Войти
Регистрация
Журналы
Издательства
Подписки
Войти
Регистрация
Научные статьи
\
Общие вопросы науки и культуры
\
Информационные технологии. Вычислительная техника. Обработка данных
Связь компьютеров. Сети ЭВМ. Вычислительные сети - 004.7
Научные статьи
В разделе "Связь компьютеров. Сети ЭВМ. Вычислительные сети"
Signature-based malware detection using approximate boyer moore string matching algorithm
Generating code for simple dynamic web applications via routing configurations
Improved architecture of focused crawler on the basis of content and link analysis
Cloud computing: a paradigm shift in the way of computing
Ambiguity in question paper translation
A proposed framework to analyze abusive tweets on the social networks
Specific queries optimization using Jaya approach
Efficient feature extraction in sentiment classification for contrastive sentences
Comparative analysis of stemming algorithms for web text mining
Intuitionistic fuzzy weighted sum and product method for electronic service quality selection problem
Binary log design for one-way data replication with ZeroMQ
Cross-domain recommendation model based on hybrid approach
Knowledge extraction and analysis to evaluate the financial performance of an organization using OLAM
Energy saving VM placement in cloud
A sustainability theme for introductory programming courses
Performance enhancement of machine translation evaluation systems for English – Hindi language pair
Textual coherence improvement of extractive document summarization using greedy approach and word vectors
Combined appetency and upselling prediction scheme in telecommunication sector using support vector machines
H2E: a privacy provisioning framework for collaborative filtering recommender system
Development of a method for choosing cloud computing on the platform of PaaS for servicing the state agencies
Integration of cyber-physical systems in e-science environment: State-of-the-Art, problems and effective solutions
Evaluation the performance of DMZ
Energy aware supervised pattern attack recognition technique for mitigation of EDoS attacks in cloud platform
Previously-selected-server-first based scalable VM placement algorithm for mitigating side channel attacks in cloud computing
MANET testbed using raspberry PIs
Design of effective security architecture for mobile cloud computing to prevent DDoS attacks
Convergence of MANET in communication among smart devices in IoT
Delivering a Secured Cloud Computing Architecture and Traditional IT Outsourcing Environment via Penetration Tools in Ghana
Performance Analysis of Network Applications on IPv6 Cloud Connected Virtual Machine
IT Risk Management Based on ISO 31000 and OWASP Framework using OSINT at the Information Gathering Stage (Case Study: X Company)
Evaluation of Quality for Semi-Structured Database System
A Risk-Assessment of Cyber Attacks and Defense Strategies in Industry 4.0 Ecosystem
Push Management Platform Based on Wechat Small Program and Cloud Development
A Corpus Based Approach to Build Arabic Sentiment Lexicon
Feature Engineering based Approach for Prediction of Movie Ratings
Sensing as a Service: Vision, Practices and Architecture
Retrieval of Complex Named Entities on the Web: Proposals for Similarity Computation
ComPer: A Comprehensive Performance Evaluation Method for Recommender Systems
Cyber Bullying Detection and Classification using Multinomial Naïve Bayes and Fuzzy Logic
Analysis of Indonesia Politics Polarization before 2019 President Election Using Sentiment Analysis and Social Network Analysis
← Предыдущая
Следующая страница →
1
|
...
|
19
|
20
|
21
|
22
|
23
|
24
|
25
|
...
|
В конец
Нет соединения с интернетом.
Проверьте соединение и повторите попытку.