| Issue | Title | |
| Volume 2, Issue 5, November 2013 | Prolonging sensor networks lifetime using convex clusters | Abstract PDF |
| Payam Salehi, Mohammad Ebrahim Shiri Ahmad Abadi | ||
| Volume 2, Issue 2, May 2013 | Proposed New Mechanism to Detect and Defend the Malicious Attackers in AODV | Abstract PDF |
| Vijay Kumar, Ashwani Kush | ||
| Volume 5, Issue 1, January 2016 | Provable Data Possession Scheme based on Homomorphic Hash Function in Cloud Storage | Abstract PDF |
| Li Yu, Junyao Ye | ||
| Volume 5, Issue 1, January 2016 | Providing a framework to improve the performance of business process management projects based on BPMN | Abstract PDF |
| Mojtaba Ahmadi, Alireza Nikravanshalmani | ||
| Volume 4, Issue 1, January 2015 | QoS Routing in Multicast Networks Based on Imperialism Competition Algorithm | Abstract PDF |
| Parisa Mollamohammada, Abolfazl Toroghi Haghighat | ||
| Volume 4, Issue 1, January 2015 | Ranking the technical dimensions of e-banking service quality evaluation models using Analytical Hierarchy Process | Abstract PDF |
| NoorMohammad Yaghubi, Seyed Morteza Seyedin | ||
| Volume 5, Issue 1, January 2016 | Ranking user’s comments by use of proposed weighting method | Abstract PDF |
| zahra hariri | ||
| Volume 2, Issue 5, November 2013 | Real-Time and Robust Method for Hand Gesture Recognition System Based on Cross-Correlation Coefficient | Abstract PDF |
| Reza Azad, Babak Azad, Iman tavakoli kazerooni | ||
| Volume 5, Issue 1, January 2016 | Real-Time Color Coded Object Detection Using a Modular Computer Vision Library | Abstract PDF |
| Antonio J. R. Neves, Alina Trifan, Bernardo Cunha, José Luís Azevedo | ||
| Volume 4, Issue 2, March 2015 | Recent Digital Watermarking Approaches, Protecting Multimedia Data Ownership | Abstract PDF |
| Siddarth Gupta, Vagesh Porwal | ||
| Volume 3, Issue 2, March 2014 | Reducing Energy Consumption in Mobile ad hoc Networks Using Energy-aware Routing Algorithm Based on Multiple Routes | Abstract PDF |
| Ali Broumandnia, Ehsan Sharifi, Milad Ghahari Bidgoli | ||
| Volume 4, Issue 5, September 2015 | Repeat Finding Techniques, Data Structures and Algorithms in DNA sequences: A Survey | Abstract PDF |
| Freeson Kaniwa, Heiko Schroeder, Otlhapile Dinakenyane | ||
| Volume 4, Issue 1, January 2015 | Representing an Effective Approach to Understand the Dynamic Frequent Pattern of Web Visitor | Abstract PDF |
| Farid Soleymani Sabzchi, Mehdi Afzali | ||
| Volume 5, Issue 2, March 2016 | Requirements Prioritization: Challenges and Techniques for Quality Software Development | Abstract PDF |
| Muhammad Abdullah Awais | ||
| Volume 4, Issue 6, November 2015 | Reverse Modeling and Autonomous Extrapolation of RF Threats | Abstract PDF |
| Sanguk Noh, So Ryoung Park | ||
| Volume 2, Issue 4, September 2013 | Reverse Query Tree approach to cope with Id distribution problem in Tree-based tag anti-collision protocols of RFID | Abstract PDF |
| Milad HajMirzaei | ||
| Volume 4, Issue 1, January 2015 | Robust flip-flop Redesign for Violation Minimization Considering Hot Carrier Injection (HCI) and Negative Bias Temperature Instability (NBTI) | Abstract PDF |
| Naeun Zang, Juho Kim | ||
| Volume 4, Issue 2, March 2015 | Robust method for Gaze Recognition Using Histogram Thresholding and Neural Network | Abstract PDF |
| Maliheh sadat sakhaie, Mahmoud mahlouji, Omid ghahari | ||
| Volume 3, Issue 5, September 2014 | Security and Privacy Flaws in a Recent Authentication Protocol for EPC C1 G2 RFID Tags | Abstract PDF |
| Seyed Mohammad Alavi, Karim Baghery, Behzad Abdolmaleki | ||
| Volume 2, Issue 3, July 2013 | Security Architecture for Advanced Metering Infrastructure | Abstract PDF |
| Seongho Ju, Moonsuk Choi, Chunghyo Kim, Yonghun Lim | ||
| Volume 4, Issue 3, May 2015 | Security, Privacy Awareness vs. Utilization of Social Networks and Mobile Apps for Learning: Students` Preparedness | Abstract PDF |
| Daniel Koloseni | ||
| Volume 2, Issue 2, May 2013 | Security-Aware Dispatching of Virtual Machines in Cloud Environment | Abstract PDF |
| Mohammad Amin Keshtkar, Seyed Mohammad Ghoreyshi, Saman Zad Tootaghaj | ||
| Volume 4, Issue 6, November 2015 | Select the most relevant input parameters using WEKA for models forecast Solar radiation based on Artificial Neural Networks | Abstract PDF |
| Somaieh Ayalvary, Zohreh Jahani, Morteza Babazadeh | ||
| Volume 1, Issue 1, September 2012 | Semantic Enterprise Optimizer and Coexistence of Data Models | Abstract PDF |
| P. A. Sundararajan, Anupama Nithyanand, S.V. Subrahmanya | ||
| Volume 2, Issue 1, January 2013 | Service Registry: A Key Piece for Enhancing Reuse in SOA | Abstract PDF |
| Juan Pablo García-González1, Verónica Gacitúa-Décar2, Dr. Claus Pahl3 | ||
| 276 - 300 of 346 Items | << < 7 8 9 10 11 12 13 14 > >> | |
|
Advances in Computer Science : an International Journal






