


default search action
Computer Systems: Science & Engineering, Volume 33
Volume 33, Number 1, January 2018
- M. Teimoortashloo, A. Khadi Sedigh:

A dynamic independent component analysis approach to fault detection with new statistics. - Amjad Gawanmeh, Usman Pervez, Osman Hasan:

Probabliistic analysis of electrocardiogram (ECG) heart signal. - Vidblain Amaro-Ortega, Arnoldo Díaz-Ramírez

, Brenda Leticia Flores Ríos, Félix Fernando González-Navarro, Frank Werner, Larysa Burtseva:
A scheduling extension scheme of the earliest deadline first policy for hard real-time uniprocessor systems integrated on POSIX threads based on Linux. - Jen-Yuan Yeh:

Rank-order correlation-based feature vector context transformation for learning to rank for information retrieval.
Volume 33, Number 2, March 2018
- Heng Qi, Kequi Li:

Special issue: BigDataSE 2016. - Tianqing Zhu, Mengmeng Yang, Ping Xiong, Yang Xiang, Wanlei Zhou:

An iteration-based differentially private social network data release. - Kehong Zhang, Kequi Li:

The optimization reachability query of large scale multi-attribute constraints directed graph. - Chen Yu, Qinmin Hong, Dezhong Yao, Hai Jin:

Tensor-based user trajectory mining. - Chunjing Xiao, Yongwei Qiao, Kewen Xia, Yuxiang Zhang:

Research on tourist routes recommendation based on the user preference drifting over time. - Lufeng Yuan, Erlin Yao, Guangming Tan:

Automated and precise event detection method for big data in biomedical imaging with support vector machine. - Wenyu Qu, Zhiyang Li, Junfeng Wu, Yinan Wu, Zhaobin Liu:

Effective piecewise linear skeletonization of sparse shapes. - Yong Zhang, Jing Cai, Quanlin Li:

MapReduce implementation of an improved XML keyword search algorithm. - Wenyuan Liu, Zijuan Liu, Lin Wang, Binbin Li, Nan Jing:

Human movement detection and gait periodicity analysis via channel state information. - Junfeng Xu, Linna Zhou:

A dynamic online protection framework for Android applications. - Tingting Yang, Hailong Feng, Chengming Yang, Ge Guo, Tieshan Li:

Online and offline scheduling schemes to maximize the weighted delivered video packets towards maritime CPSs.
Volume 33, Number 3, May 2018
- Siti Noor Hasanah Ghazali, Siti Salwah Salim, Irum Inayat, Siti Hafizah Ab Hamid:

A risk poker based testing model for Scrum. - Wint Nyein Chan, Thandar Thein:

Sentiment analysis system in big data environment. - Myat Nandar Oo, Sazia Parvin

, Thandar Thein:
Forensic investigation through data remnants on Hadoop big data storage system. - Ahmad Alomari, Alain April, Carlos Monsalve, Amjad Gawanmeh:

Integrating a decision tree perspective at the operational-level of BPM+.
Volume 33, Number 4, 2018
- Xiulong Liu, Mianxiong Dong, Xiaobo Zhou:

Preface of Special Issue: Future Internet. 233-234 - Anfeng Liu, Jie Min, Kaoru Ota, Ming Zhao:

Reliable Differentiated Services Optimization for Network Coding Cooperative Communication System. 235-250 - Haisheng Yu

, Heng Qi, Keqiu Li, Jianhui Zhang, Peng Xiao, Xun Wang:
Openflow Based Dynamic Flow Scheduling with Multipath for Data Center Networks. 251-258 - Jianji Ren, Shan Zhao, Junding Sun, Ding Li, Song Wang, Zong-pu Jia:

PPP: Prefix-Based Popularity Prediction for Efficient Content Caching in Contentcentric Networks. 259-265 - Ruiguo Yu, Zhiqiang Liu, Jianrong Wang, Mankun Zhao, Jie Gao, Mei Yu:

Analysis and Application of the Spatio-Temporal Feature in Wind Power Prediction. 267-274 - Zhou Feng, Xue Weilian:

Spectrum Allocation for Cognitive Radio Networks Using the Fireworks Algorithm. 275-286 - Yuhui Wang:

Topic Evolution Analysis in Social Networking Services: Taking Sina Weibo as an Example. 287-291
Volume 33, Number 5, 2018
- Zheng Xu, Kun Gao:

SPECIAL ISSUE: 2017 International Conference on Applications and Techniques in Cyber Intelligence (ATCI 2017). 297-298 - Tao Jiang:

A Description Method for Formalizing Domain-Specific Modelling Language. 299-308 - Youxi Wu, Shengyuan Shi, Jingyu Liu, Huaizhong Zhu:

ADL-RAID: Energy-Saving Data Layout for Dynamic Loads. 309-316 - Xuejun Tian, Jianliang Li, Lihua Luo:

Design of Greenhouse Temperature and Humidity Measuring System based on Zigbee Technology. 317-326 - Jianhui Wu, Feng Huang, Wenjing Hu, Wei He, Bing Tu, Longyuan Guo, Xianfeng Ou:

Face Detection Method for Public Safety Surveillance based on Convex Grouping. 327-334 - Kaijun Xu, Yusheng Yao, Shanshan Li:

Lateral Conflict Model of Training Flight Based on Subjective Factors. 335-344 - Chuanliang Xia, Bin Shen, Hailin Zhang, Yigui Wang:

Liveness and Boundedness Preservations of Sharing Synthesis of Petri Net Based Representation for Embedded Systems. 345-350 - Hongsheng Su, Shuangshuang Wang, Dengfei Wang:

Prediction and Abnormality Assertion on Emu Brake Pad Based on Multivariate Integrated Random Walk. 351-360 - Junfeng Xu, Linna Zhou:

A Dynamic Online Protection Framework for Android Applications. 361-368 - Wang Qi:

Research on K Maximum Dominant Skyline and E-GA Algorithm Based on Data Stream Environment. 369-378 - Shixiong Wang, Jianhua He, Chen Wang, Xitong Li:

The Definition and Numerical Method of Final Value Problem and Arbitrary Value Problem. 379-387 - Shuru Liu, Ping He, Jiqiang Dang:

Evaluation of Industry Eco-Industrialization: Case Study of Shaanxi, China. 389-395 - Sha-Sha Li, Tie-Jun Cui, Jian Liu:

Research on the Clustering Analysis and Similarity in Factor Space. 397-404
Volume 33, Number 6, 2018
- Mohamed el Boujnouni, Mohamed Jedra:

Improving Support Vector Domain Description by Maximizing the Distance Between Negative Examples and The Minimal Sphere Center's. 409-420 - Hany Ramadan, Ben Bella S. Tawfik, Alaa El-Din M. Riad:

Energy Aware Routing Algorithm in Manet Using Linear Programming. 421-428 - Erdem Yavuz, Vedat Topuz:

A Phoneme-Based Approach for Eliminating Out-of-vocabulary Problem Turkish Speech Recognition Using Hidden Markov Model. 429-445 - Reeseo Cha, Wonhong Nam, Jin-Young Choi:

Reliable Approximated Number System with Exact Bounds and Three-Valued Logic. 447-455

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.


Google
Google Scholar
Semantic Scholar
Internet Archive Scholar
CiteSeerX
ORCID














