Editorial Pedro Isaías and Marcin Paprzycki ![](images/PDF_icon.jpg) Video color grading via deep neural networks John L. Gibbs ![](images/PDF_icon.jpg) Performance evaluation of tcp spurious timeout detection methods under delay spike and packet loss emulating lte handover Toshihiko Kato, Masahito Moriyama, Ryo Yamamoto, and Satoshi Ohzahata ![](images/PDF_icon.jpg) First in-depth analysis of enterprise architectures and models for higher education institutions Felix Sanchez-Puchol, Joan A. Pastor-Collado, and Baptista Borrell ![](images/PDF_icon.jpg) Feasibility analysis of using the maui scheduler for job simulation of large-scale pbs based clusters Georg Zitzlsberger, Branislav Jansík, and Jan Martinovic ![](images/PDF_icon.jpg) Uri-aware user input interfaces for the unobtrusive reference to linked data André Langer, Christoph Göpfert ,and Martin Gaedke ![](images/PDF_icon.jpg) Automatic generation of ontologies: a hierarchical word clustering approach Smail Sellah and Vincent Hilaire ![](images/PDF_icon.jpg) Evaluating user vulnerabilities vs phisher skills in spear phishing Mathew Nicho, Hussein Fakhry,and Uche Egbue ![](images/PDF_icon.jpg) Efficient snapshot method for all-flash array Miho Imazaki, Norio Shimozono, and Norihisa Komoda ![](images/PDF_icon.jpg)
Back
|