Register
|
Login
Full Text
Author
Title
Submit manuscript
About
Articles
Issues
Author Guidelines
Special Issues
Call for Papers
Imprint
Editorial Team
Contacts
Filter
Search
Full Text
Author
Title
by Subject
Topic A - General Literature
Topic B - Hardware
Topic C - Computer Systems Organization
Topic D - Software
Topic E - Data
Topic F - Theory of Computation
Topic G - Mathematics of Computing
Topic H - Information Systems
Topic I - Computing Methodologies
Topic J - Computer Applications
Topic K - Computing Milieux
Topic L - Science and Technology of Learning
Topic M - Knowledge Management
by Publication Date (dd/mm/yyyy)
from
to
by Publication Type
Research Article
(2694)
Editorial
(409)
by Journal
by Funding Agency
Clear filters
Powered by
28 items matching your criteria
Sort by:
Publication date newest
Publication date oldest
Total views
Unique views
Best match
Citations count
Highly accessed (last month)
Highly accessed (last 3 months)
Highly accessed (last 6 months)
Highly accessed (last year)
Filter By:
Subject: I.6.4 - Model Validation and Analysis
Clear All
Copy link
RSS Feed
RSS Feed filters articles only by Classification type, Date (from/to), Publication type
1
2
3
Select:
All
None
Download:
Citation
XML
PDF
Export format
RIS
BIBTEX
Bookends
EasyBib
EndNote (tagged)
EndNote 8 (xml)
Medlars
Mendeley
Papers
RefWorks Tagged
Ref Manager
Zotero
Mods (xml)
Plain text (txt)
Download
Research Article
Classification of CNC Vibration Speeds by Heralick Features
Melih Kuncan
,
Kaplan Kaplan
,
Yılmaz Kaya
,
Mehmet Recep Minaz
,
H. Metin Ertunç
10.3897/jucs.106543
28-03-2024
Unique: 919 | Total: 1531
| Access Period:
363-382
HTML
PDF
Research Article
Visualizing Portable Executable Headers for Ransomware Detection: A Deep Learning-Based Approach
Tien Quang Dam
,
Nghia Thinh Nguyen
,
Trung Viet Le
,
Tran Duc Le
,
Sylvestre Uwizeyemungu
,
Thang Le-Dinh
10.3897/jucs.104901
28-02-2024
Unique: 1509 | Total: 2087
| Access Period:
262-286
HTML
PDF
Research Article
Towards a Traceable Data Model Accommodating Bounded Uncertainty for DST Based Computation of
BRCA1/2
Mutation Probability With Age
Lorenz Gillner
,
Ekaterina Auer
Part of: Traceable use of emerging technologies in smart systems
10.3897/jucs.112797
28-11-2023
Unique: 1028 | Total: 1393
| Access Period:
1361-1384
HTML
XML
PDF
Research Article
Combining SysML and Timed Coloured Petri Nets for Designing Smart City Applications
Layse Santos Souza
,
Michel S. Soares
10.3897/jucs.97170
28-10-2023
Unique: 1121 | Total: 1553
| Access Period:
1217-1249
HTML
XML
PDF
Research Article
Feature Fusion and NRML Metric Learning for Facial Kinship Verification
Fahimeh Ramazankhani
,
Mahdi Yazdian-Dehkord
,
Mehdi Rezaeian
10.3897/jucs.89254
28-04-2023
Unique: 1195 | Total: 1704
| Access Period:
326-348
HTML
XML
PDF
Research Article
Natural Language Enhancement for English Teaching Using Character-Level Recurrent Neural Network with Back Propagation Neural Network based Classification by Deep Learning Architectures
Zhiling Yang
Part of: AI Empowered Big Data Analytics for Industrial Applications
10.3897/jucs.94162
28-09-2022
Unique: 1685 | Total: 2597
| Access Period:
984-1000
HTML
XML
PDF
Research Article
English Teaching in Artificial Intelligence-based Higher Vocational Education Using Machine Learning Techniques for Students’ Feedback Analysis and Course Selection Recommendation
Xin Ma
Part of: AI Empowered Big Data Analytics for Industrial Applications
10.3897/jucs.94160
28-09-2022
Unique: 1928 | Total: 3058
| Access Period:
898-915
HTML
XML
PDF
Research Article
Social Trust-based Blockchain-enabled Social Media News Verification System
Riri Fitri Sari
,
Asri Ilmananda
,
Daniela Romano
10.3897/jucs.68692
28-09-2021
Unique: 2418 | Total: 4128
| Access Period:
979-998
HTML
XML
PDF
Research Article
Formal Chronicle Analyses and Comparisons: How to Deal with Negative Behaviors
Yannick Pencolé
,
Audine Subias
10.3897/jucs.2020.015
28-02-2020
Unique: 944 | Total: 1746
| Access Period:
268-292
HTML
XML
PDF
Research Article
The Role of Verification and Validation Techniques within Visual Analytics
Benjamin Weyers
,
Ekaterina Auer
,
Wolfram Luther
Part of: Collaborative Technologies and Data Science in Smart City Applications
10.3217/jucs-025-08-0967
28-08-2019
Unique: 1033 | Total: 1764
| Access Period:
967-987
HTML
XML
PDF
Research Article
Ontology and Weighted D-S Evidence Theory-Based Vulnerability Data Fusion Method
Xiaoling Tao
,
Liyan Liu
,
Feng Zhao
,
Yan Huang
,
Saide Zhu
Part of: Advances of Provable Security Techniques
10.3217/jucs-025-03-0203
28-03-2019
Unique: 990 | Total: 1704
| Access Period:
203-221
HTML
XML
PDF
Research Article
Consistency Checking in Early Software Product Line Specifications - The VCC Approach
Mauricio Alférez
,
Roberto Lopez-Herrejón
,
Ana Moreira
,
Vasco Amaral
,
Alexander Egyed
Part of: Software Components, Architectures and Reuse: Software Product Line Engineering and Source Code Enhancements
10.3217/jucs-020-05-0640
01-05-2014
Unique: 955 | Total: 1315
| Access Period:
640-665
HTML
XML
PDF
1
2
3
This website uses cookies in order to improve your web experience.
Read our Cookies Policy
OK