Search Paper
  • Home
  • Login
  • Categories
  • Post URL
  • Academic Resources
  • Contact Us

 

  • Title
  • Author
  • Category
  • Volume, Issue, Month, Year
PREDICTING SECURITY CRITICAL CONDITIONS OF CYBER PHYSICAL SYSTEMS WITH UNOBSERVABLES AND OBSERVATION TIMES Alessio Coletta Computer Science & Information Technology 8, 18, December, 2018
CAMOUFLAGED WITH SIZE: A CASE STUDY OF ESPIONAGE USING ACQUIRABLE SINGLE-BOARD COMPUTERS Kiavash Satvat1 , Mahshid Hosseini1 and Maliheh Shirvanian2 Computer Science & Information Technology 8, 18, December, 2018
DATA MANAGEMENT PLATFORM SUPPORTING VOLUNTEER OCCUPATION SERVICES Damien Nicolas, Adnan Emeri, Marie Laure Watrinet and Djamel Khadraoui Computer Science & Information Technology 8, 18, December, 2018
GROUP BASED RESOURCE MANAGEMENT AND PRICING MODEL IN CLOUD COMPUTING Shelia Rahman1,Afroza Sultana2 , Afsana Islam3, and Md Whaiduzzaman Computer Science & Information Technology 10, 4, August, 2018
EVOLUTIONARY CENTRALITY AND MAXIMAL CLIQUES IN MOBILE SOCIAL NETWORKS Heba Elgazzar1 and Adel Elmaghraby Computer Science & Information Technology 10, 4, August, 2018
APPLICATION DEVELOPMENT TO CONVERT HETEROGENEOUS INFORMATION INTO PQDIF (POWER QUALITY DATA INTERCHANGE FORMAT) Claudiu Popirlan Computer Science & Information Technology 10, 4, August, 2018
VIRTUAL AIS GENERATION MANAGEMENT SYSTEM FOR WATERWAY RISK ASSESSMENT Jun Sik Kim1 , Seung Wook Hong2 and Suhyun Park3 Computer Science & Information Technology 8, 18, December, 2018
VIRTUAL AIS GENERATION MANAGEMENT SYSTEM FOR WATERWAY RISK ASSESSMENT Jun Sik Kim1 , Seung Wook Hong2 and Suhyun Park3 Computer Science & Information Technology 8, 18, December, 2018
AGILE PROJECT MANAGEMENT IN NON-SOFTWARE SECTORS DURING TURBULENT TIMES Nabeel T. Alsohybe, Nashwan Sabrah Software Engineering & Security 10, 1, January, 2019
A Reliable and an Efficient Web Testing System Kamran Ali Software Testing Vol 10, Issue 1, January, 2019
FUZZY BOOLEAN REASONING FOR DIAGNOSIS OF DIABETES Mohamed Benamina, Baghdad Atmani and Sofia Benbelkacem Computer Science & Information Technology 8, 18, December, 2018
Extending a model for ontology-based Arabic-English machine translation Neama Abdulaziz Dahan and Fadl Mutaher Ba-Alwi Machine Learning 10, 1, January, 2019
COMPUTER VISION-BASED FALL DETECTION METHODS USING THE KINECT CAMERA: A SURVEY Salma Kammoun Jarraya Computer Science & Information Technology 10, 5, October, 2018
MODELS OF IT-PROJECT MANAGEMENT Julia Doronina and Ekaterina Doronina Computer Science & Information Technology 10, 5, October, 2018
Open Source Technology : An Emerging and Vital Paradigm in Institutions of Learning in Kenya Cosmas Kabii Muthamia , Gregory Wanyembi, Nahason Matoke Computer Science & Information Technology 10, 5, October, 2018
INVESTIGATING THE DETERMINANTS OF COLLEGE STUDENTS INFORMATION SECURITY BEHAVIOR USING A VALIDATED MULTIPLE REGRESSION MODELS Mofleh Al-diabat Computer Science & Information Technology 10, 6, December, 2018
REMOTELY VIEW USER ACTIVITIES AND IMPOSE RULES AND PENALTIES IN A LOCAL AREA NETWORK ENVIRONMENT Marisa Buctuanon Computer Science & Information Technology 10, 6, December, 2018
EFFICIENT ADAPTATION OF FUZZY CONTROLLER FOR SMOOTH SENDING RATE TO AVOID CONGESTION IN MULTICAST NETWORKS Deepa V B Computer Science & Information Technology 10, 6, December, 2018
TEXT MINING CUSTOMER REVIEWS FOR ASPECTBASED RESTAURANT RATING Jovelyn C. Cuizon , Jesserine Lopez and Danica Rose Jones Computer Science & Information Technology 10, 6, December, 2018
STEGANOGRAPHIC SUBSTITUTION OF THE LEAST SIGNIFICANT BIT DETERMINED THROUGH ANALYSIS OF THE COVER IMAGE AND THE ENCRYPTED MESSAGE Martha Angelica Garcia-Villa Computer Science & Information Technology 10, 6, December, 2018

More. .

 

About Us | Post Cfp | Share URL Main | Share URL category | Post URL
All Rights Reserved @ Call for Papers - Conference & Journals