Register
|
Login
Full Text
Author
Title
Submit manuscript
About
Articles
Issues
Author Guidelines
Special Issues
Call for Papers
Imprint
Editorial Team
Contacts
Filter
Search
Full Text
Author
Title
by Subject
Topic A - General Literature
Topic B - Hardware
Topic C - Computer Systems Organization
Topic D - Software
Topic E - Data
Topic F - Theory of Computation
Topic G - Mathematics of Computing
Topic H - Information Systems
Topic I - Computing Methodologies
Topic J - Computer Applications
Topic K - Computing Milieux
Topic L - Science and Technology of Learning
Topic M - Knowledge Management
by Publication Date (dd/mm/yyyy)
from
to
by Publication Type
Research Article
(2629)
Editorial
(398)
by Journal
by Funding Agency
Clear filters
Powered by
361 items matching your criteria
Sort by:
Publication date newest
Publication date oldest
Total views
Unique views
Best match
Citations count
Highly accessed (last month)
Highly accessed (last 3 months)
Highly accessed (last 6 months)
Highly accessed (last year)
Filter By:
Subject: H.5 - INFORMATION INTERFACES AND PRESENTATION (e.g.
Subject: HCI)
Clear All
Copy link
RSS Feed
RSS Feed filters articles only by Classification type, Date (from/to), Publication type
1
2
3
4
5
Select:
All
None
Download:
Citation
XML
PDF
Export format
RIS
BIBTEX
Bookends
EasyBib
EndNote (tagged)
EndNote 8 (xml)
Medlars
Mendeley
Papers
RefWorks Tagged
Ref Manager
Zotero
Mods (xml)
Plain text (txt)
Download
Research Article
The Modified
Principal Component Analysis
Feature Extraction Method for the Task of Diagnosing Chronic Lymphocytic Leukemia Type
B-CLL
Mariusz Topolski
Part of: Progress in Features, Data, Patterns and Similarity Analysis
10.3897/jucs.2020.039
28-06-2020
Unique: 695 | Total: 1268
| Access Period:
734-746
HTML
XML
PDF
Research Article
Real-Time Bot Detection from Twitter Using the Twitterbot+ Framework
Kheir Daouadi
,
Rim Rebaï
,
Ikram Amous
Part of: Practical Applications of Data Analysis, Classification and Anomaly Detection
10.3897/jucs.2020.026
28-04-2020
Unique: 731 | Total: 1380
| Access Period:
496-507
HTML
XML
PDF
Research Article
Speaker/Style-Dependent Neural Network Speech Synthesis Based on Speaker/Style Embedding
Milan Sečujski
,
Darko Pekar
,
Siniša Suzić
,
Anton Smirnov
,
Tijana Nosek
Part of: Practical Applications of Data Analysis, Classification and Anomaly Detection
10.3897/jucs.2020.023
28-04-2020
Unique: 734 | Total: 1400
| Access Period:
434-453
HTML
XML
PDF
Research Article
Social Choice-based Explanations: An Approach to Enhancing Fairness and Consensus Aspects
Thi Ngoc Trang Tran
,
Muesluem Atas
,
Man Le
,
Ralph Samer
,
Martin Stettinger
Part of: Knowledge-based Configuration
10.3897/jucs.2020.021
28-03-2020
Unique: 707 | Total: 1396
| Access Period:
402-431
HTML
XML
PDF
Research Article
Solver Requirements for Interactive Configuration
Andreas Falkner
,
Alois Haselböck
,
Gerfried Krames
,
Gottfried Schenner
,
Herwig Schreiner
,
Richard Taupe
Part of: Knowledge-based Configuration
10.3897/jucs.2020.019
28-03-2020
Unique: 682 | Total: 1322
| Access Period:
343-373
HTML
XML
PDF
Research Article
MulseOnto: a Reference Ontology to Support the Design of Mulsemedia Systems
Estêvão Saleme
,
Celso A. S. Santos
,
Ricardo Falbo
,
Gheorghita Ghinea
,
Frederic Andres
10.3217/jucs-025-13-1761
28-12-2019
Unique: 776 | Total: 1359
| Access Period:
1761-1786
HTML
XML
PDF
Research Article
Applicability of User Experience and United States of Americability Questionnaires
Andreas Hinderks
,
Dominique Winter
,
Martin Schrepp
,
Jörg Thomaschewski
10.3217/jucs-025-13-1717
28-12-2019
Unique: 967 | Total: 1579
| Access Period:
1717-1735
HTML
XML
PDF
Research Article
Overcoming the Silver Generation Digital Gap
Carlos De Carvalho
,
Pedro Cano
,
José Roa
,
Anna Wanka
,
Franz Kolland
Part of: Advances in Web-Based Learning
10.3217/jucs-025-12-1625
01-12-2019
Unique: 1202 | Total: 1983
| Access Period:
1625-1543
HTML
XML
PDF
Research Article
Cyberattack Response Model for the Nuclear Regulator in Slovenia
Samo Tomažič
,
Igor Bernik
Part of: Cyberattack Detection and Response
10.3217/jucs-025-11-1437
28-11-2019
Unique: 716 | Total: 1193
| Access Period:
1437-1457
HTML
XML
PDF
Research Article
High-Performance Simulation of Drug Release Model Using Finite Element Method with CPU/GPU Platform
Akhtar Ali
,
Imran Bajwa
,
Rafaqat Kazmi
Part of: Intelligent Computing for Society
10.3217/jucs-025-10-1261
28-10-2019
Unique: 735 | Total: 1303
| Access Period:
1261-1278
HTML
XML
PDF
Research Article
The Effects of Platforms and Languages on the Memory Footprint of the Executable Program: A Memory Forensic Approach
Ziad Al-Sharif
,
Mohammed Al-Saleh
,
Yaser Jararweh
,
Ahmed Shatnawi
Part of: Recent Advances in Detection, Investigation and Mitigation of Cyber Crimes
10.3217/jucs-025-09-1174
28-09-2019
Unique: 757 | Total: 1286
| Access Period:
1174-1198
HTML
XML
PDF
Research Article
Determination of System Weaknesses Based on the Analysis of Vulnerability Indexes and the Source Code of Exploits
Andrey Fedorchenko
,
Elena Doynikova
,
Igor Kotenko
Part of: Recent Advances in Detection, Investigation and Mitigation of Cyber Crimes
10.3217/jucs-025-09-1043
28-09-2019
Unique: 762 | Total: 1300
| Access Period:
1043-1065
HTML
XML
PDF
1
2
3
4
5
This website uses cookies in order to improve your web experience.
Read our Cookies Policy
OK