Browse Title Index


 
Issue Title
 
Vol 1, No 3 (1993) Pronominal and Anaphor Resolution Abstract   PDF
Nikitas N. Karanikolas
 
Vol 23, No 4 (2015): Special Issue on Network Security Protecting User Privacy for Cloud Computing by Bivariate Polynomial Based Secret Sharing Abstract   PDF
Ching-Nung Yang, Jia-Bin Lai, Zhangjie Fu
 
Vol 1, No 4 (1993) Prototyping - a Technique for Participative Information Systems Design Abstract   PDF
David W. Wilson
 
Vol 29, No 2 (2021) Providing Physical Layer Security for IoTs in the Last Mile Abstract   PDF
Hong Zhao, Paul Ratazzi
 
Vol 11, No 3 (2003): Special Issue on ITI 2003 - Information Technology Interfaces Qualitative Data Mining and Its Applications Abstract   PDF
Ivan Bratko, Dorian Šuc
 
Vol 20, No 4 (2012) Quality of Service Issues for Reinforcement Learning Based Routing Algorithm for Ad-Hoc Networks Abstract   PDF
Shrirang Ambaji Kulkarni, G. Raghavendra Rao
 
Vol 9, No 3 (2001): Special Issue on ITI 2001 - Information Technology Interfaces Quasi-regular Tessellation of Hexagons Abstract   PDF
Branko Kaučič, Borut Žalik
 
Vol 12, No 2 (2004): Special Issue on ITI 2004 - Information Technology Interfaces Quick Adaptation of Web-Based Information Systems with Aspect-Oriented Features Abstract   PDF
Sašo Greiner, Simon Tutek, Janez Brest, Viljem Žumer
 
Vol 9, No 2 (2001) Railway Simulation with the CASSANDRA Simulation System Abstract   PDF
Gábor Szűcs
 
Vol 31, No 2 (2023) RANSAC Algorithm and Distributed Framework for Point Cloud Processing of Ancient Buildings Abstract   PDF
Zhu Shen, Ni Luo, Wei Wang, Bo Yang
 
Vol 11, No 1 (2003) Real Laboratories for Distance Education Abstract   PDF
Stuart McCracken, Zeljko Zilic, Henry Chan
 
Vol 3, No 2 (1995) Realizing a Software Design Measurement Tool: Concepts and Results Abstract   PDF
Christof Ebert
 
Vol 10, No 4 (2002) Reasoning with Non-Numeric Linguistic Variables Abstract   PDF
Jon Williams, Nigel Steele, Helen Robinson
 
Vol 4, No 1 (1996) Recognition and Learning with Polymorphic Structural Components Abstract   PDF
Mark Burge, Wilhelm Burger, Wolfgang Mayr
 
Vol 5, No 4 (1997) Recognition of Linguistic Features by Hidden Markov Model (HMM) Abstract   PDF
Božidar Tepeš, Lajos Szirovicza, Anita Sujoldžić, Martina Primorac
 
Vol 9, No 2 (2001) Recognizing Typeset Documents using Walsh Transformation Abstract   PDF
Attila Fazekas, András Hajdu
 
Vol 7, No 3 (1999) Reconceptualizing Information Systems as a Field of the Transdiscipline Informing Science: From Ugly Duckling to Swan Abstract   PDF
Eli Cohen
 
Vol 18, No 1 (2010) Refined Deterministic Algorithm for Biplane Construction Abstract   PDF
Ivica Martinjak, Mario-Osvin Pavčević
 
Vol 31, No 3 (2023) Refining Short-Term Power Load Forecasting: An Optimized Model with Long Short-Term Memory Network Abstract   PDF
Sile  Hu, Wenbin  Cai, Jun  Liu, Hao Shi, Jiawei  Yu
 
Vol 21, No 4 (2013) Relationships Between Relevant Contextual Influences and Information Security Threats and Controls in Global Financial Services Industry Abstract   PDF
Princely Ifinedo
 
Vol 22, No 4 (2014) Relay Selection Considering Successive Packets Transmission in Cooperative Communication Networks Abstract   PDF
Qilin Wu, Xianzhong Zhou, Shiyi Wang
 
Vol 7, No 1 (1999): Special Issue on Evolutionary Computing Replacement Strategies in Steady State Genetic Algorithms: Dynamic Environments Abstract   PDF
Jim E. Smith, Frantisek Vavak
 
Vol 22, No 1 (2014) Report on Plagiarism Case Abstract   PDF
Vlado Glavinić
 
Vol 9, No 3 (2001): Special Issue on ITI 2001 - Information Technology Interfaces Representing Time-dependent Information in Multidimensional XML Abstract   PDF
Theodoros Mitakos, Manolis Gergatsoulis, Yannis Stavrakas, Efstathios V. Ioannidis
 
Vol 7, No 4 (1999) Re-routing Multicast Connections: A Distributed Approach Abstract   PDF
Roman Novak, Jože Rugelj, Gorazd Kandus
 
Vol 21, No 3 (2013) Research and Pedagogy in Business Analytics: Opportunities and Illustrative Examples Abstract   PDF
Ramesh Sharda, Daniel Adomako Asamoah, Natraj Ponna
 
Vol 22, LISS 2013, 2014 Research on Cluster Analysis Method of E-government Public Hotspot Information Based on Web Log Analysis Abstract   PDF
Suozhu Wang, Jianlin Zhang, Fuze Yang, Jia Ye
 
Vol 22, LISS 2013, 2014 Research on Construction and Application of Individual Knowledge Management Maturity Evaluation Model Abstract   PDF
Dan Chang, Xiaoying Han, Baowei Chen
 
Vol 30, No 3 (2022) Research on Keywords Variations in Linguistics Based on TF-IDF and N-gram Abstract   PDF
Yuyao Li, Xueyi Wen, Xingyu Liu
 
Vol 24, No 2 (2016) Research on Outage Performance Optimization of Cognitive Relay Network with Cooperative Sensing Abstract   PDF
Yaolian Song, YuHao Li, Shujuan Wang, Ya Zhang
 
841 - 870 of 1107 Items << < 24 25 26 27 28 29 30 31 32 33 > >>