Search Paper
Home
Login
Categories
Archive
Post URL
Academic Resources
Contact Us
Research Sharing System - Share URL
Title
Author
Category
Volume, Issue, Month, Year
APPBACS: AN APPLICATION BEHAVIOR ANALYSIS AND CLASSIFICATION SYSTEM
Himanshu Pareek
Computer Science & Information Technology
Vol 5, No 2, April, 2013
STRUCTURAL COUPLING IN WEB 2.0 APPLICATIONS
Maya Samaha Rupert 1
Computer Science & Information Technology
Vol 5, No 2, April, 2013
AN INVESTIGATION OF THE ENERGY CONSUMPTION BY INFORMATION TECHNOLOGY EQUIPMENTS
Baharak Makki
Computer Science & Information Technology
Vol 5, No 2, April, 2013
HYBRID OPTICAL AND ELECTRICAL NETWORK FLOWS SCHEDULING IN CLOUD DATA CENTRES
Ibrahim Kabiru Musa
Computer Science & Information Technology
Vol 5, No 2, April, 2013
INTELLIGENT ACCESS CONTROL POLICIES FOR SOCIAL NETWORK SITE
Saung Hnin Pwint Oo
Computer Science & Information Technology
Vol 5, No 3, June, 2013
BIOMEDICAL IMAGE TRANSMISSION BASED ON MODIFIED FEISTAL ALGORITHM
Jinu Elizabeth John
Computer Science & Information Technology
Vol 5, No 3, June, 2013
BOUNDED ANT COLONY ALGORITHM FORTASK ALLOCATION ON ANETWORK OF HOMOGENEOUS PROCESSORSUSING A PRIMARY SITE (BTS-ACO)
Buthayna Al-Sharaa
Computer Science & Information Technology
Vol 5, No 3, June, 2013
LABELED GENERALIZED STOCHASTIC PETRI NET BASED APPROACH FOR WEB SERVICES COMPOSITION
Sofiane Chemaa
Computer Science & Information Technology
Vol 5, No 3, June, 2013
Designing of an efficient algorithm for identifying Abbreviation definitions in biomedical Text
Shashank Singh
Computer Science & Information Technology
Vol 5, No 3, June, 2013
Cinnamons: A Computational Model Underlying Control Network Programming
Kostadin Kratchanov
Computer Science & Information Technology
73, 1, September, 2017
USABILITY TESTING OF FITNESS MOBILE APPLICATION: METHODOLOGY AND QUANTITATIVE RESULTS
Ryan Alturki and Valerie Gay
Computer Science & Information Technology
1, 1, September, 2017
TOWARDS A GOOD ABS DESIGN FOR MORE RELIABLE VEHICLES ON THE ROADS
Afifa Ghenai
Computer Science & Information Technology
Vol 5, No 3, June, 2013
An Efficient Approach to Wavelet Image Denoising
Alaa A. Hefnawy
Computer Science & Information Technology
Vol 5, No 3, June, 2013
SAASQUALITY - A METHOD FOR QUALITY EVALUATION OF SOFTWARE AS A SERVICE (SAAS)
Nemésio Freitas Duarte Filho
Computer Science & Information Technology
Vol 5, No 3, June, 2013
HANDOVER MANAGEMENT SCHEME IN LTE FEMTOCELL NETWORKS
Tijane Fatima Zohra BADRI
Computer Science & Information Technology
Vol 5, No 3, June, 2013
SECURITY THREATS ON CLOUD COMPUTING VULNERABILITIES
Te-Shun Chou
Computer Science & Information Technology
Vol 5, No 3, June, 2013
MODIFIED HEURISTIC TIME DEVIATION TECHNIQUE FOR JOB SEQUENCING AND COMPUTATION OF MINIMUM TOTAL ELAPSED TIME
N.Nagamalleswara Rao
Computer Science & Information Technology
Vol 5, No 3, June, 2013
1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33
34
35
36
37
38
39
40
41
42
43
44
45
46
47
48
49
50
51
52
53
54
55
56
57
58
59
60
61
62
63
64
65
66
67
68
69
70
71
72
73
74
75
76
77
78
79
80
81
82
83
84
85
86
87
88
89
90
91
92
93
94
95
96
97
98
99
100
101
102
103
104
105
106
107
108
109
110
111
112
113
114
115
116
117
118
119
120
121
122
123
124
125
126
127
128
129
130
131
132