


default search action
Computers, Volume 5
Volume 5, Number 1, March 2016
- Djallel Bouneffouf:

Exponentiated Gradient Exploration for Active Learning. 1 - Muhammad Atif Shahzad

, Nasser Mebarki
:
Learning Dispatching Rules for Scheduling: A Synergistic View Comprising Decision Trees, Tabu Search and Simulation. 3 - Xiaowu Li

, Zhinan Wu, Linke Hou
, Lin Wang, Chunguang Yue:
The Accurate Method for Computing the Minimum Distance between a Point and an Elliptical Torus. 4
Volume 5, Number 2, June 2016
- Christoph Reichert

, Stefan Dürschmid
, Rudolf Kruse, Hermann Hinrichs:
An Efficient Decoder for the Recognition of Event-Related Potentials in High-Density MEG Recordings. 5 - Omar Ávalos

, Erik Cuevas, Jorge Gálvez
:
Induction Motor Parameter Identification Using a Gravitational Search Algorithm. 6 - Khaled Shuaib, Ezedin Barka, Nedaa Al Hussien

, Mohammed Abdel-Hafez
, Mahmoud A. Alahmad
:
Cognitive Radio for Smart Grid with Security Considerations. 7 - Amit Singh

, Aitha Nagaraju:
An Artificial Bee Colony-Based COPE Framework for Wireless Sensor Network. 8 - Laith Al-Jobouri

, Filippo Casu, Martin Fleury, Julián Cabrera:
Video over DSL with LDGM Codes for Interactive Applications. 9 - Sajida Parveen

, Sharifah Mumtazah Syed Ahmad, Nidaa Hasan Abbas, Wan Azizun Wan Adnan, Marsyita Hanafi
, Nadeem Naeem:
Face Liveness Detection Using Dynamic Local Ternary Pattern (DLTP). 10 - Atinat Palawan

, John C. Woods, Mohammed Ghanbari
:
Continuity-Aware Scheduling Algorithm for Scalable Video Streaming. 11 - Norlina Mohd Sabr

, Nor Diyana Md Sin
, Mazidah Puteh, Mohamad Rusop Mahmood:
Optimization of Nano-Process Deposition Parameters Based on Gravitational Search Algorithm. 12
Volume 5, Number 3, September 2016
- Qaisar Abbas

, Misbah Sadaf, Anum Akram:
Prediction of Dermoscopy Patterns for Recognition of both Melanocytic and Non-Melanocytic Skin Lesions. 13 - Fatema Zahra Benchara

, Mohamed Youssfi
, Omar Bouattane
, Hassan Ouajji
:
A New Scalable, Distributed, Fuzzy C-Means Algorithm-Based Mobile Agents Scheme for HPC: SPMD Application. 14 - Ali A. Yassin, Jian Yao, Shiyao Han:

Strong Authentication Scheme Based on Hand Geometry and Smart Card Factors. 15 - Khattab M. Ali Alheeti

, Anna Gruebler, Klaus D. McDonald-Maier
:
Intelligent Intrusion Detection of Grey Hole and Rushing Attacks in Self-Driving Vehicular Networks. 16 - Zainab Sultani

, Rana F. Al-Tuma
, Sandro Wefel:
Color Reduction in an Authenticate Live 3D Point Cloud Video Streaming System. 17 - Ghassan Kbar, Mustufa Haider Abidi

, Syed Hammad Mian, Ahmad A. Al-Daraiseh
, Wathiq Mansoor
:
A University-Based Smart and Context Aware Solution for People with Disabilities (USCAS-PWD). 18 - Mitica Craus

, Vlad-Sergiu Bîrlescu, Maricel Agop
:
Fractal Aspects in Classical Parallel Computing. 19
Volume 5, Number 4, December 2016
- E. George Walters III:

Array Multipliers for High Throughput in Xilinx FPGAs with 6-Input LUTs. 20 - Mejda Chihaoui

, Akram Elkefi, Wajdi Bellil, Chokri Ben Amar:
A Survey of 2D Face Recognition Techniques. 21 - Rami Yared

, Bessam Abdulrazak
:
Ambient Technology to Assist Elderly People in Indoor Risks. 22 - Amruta Awasthi

, Anshul Awasthi, Daniel Riordan
, Joseph Walsh
:
Non-Invasive Sensor Technology for the Development of a Dairy Cattle Health Monitoring System. 23 - Rafael Lahoz-Beltra

:
Quantum Genetic Algorithms for Computer Scientists. 24 - Bellamkonda Saidulu, Arun Manoharan

, Kumaravel Sundaram
:
Low Noise Low Power CMOS Telescopic-OTA for Bio-Medical Applications. 25 - Mustufa Haider Abidi

, Abdulrahman Al-Ahmari
, Abdul-Aziz Mohammed El-Tamimi, Saied Darwish, Ahmad A. Al-Daraiseh:
Development and Evaluation of the Virtual Prototype of the First Saudi Arabian-Designed Car. 26 - Darren Seifert, Hassan Reza

:
A Security Analysis of Cyber-Physical Systems Architecture for Healthcare. 27 - Qaisar Abbas

:
DeepCAD: A Computer-Aided Diagnosis System for Mammographic Masses Using Deep Invariant Features. 28 - Shariq Bashir

:
An Improved Retrievability-Based Cluster-Resampling Approach for Pseudo Relevance Feedback. 29 - Yoshio Suga, Kazumasa Takami

:
Store-Carry and Forward-Type M2M Communication Protocol Enabling Guide Robots to Work together and the Method of Identifying Malfunctioning Robots Using the Byzantine Algorithm. 30 - Hikaru Sato, Yoshikazu Washizawa

:
An N100-P300 Spelling Brain-Computer Interface with Detection of Intentional Control. 31 - Rohit Kumar Das, Sanjeet Kumar Nayak

, Sourav Kumar Bhoi, Suman Kumar Choudhury, Banshidhar Majhi, Sujata Mohanty
:
BSEA: A Blind Sealed-Bid E-Auction Scheme for E-Commerce Applications. 32

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.


Google
Google Scholar
Semantic Scholar
Internet Archive Scholar
CiteSeerX
ORCID














