Next Article in Journal
Constrained Object Hierarchies as a Unified Theoretical Model for Intelligence and Intelligent Systems
Previous Article in Journal
Real-Time Passenger Flow Analysis in Tram Stations Using YOLO-Based Computer Vision and Edge AI on Jetson Nano
Previous Article in Special Issue
Efficient Image-Based Memory Forensics for Fileless Malware Detection Using Texture Descriptors and LIME-Guided Deep Learning
 
 
Article

Article Versions Notes

Computers 2025, 14(11), 477; https://doi.org/10.3390/computers14110477
Action Date Notes Link
article xml file uploaded 3 November 2025 09:35 CET Original file -
article xml uploaded. 3 November 2025 09:35 CET Update -
article pdf uploaded. 3 November 2025 09:35 CET Version of Record -
article html file updated 3 November 2025 09:37 CET Original file -
article xml file uploaded 3 November 2025 09:51 CET Update -
article xml uploaded. 3 November 2025 09:51 CET Update https://www.mdpi.com/2073-431X/14/11/477/xml
article pdf uploaded. 3 November 2025 09:51 CET Updated version of record https://www.mdpi.com/2073-431X/14/11/477/pdf
article html file updated 3 November 2025 09:54 CET Update https://www.mdpi.com/2073-431X/14/11/477/html
Back to TopTop