![](https://dblp.dagstuhl.de/img/logo.ua.320x120.png)
![](https://dblp.dagstuhl.de/img/dropdown.dark.16x16.png)
![](https://dblp.dagstuhl.de/img/peace.dark.16x16.png)
Остановите войну!
for scientists:
![search dblp search dblp](https://dblp.dagstuhl.de/img/search.dark.16x16.png)
![search dblp](https://dblp.dagstuhl.de/img/search.dark.16x16.png)
default search action
Computer Science Review, Volume 40
Volume 40, May 2021
- Thanasis Kotsiopoulos, Panagiotis G. Sarigiannidis
, Dimosthenis Ioannidis, Dimitrios Tzovaras
:
Machine Learning and Deep Learning in smart manufacturing: The Smart Grid paradigm. 100341
- Pavol Hell, Jaroslav Nesetril:
In praise of homomorphisms. 100352
- Nabin Chowdhury
, Vasileios Gkioulos:
Cyber security training for critical infrastructure protection: A literature review. 100361 - Mahdi H. Miraz
, Maaruf Ali
, Peter S. Excell:
Adaptive user interfaces and universal usability through plasticity of user interface design. 100363 - Hari Kishan Kondaveeti
, Nandeesh Kumar Kumaravelu, Sunny Dayal Vanambathina, Sudha Ellison Mathe
, Suseela Vappangi
:
A systematic literature review on prototyping with Arduino: Applications, challenges, advantages, and limitations. 100364 - Gilbert Tekli:
A survey on semi-structured web data manipulations by non-expert users. 100367 - Omar Cheikhrouhou
, Ines Khoufi
:
A comprehensive survey on the Multiple Traveling Salesman Problem: Applications, approaches and taxonomy. 100369 - Arunim Garg, Vijay Mago:
Role of machine learning in medical research: A survey. 100370 - Snehi Manish
, Abhinav Bhandari:
Vulnerability retrospection of security solutions for software-defined Cyber-Physical System against DDoS and IoT-DDoS attacks. 100371 - Shivi Garg
, Niyati Baliyan
:
Comparative analysis of Android and iOS from security viewpoint. 100372 - Tejpal Sharma, Dhavleesh Rattan
:
Malicious application detection in android - A systematic literature review. 100373 - Nadeem Yousuf Khanday, Shabir Ahmad Sofi:
Taxonomy, state-of-the-art, challenges and applications of visual understanding: A review. 100374 - Tarannum Zaki, Muhammad Nazrul Islam
:
Neurological and physiological measures to evaluate the usability and user-experience (UX) of information systems: A systematic literature review. 100375 - J. Amutha
, Sandeep Sharma
, Sanjay Kumar Sharma:
Strategies based on various aspects of clustering in wireless sensor networks using classical, optimization and machine learning techniques: Review, taxonomy, research findings, challenges and future directions. 100376 - Camilo Salazar
, José Aguilar, Julián Monsalve-Pulido, Edwin Montoya:
Affective recommender systems in the educational field. A systematic literature review. 100377 - Farzana Anowar, Samira Sadaoui, Bassant Selim
:
Conceptual and empirical comparison of dimensionality reduction algorithms (PCA, KPCA, LDA, MDS, SVD, LLE, ISOMAP, LE, ICA, t-SNE). 100378 - Shi Dong
, Ping Wang, Khushnood Abbas
:
A survey on deep learning and its applications. 100379 - Binghao Yan, Qinrang Liu, JianLiang Shen, Dong Liang, Bo Zhao, Ling Ouyang:
A survey of low-latency transmission strategies in software defined networking. 100386 - Rafal Leszczyna
:
Aiming at methods' wider adoption: Applicability determinants and metrics. 100387 - Deepali Jain
, Malaya Dutta Borah, Anupam Biswas
:
Summarization of legal documents: Where are we now and the way forward. 100388 - Lerina Aversano, Mario Luca Bernardi
, Marta Cimitile, Riccardo Pecori
:
A systematic review on Deep Learning approaches for IoT security. 100389 - Ayaz Ali Khan, Muhammad Zakarya
:
Energy, performance and cost efficient cloud datacentres: A survey. 100390 - Monika Gill, Dinesh Singh
:
A comprehensive study of simulation frameworks and research directions in fog computing. 100391 - Ravneet Kaur
, Ramkumar Ketti Ramachandran
, Robin Doss, Lei Pan:
The importance of selecting clustering parameters in VANETs: A survey. 100392 - Mehdi Azaouzi
, Wassim Mnasri, Lotfi Ben Romdhane:
New trends in influence maximization models. 100393 - Nitish Andola, Raghav, Vijay Kumar Yadav, S. Venkatesan, Shekhar Verma:
Anonymity on blockchain based e-cash protocols - A survey. 100394 - Balaji T. K.
, Chandra Sekhara Rao Annavarapu, Annushree Bablani:
Machine learning algorithms for social media analysis: A survey. 100395 - Piyush Rawat, Siddhartha Chauhan:
Clustering protocols in wireless sensor network: A survey, classification, issues, and future directions. 100396 - Fayyaz Ali
, Shah Khusro
:
Content and link-structure perspective of ranking webpages: A review. 100397 - Muhammad Asim Shahid
, Noman Islam
, Muhammad Mansoor Alam
, Mazliham Mohd Su'ud, Shahrulniza Musa
:
Towards Resilient Method: An exhaustive survey of fault tolerance methods in the cloud computing environment. 100398 - Resham Arya
, Jaiteg Singh
, Ashok Kumar
:
A survey of multidisciplinary domains contributing to affective computing. 100399 - Araceli Morales
, Gemma Piella
, Federico M. Sukno
:
Survey on 3D face reconstruction from uncalibrated images. 100400 - Christian Spreafico
, Davide Russo:
Eco-assessment software: A quantitative review involving papers and patents. 100401 - Khaled Gubran Al-Hashedi, Pritheega Magalingam:
Financial fraud detection applying data mining techniques: A comprehensive review from 2009 to 2019. 100402
![](https://dblp.dagstuhl.de/img/cog.dark.24x24.png)
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.