Search Paper
Home
Login
Categories
Archive
Post URL
Academic Resources
Contact Us
Research Sharing System - Share URL
Title
Author
Category
Volume, Issue, Month, Year
A Linear Algorithm for the Grundy Number of A Tree
Ali Mansouri
Computer Science & Information Technology
Vol 6, No 1, February, 2014
Processing Obtained Email Data By Using Naïve Bayes Learning Algorithm
Valery V. Pelenko
Computer Science & Information Technology
Vol 6, No 1, February, 2014
ENHANCING KEYWORD SEARCH OVER RELATIONAL DATABASES USING ONTOLOGIES
Ahmed Elsayed
Computer Science & Information Technology
Vol 3, Num 4, May, 2013
Fulfillment Request Management (The approach)
Stylianos Gkoutzioupas
Computer Science & Information Technology
Vol 6, No 1, February, 2014
A Study on the Dynamic Effect of Sports Promotion Strategy and Effectiveness of National Health Care in Taiwan
Tian-Syung Lan
Computer Science & Information Technology
Vol 6, No 1, February, 2014
Shape-Based Plagiarism Detection for Flowchart Figures in Texts
Senosy Arrish
Computer Science & Information Technology
Vol 6, No 1, February, 2014
A Study on the Chain Restaurants Dynamic Negotiation Games of the Optimization of Joint Procurement of Food Materials
Hung-Teng Chang
Computer Science & Information Technology
Vol 6, No 1, February, 2014
What Facilitates the Delivery of Citizen-Centric EGovernment Services in Developing Countries: Model Development and Validation Through Structural Equation Modeling
Yousef Elsheikh
Computer Science & Information Technology
Vol 6, No 1, February, 2014
Clustering Effects on Wireless Mobile Ad-Hoc Networks Performances
Gideon Naah
Computer Science & Information Technology
Vol 6, No 1, February, 2014
Evaluation of Image Segmentation and Filtering With Ann in the Papaya Leaf
Maicon A. Sartin
Computer Science & Information Technology
Vol 6, No 1, February, 2014
Information Security Risk Analysis Methods and Research Trends: AHP and Fuzzy Comprehensive Method
Ming-Chang Lee
Computer Science & Information Technology
Vol 6, No 1, February, 2014
INFORMATION SECURITY APPROACH IN OPEN DISTRIBUTED MULTI-AGENT VIRTUAL LEARNING ENVIRONMENT
Dr. Zahi A.M. Abu Sarhan
Computer Science & Information Technology
Vol 6, No 1, February, 2014
Cardinal Direction Relations in Qualitative Spatial Reasoning
Chaman L. Sabharwal
Computer Science & Information Technology
Vol 6, No 1, February, 2014
Review of Closed Circuit Television (CCTV) Techniques for Vehicles Traffic Management
Heba A. Kurdi
Computer Science & Information Technology
Vol 6, No 2, April, 2014
Sharing of Cluster Resources among Multiple Workflow Applications
Uma Boregowda
Computer Science & Information Technology
Vol 6, No 2, April, 2014
The Impact of Knowledge-Based Trust (Kbt) on The Adoption and Acceptability of Cashless Economy in Nigeria
Galadima, Talatu O
Computer Science & Information Technology
Vol 6, No 2, April, 2014
Advanced Authentication Scheme Using a Predefined Keystroke Structure
Abdulameer K. Hussain
Computer Science & Information Technology
Vol 6, No 2, April, 2014
1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33
34
35
36
37
38
39
40
41
42
43
44
45
46
47
48
49
50
51
52
53
54
55
56
57
58
59
60
61
62
63
64
65
66
67
68
69
70
71
72
73
74
75
76
77
78
79
80
81
82
83
84
85
86
87
88
89
90
91
92
93
94
95
96
97
98
99
100
101
102
103
104
105
106
107
108
109
110
111
112
113
114
115
116
117
118
119
120
121
122
123
124
125
126
127
128
129
130
131
132