Search Paper
  • Home
  • Login
  • Categories
  • Archive
  • Post URL
  • Academic Resources
  • Contact Us

 

Research Sharing System - Share URL

  • Title
  • Author
  • Category
  • Volume, Issue, Month, Year
  • INTELLIGENT ACCESS CONTROL POLICIES FOR SOCIAL NETWORK SITE
  • Saung Hnin Pwint Oo
  • Computer Science & Information Technology
  • Vol 5, No 3, June, 2013

  • BIOMEDICAL IMAGE TRANSMISSION BASED ON MODIFIED FEISTAL ALGORITHM
  • Jinu Elizabeth John
  • Computer Science & Information Technology
  • Vol 5, No 3, June, 2013

  • BOUNDED ANT COLONY ALGORITHM FORTASK ALLOCATION ON ANETWORK OF HOMOGENEOUS PROCESSORSUSING A PRIMARY SITE (BTS-ACO)
  • Buthayna Al-Sharaa
  • Computer Science & Information Technology
  • Vol 5, No 3, June, 2013

  • LABELED GENERALIZED STOCHASTIC PETRI NET BASED APPROACH FOR WEB SERVICES COMPOSITION
  • Sofiane Chemaa
  • Computer Science & Information Technology
  • Vol 5, No 3, June, 2013

  • Designing of an efficient algorithm for identifying Abbreviation definitions in biomedical Text
  • Shashank Singh
  • Computer Science & Information Technology
  • Vol 5, No 3, June, 2013

  • Cinnamons: A Computational Model Underlying Control Network Programming
  • Kostadin Kratchanov
  • Computer Science & Information Technology
  • 73, 1, September, 2017

  • USABILITY TESTING OF FITNESS MOBILE APPLICATION: METHODOLOGY AND QUANTITATIVE RESULTS
  • Ryan Alturki and Valerie Gay
  • Computer Science & Information Technology
  • 1, 1, September, 2017

  • TOWARDS A GOOD ABS DESIGN FOR MORE RELIABLE VEHICLES ON THE ROADS
  • Afifa Ghenai
  • Computer Science & Information Technology
  • Vol 5, No 3, June, 2013

  • An Efficient Approach to Wavelet Image Denoising
  • Alaa A. Hefnawy
  • Computer Science & Information Technology
  • Vol 5, No 3, June, 2013

  • SAASQUALITY - A METHOD FOR QUALITY EVALUATION OF SOFTWARE AS A SERVICE (SAAS)
  • Nemésio Freitas Duarte Filho
  • Computer Science & Information Technology
  • Vol 5, No 3, June, 2013

  • HANDOVER MANAGEMENT SCHEME IN LTE FEMTOCELL NETWORKS
  • Tijane Fatima Zohra BADRI
  • Computer Science & Information Technology
  • Vol 5, No 3, June, 2013

  • SECURITY THREATS ON CLOUD COMPUTING VULNERABILITIES
  • Te-Shun Chou
  • Computer Science & Information Technology
  • Vol 5, No 3, June, 2013

  • MODIFIED HEURISTIC TIME DEVIATION TECHNIQUE FOR JOB SEQUENCING AND COMPUTATION OF MINIMUM TOTAL ELAPSED TIME
  • N.Nagamalleswara Rao
  • Computer Science & Information Technology
  • Vol 5, No 3, June, 2013

  • A NOVEL HYBRID METHOD FOR THE SEGMENTATION OF THE CORONARY ARTERY TREE IN 2D ANGIOGRAMS
  • Daniel S.D. Lara
  • Computer Science & Information Technology
  • Vol 5, No 3, June, 2013

  • HYPER-MSPACE; MULTIDIMENSIONAL EVOLUTIONARY-AGENTS MODELING AND ANALYSIS
  • Mohamed Dbouk
  • Computer Science & Information Technology
  • Vol 5, No 3, June, 2013

  • CONTEXT-BASED BARRIER NOTIFICATION SERVICE TOWARD OUTDOOR SUPPORT FOR THE ELDERLY
  • Keisuke Umezu
  • Computer Science & Information Technology
  • Vol 5, No 3, June, 2013

  • Fuzzy Rule Base System for Software Classification
  • Adnan Shaout
  • Computer Science & Information Technology
  • Vol 5, No 3, June, 2013

1  2  3  4  5  6  7  8  9  10  11  12  13  14  15  16  17  18  19  20  21  22  23  24  25  26  27  28  29  30  31  32  33  34  35  36  37  38  39  40  41  42  43  44  45  46  47  48  49  50  51  52  53  54  55  56  57  58  59  60  61  62  63  64  65  66  67  68  69  70  71  72  73  74  75  76  77  78  79  80  81  82  83  84  85  86  87  88  89  90  91  92  93  94  95  96  97  98  99  100  101  102  103  104  105  106  107  108  109  110  111  112  113  114  115  116  117  118  119 

 

About Us | Post Cfp | Share URL Main | Share URL category | Post URL
All Rights Reserved @ Call for Papers - Conference & Journals