Search Paper
Home
Login
Categories
Archive
Post URL
Academic Resources
Contact Us
Research Sharing System - Share URL
Title
Author
Category
Volume, Issue, Month, Year
Community Detection Applied on Big Linked Data
Laura Po, Davide Malvezzi
Computer Science & Information Technology
24, 11, November, 2018
A CROSS-LAYER BASED SCALABLE CHANNEL SLOT RE-UTILIZATION TECHNIQUE FOR WIRELESS MESH NETWORK
Asha C N
Computer Science & Information Technology
6, 4, April, 2016
Prevention of Cross-update Privacy Leaks on Android
Beumjin Cho , Sangho Lee, Meng Xu
Computer Science & Information Technology
15, 1, January, 2018
Human Language Technologies: Key Issues for Representing Knowledge from Textual Information
Yoan Guti´errez,Elena Lloret
Computer Science & Information Technology
24, 11, November, 2018
Traditionalisation of Agile Processes: Architectural Aspects
Predrag Matkovic, Mirjana Maric, Pere Tumbas, and Marton Sakal
Computer Science & Information Technology
15, 1, January, 2018
A Software Reliability Growth Modeling Framework with Complexity of Path Searching
Shinji Inoue
Computer Science & Information Technology
24, 12, December, 2018
SEGMENTATION AND LABELLING OF HUMAN SPINE MR IMAGES USING FUZZY CLUSTERING
Jiyo.S.Athertya
Computer Science & Information Technology
6, 4, April, 2016
SELECTION OF BEST ALTERNATIVE IN MANUFACTURING AND SERVICE SECTOR USING MULTI GRADE DECISION APPROACH - A REVIEW
Karuppanna Prasad N
Computer Science & Information Technology
6, 4, April, 2016
A Novel Inheritance Mechanism for Modeling Knowledge Representation Systems
Marek Krótkiewicz
Computer Science & Information Technology
15, 1, January, 2018
Software Quality Issues in SCRUM: A Systematic Mapping
Deepti Mishra
Computer Science & Information Technology
24, 12, December, 2018
FEATURE SELECTION-MODEL-BASED CONTENT ANALYSIS FOR COMBATING WEB SPAM
Shipra Mittal
Computer Science & Information Technology
6, 4, November, 2016
An Approach to Business Process Simulation using Mined Probabilistic Models
Titas Savickas and Olegas Vasilecas
Computer Science & Information Technology
15, 1, January, 2018
A Logistic Fault-Dependent Detection Software Reliability Model
Hoang Pham
Computer Science & Information Technology
24, 12, December, 2018
FILESHADER: ENTRUSTED DATA INTEGRATION USING HASH SERVER
Juhyeon Oh and Chae Y. Lee
Computer Science & Information Technology
6, 4, April, 2016
Context-sensitive Constraints for Access Control of Business Processes
Gordana Milosavljevic, Goran Sladi
Computer Science & Information Technology
15, 1, January, 2018
Clustering for Software Remodularization by Using Structural, Conceptual and Evolutionary Features
Amit Rathee
Computer Science & Information Technology
24, 12, December, 2018
COQUEL: A CONCEPTUAL QUERY LANGUAGE BASED ON THE ENTITYRELATIONSHIP MODEL
Rafael Bello and Jorge Lloret
Computer Science & Information Technology
6, 4, April, 2016
1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33
34
35
36
37
38
39
40
41
42
43
44
45
46
47
48
49
50
51
52
53
54
55
56
57
58
59
60
61
62
63
64
65
66
67
68
69
70
71
72
73
74
75
76
77
78
79
80
81
82
83
84
85
86
87
88
89
90
91
92
93
94
95
96
97
98
99
100
101
102
103
104
105
106
107
108
109
110
111
112
113
114
115
116
117
118
119