Register
|
Login
Full Text
Author
Title
Submit manuscript
About
Articles
Issues
Author Guidelines
Special Issues
Call for Papers
Imprint
Editorial Team
Contacts
Filter
Search
Full Text
Author
Title
by Subject
Topic A - General Literature
Topic B - Hardware
Topic C - Computer Systems Organization
Topic D - Software
Topic E - Data
Topic F - Theory of Computation
Topic G - Mathematics of Computing
Topic H - Information Systems
Topic I - Computing Methodologies
Topic J - Computer Applications
Topic K - Computing Milieux
Topic L - Science and Technology of Learning
Topic M - Knowledge Management
by Publication Date (dd/mm/yyyy)
from
to
by Publication Type
Research Article
(2629)
Editorial
(398)
by Journal
by Funding Agency
Clear filters
Powered by
383 items matching your criteria
Sort by:
Publication date newest
Publication date oldest
Total views
Unique views
Best match
Citations count
Highly accessed (last month)
Highly accessed (last 3 months)
Highly accessed (last 6 months)
Highly accessed (last year)
Filter By:
Subject: H.3 - INFORMATION STORAGE AND RETRIEVAL
Clear All
Copy link
RSS Feed
RSS Feed filters articles only by Classification type, Date (from/to), Publication type
1
2
3
4
5
Select:
All
None
Download:
Citation
XML
PDF
Export format
RIS
BIBTEX
Bookends
EasyBib
EndNote (tagged)
EndNote 8 (xml)
Medlars
Mendeley
Papers
RefWorks Tagged
Ref Manager
Zotero
Mods (xml)
Plain text (txt)
Download
Research Article
Question to Question Similarity Analysis Using Morphological, Syntactic, Semantic, and Lexical Features
Mahmoud Hammad
,
Mohammad Al-Smadi
,
Qanita Baker
,
Muntaha D
,
Nour Al-Khdour
,
Mutaz Younes
,
Enas Khwaileh
Part of: Progress in Features, Data, Patterns and Similarity Analysis
10.3897/jucs.2020.036
28-06-2020
Unique: 737 | Total: 1308
| Access Period:
671-697
HTML
XML
PDF
Research Article
Real-Time Bot Detection from Twitter Using the Twitterbot+ Framework
Kheir Daouadi
,
Rim Rebaï
,
Ikram Amous
Part of: Practical Applications of Data Analysis, Classification and Anomaly Detection
10.3897/jucs.2020.026
28-04-2020
Unique: 710 | Total: 1336
| Access Period:
496-507
HTML
XML
PDF
Research Article
Pompilos, a Model for Augmenting Health Assistant Applications with Social Media Content
Henrique Vianna
,
Jorge Luis Victória Barbosa
Part of: Recent Advances in Social Network Analysis, Management and Security
10.3897/jucs.2020.002
28-01-2020
Unique: 712 | Total: 1544
| Access Period:
4-32
HTML
XML
PDF
Research Article
Integrating 3D Objects in Collaborative Non-Linear Storytelling on the Web
Peter De Lange
,
Petru Nicolaescu
,
Jan Benscheid
,
Ralf Klamma
Part of: Advances in Web-Based Learning
10.3217/jucs-025-12-1608
01-12-2019
Unique: 727 | Total: 1223
| Access Period:
1608-1624
HTML
XML
PDF
Research Article
Cyberattack Response Model for the Nuclear Regulator in Slovenia
Samo Tomažič
,
Igor Bernik
Part of: Cyberattack Detection and Response
10.3217/jucs-025-11-1437
28-11-2019
Unique: 698 | Total: 1164
| Access Period:
1437-1457
HTML
XML
PDF
Research Article
A Web3.0-based Intelligent Learning System Supporting Education in the 21st Century
Khaled Halimi
,
Hassina Seridi-Bouchelaghem
Part of: Intelligent Computing for Society
10.3217/jucs-025-10-1373
28-10-2019
Unique: 941 | Total: 1624
| Access Period:
1373-1393
HTML
XML
PDF
Research Article
High-Performance Simulation of Drug Release Model Using Finite Element Method with CPU/GPU Platform
Akhtar Ali
,
Imran Bajwa
,
Rafaqat Kazmi
Part of: Intelligent Computing for Society
10.3217/jucs-025-10-1261
28-10-2019
Unique: 721 | Total: 1279
| Access Period:
1261-1278
HTML
XML
PDF
Research Article
Digital Investigation of IoT Devices in the Criminal Scene
François Bouchaud
,
Gilles Grimaud
,
Thomas Vantroys
,
Pierrick Buret
Part of: Recent Advances in Detection, Investigation and Mitigation of Cyber Crimes
10.3217/jucs-025-09-1199
28-09-2019
Unique: 1178 | Total: 1952
| Access Period:
1199-1218
HTML
XML
PDF
Research Article
The Effects of Platforms and Languages on the Memory Footprint of the Executable Program: A Memory Forensic Approach
Ziad Al-Sharif
,
Mohammed Al-Saleh
,
Yaser Jararweh
,
Ahmed Shatnawi
Part of: Recent Advances in Detection, Investigation and Mitigation of Cyber Crimes
10.3217/jucs-025-09-1174
28-09-2019
Unique: 739 | Total: 1253
| Access Period:
1174-1198
HTML
XML
PDF
Research Article
Determination of System Weaknesses Based on the Analysis of Vulnerability Indexes and the Source Code of Exploits
Andrey Fedorchenko
,
Elena Doynikova
,
Igor Kotenko
Part of: Recent Advances in Detection, Investigation and Mitigation of Cyber Crimes
10.3217/jucs-025-09-1043
28-09-2019
Unique: 743 | Total: 1271
| Access Period:
1043-1065
HTML
XML
PDF
Research Article
A Model for Resource Management in Smart Cities Based on Crowdsourcing and Gamification
Rodrigo Barbosa Sounited States Of America Orrego
,
Jorge Luis Victória Barbosa
Part of: Collaborative Technologies and Data Science in Smart City Applications
10.3217/jucs-025-08-1018
28-08-2019
Unique: 891 | Total: 1487
| Access Period:
1018-1038
HTML
XML
PDF
Research Article
Improving Ontology Matching Using Application Requirements for Segmenting Ontologies
Diego Pessoa
,
Ana Salgado
,
Bernadette Lóscio
10.3217/jucs-025-07-0816
28-07-2019
Unique: 666 | Total: 1154
| Access Period:
816-839
HTML
XML
PDF
1
2
3
4
5
This website uses cookies in order to improve your web experience.
Read our Cookies Policy
OK