Computer Standards and Interfaces
短名 | Comput. Stand. Interfaces. |
Journal Impact | 4.15 |
国际分区 | COMPUTER SCIENCE, SOFTWARE ENGINEERING(Q1) |
期刊索引 | SCI Q1中科院 2 区 |
ISSN | 0920-5489, 1872-7018 |
h-index | 76 |
国内分区 | 计算机科学(2区)计算机科学计算机硬件(2区)计算机科学计算机软件工程(2区) |
The quality of software, well-defined interfaces (hardware and software), the process of digitalisation, and accepted standards in these fields are essential for building and exploiting complex computing, communication, multimedia and measuring systems. Standards can simplify the design and construction of individual hardware and software components and help to ensure satisfactory interworking. Computer Standards & Interfaces is an international journal dealing specifically with these topics. The journal • Provides information about activities and progress on the definition of computer standards, software quality, interfaces and methods, at national, European and international levels • Publishes critical comments on standards and standards activities • Disseminates user's experiences and case studies in the application and exploitation of established or emerging standards, interfaces and methods • Offers a forum for discussion on actual projects, standards, interfaces and methods by recognised experts • Stimulates relevant research by providing a specialised refereed medium.
期刊主页投稿网址涉及主题 | 计算机科学工程类操作系统程序设计语言数学物理量子力学计算机网络政治学法学生物计算机安全人工智能万维网经济电信 |
出版信息 | 出版商: Elsevier B.V.,出版周期: Bimonthly,期刊类型: journal |
基本数据 | 创刊年份: 1986,原创研究文献占比: 100.00%,自引率:12.20%, Gold OA占比: 11.98% |
平均审稿周期 | 网友分享经验:较慢,6-12周 |
平均录用比例 | 网友分享经验:容易 |
期刊引文格式
这些示例是对学术期刊文章的引用,以及它们应该如何出现在您的参考文献中。
并非所有期刊都按卷和期组织其已发表的文章,因此这些字段是可选的。有些电子期刊不提供页面范围,而是列出文章标识符。在这种情况下,使用文章标识符而不是页面范围是安全的。
只有1位作者的期刊
有2位作者的期刊
有3位作者的期刊
有5位以上作者的期刊
书籍引用格式
以下是创作和编辑的书籍的参考文献的示例。
学位论文引用格式
网页引用格式
这些示例是对网页的引用,以及它们应该如何出现在您的参考文献中。
专利引用格式
最新文章
Lattice-based strong designated verifier signature with non-delegatability
2025-3-1
A consent-aware electronic medical records sharing method based on blockchain
2025-3-1
Research on the construction and mapping model of knowledge organization system driven by standards
2025-3-1
Prototype, method, and experiment for evaluating usability of smart home user interfaces
2025-3-1
Specific feature selection in wearable EEG-based transducers for monitoring high cognitive load in neurosurgeons
2025-3-1
Interpreting the latent space of a Convolutional Variational Autoencoder for semi-automated eye blink artefact detection in EEG signals
2025-3-1
Framework of standards, guides and methodologies for project, program, portfolio, and PMO management
2025-3-1
Encrypted data inner product KNN secure query based on BALL-PB tree
2025-3-1
A theory on human factors in DevOps adoption
2025-3-1
Best of two worlds: Efficient, usable and auditable biometric ABC on the blockchain
2025-3-1
Authentication communication by using visualization cryptography for UAV networks
2025-3-1
Testability-Driven Development: An Improvement to the TDD Efficiency
2025-1-1
Pricing4APIs: A rigorous model for RESTful API pricings
2025-1-1
Fast bicriteria streaming algorithms for submodular cover problem under noise models
2025-1-1
Safeguarding the Internet of Things: Elevating IoT routing security through trust management excellence
2025-1-1
People 4.0 — A model for Human-in-the-Loop CPS-based systems
2025-1-1
TASIS: A typology of architectural strategies for interoperability in software-intensive systems
2025-1-1
AHA-BV: Access and handover authentication protocol with batch verification for satellite–terrestrial integrated networks
2025-1-1
An efficient ciphertext-policy weighted attribute-based encryption with collaborative access for cloud storage
2025-1-1
BLPCA-Ledger: A Lightweight Plenum Consensus Protocols for Consortium Blockchain Based on the Hyperledger Indy
2025-1-1
Detecting and mitigating security anomalies in Software-Defined Networking (SDN) using Gradient-Boosted Trees and Floodlight Controller characteristics
2025-1-1
A secure and lightweight data management scheme based on redactable blockchain for Digital Copyright
2025-1-1
Metric cake shop: A serious game for supporting education on ISO/IEC/IEEE 15939:2017 – Systems and software engineering – Measurement process in the context of an undergraduate software engineering course
2025-1-1
Improving efficiency and security of Camenisch–Lysyanskaya signatures for anonymous credential systems
2025-1-1
Advancing histopathology in Health 4.0: Enhanced cell nuclei detection using deep learning and analytic classifiers
2025-1-1
Editorial Board
2025-1-1
Delta GUI change detection using inferred models
2024-9-1
Evaluating and validating the Serious Slow Game Jam methodology as a mechanism for co-designing serious games to improve understanding of cybersecurity for different demographics
2024-9-1
Blockchain-based cross-domain query integrity verification mechanism for outsourced database
2024-9-1
Web Accessibility Barriers and their Cross-disability Impact in eSystems: A Scoping Review
2024-9-1
Authentication communication by using visualization cryptography for UAV networks
2024-8-18
Research on the construction and mapping model of knowledge organization system driven by standards
2024-8-3
Prototype, method, and experiment for evaluating usability of smart home user interfaces
2024-8-3
A cellular automata based secured reversible data hiding scheme for dual images using bit-reversal permutation technique
2024-8-1
Large Language Models for Code Completion: A Systematic Literature Review
2024-8-1
Spanish MEACorpus 2023: A multimodal speech-text corpus for emotion analysis in Spanish from natural environments
2024-8-1
Who are the best contributors? Designing a multimodal science communication interface based on the ECM, TAM and the Taguchi methods.
2024-8-1
Energy-efficient neural network training through runtime layer freezing, model quantization, and early stopping
2024-8-1
Uncharted Dimensions, Gaps, and Future Trends of Serious Games in Software Engineering
2024-8-1
Detection of DDoS attacks in SDN-based VANET using optimized TabNet
2024-8-1
TDBAMLA: Temporal and Dynamic Behavior Analysis in Android Malware using LSTM and Attention Mechanisms
2024-8-1
Elliptic code-based oblivious polynomial evaluation
2024-8-1
Privacy-preserving multi-party logistic regression in cloud computing
2024-8-1
GSParLib: A multi-level programming interface unifying OpenCL and CUDA for expressing stream and data parallelism
2024-8-1
Encrypted data inner product KNN secure query based on BALL-PB tree
2024-7-31
PSCBO: A provably secure consensus-based blockchain Oracle
2024-7-20
Practically secure linear-map vector commitment and its applications
2024-7-9
Privacy-preserving fair outsourcing polynomial computation without FHE and FPR
2024-7-1
Efficient multi-party PSI and its application in port management
2024-7-1
Revisiting “online/offline provable data possession” schemes
2024-7-1
帮你贴心管理全部的文献
研飞ivySCI,高效的论文管理
投稿经验分享
分享我的经验,帮你走得更远