Register
|
Login
Full Text
Author
Title
Submit manuscript
About
Articles
Issues
Author Guidelines
Special Issues
Call for Papers
Imprint
Editorial Team
Contacts
Filter
Search
Full Text
Author
Title
by Subject
Topic A - General Literature
Topic B - Hardware
Topic C - Computer Systems Organization
Topic D - Software
Topic E - Data
Topic F - Theory of Computation
Topic G - Mathematics of Computing
Topic H - Information Systems
Topic I - Computing Methodologies
Topic J - Computer Applications
Topic K - Computing Milieux
Topic L - Science and Technology of Learning
Topic M - Knowledge Management
by Publication Date (dd/mm/yyyy)
from
to
by Publication Type
Research Article
(2635)
Editorial
(399)
by Journal
by Funding Agency
Clear filters
Powered by
583 items matching your criteria
Sort by:
Publication date newest
Publication date oldest
Total views
Unique views
Best match
Citations count
Highly accessed (last month)
Highly accessed (last 3 months)
Highly accessed (last 6 months)
Highly accessed (last year)
Filter By:
Subject: Topic I - Computing Methodologies
Clear All
Copy link
RSS Feed
RSS Feed filters articles only by Classification type, Date (from/to), Publication type
16
17
18
19
20
Select:
All
None
Download:
Citation
XML
PDF
Export format
RIS
BIBTEX
Bookends
EasyBib
EndNote (tagged)
EndNote 8 (xml)
Medlars
Mendeley
Papers
RefWorks Tagged
Ref Manager
Zotero
Mods (xml)
Plain text (txt)
Download
Research Article
An Aspect-Based Sentiment Analysis Approach to Evaluating Arabic News Affect on Readers
Mohammad Al-Smadi
,
Mahmoud Al-Ayyoub
,
Huda Al-Sarhan
,
Yaser Jararweh
Part of: New Trends in Opinion Mining Technologies in the Industry
10.3217/jucs-022-05-0630
01-05-2016
Unique: 560 | Total: 709
| Access Period:
630-649
HTML
XML
PDF
Research Article
An Approach for Intrusion Detection Using Novel Gaussian Based Kernel Function
Gunupudi Kumar
,
Nimmala Mangathayaru
,
Gugulothu Narsimha
Part of: Advanced Research on Software Security Design and Applications
10.3217/jucs-022-04-0589
01-04-2016
Unique: 467 | Total: 637
| Access Period:
589-604
HTML
XML
PDF
Research Article
Feature Selection for Black Hole Attacks
Muneer Yassein
,
Yaser Khamayseh
,
Mai Abujazoh
Part of: Advanced Research on Software Security Design and Applications
10.3217/jucs-022-04-0521
01-04-2016
Unique: 494 | Total: 684
| Access Period:
521-536
HTML
XML
PDF
Research Article
Detection of the Spiral of Silence Effect in Social Media
I-Hsien Ting
Part of: Analyzing and Mining Social Networks for Decision Support
10.3217/jucs-022-03-0438
01-03-2016
Unique: 434 | Total: 562
| Access Period:
438-452
HTML
XML
PDF
Research Article
Fuzzy Modeling of User Behaviors and Virtual Goods Purchases in Social Networking Platforms
Jarosław Jankowski
,
Kostas Kolomvatsos
,
Przemysław Kazienko
,
Jarosław Wątróbski
Part of: Analyzing and Mining Social Networks for Decision Support
10.3217/jucs-022-03-0416
01-03-2016
Unique: 523 | Total: 696
| Access Period:
416-437
HTML
XML
PDF
Research Article
Going beyond your Personal Learning Network, Using Recommendations and Trust through a Multimedia Question-Answering Service for Decision-support: a Case Study in the Healthcare
Patricia Santos
,
Sebastian Dennerlein
,
Dieter Theiler
,
John Cook
,
Tamsin Treasure-Jones
,
Debbie Holley
,
Micky Kerr
,
Graham Attwell
,
Dominik Kowald
,
Elisabeth Lex
Part of: Analyzing and Mining Social Networks for Decision Support
10.3217/jucs-022-03-0340
01-03-2016
Unique: 532 | Total: 708
| Access Period:
340-359
HTML
XML
PDF
Research Article
Content-based Information Retrieval by Named Entity Recognition and Verb Semantic Role Labelling
Betina J
,
G. Mahalakshmi
Part of: Information Retrieval and Recommender Systems
10.3217/jucs-021-13-1830
28-12-2015
Unique: 491 | Total: 613
| Access Period:
1830-1848
HTML
XML
PDF
Research Article
Cross-Language Source Code Re-Use Detection Using Latent Semantic Analysis
Enrique Flores
,
Alberto Barrón-Cedeño
,
Lidia Moreno
,
Paolo Rosso
Part of: Information Retrieval and Recommender Systems
10.3217/jucs-021-13-1708
28-12-2015
Unique: 562 | Total: 755
| Access Period:
1708-1725
HTML
XML
PDF
Research Article
On Real-valued Visual Cryptographic Basis Matrices
Neil Buckley
,
Atulya Nagar
,
Subramanian Arumugam
10.3217/jucs-021-12-1536
01-11-2015
Unique: 398 | Total: 517
| Access Period:
1536-1562
HTML
XML
PDF
Research Article
PSO-Based Feature Selection for Arabic Text Summarization
Ahmed Al-Zahrani
,
Hassan Mathkour
,
Hassan Abdalla
Part of: Enabling Technologies and Business Infrastructures for Next Generation Social Media:Big Data, Cloud Computing, Internet of Things and Virtual Reality
10.3217/jucs-021-11-1454
01-11-2015
Unique: 515 | Total: 689
| Access Period:
1454-1469
HTML
XML
PDF
Research Article
An Adaptive Metaheuristic for Vehicle Routing Problems with Time Windows and Multiple Service Workers
Gerald De Grancy
10.3217/jucs-021-09-1143
01-09-2015
Unique: 437 | Total: 547
| Access Period:
1143-1167
HTML
XML
PDF
Research Article
Non-Photorealistic Rendering of Neural Cells from their Morphological Description
Angela Mendoza
,
Susana Mata
,
Luis Pastor
10.3217/jucs-021-07-0935
01-07-2015
Unique: 512 | Total: 658
| Access Period:
935-958
HTML
XML
PDF
16
17
18
19
20
This website uses cookies in order to improve your web experience.
Read our Cookies Policy
OK