Register
|
Login
Full Text
Author
Title
Submit manuscript
About
Articles
Issues
Author Guidelines
Special Issues
Call for Papers
Imprint
Editorial Team
Contacts
Filter
Search
Full Text
Author
Title
by Subject
Topic A - General Literature
Topic B - Hardware
Topic C - Computer Systems Organization
Topic D - Software
Topic E - Data
Topic F - Theory of Computation
Topic G - Mathematics of Computing
Topic H - Information Systems
Topic I - Computing Methodologies
Topic J - Computer Applications
Topic K - Computing Milieux
Topic L - Science and Technology of Learning
Topic M - Knowledge Management
by Publication Date (dd/mm/yyyy)
from
to
by Publication Type
Research Article
(2648)
Editorial
(401)
by Journal
by Funding Agency
Clear filters
Powered by
Articles
Sort by:
Publication date newest
Publication date oldest
Total views
Unique views
Best match
Citations count
Highly accessed (last month)
Highly accessed (last 3 months)
Highly accessed (last 6 months)
Highly accessed (last year)
131
132
133
134
135
Select:
All
None
Download:
Citation
XML
PDF
Export format
RIS
BIBTEX
Bookends
EasyBib
EndNote (tagged)
EndNote 8 (xml)
Medlars
Mendeley
Papers
RefWorks Tagged
Ref Manager
Zotero
Mods (xml)
Plain text (txt)
Download
Research Article
Chainable and Circularly Chainable Co-r.e. Sets in Computable Metric Spaces
Zvonko Iljazović
10.3217/jucs-015-06-1206
28-03-2009
Unique: 375 | Total: 448
| Access Period:
1206-1235
HTML
XML
PDF
Research Article
Oracles and Relativizations of the P =? NP Question for Several Structures
Christine Gaßner
10.3217/jucs-015-06-1186
28-03-2009
Unique: 441 | Total: 519
| Access Period:
1186-1205
HTML
XML
PDF
Research Article
Effective Computability of Solutions of Differential Inclusions The Ten Thousand Monkeys Approach
Pieter Collins
,
Daniel Graça
10.3217/jucs-015-06-1162
28-03-2009
Unique: 419 | Total: 477
| Access Period:
1162-1185
HTML
XML
PDF
Research Article
On the Effective Existence of Schauder Bases
Volker Bosserhoff
10.3217/jucs-015-06-1145
28-03-2009
Unique: 413 | Total: 487
| Access Period:
1145-1161
HTML
XML
PDF
Editorial
Computability and Complexity in Analysis
Vasco Brattka
,
Pieter Collins
,
Robert Rettinger
10.3217/jucs-015-06
28-03-2009
Unique: 358 | Total: 410
| Access Period:
1143-1144
HTML
XML
PDF
Research Article
A Neural Network Based Vehicle Classification System for Pervasive Smart Road Security
Naixue Xiong
,
Jing He
,
Jong Park
,
Donald Cooley
,
Yingshu Li
10.3217/jucs-015-05-1119
01-03-2009
Unique: 390 | Total: 470
| Access Period:
1119-1142
HTML
XML
PDF
Research Article
Cooperation Enforcement in a Highly Dynamic Mobile Ad Hoc Network
Yao Ho
,
Ai Ho
,
Kien Hua
,
Fei Xie
10.3217/jucs-015-05-1090
01-03-2009
Unique: 354 | Total: 419
| Access Period:
1090-1118
HTML
XML
PDF
Research Article
Vascular Pattern Analysis towards Pervasive Palm Vein Authentication
Debnath Bhattacharyya
,
Poulami Das
,
Tai-hoon Kim
,
Samir Bandyopadhyay
10.3217/jucs-015-05-1081
01-03-2009
Unique: 460 | Total: 572
| Access Period:
1081-1089
HTML
XML
PDF
Research Article
USF-PAS : Study on Core Security Technologies for Ubiquitous Security Framework
Jong Park
10.3217/jucs-015-05-1065
01-03-2009
Unique: 379 | Total: 466
| Access Period:
1065-1080
HTML
XML
PDF
Research Article
Light-Weight Key Exchange with Different Passwords in the Standard Model
Jeong Kwon
,
Ik Jeong
,
Dong Lee
10.3217/jucs-015-05-1042
01-03-2009
Unique: 358 | Total: 423
| Access Period:
1042-1064
HTML
XML
PDF
Research Article
Protecting Mobile TV Multimedia Content in DVB/GPRS Heterogeneous Wireless Networks
Shiguo Lian
,
Yan Zhang
10.3217/jucs-015-05-1023
01-03-2009
Unique: 475 | Total: 557
| Access Period:
1023-1041
HTML
XML
PDF
Research Article
Security Analysis of the Full-Round CHESS-64 Cipher Suitable for Pervasive Computing Environments
Changhoon Lee
,
Jongsung Kim
,
Seokhie Hong
,
Yang-Sun Lee
10.3217/jucs-015-05-1007
01-03-2009
Unique: 397 | Total: 460
| Access Period:
1007-1022
HTML
XML
PDF
131
132
133
134
135
This website uses cookies in order to improve your web experience.
Read our Cookies Policy
OK