Register
|
Login
Full Text
Author
Title
Submit manuscript
About
Articles
Issues
Author Guidelines
Special Issues
Call for Papers
Imprint
Editorial Team
Contacts
Filter
Search
Full Text
Author
Title
by Subject
Topic A - General Literature
Topic B - Hardware
Topic C - Computer Systems Organization
Topic D - Software
Topic E - Data
Topic F - Theory of Computation
Topic G - Mathematics of Computing
Topic H - Information Systems
Topic I - Computing Methodologies
Topic J - Computer Applications
Topic K - Computing Milieux
Topic L - Science and Technology of Learning
Topic M - Knowledge Management
by Publication Date (dd/mm/yyyy)
from
to
by Publication Type
Research Article
(2694)
Editorial
(409)
by Journal
by Funding Agency
Clear filters
Powered by
Articles
Sort by:
Publication date newest
Publication date oldest
Total views
Unique views
Best match
Citations count
Highly accessed (last month)
Highly accessed (last 3 months)
Highly accessed (last 6 months)
Highly accessed (last year)
6
7
8
9
10
Select:
All
None
Download:
Citation
XML
PDF
Export format
RIS
BIBTEX
Bookends
EasyBib
EndNote (tagged)
EndNote 8 (xml)
Medlars
Mendeley
Papers
RefWorks Tagged
Ref Manager
Zotero
Mods (xml)
Plain text (txt)
Download
Research Article
Reactive Traffic Congestion Control by Using a Hierarchical Graph
Sahar Idwan
,
Junaid Ahmed Zubairi
,
Syed Ali Haider
,
Wael Etaiwi
10.3897/jucs.111879
28-04-2024
Unique: 1022 | Total: 1381
| Access Period:
449-461
HTML
PDF
Research Article
Mapping and Integrating Security and Risk Standards: a Systematic Literature Review
André Fernandes
,
João Cruz
,
Miguel Mira da Silva
,
Rúben Pereira
10.3897/jucs.111677
28-04-2024
Unique: 806 | Total: 1081
| Access Period:
433-448
HTML
PDF
Research Article
Multi-Class Microscopic Image Analysis of Protozoan Parasites Using Convolutional Neural Network
Sivaramasamy Elayaraja
,
Sunil Yeruva
,
Vlastimil Stejskal
,
Satish Nandipati
10.3897/jucs.112639
28-04-2024
Unique: 768 | Total: 1038
| Access Period:
420-432
HTML
PDF
Editorial
Editorial
Christian Gütl
10.3897/jucs.125268
28-04-2024
Unique: 556 | Total: 682
| Access Period:
418-419
HTML
PDF
Research Article
A Novel Data-Driven Attack Method on Machine Learning Models
Emre Sadıkoğlu
,
İrfan Kösesoy
,
Murat Gök
10.3897/jucs.108445
28-03-2024
Unique: 1035 | Total: 1529
| Access Period:
402-417
HTML
PDF
Research Article
An SVR-based and Location-aware Method for Mobile QoS Prediction
Lifang Ren
,
Jing Li
,
Wenjian Wang
10.3897/jucs.106314
28-03-2024
Unique: 838 | Total: 1096
| Access Period:
383-401
HTML
PDF
Research Article
Classification of CNC Vibration Speeds by Heralick Features
Melih Kuncan
,
Kaplan Kaplan
,
Yılmaz Kaya
,
Mehmet Recep Minaz
,
H. Metin Ertunç
10.3897/jucs.106543
28-03-2024
Unique: 931 | Total: 1548
| Access Period:
363-382
HTML
PDF
Research Article
Content Modeling in Smart Learning Environments: A systematic literature review
Alberto Jiménez-Macías
,
Pedro J. Muñoz-Merino
,
Margarita Ortiz-Rojas
,
Mario Muñoz-Organero
,
Carlos Delgado Kloos
10.3897/jucs.106023
28-03-2024
Unique: 1124 | Total: 1539
| Access Period:
333-362
HTML
PDF
Research Article
A Novel LSB Steganography Technique Using Image Segmentation
Yasir Yakup Demircan
,
Serhat Ozekes
10.3897/jucs.105702
28-03-2024
Unique: 975 | Total: 1251
| Access Period:
308-332
HTML
PDF
Research Article
Synthetic Fracterm Calculus
Jan Bergstra
,
John V. Tucker
10.3897/jucs.107082
28-03-2024
Unique: 742 | Total: 977
| Access Period:
289-307
HTML
PDF
Editorial
Editorial
Christian Gütl
10.3897/jucs.123217
28-03-2024
Unique: 575 | Total: 742
| Access Period:
287-288
HTML
PDF
Research Article
Visualizing Portable Executable Headers for Ransomware Detection: A Deep Learning-Based Approach
Tien Quang Dam
,
Nghia Thinh Nguyen
,
Trung Viet Le
,
Tran Duc Le
,
Sylvestre Uwizeyemungu
,
Thang Le-Dinh
10.3897/jucs.104901
28-02-2024
Unique: 1526 | Total: 2116
| Access Period:
262-286
HTML
PDF
6
7
8
9
10
This website uses cookies in order to improve your web experience.
Read our Cookies Policy
OK