Search Paper
Home
Login
Categories
Archive
Post URL
Academic Resources
Contact Us
Research Sharing System - Share URL
Title
Author
Category
Volume, Issue, Month, Year
SOTM : A Self Organized Trust Management System for VANET
Amel Ltifi , Ahmed Zouinkhi and Mohamed Salim Bouhlel
Computer Science & Information Technology
5, 16, December, 2015
COMPARING PROGRAMMER PRODUCTIVITY IN OPENACC AND CUDA: AN EMPIRICAL INVESTIGATION
Xuechao Li , Po-Chou Shih , Jeffrey Overbey , Cheryl Seals , Alvin Lim
Computer Science & Information Technology
Vol 6, No 5/6, October, 2016
Table-Based Identification Protocol of Compuatational RFID Tags
Yunmin Kim, Ji Hyoung Ahn and Tae-Jin Lee
Computer Science & Information Technology
5, 16, December, 2015
A Method of Target Tracking and Prediction Based on Geomagnetic Sensor Technology
Xinmin Tang, Shangfeng Gao and Songchen Han, Zhiyuan Shen, Liping Di and Binbin Liang
Computer Science & Information Technology
5, 16, December, 2015
REGULARIZED COMPRESSION OF A NOISY BLURRED IMAGE
Paola Favati, Grazia Lotti
Computer Science & Information Technology
Vol 6, No 5/6, December, 2016
Spectrum Sensing in Cognitive Radio Networks : QoS Considerations
Nabil Giweli, Seyed Shahrestani and Hon Cheung
Computer Science & Information Technology
vol 5, No16, December, 2015
Implementation of Joint Network Channel Decoding Algorithm for Multiple Access Relay Channel Based on Convolutional Codes
Youssef Zid, Sonia Zaibi Ammar and Ridha Bouallègue
Computer Science & Information Technology
5, 16, December, 2015
JPL : Implementation of a Prolog System Supporting Incremental Tabulation
Taher Ali , Ziad Najem and Mohd Sapiyan
Computer Science & Information Technology
6, 1, February, 2016
A New Algorithm for Construction of a P2P Multicast Hybrid Overlay Tree Based on Topological Distances
Sergej Alekseev and Jörg Schäfer
Computer Science & Information Technology
6, 1, January, 2016
State Space Generation Framework Based on Binary Decision Diagram for Distributed Explicit Model Checking
Nacer Tabib , Jean Michel Ilie , and Djamel Eddine Saidouni
Computer Science & Information Technology
6, 1, February, 2016
Application of Biclustering Technique in Machine Monitoring
Marcin Michalak
Computer Science & Information Technology
6, 1, January, 2016
A TAXONOMY FOR TOOLS, PROCESSES AND LANGUAGES IN AUTOMOTIVE SOFTWARE ENGINEERING
Florian Bock,Daniel Homm, Sebastian Siegl
Computer Science & Information Technology
6, 1, January, 2016
ADVANCED CLOUD PRIVACY THREAT MODELING
Ali Gholami and Erwin Laure
Computer Science & Information Technology
6, 1, January, 2016
THE PERCEPTIONS OF AGILE METHODOLOGY IN SOUTH AFRICA
Thierry Mbah Mbelli and Jainesh Jaintylal Hira
Computer Science & Information Technology
6, 1, January, 2016
NEAR-REAL-TIME PARALLEL ETL+Q FOR AUTOMATIC SCALABILITY IN BIGDATA
Pedro Martins, Maryam Abbasi, Pedro Furtado
Computer Science & Information Technology
6, 1, January, 2016
RESILIENT INTERFACE DESIGN FOR SAFETY-CRITICAL EMBEDDED AUTOMOTIVE SOFTWARE
Harald Sporer, Georg Macher, Christian Kreiner and Eugen Brenner
Computer Science & Information Technology
6, 1, February, 2016
COMBINED CLASSIFIERS FOR TIME SERIES SHAPELETS
Ivan S. Mitzev, Nickolas H. Younan
Computer Science & Information Technology
6, 1, January, 2016
1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33
34
35
36
37
38
39
40
41
42
43
44
45
46
47
48
49
50
51
52
53
54
55
56
57
58
59
60
61
62
63
64
65
66
67
68
69
70
71
72
73
74
75
76
77
78
79
80
81
82
83
84
85
86
87
88
89
90
91
92
93
94
95
96
97
98
99
100
101
102
103
104
105
106
107
108
109
110
111
112
113
114
115
116
117
118
119