Search Paper
Home
Login
Categories
Archive
Post URL
Academic Resources
Contact Us
Research Sharing System - Share URL
Title
Author
Category
Volume, Issue, Month, Year
INTELLIGENT ACCESS CONTROL POLICIES FOR SOCIAL NETWORK SITE
Saung Hnin Pwint Oo
Computer Science & Information Technology
Vol 5, No 3, June, 2013
BIOMEDICAL IMAGE TRANSMISSION BASED ON MODIFIED FEISTAL ALGORITHM
Jinu Elizabeth John
Computer Science & Information Technology
Vol 5, No 3, June, 2013
BOUNDED ANT COLONY ALGORITHM FORTASK ALLOCATION ON ANETWORK OF HOMOGENEOUS PROCESSORSUSING A PRIMARY SITE (BTS-ACO)
Buthayna Al-Sharaa
Computer Science & Information Technology
Vol 5, No 3, June, 2013
LABELED GENERALIZED STOCHASTIC PETRI NET BASED APPROACH FOR WEB SERVICES COMPOSITION
Sofiane Chemaa
Computer Science & Information Technology
Vol 5, No 3, June, 2013
Designing of an efficient algorithm for identifying Abbreviation definitions in biomedical Text
Shashank Singh
Computer Science & Information Technology
Vol 5, No 3, June, 2013
Cinnamons: A Computational Model Underlying Control Network Programming
Kostadin Kratchanov
Computer Science & Information Technology
73, 1, September, 2017
USABILITY TESTING OF FITNESS MOBILE APPLICATION: METHODOLOGY AND QUANTITATIVE RESULTS
Ryan Alturki and Valerie Gay
Computer Science & Information Technology
1, 1, September, 2017
TOWARDS A GOOD ABS DESIGN FOR MORE RELIABLE VEHICLES ON THE ROADS
Afifa Ghenai
Computer Science & Information Technology
Vol 5, No 3, June, 2013
An Efficient Approach to Wavelet Image Denoising
Alaa A. Hefnawy
Computer Science & Information Technology
Vol 5, No 3, June, 2013
SAASQUALITY - A METHOD FOR QUALITY EVALUATION OF SOFTWARE AS A SERVICE (SAAS)
Nemésio Freitas Duarte Filho
Computer Science & Information Technology
Vol 5, No 3, June, 2013
HANDOVER MANAGEMENT SCHEME IN LTE FEMTOCELL NETWORKS
Tijane Fatima Zohra BADRI
Computer Science & Information Technology
Vol 5, No 3, June, 2013
SECURITY THREATS ON CLOUD COMPUTING VULNERABILITIES
Te-Shun Chou
Computer Science & Information Technology
Vol 5, No 3, June, 2013
MODIFIED HEURISTIC TIME DEVIATION TECHNIQUE FOR JOB SEQUENCING AND COMPUTATION OF MINIMUM TOTAL ELAPSED TIME
N.Nagamalleswara Rao
Computer Science & Information Technology
Vol 5, No 3, June, 2013
A NOVEL HYBRID METHOD FOR THE SEGMENTATION OF THE CORONARY ARTERY TREE IN 2D ANGIOGRAMS
Daniel S.D. Lara
Computer Science & Information Technology
Vol 5, No 3, June, 2013
HYPER-MSPACE; MULTIDIMENSIONAL EVOLUTIONARY-AGENTS MODELING AND ANALYSIS
Mohamed Dbouk
Computer Science & Information Technology
Vol 5, No 3, June, 2013
CONTEXT-BASED BARRIER NOTIFICATION SERVICE TOWARD OUTDOOR SUPPORT FOR THE ELDERLY
Keisuke Umezu
Computer Science & Information Technology
Vol 5, No 3, June, 2013
Fuzzy Rule Base System for Software Classification
Adnan Shaout
Computer Science & Information Technology
Vol 5, No 3, June, 2013
1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33
34
35
36
37
38
39
40
41
42
43
44
45
46
47
48
49
50
51
52
53
54
55
56
57
58
59
60
61
62
63
64
65
66
67
68
69
70
71
72
73
74
75
76
77
78
79
80
81
82
83
84
85
86
87
88
89
90
91
92
93
94
95
96
97
98
99
100
101
102
103
104
105
106
107
108
109
110
111
112
113
114
115
116
117
118
119