03-07-2019
|
Incorporating social practices in BDI agent systems
by
Stephen Cranefield
et al
|
03-06-2019
|
Seniors Media Preference for Receiving Internet
Security Information: A Pilot Study
by
Yousra Javed
et al
|
03-07-2019
|
Benefits of AWS in Modern Cloud
by
Sourav Mukherjee
|
03-09-2019
|
Analysis of the use of smart cards on the urban railway
by
Dmitry Namiot
et al
|
03-11-2019
|
Gathering Insights from Teenagers Hacking Experience
with Authentic Cybersecurity Tools
by
Valdemar Švábenský
et al
|
03-11-2019
|
A reference architecture for integrating the Industrial
Internet of Things in the Industry 4.0
by
Petar Radanliev
et al
|
03-11-2019
|
Hashtag Usage in a Geographically-Local Microblogging
App
by
Helge Reelfs
et al
|
03-06-2019
|
Twitter Speaks: A Case of National Disaster Situational
Awareness
by
Amir Karami
et al
|
03-10-2019
|
Blameworthiness in Multi-Agent Settings
by
Meir Friedenberg
et al
|
03-07-2019
|
Engaging Users with Educational Games: The Case of
Phishing
by
Matt Dixon
et al
|
03-08-2019
|
Thanks for Stopping By: A Study of Thanks Usage on
Wikimedia
by
Swati Goel
et al
|
03-08-2019
|
An Identification of Learners Confusion through
Language and Discourse Analysis
by
Thushari Atapattu
et al
|
03-08-2019
|
Online division of labour: emergent structures in Open
Source Software
by
María J. Palazzi
et al
|
03-08-2019
|
Transparency, Fairness, Data Protection, Neutrality:
Data Management Challenges in the Face of New
Regulation
by
Serge Abiteboul
et al
|
03-07-2019
|
Based on Graph-VAE Model to Predict Students Score
by
Yang Zhang
et al
|
03-08-2019
|
Image Privacy Prediction Using Deep Neural Networks
by
Ashwini Tonge
et al
|
03-11-2019
|
Standardisation of cyber risk impact assessment for the
Internet of Things (IoT)
by
Petar Radanliev
et al
|