Search Paper
  • Home
  • Login
  • Categories
  • Archive
  • Post URL
  • Academic Resources
  • Contact Us

 

Research Sharing System - Share URL

  • Title
  • Author
  • Category
  • Volume, Issue, Month, Year
  • Use of Linguistic Forms Mining in the Link Analysis of Legal Documents
  • Đorđe Petrović and Milena Stanković
  • Computer Science & Information Technology
  • 15, 2, June, 2018

  • An Intelligent Recommender System Based on Association Rule Analysis for Requirement Engineering
  • Mohammad Muhairat,Shadi ALZu’bi
  • Computer Science & Information Technology
  • 28, 1, January, 2020

  • Data Imputation Using a Trust Network for Recommendation via Matrix Factorization
  • Won-Seok Hwang, Shaoyu Li , Sang-Wook Kim, and Kichun Lee
  • Computer Science & Information Technology
  • 15, 2, June, 2018

  • Detecting Epidemic Diseases Using Sentiment Analysis of Arabic Tweets
  • Qanita Bani Baker
  • Computer Science & Information Technology
  • 26, 1, January, 2020

  • A PREFIXED-ITEMSET-BASED IMPROVEMENT FOR APRIORI ALGORITHM
  • Yu Shoujian
  • Computer Science & Information Technology
  • 6, 1, November, 2016

  • VIRTUAL SCENE CONSTRUCTION OF LARGE-SCALE CULTURAL HERITAGE : A FRAMEWORK INITIATED FROM THE CASE STUDY OF THE GRAND CANAL OF CHINA
  • Jian Tan
  • Computer Science & Information Technology
  • 6, 1, November, 2016

  • Managing Software Requirements Changes through Change Specification and Classification
  • Shalinka Jayatilleke, Richard Lai, and Karl Reed
  • Computer Science & Information Technology
  • 15, 2, June, 2018

  • Scalable Distributed Metadata Server Based on Nonblocking Transactions
  • Kohei Hiraga,Osamu Tatebe,Hideyuki Kawashima
  • Computer Science & Information Technology
  • 26, 1, January, 2020

  • APPLICATION OF BICLUSTERING TECHNIQUE IN MACHINE MONITORING
  • Marcin Michalak
  • Computer Science & Information Technology
  • 6, 1, November, 2016

  • Exploring Instances for Matching Heterogeneous Database Schemas Utilizing Google Similarity and Regular Expression
  • Osama A. Mehdi, Hamidah Ibrahim
  • Computer Science & Information Technology
  • 15, 2, June, 2018

  • User-Oriented Approach to Data Quality Evaluation
  • Anastasija Nikiforova,Janis Bicevskis
  • Computer Science & Information Technology
  • 26, 1, January, 2020

  • Business Models for the Next Generation of Mobile Communications
  • Ghoul Smail and Jia Weijia
  • Computer Science & Information Technology
  • 7, 1/2, April, 2017

  • A TAXONOMY FOR TOOLS, PROCESSES AND LANGUAGES IN AUTOMOTIVE SOFTWARE ENGINEERING
  • Florian Bock
  • Computer Science & Information Technology
  • 6, 1, November, 2016

  • Solving the DNA Fragment Assembly Problem with a Parallel Discrete Firefly Algorithm implemented on GPU
  • Pablo Javier Vidal,and Ana Carolina Olivera
  • Computer Science & Information Technology
  • 15, 2, June, 2018

  • A Framework for Online Social Network Volatile Data Analysis: A Case for the Fast Fashion Industry
  • Anoud Bani Hani,Feras Al-Obeidat,Elhadj Benkhelifa
  • Computer Science & Information Technology
  • 26, 1, January, 2020

  • ADVANCED CLOUD PRIVACY THREAT MODELING
  • Ali Gholami
  • Computer Science & Information Technology
  • 6, 1, November, 2016

  • Authorship Studies and the Dark Side of Social Media Analytics
  • Patrick Juola
  • Computer Science & Information Technology
  • 26, 1, January, 2020

1  2  3  4  5  6  7  8  9  10  11  12  13  14  15  16  17  18  19  20  21  22  23  24  25  26  27  28  29  30  31  32  33  34  35  36  37  38  39  40  41  42  43  44  45  46  47  48  49  50  51  52  53  54  55  56  57  58  59  60  61  62  63  64  65  66  67  68  69  70  71  72  73  74  75  76  77  78  79  80  81  82  83  84  85  86  87  88  89  90  91  92  93  94  95  96  97  98  99  100  101  102  103  104  105  106  107  108  109  110  111  112  113  114  115  116  117  118  119  120  121  122  123  124  125  126  127  128  129 

 

About Us | Post Cfp | Share URL Main | Share URL category | Post URL
All Rights Reserved @ Call for Papers - Conference & Journals