Search Paper
Home
Login
Categories
Archive
Post URL
Academic Resources
Contact Us
Research Sharing System - Share URL
Title
Author
Category
Volume, Issue, Month, Year
MAXIMIZING THE TOTAL NUMBER OF ON TIME JOBS ON IDENTICAL MACHINES
Hairong Zhao
Computer Science & Information Technology
9, 9, July, 2019
QUERY PERFORMANCE OPTIMIZATION IN DATABASES FOR BIG DATA
Manoj Muniswamaiah
Computer Science & Information Technology
9, 9, July, 2019
IOT -BASED APPROACH TO MONITOR PARKING SPACE IN CITIES
Fatin Farhan Haque
Computer Science & Information Technology
9, 9, July, 2019
A SURVEY OF STATE-OF-THE-ART GANBASED APPROACHES TO IMAGE SYNTHESIS
Shirin Nasr Esfahani
Computer Science & Information Technology
9, 9, July, 2019
DATA ANALYSIS OF WIRELESS NETWORKS USING CLASSIFICATION TECHNIQUES
Daniel Rosa Canêdo
Computer Science & Information Technology
9, 9, July, 2019
A REVIEW OF MEMORY ALLOCATION AND MANAGEMENT IN COMPUTER SYSTEMS
Ahmed Faraz
Computer Science & Information Technology
6, 4, August, 2016
REALTIME NATIONAL HEALTH INSURANCE SCHEME (RNHIS): MEANS TO ACHIEVE HEALTH FOR ALL
1Alimi O. Maruf, 2Binuyo O. G., 3Gambo I. G. and 4K. Jimoh
Computer Science & Information Technology
6, 2, April, 2016
APPLYING IMPORTANT-PERFORMANCE ANALYSIS TO HOME STAY SERVICE PERFORMANCE
Han-Chen Huang
Computer Science & Information Technology
11, 4, August, 2019
AN EFFECT OF USING A STORAGE MEDIUM IN DIJKSTRA ALGORITHM PERFORMANCE FOR IDEAL IMPLICIT PATH COST
Ibtusam Alashoury and Mabroukah Amarif
Computer Science & Information Technology
11, 4, August, 2019
EFFICIENT TOUGH RANDOM SYMMETRIC 3-SAT GENERATOR
Robert Amador , Chen-Fu Chiang
Computer Science & Information Technology
9, 9, July, 2019
CONSTRUCTION OF AN ORAL CANCER AUTOCLASSIFY SYSTEM BASED ON MACHINELEARNING FOR ARTIFICIAL INTELLIGENCE
Meng-Jia Lian
Computer Science & Information Technology
9, 9, July, 2019
CONTEXT-AWARE TRUST-BASED ACCESS CONTROL FOR UBIQUITOUS SYSTEMS
Malika Yaici, Faiza Ainennas and Nassima Zidi
Computer Science & Information Technology
9, 9, July, 2019
AUTOMATIC EXTRACTION OF FEATURE LINES ON 3D SURFACE
Zhihong Mao, Ruichao Wang and Yulin Zhou
Computer Science & Information Technology
9, 9, July, 2019
WEAKLY-SUPERVISED NETWORK ALIGNMENT WITH ADVERSARIAL LEARNING
Nguyen Thanh Toan
Computer Science & Information Technology
9, 8, June, 2019
FAKE CHECK SCAMS: A BLOCK CHAIN BASED DETECTION SOLUTION
Badis HAMMI
Computer Science & Information Technology
9, 8, June, 2019
A NOVEL APPROACH FOR CONCEALED DATA SHARING AND DATA EMBEDDING FOR SECURED COMMUNICATION
Gaurav Prasad1 and Sujay Narayana2
Computer Science & Information Technology
1, 1, February, 2011
ANALYTICAL STUDY AND SIMULATION FOR PROPAGATION OF ALERTS, CASE OF EMERGENCY VEHICLES IN SMART CITIES
Éloi B. KEITA, Pierre-Yves LUCAS
Computer Science & Information Technology
9, 8, June, 2019
1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33
34
35
36
37
38
39
40
41
42
43
44
45
46
47
48
49
50
51
52
53
54
55
56
57
58
59
60
61
62
63
64
65
66
67
68
69
70
71
72
73
74
75
76
77
78
79
80
81
82
83
84
85
86
87
88
89
90
91
92
93
94
95
96
97
98
99
100
101
102
103
104
105
106
107
108
109
110
111
112
113
114
115
116
117
118
119