Register
|
Login
Full Text
Author
Title
Submit manuscript
About
Articles
Issues
Author Guidelines
Special Issues
Call for Papers
Imprint
Editorial Team
Contacts
Filter
Search
Full Text
Author
Title
by Subject
Topic A - General Literature
Topic B - Hardware
Topic C - Computer Systems Organization
Topic D - Software
Topic E - Data
Topic F - Theory of Computation
Topic G - Mathematics of Computing
Topic H - Information Systems
Topic I - Computing Methodologies
Topic J - Computer Applications
Topic K - Computing Milieux
Topic L - Science and Technology of Learning
Topic M - Knowledge Management
by Publication Date (dd/mm/yyyy)
from
to
by Publication Type
Research Article
(2635)
Editorial
(399)
by Journal
by Funding Agency
Clear filters
Powered by
Articles
Sort by:
Publication date newest
Publication date oldest
Total views
Unique views
Best match
Citations count
Highly accessed (last month)
Highly accessed (last 3 months)
Highly accessed (last 6 months)
Highly accessed (last year)
21
22
23
24
25
Select:
All
None
Download:
Citation
XML
PDF
Export format
RIS
BIBTEX
Bookends
EasyBib
EndNote (tagged)
EndNote 8 (xml)
Medlars
Mendeley
Papers
RefWorks Tagged
Ref Manager
Zotero
Mods (xml)
Plain text (txt)
Download
Research Article
Exploring Virtual Reality in the Higher Education Classroom: Using VR to Build Knowledge and Understanding
Gareth Young
,
Sam Stehle
,
Burcin Walsh
,
Egess Tiri
Part of: Exploring Immersive Technologies in Learning
10.3897/jucs.2020.049
28-08-2020
Unique: 1673 | Total: 2755
| Access Period:
904-928
HTML
XML
PDF
Research Article
Assessing the Impact of Game Modalities in Second Language Acquisition:
ELLE the EndLess LEarner
Emily Johnson
,
Amy Giroux
,
Don Merritt
,
Gergana Vitanova
,
Sandra Sousa
Part of: Exploring Immersive Technologies in Learning
10.3897/jucs.2020.048
28-08-2020
Unique: 942 | Total: 1594
| Access Period:
880-903
HTML
XML
PDF
Research Article
Lessons Learned Using a Virtual World to Support Collaborative Learning in the Classroom
Louis Nisiotis
,
Styliani Kleanthous
Part of: Exploring Immersive Technologies in Learning
10.3897/jucs.2020.047
28-08-2020
Unique: 854 | Total: 1473
| Access Period:
858-879
HTML
XML
PDF
Editorial
Exploring Immersive Technologies in Learning
Anasol Peña-Rios
,
Daphne Economou
,
Markos Mentzelopoulos
Part of: Exploring Immersive Technologies in Learning
10.3897/jucs.2020.046
28-08-2020
Unique: 641 | Total: 1181
| Access Period:
854-857
HTML
XML
PDF
Research Article
Evaluating Case Study and Action Research Reports: Real-world Research in Cybersecurity
Simon Vrhovec
,
Damjan Fujs
,
Luka Jelovčan
,
Anže Mihelič
Part of: Information Security Methodology, Replication Studies and Information Security Education
10.3897/jucs.2020.045
28-07-2020
Unique: 958 | Total: 1662
| Access Period:
827-853
HTML
XML
PDF
Research Article
Utilizing Debugging Information of Applications in Memory Forensics
Mohammed Al-Saleh
,
Ethar Qawasmeh
,
Ziad Al-Sharif
Part of: Information Security Methodology, Replication Studies and Information Security Education
10.3897/jucs.2020.044
28-07-2020
Unique: 693 | Total: 1304
| Access Period:
805-826
HTML
XML
PDF
Research Article
(De-)Constructing Attacker Categorisations: A Typology Iteration for the Case of Digital Banking
Caroline Moeckel
Part of: Information Security Methodology, Replication Studies and Information Security Education
10.3897/jucs.2020.043
28-07-2020
Unique: 688 | Total: 1247
| Access Period:
783-804
HTML
XML
PDF
Research Article
Bibliometric Mapping of Research on User Training for Secure Use of Information Systems
Damjan Fujs
,
Simon Vrhovec
,
Damjan Vavpotič
Part of: Information Security Methodology, Replication Studies and Information Security Education
10.3897/jucs.2020.042
28-07-2020
Unique: 778 | Total: 1379
| Access Period:
764-782
HTML
XML
PDF
Editorial
Information Security Methodology, Replication Studies and Information Security Education
Steffen Wendzel
,
Luca Caviglione
,
Alessandro Checco
,
Aleksandra Mileva
,
Jean-Francois Lalande
,
Wojciech Mazurczyk
Part of: Information Security Methodology, Replication Studies and Information Security Education
10.3897/jucs.2020.041
28-07-2020
Unique: 727 | Total: 1280
| Access Period:
762-763
HTML
XML
PDF
Research Article
IoT Heating Solution for Smart Home with Fuzzy Control
Łukasz Apiecionek
,
Jacek Czerniak
,
Dawid Ewald
,
Mateusz Biedziak
Part of: Progress in Features, Data, Patterns and Similarity Analysis
10.3897/jucs.2020.040
28-06-2020
Unique: 729 | Total: 1306
| Access Period:
747-761
HTML
XML
PDF
Research Article
The Modified
Principal Component Analysis
Feature Extraction Method for the Task of Diagnosing Chronic Lymphocytic Leukemia Type
B-CLL
Mariusz Topolski
Part of: Progress in Features, Data, Patterns and Similarity Analysis
10.3897/jucs.2020.039
28-06-2020
Unique: 712 | Total: 1297
| Access Period:
734-746
HTML
XML
PDF
Research Article
Integration of Decision Trees Using Distance to Centroid and to Decision Boundary
Jedrzej Biedrzycki
,
Robert Burduk
Part of: Progress in Features, Data, Patterns and Similarity Analysis
10.3897/jucs.2020.038
28-06-2020
Unique: 670 | Total: 1221
| Access Period:
720-733
HTML
XML
PDF
21
22
23
24
25
This website uses cookies in order to improve your web experience.
Read our Cookies Policy
OK