Found: 81
Select item for more details and to access through your institution.
A novel approach for mobile malware classification and detection in Android systems.
- Published in:
- Multimedia Tools & Applications, 2019, v. 78, n. 3, p. 3529, doi. 10.1007/s11042-018-6498-z
- By:
- Publication type:
- Article
Building a mobile movie recommendation service by user rating and APP usage with linked data on Hadoop.
- Published in:
- Multimedia Tools & Applications, 2017, v. 76, n. 3, p. 3383, doi. 10.1007/s11042-016-3833-0
- By:
- Publication type:
- Article
EDFIDepth: enriched multi-path vision transformer feature interaction networks for monocular depth estimation.
- Published in:
- Journal of Supercomputing, 2024, v. 80, n. 14, p. 21023, doi. 10.1007/s11227-024-06205-7
- By:
- Publication type:
- Article
MWformer: a novel low computational cost image restoration algorithm.
- Published in:
- Journal of Supercomputing, 2024, v. 80, n. 14, p. 21508, doi. 10.1007/s11227-024-06160-3
- By:
- Publication type:
- Article
Retraction Note: Detecting straggler MapReduce tasks in big data processing infrastructure by neural network.
- Published in:
- 2024
- By:
- Publication type:
- Correction Notice
A cross-layered cluster embedding learning network with regularization for multivariate time series anomaly detection.
- Published in:
- Journal of Supercomputing, 2024, v. 80, n. 8, p. 10444, doi. 10.1007/s11227-023-05833-9
- By:
- Publication type:
- Article
MFCINet: multi-level feature and context information fusion network for RGB-D salient object detection.
- Published in:
- Journal of Supercomputing, 2024, v. 80, n. 2, p. 2487, doi. 10.1007/s11227-023-05561-0
- By:
- Publication type:
- Article
Correction to: Multi‑head attention‑based model for reconstructing continuous missing time series data.
- Published in:
- 2024
- By:
- Publication type:
- Correction Notice
A novel fuzzy control path planning algorithm for intelligent ship based on scale factors.
- Published in:
- Journal of Supercomputing, 2024, v. 80, n. 1, p. 202, doi. 10.1007/s11227-023-05438-2
- By:
- Publication type:
- Article
Multi-head attention-based model for reconstructing continuous missing time series data.
- Published in:
- Journal of Supercomputing, 2023, v. 79, n. 18, p. 20684, doi. 10.1007/s11227-023-05465-z
- By:
- Publication type:
- Article
Performance of representation fusion model for entity and relationship extraction within unstructured text.
- Published in:
- Journal of Supercomputing, 2023, v. 79, n. 18, p. 20826, doi. 10.1007/s11227-023-05442-6
- By:
- Publication type:
- Article
A blockchain-based secure storage and access control scheme for supply chain finance.
- Published in:
- Journal of Supercomputing, 2023, v. 79, n. 1, p. 109, doi. 10.1007/s11227-022-04655-5
- By:
- Publication type:
- Article
An energy-efficient task migration scheme based on genetic algorithms for mobile applications in CloneCloud.
- Published in:
- Journal of Supercomputing, 2021, v. 77, n. 5, p. 5220, doi. 10.1007/s11227-020-03470-0
- By:
- Publication type:
- Article
Detecting straggler MapReduce tasks in big data processing infrastructure by neural network.
- Published in:
- Journal of Supercomputing, 2020, v. 76, n. 9, p. 6969, doi. 10.1007/s11227-019-03136-6
- By:
- Publication type:
- Article
An energy-efficient dynamic decision model for wireless multi-sensor network.
- Published in:
- Journal of Supercomputing, 2020, v. 76, n. 3, p. 1585, doi. 10.1007/s11227-018-2419-1
- By:
- Publication type:
- Article
Improving the performance of feature selection and data clustering with novel global search and elite-guided artificial bee colony algorithm.
- Published in:
- Journal of Supercomputing, 2019, v. 75, n. 8, p. 5189, doi. 10.1007/s11227-019-02786-w
- By:
- Publication type:
- Article
Implications of shallower memory controller transaction queues in scalable memory systems.
- Published in:
- Journal of Supercomputing, 2016, v. 72, n. 5, p. 1785, doi. 10.1007/s11227-015-1485-x
- By:
- Publication type:
- Article
Last level cache size heterogeneity in embedded systems.
- Published in:
- Journal of Supercomputing, 2016, v. 72, n. 2, p. 503, doi. 10.1007/s11227-015-1576-8
- By:
- Publication type:
- Article
On design and formal verification of SNSP: a novel real-time communication protocol for safety-critical applications.
- Published in:
- Journal of Supercomputing, 2014, v. 69, n. 3, p. 1254, doi. 10.1007/s11227-014-1157-2
- By:
- Publication type:
- Article
Direction-aware resource discovery in large-scale distributed computing environments.
- Published in:
- Journal of Supercomputing, 2013, v. 66, n. 1, p. 229, doi. 10.1007/s11227-013-0899-6
- By:
- Publication type:
- Article
Efficient programming paradigm for video streaming processing on TILE64 platform.
- Published in:
- Journal of Supercomputing, 2013, v. 65, n. 2, p. 823, doi. 10.1007/s11227-012-0867-6
- By:
- Publication type:
- Article
Erratum to: XtratuM/PPC: a hypervisor for partitioned system on PowerPC processors.
- Published in:
- 2013
- By:
- Publication type:
- Correction notice
XtratuM/PPC: a hypervisor for partitioned system on PowerPC processors.
- Published in:
- Journal of Supercomputing, 2013, v. 63, n. 2, p. 593, doi. 10.1007/s11227-012-0833-3
- By:
- Publication type:
- Article
A novel strategy for building interoperable MPI environment in heterogeneous high performance systems.
- Published in:
- Journal of Supercomputing, 2012, v. 60, n. 1, p. 87, doi. 10.1007/s11227-009-0272-y
- By:
- Publication type:
- Article
A collaborative and open solution for large‐scale online learning.
- Published in:
- Computer Applications in Engineering Education, 2018, v. 26, n. 6, p. 2266, doi. 10.1002/cae.22040
- By:
- Publication type:
- Article
A localization algorithm for DV-Hop wireless sensor networks based on manhattan distance.
- Published in:
- Telecommunication Systems, 2022, v. 81, n. 2, p. 207, doi. 10.1007/s11235-022-00943-w
- By:
- Publication type:
- Article
A novel secure DV-Hop localization algorithm against wormhole attacks.
- Published in:
- Telecommunication Systems, 2022, v. 80, n. 3, p. 413, doi. 10.1007/s11235-022-00914-1
- By:
- Publication type:
- Article
Secured map reduce computing based on virtual machine using threshold secret sharing and group signature mechanisms in cloud computing environments.
- Published in:
- Telecommunication Systems, 2015, v. 60, n. 2, p. 303, doi. 10.1007/s11235-015-0031-8
- By:
- Publication type:
- Article
Foreword.
- Published in:
- Telecommunication Systems, 2013, v. 54, n. 1, p. 1, doi. 10.1007/s11235-013-9719-9
- By:
- Publication type:
- Article
An Efficient Two-Factor Authentication Scheme Based on the Merkle Tree.
- Published in:
- Sensors (14248220), 2020, v. 20, n. 20, p. 5735, doi. 10.3390/s20205735
- By:
- Publication type:
- Article
Recognition of Crop Diseases Based on Depthwise Separable Convolution in Edge Computing.
- Published in:
- Sensors (14248220), 2020, v. 20, n. 15, p. 4091, doi. 10.3390/s20154091
- By:
- Publication type:
- Article
SNPL: One Scheme of Securing Nodes in IoT Perception Layer.
- Published in:
- Sensors (14248220), 2020, v. 20, n. 4, p. 1090, doi. 10.3390/s20041090
- By:
- Publication type:
- Article
Distributed Reliable and Efficient Transmission Task Assignment for WSNs.
- Published in:
- Sensors (14248220), 2019, v. 19, n. 22, p. 5028, doi. 10.3390/s19225028
- By:
- Publication type:
- Article
Iterative Positioning Algorithm for Indoor Node Based on Distance Correction in WSNs.
- Published in:
- Sensors (14248220), 2019, v. 19, n. 22, p. 4871, doi. 10.3390/s19224871
- By:
- Publication type:
- Article
A Resource Allocation Mechanism Based on Weighted Efficiency Interference-Aware for D2D Underlaid Communication.
- Published in:
- Sensors (14248220), 2019, v. 19, n. 14, p. 3194, doi. 10.3390/s19143194
- By:
- Publication type:
- Article
Hausdorff Distance Model-Based Identity Authentication for IP Circuits in Service-Centric Internet-of-Things Environment†.
- Published in:
- Sensors (14248220), 2019, v. 19, n. 3, p. 487, doi. 10.3390/s19030487
- By:
- Publication type:
- Article
Cross-modality co-attention networks for visual question answering.
- Published in:
- Soft Computing - A Fusion of Foundations, Methodologies & Applications, 2021, v. 25, n. 7, p. 5411, doi. 10.1007/s00500-020-05539-7
- By:
- Publication type:
- Article
Sentiment classification model for Chinese micro-blog comments based on key sentences extraction.
- Published in:
- Soft Computing - A Fusion of Foundations, Methodologies & Applications, 2021, v. 25, n. 1, p. 463, doi. 10.1007/s00500-020-05160-8
- By:
- Publication type:
- Article
Wireless sensor network intrusion detection system based on MK-ELM.
- Published in:
- Soft Computing - A Fusion of Foundations, Methodologies & Applications, 2020, v. 24, n. 16, p. 12361, doi. 10.1007/s00500-020-04678-1
- By:
- Publication type:
- Article
On one-time cookies protocol based on one-time password.
- Published in:
- Soft Computing - A Fusion of Foundations, Methodologies & Applications, 2020, v. 24, n. 8, p. 5657, doi. 10.1007/s00500-019-04138-5
- By:
- Publication type:
- Article
Improving file locality in multi-keyword top-k search based on clustering.
- Published in:
- Soft Computing - A Fusion of Foundations, Methodologies & Applications, 2018, v. 22, n. 9, p. 3111, doi. 10.1007/s00500-018-3145-6
- By:
- Publication type:
- Article
Exploiting dynamic transaction queue size in scalable memory systems.
- Published in:
- Soft Computing - A Fusion of Foundations, Methodologies & Applications, 2018, v. 22, n. 6, p. 2065, doi. 10.1007/s00500-016-2470-x
- By:
- Publication type:
- Article
Fine-grained searchable encryption in multi-user setting.
- Published in:
- Soft Computing - A Fusion of Foundations, Methodologies & Applications, 2017, v. 21, n. 20, p. 6201, doi. 10.1007/s00500-016-2179-x
- By:
- Publication type:
- Article
DMRS: an efficient dynamic multi-keyword ranked search over encrypted cloud data.
- Published in:
- Soft Computing - A Fusion of Foundations, Methodologies & Applications, 2017, v. 21, n. 16, p. 4829, doi. 10.1007/s00500-017-2684-6
- By:
- Publication type:
- Article
An incentive mechanism for K-anonymity in LBS privacy protection based on credit mechanism.
- Published in:
- Soft Computing - A Fusion of Foundations, Methodologies & Applications, 2017, v. 21, n. 14, p. 3907, doi. 10.1007/s00500-016-2040-2
- By:
- Publication type:
- Article
Ensemble machine learning approaches for webshell detection in Internet of things environments.
- Published in:
- Transactions on Emerging Telecommunications Technologies, 2022, v. 33, n. 6, p. 1, doi. 10.1002/ett.4085
- By:
- Publication type:
- Article
DroidPortrait: Android Malware Portrait Construction Based on Multidimensional Behavior Analysis.
- Published in:
- Applied Sciences (2076-3417), 2020, v. 10, n. 11, p. 3978, doi. 10.3390/app10113978
- By:
- Publication type:
- Article
An Informative and Comprehensive Behavioral Characteristics Analysis Methodology of Android Application for Data Security in Brain-Machine Interfacing.
- Published in:
- Computational & Mathematical Methods in Medicine, 2020, p. 1, doi. 10.1155/2020/3658795
- By:
- Publication type:
- Article
LMCA: a lightweight anomaly network traffic detection model integrating adjusted mobilenet and coordinate attention mechanism for IoT.
- Published in:
- Telecommunication Systems, 2023, v. 84, n. 4, p. 549, doi. 10.1007/s11235-023-01059-5
- By:
- Publication type:
- Article
Foreword from Guest Editors.
- Published in:
- 2007
- By:
- Publication type:
- Editorial