首页 文献索引 SCI期刊 AI助手
期刊目录筛选

期刊名:Computer

缩写:COMPUTER

ISSN:0018-9162

e-ISSN:1558-0814

IF/分区:2.3/Q2

文章目录 更多期刊信息

共收录本刊相关文章索引31
Clinical Trial Case Reports Meta-Analysis RCT Review Systematic Review
Classical Article Case Reports Clinical Study Clinical Trial Clinical Trial Protocol Comment Comparative Study Editorial Guideline Letter Meta-Analysis Multicenter Study Observational Study Randomized Controlled Trial Review Systematic Review
Joanna F DeFranco,David F Ferraiolo,D Richard Kuhn et al. Joanna F DeFranco et al.
Sharing data between different organizations is a challenge primarily due to database management systems (DBMSs) being different types that impose different schemas to represent and retrieve data. In addition, maintaining security and priva...
J Voas,R Kuhn,C Paulsen et al. J Voas et al.
Just as yeast, flour, water, and salt are to bread, algorithms, data structures, operating systems, database design, compiler design, and programming languages were computer science (CS) education's core ingredients in past years. Then, uni...
Rick Kuhn,Jeff Voas,Dylan Yaga Rick Kuhn
Blockchains were designed to solve the problem of double-spending in cryptocurrencies, and the success of the Bitcoin design has generated vastly more interest than previous proposals for digital currencies. Blockchains are being used in ot...
Jack Toohey,M S Raunak,Dave Binkley Jack Toohey
A Deep Neural Network (DNN) based system, such as the one used for autonomous vehicle operations, is a "black box" of complex interactions resulting in a classification or prediction. An important question for any such system is how to incr...
Ian Foster,Carl Kesselman Ian Foster
Despite much creative work on methods and tools, reproducibility-the ability to repeat the computational steps used to obtain a research result-remains elusive. One reason for these difficulties is that extant tools for capturing research p...
Steven Furnell,Julie Haney,Mary Theofanos Steven Furnell
While the threats may appear to be vastly different, further investigation reveals that the cybersecurity community can learn much from the COVID-19 messaging response.
Julie Haney,Wayne Lutters Julie Haney
Security awareness training requirements set a minimum baseline for introducing security practices to an organization's workforce. But is simple compliance enough to result in behavior change?
Zheng Ma,Jiaxin Wu,Sheng-Hua Zhong et al. Zheng Ma et al.
Human eye movements indicate important spatial information in static images as well as videos. Yet videos contain additional temporal information and convey a storyline. Video summarization is a technique that reduces video size, but mainta...