Register
|
Login
Full Text
Author
Title
Submit manuscript
About
Articles
Issues
Author Guidelines
Special Issues
Call for Papers
Imprint
Editorial Team
Contacts
Filter
Search
Full Text
Author
Title
by Subject
Topic A - General Literature
Topic B - Hardware
Topic C - Computer Systems Organization
Topic D - Software
Topic E - Data
Topic F - Theory of Computation
Topic G - Mathematics of Computing
Topic H - Information Systems
Topic I - Computing Methodologies
Topic J - Computer Applications
Topic K - Computing Milieux
Topic L - Science and Technology of Learning
Topic M - Knowledge Management
by Publication Date (dd/mm/yyyy)
from
to
by Publication Type
Research Article
(2629)
Editorial
(398)
by Journal
by Funding Agency
Clear filters
Powered by
76 items matching your criteria
Sort by:
Publication date newest
Publication date oldest
Total views
Unique views
Best match
Citations count
Highly accessed (last month)
Highly accessed (last 3 months)
Highly accessed (last 6 months)
Highly accessed (last year)
Filter By:
Subject: H.3.7 - Digital Libraries
Clear All
Copy link
RSS Feed
RSS Feed filters articles only by Classification type, Date (from/to), Publication type
1
2
3
4
5
Select:
All
None
Download:
Citation
XML
PDF
Export format
RIS
BIBTEX
Bookends
EasyBib
EndNote (tagged)
EndNote 8 (xml)
Medlars
Mendeley
Papers
RefWorks Tagged
Ref Manager
Zotero
Mods (xml)
Plain text (txt)
Download
Research Article
Cloud Biometric Authentication: An Integrated Reliability and Security Method Using the Reinforcement Learning Algorithm and Queue Theory
A M N Balla Husamelddin
,
Guang Chen
,
Weipeng Jing
Part of: Advances in Security and Privacy of Multimodal Interfaces
10.3217/jucs-024-04-0372
28-04-2018
Unique: 523 | Total: 701
| Access Period:
372-391
HTML
XML
PDF
Research Article
Using Content to Identify Overlapping Communities in Question Answer Forums
Mohsen Shahriari
,
Sabrina Haefele
,
Ralf Klamma
10.3217/jucs-023-09-0907
28-09-2017
Unique: 437 | Total: 561
| Access Period:
907-931
HTML
XML
PDF
Research Article
Exploring Teachers' Perceptions on Modeling Effort Demanded by CSCL Designs with Explicit Artifact Flow Support
Osmel Bordies
,
Yannis Dimitriadis
Part of: Computer Supported Collaborative Work
10.3217/jucs-022-10-1398
01-10-2016
Unique: 492 | Total: 633
| Access Period:
1398-1417
HTML
XML
PDF
Research Article
Insecurity of an Efficient Privacy-preserving Public Auditing Scheme for Cloud Data Storage
Hongyu Liu
,
Leiting Chen
,
Zahra Davar
,
Mohammad Pour
Part of: Recent Advances in Security and Privacy in Big Data
10.3217/jucs-021-03-0473
01-03-2015
Unique: 456 | Total: 611
| Access Period:
473-482
HTML
XML
PDF
Research Article
An Improved Cloud Data Sharing Scheme with Hierarchical Attribute Structure
Zhusong Liu
,
Hongyang Yan
,
Zhiqiang Lin
,
Lingling Xu
Part of: Recent Advances in Security and Privacy in Big Data
10.3217/jucs-021-03-0454
01-03-2015
Unique: 453 | Total: 583
| Access Period:
454-472
HTML
XML
PDF
Research Article
On the Security of a User Equipment Registration Procedure in Femtocell-Enabled Networks
Chien-Ming Chen
,
Tsu-Yang Wu
,
Raylin Tso
,
Masahiro Mambo
,
Mu-En Wu
Part of: Recent Advances in Security and Privacy in Big Data
10.3217/jucs-021-03-0406
01-03-2015
Unique: 509 | Total: 646
| Access Period:
406-418
HTML
XML
PDF
Research Article
A Utility-Oriented Routing Scheme for Interest-Driven Community-Based Opportunistic Networks
Xiuwen Fu
,
Wenfeng Li
,
Giancarlo Fortino
,
Pasquale Pace
,
Gianluca Aloi
,
Wilma Russo
Part of: Collaborative Computing and Applications
10.3217/jucs-020-13-1829
28-11-2014
Unique: 487 | Total: 624
| Access Period:
1829-1854
HTML
XML
PDF
Research Article
Developing Distributed Collaborative Applications with HTML5 under the Coupled Objects Paradigm
Nelson Baloian
,
Diego Aguirre
,
Gustavo Zurita
Part of: Collaborative Computing and Applications
10.3217/jucs-020-13-1712
28-11-2014
Unique: 570 | Total: 853
| Access Period:
1712-1737
HTML
XML
PDF
Research Article
Development of Navigation Skills through Audio Haptic Videogaming in Learners who are Blind
Jaime Sánchez
,
Marcia Campos
Part of: Technologies for Enhancing Accessibility and Fighting Info-exclusion
10.3217/jucs-019-18-2677
01-12-2013
Unique: 488 | Total: 601
| Access Period:
2677-2697
HTML
XML
PDF
Research Article
Text Analysis for Monitoring Personal Information Leakage on Twitter
Dongjin Choi
,
Jeongin Kim
,
Xeufeng Piao
,
Pankoo Kim
Part of: Information Security
10.3217/jucs-019-16-2472
01-10-2013
Unique: 522 | Total: 667
| Access Period:
2472-2485
HTML
XML
PDF
Research Article
Semantic Integration of Heterogeneous Data Sources in the MOMIS Data Transformation System
Maurizio Vincini
,
Domenico Beneventano
,
Sonia Bergamaschi
Part of: Industrial and Business Applications of Semantic Web Technologies
10.3217/jucs-019-13-1986
01-07-2013
Unique: 467 | Total: 615
| Access Period:
1986-2012
HTML
XML
PDF
Research Article
Key-Insulated Signcryption
Jia Fan
,
Yuliang Zheng
,
Xiaohu Tang
10.3217/jucs-019-10-1351
28-05-2013
Unique: 503 | Total: 664
| Access Period:
1351-1374
HTML
XML
PDF
1
2
3
4
5
This website uses cookies in order to improve your web experience.
Read our Cookies Policy
OK