Search Paper
  • Home
  • Login
  • Categories
  • Archive
  • Post URL
  • Academic Resources
  • Contact Us

 

Research Sharing System - Share URL

  • Title
  • Author
  • Category
  • Volume, Issue, Month, Year
  • A Linear Algorithm for the Grundy Number of A Tree
  • Ali Mansouri
  • Computer Science & Information Technology
  • Vol 6, No 1, February, 2014

  • Processing Obtained Email Data By Using Naïve Bayes Learning Algorithm
  • Valery V. Pelenko
  • Computer Science & Information Technology
  • Vol 6, No 1, February, 2014

  • ENHANCING KEYWORD SEARCH OVER RELATIONAL DATABASES USING ONTOLOGIES
  • Ahmed Elsayed
  • Computer Science & Information Technology
  • Vol 3, Num 4, May, 2013

  • Fulfillment Request Management (The approach)
  • Stylianos Gkoutzioupas
  • Computer Science & Information Technology
  • Vol 6, No 1, February, 2014

  • A Study on the Dynamic Effect of Sports Promotion Strategy and Effectiveness of National Health Care in Taiwan
  • Tian-Syung Lan
  • Computer Science & Information Technology
  • Vol 6, No 1, February, 2014

  • Shape-Based Plagiarism Detection for Flowchart Figures in Texts
  • Senosy Arrish
  • Computer Science & Information Technology
  • Vol 6, No 1, February, 2014

  • A Study on the Chain Restaurants Dynamic Negotiation Games of the Optimization of Joint Procurement of Food Materials
  • Hung-Teng Chang
  • Computer Science & Information Technology
  • Vol 6, No 1, February, 2014

  • What Facilitates the Delivery of Citizen-Centric EGovernment Services in Developing Countries: Model Development and Validation Through Structural Equation Modeling
  • Yousef Elsheikh
  • Computer Science & Information Technology
  • Vol 6, No 1, February, 2014

  • Clustering Effects on Wireless Mobile Ad-Hoc Networks Performances
  • Gideon Naah
  • Computer Science & Information Technology
  • Vol 6, No 1, February, 2014

  • Evaluation of Image Segmentation and Filtering With Ann in the Papaya Leaf
  • Maicon A. Sartin
  • Computer Science & Information Technology
  • Vol 6, No 1, February, 2014

  • Information Security Risk Analysis Methods and Research Trends: AHP and Fuzzy Comprehensive Method
  • Ming-Chang Lee
  • Computer Science & Information Technology
  • Vol 6, No 1, February, 2014

  • INFORMATION SECURITY APPROACH IN OPEN DISTRIBUTED MULTI-AGENT VIRTUAL LEARNING ENVIRONMENT
  • Dr. Zahi A.M. Abu Sarhan
  • Computer Science & Information Technology
  • Vol 6, No 1, February, 2014

  • Cardinal Direction Relations in Qualitative Spatial Reasoning
  • Chaman L. Sabharwal
  • Computer Science & Information Technology
  • Vol 6, No 1, February, 2014

  • Review of Closed Circuit Television (CCTV) Techniques for Vehicles Traffic Management
  • Heba A. Kurdi
  • Computer Science & Information Technology
  • Vol 6, No 2, April, 2014

  • Sharing of Cluster Resources among Multiple Workflow Applications
  • Uma Boregowda
  • Computer Science & Information Technology
  • Vol 6, No 2, April, 2014

  • The Impact of Knowledge-Based Trust (Kbt) on The Adoption and Acceptability of Cashless Economy in Nigeria
  • Galadima, Talatu O
  • Computer Science & Information Technology
  • Vol 6, No 2, April, 2014

  • Advanced Authentication Scheme Using a Predefined Keystroke Structure
  • Abdulameer K. Hussain
  • Computer Science & Information Technology
  • Vol 6, No 2, April, 2014

1  2  3  4  5  6  7  8  9  10  11  12  13  14  15  16  17  18  19  20  21  22  23  24  25  26  27  28  29  30  31  32  33  34  35  36  37  38  39  40  41  42  43  44  45  46  47  48  49  50  51  52  53  54  55  56  57  58  59  60  61  62  63  64  65  66  67  68  69  70  71  72  73  74  75  76  77  78  79  80  81  82  83  84  85  86  87  88  89  90  91  92  93  94  95  96  97  98  99  100  101  102  103  104  105  106  107  108  109  110  111  112  113  114  115  116  117  118  119  120  121  122  123  124  125  126  127  128  129  130  131  132 

 

About Us | Post Cfp | Share URL Main | Share URL category | Post URL
All Rights Reserved @ Call for Papers - Conference & Journals