Next Article in Journal
DeepStego: Privacy-Preserving Natural Language Steganography Using Large Language Models and Advanced Neural Architectures
Next Article in Special Issue
Evaluating the Predictive Power of Software Metrics for Fault Localization
Previous Article in Journal
A Study of COVID-19 Diagnosis Applying Artificial Intelligence to X-Rays Images
Previous Article in Special Issue
The Ontology-Based Mapping of Microservice Identification Approaches: A Systematic Study of Migration Strategies from Monolithic to Microservice Architectures
 
 
Article

Article Versions Notes

Computers 2025, 14(5), 164; https://doi.org/10.3390/computers14050164
Action Date Notes Link
article pdf uploaded. 28 April 2025 16:52 CEST Version of Record https://www.mdpi.com/2073-431X/14/5/164/pdf-vor
article xml file uploaded 29 April 2025 09:45 CEST Original file -
article xml uploaded. 29 April 2025 09:45 CEST Update -
article pdf uploaded. 29 April 2025 09:45 CEST Updated version of record https://www.mdpi.com/2073-431X/14/5/164/pdf-vor
article html file updated 29 April 2025 09:47 CEST Original file -
article html file updated 25 June 2025 02:16 CEST Update -
article pdf uploaded. 1 July 2025 05:10 CEST Minor correction https://www.mdpi.com/2073-431X/14/5/164/pdf
article xml uploaded. 1 July 2025 05:10 CEST Minor correction https://www.mdpi.com/2073-431X/14/5/164/xml
article html file updated 1 July 2025 05:13 CEST Update https://www.mdpi.com/2073-431X/14/5/164/html
Back to TopTop