Open Save New
FeedNavigator / National Library of Health Sciences
 
  
Computer Science
AddActa Automatica Sinica
AddAd hoc networks
AddAdvanced engineering informatics
AddAdvanced robotics
AddAll Things Digital - News
AddAmazon Web Services Blog
AddAnalog integrated circuits and signal processing
AddAnnals of telecommunications - Annales des télécommunications
AddAnnual reviews in control
AddApplied soft computing
AddAutomatica
AddAutomation and remote control
AddAutomation in construction
AddAutonomous robots
AddBioData Mining
AddBioinformatics (journal)
AddBiomedical Digital Libraries
AddBlown to Bits
AddBMC Bioinformatics
AddBMC Medical Informatics and Decision Making
AddBriefings in Bioinformatics
AddCCC
AddCCC Computing Research Highlights
AddCentral European journal of operations research
AddCIN: Computers, Informatics, Nursing
AddClass M
AddCluster computing
AddCognitive systems research
AddComputational Intelligence
AddComputer animation and virtual worlds
AddComputer communications
AddComputer fraud and security
AddComputer languages, systems and structures
AddComputer Methods and Programs in Biomedicine
AddComputer networks
AddComputer Scientist in a Business School
AddComputer speech and language
AddComputer vision and image understanding
AddComputerized Medical Imaging and Graphics
AddComputers in Biology and Medicine
AddComputing and visualization in science
AddConstraints
AddCybernetics and systems analysis
AddCyberpsychology & behavior
AddDaniel Lemire's blog
AddDesign automation for embedded systems
AddDigital Creativity
AddDigital Science Blog
AddDiscrete event dynamic systems
AddDisplays
AddDynamical systems
AddEDPACS
AddElectronic Commerce Research
AddEngineering applications of artificial intelligence
AddEURASIP Journal on Advances in Signal Processing
AddEURASIP Journal on Bioinformatics and Systems Biology
AddEURASIP Journal on Embedded Systems
AddEURASIP Journal on Image and Video Processing
AddEURASIP Journal on wireless communications and networking
AddEuropean journal of control
AddExpert systems with applications
AddGeekWire
AddGenomeweb.com Informatics Iron
AddHuman-computer interaction
AddIEEE/ACM Transactions on Computational Biology and Bioinformatics
AddImage and vision computing
AddInformatics for Health and Social Care
AddInformatics In Primary Care
AddInformation & management
AddInformation and Communications Technology Law
AddInformation and computation
AddInformation and software technology
AddInformation systems and e-business management
AddInformation Systems Frontiers
AddInformation Systems Research
AddInkling Engineering Blog
AddIntelligent service robotics
AddInternational Journal of Automation and computing
AddInternational journal of computer vision
AddInternational Journal of Control, Automation and Systems
AddInternational Journal of Critical Infrastructure Protection
AddInternational journal of general systems
AddInternational journal of human-computer studies
AddInternational journal of network management
AddInternational journal of wireless information networks
AddInternational journal on document analysis and recognition (IJDAR)
AddJoel on Software
AddJournal of Biomedical Informatics
AddJournal of Chemical Information and Modeling
AddJournal of computational electronics
AddJournal of Computational Science
AddJournal of Computer Virology and Hacking Techniques
AddJournal of Computer-Aided Molecular Design
AddJournal of computer-mediated communication
AddJournal of Decision Systems
AddJournal of Field Robotics
AddJournal of Graphics Tools
AddJournal of Grid Computing
AddJournal of Information Technology Case and Application Research
AddJournal of intelligent & robotic systems
AddJournal of Intelligent Manufacturing
AddJournal of Internet commerce
AddJournal of Logic and Computation
AddJournal of management information systems
AddJournal of Medical Internet Research
AddJournal of network and computer applications
AddJournal of network and systems management
AddJournal of process control
AddJournal of Signal Processing Systems
AddJournal of systems architecture
AddJournal of Systems Science and Systems Engineering
AddJournal of the American Medical Informatics Association
AddJournal of Zhejiang University Science C
AddLecture Notes in Computer Science
AddLiterary and Linguistic Computing
AddMachine vision and applications
AddMany Niches (Brendan Watson)
AddMashable
AddMedical & Biological Engineering & Computing
AddMicrosystem technologies
AddMIT : Computer science and technology
AddMobile Networks and Applications
AddMultidimensional systems and signal processing
AddNano communication networks
AddNatural computing
AddNetnomics
AddNetwork security
AddNetworks and spatial economics
AddNeural computing & applications
AddNew generation computing
AddNew review of information networking
AddO'Reilly Radar
AddOptical switching and networking
AddPattern Analysis and Applications, PAA
AddPattern recognition
AddPattern recognition letters
AddPersonal and Ubiquitous Computing
AddPervasive and mobile computing
AddPHYSorg.com: Computer Sciences
AddPLoS Computational Biology
AddPLoS Computational Biology Related SciVees
AddPLOS Tech
AddQuantum information processing
AddRobotics and autonomous systems
AddSciTopics Computer Science
AddSignal processing
AddSignal processing. Image communication
AddSimulation Modelling Practice and Theory
AddSource Code for Biology and Medicine
AddStudies in Health Technology and Informatics
AddSustainable Computing: Informatics and Systems
AddSystems & control letters
AddSystems Research and Behavioral Science
AddTechCrunch » google
AddTelecommunications policy
AddTelematics and informatics
AddThe Journal of Strategic Information Systems
AddUser Modeling and User-Adapted Interaction
AddWeb Semantics: Science, Services and Agents on the World Wide Web
AddWireless communications and mobile computing
AddWireless networks
AddWorld wide web


»My Articles

»Latest Feeds

»Popular Feeds
Search Feed Catalog by Name:

Correction to: Identity-based Multi-Recipient Public Key Encryption Scheme and Its Application in IoTMobile Networks and Applications13 hourssaveRefWorksSFX Info
An Evolutionary-Based Black-Box Attack to Deep Neural Network ClassifiersMobile Networks and Applications19 hourssaveRefWorksSFX Info
Fog-Assisted Secure Data Exchange for Examination and Testing in E-learning SystemMobile Networks and Applications2 dayssaveRefWorksSFX Info
An Efficient Bounded Model Checking Approach for Web Service CompositionMobile Networks and Applications2 dayssaveRefWorksSFX Info
Security Analysis of the Access Control Solution of NDN Using BAN LogicMobile Networks and Applications2 dayssaveRefWorksSFX Info
Cognitive Computing for Intelligence SystemsMobile Networks and Applications3 dayssaveRefWorksSFX Info
Cognitive Radio Based System for Best Effort Communications in Sound-based Covert Channel for IoT EnvironmentsMobile Networks and Applications4 dayssaveRefWorksSFX Info
A Novel Approach to Scheduling Workflows Upon Cloud Resources with Fluctuating PerformanceMobile Networks and Applications4 dayssaveRefWorksSFX Info
Intrusion Detection System for IoT Heterogeneous Perceptual NetworkMobile Networks and Applications5 dayssaveRefWorksSFX Info
A Blockchain-Based Security Traffic Measurement Approach to Software Defined NetworkingMobile Networks and Applications5 dayssaveRefWorksSFX Info
Network-aware Virtual Machine Migration Based on Gene Aggregation Genetic AlgorithmMobile Networks and Applications6 dayssaveRefWorksSFX Info
A Confidence-Guided Evaluation for Log Parsers Inner QualityMobile Networks and Applications6 dayssaveRefWorksSFX Info
An Adaboost Based Link Planning Scheme in Space-Air-Ground Integrated NetworksMobile Networks and Applications9 dayssaveRefWorksSFX Info
Role-Based Access Control Model for Cloud Storage Using Identity-Based CryptosystemMobile Networks and Applications9 dayssaveRefWorksSFX Info
MF-CNN: a New Approach for LDoS Attack Detection Based on Multi-feature Fusion and CNNMobile Networks and Applications10 dayssaveRefWorksSFX Info
Editorial: Reliable Communication for Emerging Wireless NetworksMobile Networks and Applications11 dayssaveRefWorksSFX Info
MONET Special Issue on Towards Future Ad Hoc Networks: Technologies and Applications (I)Mobile Networks and Applications11 dayssaveRefWorksSFX Info
Offloading Optimization and Time Allocation for Multiuser Wireless Energy Transfer Based Mobile Edge Computing SystemMobile Networks and Applications11 dayssaveRefWorksSFX Info
A Revocable Group Signatures Scheme to Provide Privacy-Preserving AuthenticationsMobile Networks and Applications11 dayssaveRefWorksSFX Info
Double-Arc Parallel Coordinates and its Axes re-Ordering MethodsMobile Networks and Applications12 dayssaveRefWorksSFX Info
Investigating the Strategy on Path Planning on Aircraft Evacuation Process Using Discrete Event SimulationMobile Networks and Applications12 dayssaveRefWorksSFX Info
Malware Detection Based on Multi-level and Dynamic Multi-feature Using Ensemble Learning at HypervisorMobile Networks and Applications12 dayssaveRefWorksSFX Info
Secure Encrypted Data Deduplication Based on Data PopularityMobile Networks and Applications13 dayssaveRefWorksSFX Info
A Novel Algorithm for Improving Malicious Node Detection Effect in Wireless Sensor NetworksMobile Networks and Applications14 dayssaveRefWorksSFX Info
An Efficient Scheme of Cloud Data Assured DeletionMobile Networks and Applications14 dayssaveRefWorksSFX Info
Research on Intelligent Detection of Command Level Stack Pollution for Binary Program AnalysisMobile Networks and Applications14 dayssaveRefWorksSFX Info
BPH Sensor Network Optimization Based on Cellular Automata and Honeycomb StructureMobile Networks and Applications16 dayssaveRefWorksSFX Info
A Privacy-preserving Fuzzy Search Scheme Supporting Logic Query over Encrypted Cloud DataMobile Networks and Applications17 dayssaveRefWorksSFX Info
Editorial: Security and Privacy Protection for Mobile Applications and PlatformsMobile Networks and Applications17 dayssaveRefWorksSFX Info
A Dynamic Resource Scheduling Scheme in Edge Computing Satellite NetworksMobile Networks and Applications17 dayssaveRefWorksSFX Info
A Hybrid Task Scheduling Algorithm Based on Task ClusteringMobile Networks and Applications17 dayssaveRefWorksSFX Info
A Hybrid Virtualization Approach to Emulate Network Nodes of Heterogeneous ArchitecturesMobile Networks and Applications17 dayssaveRefWorksSFX Info
Accurate and Cognitive Intrusion Detection System (ACIDS): a Novel Black Hole Detection Mechanism in Mobile Ad Hoc NetworksMobile Networks and Applications18 dayssaveRefWorksSFX Info
Deep Learning Models for Real-time Human Activity Recognition with SmartphonesMobile Networks and Applications21 dayssaveRefWorksSFX Info
Editorial: Collaborative Computing for Data-Driven SystemsMobile Networks and Applications25 dayssaveRefWorksSFX Info
A New Network Traffic Prediction Approach in Software Defined NetworksMobile Networks and Applications25 dayssaveRefWorksSFX Info
Weaker Convergence of Global Relaxed Multisplitting USAOR Methods for an H -matrixMobile Networks and Applications30 dayssaveRefWorksSFX Info
Throughput Analysis of Smart Buildings-oriented Wireless Networks under Jamming AttacksMobile Networks and Applications31 dayssaveRefWorksSFX Info
A Timestamp-Regulating VoLTE Covert Channel against Statistical AnalysisMobile Networks and Applications31 dayssaveRefWorksSFX Info
A New Traffic Prediction Algorithm to Software Defined NetworkingMobile Networks and Applications31 dayssaveRefWorksSFX Info
Identity-based Multi-Recipient Public Key Encryption Scheme and Its Application in IoTMobile Networks and Applications32 dayssaveRefWorksSFX Info
Cloud Marginal Resource Allocation: A Decision Support ModelMobile Networks and Applications33 dayssaveRefWorksSFX Info
Editorial: Advanced Techniques for Memory Forensics AnalysisMobile Networks and Applications34 dayssaveRefWorksSFX Info
A Two-Stagse Approach for Social Identity Linkage Based on an Enhanced Weighted Graph ModelMobile Networks and Applications34 dayssaveRefWorksSFX Info
Joint Optimization of Resource Utilization and Load Balance with Privacy Preservation for Edge Services in 5G NetworksMobile Networks and Applications35 dayssaveRefWorksSFX Info
Security Assessment for Interdependent Heterogeneous Cyber Physical SystemsMobile Networks and Applications35 dayssaveRefWorksSFX Info
Editorial: Mobile Edge Computing and Personal NetworksMobile Networks and Applications37 dayssaveRefWorksSFX Info
Editorial: Multimedia and Social Data Processing in Vehicular NetworksMobile Networks and Applications37 dayssaveRefWorksSFX Info
Recent Advancement in Hybrid Big Data ProcessingMobile Networks and Applications37 dayssaveRefWorksSFX Info
A Prediction Approach to End-to-End Traffic in Space Information NetworksMobile Networks and Applications37 dayssaveRefWorksSFX Info
 XML / RSS feed
report
next »