Suggested Topics within your search.
Suggested Topics within your search.
- Computer science 3
- Application software 1
- Automata 1
- Automatic speech recognition 1
- Coding and Information Theory 1
- Coding theory 1
- Computer access points 1
- Development 1
- Digital techniques 1
- Enterprise application integration (Computer systems) 1
- Government policy 1
- Graphical user interfaces (Computer systems) 1
- Human-computer interaction 1
- Human-machine systems 1
- Information theory 1
- Interactive computer systems 1
- Java (Computer program language) 1
- Management information systems 1
- Mathematics 1
- Moral and ethical aspects 1
- Natural language processing (Computer science) 1
- Object-oriented programming (Computer science) 1
- Prevention 1
- Programming Languages, Compilers, Interpreters 1
- Programming languages (Electronic computers) 1
- Psychological aspects 1
- Psychology 1
- Scripting languages (Computer science) 1
- Semantic integration (Computer systems) 1
- Service-oriented architecture (Computer science) 1
-
601
Ontology-driven use of ChatGPT to build guidelines and select technology parameters for IoT lab development
Published 2025-02-01Get full text
Article -
602
GTAT: empowering graph neural networks with cross attention
Published 2025-02-01Get full text
Article -
603
On the Stability of Some Discrete Fractional Nonautonomous Systems
Published 2012-01-01Get full text
Article -
604
-
605
Experiential design schemas – Combining modular thinking with integral theory
Published 2023-12-01“… Certain aspects of the concept of modularity, introduced primarily in the field of computer science by David L. Parnas (1972), have formed the basis for modularity in education: cohesion, decoupling, ease of modification, replicability are characteristics of the computer module that also apply well to the educational context. …”
Get full text
Article -
606
Toughness Condition for a Graph to Be a Fractional (g,f,n)-Critical Deleted Graph
Published 2014-01-01“…The toughness, as the parameter for measuring the vulnerability of communication networks, has received significant attention in computer science. In this paper, we present the relationship between toughness and fractional (g,f,n)-critical deleted graphs. …”
Get full text
Article -
607
Entre fidélité et libertés interprétatives : l’adaptation numérique à la lumière du programme Collecta
Published 2020-06-01“…Digital Archive of the Gaignières Collection (1642-1715)”, based on the interaction of art history, computer science and design, this article proposes to study the adaptation processes that take place during such a transfer. …”
Get full text
Article -
608
From the Guest Editors
Published 2012-11-01“…Mathematics, theoretical biophysics and computer sciences are needed toqualitatively andquantitatively interpret experimental and clinical results, in order to makerealistic predictions.For more information please click the “Full Text” above.…”
Get full text
Article -
609
Adaptation of the Core CDIO Standards 3.0 to STEM Higher Education
Published 2021-02-01“…It is proposed to adapt the new version of the internationally recognized standards for engineering education the Core CDIO Standards 3.0 to the programs of basic higher education in the field of technology, natural and applied sciences, as well as mathematics and computer science in the context of the evolution of STEM. …”
Get full text
Article -
610
Distributed Risk Aversion Parameter Estimation for First-Price Auction in Sensor Networks
Published 2013-12-01“…The use of market mechanisms to solve computer science problems is gaining significant traction. …”
Get full text
Article -
611
Time-Dependent Influence Measurement in Citation Networks
Published 2018-12-01“…The community influence analysis is tested on real-world data of Computer Science conferences.…”
Get full text
Article -
612
Suggestions on cyber security talents cultivation
Published 2015-12-01“…Cyber security has been approved to be the first level discipline by Academic Degrees Committee of the State Council.It is important to figure out the curriculum of this new discipline and make it clear what is the differ-ence between this new discipline and existed ones.The relationship between cyber security discipline and other dis-ciplines such as information and communication engineering,computer sciences and technology,etc was analyzed.The cyber security was divided into 5 research areas,including fundamental theory,physical security,network secu-rity,system security,data and information security.Based on a given knowledge framework,the cultivation standard for master and Ph.D.students,as well as a reference curriculum of cyber security discipline was proposed.Finally,some suggestions were given for training talents of cyber security.…”
Get full text
Article -
613
Big Data Technology:Current Applications and Prospects
Published 2015-07-01“…The research includes computer science,information science,management science,psychology,etc.Four key technologies in big data research,data collection,preprocessing and storage,data analysis and mining,data privacy protection,data center system structure were discussed and the hot research topics from domestic and overseas research groups were demonstrated in order to have comprehensive and systematic understanding of big data.The application status of big data was introduced from three perspectives,application platforms,relevant products and standardization.Meanwhile,description of current business in big data and other field was presented.Eventually,the opportunities and challenges in big data research were revealed through big data analysis strategies,privacy protection and data quality,which provide the guideline for future research.…”
Get full text
Article -
614
The Open Map
Published 2023-03-01“…New developments in computer science and information technologies have turned maps into grittier models that define the new granular front of the open map. …”
Get full text
Article -
615
-
616
A Survey of Artificial Immune System Based Intrusion Detection
Published 2014-01-01Get full text
Article -
617
An Improved Clustering Algorithm of Tunnel Monitoring Data for Cloud Computing
Published 2014-01-01Get full text
Article -
618
Propagation of Computer Virus under Human Intervention: A Dynamical Model
Published 2012-01-01Get full text
Article -
619
Existence of Solutions for Boundary Value Problem of a Caputo Fractional Difference Equation
Published 2015-01-01Get full text
Article -
620
Pattern Formation in a Reaction-Diffusion Predator-Prey Model with Weak Allee Effect and Delay
Published 2019-01-01Get full text
Article