23 | -- | 0 | Fernando Zorilla, Marcel Ritter, Johannes Sappl, Wolfgang Rauch, Matthias Harders. Accelerating Surface Tension Calculation in SPH via Particle Classification and Monte Carlo Integration |
24 | -- | 0 | Henning Schnoor, Wilhelm Hasselbring. Comparing Static and Dynamic Weighted Software Coupling Metrics |
25 | -- | 0 | Odilbek Urmonov, HyungWon Kim 0001. A Multi-Hop Data Dissemination Algorithm for Vehicular Communication |
26 | -- | 0 | David Megías, Minoru Kuribayashi, Amna Qureshi. Survey on Decentralized Fingerprinting Solutions: Copyright Protection through Piracy Tracing |
27 | -- | 0 | Ahmad F. Subahi. Cognification of Program Synthesis - A Systematic Feature-Oriented Analysis and Future Direction |
28 | -- | 0 | Salvatore Cavalieri, Marco Giuseppe Salafia. Insights into Mapping Solutions Based on OPC UA Information Model Applied to the Industry 4.0 Asset Administration Shell |
29 | -- | 0 | Mohamed Loey, Mukdad Rasheed Naman, Hala Helmy Zayed. Deep Transfer Learning in Diagnosing Leukemia in Blood Cells |
30 | -- | 0 | Valery Sizikov, Aleksandra Dovgan, Aleksei Lavrov. Eliminating Nonuniform Smearing and Suppressing the Gibbs Effect on Reconstructed Images |
31 | -- | 0 | Davide Coluzzi, Massimo Walter Rivolta, Alfonso Mastropietro, Simone Porcelli, Marco L. Mauri, Marta T. L. Civiello, Enrico Denna, Giovanna Rizzo, Roberto Sassi. Design and Validation of a Minimal Complexity Algorithm for Stair Step Counting |
32 | -- | 0 | Kiyoharu Tagawa. An Approach to Chance Constrained Problems Based on Huge Data Sets Using Weighted Stratified Sampling and Adaptive Differential Evolution |
33 | -- | 0 | Firgan Feradov, Iosif Mporas, Todor Ganchev. Evaluation of Features in Detection of Dislike Responses to Audio-Visual Stimuli from EEG Signals |
34 | -- | 0 | Mashael M. Alsulami, Arwa Y. Al-Aama. Employing Behavioral Analysis to Predict User Attitude towards Unwanted Content in Online Social Network Services: The Case of Makkah Region in Saudi Arabia |
35 | -- | 0 | Danijel Mlinaric, Vedran Mornar, Boris Milasinovic. Generating Trees for Comparison |
36 | -- | 0 | Tessfu Geteye Fantaye, Junqing Yu, Tulu Tilahun Hailu. Advanced Convolutional Neural Network-Based Hybrid Acoustic Models for Low-Resource Speech Recognition |
37 | -- | 0 | Luca Cappelletti, Tommaso Fontana, Guido Walter Di Donato, Lorenzo Di Tucci, Elena Casiraghi, Giorgio Valentini. Complex Data Imputation by Auto-Encoders and Convolutional Neural Networks - A Case Study on Genome Gap-Filling |
38 | -- | 0 | Piotr Artiemjew, Aleksandra Kislak-Malinowska. Indiscernibility Mask Key for Image Steganography |
39 | -- | 0 | Wan Muhd Hazwan Azamuddin, Rosilah Hassan, Azana Hafizah Mohd Aman, Mohammad Kamrul Hasan, Ahmed Salih Al-Khaleefa. Quality of Service (QoS) Management for Local Area Network (LAN) Using Traffic Policy Technique to Secure Congestion |
40 | -- | 0 | Stepan Lemak, Viktor Chertopolokhov, Ivan Uvarov, Anna Kruchinina, Margarita Belousova, Leonid Borodkin, Maxim Mironenko. Inertial Sensor Based Solution for Finger Motion Tracking |
41 | -- | 0 | Niccolò Mora, Federico Cocconcelli, Guido Matrella, Paolo Ciampolini. A Unified Methodology for Heartbeats Detection in Seismocardiogram and Ballistocardiogram Signals |
42 | -- | 0 | Vladimir A. Bogatyrev, Aleksey Derkach. Evaluation of a Cyber-Physical Computing System with Migration of Virtual Machines during Continuous Computing |
43 | -- | 0 | Francesco Giacinto Lavacca, Pierpaolo Salvo, Ludovico Ferranti, Andrea Speranza, Luca Costantini. Performance Evaluation of 5G Access Technologies and SDN Transport Network on an NS3 Simulator |
44 | -- | 0 | Muath A. Obaidat, Suhaib Obeidat, Jennifer Holst, Abdullah Al Hayajneh, Joseph Brown. A Comprehensive and Systematic Survey on the Internet of Things: Security and Privacy Challenges, Security Frameworks, Enabling Technologies, Threats, Vulnerabilities and Countermeasures |
45 | -- | 0 | Abdelkader Benmir, Ahmed Korichi, Abdelhabib Bourouis, Mohammed Alreshoodi, Laith Al-Jobouri. GeoQoE-Vanet: QoE-Aware Geographic Routing Protocol for Video Streaming over Vehicular Ad-hoc Networks |
46 | -- | 0 | Markus-Oliver Tamm, Yar Muhammad, Naveed Muhammad. Classification of Vowels from Imagined Speech with Convolutional Neural Networks |
47 | -- | 0 | Alexander Vodyaho, Saddam Abbas, Nataly Zhukova, Michael Chervoncev. Model Based Approach to Cyber-Physical Systems Status Monitoring |
48 | -- | 0 | Conor Pirry, Hector Marco-Gisbert, Carolyn Begg. A Review of Memory Errors Exploitation in x86-64 |
49 | -- | 0 | Natalya Verzun, Mihail Kolbanev, Alexey Shamin. The Architecture of the Access Protocols of the Global Infocommunication Resources |
50 | -- | 0 | Aleksandr Moshnikov, Vladimir A. Bogatyrev. Risk Reduction Optimization of Process Systems under Cost Constraint Applying Instrumented Safety Measures |
51 | -- | 0 | Elena Kuleshova, Anatoly Marukhlenko, Vyacheslav Dobritsa, Maxim Tanygin. Formation of Unique Characteristics of Hiding and Encoding of Data Blocks Based on the Fragmented Identifier of Information Processed by Cellular Automata |
52 | -- | 0 | Diego P. Montes, Juan A. Añel, David C. H. Wallom, Peter Uhe, Pablo V. Caderno, Tomás F. Pena. Cloud Computing for Climate Modelling: Evaluation, Challenges and Benefits |
53 | -- | 0 | Peter Thompson, Neil Davies. Towards a RINA-Based Architecture for Performance Management of Large-Scale Distributed Systems |
54 | -- | 0 | Thiago Lucas, Maycon Ferreira, Rychard Plachta, Gabriel Ferreira, Kelton Costa. Non-Fragmented Network Flow Design Analysis: Comparison IPv4 with IPv6 Using Path MTU Discovery |