Next Article in Journal
Vehicle Auto-Classification Using Machine Learning Algorithms Based on Seismic Fingerprinting
Next Article in Special Issue
Enhancing JWT Authentication and Authorization in Web Applications Based on User Behavior History
Previous Article in Journal
ILP-Based and Heuristic Scheduling Techniques for Variable-Cycle Approximate Functional Units in High-Level Synthesis
Previous Article in Special Issue
The Use of Reactive Programming in the Proposed Model for Cloud Security Controlled by ITSS
 
 
Article

Article Versions Notes

Computers 2022, 11(10), 147; https://doi.org/10.3390/computers11100147
Action Date Notes Link
article xml file uploaded 27 September 2022 13:54 CEST Original file -
article xml uploaded. 27 September 2022 13:54 CEST Update -
article pdf uploaded. 27 September 2022 13:54 CEST Version of Record https://www.mdpi.com/2073-431X/11/10/147/pdf-vor
article html file updated 27 September 2022 13:56 CEST Original file -
Correction published 23 November 2022 00:00 CET Correction https://www.mdpi.com/2073-431X/11/12/168
article pdf uploaded. 23 November 2022 13:03 CET Updated version of record https://www.mdpi.com/2073-431X/11/10/147/pdf
article xml uploaded. 23 November 2022 13:03 CET Update -
article xml uploaded. 23 November 2022 13:03 CET Update https://www.mdpi.com/2073-431X/11/10/147/xml
article html file updated 23 November 2022 13:04 CET Update https://www.mdpi.com/2073-431X/11/10/147/html
Back to TopTop