Register
|
Login
Full Text
Author
Title
Submit manuscript
About
News
Articles
Issues
Author Guidelines
Special Issues
Call for Papers
Imprint
Editorial Team
Contacts
Filter
Search
Full Text
Author
Title
by Subject
Topic A - General Literature
Topic B - Hardware
Topic C - Computer Systems Organization
Topic D - Software
Topic E - Data
Topic F - Theory of Computation
Topic G - Mathematics of Computing
Topic H - Information Systems
Topic I - Computing Methodologies
Topic J - Computer Applications
Topic K - Computing Milieux
Topic L - Science and Technology of Learning
Topic M - Knowledge Management
by Publication Date (dd/mm/yyyy)
from
to
by Publication Type
Research Article
(2721)
Editorial
(415)
by Journal
by Funding Agency
Clear filters
Powered by
98 items matching your criteria
Sort by:
Publication date newest
Publication date oldest
Total views
Unique views
Best match
Citations count
Highly accessed (last month)
Highly accessed (last 3 months)
Highly accessed (last 6 months)
Highly accessed (last year)
Filter By:
Subject: I.6 - SIMULATION AND MODELING
Clear All
Copy link
RSS Feed
RSS Feed filters articles only by Classification type, Date (from/to), Publication type
1
2
3
4
5
Select:
All
None
Download:
Citation
XML
PDF
Export format
RIS
BIBTEX
Bookends
EasyBib
EndNote (tagged)
EndNote 8 (xml)
Medlars
Mendeley
Papers
RefWorks Tagged
Ref Manager
Zotero
Mods (xml)
Plain text (txt)
Download
Research Article
The Role of Verification and Validation Techniques within Visual Analytics
Benjamin Weyers
,
Ekaterina Auer
,
Wolfram Luther
Part of: Collaborative Technologies and Data Science in Smart City Applications
10.3217/jucs-025-08-0967
28-08-2019
Unique: 1164 | Total: 1994
| Access Period:
967-987
HTML
XML
PDF
Research Article
Scheduling Mandatory-Optional Real-Time Tasks in Homogeneous Multi-Core Systems with Energy Constraints Using Bio-Inspired Meta-Heuristics
Matias Micheletto
,
Rodrigo Santos
,
Javier Orozco
10.3217/jucs-025-04-0390
28-04-2019
Unique: 1026 | Total: 1803
| Access Period:
390-417
HTML
XML
PDF
Research Article
Ontology and Weighted D-S Evidence Theory-Based Vulnerability Data Fusion Method
Xiaoling Tao
,
Liyan Liu
,
Feng Zhao
,
Yan Huang
,
Saide Zhu
Part of: Advances of Provable Security Techniques
10.3217/jucs-025-03-0203
28-03-2019
Unique: 1101 | Total: 1922
| Access Period:
203-221
HTML
XML
PDF
Research Article
A Cross-Device Architecture for Modelling Authentication Features in IoT Applications
Darwin Alulema
,
Javier Criado
,
Luis Iribarne
Part of: Quality and Reliability Engineering: Trends and Future Directions
10.3217/jucs-024-12-1758
28-12-2018
Unique: 1018 | Total: 1403
| Access Period:
1758-1775
HTML
XML
PDF
Research Article
Computational Models of Language Evolution: Challenges and Future Perspectives
Fernando Ferri
,
Arianna D’Ulizia
,
Patrizia Grifoni
10.3217/jucs-024-10-1345
28-10-2018
Unique: 845 | Total: 1159
| Access Period:
1345-1377
HTML
XML
PDF
Research Article
Prospects and Challenges for the Computational Social Sciences
Giangiacomo Bravo
,
Mike Farjam
10.3217/jucs-023-11-1057
28-11-2017
Unique: 939 | Total: 1267
| Access Period:
1057-1069
HTML
XML
PDF
Research Article
Big Data in Cross-Disciplinary Research
Giangiacomo Bravo
,
Mikko Laitinen
,
Magnus Levin
,
Welf Löwe
,
Göran Petersson
10.3217/jucs-023-11-1035
28-11-2017
Unique: 948 | Total: 1298
| Access Period:
1035-1037
HTML
XML
PDF
Research Article
A Literature Survey: Is it Necessary to Develop a New Software Development Methodology for Virtual Reality Projects?
Ulas Gulec
,
Murat Yilmaz
,
Veysi Isler
10.3217/jucs-023-08-0725
28-08-2017
Unique: 897 | Total: 1270
| Access Period:
725-754
HTML
XML
PDF
Research Article
Solving a Large Real-world Bus Driver Scheduling Problem with a Multi-assignment based Heuristic Algorithm
Ademir Constantino
,
Candido Ferreira Xavier De Mendonca Neto
,
Silvio De Araujo
,
Dario Landa-Silva
,
Rogério Calvi
,
Allainclair Flausino dos Santos
10.3217/jucs-023-05-0479
28-05-2017
Unique: 1063 | Total: 1470
| Access Period:
479-504
HTML
XML
PDF
Research Article
Improving Performance of the Differential Evolution Algorithm Using Cyclic Decloning and Changeable Population Size
Piotr Jędrzejowicz
,
Aleksander Skakovski
Part of: Computational Intelligence Tools for Processing Collective Data
10.3217/jucs-022-06-0874
01-06-2016
Unique: 823 | Total: 1126
| Access Period:
874-893
HTML
XML
PDF
Research Article
Feature Selection for Black Hole Attacks
Muneer Yassein
,
Yaser Khamayseh
,
Mai Abujazoh
Part of: Advanced Research on Software Security Design and Applications
10.3217/jucs-022-04-0521
01-04-2016
Unique: 889 | Total: 1226
| Access Period:
521-536
HTML
XML
PDF
Research Article
Consistency Checking in Early Software Product Line Specifications - The VCC Approach
Mauricio Alférez
,
Roberto Lopez-Herrejón
,
Ana Moreira
,
Vasco Amaral
,
Alexander Egyed
Part of: Software Components, Architectures and Reuse: Software Product Line Engineering and Source Code Enhancements
10.3217/jucs-020-05-0640
01-05-2014
Unique: 1081 | Total: 1540
| Access Period:
640-665
HTML
XML
PDF
1
2
3
4
5
This website uses cookies in order to improve your web experience.
Read our Cookies Policy
OK