Expand icon Search icon File icon file Download

Browse by Journal

Up a level
Export as [feed] Atom [feed] RSS 1.0 [feed] RSS 2.0
Number of items: 8.

Ullah, Subhan and Mahmood, Zahid and Ali, Nabeel and Ahmad, Tahir and Buriro, Attaullah (2023) Machine Learning-Based Dynamic Attribute Selection Technique for DDoS Attack Classification in IoT Networks. Computers, 12 (6). p. 115. DOI https://doi.org/10.3390/computers12060115

Dziurzanski, Piotr and Singh, Amit (2018) Feedback-Based Admission Control for Firm Real-Time Task Allocation with Dynamic Voltage and Frequency Scaling. Computers, 7 (2). p. 26. DOI https://doi.org/10.3390/computers7020026

Luna-Ramirez, Wulfrano and Fasli, Maria (2018) Bridging the Gap between ABM and MAS: A Disaster-Rescue Simulation Using Jason and NetLogo. Computers, 7 (2). p. 24. DOI https://doi.org/10.3390/computers7020024

Ali Alheeti, Khattab and Gruebler, Anna and McDonald-Maier, Klaus (2016) Intelligent Intrusion Detection of Grey Hole and Rushing Attacks in Self-Driving Vehicular Networks. Computers, 5 (3). p. 16. DOI https://doi.org/10.3390/computers5030016

Palawan, A and Woods, JC and Ghanbari, M (2016) Continuity-Aware Scheduling Algorithm for Scalable Video Streaming. Computers, 5 (2). p. 11. DOI https://doi.org/10.3390/computers5020011

Al-Jobouri, Laith and Casu, Filippo and Fleury, Martin and Cabrera, Julián (2016) Video over DSL with LDGM Codes for Interactive Applications. Computers, 5 (2). p. 9. DOI https://doi.org/10.3390/computers5020009

Al-Jobouri, L and Ali, I and Fleury, M and Ghanbari, M (2015) Error and Congestion Resilient Video Streaming over Broadband Wireless. Computers, 4 (2). pp. 113-141. DOI https://doi.org/10.3390/computers4020113

Whittington, L and Dooley, J and Henson, M and Al-Ghamdi, A (2013) Towards Realising FollowMe User Profiles for Macro-Intelligent Environments. Computers, 2 (3). pp. 132-151. DOI https://doi.org/10.3390/computers2030132

This list was generated on Sat Apr 4 13:47:04 2026 BST.