Quantum artificial intelligence: A survey
vol.59 (2026) Gender Diversity Interventions in Software Engineering: A Comprehensive Review of Existing Practices
vol.59 (2026) Homomorphic cryptography: Challenges and perspectives
vol.59 (2026) AI based advances in diagnosis of chronic obstructive pulmonary disease: A systematic review
vol.59 (2026) Twenty years of Nešetřil’s classification programme of Ramsey classes
vol.59 (2026) Understanding data spaces: A Systematic Mapping Study of foundations, technical building blocks, and sectoral adoption
vol.59 (2026) Explainable AI for the diagnosis of neurodegenerative diseases: Unveiling methods, opportunities, and challenges
vol.59 (2026) Sequential recommender systems: A methodological taxonomy and research frontiers
vol.59 (2026) From task-specific to foundation models: A paradigm shift in medical vision-language analysis
vol.59 (2026) Information-theoretic reduction of Markov chains
vol.59 (2026) Research hotspots and trends of human-computer collaboration: A bibliometric analysis
vol.59 (2026) What can artificial intelligence do for soil health in agriculture?
vol.59 (2026) New paradigm of distributed artificial intelligence for LLM implementation and its key technologies
vol.59 (2026) Parameterized inapproximability: From Clique to PIH
vol.59 (2026) Techniques in parameterized approximation
vol.59 (2026) Parameterised counting complexity theory
vol.59 (2026) Parameterized Complexity in Machine Learning
vol.59 (2026) Unlocking the potential of news: A systematic review of advantages and challenges for event detection and analysis
vol.59 (2026) A comprehensive survey on IoT security: Challenges, security issues, and countermeasures
vol.59 (2026) Emerging security paradigms in IoT: A scientometric analysis of research trends and future prospects
vol.59 (2026) A survey of AI-supported materials informatics
vol.59 (2026) Distributed edge artificial intelligence empowered data trading: Theories, algorithms, and applications
vol.59 (2026) Intelligent IoT-Blockchain Ecosystem: A security perspective, applications, and challenges
vol.59 (2026) Optimizing shape parameters in RBF methods: A systematic review of techniques, applications, and computational challenges
vol.59 (2026) Time-sensitive data analytics: A survey of anytime techniques, applications and challenges
vol.59 (2026) Intra-node transaction parallelism in blockchains: Models, solutions, and trends
vol.59 (2026) Critical insights into runtime scheduling, image, storage, and networking challenges in modern Kubernetes environments
vol.59 (2026) Graph diffusion models: A comprehensive survey of methods and applications
vol.59 (2026) On the generalized coloring numbers
vol.59 (2026) Attention-based transformer models for image captioning across languages: An in-depth survey and evaluation
vol.58 (2025) NLP-based techniques for Cyber Threat Intelligence
vol.58 (2025) Transformers in speech processing: Overcoming challenges and paving the future
vol.58 (2025) A comprehensive survey on sentiment analysis: Framework, techniques, and applications
vol.58 (2025) A survey on image cryptography mechanisms: hitherto, and future directions
vol.58 (2025) Insight into code clone management through refactoring: a systematic literature review
vol.58 (2025) Facial privacy in the digital era: A comprehensive survey on methods, evaluation, and future directions
vol.58 (2025) The computing continuum: Past, present, and future
vol.58 (2025) Autoscaling techniques in cloud-native computing: A comprehensive survey
vol.58 (2025) Deep anomaly detection for time series: A survey
vol.58 (2025) Revolutionizing textual data insights: A comprehensive review of the dual relationship between transformers and clustering in textual data analysis
vol.58 (2025) Maximal cliques summarization: Principles, problem classification, and algorithmic approaches
vol.58 (2025) Integration of SDN into UAV, edge computing, & Blockchain: A review, challenges, & future directions
vol.58 (2025) The Lonely Runner Conjecture turns 60
vol.58 (2025) Chaos-based video encryption techniques: A review
vol.58 (2025) Low-light multimodal object detection: A survey
vol.58 (2025) A survey of Beluga whale optimization and its variants: Statistical analysis, advances, and structural reviewing
vol.57 (2025) A review on fingerprint based authentication-its challenges and applications
vol.57 (2025) Maritime search and rescue missions with aerial images: A survey
vol.57 (2025) Intelligent visual analytics for food safety: A comprehensive review
vol.57 (2025) Characterising harmful API uses and repair techniques: Insights from a systematic review
vol.57 (2025)
vol.59 (2026) Gender Diversity Interventions in Software Engineering: A Comprehensive Review of Existing Practices
vol.59 (2026) Homomorphic cryptography: Challenges and perspectives
vol.59 (2026) AI based advances in diagnosis of chronic obstructive pulmonary disease: A systematic review
vol.59 (2026) Twenty years of Nešetřil’s classification programme of Ramsey classes
vol.59 (2026) Understanding data spaces: A Systematic Mapping Study of foundations, technical building blocks, and sectoral adoption
vol.59 (2026) Explainable AI for the diagnosis of neurodegenerative diseases: Unveiling methods, opportunities, and challenges
vol.59 (2026) Sequential recommender systems: A methodological taxonomy and research frontiers
vol.59 (2026) From task-specific to foundation models: A paradigm shift in medical vision-language analysis
vol.59 (2026) Information-theoretic reduction of Markov chains
vol.59 (2026) Research hotspots and trends of human-computer collaboration: A bibliometric analysis
vol.59 (2026) What can artificial intelligence do for soil health in agriculture?
vol.59 (2026) New paradigm of distributed artificial intelligence for LLM implementation and its key technologies
vol.59 (2026) Parameterized inapproximability: From Clique to PIH
vol.59 (2026) Techniques in parameterized approximation
vol.59 (2026) Parameterised counting complexity theory
vol.59 (2026) Parameterized Complexity in Machine Learning
vol.59 (2026) Unlocking the potential of news: A systematic review of advantages and challenges for event detection and analysis
vol.59 (2026) A comprehensive survey on IoT security: Challenges, security issues, and countermeasures
vol.59 (2026) Emerging security paradigms in IoT: A scientometric analysis of research trends and future prospects
vol.59 (2026) A survey of AI-supported materials informatics
vol.59 (2026) Distributed edge artificial intelligence empowered data trading: Theories, algorithms, and applications
vol.59 (2026) Intelligent IoT-Blockchain Ecosystem: A security perspective, applications, and challenges
vol.59 (2026) Optimizing shape parameters in RBF methods: A systematic review of techniques, applications, and computational challenges
vol.59 (2026) Time-sensitive data analytics: A survey of anytime techniques, applications and challenges
vol.59 (2026) Intra-node transaction parallelism in blockchains: Models, solutions, and trends
vol.59 (2026) Critical insights into runtime scheduling, image, storage, and networking challenges in modern Kubernetes environments
vol.59 (2026) Graph diffusion models: A comprehensive survey of methods and applications
vol.59 (2026) On the generalized coloring numbers
vol.59 (2026) Attention-based transformer models for image captioning across languages: An in-depth survey and evaluation
vol.58 (2025) NLP-based techniques for Cyber Threat Intelligence
vol.58 (2025) Transformers in speech processing: Overcoming challenges and paving the future
vol.58 (2025) A comprehensive survey on sentiment analysis: Framework, techniques, and applications
vol.58 (2025) A survey on image cryptography mechanisms: hitherto, and future directions
vol.58 (2025) Insight into code clone management through refactoring: a systematic literature review
vol.58 (2025) Facial privacy in the digital era: A comprehensive survey on methods, evaluation, and future directions
vol.58 (2025) The computing continuum: Past, present, and future
vol.58 (2025) Autoscaling techniques in cloud-native computing: A comprehensive survey
vol.58 (2025) Deep anomaly detection for time series: A survey
vol.58 (2025) Revolutionizing textual data insights: A comprehensive review of the dual relationship between transformers and clustering in textual data analysis
vol.58 (2025) Maximal cliques summarization: Principles, problem classification, and algorithmic approaches
vol.58 (2025) Integration of SDN into UAV, edge computing, & Blockchain: A review, challenges, & future directions
vol.58 (2025) The Lonely Runner Conjecture turns 60
vol.58 (2025) Chaos-based video encryption techniques: A review
vol.58 (2025) Low-light multimodal object detection: A survey
vol.58 (2025) A survey of Beluga whale optimization and its variants: Statistical analysis, advances, and structural reviewing
vol.57 (2025) A review on fingerprint based authentication-its challenges and applications
vol.57 (2025) Maritime search and rescue missions with aerial images: A survey
vol.57 (2025) Intelligent visual analytics for food safety: A comprehensive review
vol.57 (2025) Characterising harmful API uses and repair techniques: Insights from a systematic review
vol.57 (2025)