Register
|
Login
Full Text
Author
Title
Submit manuscript
About
Articles
Issues
Author Guidelines
Special Issues
Call for Papers
Imprint
Editorial Team
Contacts
Filter
Search
Full Text
Author
Title
by Subject
Topic A - General Literature
Topic B - Hardware
Topic C - Computer Systems Organization
Topic D - Software
Topic E - Data
Topic F - Theory of Computation
Topic G - Mathematics of Computing
Topic H - Information Systems
Topic I - Computing Methodologies
Topic J - Computer Applications
Topic K - Computing Milieux
Topic L - Science and Technology of Learning
Topic M - Knowledge Management
by Publication Date (dd/mm/yyyy)
from
to
by Publication Type
Research Article
(2629)
Editorial
(398)
by Journal
by Funding Agency
Clear filters
Powered by
Articles
Sort by:
Publication date newest
Publication date oldest
Total views
Unique views
Best match
Citations count
Highly accessed (last month)
Highly accessed (last 3 months)
Highly accessed (last 6 months)
Highly accessed (last year)
16
17
18
19
20
Select:
All
None
Download:
Citation
XML
PDF
Export format
RIS
BIBTEX
Bookends
EasyBib
EndNote (tagged)
EndNote 8 (xml)
Medlars
Mendeley
Papers
RefWorks Tagged
Ref Manager
Zotero
Mods (xml)
Plain text (txt)
Download
Research Article
Data-driven Storytelling to Support Decision Making in Crisis Settings: A Case Study
Andrea Lezcano Airaldi
,
Jorge Andres Diaz-Pace
,
Emanuel Irrazábal
10.3897/jucs.66714
28-10-2021
Unique: 1777 | Total: 3237
| Access Period:
1046-1068
HTML
XML
PDF
Research Article
A Fuzzy Logic Supported Multi-Agent System For Urban Traffic And Priority Link Control
Abdelouafi Ikidid
,
Abdelaziz El Fazziki
,
Mohammed Sadgal
10.3897/jucs.69750
28-10-2021
Unique: 1369 | Total: 2473
| Access Period:
1026-1045
HTML
XML
PDF
Research Article
A new approach to identify dropout learners based on their performance-based behavior
Rochdi Boudjehem
,
Yacine Lafifi
10.3897/jucs.74280
28-10-2021
Unique: 1560 | Total: 2917
| Access Period:
1001-1025
HTML
XML
PDF
Editorial
Editorial
Christian Gütl
10.3897/jucs.76797
28-10-2021
Unique: 837 | Total: 1574
| Access Period:
999-1000
HTML
XML
PDF
Research Article
Social Trust-based Blockchain-enabled Social Media News Verification System
Riri Fitri Sari
,
Asri Ilmananda
,
Daniela Romano
10.3897/jucs.68692
28-09-2021
Unique: 1966 | Total: 3346
| Access Period:
979-998
HTML
XML
PDF
Research Article
Continuations and Aspects to Tame Callback Hell on the Web
Paul Leger
,
Hiroaki Fukuda
,
Ismael Figueroa
10.3897/jucs.72205
28-09-2021
Unique: 1149 | Total: 2135
| Access Period:
955-978
HTML
XML
PDF
Research Article
Non-verbal Aspects of Collaboration in Virtual Worlds: a CSCW Taxonomy-development Proposal Integrating the Presence Dimension
Armando Cruz
,
Hugo Paredes
,
Leonel Morgado
,
Paulo Martins
10.3897/jucs.74166
28-09-2021
Unique: 1558 | Total: 2836
| Access Period:
913-954
HTML
XML
PDF
Editorial
Editorial
Christian Gütl
10.3897/jucs.75354
28-09-2021
Unique: 842 | Total: 1587
| Access Period:
912-912
HTML
XML
PDF
Research Article
A Compiler and Language Support for Designing Mixed-Criticality Applications
Nermin Kajtazovic
,
Peter Hödl
,
Leo Happ Botler
Part of: Recent Advances in Cybersecurity and Safety Architectures in Automotive, IT, and Connected Services
10.3897/jucs.71831
28-08-2021
Unique: 1347 | Total: 3065
| Access Period:
894-911
HTML
XML
PDF
Research Article
Lean integration of IT security and data privacy governance aspects into product development in agile organizations
Alexander Poth
,
Mario Kottke
,
Kerstin Middelhauve
,
Torsten Mahr
,
Andreas Riel
Part of: Recent Advances in Cybersecurity and Safety Architectures in Automotive, IT, and Connected Services
10.3897/jucs.71770
28-08-2021
Unique: 1899 | Total: 3252
| Access Period:
868-893
HTML
XML
PDF
Research Article
Cybersecurity Verification and Validation Testing in Automotive
Damjan Ekert
,
Jürgen Dobaj
,
Alen Salamun
Part of: Recent Advances in Cybersecurity and Safety Architectures in Automotive, IT, and Connected Services
10.3897/jucs.71833
28-08-2021
Unique: 1931 | Total: 3341
| Access Period:
850-867
HTML
XML
PDF
Research Article
Cybersecurity Threat Analysis, Risk Assessment and Design Patterns for Automotive Networked Embedded Systems: A Case Study
Jürgen Dobaj
,
Damjan Ekert
,
Jakub Stolfa
,
Svatopluk Stolfa
,
Georg Macher
,
Richard Messnarz
Part of: Recent Advances in Cybersecurity and Safety Architectures in Automotive, IT, and Connected Services
10.3897/jucs.72367
28-08-2021
Unique: 2060 | Total: 3718
| Access Period:
830-849
HTML
XML
PDF
16
17
18
19
20
This website uses cookies in order to improve your web experience.
Read our Cookies Policy
OK