Computer Standards and Interfaces

短名Comput. Stand. Interfaces.
Journal Impact4.15
国际分区COMPUTER SCIENCE, SOFTWARE ENGINEERING(Q1)
期刊索引SCI Q1中科院 2 区
ISSN0920-5489, 1872-7018
h-index76
国内分区计算机科学(2区)计算机科学计算机硬件(2区)计算机科学计算机软件工程(2区)

The quality of software, well-defined interfaces (hardware and software), the process of digitalisation, and accepted standards in these fields are essential for building and exploiting complex computing, communication, multimedia and measuring systems. Standards can simplify the design and construction of individual hardware and software components and help to ensure satisfactory interworking. Computer Standards & Interfaces is an international journal dealing specifically with these topics. The journal • Provides information about activities and progress on the definition of computer standards, software quality, interfaces and methods, at national, European and international levels • Publishes critical comments on standards and standards activities • Disseminates user's experiences and case studies in the application and exploitation of established or emerging standards, interfaces and methods • Offers a forum for discussion on actual projects, standards, interfaces and methods by recognised experts • Stimulates relevant research by providing a specialised refereed medium.

期刊主页投稿网址
涉及主题计算机科学工程类操作系统程序设计语言数学物理量子力学计算机网络政治学法学生物计算机安全人工智能万维网经济电信
出版信息出版商: Elsevier B.V.出版周期: Bimonthly期刊类型: journal
基本数据创刊年份: 1986原创研究文献占比100.00%自引率:12.20%Gold OA占比: 11.98%
平均审稿周期 网友分享经验:较慢,6-12周
平均录用比例网友分享经验:容易

期刊引文格式

这些示例是对学术期刊文章的引用,以及它们应该如何出现在您的参考文献中。

并非所有期刊都按卷和期组织其已发表的文章,因此这些字段是可选的。有些电子期刊不提供页面范围,而是列出文章标识符。在这种情况下,使用文章标识符而不是页面范围是安全的。

只有1位作者的期刊

有2位作者的期刊

有3位作者的期刊

有5位以上作者的期刊

书籍引用格式

以下是创作和编辑的书籍的参考文献的示例。

学位论文引用格式

网页引用格式

这些示例是对网页的引用,以及它们应该如何出现在您的参考文献中。

专利引用格式

最新文章

Lattice-based strong designated verifier signature with non-delegatability

2025-3-1

A consent-aware electronic medical records sharing method based on blockchain

2025-3-1

Research on the construction and mapping model of knowledge organization system driven by standards

2025-3-1

Prototype, method, and experiment for evaluating usability of smart home user interfaces

2025-3-1

Specific feature selection in wearable EEG-based transducers for monitoring high cognitive load in neurosurgeons

2025-3-1

Interpreting the latent space of a Convolutional Variational Autoencoder for semi-automated eye blink artefact detection in EEG signals

2025-3-1

Framework of standards, guides and methodologies for project, program, portfolio, and PMO management

2025-3-1

Encrypted data inner product KNN secure query based on BALL-PB tree

2025-3-1

A theory on human factors in DevOps adoption

2025-3-1

Best of two worlds: Efficient, usable and auditable biometric ABC on the blockchain

2025-3-1

Authentication communication by using visualization cryptography for UAV networks

2025-3-1

Testability-Driven Development: An Improvement to the TDD Efficiency

2025-1-1

Pricing4APIs: A rigorous model for RESTful API pricings

2025-1-1

Fast bicriteria streaming algorithms for submodular cover problem under noise models

2025-1-1

Safeguarding the Internet of Things: Elevating IoT routing security through trust management excellence

2025-1-1

People 4.0 — A model for Human-in-the-Loop CPS-based systems

2025-1-1

TASIS: A typology of architectural strategies for interoperability in software-intensive systems

2025-1-1

AHA-BV: Access and handover authentication protocol with batch verification for satellite–terrestrial integrated networks

2025-1-1

An efficient ciphertext-policy weighted attribute-based encryption with collaborative access for cloud storage

2025-1-1

BLPCA-Ledger: A Lightweight Plenum Consensus Protocols for Consortium Blockchain Based on the Hyperledger Indy

2025-1-1

Detecting and mitigating security anomalies in Software-Defined Networking (SDN) using Gradient-Boosted Trees and Floodlight Controller characteristics

2025-1-1

A secure and lightweight data management scheme based on redactable blockchain for Digital Copyright

2025-1-1

Metric cake shop: A serious game for supporting education on ISO/IEC/IEEE 15939:2017 – Systems and software engineering – Measurement process in the context of an undergraduate software engineering course

2025-1-1

Improving efficiency and security of Camenisch–Lysyanskaya signatures for anonymous credential systems

2025-1-1

Advancing histopathology in Health 4.0: Enhanced cell nuclei detection using deep learning and analytic classifiers

2025-1-1

Editorial Board

2025-1-1

Delta GUI change detection using inferred models

2024-9-1

Evaluating and validating the Serious Slow Game Jam methodology as a mechanism for co-designing serious games to improve understanding of cybersecurity for different demographics

2024-9-1

Blockchain-based cross-domain query integrity verification mechanism for outsourced database

2024-9-1

Web Accessibility Barriers and their Cross-disability Impact in eSystems: A Scoping Review

2024-9-1

Authentication communication by using visualization cryptography for UAV networks

2024-8-18

Research on the construction and mapping model of knowledge organization system driven by standards

2024-8-3

Prototype, method, and experiment for evaluating usability of smart home user interfaces

2024-8-3

A cellular automata based secured reversible data hiding scheme for dual images using bit-reversal permutation technique

2024-8-1

Large Language Models for Code Completion: A Systematic Literature Review

2024-8-1

Spanish MEACorpus 2023: A multimodal speech-text corpus for emotion analysis in Spanish from natural environments

2024-8-1

Who are the best contributors? Designing a multimodal science communication interface based on the ECM, TAM and the Taguchi methods.

2024-8-1

Energy-efficient neural network training through runtime layer freezing, model quantization, and early stopping

2024-8-1

Uncharted Dimensions, Gaps, and Future Trends of Serious Games in Software Engineering

2024-8-1

Detection of DDoS attacks in SDN-based VANET using optimized TabNet

2024-8-1

TDBAMLA: Temporal and Dynamic Behavior Analysis in Android Malware using LSTM and Attention Mechanisms

2024-8-1

Elliptic code-based oblivious polynomial evaluation

2024-8-1

Privacy-preserving multi-party logistic regression in cloud computing

2024-8-1

GSParLib: A multi-level programming interface unifying OpenCL and CUDA for expressing stream and data parallelism

2024-8-1

Encrypted data inner product KNN secure query based on BALL-PB tree

2024-7-31

PSCBO: A provably secure consensus-based blockchain Oracle

2024-7-20

Practically secure linear-map vector commitment and its applications

2024-7-9

Privacy-preserving fair outsourcing polynomial computation without FHE and FPR

2024-7-1

Efficient multi-party PSI and its application in port management

2024-7-1

Revisiting “online/offline provable data possession” schemes

2024-7-1

帮你贴心管理全部的文献

研飞ivySCI,高效的论文管理

投稿经验分享

分享我的经验,帮你走得更远

Built withby Ivy Science
Copyright © 2020-2024
版权所有:南京青藤格致信息科技有限公司