|
Issue |
Title |
|
Volume 3, Issue 1, January 2014 |
Analysis of Computing Open Source Systems |
Abstract
PDF
|
J.C. Silva, J.L. Silva |
|
Volume 3, Issue 6, November 2014 |
Analysis of Inter cluster movement based on geometric probability and regression |
Abstract
PDF
|
Rajee.A.M , Sagayaraj Francis.F |
|
Volume 4, Issue 1, January 2015 |
Analysis of Key Management Schemes in Dynamic Wireless Sensor Networks |
Abstract
PDF
|
Seyed Hossein Erfani, Hamid H. S. Javadi, Amir Masoud Rahmani |
|
Volume 4, Issue 6, November 2015 |
Analysis of the "Heroes of the Storm" |
Abstract
PDF
|
Shuo Xiong, He Zahi, Long Zuo, Mingyang Wu, Hiroyuki Iida |
|
Volume 3, Issue 4, July 2014 |
Anomaly Detection Mechanism based on Common NSM Data Objects for Advanced Metering Infrastructure |
Abstract
PDF
|
Seongho Ju, Yonghun Lim, Chunghyo Kim, Kyungseok Jeon |
|
Volume 1, Issue 1, September 2012 |
Application of Bees Algorithm in Multi-Join Query Optimization |
Abstract
PDF
|
Mohammad Alamery, Ahmad Faraahi, H. Haj Seyyed Javadi, Sadegh Nourossana, Hossein Erfani |
|
Volume 2, Issue 5, November 2013 |
Application of Pre-evolution Genetic Algorithm in Fast Path Planning for UCAV |
Abstract
PDF
|
Lu Cao, An Zhang |
|
Volume 3, Issue 4, July 2014 |
Applications of Artificial Life and Digital Organisms in the Study of Genetic Evolution |
Abstract
PDF
|
Maurice HT Ling |
|
Volume 4, Issue 5, September 2015 |
APPLIED CRYPTOGRAPHY IN PASSWORD ENCRYPTION USING NEURAL NETWORKS |
Abstract
PDF
|
Venkata Karthik Gullapalli, Ishan Khanka, Rishi Verma |
|
Volume 2, Issue 2, May 2013 |
Applying a natural intelligence pattern in cognitive robots |
Abstract
PDF
|
Seyedeh Negar Jafari, Jafar Jafari Amirbandi, Amir Masoud Rahmani |
|
Volume 3, Issue 2, March 2014 |
Applying Web Usage Mining Techniques to Design Effective Web Recommendation Systems: A Case Study |
Abstract
PDF
|
Maryam Jafari, Farzad Soleymani Sabzchi, Amir Jalili Irani |
|
Volume 4, Issue 5, September 2015 |
Applying Website Usability Testing Techniques to Promote E-services |
Abstract
PDF
|
Abdel Nasser H. Zaied, Mohamed M. Hassan, Islam S. Mohamed |
|
Volume 4, Issue 1, January 2015 |
Approach to Semiotic Theory of Computer Visualization |
Abstract
PDF
|
Vladimir L. Averbukh |
|
Volume 4, Issue 5, September 2015 |
Approaches and methodologies for mobile software engineering |
Abstract
PDF
|
Serena Pastore |
|
Volume 4, Issue 5, September 2015 |
Archetypes and Standards for Medical Information Interchange |
Abstract
PDF
|
Dimitar Tcharaktchiev, Vesselin E. Gueorguiev, Ivan Evg. Ivanov |
|
Volume 4, Issue 4, July 2015 |
Automatic Classification for Vietnamese News |
Abstract
PDF
|
Phan Thi Ha, Nguyen Quynh Chi |
|
Volume 4, Issue 6, November 2015 |
Automatic gamma correction based on average of brightness |
Abstract
PDF
|
Pedram Babakhani, Parham Zarei |
|
Volume 2, Issue 5, November 2013 |
Automatic identification of corrosive factors categories according to the environmental factors |
Abstract
PDF
|
Qing Xu, Dongmei Fu |
|
Volume 4, Issue 2, March 2015 |
Bag-of-Visual-Words, its Detectors and Descriptors; A Survey in Detail |
Abstract
PDF
|
Mehdi Faraji, Jamshid Shanbehzadeh |
|
Volume 3, Issue 1, January 2014 |
Benefits, Weaknesses, Opportunities and Risks of SaaS adoption from Iranian organizations perspective |
Abstract
PDF
|
Tahereh Rostami, Mohammad Kazem Akbari, Morteza Sargolzai Javan |
|
Volume 3, Issue 1, January 2014 |
Beyond one shot recommendations: The seamless interplay of environmental parameters and Quality of recommendations for the best fit list |
Abstract
PDF
|
Minakshi Gujral, Satish Chandra |
|
Volume 5, Issue 4, July 2016 |
Biometric Authentication in Financial Institutions: The intention of Banks to Adopt Biometric Powered ATM |
Abstract
PDF
|
Herman Mandari, Daniel Koloseni |
|
Volume 2, Issue 4, September 2013 |
Blended Learning Resources in Constrained Bandwidth Environment: Considerations for Network and Multimedia Optimization |
Abstract
PDF
|
Nazir Ahmad Suhail, Jude Lubega, Gilbert Maiga |
|
Volume 3, Issue 3, May 2014 |
BoB: Best of Both in Compiler Construction Bottom-up Parsing with Top-down Semantic Evaluation |
Abstract
PDF
|
Wolfgang Dichler, Heinz Dobler |
|
Volume 3, Issue 2, March 2014 |
Botnet Detection using NetFlow and Clustering |
Abstract
PDF
|
Pedram Amini, Reza Azmi, MuhammadAmin Araghizadeh |
|
76 - 100 of 346 Items |
<< < 1 2 3 4 5 6 7 8 9 10 > >> |