|
Issue |
Title |
|
Vol 39, No 4 (2015) |
Privacy-preserving Cloud-based Personal Health Record System Using Attribute-based Encryption and Anonymous Multi-ReceiverIdentity-based Encryption |
Abstract
PDF
|
Changji Wang, Xilei Xu, Dongyuan Shi, Jian Fang |
|
Vol 36, No 3 (2012) |
Privacy-preserving Two-party Rational Set Intersection Protocol |
Abstract
PDF
|
A. Miyaji, M.S. Rahman |
|
Vol 47, No 5 (2023): Online-only issue |
PrivyKG: Security and Privacy Preservation of Knowledge Graphs Using BlockChain Technology |
Abstract
PDF
|
Ala Djeddai, Roufaida Khemaissia |
|
Vol 39, No 1 (2015) |
Probabilistic 2D Point Interpolation and Extrapolation via Data
Modeling |
Abstract
PDF
|
Dariusz Jacek Jakóbczak |
|
Vol 44, No 4 (2020) |
Probabilistic Weighted induced Multi-Class Support Vector Machines for Face Recognition |
Abstract
PDF
|
Aniruddha Dey, Shiladitya Chowdhury |
|
Vol 42, No 2 (2018) |
Probability matrix decomposition based collaborative filtering recommendation algorithm |
Abstract
PDF
|
Yili Tan, Huijuan Zhao, Yourong Wang, Min Qiu |
|
Vol 48, No 11 (2024): Online-only issue |
Profit Estimation Model and Financial Risk Prediction Combining Multi-scale Convolutional Feature Extractor and BGRU Model |
Abstract
PDF
|
Yangyan Liu, Bolin Pan |
|
Vol 46, No 9 (2022): Online-only issue |
Programming models-based method for deriving profits allocation scheme with interval-valued cooperative games |
Abstract
PDF
|
Jian Li, LI-li Niu, Jiubing Liu, Qiongxia Chen, Yong-Jun Liu |
|
Vol 35, No 2 (2011) |
Programming the Story: Interactive Storytelling System |
Abstract
PDF
|
S. Kim, S. Moon, S. Han, J. Chan |
|
Vol 40, No 2 (2016) |
Protected Elastic-tree topology for Survivable and Energy-efficient Data Center |
Abstract
PDF
|
Dieu-Linh Truong, Elena Ouro, Thanh-Chung Nguyen |
|
Vol 38, No 3 (2014) |
Prototype Implementation of a Scalable Real-Time Dynamic Carpooling and Ride-Sharing Application |
Abstract
PDF
|
Dejan Dimitrijević, Vladimir Dimitrieski, Nemanja Nedić |
|
Vol 47, No 8 (2023): Online-only issue |
Provably Efficient Multi-Cancer Image Segmentation Based on Multi-Class Fuzzy Entropy |
Abstract
PDF
|
Hend Muslim Jasim, Mudhafar Jalil Jassim Ghrabat, Luqman Qader Abdulrahman, Vincent Omollo Nyangaresi, Junchao Ma, Zaid Ameen Abduljabbar, Iman Qays Abduljaleel |
|
Vol 47, No 6 (2023): Online-only issue |
Provably-Secure LED Block Cipher Diffusion and Confusion based on Chaotic Maps |
Abstract
PDF
|
Hussain M. Al-Saadi, Imad Alshawi |
|
Vol 47, No 9 (2023): Online-only issue |
PrSChain: A Blockchain Based Privacy Preserving Approach for Data Service Composition |
Abstract
PDF
|
Rofaida Khemaissia, Makhlouf Derdour, Mohamed Amine Ferrag, Mohammed Mounir Bouhamed |
|
Vol 37, No 3 (2013) |
Pruning the Computation of Distributed Shortest Paths in Power-law Networks |
Abstract
PDF
|
G. D'Angelo, M. D'Emidio, D. Frigioni |
|
Vol 42, No 2 (2018) |
PSO with crossover operator applied to feature selection problem in classification |
Abstract
PDF
|
Houassi Hichem, Mahdaoui Rafik, Maarouk Toufik Mesaaoud |
|
Vol 48, No 11 (2024): Online-only issue |
Psychological Fitness Education Driven by Artificial Intelligence Technology and Its Influence on Education Assessment |
Abstract
PDF
|
Yan Zhang |
|
Vol 37, No 2 (2013) |
QoS Prediction forWeb Services Based on Similarity-Aware Slope One Collaborative Filtering |
Abstract
PDF
|
Chengying Mao, Jifu Chen |
|
Vol 42, No 3 (2018) |
Qualitative and Quantitative Optimization for Dependability Analysis |
Abstract
PDF
|
Leila Boucerredj, NasrEddine Debbache |
|
Vol 42, No 1 (2018) |
Quantitative Score for Assessing the Quality of Feature Rankings |
Abstract
PDF
|
Ivica Slavkov, Matej Petković, Dragi Kocev, Sašo Džeroski |
|
Vol 37, No 2 (2013) |
Quaternion Based Fuzzy Neural Network Classifier for MPIK Dataset's View-invariant Color Face Image Recognition |
Abstract
PDF
|
Wai Kit Wong, Gin Chong Lee, Chu Kiong Loo, Raymond Lock |
|
Vol 35, No 3 (2011) |
Query Preserving Relational Database Watermarking |
Abstract
PDF
|
S.A. Shah, S. Xingming, H. Ali, M. Abdul |
|
Vol 48, No 11 (2024): Online-only issue |
Radio Frequency Fingerprint Identification Technology Considering Strong Interference of Electromagnetic Noise |
Abstract
PDF
|
Yang Kong, Rongwei Dong |
|
Vol 33, No 2 (2009) |
Rajan Transform and its uses in Pattern Recognition |
Abstract
PDF
|
E.N. Mandalapu, E.G. Rajan |
|
Vol 37, No 3 (2013) |
Random Search Algorithm for the p-Median Problem |
Abstract
PDF
|
A.N. Antamoshkin, L.A. Kazakovtsev |
|
1101 - 1125 of 1399 Items |
<< < 40 41 42 43 44 45 46 47 48 49 > >> |