Displaying works 81 - 100 of 258 in total
Sorted by most recent date added to the index first, which may not be the same as publication date order.
2017 thesis
A Framework for the Rapid Creation of Quality-Assured Programming Rubrics for New K-12 Computer Science Teachers.
North Carolina State University.
2017 conference paper
Type-based Semantic Optimization for Scalable RDF Graph Pattern Matching
Proceedings of the 26th International Conference on World Wide Web.
2017 journal article
QoS-Aware and Reliable Traffic Steering for Service Function Chaining in Mobile Networks
IEEE Journal on Selected Areas in Communications.
2017 journal article
Countermeasures Against False-Name Attacks on Truthful Incentive Mechanisms for Crowdsourcing
IEEE Journal on Selected Areas in Communications.
2017 conference paper
Survivable and bandwidth-guaranteed embedding of virtual clusters in cloud data centers
IEEE INFOCOM 2017 - IEEE Conference on Computer Communications.
2017 conference paper
Robust Incentive Tree Design for Mobile Crowdsensing
2017 IEEE 37th International Conference on Distributed Computing Systems (ICDCS).
2017 conference paper
An Approach to QoS-based Task Distribution in Edge Computing Networks for IoT Applications
2017 IEEE International Conference on Edge Computing (EDGE).
2017 journal article
The Critical Network Flow Problem: Migratability and Survivability
IEEE/ACM Transactions on Networking.
2017 chapter
Adaptively Indistinguishable Garbled Circuits
In Theory of Cryptography (pp. 40–71).
2017 chapter
Server-Aided Secure Computation with Off-line Parties
In Computer Security – ESORICS 2017 (pp. 103–123).
2017 journal article
TMAP: Discovering relevant API methods through text mining of API documentation
Journal of Software: Evolution and Process, 29(12), e1845.
2017 chapter
A Comparisons of BKT, RNN and LSTM for Learning Gain Prediction
In Lecture Notes in Computer Science (pp. 536–539).
2017 chapter
Stimulus Control for Semi-autonomous Computer Canine-Training
In Biomimetic and Biohybrid Systems (pp. 279–290).
2017 chapter
Exchange Pattern Mining in the Bitcoin Transaction Directed Hypergraph
In Financial Cryptography and Data Security (pp. 248–263).
2017 chapter
Differentially Private K-Skyband Query Answering Through Adaptive Spatial Decomposition
In Data and Applications Security and Privacy XXXI (pp. 142–163).
2017 chapter
Lessons Learned: Visualizing Cyber Situation Awareness in a Network Security Domain
In Theory and Models for Cyber Situation Awareness (pp. 47–65).
2017 chapter
Balancing Learning and Engagement in Game-Based Learning Environments with Multi-objective Reinforcement Learning
In Lecture Notes in Computer Science (pp. 323–334).
2017 chapter
Affect Dynamics in Military Trainees Using vMedic: From Engaged Concentration to Boredom to Confusion
In Lecture Notes in Computer Science (pp. 238–249).
2017 chapter
Computer-Aided Human Centric Cyber Situation Awareness
In Theory and Models for Cyber Situation Awareness (pp. 3–25).
2017 chapter
Cost Analysis Comparing HPC Public Versus Private Cloud Computing
In Communications in Computer and Information Science (pp. 294–316).
Citation Index includes data from a number of different sources. If you have questions about the sources of data in the Citation Index or need a set of data which is free to re-distribute, please contact us.
Certain data included herein are derived from the Web of Science© and InCites© (2024) of Clarivate Analytics. All rights reserved. You may not copy or re-distribute this material in whole or in part without the prior written consent of Clarivate Analytics.