| Cross-layer Design and Optimization Techniques in Wireless Multimedia Sensor Networks for Smart Cities |
11 |
| Wireless Sensor Network Coverage Optimization based on Whale Group Algorithm |
8 |
| HMC-ReliefF: Feature Ranking for Hierarchical Multi-label Classification |
5 |
| Improved Functional Proxy Re-encryption Schemes for Secure Cloud Data Sharing |
5 |
| Intelligent Image Classification-Based on Spatial Weighted Histograms of Concentric Circles |
5 |
| Improving Sentiment Analysis for Twitter Data by Handling Negation Rules in the Serbian Language |
4 |
| Evaluation of Takagi-Sugeno-Kang Fuzzy Method in Entropy-based Detection of DDoS attacks |
4 |
| Retinal Blood Vessel Segmentation Based on Heuristic Image Analysis |
3 |
| Convolutional Neural Networks and Hash Learning for Feature Extraction and of Fast Retrieval of Pulmonary Nodules |
3 |
| An Optimized Method of HDFS for Massive Small Files Storage |
2 |
| Using Screencasts to Enhance Coding Skills: the case of Logic Programming |
2 |
| Towards Understandable Personalized Recommendations: Hybrid Explanations |
2 |
| Solving the DNA Fragment Assembly Problem with a Parallel Discrete Firefly Algorithm implemented on GPU |
2 |
| Intelligent query processing in P2P networks: semantic issues and routing algorithms |
2 |
| Density-Based Clustering with Constraints |
2 |
| Privacy-preserving Multi-authority Attribute-based Encryption with Dynamic Policy Updating in PHR |
2 |
| Context-sensitive Constraints for Access Control of Business Processes |
2 |
| CSDSM: Cognitive Switch-based DDoS Sensing and Mitigation in SDN-driven CDNi Word |
2 |
| Forecasting Stock Index with Multi-objective Optimization Model Based on Optimized Neural Network Architecture Avoiding Overfitting |
1 |
| An Approach to Business Process Simulation using Mined Probabilistic Models |
1 |
| A Novel Inheritance Mechanism for Modeling Knowledge Representation Systems |
1 |
| Research of MDCOP Mining Based on Time Aggregated Graph for Large Spatio-temproal Data Sets |
1 |
| MR-DFM: A Multi-path Routing Algorithm Based on Data Fusion Mechanism in Sensor Networks |
1 |
| Design of Intrusion Detection System Based on Improved ABC_elite and BP Neural Networks |
1 |
| Automated Two-phase Business Model-driven Synthesis of Conceptual Database Models |
1 |
| An insight into the effects of class imbalance and sampling on classification accuracy in credit risk assessment |
1 |
| An Experience in Automatically Building Lexicons for Affective Computing in Multiple Target Languages |
1 |
| Data Imputation Using a Trust Network for Recommendation via Matrix Factorization |
1 |
| Experimental Study on the Effectiveness of a Teaching Approach Using Barker or Bachman Notation for Conceptual Database Design |
1 |
| OLAPS: Online Load-Balancing in Range-Partitioned Main Memory Database with Approximate Partition Statistics |
1 |
| Use of Linguistic Forms Mining in the Link Analysis of Legal Documents |
1 |
| A Tripartite-Graph Based Recommendation Framework for Price-Comparison Services |
1 |
| Product Reputation Mining: Bring Informative Review Summaries to Producers and Consumers |
1 |
| Dimension Reduction and Classification of Hyperspectral Images based on Neural Network Sensitivity Analysis and Multi-instance Learning |
1 |
| Logical Filter Approach for Early Stage Cyber-Attack Detection |
1 |
| Majority Vote Feature Selection Algorithm in Software Fault Prediction |
1 |
| How Much Topological Structure Is Preserved by Graph Embeddings? |
1 |
| SOCA-DSEM: a Well-Structured SOCA Development Systems Engineering Methodology |
1 |
| Building a BPM Application in an SOA-Based Legacy Environment |
1 |
| Estimating point-of-interest rating based on visitors geospatial behaviour |
1 |
| ReSpecTX: Programming Interaction Made Easy |
1 |
| The CRI-Model: A Domain-independent Taxonomy for Non-Conformance between Observed and Specified Behaviour |
0 |
| On the Use of Self-* Island-based Evolutionary Computation Methods on Complex Environments |
0 |
| X3S: A Multi-modal Approach to Monitor and Assess Stress through Human-computer Interaction |
0 |
| Reconstructing De Facto Software Development Methods |
0 |
| CrocodileAgent 2018: Robust Agent-based Mechanisms for Power Trading in Competitive Environments |
0 |
| Rejecting the Death of Passwords: Advice for the Future |
0 |
| A Lightweight Batch Anonymous Authentication Scheme for VANET Based on Pairing-free |
0 |
| Outlier Detection in Graphs: A Study on the Impact of Multiple Graph Models |
0 |
| On Approximate k-Nearest Neighbor Searches Based on the Earth Mover's Distance for Efficient Content-Based Multimedia Information Retrieval |
0 |