Search Paper
Home
Login
Categories
Archive
Post URL
Academic Resources
Contact Us
Research Sharing System - Share URL
Title
Author
Category
Volume, Issue, Month, Year
Improvement of a Method Based on Hidden Markov Model for Clustering Web Users
Sadegh Khanpour and Omid sojoodi
Computer Science & Information Technology
6, 2, January, 2016
STANDARDIZATION OF CLINICAL DOCUMENTS THROUGH HL7 - FHIR FOR COLOMBIA
Anzola Diego
Computer Science & Information Technology
Volume(8), no(6), December, 2016
AN EVALUATION STUDY OF GENERAL SOFTWARE PROJECT RISK BASEDON SOFTWARE PRACTITIONERS EXPERIENCES
Sahand Vahidnia
Computer Science & Information Technology
Volume(8), no(6), December, 2016
DETERMINING THE CORE PART OF SOFTWARE DEVELOPMENT CURRICULUM APPLYING ASSOCIATION RULE MINING ON SOFTWARE JOB ADS IN TURKEY
Ilkay Yelmen and Metin Zontul
Computer Science & Information Technology
6, 2, January, 2016
DESIGN AND IMPLEMENT A NEW CLOUD SECURITY METHOD BASED ON MULTI CLOUDS ON OPEN STACK PLATFORM
Mohamad Reza Khayyambashi and Sayed Mohammad Hossein Mirshahjafari and EhsanShahrokhi
Computer Science & Information Technology
6, 2, January, 2016
A CLOUD BROKER APPROACH WITH QOS ATTENDANCE AND SOA FOR HYBRID CLOUD COMPUTING ENVIRONMENTS
Mário Henrique de Souza Pardo, Adriana Molina Centurion, Paulo Sérgio Franco Eustáquio, Regina He
Computer Science & Information Technology
6, 2, January, 2016
COMPARISON OF OPEN-SOURCE PAAS ARCHITECTURAL COMPONENTS
Mohan Krishna Varma Nandimandalam1 and Eunmi Choi2
Computer Science & Information Technology
6, 2, January, 2016
Feature-Model-Based Commonality and Variability Analysis for Virtual Cluster Disk Provisioning
Nayun Cho, Mino Ku, Rui Xuhua, and Dugki Min
Computer Science & Information Technology
6, 2, January, 2016
PERSONAL IDENTITY MATCHING
Mazin Al-Shuaili and Marco Carvalho
Computer Science & Information Technology
6, 2, January, 2016
MODELLING DYNAMIC PATTERNS USING MOBILE DATA
Suhad Faisal Behadili , Cyrille Bertelle and Loay E. George
Computer Science & Information Technology
6, 2, January, 2016
TOWARDS A NEW APPROACH OF DATA DISSEMINATION IN VANETS NETWORKS
Ouafa Mahma and Ahmed Korichi
Computer Science & Information Technology
6, 2, January, 2016
EFFICIENT CALL PATH DETECTION FOR ANDROID-OS SIZE OF HUGE SOURCE CODE
Koji Yamamoto and Taka Matsutsuka
Computer Science & Information Technology
6, 2, January, 2016
A SURVEY ON TECHNIQUES REQUIREMENTS FOR INTEGRATEING SAFETY AND SECURITY ENGINEERING FOR CYBER-PHYSICAL SYSTEMS
MOHAMMED F. H. ABULAMDDI
Computer Science & Information Technology
Vol 7, No 6, December, 2016
THE EFFECT OF PHYSICAL BASED FEATURES FOR RECOGNITION OF RECAPTURED IMAGES
S. A. A. H. Samaraweera and B. Mayurathan
Computer Science & Information Technology
Vol 8, No 6, December, 2016
A SURVEY ON TECHNIQUES REQUIREMENTS FOR INTEGRATEING SAFETY AND SECURITY ENGINEERING FOR CYBER-PHYSICAL SYSTEMS
MOHAMMED F. H. ABULAMDDI
Computer Science & Information Technology
Vol 7, No 6, December, 2016
OCR - The 3 Layered Approach for Classification and Identification of Telugu Hand Written Mixed Consonants and Conjunct Consonants by Using Advanced Fuzzy Logic Controller
B.Rama and Santosh Kumar Henge
Computer Science & Information Technology
6, 4, April, 2016
QUESTION ANALYSIS FOR ARABIC QUESTION ANSWERING SYSTEMS
Waheeb Ahmed
Computer Science & Information Technology
5, 6, December, 2016
1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33
34
35
36
37
38
39
40
41
42
43
44
45
46
47
48
49
50
51
52
53
54
55
56
57
58
59
60
61
62
63
64
65
66
67
68
69
70
71
72
73
74
75
76
77
78
79
80
81
82
83
84
85
86
87
88
89
90
91
92
93
94
95
96
97
98
99
100
101
102
103
104
105
106
107
108
109
110
111
112
113
114
115
116
117
118
119