Editorial Pedro Isaías and Marcin Paprzycki  Video color grading via deep neural networks John L. Gibbs  Performance evaluation of tcp spurious timeout detection methods under delay spike and packet loss emulating lte handover Toshihiko Kato, Masahito Moriyama, Ryo Yamamoto, and Satoshi Ohzahata  First in-depth analysis of enterprise architectures and models for higher education institutions Felix Sanchez-Puchol, Joan A. Pastor-Collado, and Baptista Borrell  Feasibility analysis of using the maui scheduler for job simulation of large-scale pbs based clusters Georg Zitzlsberger, Branislav Jansík, and Jan Martinovic  Uri-aware user input interfaces for the unobtrusive reference to linked data André Langer, Christoph Göpfert ,and Martin Gaedke  Automatic generation of ontologies: a hierarchical word clustering approach Smail Sellah and Vincent Hilaire  Evaluating user vulnerabilities vs phisher skills in spear phishing Mathew Nicho, Hussein Fakhry,and Uche Egbue  Efficient snapshot method for all-flash array Miho Imazaki, Norio Shimozono, and Norihisa Komoda 
Back
|