| Issue | Title | |
| Volume 3, Issue 1, January 2014 | Analysis of Computing Open Source Systems | Abstract PDF |
| J.C. Silva, J.L. Silva | ||
| Volume 3, Issue 6, November 2014 | Analysis of Inter cluster movement based on geometric probability and regression | Abstract PDF |
| Rajee.A.M , Sagayaraj Francis.F | ||
| Volume 4, Issue 1, January 2015 | Analysis of Key Management Schemes in Dynamic Wireless Sensor Networks | Abstract PDF |
| Seyed Hossein Erfani, Hamid H. S. Javadi, Amir Masoud Rahmani | ||
| Volume 4, Issue 6, November 2015 | Analysis of the "Heroes of the Storm" | Abstract PDF |
| Shuo Xiong, He Zahi, Long Zuo, Mingyang Wu, Hiroyuki Iida | ||
| Volume 3, Issue 4, July 2014 | Anomaly Detection Mechanism based on Common NSM Data Objects for Advanced Metering Infrastructure | Abstract PDF |
| Seongho Ju, Yonghun Lim, Chunghyo Kim, Kyungseok Jeon | ||
| Volume 1, Issue 1, September 2012 | Application of Bees Algorithm in Multi-Join Query Optimization | Abstract PDF |
| Mohammad Alamery, Ahmad Faraahi, H. Haj Seyyed Javadi, Sadegh Nourossana, Hossein Erfani | ||
| Volume 2, Issue 5, November 2013 | Application of Pre-evolution Genetic Algorithm in Fast Path Planning for UCAV | Abstract PDF |
| Lu Cao, An Zhang | ||
| Volume 3, Issue 4, July 2014 | Applications of Artificial Life and Digital Organisms in the Study of Genetic Evolution | Abstract PDF |
| Maurice HT Ling | ||
| Volume 4, Issue 5, September 2015 | APPLIED CRYPTOGRAPHY IN PASSWORD ENCRYPTION USING NEURAL NETWORKS | Abstract PDF |
| Venkata Karthik Gullapalli, Ishan Khanka, Rishi Verma | ||
| Volume 2, Issue 2, May 2013 | Applying a natural intelligence pattern in cognitive robots | Abstract PDF |
| Seyedeh Negar Jafari, Jafar Jafari Amirbandi, Amir Masoud Rahmani | ||
| Volume 3, Issue 2, March 2014 | Applying Web Usage Mining Techniques to Design Effective Web Recommendation Systems: A Case Study | Abstract PDF |
| Maryam Jafari, Farzad Soleymani Sabzchi, Amir Jalili Irani | ||
| Volume 4, Issue 5, September 2015 | Applying Website Usability Testing Techniques to Promote E-services | Abstract PDF |
| Abdel Nasser H. Zaied, Mohamed M. Hassan, Islam S. Mohamed | ||
| Volume 4, Issue 1, January 2015 | Approach to Semiotic Theory of Computer Visualization | Abstract PDF |
| Vladimir L. Averbukh | ||
| Volume 4, Issue 5, September 2015 | Approaches and methodologies for mobile software engineering | Abstract PDF |
| Serena Pastore | ||
| Volume 4, Issue 5, September 2015 | Archetypes and Standards for Medical Information Interchange | Abstract PDF |
| Dimitar Tcharaktchiev, Vesselin E. Gueorguiev, Ivan Evg. Ivanov | ||
| Volume 4, Issue 4, July 2015 | Automatic Classification for Vietnamese News | Abstract PDF |
| Phan Thi Ha, Nguyen Quynh Chi | ||
| Volume 4, Issue 6, November 2015 | Automatic gamma correction based on average of brightness | Abstract PDF |
| Pedram Babakhani, Parham Zarei | ||
| Volume 2, Issue 5, November 2013 | Automatic identification of corrosive factors categories according to the environmental factors | Abstract PDF |
| Qing Xu, Dongmei Fu | ||
| Volume 4, Issue 2, March 2015 | Bag-of-Visual-Words, its Detectors and Descriptors; A Survey in Detail | Abstract PDF |
| Mehdi Faraji, Jamshid Shanbehzadeh | ||
| Volume 3, Issue 1, January 2014 | Benefits, Weaknesses, Opportunities and Risks of SaaS adoption from Iranian organizations perspective | Abstract PDF |
| Tahereh Rostami, Mohammad Kazem Akbari, Morteza Sargolzai Javan | ||
| Volume 3, Issue 1, January 2014 | Beyond one shot recommendations: The seamless interplay of environmental parameters and Quality of recommendations for the best fit list | Abstract PDF |
| Minakshi Gujral, Satish Chandra | ||
| Volume 5, Issue 4, July 2016 | Biometric Authentication in Financial Institutions: The intention of Banks to Adopt Biometric Powered ATM | Abstract PDF |
| Herman Mandari, Daniel Koloseni | ||
| Volume 2, Issue 4, September 2013 | Blended Learning Resources in Constrained Bandwidth Environment: Considerations for Network and Multimedia Optimization | Abstract PDF |
| Nazir Ahmad Suhail, Jude Lubega, Gilbert Maiga | ||
| Volume 3, Issue 3, May 2014 | BoB: Best of Both in Compiler Construction Bottom-up Parsing with Top-down Semantic Evaluation | Abstract PDF |
| Wolfgang Dichler, Heinz Dobler | ||
| Volume 3, Issue 2, March 2014 | Botnet Detection using NetFlow and Clustering | Abstract PDF |
| Pedram Amini, Reza Azmi, MuhammadAmin Araghizadeh | ||
| 76 - 100 of 346 Items | << < 1 2 3 4 5 6 7 8 9 10 > >> | |
|
Advances in Computer Science : an International Journal






