Found: 54
Select item for more details and to access through your institution.
Image indexing and retrieval using an ART-2A neural network architecture.
- Published in:
- International Journal of Imaging Systems & Technology, 2008, v. 18, n. 2/3, p. 202
- By:
- Publication type:
- Article
Towards a Performance-Based Resource Server Access Control in Future Grid Communication Environments.
- Published in:
- Wireless Personal Communications, 2009, v. 51, n. 1, p. 209, doi. 10.1007/s11277-008-9601-3
- By:
- Publication type:
- Article
Evolvable hardware design based on a novel simulated annealing in an embedded system.
- Published in:
- Concurrency & Computation: Practice & Experience, 2012, v. 24, n. 4, p. 354, doi. 10.1002/cpe.1604
- By:
- Publication type:
- Article
Special Issue: Advances in High-Performance Computing and Communications.
- Published in:
- Concurrency & Computation: Practice & Experience, 2010, v. 22, n. 4, p. 395, doi. 10.1002/cpe.1561
- By:
- Publication type:
- Article
A sustainable heuristic QoS routing algorithm for pervasive multi-layered satellite wireless networks.
- Published in:
- Wireless Networks (10220038), 2010, v. 16, n. 6, p. 1657, doi. 10.1007/s11276-009-0220-z
- By:
- Publication type:
- Article
Security, Privacy, and Applications in Mobile Healthcare.
- Published in:
- 2015
- By:
- Publication type:
- Editorial
Secure and Energy-Efficient Data Collection in Wireless Sensor Networks.
- Published in:
- International Journal of Distributed Sensor Networks, 2013, p. 1, doi. 10.1155/2013/565076
- By:
- Publication type:
- Article
SPECIAL SECTION ON EMBEDDED SYSTEM AND SOFTWARE FOR IPC GUEST EDITORIAL.
- Published in:
- Intelligent Automation & Soft Computing, 2009, v. 15, n. 3, p. 465, doi. 10.1080/10798587.2009.10643042
- By:
- Publication type:
- Article
Enhancing challenge-based collaborative intrusion detection networks against insider attacks using blockchain.
- Published in:
- International Journal of Information Security, 2020, v. 19, n. 3, p. 279, doi. 10.1007/s10207-019-00462-x
- By:
- Publication type:
- Article
Special issue on big data intelligence in communication systems.
- Published in:
- International Journal of Communication Systems, 2018, v. 31, n. 16, p. N.PAG, doi. 10.1002/dac.3800
- By:
- Publication type:
- Article
Editorial for the special issue on heterogeneous sensors-based object identification and information fusion.
- Published in:
- 2017
- By:
- Publication type:
- Editorial
Key technologies for 5G, the next generation of mobile networks and services.
- Published in:
- 2016
- By:
- Publication type:
- Editorial
A nodes scheduling model based on Markov chain prediction for big streaming data analysis.
- Published in:
- International Journal of Communication Systems, 2015, v. 28, n. 9, p. 1610, doi. 10.1002/dac.2779
- By:
- Publication type:
- Article
Complex communication networks.
- Published in:
- 2014
- By:
- Publication type:
- Editorial
Advanced communication systems for enhanced big data technology and applications.
- Published in:
- 2014
- By:
- Publication type:
- Editorial
Dynamic intelligence towards smart and green world.
- Published in:
- 2014
- By:
- Publication type:
- Editorial
Internet of Things.
- Published in:
- International Journal of Communication Systems, 2012, v. 25, n. 9, p. 1101, doi. 10.1002/dac.2417
- By:
- Publication type:
- Article
Efficient temporal error concealment algorithm for H.264/AVC inter frame decoding.
- Published in:
- International Journal of Communication Systems, 2011, v. 24, n. 10, p. 1282, doi. 10.1002/dac.1193
- By:
- Publication type:
- Article
An energy-efficient scheme in next-generation sensor networks.
- Published in:
- International Journal of Communication Systems, 2010, v. 23, n. 9/10, p. 1189, doi. 10.1002/dac.1095
- By:
- Publication type:
- Article
Deep learning and SVM-based emotion recognition from Chinese speech for smart affective services.
- Published in:
- Software: Practice & Experience, 2017, v. 47, n. 8, p. 1127, doi. 10.1002/spe.2487
- By:
- Publication type:
- Article
Resource requests prediction in the cloud computing environment with a deep belief network.
- Published in:
- Software: Practice & Experience, 2017, v. 47, n. 3, p. 473, doi. 10.1002/spe.2426
- By:
- Publication type:
- Article
A Resilient and Scalable Flocking Scheme in Autonomous Vehicular Networks.
- Published in:
- Mobile Networks & Applications, 2010, v. 15, n. 1, p. 126, doi. 10.1007/s11036-009-0168-3
- By:
- Publication type:
- Article
Advanced Mathematics and Numerical Modeling of IoT.
- Published in:
- Journal of Applied Mathematics, 2015, v. 2015, p. 1, doi. 10.1155/2015/824891
- By:
- Publication type:
- Article
A survey on communication and data management issues in mobile sensor networks.
- Published in:
- Wireless Communications & Mobile Computing, 2014, v. 14, n. 1, p. 19, doi. 10.1002/wcm.1219
- By:
- Publication type:
- Article
Optimal fault-tolerant broadcasting in wireless mesh networks.
- Published in:
- Wireless Communications & Mobile Computing, 2011, v. 11, n. 5, p. 610, doi. 10.1002/wcm.718
- By:
- Publication type:
- Article
Editorial for the special issue on big time series data.
- Published in:
- 2020
- By:
- Publication type:
- Editorial
Security, Privacy, and Trust for Cyber-Physical-Social Systems.
- Published in:
- Security & Communication Networks, 2019, p. 1, doi. 10.1155/2019/2964673
- By:
- Publication type:
- Article
A NOVEL SPECTRUM OF EPOCH CONVERGENT CONGESTION CONTROL.
- Published in:
- Journal of Interconnection Networks, 2008, v. 9, n. 4, p. 425, doi. 10.1142/S0219265908002369
- By:
- Publication type:
- Article
Smallest Number of Sensors for k-Covering.
- Published in:
- International Journal of Computers, Communications & Control, 2013, v. 8, n. 2, p. 312, doi. 10.15837/ijccc.2013.2.311
- By:
- Publication type:
- Article
COSR: A Reputation-Based Secure Route Protocol in MANET.
- Published in:
- EURASIP Journal on Wireless Communications & Networking, 2010, p. 1, doi. 10.1155/2010/258935
- By:
- Publication type:
- Article
Internet of Everything.
- Published in:
- Mobile Information Systems, 2017, p. 1, doi. 10.1155/2017/8035421
- By:
- Publication type:
- Article
Pervasive Health Care Services and Technologies.
- Published in:
- International Journal of Telemedicine & Applications, 2008, p. 1, doi. 10.1155/2008/946082
- By:
- Publication type:
- Article
Implementation and performance analysis of multilevel security system in pervasive computing environment.
- Published in:
- Journal of Supercomputing, 2013, v. 66, n. 3, p. 1243, doi. 10.1007/s11227-011-0732-z
- By:
- Publication type:
- Article
A subcarrier modulation based optical wireless communication system employing transmission diversity.
- Published in:
- Journal of Supercomputing, 2013, v. 66, n. 3, p. 1306, doi. 10.1007/s11227-012-0795-5
- By:
- Publication type:
- Article
Prediction of dynamical, nonlinear, and unstable process behavior.
- Published in:
- Journal of Supercomputing, 2009, v. 49, n. 1, p. 22, doi. 10.1007/s11227-008-0215-z
- By:
- Publication type:
- Article
Scalable and efficient key management for heterogeneous sensor networks.
- Published in:
- Journal of Supercomputing, 2008, v. 45, n. 1, p. 44, doi. 10.1007/s11227-008-0184-2
- By:
- Publication type:
- Article
U-multimedia framework: a secure and intelligent multimedia service framework based on context information in U-home.
- Published in:
- Journal of Supercomputing, 2008, v. 45, n. 1, p. 88, doi. 10.1007/s11227-008-0202-4
- By:
- Publication type:
- Article
Special issue on “Intelligent systems and services for ubiquitous computing”.
- Published in:
- 2009
- By:
- Publication type:
- Editorial
Adaptive video-on-demand broadcasting in ubiquitous computing environment.
- Published in:
- Personal & Ubiquitous Computing, 2009, v. 13, n. 7, p. 479, doi. 10.1007/s00779-009-0227-6
- By:
- Publication type:
- Article
Special issue on “security for multimedia and ubiquitous applications”.
- Published in:
- Telecommunication Systems, 2010, v. 44, n. 3/4, p. 179, doi. 10.1007/s11235-009-9253-y
- By:
- Publication type:
- Article
TPGF: geographic routing in wireless multimedia sensor networks.
- Published in:
- Telecommunication Systems, 2010, v. 44, n. 1/2, p. 79, doi. 10.1007/s11235-009-9227-0
- By:
- Publication type:
- Article
EDITORIAL NOTE.
- Published in:
- Parallel Processing Letters, 2005, v. 15, n. 4, p. 353, doi. 10.1142/S012962640500226X
- By:
- Publication type:
- Article
Detecting k-Balanced Trusted Cliques in Signed Social Networks.
- Published in:
- IEEE Internet Computing, 2014, v. 18, n. 2, p. 24, doi. 10.1109/MIC.2014.25
- By:
- Publication type:
- Article
Improving the capability of the SLA workflow broker with parallel processing technology.
- Published in:
- Computer Systems Science & Engineering, 2009, v. 24, n. 5, p. 317
- By:
- Publication type:
- Article
Approximation algorithms for inner-node weighted minimum spanning trees.
- Published in:
- Computer Systems Science & Engineering, 2009, v. 24, n. 3, p. 189
- By:
- Publication type:
- Article
RETRACTED ARTICLE: An integrated parallel GNFS algorithm for integer factorization based on Linbox Montgomery's block Lanczos method over GF(2).
- Published in:
- Journal of Intelligent Manufacturing, 2009, v. 20, p. 1, doi. 10.1007/s10845-009-0248-z
- By:
- Publication type:
- Article
Secure communications and data management in ubiquitous services.
- Published in:
- International Journal of Communication Systems, 2009, v. 22, n. 9, p. 1065, doi. 10.1002/dac.1057
- By:
- Publication type:
- Article
Call for Papers: ‘Secure Communications and Data Management in Ubiquitous Services’.
- Published in:
- International Journal of Communication Systems, 2008, v. 21, n. 5, p. 569, doi. 10.1002/dac.940
- By:
- Publication type:
- Article
Special issue on social network security and privacy.
- Published in:
- Concurrency & Computation: Practice & Experience, 2018, v. 30, n. 5, p. 1, doi. 10.1002/cpe.4414
- By:
- Publication type:
- Article
Special issue on Big Data Security and Intelligent Data in Clouds ( BDS-IDC).
- Published in:
- 2017
- By:
- Publication type:
- Editorial