Register
|
Login
Full Text
Author
Title
Submit manuscript
About
Articles
Issues
Author Guidelines
Special Issues
Call for Papers
Imprint
Editorial Team
Contacts
Filter
Search
Full Text
Author
Title
by Subject
Topic A - General Literature
Topic B - Hardware
Topic C - Computer Systems Organization
Topic D - Software
Topic E - Data
Topic F - Theory of Computation
Topic G - Mathematics of Computing
Topic H - Information Systems
Topic I - Computing Methodologies
Topic J - Computer Applications
Topic K - Computing Milieux
Topic L - Science and Technology of Learning
Topic M - Knowledge Management
by Publication Date (dd/mm/yyyy)
from
to
by Publication Type
Research Article
(2629)
Editorial
(398)
by Journal
by Funding Agency
Clear filters
Powered by
18 items matching your criteria
Sort by:
Publication date newest
Publication date oldest
Total views
Unique views
Best match
Citations count
Highly accessed (last month)
Highly accessed (last 3 months)
Highly accessed (last 6 months)
Highly accessed (last year)
Filter By:
Subject: E.2 - DATA STORAGE REPRESENTATIONS
Clear All
Copy link
RSS Feed
RSS Feed filters articles only by Classification type, Date (from/to), Publication type
1
2
Select:
All
None
Download:
Citation
XML
PDF
Export format
RIS
BIBTEX
Bookends
EasyBib
EndNote (tagged)
EndNote 8 (xml)
Medlars
Mendeley
Papers
RefWorks Tagged
Ref Manager
Zotero
Mods (xml)
Plain text (txt)
Download
Research Article
Towards a Traceable Data Model Accommodating Bounded Uncertainty for DST Based Computation of
BRCA1/2
Mutation Probability With Age
Lorenz Gillner
,
Ekaterina Auer
Part of: Traceable use of emerging technologies in smart systems
10.3897/jucs.112797
28-11-2023
Unique: 526 | Total: 690
| Access Period:
1361-1384
HTML
XML
PDF
Research Article
Bloom filter variants for multiple sets: a comparative assessment
Luca Calderoni
,
Dario Maio
,
Paolo Palmieri
10.3897/jucs.74230
28-02-2022
Unique: 1189 | Total: 2049
| Access Period:
120-140
HTML
XML
PDF
Research Article
Combination Model of Heterogeneous Data for Security Measurement
Xiuze Dong
,
Yunchuan Guo
,
Fenghua Li
,
Liju Dong
,
Arshad Khan
Part of: Advances of Provable Security Techniques
10.3217/jucs-025-03-0270
28-03-2019
Unique: 650 | Total: 1183
| Access Period:
270-281
HTML
XML
PDF
Research Article
A Data Management Middleware for ITS Services in Smart Cities
Luca Carafoli
,
Federica Mandreoli
,
Riccardo Martoglia
,
Wilma Penzo
10.3217/jucs-022-02-0228
01-02-2016
Unique: 514 | Total: 693
| Access Period:
228-246
HTML
XML
PDF
Research Article
Does a Change in Weekend Days Have an Impact on Social Networking Activity?
Basit Shahzad
,
Esam Alwagait
Part of: The Social Media in Academia and EducationResearch R-evolutions and a Paradox: Advanced Next Generation Social Learning Innovation
10.3217/jucs-020-15-2068
28-12-2014
Unique: 492 | Total: 648
| Access Period:
2068-2079
HTML
XML
PDF
Research Article
When are Tweets Better Valued? An Empirical Study
Esam Alwagait
,
Basit Shahzad
Part of: Advances of Scientific Research on Technology Enhanced Learning in Social Networks and Mobile Contexts: Towards High Effective Educational Platforms for Next Generation Education
10.3217/jucs-020-10-1511
01-10-2014
Unique: 480 | Total: 633
| Access Period:
1511-1521
HTML
XML
PDF
Research Article
A Compression Algorithm for Managing Digital Elevation Models in Mobile Devices
Rolando Quintero
,
Giovanni Guzman
,
Miguel Torres
,
Rolando Menchaca-Mendez
,
Marco Moreno-Ibarra
,
Felix Mata
Part of: Advances of Scientific Research on Technology Enhanced Learning in Social Networks and Mobile Contexts: Towards High Effective Educational Platforms for Next Generation Education
10.3217/jucs-020-10-1433
01-10-2014
Unique: 516 | Total: 665
| Access Period:
1433-1442
HTML
XML
PDF
Research Article
Assessing the Impact of the homeML Format and the homeML Suite within the Research Community
Heather Mcdonald
,
Chris Nugent
,
Dewar Finlay
,
George Moore
,
William Burns
,
Josef Hallberg
Part of: Towards Sustainable Computing through Ambient Intelligence
10.3217/jucs-019-17-2559
01-11-2013
Unique: 621 | Total: 822
| Access Period:
2559-2576
HTML
XML
PDF
Research Article
Graph-based KNN Algorithm for Spam SMS Detection
Tran Ho
,
Ho-Seok Kang
,
Sung-Ryul Kim
Part of: Information Security
10.3217/jucs-019-16-2404
01-10-2013
Unique: 574 | Total: 739
| Access Period:
2404-2419
HTML
XML
PDF
Research Article
Spatial Queries in Road Networks Based on PINE
Maytham Safar
10.3217/jucs-014-04-0590
28-02-2008
Unique: 325 | Total: 397
| Access Period:
590-611
HTML
XML
PDF
Research Article
Fault Tolerant Neural Predictors for Compression of Sensor Telemetry Data
Rajasvaran Logeswaran
10.3217/jucs-012-10-1439
28-10-2006
Unique: 375 | Total: 446
| Access Period:
1439-1454
HTML
XML
PDF
Research Article
Connecting Segments for Visual Data Exploration and Interactive Mining of Decision Rules
Francisco Ferrer-Troyano
,
Jesús Aguilar-Ruiz
,
José Riquelme
10.3217/jucs-011-11-1835
28-11-2005
Unique: 367 | Total: 445
| Access Period:
1835-1848
HTML
XML
PDF
1
2
This website uses cookies in order to improve your web experience.
Read our Cookies Policy
OK