Register
|
Login
Full Text
Author
Title
Submit manuscript
About
Articles
Issues
Author Guidelines
Special Issues
Call for Papers
Imprint
Editorial Team
Contacts
Filter
Search
Full Text
Author
Title
by Subject
Topic A - General Literature
Topic B - Hardware
Topic C - Computer Systems Organization
Topic D - Software
Topic E - Data
Topic F - Theory of Computation
Topic G - Mathematics of Computing
Topic H - Information Systems
Topic I - Computing Methodologies
Topic J - Computer Applications
Topic K - Computing Milieux
Topic L - Science and Technology of Learning
Topic M - Knowledge Management
by Publication Date (dd/mm/yyyy)
from
to
by Publication Type
Research Article
(2765)
Editorial
(423)
by Journal
by Funding Agency
Clear filters
Powered by
29 items matching your criteria
Sort by:
Publication date newest
Publication date oldest
Total views
Unique views
Best match
Citations count
Highly accessed (last month)
Highly accessed (last 3 months)
Highly accessed (last 6 months)
Highly accessed (last year)
Filter By:
Subject: I.6.4 - Model Validation and Analysis
Clear All
Copy link
RSS Feed
RSS Feed filters articles only by Classification type, Date (from/to), Publication type
1
2
3
Select:
All
None
Download:
Citation
XML
PDF
Export format
RIS
BIBTEX
Bookends
EasyBib
EndNote (tagged)
EndNote 8 (xml)
Medlars
Mendeley
Papers
RefWorks Tagged
Ref Manager
Zotero
Mods (xml)
Plain text (txt)
Download
Research Article
RatKit: A Novel Methodology for Verifying, Validating, and Testing Agent-Based Simulations: the Boids Case
İbrahim Çakırlar
,
Sevcan Emek
,
Şebnem Bora
,
Oğuz Dikenelli
10.3897/jucs.148927
28-01-2026
Unique: 298 | Total: 393
Access Period: 0
0
133-152
HTML
PDF
Research Article
Classification of CNC Vibration Speeds by Heralick Features
Melih Kuncan
,
Kaplan Kaplan
,
Yılmaz Kaya
,
Mehmet Recep Minaz
,
H. Metin Ertunç
10.3897/jucs.106543
28-03-2024
Unique: 1572 | Total: 2402
Access Period: 0
0
363-382
HTML
PDF
Research Article
Visualizing Portable Executable Headers for Ransomware Detection: A Deep Learning-Based Approach
Tien Quang Dam
,
Nghia Thinh Nguyen
,
Trung Viet Le
,
Tran Duc Le
,
Sylvestre Uwizeyemungu
,
Thang Le-Dinh
10.3897/jucs.104901
28-02-2024
Unique: 2333 | Total: 3240
Access Period: 0
0
262-286
HTML
PDF
Research Article
Towards a Traceable Data Model Accommodating Bounded Uncertainty for DST Based Computation of
BRCA1/2
Mutation Probability With Age
Lorenz Gillner
,
Ekaterina Auer
Part of: Traceable use of emerging technologies in smart systems
10.3897/jucs.112797
28-11-2023
Unique: 1577 | Total: 2179
Access Period: 0
0
1361-1384
HTML
XML
PDF
Research Article
Combining SysML and Timed Coloured Petri Nets for Designing Smart City Applications
Layse Santos Souza
,
Michel S. Soares
10.3897/jucs.97170
28-10-2023
Unique: 1633 | Total: 2314
Access Period: 0
0
1217-1249
HTML
XML
PDF
Research Article
Feature Fusion and NRML Metric Learning for Facial Kinship Verification
Fahimeh Ramazankhani
,
Mahdi Yazdian-Dehkord
,
Mehdi Rezaeian
10.3897/jucs.89254
28-04-2023
Unique: 1809 | Total: 2548
Access Period: 0
0
326-348
HTML
XML
PDF
Research Article
Natural Language Enhancement for English Teaching Using Character-Level Recurrent Neural Network with Back Propagation Neural Network based Classification by Deep Learning Architectures
Zhiling Yang
Part of: AI Empowered Big Data Analytics for Industrial Applications
10.3897/jucs.94162
28-09-2022
Unique: 2427 | Total: 3597
Access Period: 0
0
984-1000
HTML
XML
PDF
Research Article
English Teaching in Artificial Intelligence-based Higher Vocational Education Using Machine Learning Techniques for Students’ Feedback Analysis and Course Selection Recommendation
Xin Ma
Part of: AI Empowered Big Data Analytics for Industrial Applications
10.3897/jucs.94160
28-09-2022
Unique: 2882 | Total: 4378
Access Period: 0
0
898-915
HTML
XML
PDF
Research Article
Social Trust-based Blockchain-enabled Social Media News Verification System
Riri Fitri Sari
,
Asri Ilmananda
,
Daniela Romano
10.3897/jucs.68692
28-09-2021
Unique: 3044 | Total: 5032
Access Period: 0
0
979-998
HTML
XML
PDF
Research Article
Formal Chronicle Analyses and Comparisons: How to Deal with Negative Behaviors
Yannick Pencolé
,
Audine Subias
10.3897/jucs.2020.015
28-02-2020
Unique: 1373 | Total: 2311
Access Period: 0
0
268-292
HTML
XML
PDF
Research Article
The Role of Verification and Validation Techniques within Visual Analytics
Benjamin Weyers
,
Ekaterina Auer
,
Wolfram Luther
Part of: Collaborative Technologies and Data Science in Smart City Applications
10.3217/jucs-025-08-0967
28-08-2019
Unique: 1499 | Total: 2435
Access Period: 0
0
967-987
HTML
XML
PDF
Research Article
Ontology and Weighted D-S Evidence Theory-Based Vulnerability Data Fusion Method
Xiaoling Tao
,
Liyan Liu
,
Feng Zhao
,
Yan Huang
,
Saide Zhu
Part of: Advances of Provable Security Techniques
10.3217/jucs-025-03-0203
28-03-2019
Unique: 1344 | Total: 2260
Access Period: 0
0
203-221
HTML
XML
PDF
1
2
3
This website uses cookies in order to improve your web experience.
Read our Cookies Policy
OK