Search

Showing total 1,541 results

Search Constraints

Start Over You searched for: Journal computer journal Remove constraint Journal: computer journal
1,541 results

Search Results

151. A Novel Reduced Reference Image Quality Assessment Based on Formal Concept Analysis.

152. L-graph Automata And Some Applications.

153. Improvement of MADRL Equilibrium Based on Pareto Optimization.

154. Interopera: An Efficient Cross-Chain Trading Protocol.

155. Modeling and Approximating the Visit of a Set of Sites With a Fleet of UAVs.

156. Mining Frequent Serial Positioning Episode Rules with Forward and Backward Search Technique from Event Sequences.

157. A Novel Approach For CT-Based COVID-19 Classification and Lesion Segmentation Based On Deep Learning.

158. Role of Machine Learning on Key Extraction for Data Privacy Preservation of Health Care Sectors in IoT Environment.

159. Incorrectly Generated RSA Keys: How I Learned To Stop Worrying And Recover Lost Plaintexts.

160. How Not To Design An Efficient FHE-Friendly Block Cipher: Seljuk.

161. Row, Row, Row Your Boat: How to Not Find Weak Keys in Pilsung.

162. Decentralized Data Flows for the Functional Scalability of Service-Oriented IoT Systems.

163. A New Neural Distinguisher Considering Features Derived From Multiple Ciphertext Pairs.

164. On Grain-Like Small State Stream Ciphers Against Fast Correlation Attacks: Cryptanalysis of Plantlet, Fruit-v2 and Fruit-80.

165. Simplified High Level Parallelism Expression on Heterogeneous Systems through Data Partition Pattern Description.

166. Component Fault Diagnosis and Fault Tolerance of Alternating Group Graphs.

167. On 2-Interval Pairwise Compatibility Properties of Two Classes of Grid Graphs.

168. Robust Image Hashing With Saliency Map And Sparse Model.

169. CWSOGG: Catching Web Shell Obfuscation Based on Genetic Algorithm and Generative Adversarial Network.

170. Linear Attacks On SNOW 3G And SNOW-V Using Automatic Search.

171. Aspect-Based Sentiment Analysis Using Interaction Matrix And Global Attention Neural Network.

172. DEV-ETA: An Interpretable Detection Framework for Encrypted Malicious Traffic.

173. New Meet-in-the-Middle Attacks on FOX Block Cipher.

174. Quantum Attacks on 1K-AES and PRINCE.

175. An Educational Data Mining System For Predicting And Enhancing Tertiary Students' Programming Skill.

176. A New Method To Find All The High-Probability Word-Oriented Truncated Differentials: Application To Midori, SKINNY And CRAFT.

177. Efficient Algorithms For Storage Load Balancing Of Outsourced Data In Blockchain Network.

178. New Blind Watermark Embedding Model: Spiral Updated Rider Optimization Algorithm.

179. Area Convergence of Monoculus Robots With Additional Capabilities.

180. Robust Anomaly Detection in Feature-Evolving Time Series.

181. FLAKE: Fuzzy Graph Centrality-based Automatic Keyword Extraction.

182. Cost- and Time-Based Data Deployment for Improving Scheduling Efficiency in Distributed Clouds.

183. Breast Cancer Diagnosis Using Multi-Stage Weight Adjustment In The MLP Neural Network.

184. Similarity of Sentences With Contradiction Using Semantic Similarity Measures.

185. Central Station-Based Demand Prediction for Determining Target Inventory in a Bike-Sharing System.

186. Palmprint for Individual's Personality Behavior Analysis.

187. Early Diabetes Discovery From Tongue Images.

188. Classification Model on Big Data in Medical Diagnosis Based on Semi-Supervised Learning.

189. Human Visual System Guided Reversible Data Hiding Based On Multiple Histograms Modification.

190. Cryptanalysis on Reduced-Round 3D and Saturnin.

191. Optimal Symmetric Ratcheting for Secure Communication.

192. Low-Data Cryptanalysis On SKINNY Block Cipher.

193. Customer Segmentation Using K-Means Clustering and the Hybrid Particle Swarm Optimization Algorithm.

194. Identity-Based Encryption With Continuous Leakage-Resilient CCA Security From Static Complexity Assumption.

195. On the Longest Common Cartesian Substring Problem.

196. Taylor Sun Flower Optimization-Based Compressive Sensing for Image Compression and Recovery.

197. Some Scheduling Problems With Job Rejection And A Learning Effect.

198. Efficient Traceable Attribute-Based Signature With Update-Free Revocation For Blockchain.

199. Cluster Connectivity And Super Cluster Connectivity Of DQcube.

200. sasa: a SimulAtor of Self-stabilizing Algorithms.