Editorial Pedro Isaías and Marcin Paprzycki Video color grading via deep neural networks John L. Gibbs Performance evaluation of tcp spurious timeout detection methods under delay spike and packet loss emulating lte handover Toshihiko Kato, Masahito Moriyama, Ryo Yamamoto, and Satoshi Ohzahata First in-depth analysis of enterprise architectures and models for higher education institutions Felix Sanchez-Puchol, Joan A. Pastor-Collado, and Baptista Borrell Feasibility analysis of using the maui scheduler for job simulation of large-scale pbs based clusters Georg Zitzlsberger, Branislav Jansík, and Jan Martinovic Uri-aware user input interfaces for the unobtrusive reference to linked data André Langer, Christoph Göpfert ,and Martin Gaedke Automatic generation of ontologies: a hierarchical word clustering approach Smail Sellah and Vincent Hilaire Evaluating user vulnerabilities vs phisher skills in spear phishing Mathew Nicho, Hussein Fakhry,and Uche Egbue Efficient snapshot method for all-flash array Miho Imazaki, Norio Shimozono, and Norihisa Komoda
Back
|