Search Paper
  • Home
  • Login
  • Categories
  • Archive
  • Post URL
  • Academic Resources
  • Contact Us

 

Research Sharing System - Share URL

  • Title
  • Author
  • Category
  • Volume, Issue, Month, Year
  • ANALYTICAL AND NUMERICAL MODELING OF VTH AND S FOR NEW CG MOSFET STRUCTURE
  • H. Jaafar
  • Computer Science & Information Technology
  • vol 6, No.3/4/5/6, November, 2016

  • DESIGN AND OPTIMIZATION A CIRCULAR SHAPE NETWORK ANTENNA MICRO STRIP FOR SOME APPLICATION
  • Louati Siwar
  • Computer Science & Information Technology
  • Vol 9, no(1), February, 2017

  • PPO-AN APPROACH TO PERSONALIZED WEB ACCELERATION
  • Shailesh K S
  • Computer Science & Information Technology
  • Vol 9, no(1), February, 2017

  • AN APPROXIMATE POSSIBILISTIC GRAPHICAL MODEL FOR COMPUTING OPTIMISTIC QUALITATIVE DECISION
  • BOUTOUHAMI Khaoula
  • Computer Science & Information Technology
  • Volume 5, Num 2, January, 2015

  • DEVELOPING A FRAMEWORK FOR PREDICTION OF HUMAN PERFORMANCE CAPABILITY USING ENSEMBLE TECHNIQUES
  • Gaurav Singh Thakur
  • Computer Science & Information Technology
  • Volume 5, Num 2, January, 2015

  • AN EVALUATION STUDY OF GENERAL SOFTWARE PROJECT RISK BASED ON SOFTWARE PRACTITIONERS EXPERIENCES
  • Sahand Vahidnia
  • Computer Science & Information Technology
  • Vol 8, No 6, December, 2016

  • COMPARING PROGRAMMER PRODUCTIVITY IN OPENACC AND CUDA: AN EMPIRICAL INVESTIGATION
  • Xuechao Li
  • Computer Science & Information Technology
  • Vol 6, No 5, October, 2016

  • A NEW HYBRID METRIC FOR VERIFYING PARALLEL CORPORA OF ARABIC-ENGLISH
  • Saad Alkahtani
  • Computer Science & Information Technology
  • Volume 5, Num 2, January, 2015

  • ENTERPRISE DATA PROTECTION: MEETING REQUIREMENTS WITH EFFICIENT AND COSTEFFECTIVE METHODS
  • Khaled Aldossari
  • Computer Science & Information Technology
  • Volume 5, Num 2, January, 2015

  • AN EMPIRICAL EVALUATION OF CRYPTOOL IN TEACHING COMPUTER SECURITY
  • Mabroka Maeref
  • Computer Science & Information Technology
  • Volume 5, Num 2, January, 2015

  • QUALITY OF SERVICE STABILITY BASED MULTICAST ROUTING PROTOCOL FOR MANETS
  • M.Vijayalakshmi
  • Computer Science & Information Technology
  • vol 7, no 1, February, 2017

  • PERFORMANCE ENHANCEMENT WITH SPECULATIVE-TRACE CAPPING AT DIFFERENT PIPELINE STAGES IN SIMULTANEOUS MULTI-THREADING PROCESSORS
  • Wenjun Wang
  • Computer Science & Information Technology
  • vol 3, no 4, November, 2016

  • MULTIPLE USER INTERFACES AND CROSSPLATFORM USER EXPERIENCE: THEORETICAL FOUNDATIONS
  • Khalid Majrashi
  • Computer Science & Information Technology
  • Volume 5, Num 2, January, 2015

  • RESEARCH ON DECISION MAKING REGARDING IN DATING EVENTS FOR UNMARRIED FEMALE JUNIOR HIGH SCHOOL TEACHERS
  • Han-Chen Huang
  • Computer Science & Information Technology
  • Vol 9, no(1), February, 2017

  • A FRAMEWORK FOR PLAGIARISM DETECTION IN ARABIC DOCUMENTS
  • Imtiaz Hussain Khan
  • Computer Science & Information Technology
  • Volume 5, Num 2, January, 2015

  • ASSOCIATING EVENTS WITH PEOPLE ON SOCIAL NETWORKS USING A-PRIORI
  • Srijan Khare
  • Computer Science & Information Technology
  • Volume 5, Num 3, February, 2015

  • UNIVERSITY BUSES ROUTING AND TRACKING SYSTEM
  • Wafaa Al-Mutiri
  • Computer Science & Information Technology
  • Vol 9, No 1, February, 2017

1  2  3  4  5  6  7  8  9  10  11  12  13  14  15  16  17  18  19  20  21  22  23  24  25  26  27  28  29  30  31  32  33  34  35  36  37  38  39  40  41  42  43  44  45  46  47  48  49  50  51  52  53  54  55  56  57  58  59  60  61  62  63  64  65  66  67  68  69  70  71  72  73  74  75  76  77  78  79  80  81  82  83  84  85  86  87  88  89  90  91  92  93  94  95  96  97  98  99  100  101  102  103  104  105  106  107  108  109  110  111  112  113  114  115  116  117  118  119 

 

About Us | Post Cfp | Share URL Main | Share URL category | Post URL
All Rights Reserved @ Call for Papers - Conference & Journals