-->  Vol. 13 Number 2  (2018)

  Editorial

Pedro Isaías and Marcin Paprzycki

 

 

Video color grading via deep neural networks  

 

John L. Gibbs 

 

Performance evaluation of tcp spurious timeout detection methods under delay spike and packet loss emulating lte handover

 

Toshihiko Kato, Masahito Moriyama, Ryo Yamamoto, and Satoshi Ohzahata 

 

First in-depth analysis of enterprise architectures and models for higher education institutions

 

Felix Sanchez-Puchol, Joan A. Pastor-Collado, and Baptista Borrell 

 

  Feasibility analysis of using the maui scheduler for job simulation of large-scale pbs based clusters

Georg Zitzlsberger, Branislav Jansík, and Jan Martinovic   

 

Uri-aware user input interfaces for the unobtrusive reference to linked data

 

André Langer, Christoph Göpfert ,and Martin Gaedke 

 

Automatic generation of ontologies: a hierarchical word clustering approach

 

Smail Sellah and Vincent Hilaire  

 

  Evaluating user vulnerabilities vs phisher skills in spear phishing

 

Mathew Nicho, Hussein Fakhry,and Uche Egbue  

 

  Efficient snapshot method for all-flash array

 

Miho Imazaki, Norio Shimozono, and Norihisa Komoda  

 

 

Back