Stop the war!
Остановите войну!
for scientists:
default search action
International Journal of Networked and Distributed Computing, Volume 6
Volume 6, Number 1, January 2018
- Krissada Rongrat, Twittie Senivongse:
Assessing Risk of Security Non-compliance of Banking Security Requirements Based on Attack Patterns. 1-10 - Christopher Johnston Downie, Taoxin Peng:
Visualization of Online Datasets. 11-23 - Parul Dawar, N. S. Raghava, Asok De:
UWB, miniaturized and directive metamaterial loaded antenna for satellite applications. 24-34 - Zahra Amini, Mehrdad Maeen, Mohammad Reza Jahangir:
Providing a load balancing method based on dragonfly optimization algorithm for resource allocation in cloud computing. 35-42 - Yoohwan Kim, Ju-Yeon Jo:
Dynamically Adjusting the Mining Capacity in Cryptocurrency with Binary Blockchain. 43-52
Volume 6, Number 2, April 2018
- Taketo Tsunoda, Hironori Washizaki, Yoshiaki Fukazawa, Sakae Inoue, Yoshiiku Hanai, Masanobu Kanazawa:
Developer Experience Considering Work Difficulty in Software Development. 53-62 - Lilia Lazli, Mounir Boukadoum:
Hybrid Fuzzy - Possibilistic Clustering Model based on Genetic Optimization: Case Study on Brain Tissues of Patients with Alzheimer's Disease. 63-77 - Pyae Phyo Thu, Than Nwe Aung:
Implementation of Emotional Features on Satire Detection. 78-87 - Sylvanus A. Ehikioya, Cong Zhang:
Real-time Multi-Agents Architecture for E-commerce Servers. 88-98 - M. R. Regitha, Paul Varghese, Shailesh Sivan, Antony Nijo:
Handoff Delay Optimization Using Hybrid Prediction Model. 99-107 - GaYoung Kim, Minjoong Rim:
Internet of Things in the 5G Mobile Communication System: The Optimal Number of Channels in Channel Hopping. 108-117
Volume 6, Number 3, July 2018
- Kazuki Yamauchi, Hirohisa Aman, Sousuke Amasaki, Tomoyuki Yokogawa, Minoru Kawahara:
An Entropy-Based Metric of Developer Contribution in Open Source Development and Its Application toF ault-ProneP rogram Analysis. 118-132 - Liaq Mudassar, Yung-Cheol Byun:
Customer Prediction using Parking Logs with Recurrent Neural Networks. 133-142 - Sylvanus A. Ehikioya:
A Formal Model of Peer-to-Peer Digital Product Marketplace. 143-154 - Xinyi Hu, Yaqun Zhao:
One to One Identification of Cryptosystem Using Fisher's Discriminant Analysis. 155-173 - Naveen Kumar, Ashutosh Kumar Singh, Shashank Srivastava:
A Triggered Delay-based Approach against Cache Privacy Attack in NDN. 174-184 - Byeongdo Kang, Jongseok Lee:
Estimating Procedure for Function Point and Development Cost in South Korea. 185-194
Volume 6, Number 4, September 2018
- Jongyeop Kim, Abhilash Kancharla, Jongho Seol, Indy Park, Nohpill Park:
Optimized Common Parameter Set Extraction Framework by Multiple Benchmarking Applications on a Big Data Platform. 195-203 - Nuanwan Soonthornphisaj, Taratep Sira-Aksorn, Pornchanok Suksankawanich:
Social Media Comment Management using SMOTE and Random Forest Algorithms. 204-209 - Jongho Seol, Abhilash Kancharla, Nicole Park, Nohpill Park, Indy Park:
The Dependability of Crypto Linked Off-chain File Systems in Backend Blockchain Analytics Engine. 210-215 - Srinath Hanumantha Rao, V. Kalaichelvi, R. Karthikeyan:
Tracing a Weld Line using Artificial Neural Networks. 216-223 - Takanori Yokoi, Haruaki Tamada:
Improvement of the Dynamic Software Birthmark Process by Reducing the Time of the Extraction. 224-231 - Yosuke Isobe, Haruaki Tamada:
Design and Evaluation of the De-obfuscation Method against the Identifier Renaming Methods. 232-238
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.