| Issue | Title | |
| Vol 7, No 4 (1999) | List of Referees: CIT Vol. 7 (1999), No 1–4 | Details PDF |
| CIT Editorial Office | ||
| Vol 8, No 4 (2000): Special Issue on ITI 2000 - Information Technology Interfaces | List of Referees: CIT Vol. 8 (2000), No 1–4 | Details PDF |
| CIT Editorial Office | ||
| Vol 9, No 4 (2001): Special Issue on Domain-Specific Languages Part I | List of Referees: CIT Vol. 9 (2001), No 1–4 | Details PDF |
| CIT Editorial Office | ||
| Vol 24, No 2 (2016) | Liveness and Reachability Analysis of BPMN Process Models | Abstract PDF |
| Anass Rachdi, Abdeslam En-Nouaary, Mohamed Dahchour | ||
| Vol 27, No 2 (2019) | Load Balancing Dynamic Source Routing Protocol Based on Multi-Path Routing | Abstract PDF |
| Zhongping Chen | ||
| Vol 17, No 2 (2009) | Load Balancing: An Approach Based on Clustering in Ad Hoc Networks | Abstract PDF |
| Rachida Aoudjit, Mustapha Lalam, Abdelaziz M’zoughi, Malika Belkadi, Mehammed Daoui | ||
| Vol 3, No 4 (1995) | Looking for Visual Primitives | Abstract PDF |
| C. Arcelli, L. P. Cordella, L. De Floriani | ||
| Vol 16, No 4 (2008): Special Issue: Selected Papers from ITI 2008 Conference | Love Emotions between Laura and Petrarch – an Approach by Mathematics and System Dynamics | Abstract PDF |
| Felix Breitenecker, Florian Judex, Nikolas Popper, Katharina Breitenecker, Anna Mathe, Andreas Mathe | ||
| Vol 15, No 1 (2007) | Low Cost, Cross-language and Cross-platform Information Retrieval and Documentation Tools | Abstract PDF |
| Nikitas N. Karanikolas | ||
| Vol 5, No 3 (1997) | LZ compression of static linked list tries | Abstract PDF |
| Strahil Ristov, Damir Boras, Tomislava Lauc | ||
| Vol 22, No 2 (2014) | Managing Software Project Risks (Analysis Phase) with Proposed Fuzzy Regression Analysis Modelling Techniques with Fuzzy Concepts | Abstract PDF |
| Abdelrafe Elzamly, Burairah Hussin | ||
| Vol 18, No 2 (2010): The Overseas Contribution to the ITI Conference, including some 2009 Conference Examples | Manifestations of Culture in Website Design | Abstract PDF |
| Inhwa Kim, Jasna Kuljis | ||
| Vol 2, No 2 (1994) | Mapping Programs on a Torus-like Transputer Network | Abstract PDF |
| Peter Kolbezen, Peter Zaveršek | ||
| Vol 26, No 1 (2018) | Market Segmentation Analysis and Visualization using K-Mode Clustering Algorithm for E-Commerce Business | Abstract PDF |
| Deepali Kamthania, Ashish Pawa, Sirijit Madhavan | ||
| Vol 2, No 2 (1994) | Maximum Entropy Segmentation Based on the Autocorrelation Function of the Image Histogram | Abstract PDF |
| Anton Brink | ||
| Vol 9, No 3 (2001): Special Issue on ITI 2001 - Information Technology Interfaces | Measuring and Monitoring Movements in Course Interest at the University Computing Centre: A Statistical Platform for Quality Improvement and New Course Deployment Decisions | Abstract PDF |
| Vesna Lužar-Stiffler, Miroslav Milinović, Charles Stiffler | ||
| Vol 18, No 4 (2010): Special Issue from the 2010 ITI Conference | Measuring True Performance of the Work Function Algorithm for Solving the On-line k-Server Problem | Abstract PDF |
| Tomislav Rudec, Alfonzo Baumgartner, Robert Manger | ||
| Vol 12, No 2 (2004): Special Issue on ITI 2004 - Information Technology Interfaces | Methodological Framework of Business Reengineering within Logistics System | Abstract PDF |
| Marina Čičin-Šain, Slavomir Vukmirović, Zvonko Čapko | ||
| Vol 17, No 2 (2009) | mFrame: An Application Framework for Mobile Resource-constrained Computing Environments | Abstract PDF |
| Hinko Vincar, Hossein Saiedian, Serhiy Morozov | ||
| Vol 24, No 4 (2016) | Microcanonical Annealing and Threshold Accepting for Parameter Determination and Feature Selection of Support Vector Machines | Abstract PDF |
| Seyyid Ahmed Medjahed, Tamazouzt Ait Saadi, Abdelkader Benyettou, Mohammed Ouali | ||
| Vol 23, No 3 (2015) | Mining Individual Behavior Pattern Based on Semantic Knowledge Discovery of Trajectory | Abstract PDF |
| Min Ren, Feng Yang, Guangchun Zhou, Haiping Wang | ||
| Vol 15, No 1 (2007) | Missing Data Correction in Still Images Using Multi-Resolution Analysis | Abstract PDF |
| Blerim Mustafa, Vladimir Trajkovik, Danco Davcev | ||
| Vol 24, No 3 (2016) | Mitigating Malicious Attacks Using Trust Based Secure-BEFORE Routing Strategy in Mobile Ad Hoc Networks | Abstract PDF |
| Rutuja Shah, Sumathy Subramaniam, Dhinesh Babu Lekala Dasarathan | ||
| Vol 25, No 2 (2017) | Mix Multiple Features to Evaluate the Content and the Linguistic Quality of Text Summaries | Abstract PDF |
| Samira Ellouze, Maher Jaoua, Lamia Hadrich Belguith | ||
| Vol 20, No 3 (2012): Special Issue: Selected Papers from ITI 2012 Conference | Mixnets: Implementation and Performance Evaluation of Decryption and Re-encryption Types | Abstract PDF |
| Pance Ribarski, Ljupcho Antovski | ||
| Vol 24, No 2 (2016) | Mobile Agent-Based Software Systems Modeling Approaches: A Comparative Study | Abstract PDF |
| Aissam Belghiat, Elhillali Kerkouche, Allaoua Chaoui, Mokhtar Beldjehem | ||
| Vol 17, No 1 (2009): Special Issue on Advanced Mobile Robotics | Mobile Robot as Physical Agent of Intelligent Space | Abstract PDF |
| Drazen Brscic, Hideki Hashimoto | ||
| Vol 7, No 2 (1999) | Mobile Robot Path Planning in 2D Using Network of Equidistant Path | Abstract PDF |
| Mladen Crneković, Branko Novaković, Dubravko Majetić | ||
| Vol 18, No 2 (2010): The Overseas Contribution to the ITI Conference, including some 2009 Conference Examples | Model of the Hydro-Information System of the Republic of Macedonia | Abstract PDF |
| Blagoj Todor Delipetrev, Dragan Mihajlov, Marjan Delipetrov, Todor Delipetrov | ||
| Vol 11, No 1 (2003) | Modeling a Multi-Agent System for Retrieving Information from Distributed Sources | Abstract PDF |
| Sophie-Julie Pelletier, Samuel Pierre, Hai Hoc Hoang | ||
| 751 - 780 of 1152 Items | << < 21 22 23 24 25 26 27 28 29 30 > >> | |
Journal of Computing and Information Technology

