Search Paper
  • Home
  • Login
  • Categories
  • Archive
  • Post URL
  • Academic Resources
  • Contact Us

 

Research Sharing System - Share URL

  • Title
  • Author
  • Category
  • Volume, Issue, Month, Year
  • MAXIMIZING THE TOTAL NUMBER OF ON TIME JOBS ON IDENTICAL MACHINES
  • Hairong Zhao
  • Computer Science & Information Technology
  • 9, 9, July, 2019

  • QUERY PERFORMANCE OPTIMIZATION IN DATABASES FOR BIG DATA
  • Manoj Muniswamaiah
  • Computer Science & Information Technology
  • 9, 9, July, 2019

  • IOT -BASED APPROACH TO MONITOR PARKING SPACE IN CITIES
  • Fatin Farhan Haque
  • Computer Science & Information Technology
  • 9, 9, July, 2019

  • A SURVEY OF STATE-OF-THE-ART GANBASED APPROACHES TO IMAGE SYNTHESIS
  • Shirin Nasr Esfahani
  • Computer Science & Information Technology
  • 9, 9, July, 2019

  • DATA ANALYSIS OF WIRELESS NETWORKS USING CLASSIFICATION TECHNIQUES
  • Daniel Rosa Canêdo
  • Computer Science & Information Technology
  • 9, 9, July, 2019

  • A REVIEW OF MEMORY ALLOCATION AND MANAGEMENT IN COMPUTER SYSTEMS
  • Ahmed Faraz
  • Computer Science & Information Technology
  • 6, 4, August, 2016

  • REALTIME NATIONAL HEALTH INSURANCE SCHEME (RNHIS): MEANS TO ACHIEVE HEALTH FOR ALL
  • 1Alimi O. Maruf, 2Binuyo O. G., 3Gambo I. G. and 4K. Jimoh
  • Computer Science & Information Technology
  • 6, 2, April, 2016

  • APPLYING IMPORTANT-PERFORMANCE ANALYSIS TO HOME STAY SERVICE PERFORMANCE
  • Han-Chen Huang
  • Computer Science & Information Technology
  • 11, 4, August, 2019

  • AN EFFECT OF USING A STORAGE MEDIUM IN DIJKSTRA ALGORITHM PERFORMANCE FOR IDEAL IMPLICIT PATH COST
  • Ibtusam Alashoury and Mabroukah Amarif
  • Computer Science & Information Technology
  • 11, 4, August, 2019

  • EFFICIENT TOUGH RANDOM SYMMETRIC 3-SAT GENERATOR
  • Robert Amador , Chen-Fu Chiang
  • Computer Science & Information Technology
  • 9, 9, July, 2019

  • CONSTRUCTION OF AN ORAL CANCER AUTOCLASSIFY SYSTEM BASED ON MACHINELEARNING FOR ARTIFICIAL INTELLIGENCE
  • Meng-Jia Lian
  • Computer Science & Information Technology
  • 9, 9, July, 2019

  • CONTEXT-AWARE TRUST-BASED ACCESS CONTROL FOR UBIQUITOUS SYSTEMS
  • Malika Yaici, Faiza Ainennas and Nassima Zidi
  • Computer Science & Information Technology
  • 9, 9, July, 2019

  • AUTOMATIC EXTRACTION OF FEATURE LINES ON 3D SURFACE
  • Zhihong Mao, Ruichao Wang and Yulin Zhou
  • Computer Science & Information Technology
  • 9, 9, July, 2019

  • WEAKLY-SUPERVISED NETWORK ALIGNMENT WITH ADVERSARIAL LEARNING
  • Nguyen Thanh Toan
  • Computer Science & Information Technology
  • 9, 8, June, 2019

  • FAKE CHECK SCAMS: A BLOCK CHAIN BASED DETECTION SOLUTION
  • Badis HAMMI
  • Computer Science & Information Technology
  • 9, 8, June, 2019

  • A NOVEL APPROACH FOR CONCEALED DATA SHARING AND DATA EMBEDDING FOR SECURED COMMUNICATION
  • Gaurav Prasad1 and Sujay Narayana2
  • Computer Science & Information Technology
  • 1, 1, February, 2011

  • ANALYTICAL STUDY AND SIMULATION FOR PROPAGATION OF ALERTS, CASE OF EMERGENCY VEHICLES IN SMART CITIES
  • Éloi B. KEITA, Pierre-Yves LUCAS
  • Computer Science & Information Technology
  • 9, 8, June, 2019

1  2  3  4  5  6  7  8  9  10  11  12  13  14  15  16  17  18  19  20  21  22  23  24  25  26  27  28  29  30  31  32  33  34  35  36  37  38  39  40  41  42  43  44  45  46  47  48  49  50  51  52  53  54  55  56  57  58  59  60  61  62  63  64  65  66  67  68  69  70  71  72  73  74  75  76  77  78  79  80  81  82  83  84  85  86  87  88  89  90  91  92  93  94  95  96  97  98  99  100  101  102  103  104  105  106  107  108  109  110  111  112  113  114  115  116  117  118  119 

 

About Us | Post Cfp | Share URL Main | Share URL category | Post URL
All Rights Reserved @ Call for Papers - Conference & Journals