Suggested Topics within your search.
Suggested Topics within your search.
- Computer science 3
- Application software 1
- Automata 1
- Automatic speech recognition 1
- Coding and Information Theory 1
- Coding theory 1
- Computer access points 1
- Development 1
- Digital techniques 1
- Enterprise application integration (Computer systems) 1
- Government policy 1
- Graphical user interfaces (Computer systems) 1
- Human-computer interaction 1
- Human-machine systems 1
- Information theory 1
- Interactive computer systems 1
- Java (Computer program language) 1
- Management information systems 1
- Mathematics 1
- Moral and ethical aspects 1
- Natural language processing (Computer science) 1
- Object-oriented programming (Computer science) 1
- Prevention 1
- Programming Languages, Compilers, Interpreters 1
- Programming languages (Electronic computers) 1
- Psychological aspects 1
- Psychology 1
- Scripting languages (Computer science) 1
- Semantic integration (Computer systems) 1
- Service-oriented architecture (Computer science) 1
-
3541
Entre fidélité et libertés interprétatives : l’adaptation numérique à la lumière du programme Collecta
Published 2020-06-01“…Digital Archive of the Gaignières Collection (1642-1715)”, based on the interaction of art history, computer science and design, this article proposes to study the adaptation processes that take place during such a transfer. …”
Get full text
Article -
3542
New Double Projection Algorithm for Solving Variational Inequalities
Published 2013-01-01Get full text
Article -
3543
Two Computational Strategies for the Approximate Solution of the Nonlinear Gas Dynamic Equations
Published 2022-01-01Get full text
Article -
3544
-
3545
-
3546
A hierarchy model on the research fields of cyberspace security technology
Published 2015-12-01“…Cyberspace security is an interdisciplinary subject involved with computer science and technology,in-formation and communication engineering,control science and engineering and cryptography.It has an explicit and in-depth discipline connotation.First,the concepts of cyberspace security were advanced,and the definition was given.Then,a hierarchy model of cyberspace security was proposed.Based on the model,the details technologies of eight research fields of cyberspace security including information security,information secrecy,information coun-termeasure,cloud security,big data,IOT security,mobile security,and trustable computing were presented.New guidance and experience for the research in cyberspace security could be taken as.…”
Get full text
Article -
3547
-
3548
-
3549
Verification of Some Topological Indices of Y-Junction Based Nanostructures by M-Polynomials
Published 2022-01-01Get full text
Article -
3550
A Survey of Recent Results for the Generalizations of Ordinary Differential Equations
Published 2014-01-01Get full text
Article -
3551
A New Iterative Algorithm for General Variational Inequality Problem with Applications
Published 2022-01-01Get full text
Article -
3552
A Modified Iterative Approach for Fixed Point Problem in Hadamard Spaces
Published 2024-01-01“…The role of iterative algorithms is vital in exploring the diverse domains of science and has proven to be a powerful tool for solving complex computational problems in the most trending branches of computer science. Taking motivation from this fact, we develop and apply a modified four-step iterative algorithm to solve the fixed point problem in the Hadamard spaces using a total asymptotic nonexpansive mapping. …”
Get full text
Article -
3553
Invariant Approximation Results via Common Fixed Point Theorems for Generalized Weak Contraction Maps
Published 2014-01-01Get full text
Article -
3554
-
3555
Entropy numbers of embeddings of function spaces with Muckenhoupt weights, III. Some limiting cases
Published 2011-01-01Get full text
Article -
3556
Bénard Problem for Slightly Compressible Fluids: Existence and Nonlinear Stability in 3D
Published 2020-01-01Get full text
Article -
3557
-
3558
Finite-Time Stabilization for p-Norm Stochastic Nonlinear Systems with Output Constraints
Published 2020-01-01Get full text
Article -
3559
-
3560