Register
|
Login
Full Text
Author
Title
Submit manuscript
About
Articles
Issues
Author Guidelines
Special Issues
Call for Papers
Imprint
Editorial Team
Contacts
Filter
Search
Full Text
Author
Title
by Subject
Topic A - General Literature
Topic B - Hardware
Topic C - Computer Systems Organization
Topic D - Software
Topic E - Data
Topic F - Theory of Computation
Topic G - Mathematics of Computing
Topic H - Information Systems
Topic I - Computing Methodologies
Topic J - Computer Applications
Topic K - Computing Milieux
Topic L - Science and Technology of Learning
Topic M - Knowledge Management
by Publication Date (dd/mm/yyyy)
from
to
by Publication Type
Research Article
(2629)
Editorial
(398)
by Journal
by Funding Agency
Clear filters
Powered by
129 items matching your criteria
Sort by:
Publication date newest
Publication date oldest
Total views
Unique views
Best match
Citations count
Highly accessed (last month)
Highly accessed (last 3 months)
Highly accessed (last 6 months)
Highly accessed (last year)
Filter By:
Subject: H.5.1 - Multimedia Information Systems
Clear All
Copy link
RSS Feed
RSS Feed filters articles only by Classification type, Date (from/to), Publication type
1
2
3
4
5
Select:
All
None
Download:
Citation
XML
PDF
Export format
RIS
BIBTEX
Bookends
EasyBib
EndNote (tagged)
EndNote 8 (xml)
Medlars
Mendeley
Papers
RefWorks Tagged
Ref Manager
Zotero
Mods (xml)
Plain text (txt)
Download
Research Article
MulseOnto: a Reference Ontology to Support the Design of Mulsemedia Systems
Estêvão Saleme
,
Celso A. S. Santos
,
Ricardo Falbo
,
Gheorghita Ghinea
,
Frederic Andres
10.3217/jucs-025-13-1761
28-12-2019
Unique: 760 | Total: 1336
| Access Period:
1761-1786
HTML
XML
PDF
Research Article
Overcoming the Silver Generation Digital Gap
Carlos De Carvalho
,
Pedro Cano
,
José Roa
,
Anna Wanka
,
Franz Kolland
Part of: Advances in Web-Based Learning
10.3217/jucs-025-12-1625
01-12-2019
Unique: 1179 | Total: 1939
| Access Period:
1625-1543
HTML
XML
PDF
Research Article
Cyberattack Response Model for the Nuclear Regulator in Slovenia
Samo Tomažič
,
Igor Bernik
Part of: Cyberattack Detection and Response
10.3217/jucs-025-11-1437
28-11-2019
Unique: 698 | Total: 1164
| Access Period:
1437-1457
HTML
XML
PDF
Research Article
High-Performance Simulation of Drug Release Model Using Finite Element Method with CPU/GPU Platform
Akhtar Ali
,
Imran Bajwa
,
Rafaqat Kazmi
Part of: Intelligent Computing for Society
10.3217/jucs-025-10-1261
28-10-2019
Unique: 721 | Total: 1279
| Access Period:
1261-1278
HTML
XML
PDF
Research Article
Determination of System Weaknesses Based on the Analysis of Vulnerability Indexes and the Source Code of Exploits
Andrey Fedorchenko
,
Elena Doynikova
,
Igor Kotenko
Part of: Recent Advances in Detection, Investigation and Mitigation of Cyber Crimes
10.3217/jucs-025-09-1043
28-09-2019
Unique: 743 | Total: 1271
| Access Period:
1043-1065
HTML
XML
PDF
Research Article
The Role of Verification and Validation Techniques within Visual Analytics
Benjamin Weyers
,
Ekaterina Auer
,
Wolfram Luther
Part of: Collaborative Technologies and Data Science in Smart City Applications
10.3217/jucs-025-08-0967
28-08-2019
Unique: 721 | Total: 1295
| Access Period:
967-987
HTML
XML
PDF
Research Article
Modelling of Automotive Engine Dynamics using Diagonal Recurrent Neural Network
Yujia Zhai
,
Kejun Qian
,
Fei Xue
,
Moncef Tayahi
Part of: Recent Advancements in Big Data Technologies and Applications in Computing, IoT and Computer Engineering Technology
10.3217/jucs-024-09-1330
28-09-2018
Unique: 548 | Total: 711
| Access Period:
1330-1342
HTML
XML
PDF
Research Article
Longitudinal Healthcare Data Management Platform of Healthcare IoT Devices for Personalized Services
Ahyoung Choi
,
Hangsik Shin
Part of: Recent Advancements in Big Data Technologies and Applications in Computing, IoT and Computer Engineering Technology
10.3217/jucs-024-09-1153
28-09-2018
Unique: 619 | Total: 860
| Access Period:
1153-1169
HTML
XML
PDF
Research Article
How to Extract Interesting Information for Identity Verification Process from Spectrograms?
Kamil Książek
,
Karolina Kęsik
,
Zbigniew Marszałek
Part of: Advances in Security and Privacy of Multimodal Interfaces
10.3217/jucs-024-04-0444
28-04-2018
Unique: 483 | Total: 625
| Access Period:
444-459
HTML
XML
PDF
Research Article
Cloud Biometric Authentication: An Integrated Reliability and Security Method Using the Reinforcement Learning Algorithm and Queue Theory
A M N Balla Husamelddin
,
Guang Chen
,
Weipeng Jing
Part of: Advances in Security and Privacy of Multimodal Interfaces
10.3217/jucs-024-04-0372
28-04-2018
Unique: 509 | Total: 680
| Access Period:
372-391
HTML
XML
PDF
Research Article
Shortages and Challenges in Augmentative Communication through Tangible Interaction Using a User-centered Design and Assessment Process
Cecilia Sanz
,
Veronica Artola
,
Andrea Guisen
,
Javier Marco
,
Eva Cerezo
,
Sandra Baldassarri
10.3217/jucs-023-10-0992
28-10-2017
Unique: 501 | Total: 659
| Access Period:
992-1016
HTML
XML
PDF
Research Article
OnionSIP: Preserving Privacy in SIP with Onion Routing
Alexandros Fakis
,
Georgios Karopoulos
,
Georgios Kambourakis
10.3217/jucs-023-10-0969
28-10-2017
Unique: 476 | Total: 645
| Access Period:
969-991
HTML
XML
PDF
1
2
3
4
5
This website uses cookies in order to improve your web experience.
Read our Cookies Policy
OK