Search Paper
Home
Login
Categories
Archive
Post URL
Academic Resources
Contact Us
Research Sharing System - Share URL
Title
Author
Category
Volume, Issue, Month, Year
3D VISION-BASED DIETARY INSPECTION FOR THE CENTRAL KITCHEN AUTOMATION
Yue-Min Jiang
Computer Science & Information Technology
Vol 4, Num 12, December, 2014
EVENT DETECTION IN TWITTER USING TEXT AND IMAGE FUSION
Samar Alqhtani
Computer Science & Information Technology
Vol 4, Num 12, December, 2014
EFFECT OF GRID-ADAPTIVE INTERPOLATION OVER DEPTH IMAGES
Arbaaz Singh
Computer Science & Information Technology
Vol 4, Num 12, December, 2014
OUTSOURCED KP-ABE WITH CHOSENCIPHERTEXT SECURITY
Jinmiao Wang
Computer Science & Information Technology
Vol 4, Num 12, December, 2014
HOW TO DETECT MIDDLEBOXES: GUIDELINES ON A METHODOLOGY
Vahab Pournaghshband
Computer Science & Information Technology
Vol 4, Num 12, December, 2014
SECURITY ANALYSIS ON PASSWORD AUTHENTICATION SYSTEM OF WEB PORTAL
Heekyeong Noh
Computer Science & Information Technology
Vol 4, Num 12, December, 2014
SEPS-AKA: A SECURE EVOLVED PACKET SYSTEM AUTHENTICATION AND KEY AGREEMENT SCHEME FOR LTE-A NETWORKS
Zaher Jabr Haddad
Computer Science & Information Technology
Vol 4, Num 12, December, 2014
THE PROPOSAL OF GIVING TWO RECEIPTS FOR VOTERS TO INCREASE THE SECURITY OF ELECTRONIC VOTING
Abbas Akkasi
Computer Science & Information Technology
Vol 4, Num 12, December, 2014
DT-BAR: A DYNAMIC ANT RECOMMENDER TO BALANCE THE OVERALL PREDICTION ACCURACY FOR ALL USERS
Abdelghani Bellaachia
Computer Science & Information Technology
Vol 4, Num 13, December, 2014
ISSUES, CHALLENGES, AND SOLUTIONS: BIG DATA MINING
Julie M. David
Computer Science & Information Technology
Vol 4, Num 13, December, 2014
VIDEOCONFERENCING WEB APPLICATION FOR CARDIOLOGY DOMAIN USING FLEX/J2EE TECHNOLOGIES
Imen Debbabi
Computer Science & Information Technology
Vol 4, Num 13, December, 2014
PERFORMANCE ENHANCEMENT WITH SPECULATIVE-TRACE CAPPING AT DIFFERENT PIPELINE STAGES IN SIMULTANEOUS MULTI-THREADING PROCESSORS
Wenjun Wang
Computer Science & Information Technology
vol 3, no 4, November, 2016
SELECTIVE IMAGE ENCRYPTION USING DCT WITH AES CIPHER
Belazi Akram
Computer Science & Information Technology
Vol 4, Num 13, December, 2014
Effect of Different Defuzzification methods in a Fuzzy Based Liquid Flow control in Semiconductor Based Anemometer
Pijush Dutta
Computer Science & Information Technology
vol 7, no 1, January, 2017
FUZZY LOGIC BASED APPROACH FOR AUTOMATION OF EMOTION DETECTION IN MISOPHONIA
Nilima Salankar
Computer Science & Information Technology
Vol 9, no(1), February, 2017
TOWARDS A NEW FRAMEWORK LINKING KNOWLEDGE MANAGEMENT SYSTEMS AND ORGANIZATIONAL AGILITY: AN EMPIRICAL STUDY
Mohamed Amine Marhraoui
Computer Science & Information Technology
Vol 9, no(1), February, 2017
OUDG: CROSS MODEL DATUM ACCESS WITH SEMANTIC PRESERVATION FOR LEGACY DATABASES
Joseph Fong
Computer Science & Information Technology
Volume 5, no(1), January, 2015
1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33
34
35
36
37
38
39
40
41
42
43
44
45
46
47
48
49
50
51
52
53
54
55
56
57
58
59
60
61
62
63
64
65
66
67
68
69
70
71
72
73
74
75
76
77
78
79
80
81
82
83
84
85
86
87
88
89
90
91
92
93
94
95
96
97
98
99
100
101
102
103
104
105
106
107
108
109
110
111
112
113
114
115
116
117
118
119
120
121
122
123
124
125
126
127
128
129
130
131
132