Found: 14
Select item for more details and to access through your institution.
A Type Information Reconstruction Scheme Based on Long Short-Term Memory for Weakness Analysis in Binary File.
- Published in:
- International Journal of Software Engineering & Knowledge Engineering, 2018, v. 28, n. 9, p. 1267, doi. 10.1142/S0218194018400156
- By:
- Publication type:
- Article
Novel MAC Protocol and Middleware Designs for Wearable Sensor-Based Systems for Health Monitoring.
- Published in:
- International Journal of Distributed Sensor Networks, 2013, v. 9, n. 4, p. 1, doi. 10.1155/2013/404168
- By:
- Publication type:
- Article
A Conflict Avoidance Scheme for WiMedia Wireless Home Networks.
- Published in:
- International Journal of Distributed Sensor Networks, 2013, p. 1, doi. 10.1155/2013/579795
- By:
- Publication type:
- Article
Novel MAC Protocol and Middleware Designs for Wearable Sensor-Based Systems for Health Monitoring.
- Published in:
- International Journal of Distributed Sensor Networks, 2013, p. 1, doi. 10.1155/2013/404168
- By:
- Publication type:
- Article
An object expression system using depth-maps.
- Published in:
- Multimedia Tools & Applications, 2013, v. 63, n. 1, p. 247, doi. 10.1007/s11042-011-0955-2
- By:
- Publication type:
- Article
Software Weakness Detection in Solidity Smart Contracts Using Control and Data Flow Analysis: A Novel Approach with Graph Neural Networks.
- Published in:
- Electronics (2079-9292), 2024, v. 13, n. 16, p. 3162, doi. 10.3390/electronics13163162
- By:
- Publication type:
- Article
Decision tree construction on GPU: ubiquitous parallel computing approach.
- Published in:
- Computing, 2014, v. 96, n. 5, p. 403, doi. 10.1007/s00607-013-0343-z
- By:
- Publication type:
- Article
Offloading Method for Efficient Use of Local Computational Resources in Mobile Location-Based Services Using Clouds.
- Published in:
- Mobile Information Systems, 2017, p. 1, doi. 10.1155/2017/1856329
- By:
- Publication type:
- Article
Automatic Optimizer Generation Method Based on Location and Context Information to Improve Mobile Services.
- Published in:
- Mobile Information Systems, 2017, p. 1, doi. 10.1155/2017/2835163
- By:
- Publication type:
- Article
TREASURE: Text Mining Algorithm Based on Affinity Analysis and Set Intersection to Find the Action of Tuberculosis Drugs against Other Pathogens.
- Published in:
- Applied Sciences (2076-3417), 2021, v. 11, n. 15, p. 6834, doi. 10.3390/app11156834
- By:
- Publication type:
- Article
An Adaptive Offloading Method for an IoT-Cloud Converged Virtual Machine System Using a Hybrid Deep Neural Network.
- Published in:
- Sustainability (2071-1050), 2018, v. 10, n. 11, p. 3955, doi. 10.3390/su10113955
- By:
- Publication type:
- Article
Design and implementation of an IoT-cloud converged virtual machine system.
- Published in:
- Journal of Supercomputing, 2020, v. 76, n. 7, p. 5259, doi. 10.1007/s11227-019-02866-x
- By:
- Publication type:
- Article
Mapping granularity and performance tradeoffs for solid state drive.
- Published in:
- Journal of Supercomputing, 2013, v. 65, n. 2, p. 507, doi. 10.1007/s11227-012-0798-2
- By:
- Publication type:
- Article
A Study on Verification of CCTV Image Data through Unsupervised Learning Model of Deep Learning.
- Published in:
- Technical Journal / Tehnički Glasnik, 2023, v. 17, n. 3, p. 353, doi. 10.31803/tg-20221227094126
- By:
- Publication type:
- Article