By:
- Publication type:
- Editorial
Special issue on "advances in visual analytics and mining visual data".
- Published in:
- Expert Systems, 2020, v. 37, n. 5, p. 1, doi. 10.1111/exsy.12607
- By:
- Publication type:
- Article
Searching and Generating Authoring Information: A Hybrid Approach.
- Published in:
- International Journal of Information Technology & Web Engineering, 2011, v. 6, n. 3, p. 1, doi. 10.4018/jitwe.2011070101
- By:
- Publication type:
- Article
The real-time hand and object recognition for virtual interaction.
- Published in:
- PeerJ Computer Science, 2024, p. 1, doi. 10.7717/peerj-cs.2110
- By:
- Publication type:
- Article
DEVELOPMENT OF CONTROL SOFTWARE FOR SELFORGANIZING INTELLIGENT MOBILE ROBOTS.
- Published in:
- Eastern-European Journal of Enterprise Technologies, 2023, v. 122, n. 9, p. 46, doi. 10.15587/1729-4061.2023.277840
- By:
- Publication type:
- Article
From SLA to vendor‐neutral metrics: An intelligent knowledge‐based approach for multi‐cloud SLA‐based broker.
- Published in:
- International Journal of Intelligent Systems, 2022, v. 37, n. 12, p. 10533, doi. 10.1002/int.22638
- By:
- Publication type:
- Article
A visual big data system for the prediction of weather-related variables: Jordan-Spain case study.
- Published in:
- Multimedia Tools & Applications, 2023, v. 82, n. 9, p. 13103, doi. 10.1007/s11042-020-09848-9
- By:
- Publication type:
- Article
ASTRA - A Novel interest measure for unearthing latent temporal associations and trends through extending basic gaussian membership function.
- Published in:
- Multimedia Tools & Applications, 2019, v. 78, n. 4, p. 4217, doi. 10.1007/s11042-017-5280-y
- By:
- Publication type:
- Article
A multithreaded programming approach for multimedia big data: encryption system.
- Published in:
- Multimedia Tools & Applications, 2018, v. 77, n. 9, p. 10997, doi. 10.1007/s11042-017-4873-9
- By:
- Publication type:
- Article
Using Multiple RPL Instances to Enhance the Performance of New 6G and Internet of Everything (6G/IoE)-Based Healthcare Monitoring Systems.
- Published in:
- Mobile Networks & Applications, 2021, v. 26, n. 3, p. 952, doi. 10.1007/s11036-020-01662-9
- By:
- Publication type:
- Article
EDITORIAL.
- Published in:
- 2017
- By:
- Publication type:
- Editorial
A Semantic Data Validation Service for Web Applications.
- Published in:
- Journal of Theoretical & Applied Electronic Commerce Research, 2010, v. 5, n. 1, p. 39, doi. 10.4067/S0718-18762010000100005
- By:
- Publication type:
- Article
A Conceptual Security Framework for Cloud Computing Issues.
- Published in:
- International Journal of Intelligent Information Technologies, 2016, v. 12, n. 2, p. 12, doi. 10.4018/IJIIT.2016040102
- By:
- Publication type:
- Article
A resource-efficient encryption algorithm for multimedia big data.
- Published in:
- Multimedia Tools & Applications, 2017, v. 76, n. 21, p. 22703, doi. 10.1007/s11042-016-4333-y
- By:
- Publication type:
- Article
GARUDA: Gaussian dissimilarity measure for feature representation and anomaly detection in Internet of things.
- Published in:
- Journal of Supercomputing, 2020, v. 76, n. 6, p. 4376, doi. 10.1007/s11227-018-2397-3
- By:
- Publication type:
- Article
METHOD OF COORDINATION OF MOTION OF SWARM ROBOTIC SYSTEMS.
- Published in:
- Scientific Journal of Astana IT University, 2023, v. 13, p. 76, doi. 10.37943/13FEUH2535
- By:
- Publication type:
- Article
Towards the Maturity of Object- Relational Database Technology: Promises and Reality.
- Published in:
- International Journal of Technology Diffusion, 2015, v. 6, n. 4, p. 1, doi. 10.4018/IJTD.2015100101
- By:
- Publication type:
- Article
Testing and Evaluation of a Secure Integrity Measurement System (SIMS) for Remote Systems.
- Published in:
- International Arab Journal of Information Technology (IAJIT), 2012, v. 9, n. 3, p. 235
- By:
- Publication type:
- Article
Pedagogical Indexed Arabic Text in Cloud E-Learning System.
- Published in:
- International Journal of Cloud Applications & Computing, 2017, v. 7, n. 1, p. 32, doi. 10.4018/IJCAC.2017010102
- By:
- Publication type:
- Article
A Secure Data Transmission Mechanism for Cloud Outsourced Data.
- Published in:
- International Journal of Cloud Applications & Computing, 2013, v. 3, n. 1, p. 34, doi. 10.4018/ijcac.2013010104
- By:
- Publication type:
- Article
Cloud Security Engineering: Avoiding Security Threats the Right Way.
- Published in:
- International Journal of Cloud Applications & Computing, 2011, v. 1, n. 2, p. 64, doi. 10.4018/ijcac.2011040105
- By:
- Publication type:
- Article
Integration of Wireless Technologies in Smart University Campus Environment: Framework Architecture.
- Published in:
- International Journal of Information & Communication Technology Education, 2015, v. 11, n. 1, p. 60, doi. 10.4018/ijicte.2015010104
- By:
- Publication type:
- Article
Particularities of data mining in medicine: lessons learned from patient medical time series data analysis.
- Published in:
- EURASIP Journal on Wireless Communications & Networking, 2019, v. 2019, n. 1, p. N.PAG, doi. 10.1186/s13638-019-1582-2
- By:
- Publication type:
- Article
An Analysis of Covid-19 Vaccine Allergic Reactions.
- Published in:
- Journal of International Technology & Information Management, 2021, v. 30, n. 4, p. 24, doi. 10.58729/1941-6679.1521
- By:
- Publication type:
- Article