Knowledge Computing and Its Applications
暂无分享,去创建一个
[1] Hamid Reza Arkian,et al. MIST: Fog-based data analytics scheme with cost-efficient resource provisioning for IoT crowdsensing applications , 2017, J. Netw. Comput. Appl..
[2] Stanley Wasserman,et al. Social Network Analysis: Methods and Applications , 1994, Structural analysis in the social sciences.
[3] S. Borgatti,et al. On Social Network Analysis in a Supply Chain Context , 2009 .
[4] A. Barabasi,et al. Evolution of the social network of scientific collaborations , 2001, cond-mat/0104162.
[5] Paolo Santi. The critical transmitting range for connectivity in mobile ad hoc networks , 2005, IEEE Transactions on Mobile Computing.
[6] Jean Vanderdonckt. Knowledge-Based Systems for Automated User Inter- face Generation : the TRIDENT Experience , 1995 .
[7] Yanlin Wang,et al. A Heuristic Algorithm for Minimum Connected Dominating Set with Maximal Weight in Ad Hoc Networks , 2003, GCC.
[8] Akash Singh,et al. Evaluation criteria for assessing the usability of ERP systems , 2009, SAICSIT '09.
[9] Sergiu-Dan Stan,et al. Platform as a service gateway for the Fog of Things , 2017, Adv. Eng. Informatics.
[10] Aliya Ahmad,et al. Instruction Detection System based on Support Vector Machine using BAT Algorithm , 2017 .
[11] Charles J. Colbourn,et al. Unit disk graphs , 1991, Discret. Math..
[12] Vaduvur Bharghavan,et al. Routing in ad hoc networks using a spine , 1997, Proceedings of Sixth International Conference on Computer Communications and Networks.
[13] Ahmed Patel,et al. A survey of intrusion detection and prevention systems , 2010, Inf. Manag. Comput. Secur..
[14] Jianjun Shi,et al. Simultaneous signal separation and prognostics of multi-component systems: the case of identical components , 2015 .
[16] V. Ceronmani Sharmila,et al. Strategic Location-based Connected Dominating Set for Mobile Ad Hoc Networks , 2014 .
[17] Li Hao,et al. Controlling the Residual Life Distribution of Parallel Unit Systems Through Workload Adjustment , 2017, IEEE Transactions on Automation Science and Engineering.
[18] N. Sengupta,et al. Logarithmic Formula Generated Seed Based Cryptographic Technique using proposed Alphanumeric Number System and Rubik Rotation Algorithm , 2012, 2012 International Conference on Communications, Devices and Intelligent Systems (CODIS).
[19] R. Chowdhury,et al. String graphixification based asymmetric key cryptographic algorithm using proposed concepts of GDC and S-loop matrix , 2012, 2012 International Conference on Informatics, Electronics & Vision (ICIEV).
[20] Christian Schindelhauer,et al. The wake up dominating set problem , 2015, Theor. Comput. Sci..
[21] Matteo Golfarelli,et al. The Dimensional Fact Model: A Conceptual Model for Data Warehouses , 1998, Int. J. Cooperative Inf. Syst..
[22] Yunghsiang Sam Han,et al. Optimal Transmission Range for Wireless Ad Hoc Networks Based on Energy Efficiency , 2007, IEEE Transactions on Communications.
[23] Goran D. Putnik,et al. Industrial Plant Layout Analyzing Based on SNA , 2016, ISDA.
[24] Ahmed Patel,et al. An intrusion detection and prevention system in cloud computing: A systematic review , 2013, J. Netw. Comput. Appl..
[25] Brad A. Myers,et al. Automatic, look-and-feel independent dialog creation for graphical user interfaces , 1990, CHI '90.
[26] Charles Wiecha,et al. ITS: a tool for rapidly developing interactive applications , 1990, TOIS.
[27] Walid G. Aref,et al. LocationSpark: In-memory Distributed Spatial Query Processing and Optimization , 2020, Frontiers in Big Data.
[28] Matthias Scheutz,et al. Sensing cognitive multitasking for a brain-based adaptive user interface , 2011, CHI.
[29] Natarajan Meghanathan,et al. Predicted Link Expiration Time Based Connected Dominating Sets for Mobile Ad hoc Networks , 2010 .
[30] Ping Luo,et al. Facilitating the exploration of interface design alternatives: the HUMANOID model of interface design , 1992, CHI.
[31] V. Manupati,et al. SOCIAL NETWORK ANALYSIS BASED EVOLUTIONARY ALGORITHIMIC APPROACH TO IDENTIFY THE INFLUENCE OF HUBS ON FLEXIBLE SCHEDULING PROBLEMS , 2015 .
[32] Qi Zhang,et al. Indra: a peer-to-peer approach to network intrusion detection and prevention , 2003, WET ICE 2003. Proceedings. Twelfth IEEE International Workshops on Enabling Technologies: Infrastructure for Collaborative Enterprises, 2003..
[33] Ding-Zhu Du,et al. Connected Dominating Sets in Wireless Networks with Different Transmission Ranges , 2007, IEEE Transactions on Mobile Computing.
[34] Rajiv Gandhi,et al. Distributed algorithms for connected domination in wireless networks , 2007, J. Parallel Distributed Comput..
[35] Hari Om,et al. Comparative Analysis of Classification Techniques in Network Based Intrusion Detection Systems , 2017 .
[36] Pablo Castells,et al. Declarative interface models for user interface construction tools: the MASTERMIND approach , 1995, EHCI.
[37] David A. Wilson,et al. C++ Programming With Macapp , 1990 .
[38] Lisa K. Wells,et al. LabVIEW for Everyone : Graphical Programming Made Even Easier , 1996 .
[39] Oludele Awodele,et al. A Multi-Layered Approach to the Design of Intelligent Intrusion Detection and Prevention System (IIDPS) , 2009 .
[40] Pietro Manzoni,et al. Determination of Critical Transmission Range in Ad-Hoc Networks , 1999 .
[41] Natarajan Meghanathan,et al. Applications of Graph Theory Algorithms in Mobile Ad hoc Networks , 2012 .
[42] Phillip Bonacich,et al. Some unique properties of eigenvector centrality , 2007, Soc. Networks.
[43] Maja Pantic,et al. ${\rm HCI}^{\wedge}2$ Framework: A Software Framework for Multimodal Human-Computer Interaction Systems , 2013, IEEE Transactions on Cybernetics.
[44] Zhang Hengxi,et al. A Methodological Framework for Data Warehouse Design , 2003 .
[45] Mohammad Reza Meybodi,et al. An intelligent backbone formation algorithm for wireless ad hoc networks based on distributed learning automata , 2010, Comput. Networks.
[46] Niva Das. Survey on Host and Network Based Intrusion Detection System , 2014 .
[47] Xavier Masip-Bruin,et al. Do we all really know what a fog node is? Current trends towards an open definition , 2017, Comput. Commun..
[48] Carlos Maziero,et al. Protecting host-based intrusion detectors through virtual machines , 2007, Comput. Networks.
[49] Mario Guimaraes,et al. Overview of intrusion detection and intrusion prevention , 2008, InfoSecCD2008 2008.
[50] Tamara Babaian,et al. Identifying Usability Issues with an ERP Implementation , 2005, ICEIS.
[51] Chittaranjan A. Mandal,et al. Minimum Connected Dominating Set Using a Collaborative Cover Heuristic for Ad Hoc Sensor Networks , 2010, IEEE Transactions on Parallel and Distributed Systems.
[52] Mark A. Linton,et al. Unidraw: a framework for building domain-specific graphical editors , 1990, TOIS.
[53] Muttukrishnan Rajarajan,et al. A survey of intrusion detection techniques in Cloud , 2013, J. Netw. Comput. Appl..
[54] Rajdeep Chowdhury,et al. Towards Design, Analysis and Performance Enhancement of Data Warehouse By Implementation And Simulation Of P2p Technology On Proposed Pseudo Mesh Architecture , 2014 .
[55] Natarajan Meghanathan,et al. An Algorithm to Determine Stable Connected Dominating Sets for Mobile Ad hoc Networks using Strong Neighborhoods , 2012, Int. J. Comb. Optim. Probl. Informatics.
[56] Karan Bajaj,et al. A Survey on Various Malware Detection Techniques on Mobile Platform , 2016 .
[57] Thomas Weigert,et al. An adaptive automatically tuning intrusion detection system , 2008, TAAS.
[58] Silvia Lindtner,et al. Being senior and ICT: a study of seniors using ICT in China , 2014, CHI.
[59] Huan Qi,et al. A Extended TOPSIS Method for the Stochastic Multi-Criteria Decision Making Problem through Interval Estimation , 2010, 2010 2nd International Workshop on Intelligent Systems and Applications.
[60] Donghyun Kim,et al. Constructing Minimum Connected Dominating Sets with Bounded Diameters in Wireless Networks , 2009, IEEE Transactions on Parallel and Distributed Systems.
[61] Gabriel Maciá-Fernández,et al. Anomaly-based network intrusion detection: Techniques, systems and challenges , 2009, Comput. Secur..
[62] Pedro A. Szekely. User Interface Prototyping: Tools and Techniques , 1994, ICSE Workshop on SE-HCI.
[63] Samir Khuller,et al. Approximation Algorithms for Connected Dominating Sets , 1996, Algorithmica.
[64] Yehia K. Helmy,et al. An Integrated Conceptual Model for Temporal Data Warehouse Security , 2011, Comput. Inf. Sci..
[65] Jie Wu,et al. Extended multipoint relays to determine connected dominating sets in MANETs , 2006, 2004 First Annual IEEE Communications Society Conference on Sensor and Ad Hoc Communications and Networks, 2004. IEEE SECON 2004..
[66] Matt Carlson,et al. INTRUSION DETECTION AND PREVENTION SYSTEMS , 2006 .
[67] Rajeev Agrawal,et al. Investigation of reconfiguration effect on makespan with social network method for flexible job shop scheduling problem , 2017, Comput. Ind. Eng..