Register
|
Login
Full Text
Author
Title
Submit manuscript
About
Articles
Issues
Topical collections
Author Guidelines
Imprint
Editorial Team
Contacts
Filter
Search
Full Text
Author
Title
by Subject
Topic A - General Literature
Topic B - Hardware
Topic C - Computer Systems Organization
Topic D - Software
Topic E - Data
Topic F - Theory of Computation
Topic G - Mathematics of Computing
Topic H - Information Systems
Topic I - Computing Methodologies
Topic J - Computer Applications
Topic K - Computing Milieux
Topic L - Science and Technology of Learning
Topic M - Knowledge Management
by Publication Date (dd/mm/yyyy)
from
to
by Publication Type
Research Article
(2548)
Editorial
(383)
by Journal
by Funding Agency
Clear filters
Powered by
Articles
Sort by:
Publication date newest
Publication date oldest
Total views
Unique views
Best match
Citations count
Highly accessed (last month)
Highly accessed (last 3 months)
Highly accessed (last 6 months)
Highly accessed (last year)
6
7
8
9
10
Select:
All
None
Download:
Citation
XML
PDF
Export format
RIS
BIBTEX
Bookends
EasyBib
EndNote (tagged)
EndNote 8 (xml)
Medlars
Mendeley
Papers
RefWorks Tagged
Ref Manager
Zotero
Mods (xml)
Plain text (txt)
Download
Research Article
Data-driven Storytelling to Support Decision Making in Crisis Settings: A Case Study
Andrea Lezcano Airaldi
,
Jorge Andres Diaz-Pace
,
Emanuel Irrazábal
10.3897/jucs.66714
28-10-2021
Unique: 971 | Total: 1686
| Access Period:
1046-1068
HTML
XML
PDF
Research Article
A Fuzzy Logic Supported Multi-Agent System For Urban Traffic And Priority Link Control
Abdelouafi Ikidid
,
Abdelaziz El Fazziki
,
Mohammed Sadgal
10.3897/jucs.69750
28-10-2021
Unique: 739 | Total: 1303
| Access Period:
1026-1045
HTML
XML
PDF
Research Article
A new approach to identify dropout learners based on their performance-based behavior
Rochdi Boudjehem
,
Yacine Lafifi
10.3897/jucs.74280
28-10-2021
Unique: 967 | Total: 1820
| Access Period:
1001-1025
HTML
XML
PDF
Editorial
Editorial
Christian Gütl
10.3897/jucs.76797
28-10-2021
Unique: 492 | Total: 841
| Access Period:
999-1000
HTML
XML
PDF
Research Article
Social Trust-based Blockchain-enabled Social Media News Verification System
Riri Fitri Sari
,
Asri Ilmananda
,
Daniela Romano
10.3897/jucs.68692
28-09-2021
Unique: 1217 | Total: 1919
| Access Period:
979-998
HTML
XML
PDF
Research Article
Continuations and Aspects to Tame Callback Hell on the Web
Paul Leger
,
Hiroaki Fukuda
,
Ismael Figueroa
10.3897/jucs.72205
28-09-2021
Unique: 688 | Total: 1174
| Access Period:
955-978
HTML
XML
PDF
Research Article
Non-verbal Aspects of Collaboration in Virtual Worlds: a CSCW Taxonomy-development Proposal Integrating the Presence Dimension
Armando Cruz
,
Hugo Paredes
,
Leonel Morgado
,
Paulo Martins
10.3897/jucs.74166
28-09-2021
Unique: 988 | Total: 1685
| Access Period:
913-954
HTML
XML
PDF
Editorial
Editorial
Christian Gütl
10.3897/jucs.75354
28-09-2021
Unique: 502 | Total: 874
| Access Period:
912-912
HTML
XML
PDF
Research Article
A Compiler and Language Support for Designing Mixed-Criticality Applications
Nermin Kajtazovic
,
Peter Hödl
,
Leo Happ Botler
Part of: Recent Advances in Cybersecurity and Safety Architectures in Automotive, IT, and Connected Services
10.3897/jucs.71831
28-08-2021
Unique: 884 | Total: 2096
| Access Period:
894-911
HTML
XML
PDF
Research Article
Lean integration of IT security and data privacy governance aspects into product development in agile organizations
Alexander Poth
,
Mario Kottke
,
Kerstin Middelhauve
,
Torsten Mahr
,
Andreas Riel
Part of: Recent Advances in Cybersecurity and Safety Architectures in Automotive, IT, and Connected Services
10.3897/jucs.71770
28-08-2021
Unique: 1231 | Total: 1979
| Access Period:
868-893
HTML
XML
PDF
Research Article
Cybersecurity Verification and Validation Testing in Automotive
Damjan Ekert
,
Jürgen Dobaj
,
Alen Salamun
Part of: Recent Advances in Cybersecurity and Safety Architectures in Automotive, IT, and Connected Services
10.3897/jucs.71833
28-08-2021
Unique: 1225 | Total: 2031
| Access Period:
850-867
HTML
XML
PDF
Research Article
Cybersecurity Threat Analysis, Risk Assessment and Design Patterns for Automotive Networked Embedded Systems: A Case Study
Jürgen Dobaj
,
Damjan Ekert
,
Jakub Stolfa
,
Svatopluk Stolfa
,
Georg Macher
,
Richard Messnarz
Part of: Recent Advances in Cybersecurity and Safety Architectures in Automotive, IT, and Connected Services
10.3897/jucs.72367
28-08-2021
Unique: 1232 | Total: 2100
| Access Period:
830-849
HTML
XML
PDF
6
7
8
9
10
This website uses cookies in order to improve your web experience.
Read our Cookies Policy
OK