X
Search Filters
Format Format
Subjects Subjects
Subjects Subjects
X
Sort by Item Count (A-Z)
Filter by Count
telecommunications (15) 15
computer science, information systems (13) 13
engineering, electrical & electronic (12) 12
taxonomy (9) 9
analysis (8) 8
computer science (8) 8
computer science, theory & methods (8) 8
cloud computing (7) 7
security (7) 7
software (7) 7
computer security (6) 6
algorithms (5) 5
computer and information sciences (5) 5
data mining (5) 5
medicine (5) 5
multidisciplinary sciences (5) 5
protocol (5) 5
science (5) 5
access control (4) 4
authentication (4) 4
computer architecture (4) 4
computer communication networks (4) 4
computer science, hardware & architecture (4) 4
computer science, software engineering (4) 4
deep learning (4) 4
information technology (4) 4
internet (4) 4
internet of things (4) 4
networks (4) 4
optimization (4) 4
research article (4) 4
wireless communication (4) 4
wireless networks (4) 4
wireless sensor networks (4) 4
anomaly detection (3) 3
biology and life sciences (3) 3
computer programming (3) 3
computer science, interdisciplinary applications (3) 3
index medicus (3) 3
informationsmanagement (3) 3
integrity (3) 3
medical services (3) 3
natural sciences (3) 3
naturvetenskap (3) 3
operating systems (3) 3
organizations (3) 3
remote sensors (3) 3
research (3) 3
security management (3) 3
social sciences (3) 3
software defined networks (3) 3
state-of-the-art reviews (3) 3
testing (3) 3
usage (3) 3
virtual private networks (3) 3
algorithm (2) 2
architecture (2) 2
artificial intelligence (2) 2
bandwidth (2) 2
body area networks (2) 2
challenges (2) 2
checking (2) 2
clustering (2) 2
cognitive psychology (2) 2
cognitive science (2) 2
communication (2) 2
communications (2) 2
computer network protocols (2) 2
computer programs (2) 2
computer simulation (2) 2
control systems (2) 2
data integrity (2) 2
data security (2) 2
data- och informationsvetenskap (2) 2
datenintegrität (2) 2
discovery (2) 2
distribuerade datorsystem (2) 2
domains (2) 2
efficiency (2) 2
energy efficiency (2) 2
engineering and technology (2) 2
feature extraction (2) 2
formal methods (2) 2
future (2) 2
information management (2) 2
information security (2) 2
information systems (2) 2
integer programming (2) 2
intelligence (2) 2
language (2) 2
lora (2) 2
lorawan (2) 2
lpwan (2) 2
mathematical models (2) 2
mathematics (2) 2
media and communication technology (2) 2
medieteknik (2) 2
methods (2) 2
mobile and pervasive computing (2) 2
mobile communication systems (2) 2
more...
Language Language
Publication Date Publication Date
Click on a bar to filter by decade
Slide to change publication date range


IEEE Communications Magazine, ISSN 0163-6804, 07/2017, Volume 55, Issue 7, pp. 110 - 118
Journal Article
IEEE Communications Magazine, ISSN 0163-6804, 04/2015, Volume 53, Issue 4, pp. 36 - 44
The emergence of SDNs promises to dramatically simplify network management and enable innovation through network programmability. Despite all the hype... 
Network security | Control systems | Telecommunication network management | Operating systems | Computer architecture | Software radio | TELECOMMUNICATIONS | ENGINEERING, ELECTRICAL & ELECTRONIC | Safety and security measures | Virtual private networks | Data security | Methods | Security management | Data encryption | Computer security
Journal Article
Journal of Experimental & Theoretical Artificial Intelligence, ISSN 0952-813X, 09/2018, Volume 30, Issue 5, pp. 703 - 723
Stemming is the basic operation in Natural language processing (NLP) to remove derivational and inflectional affixes without performing a morphological... 
natural language processing | Urdu | affixes | information retrieval | stemming | text mining | lemmatization | Urdu stemmer | Text mining | Information retrieval | Lemmatization | Natural language processing | Affixes | Stemming | LANGUAGE | RETRIEVAL | COMPUTER SCIENCE, ARTIFICIAL INTELLIGENCE
Journal Article
IEEE Transactions on Information Forensics and Security, ISSN 1556-6013, 06/2017, Volume 12, Issue 6, pp. 1259 - 1268
Sharing of resources on the cloud can be achieved on a large scale, since it is cost effective and location independent. Despite the hype surrounding cloud... 
Access control | Cloud computing | Analytical models | Cross tenant access control | Petri nets | Customer relationship management | Authentication | formal specification and verification | cloud computing | COMPUTER SCIENCE, THEORY & METHODS | WEB | ENGINEERING, ELECTRICAL & ELECTRONIC | Activation | Trusted third parties | Mediation
Journal Article
PloS one, ISSN 1932-6203, 2018, Volume 13, Issue 5, p. e0196957
[This corrects the article DOI: 10.1371/journal.pone.0179703.]. 
Computer science | Data mining | Information technology
Journal Article
PLoS ONE, ISSN 1932-6203, 01/2018, Volume 13, Issue 1, p. e0179703
Designing an efficient association rule mining (ARM) algorithm for multilevel knowledge-based transactional databases that is appropriate for real-world... 
DATABASES | MULTIDISCIPLINARY SCIENCES | MULTIPLE MINIMUM SUPPORTS | ALGORITHM | Algorithms | Datasets as Topic | Data Mining - methods | Databases, Factual | Technology application
Journal Article
ACM Computing Surveys (CSUR), ISSN 0360-0300, 07/2015, Volume 47, Issue 4, pp. 1 - 34
Cloud computing has emerged as a long-dreamt vision of the utility computing paradigm that provides reliable and resilient infrastructure for users to remotely... 
replication | network coding | erasure coding | cloud computing | Remote data auditing | Network coding | Cloud computing | Replication | Remote Data Auditing | Erasure coding | STORAGE | Security | DATA POSSESSION | INTEGRITY | ARCHITECTURE | COMPUTER SCIENCE, THEORY & METHODS | CHECKING | Reliability | Performance | Surveys | Information storage and retrieval | Outsourcing
Journal Article
International Journal of Information Management, ISSN 0268-4012, 12/2016, Volume 36, Issue 6, pp. 963 - 975
Journal Article
Scientific World Journal, ISSN 2356-6140, 2014, Volume 2014, pp. 269357 - 12
Journal Article
Journal of Parallel and Distributed Computing, ISSN 0743-7315, 07/2018, Volume 117, pp. 256 - 266
Though like other domains such as email filtering, web page classification, sentiment analysis, and author identification, the researchers have employed the... 
Deep learning | Classifiers | Feature set | Design patterns | Performance | FEATURE-SELECTION | INFORMATION GAIN | MODELS | ALGORITHM | COMPUTER SCIENCE, THEORY & METHODS | Case studies | Computer programming | Automation | Algorithms | Analysis | Mechanization | Data mining
Journal Article
Journal of Network and Computer Applications, ISSN 1084-8045, 02/2016, Volume 61, pp. 199 - 221
The revolutionary concept of Software Defined Networks (SDNs) potentially provides flexible and well-managed next-generation networks. All the hype surrounding... 
Software defined networks | Programmable networks | Open Flow | Policy enforcement | Middle-boxes | COMPUTER SCIENCE, SOFTWARE ENGINEERING | TAXONOMY | COMPUTER SCIENCE, HARDWARE & ARCHITECTURE | COMPUTER SCIENCE, INTERDISCIPLINARY APPLICATIONS | FUTURE | CHALLENGES | Computer science | Data security
Journal Article
Information Systems, ISSN 0306-4379, 12/2015, Volume 54, pp. 43 - 73
The adoption of Service-oriented Architecture (SOA) and Business Process Management (BPM) is fairly recent. The major concern is now shifting towards the... 
Change propagation | SOA | Dependency analysis | SOC | Web service | CIA | Semantic annotation | MSR | BPM | Systematic literature review (SLR) | CHANGE MANAGEMENT | COMPUTER SCIENCE, INFORMATION SYSTEMS | DEPENDENCIES | DISCOVERY | Computer science | Analysis | Dynamics | Evolution | Mathematical models | Business process management | Dynamical systems | Business | Impact analysis | Information systems
Journal Article
International Journal of Information Management, ISSN 0268-4012, 12/2016, Volume 36, Issue 6, p. 963
Software testing is a widely accepted practice that ensures the quality of a System under Test (SUT). However, the gradual increase of the test suite size... 
Integer programming | Software testing | Multiple objective analysis | Reduction | State-of-the-art reviews | Taxonomy | Software quality | Software | Optimization | Testing
Journal Article