TDG Scholar TDGScholar Committed to research! Version 1.7

Bibliography

| Report | Share
More than 125 records were found in 0.25 seconds
Rank-order correlation-based feature vector context transformation for learning to rank for information retrieval
Comput. Syst. Sci. Eng., 33(1), 2018
Forensic investigation through data remnants on Hadoop big data storage system
Comput. Syst. Sci. Eng., 33(3), 2018
Effective piecewise linear skeletonization of sparse shapes
Comput. Syst. Sci. Eng., 33(2), 2018
Research on tourist routes recommendation based on the user preference drifting over time
Comput. Syst. Sci. Eng., 33(2), 2018
A scheduling extension scheme of the earliest deadline first policy for hard real-time uniprocessor systems integrated on POSIX threads based on Linux
Comput. Syst. Sci. Eng., 33(1), 2018
An iteration-based differentially private social network data release
Comput. Syst. Sci. Eng., 33(2), 2018
Integrating a decision tree perspective at the operational-level of BPM+
Comput. Syst. Sci. Eng., 33(3), 2018
Sentiment analysis system in big data environment
Comput. Syst. Sci. Eng., 33(3), 2018
Special issue: BigDataSE 2016
Comput. Syst. Sci. Eng., 33(2), 2018
A dynamic online protection framework for Android applications
Comput. Syst. Sci. Eng., 33(2), 2018
Automated and precise event detection method for big data in biomedical imaging with support vector machine
Comput. Syst. Sci. Eng., 33(2), 2018
MapReduce implementation of an improved XML keyword search algorithm
Comput. Syst. Sci. Eng., 33(2), 2018
Probabliistic analysis of electrocardiogram (ECG) heart signal
Comput. Syst. Sci. Eng., 33(1), 2018
A dynamic independent component analysis approach to fault detection with new statistics
Comput. Syst. Sci. Eng., 33(1), 2018
Fast backup and recovery for web protectiuon using trigger and block hash approach
Comput. Syst. Sci. Eng., 32(2), 2017
A context-aware hierarchical approach for activity recognition based on mobile devices
Comput. Syst. Sci. Eng., 32(5), 2017
Design of optimal elliptic curve cryptography by using partial parallel shifting multiplier with parallel complementary
Comput. Syst. Sci. Eng., 32(5), 2017
An extensive empirical evaluation of classifier ensembles for intrusion detection task
Comput. Syst. Sci. Eng., 32(2), 2017
Soft error tolerance using HVDQ (Horizontal-Vertical-Diagonal-Queen parity method)
Comput. Syst. Sci. Eng., 32(1), 2017
Change management technique for supporting object oriented diagrams changes
Comput. Syst. Sci. Eng., 32(1), 2017
Abnormal behaviour pattern mining for unknown threat detection
Comput. Syst. Sci. Eng., 32(2), 2017
An optimized adaptive neuro-fuzzy inference system to estimate software development effort
Comput. Syst. Sci. Eng., 32(5), 2017
Special Issue: Foundations and Practice of Security in Emerging ICT Applications
Comput. Syst. Sci. Eng., 32(2), 2017
Learning-based distributed locality sensitive hashing
Comput. Syst. Sci. Eng., 32(6), 2017
Design and analysis of control strategies for a cyber physical system
Comput. Syst. Sci. Eng., 32(5), 2017
A bottom-up semantic mapping approach for exploring manufacturing information resources in industry
Comput. Syst. Sci. Eng., 32(3), 2017
Genetic algorithm based energy-saving ATO control algorithm for CBTC
Comput. Syst. Sci. Eng., 32(5), 2017
A QoS-aware approach for discovering and selecting configurable IaaS Cloud services
Comput. Syst. Sci. Eng., 32(4), 2017
k-out-of-n oblivious transfer protocol with security against malicious adversaries
Comput. Syst. Sci. Eng., 32(2), 2017
Straight-line tracking control for underactuated ships based on LOS and adaptive fuzzy method
Comput. Syst. Sci. Eng., 32(6), 2017
Experimental comparative study of NoSQL databases: HBASE versus MongoDB by YCSB
Comput. Syst. Sci. Eng., 32(4), 2017
Joint correlation exploitation and network coding in two-way relaying systems
Comput. Syst. Sci. Eng., 32(6), 2017
Enhanced TKTOFT protocol for ternary based distributed group key management in cognitive radio networks
Comput. Syst. Sci. Eng., 32(2), 2017
Detecting local covert channels using process activity correlation on Android smartphones
Comput. Syst. Sci. Eng., 32(2), 2017
Inspection reading techniques applied to software artifacts - a systematic review
Comput. Syst. Sci. Eng., 32(3), 2017
An adaptive edge detection operator for noisy images based on a total variation approach restoration
Comput. Syst. Sci. Eng., 32(3), 2017
A corrupted cloud and corrupted multi-cloud identification method for batch auditing in cloud storage services
Comput. Syst. Sci. Eng., 32(2), 2017
Optimal agreement under fallible mobile network
Comput. Syst. Sci. Eng., 32(3), 2017
Adaptive Duty Cycle (ADC) energy efficient algorithm for ZigBee networks
Comput. Syst. Sci. Eng., 32(1), 2017
Special Issue: Elastic Data Management in Cloud Systems
Comput. Syst. Sci. Eng., 32(4), 2017
A clustering-based sampling method for building query response time models
Comput. Syst. Sci. Eng., 32(4), 2017
Security threats in M2M networks: a survey with case study
Comput. Syst. Sci. Eng., 32(2), 2017
SCS - A new non-volatile cache mechanism for SSD systems
Comput. Syst. Sci. Eng., 32(6), 2017
A MapReduce-based efficient H-bucket PMR quadtree spatial index
Comput. Syst. Sci. Eng., 32(5), 2017
Distributed state prediction based geographic routing for underwater acoustic sensor network
Comput. Syst. Sci. Eng., 32(6), 2017
An efficient racetrack memory for L2 cache in GPGPUs
Comput. Syst. Sci. Eng., 32(6), 2017
Formal verification and performance evaluation of task scheduling heuristics for makespan optimization and workflow distribution in large-scale computing systems
Comput. Syst. Sci. Eng., 32(3), 2017
A CRAHNs routing protocol based on the hops, channel number and channel capacity
Comput. Syst. Sci. Eng., 32(6), 2017
Probabilistic energy-aware scheduling for wireless networked control systems
Comput. Syst. Sci. Eng., 32(6), 2017
Autoscaling scientific workflows on the cloud by combining on-demand and spot instances
Comput. Syst. Sci. Eng., 32(4), 2017
An adaptive edge detection operator for noisy images based on a total variation approach restoration
Comput. Syst. Sci. Eng., 32(1), 2017
Simulation of heat conduction in fluids on GPU with particle method
Comput. Syst. Sci. Eng., 32(6), 2017
On scalability of two NoSQL data stores for processing interactive social networking actions
Comput. Syst. Sci. Eng., 32(4), 2017
Neighbour unpredictability measure in multiword expression extraction
Comput. Syst. Sci. Eng., 31(3), 2016
Topological separation axioms of soft rough formal context
Comput. Syst. Sci. Eng., 31(2), 2016
Improving the quality of mobile target detection through portion of node with full duty cycle in WSNs
Comput. Syst. Sci. Eng., 31(1), 2016
Towards risk evaluation algorithm of PSC ship-selecting system based on hierarchic analysis and grey integrated clustering method
Comput. Syst. Sci. Eng., 31(2), 2016
Information security in practices: Exploring privacy and trust in computer and inernet surveillance
Comput. Syst. Sci. Eng., 31(2), 2016
Energy efficient dual execution mode scheduling for real-time tasks with shared resources
Comput. Syst. Sci. Eng., 31(3), 2016
A frequent pattern parallel mining algorithm based on distributed sliding window
Comput. Syst. Sci. Eng., 31(2), 2016
A Petri Net extension for formal modelling of information systems
Comput. Syst. Sci. Eng., 31(3), 2016
Clustering routing method based on social characteristic in campus DTN
Comput. Syst. Sci. Eng., 31(2), 2016
Estimation error-aware query optimization: an overview
Comput. Syst. Sci. Eng., 31(3), 2016
An enhanced dynamic detection of possible invariants based on best permutation of test cases
Comput. Syst. Sci. Eng., 31(1), 2016
Discovering probabilistic frequent closed itemsets in uncertain database with tuple uncertainty
Comput. Syst. Sci. Eng., 31(2), 2016
Special Issue: BDCloud 2015 and FCST 2015
Comput. Syst. Sci. Eng., 31(2), 2016
Bridging the semantic gap for automatic image annotation by learning the manifold space
Comput. Syst. Sci. Eng., 31(1), 2016
A practical reliable reputation based data fusion method for ad-hoc wireless sensor networks
Comput. Syst. Sci. Eng., 31(3), 2016
An optimization model of Hadoop cluster performance prediction based on Markov process
Comput. Syst. Sci. Eng., 31(2), 2016
Taxi-taking recommendation using real-time trajectories: an online query based approach
Comput. Syst. Sci. Eng., 31(2), 2016
Goals and scenarios based web requirements engineering
Comput. Syst. Sci. Eng., 31(1), 2016
Enhancing multimedia caching algorithms for variable-bandwidth streams using adaptive and smoothing techniques
Comput. Syst. Sci. Eng., 31(1), 2016
Ascending partition method for differentially private histogram publication
Comput. Syst. Sci. Eng., 31(2), 2016
Research on the effects of blasting vibration attenuation by pre-split crack with HHT method
Comput. Syst. Sci. Eng., 31(6), 2016
Data allocation in a Heterogeneous Disk Array (HDA) with multiple RAID levels for database applications
Comput. Syst. Sci. Eng., 31(5), 2016
Stochastic gradient identification for Hammerstein systems with non-uniformly sampling
Comput. Syst. Sci. Eng., 31(6), 2016
Hierarchical stochastic gradient identification for non-uniformly sampling Hammerstein systems with colored noise
Comput. Syst. Sci. Eng., 31(6), 2016
Effective indexing and searching with dimensionality reduction on high-dimensional space
Comput. Syst. Sci. Eng., 31(4), 2016
The system of knowledge management using web based learning and education technology
Comput. Syst. Sci. Eng., 31(6), 2016
Hierarchical gradient based parameter identification for non-uniformly sampling Wiener systems
Comput. Syst. Sci. Eng., 31(6), 2016
Adaptive hierarchical bitmap-based index for wireless broadcast environments in an emergency
Comput. Syst. Sci. Eng., 31(4), 2016
XML schema matching using early dissimilarity detection approaches
Comput. Syst. Sci. Eng., 31(5), 2016
The state space model of remanufacturing carbon footprint for low-carbon
Comput. Syst. Sci. Eng., 31(6), 2016
Using cross ambiguity model improves the effect of Vietnamese word segmentation
Comput. Syst. Sci. Eng., 31(6), 2016
The realization of multi agent based online trading systems based on J2EE technology
Comput. Syst. Sci. Eng., 31(6), 2016
Performance evaluation comparison for detecting DNA structural break through big data analysis
Comput. Syst. Sci. Eng., 31(4), 2016
Extending visual information extraction to biomedical applications
Comput. Syst. Sci. Eng., 31(5), 2016
The service quality evaluation of ecologic economy systems using simulation computing
Comput. Syst. Sci. Eng., 31(6), 2016
The scalable vocabulary tree based model for sub-image retrieval
Comput. Syst. Sci. Eng., 31(6), 2016
Computer aided study of factors that influence the cooperative willingness of water-related public organizations
Comput. Syst. Sci. Eng., 31(6), 2016
An optimal tabu prioritization algorithm for regression testing
Comput. Syst. Sci. Eng., 31(5), 2016
A reputation-based computing approach in trusted web service provisions
Comput. Syst. Sci. Eng., 30(4), 2015
Artificial neural network based grid computing of e-governance scheduling for emergency management
Comput. Syst. Sci. Eng., 30(5), 2015
Parameters' fine tuning of differential evolution algorithm
Comput. Syst. Sci. Eng., 30(2), 2015
A model-driven approach to service composition on the basis of the specification of BPMN choreographies
Comput. Syst. Sci. Eng., 30(1), 2015
Goal lifecycles and ontological models for intention based assistive living within smart environments
Comput. Syst. Sci. Eng., 30(1), 2015
Special issue: ICA3PP/U-Science 2014
Comput. Syst. Sci. Eng., 30(6), 2015
Fabric defect localization using line variances of the local homogeneity images
Comput. Syst. Sci. Eng., 30(4), 2015
Dynamic filtering of sensor readings for approximate query processing in sensor networks
Comput. Syst. Sci. Eng., 30(3), 2015
Energy-efficient power allocation for MIMO two-way cognitive relay networks
Comput. Syst. Sci. Eng., 30(5), 2015
Security games for service computing applications
Comput. Syst. Sci. Eng., 30(6), 2015
Optimal WiMax backhauling solutions for WiFi traffic
Comput. Syst. Sci. Eng., 30(2), 2015
Special issue: New Holistic Trends in Ambient Intelligence - Editorial
Comput. Syst. Sci. Eng., 30(1), 2015
Generating associated knowledge flow in large-scale web pages based on user interaction
Comput. Syst. Sci. Eng., 30(5), 2015
Recognition of driving postures by nonsubsampled contourlet transform and k-nearest neighbor classifier
Comput. Syst. Sci. Eng., 30(3), 2015
Robust local outlier detection with statistical parameter for big data
Comput. Syst. Sci. Eng., 30(5), 2015
The semantic analysis of knowledge map for the traffic violations from the surveillance video big data
Comput. Syst. Sci. Eng., 30(5), 2015
Investigation on remote monitoring system for hybrid electric bulldozer
Comput. Syst. Sci. Eng., 30(5), 2015
Social connector: a ubiquitous system to ease the social interaction among family community members
Comput. Syst. Sci. Eng., 30(1), 2015
Harmony and bio inspired harmony search optimization algorithms for feature selection in classification
Comput. Syst. Sci. Eng., 30(4), 2015
Rescheduling rework jobs on single-machine of original jobs with release times
Comput. Syst. Sci. Eng., 30(6), 2015
Bridging the semantic gap for automatic image annotation by learning the manifold space
Comput. Syst. Sci. Eng., 30(4), 2015
SDD-matcher: a semantic-driven data matching framework
Comput. Syst. Sci. Eng., 30(3), 2015
Special issue: Big Data-related Technologies and Applications
Comput. Syst. Sci. Eng., 30(5), 2015
Session identification based on linked referrers and web log indexing
Comput. Syst. Sci. Eng., 30(2), 2015
Design and analysis of communication scheduling applied in water inrush perception layer of mine internet of things
Comput. Syst. Sci. Eng., 30(5), 2015
Dynamic resource allocation based on energy utility maximization using virtual machines in cloud environment
Comput. Syst. Sci. Eng., 30(6), 2015
Prosumer recruitment framework for prosumer community groups in smart-grid
Comput. Syst. Sci. Eng., 30(4), 2015
A task distribution algorithm compatible with background control framework for parallel simulation
Comput. Syst. Sci. Eng., 30(5), 2015
Heavy hitter identification based on adaptive sampling with mapreduce
Comput. Syst. Sci. Eng., 30(6), 2015
Integrating outlier removal into existing histogram construction methods for geographic data
Comput. Syst. Sci. Eng., 30(2), 2015
An anomolous situation detection system for cognitive impaired people
Comput. Syst. Sci. Eng., 30(1), 2015