Artykuły w czasopismach na temat „Other Information, Computing and Communication Sciences”
Utwórz poprawne odniesienie w stylach APA, MLA, Chicago, Harvard i wielu innych
Sprawdź 50 najlepszych artykułów w czasopismach naukowych na temat „Other Information, Computing and Communication Sciences”.
Przycisk „Dodaj do bibliografii” jest dostępny obok każdej pracy w bibliografii. Użyj go – a my automatycznie utworzymy odniesienie bibliograficzne do wybranej pracy w stylu cytowania, którego potrzebujesz: APA, MLA, Harvard, Chicago, Vancouver itp.
Możesz również pobrać pełny tekst publikacji naukowej w formacie „.pdf” i przeczytać adnotację do pracy online, jeśli odpowiednie parametry są dostępne w metadanych.
Przeglądaj artykuły w czasopismach z różnych dziedzin i twórz odpowiednie bibliografie.
Wang, Mian. "Mobile Information System of Ceramic Appreciation and Communication Management Based on Mobile Edge Computing". Mobile Information Systems 2021 (15.09.2021): 1–11. http://dx.doi.org/10.1155/2021/4540664.
Pełny tekst źródłaHakken, David. "Computing and the Crisis: The Significant Role of New Information Technologies in the Current Socio-economic Meltdown". tripleC: Communication, Capitalism & Critique. Open Access Journal for a Global Sustainable Information Society 8, nr 2 (28.08.2010): 205–20. http://dx.doi.org/10.31269/vol8iss2pp205-220.
Pełny tekst źródłaAl-Aufi, Ali, i Crystal Fulton. "Impact of social networking tools on scholarly communication: a cross-institutional study". Electronic Library 33, nr 2 (7.04.2015): 224–41. http://dx.doi.org/10.1108/el-05-2013-0093.
Pełny tekst źródłaDai, Yu, Qiuhong Zhang i Lei Yang. "Virtual Machine Migration Strategy Based on Multi-Agent Deep Reinforcement Learning". Applied Sciences 11, nr 17 (29.08.2021): 7993. http://dx.doi.org/10.3390/app11177993.
Pełny tekst źródłaKonkoly, K. R., i K. A. Paller. "0431 Two-Way Communication Between Dreamers and Experimenters". Sleep 43, Supplement_1 (kwiecień 2020): A166. http://dx.doi.org/10.1093/sleep/zsaa056.428.
Pełny tekst źródłaWang, Jian Hui, i Li Liu. "Research on Computer Graphics Design and Visual Communication Design". Applied Mechanics and Materials 713-715 (styczeń 2015): 2191–94. http://dx.doi.org/10.4028/www.scientific.net/amm.713-715.2191.
Pełny tekst źródłaMujević, Mersad, i Safet Korać. "Significance and role of using electronic communications in entrepreneurial companies". Ekonomski izazovi 9, nr 18 (2020): 86–95. http://dx.doi.org/10.5937/ekoizazov2018086m.
Pełny tekst źródłaCao, Shihua, Xin Lin, Keyong Hu, Lidong Wang, Wenjuan Li, Mengxin Wang i Yuchao Le. "Cloud Computing-Based Medical Health Monitoring IoT System Design". Mobile Information Systems 2021 (7.07.2021): 1–12. http://dx.doi.org/10.1155/2021/8278612.
Pełny tekst źródłaDaberdaku, Sebastian, i Carlo Ferrari. "Computing voxelised representations of macromolecular surfaces". International Journal of High Performance Computing Applications 32, nr 3 (15.05.2016): 407–32. http://dx.doi.org/10.1177/1094342016647114.
Pełny tekst źródłaFerneley, Elaine, i Ben Light. "Unpacking User Relations in an Emerging Ubiquitous Computing Environment: Introducing the Bystander". Journal of Information Technology 23, nr 3 (wrzesień 2008): 163–75. http://dx.doi.org/10.1057/palgrave.jit.2000123.
Pełny tekst źródłaZhao, Jianming, Peng Zeng, Yingjun Liu i Tianyu Wang. "On Improving the Robustness of MEC with Big Data Analysis for Mobile Video Communication". Security and Communication Networks 2021 (6.07.2021): 1–12. http://dx.doi.org/10.1155/2021/4539540.
Pełny tekst źródłaAdu, Kofi Koranteng, i Patrick Ngulube. "Preserving the digital heritage of public institutions in Ghana in the wake of electronic government". Library Hi Tech 34, nr 4 (21.11.2016): 748–63. http://dx.doi.org/10.1108/lht-07-2016-0077.
Pełny tekst źródłaPiotelat, Elisabeth, i Florence Raulin Cerceau. "New SETI prospects opened up by current information networking". International Journal of Astrobiology 12, nr 3 (20.06.2013): 208–11. http://dx.doi.org/10.1017/s1473550413000141.
Pełny tekst źródłaWu, J. Y., R. Xin, J. B. Zhao, T. Zheng, D. Jiang i P. F. Zhang. "Study on Delay Optimization of Fog Computing Edge Nodes Based on the CPSO-LB Algorithm". Wireless Communications and Mobile Computing 2020 (1.12.2020): 1–12. http://dx.doi.org/10.1155/2020/8811175.
Pełny tekst źródłaWalton, Douglas N. "Using conversation policies to solve problems of ambiguity in argumentation and artificial intelligence". Pragmatics and Cognition 14, nr 1 (22.08.2006): 3–36. http://dx.doi.org/10.1075/pc.14.1.03wal.
Pełny tekst źródłaKakkar, Latika, Deepali Gupta, Sapna Saxena i Sarvesh Tanwar. "An Analysis of Integration of Internet of Things and Cloud Computing". Journal of Computational and Theoretical Nanoscience 16, nr 10 (1.10.2019): 4345–49. http://dx.doi.org/10.1166/jctn.2019.8523.
Pełny tekst źródłaShahryari, Om-Kolsoom, Amjad Anvari-Moghaddam i Shadi Shahryari. "Demand side management using the internet of energy based on LoRaWAN technology". Kurdistan Journal of Applied Research 2, nr 3 (27.08.2017): 112–19. http://dx.doi.org/10.24017/science.2017.3.35.
Pełny tekst źródłaCalderbank, Robert, i Andrew Thompson. "CHIRRUP: a practical algorithm for unsourced multiple access". Information and Inference: A Journal of the IMA 9, nr 4 (5.12.2019): 875–97. http://dx.doi.org/10.1093/imaiai/iaz029.
Pełny tekst źródłaLahlou, Saadi. "Identity, social status, privacy and face-keeping in digital society". Social Science Information 47, nr 3 (wrzesień 2008): 299–330. http://dx.doi.org/10.1177/0539018408092575.
Pełny tekst źródłaEllen Frederick, Donna. "Libraries, data and the fourth industrial revolution (Data Deluge Column)". Library Hi Tech News 33, nr 5 (4.07.2016): 9–12. http://dx.doi.org/10.1108/lhtn-05-2016-0025.
Pełny tekst źródłaShammar, Elham Ali, i Ammar Thabit Zahary. "The Internet of Things (IoT): a survey of techniques, operating systems, and trends". Library Hi Tech 38, nr 1 (5.10.2019): 5–66. http://dx.doi.org/10.1108/lht-12-2018-0200.
Pełny tekst źródłaGhazzawi, Nizar, Benoît Robichaud, Patrick Drouin i Fatiha Sadat. "Automatic extraction of specialized verbal units". Terminology 23, nr 2 (31.12.2017): 207–37. http://dx.doi.org/10.1075/term.00002.gha.
Pełny tekst źródłaLin, Dongmei. "Research on the Information Construction of Accounting Audit Based on the Big Data of Computer". International Journal of Information Technology and Web Engineering 12, nr 3 (lipiec 2017): 74–82. http://dx.doi.org/10.4018/ijitwe.2017070107.
Pełny tekst źródłaSalamí, Esther, Antonia Gallardo, Georgy Skorobogatov i Cristina Barrado. "On-the-Fly Olive Trees Counting Using a UAS and Cloud Services". Remote Sensing 11, nr 3 (5.02.2019): 316. http://dx.doi.org/10.3390/rs11030316.
Pełny tekst źródłaRedkina, N. S. "Global trends of libraries development: optimism vs pessimism (foreign literature review) Part 1". Bibliosphere, nr 4 (30.12.2018): 87–94. http://dx.doi.org/10.20913/1815-3186-2018-4-87-94.
Pełny tekst źródłaTak, Sehyun, Jinsu Yoon, Soomin Woo i Hwasoo Yeo. "Sectional Information-Based Collision Warning System Using Roadside Unit Aggregated Connected-Vehicle Information for a Cooperative Intelligent Transport System". Journal of Advanced Transportation 2020 (21.07.2020): 1–12. http://dx.doi.org/10.1155/2020/1528028.
Pełny tekst źródłaAhmed, Mohammed Imtyaz, i G. Kannan. "Cloud-Based Remote RFID Authentication for Security of Smart Internet of Things Applications". Journal of Information & Knowledge Management 20, Supp01 (30.01.2021): 2140004. http://dx.doi.org/10.1142/s0219649221400049.
Pełny tekst źródłaJanani, K. "Mitigation of Malware Effect using Cyber Threat Analysis using Ensemble Deep Belief Networks". International Journal of Innovative Technology and Exploring Engineering 10, nr 11 (30.09.2021): 40–46. http://dx.doi.org/10.35940/ijitee.k9477.09101121.
Pełny tekst źródłaBaldini, Gianmarco, Jose Luis Hernandez Ramos i Irene Amerini. "Intrusion Detection Based on Gray-Level Co-Occurrence Matrix and 2D Dispersion Entropy". Applied Sciences 11, nr 12 (16.06.2021): 5567. http://dx.doi.org/10.3390/app11125567.
Pełny tekst źródłaRamamurthy, M. K. "A new generation of cyberinfrastructure and data services for earth system science education and research". Advances in Geosciences 8 (6.06.2006): 69–78. http://dx.doi.org/10.5194/adgeo-8-69-2006.
Pełny tekst źródłaN., Ramachandran, Sivaprakasam P., Thangamani G. i Anand G. "Selecting a suitable Cloud Computing technology deployment model for an academic institute". Campus-Wide Information Systems 31, nr 5 (28.10.2014): 319–45. http://dx.doi.org/10.1108/cwis-09-2014-0018.
Pełny tekst źródłaZhao, Bozuo, Rui Kong i Wei Miao. "Information Security of New Media Art Platform of Distributed System Based on Blockchain Technology". Mobile Information Systems 2021 (21.07.2021): 1–8. http://dx.doi.org/10.1155/2021/6607130.
Pełny tekst źródłaAli, Omer, Mohamad Khairi Ishak i Muhammad Kamran Liaquat Bhatti. "Emerging IoT domains, current standings and open research challenges: a review". PeerJ Computer Science 7 (16.08.2021): e659. http://dx.doi.org/10.7717/peerj-cs.659.
Pełny tekst źródłaRezaei Aghdam, Atae, Jason Watson, Cynthia Cliff i Shah Jahan Miah. "Improving the Theoretical Understanding Toward Patient-Driven Health Care Innovation Through Online Value Cocreation: Systematic Review". Journal of Medical Internet Research 22, nr 4 (24.04.2020): e16324. http://dx.doi.org/10.2196/16324.
Pełny tekst źródłaCeia, Carlos. "Promoting a Teacher Education Research-Oriented Curriculum for Initial Teacher Training in English as a Foreign Language". e-TEALS 7, nr 1 (1.12.2016): 1–10. http://dx.doi.org/10.1515/eteals-2016-0005.
Pełny tekst źródłaFloridi, Luciano. "Web 2.0 vs. the Semantic Web: A Philosophical Assessment". Episteme 6, nr 1 (luty 2009): 25–37. http://dx.doi.org/10.3366/e174236000800052x.
Pełny tekst źródłaAlbert, Sylvie, i Don Flournoy. "Think Global, Act Local". International Journal of Sociotechnology and Knowledge Development 2, nr 1 (styczeń 2010): 59–79. http://dx.doi.org/10.4018/jskd.2010100804.
Pełny tekst źródłaWang, Yiming, i Xidan Gong. "Optimization of Data Processing System for Exercise and Fitness Process Based on Internet of Things". Wireless Communications and Mobile Computing 2021 (6.07.2021): 1–11. http://dx.doi.org/10.1155/2021/7132301.
Pełny tekst źródłaKelkar, Bhagyashri A., Sunil F. Rodd i Umakant P. Kulkarni. "A Novel Parameter-Light Subspace Clustering Technique Based on Single Linkage Method". Journal of Information & Knowledge Management 18, nr 01 (marzec 2019): 1950007. http://dx.doi.org/10.1142/s0219649219500072.
Pełny tekst źródłaChen, Qian Matteo, Alberto Finzi, Toni Mancini, Igor Melatti i Enrico Tronci. "MILP, Pseudo-Boolean, and OMT Solvers for Optimal Fault-Tolerant Placements of Relay Nodes in Mission Critical Wireless Networks*". Fundamenta Informaticae 174, nr 3-4 (28.09.2020): 229–58. http://dx.doi.org/10.3233/fi-2020-1941.
Pełny tekst źródłaSchulte, Stephanie J. "Information Professional Job Advertisements in the U.K. Indicate Professional Experience is the Most Required Skill". Evidence Based Library and Information Practice 4, nr 2 (14.06.2009): 158. http://dx.doi.org/10.18438/b8ts51.
Pełny tekst źródłaHaliti, Nusret, Arbana Kadriu i Mensur Jusufi. "An approach for speed limit determination for vehicle tracking in case of GID ambiguity and lack of information in navigation maps". International Journal of Pervasive Computing and Communications 13, nr 3 (4.09.2017): 252–63. http://dx.doi.org/10.1108/ijpcc-02-2017-0020.
Pełny tekst źródłaSingh Negi, Dheeraj. "Open source software using New GEN LIB: a case study of international management institutue Bhubaneswar". Library Hi Tech News 31, nr 9 (28.10.2014): 9–10. http://dx.doi.org/10.1108/lhtn-07-2014-0056.
Pełny tekst źródłaKang, Ho-Seok, Sung-Ryul Kim i Pankoo Kim. "Traffic deflection method for dos attack defense using a location-based routing protocol in the sensor network". Computer Science and Information Systems 10, nr 2 (2013): 685–701. http://dx.doi.org/10.2298/csis120914029k.
Pełny tekst źródłaSuplatov, Dmitry, Nina Popova, Sergey Zhumatiy, Vladimir Voevodin i Vytas Švedas. "Parallel workflow manager for non-parallel bioinformatic applications to solve large-scale biological problems on a supercomputer". Journal of Bioinformatics and Computational Biology 14, nr 02 (kwiecień 2016): 1641008. http://dx.doi.org/10.1142/s0219720016410080.
Pełny tekst źródłaMiranda, Enrique, i Jordi Suñé. "Memristors for Neuromorphic Circuits and Artificial Intelligence Applications". Materials 13, nr 4 (20.02.2020): 938. http://dx.doi.org/10.3390/ma13040938.
Pełny tekst źródłaDevika, G., D. Ramesh i Asha Gowda Karegowda. "Analysis of Binary and Discrete Grey Wolf Optimization Algorithms Applied for Enhancing Performance of Energy Efficient Low Energy Adaptive Clustering Hierarchy". Journal of Computational and Theoretical Nanoscience 17, nr 9 (1.07.2020): 3850–59. http://dx.doi.org/10.1166/jctn.2020.8974.
Pełny tekst źródłaCiobanu, Gabriel. "Writing as a Form of Freedom and Happiness Celebrating the 60th birthday of Gheorghe Păun". International Journal of Computers Communications & Control 5, nr 5 (1.12.2010): 613. http://dx.doi.org/10.15837/ijccc.2010.5.2215.
Pełny tekst źródłaBilò, Davide, Luciano Gualà, Stefano Leucci i Guido Proietti. "Network Creation Games with Traceroute-Based Strategies". Algorithms 14, nr 2 (26.01.2021): 35. http://dx.doi.org/10.3390/a14020035.
Pełny tekst źródłaEgorova, P. A., T. G. Mukhina, S. N. Sorokoumova i D. D. Mukhina. "MONITORING ANALYSIS OF EFFICIENCY OF PROFESSIONAL COMPUTERS AND SYSTEM REQUIREMENTS FOR THE ORGANIZATION OF ELECTRONIC-EDUCATIONAL ENVIRONMENT OF HIGHER EDUCATION INSTITUTIONS IN THE CONDITIONS OF EDUCATIONAL INCLUSION". Vestnik of Minin University 6, nr 3 (10.11.2018): 12. http://dx.doi.org/10.26795/2307-1281-2018-6-3-12.
Pełny tekst źródła