|
Issue |
Title |
|
Vol 20, No 3 (2012): Special Issue: Selected Papers from ITI 2012 Conference |
Mixnets: Implementation and Performance Evaluation of Decryption and Re-encryption Types |
Abstract
PDF
|
Pance Ribarski, Ljupcho Antovski |
|
Vol 24, No 2 (2016) |
Mobile Agent-Based Software Systems Modeling Approaches: A Comparative Study |
Abstract
PDF
|
Aissam Belghiat, Elhillali Kerkouche, Allaoua Chaoui, Mokhtar Beldjehem |
|
Vol 17, No 1 (2009): Special Issue on Advanced Mobile Robotics |
Mobile Robot as Physical Agent of Intelligent Space |
Abstract
PDF
|
Drazen Brscic, Hideki Hashimoto |
|
Vol 7, No 2 (1999) |
Mobile Robot Path Planning in 2D Using Network of Equidistant Path |
Abstract
PDF
|
Mladen Crneković, Branko Novaković, Dubravko Majetić |
|
Vol 18, No 2 (2010): The Overseas Contribution to the ITI Conference, including some 2009 Conference Examples |
Model of the Hydro-Information System of the Republic of Macedonia |
Abstract
PDF
|
Blagoj Todor Delipetrev, Dragan Mihajlov, Marjan Delipetrov, Todor Delipetrov |
|
Vol 11, No 1 (2003) |
Modeling a Multi-Agent System for Retrieving Information from Distributed Sources |
Abstract
PDF
|
Sophie-Julie Pelletier, Samuel Pierre, Hai Hoc Hoang |
|
Vol 16, No 4 (2008): Special Issue: Selected Papers from ITI 2008 Conference |
Modeling and Optimization Techniques of Electronic Devices Using Genetic Algorithm |
Abstract
PDF
|
Sherif Michael |
|
Vol 8, No 3 (2000): Special Issue on Real-Time Systems Design |
Modeling and Simulation of a Hard Real-Time Processor |
Abstract
PDF
|
Vlado Glavinić, Stjepan Groš, Matjaž Colnarič |
|
Vol 16, No 2 (2008): Special Issue on Recent Advances in Computer and Communication Networks Technology |
Modeling and Simulation of Quality of Service in VoIP Wireless LAN |
Abstract
PDF
|
Ahmed Al-Naamany, Hadj Bourdoucen, Wadeh Al-Menthari |
|
Vol 24, No 4 (2016) |
Modeling Topological Relationships between Fuzzy Spatio-Temporal Objects |
Abstract
PDF
|
Haitao Cheng, Fu Zhang |
|
Vol 3, No 2 (1995) |
Modeling Trusted Processing Architectures for Mandatory Access Control |
Abstract
PDF
|
Thomas H. Hinke |
|
Vol 23, No 2 (2015) |
Modelling and Evaluating Software Project Risks with Quantitative Analysis Techniques in Planning Software Development |
Abstract
PDF
|
Abdelrafe Elzamly, Burairah Hussin |
|
Vol 9, No 3 (2001): Special Issue on ITI 2001 - Information Technology Interfaces |
Modelling Continuing Professional Development in an Innovative Context |
Abstract
PDF
|
Flemming K. Fink |
|
Vol 5, No 2 (1997) |
Modelling of Seawater Quality Management |
Abstract
PDF
|
Tarzan Legović |
|
Vol 26, No 1 (2018) |
Modified Token Based Congestion Control Scheme for Opportunistic Networks |
Abstract
PDF
|
Emmanuel Adewale Adedokun, Hamisu Abubakar Adamu, Idris Salawu Shaibu |
|
Vol 18, No 2 (2010): The Overseas Contribution to the ITI Conference, including some 2009 Conference Examples |
Motivation for Writing the Paper Risk Effect on Offshore Systems Development Project Cost |
Abstract
PDF
|
Gerald DeHondt II, George Nezlek |
|
Vol 18, No 2 (2010): The Overseas Contribution to the ITI Conference, including some 2009 Conference Examples |
Motivation for Writing the Paper What an Information System Is, and Why Is It Important to Know This : Why I Give Lectures and Seminars |
Abstract
PDF
|
Ray J. Paul |
|
Vol 18, No 2 (2010): The Overseas Contribution to the ITI Conference, including some 2009 Conference Examples |
Motivation for Writing the Paper: Designing Quick and Dirty Applications for Mobiles: Making the Case for the Utility of HCI Principles |
Abstract
PDF
|
Lynne Baillie |
|
Vol 3, No 4 (1995) |
MSSI - Modular Structure of Stochastic Process Information for Power System Control |
Abstract
PDF
|
Juraj Šimunić |
|
Vol 27, No 1 (2019): Special Issue on Agent and Multiagent Systems Design |
Multi-Agent Pursuit-Evasion Game Based on Organizational Architecture |
Abstract
PDF
|
Mohammed El Habib Souidi, Abderrahim Siam, Zhaoyi Pei, Songhao Piao |
|
Vol 14, No 3 (2006) |
Multi-level and Secured Agent-based Intrusion Detection System |
Abstract
PDF
|
Adesina Simon Sodiya |
|
Vol 5, No 2 (1997) |
Multilevel Logic Programming for Software Engineering |
Abstract
PDF
|
Maria Bielikova, Pavol Navrat |
|
Vol 6, No 3 (1998): Special Issue on Emerging Technologies |
Multimedia Interfaces for Educational Systems |
Abstract
PDF
|
Julika Matravers |
|
Vol 26, No 4 (2018) |
Multi-point Security by a Multiplatform-compatible Multifunctional Authentication and Encryption Board |
Abstract
PDF
|
Ravdeep Singh Boparai, Anastasios Alexandridis, Zeljko Zilic |
|
Vol 6, No 4 (1998) |
Multi-Step Differential Approaches for the Localization of 3D Point Landmarks in Medical Images |
Abstract
PDF
|
Sonke Frantz, Karl Rohr, H. Siegfried Stiehl |
|
Vol 2, No 4 (1994) |
Multivariable Decoupling Compensator for a Tank Level Control |
Abstract
PDF
|
Maja Atanasijević-Kunc, Rihard Karba, France Bremšak |
|
Vol 29, No 2 (2021) |
Natural Language Processing Using Neighbour Entropy-based Segmentation |
Abstract
PDF
|
Jianfeng Qiao, Xingzhi Yan, Shuran Lv |
|
Vol 17, No 1 (2009): Special Issue on Advanced Mobile Robotics |
Navigating Dynamic Environments with Trajectory Deformation |
Abstract
PDF
|
Thierry Fraichard, Vivien Delsart |
|
Vol 13, No 4 (2005) |
Navigating Multilingual News Collections Using Automatically Extracted Information |
Abstract
PDF
|
Ralf Steinberger, Bruno Pouliquen, Camelia Ignat |
|
Vol 30, No 4 (2022) |
Negative Emotion Recognition Algorithm of Network Catchwords Based on Language Feature Dimension |
Abstract
PDF
|
Min Wang, Tian Chen, Yanjun Xiao |
|
751 - 780 of 1125 Items |
<< < 21 22 23 24 25 26 27 28 29 30 > >> |