Register
|
Login
Full Text
Author
Title
Submit manuscript
About
Articles
Issues
Author Guidelines
Special Issues
Call for Papers
Imprint
Editorial Team
Contacts
Filter
Search
Full Text
Author
Title
by Subject
Topic A - General Literature
Topic B - Hardware
Topic C - Computer Systems Organization
Topic D - Software
Topic E - Data
Topic F - Theory of Computation
Topic G - Mathematics of Computing
Topic H - Information Systems
Topic I - Computing Methodologies
Topic J - Computer Applications
Topic K - Computing Milieux
Topic L - Science and Technology of Learning
Topic M - Knowledge Management
by Publication Date (dd/mm/yyyy)
from
to
by Publication Type
Research Article
(2759)
Editorial
(422)
by Journal
by Funding Agency
Clear filters
Powered by
23 items matching your criteria
Sort by:
Publication date newest
Publication date oldest
Total views
Unique views
Best match
Citations count
Highly accessed (last month)
Highly accessed (last 3 months)
Highly accessed (last 6 months)
Highly accessed (last year)
Filter By:
Subject: E.4 - CODING AND INFORMATION THEORY
Clear All
Copy link
RSS Feed
RSS Feed filters articles only by Classification type, Date (from/to), Publication type
1
2
Select:
All
None
Download:
Citation
XML
PDF
Export format
RIS
BIBTEX
Bookends
EasyBib
EndNote (tagged)
EndNote 8 (xml)
Medlars
Mendeley
Papers
RefWorks Tagged
Ref Manager
Zotero
Mods (xml)
Plain text (txt)
Download
Research Article
Using Identification Codes in the Two-Party Privacy-Preserving Record Linkage (PPRL)
Yanling Chen
Part of: Explanatory Data Science in Technology Applications
10.3897/jucs.167412
14-08-2025
Unique: 758 | Total: 1015
Access Period: 0
0
877-899
HTML
PDF
Editorial
Explanatory Data Science in Technology Applications
Wolfram Luther
,
A. J. Han Vinck
Part of: Explanatory Data Science in Technology Applications
10.3897/jucs.164654
14-08-2025
Unique: 855 | Total: 1188
Access Period: 0
0
873-876
HTML
PDF
Research Article
Meta-learning approach for variational autoencoder hyperparameter tuning
Michele Berti
,
Matheus Camilo da Silva
,
Sebastiano Saccani
,
Sylvio Barbon Junior
10.3897/jucs.124087
28-06-2025
Unique: 1119 | Total: 1481
Access Period: 0
0
668-682
HTML
PDF
Research Article
Privacy and security challenges of the digital twin: systematic literature review
Marija Kuštelega
,
Renata Mekovec
,
Ahmed Shareef
10.3897/jucs.114607
28-12-2024
Unique: 2994 | Total: 4858
Access Period: 0
0
1782-1806
HTML
PDF
Research Article
Bloom Encodings in DGA Detection: Improving Machine Learning Privacy by Building on Privacy-Preserving Record Linkage
Lasse Nitz
,
Avikarsha Mandal
Part of: Fighting Cybersecurity Risks from a Multidisciplinary Perspective
10.3897/jucs.134762
14-09-2024
Unique: 1270 | Total: 1670
Access Period: 0
0
1224-1243
HTML
PDF
Research Article
E - Capacity - Equivocation Region of Wiretap Channel
Mariam Haroutunian
Part of: Challenges for Smart Environments - Human-Centered Computing, Data Science, and Ambient Intelligence I
10.3897/jucs.76605
28-11-2021
Unique: 1690 | Total: 2790
Access Period: 0
0
1222-1239
HTML
XML
PDF
Research Article
Steganalysis of Adaptive Multi-Rate Speech Using Statistical Characteristics of Pitch Delay
Hui Tian
,
Meilun Huang
,
Chin-Chen Chang
,
Yongfeng Huang
,
Jing Lu
,
Yongqian Du
Part of: Recent Advances in Detection, Investigation and Mitigation of Cyber Crimes
10.3217/jucs-025-09-1131
28-09-2019
Unique: 1431 | Total: 2229
Access Period: 0
0
1131-1150
HTML
XML
PDF
Research Article
Secrecy over Multiple-Access Channel: A Game of Competition and Cooperation
Yanling Chen
,
O. Koyluoglu
,
A. J. Han Vinck
Part of: Collaborative Technologies and Data Science in Smart City Applications
10.3217/jucs-025-08-0904
28-08-2019
Unique: 1310 | Total: 2117
Access Period: 0
0
904-924
HTML
XML
PDF
Research Article
A New Information-Theoretical Distance Measure for Evaluating Community Detection Algorithms
Mariam Haroutunian
,
Karen Mkhitaryan
,
Josiane Mothe
Part of: Collaborative Technologies and Data Science in Smart City Applications
10.3217/jucs-025-08-0887
28-08-2019
Unique: 1320 | Total: 2049
Access Period: 0
0
887-903
HTML
XML
PDF
Research Article
Parallel Fast Sort Algorithm for Secure Multiparty Computation
Zbigniew Marszałek
Part of: Advances in Security and Privacy of Multimodal Interfaces
10.3217/jucs-024-04-0488
28-04-2018
Unique: 1250 | Total: 1760
Access Period: 0
0
488-514
HTML
XML
PDF
Research Article
Secure Method for Combining Cryptography with Iris Biometrics
Alawi Al-Saggaf
Part of: Advances in Security and Privacy of Multimodal Interfaces
10.3217/jucs-024-04-0341
28-04-2018
Unique: 1072 | Total: 1518
Access Period: 0
0
341-356
HTML
XML
PDF
Research Article
A Note on Variable-Length Codes with Constant Hamming Weights
Peter Fenwick
10.3217/jucs-021-09-1136
01-09-2015
Unique: 891 | Total: 1255
Access Period: 0
0
1136-1142
HTML
XML
PDF
1
2
This website uses cookies in order to improve your web experience.
Read our Cookies Policy
OK