| Issue | Title | |
| Vol 16, No 4 (2008): Special Issue: Selected Papers from ITI 2008 Conference | Modeling and Optimization Techniques of Electronic Devices Using Genetic Algorithm | Abstract PDF |
| Sherif Michael | ||
| Vol 8, No 3 (2000): Special Issue on Real-Time Systems Design | Modeling and Simulation of a Hard Real-Time Processor | Abstract PDF |
| Vlado Glavinić, Stjepan Groš, Matjaž Colnarič | ||
| Vol 16, No 2 (2008): Special Issue on Recent Advances in Computer and Communication Networks Technology | Modeling and Simulation of Quality of Service in VoIP Wireless LAN | Abstract PDF |
| Ahmed Al-Naamany, Hadj Bourdoucen, Wadeh Al-Menthari | ||
| Vol 24, No 4 (2016) | Modeling Topological Relationships between Fuzzy Spatio-Temporal Objects | Abstract PDF |
| Haitao Cheng, Fu Zhang | ||
| Vol 3, No 2 (1995) | Modeling Trusted Processing Architectures for Mandatory Access Control | Abstract PDF |
| Thomas H. Hinke | ||
| Vol 23, No 2 (2015) | Modelling and Evaluating Software Project Risks with Quantitative Analysis Techniques in Planning Software Development | Abstract PDF |
| Abdelrafe Elzamly, Burairah Hussin | ||
| Vol 9, No 3 (2001): Special Issue on ITI 2001 - Information Technology Interfaces | Modelling Continuing Professional Development in an Innovative Context | Abstract PDF |
| Flemming K. Fink | ||
| Vol 5, No 2 (1997) | Modelling of Seawater Quality Management | Abstract PDF |
| Tarzan Legović | ||
| Vol 26, No 1 (2018) | Modified Token Based Congestion Control Scheme for Opportunistic Networks | Abstract PDF |
| Emmanuel Adewale Adedokun, Hamisu Abubakar Adamu, Idris Salawu Shaibu | ||
| Vol 18, No 2 (2010): The Overseas Contribution to the ITI Conference, including some 2009 Conference Examples | Motivation for Writing the Paper Risk Effect on Offshore Systems Development Project Cost | Abstract PDF |
| Gerald DeHondt II, George Nezlek | ||
| Vol 18, No 2 (2010): The Overseas Contribution to the ITI Conference, including some 2009 Conference Examples | Motivation for Writing the Paper What an Information System Is, and Why Is It Important to Know This : Why I Give Lectures and Seminars | Abstract PDF |
| Ray J. Paul | ||
| Vol 18, No 2 (2010): The Overseas Contribution to the ITI Conference, including some 2009 Conference Examples | Motivation for Writing the Paper: Designing Quick and Dirty Applications for Mobiles: Making the Case for the Utility of HCI Principles | Abstract PDF |
| Lynne Baillie | ||
| Vol 3, No 4 (1995) | MSSI - Modular Structure of Stochastic Process Information for Power System Control | Abstract PDF |
| Juraj Šimunić | ||
| Vol 27, No 1 (2019): Special Issue on Agent and Multiagent Systems Design | Multi-Agent Pursuit-Evasion Game Based on Organizational Architecture | Abstract PDF |
| Mohammed El Habib Souidi, Abderrahim Siam, Zhaoyi Pei, Songhao Piao | ||
| Vol 14, No 3 (2006) | Multi-level and Secured Agent-based Intrusion Detection System | Abstract PDF |
| Adesina Simon Sodiya | ||
| Vol 5, No 2 (1997) | Multilevel Logic Programming for Software Engineering | Abstract PDF |
| Maria Bielikova, Pavol Navrat | ||
| Vol 6, No 3 (1998): Special Issue on Emerging Technologies | Multimedia Interfaces for Educational Systems | Abstract PDF |
| Julika Matravers | ||
| Vol 26, No 4 (2018) | Multi-point Security by a Multiplatform-compatible Multifunctional Authentication and Encryption Board | Abstract PDF |
| Ravdeep Singh Boparai, Anastasios Alexandridis, Zeljko Zilic | ||
| Vol 6, No 4 (1998) | Multi-Step Differential Approaches for the Localization of 3D Point Landmarks in Medical Images | Abstract PDF |
| Sonke Frantz, Karl Rohr, H. Siegfried Stiehl | ||
| Vol 2, No 4 (1994) | Multivariable Decoupling Compensator for a Tank Level Control | Abstract PDF |
| Maja Atanasijević-Kunc, Rihard Karba, France Bremšak | ||
| Vol 29, No 2 (2021) | Natural Language Processing Using Neighbour Entropy-based Segmentation | Abstract PDF |
| Jianfeng Qiao, Xingzhi Yan, Shuran Lv | ||
| Vol 17, No 1 (2009): Special Issue on Advanced Mobile Robotics | Navigating Dynamic Environments with Trajectory Deformation | Abstract PDF |
| Thierry Fraichard, Vivien Delsart | ||
| Vol 13, No 4 (2005) | Navigating Multilingual News Collections Using Automatically Extracted Information | Abstract PDF |
| Ralf Steinberger, Bruno Pouliquen, Camelia Ignat | ||
| Vol 30, No 4 (2022) | Negative Emotion Recognition Algorithm of Network Catchwords Based on Language Feature Dimension | Abstract PDF |
| Min Wang, Tian Chen, Yanjun Xiao | ||
| Vol 28, No 2 (2020) | Network Connectivity Game | Abstract PDF |
| Darko Skorin-Kapov, Jadranka Skorin-Kapov | ||
| Vol 33, No 3 (2025) | Network Information Processing Analysis Based on Big Data Parallel Graph Partitioning Algorithm | Abstract PDF |
| Keqing Guan, Xianli Kong | ||
| Vol 32, No 2 (2024) | Network Intrusion Detection Based on Convolutional Recurrent Neural Network, Random Forest, and Federated Learning | Abstract PDF |
| Qianying Zou, Yushi Li, Xinyue Jiang, Yuepeng Zan, Fengyu Liu | ||
| Vol 20, No 1 (2012) | Network Traffic Deviation Detection Based on Fractal Dimension | Abstract PDF |
| Afshin Shaabany, Fatemeh Jamshidi | ||
| Vol 7, No 3 (1999) | Network-Based Education | Abstract PDF |
| Mladen A. Vouk | ||
| Vol 25, No 3 (2017) | Networked Non-fragile H∞ Control for Lipschitz Nonlinear System with Quantization and Packet Dropout in Both Feedback and Forward Channels | Abstract PDF |
| Weiguo Ma, Xia Xu, Hairong Zhu | ||
| 781 - 810 of 1152 Items | << < 22 23 24 25 26 27 28 29 30 31 > >> | |
Journal of Computing and Information Technology

