| Issue | Title | |
| Vol 5, No 4 (1997) | A Lossless Hybrid Shape-Adaptive Image Coder | Abstract PDF |
| J. Wang, P. Ogunbona, G. Naghdy | ||
| Vol 28, No 2 (2020) | A Markov-Based Intrusion Tolerance Finite Automaton | Abstract PDF |
| Fengquan Li | ||
| Vol 11, No 2 (2003) | A Method for Improving Efficiency of Static Program Graph Scheduling | Abstract PDF |
| Aleksander Kvas, Milan Ojsteršek | ||
| Vol 3, No 1 (1995) | A Method for the Generation of Correlated Random Processes | Abstract PDF |
| Maurizio Andronico, Salvatore Casale, Aurelio La Corte | ||
| Vol 4, No 2 (1996) | A Methodology for Topological Design of Computer Communication Networks under Link Reliability Constraints | Abstract PDF |
| Debashis Saha, Amitava Mukherjee | ||
| Vol 4, No 3 (1996) | A Model of a Shallow Water Hydroacoustical Communication Channel | Abstract PDF |
| Goran Hudec | ||
| Vol 13, No 3 (2005) | A Modified Shared-tree Multicast Routing Protocol in Ad Hoc Network | Abstract PDF |
| Ziping Liu, Bidyut Gupta | ||
| Vol 4, No 1 (1996) | A Module for Automated Generation of Planar Object Descriptions | Abstract PDF |
| Zoran Kalafatić, Slobodan Ribarić | ||
| Vol 25, No 4 (2017) | A Multi Agent Based Organizational Architecture for Dynamic Pickup and Delivery Problem | Abstract PDF |
| Tahar Guerram | ||
| Vol 19, No 4 (2011): Special Issue: Selected Papers from ITI 2011 Conference | A Multilingual Chat System with Image Presentation for Detecting Mistranslation | Abstract PDF |
| Eri Hosogai, Tsubasa Mukai, Sinyu Jung, Yasufumi Kowase, Antoine Bossard, Yong Xu, Masatoshi Ishikawa, Keiichi Kaneko | ||
| Vol 14, No 1 (2006): Special Issue on Computer-Assisted Craniofacial Reconstruction and Modeling | A Multi-Modality Computer-Aided Framework Towards Postmortem Identification | Abstract PDF |
| Andreas Mang, Jan Müller, Thorsten M Buzug | ||
| Vol 2, No 2 (1994) | A Multiprocessor System for Performing Mail Sorting in Real Time | Abstract PDF |
| D. L. Andrews, R. Brown, C. Caldwell, A. R. Hennessey | ||
| Vol 15, No 1 (2007) | A Natural Language Architecture | Abstract PDF |
| Adesina Simon Sodiya | ||
| Vol 31, No 2 (2023) | A Network Intrusion Detection Model Based on GA-Improved NSA | Abstract PDF |
| Long Li | ||
| Vol 10, No 3 (2002): Special Issue on ITI 2002 - Information Technology Interfaces | A New Approach for Vertex Guarding of Planar Graphs | Abstract PDF |
| Branko Kaučič, Borut Žalik | ||
| Vol 11, No 4 (2003) | A New Approach in CAD System for Designing Shoes | Abstract PDF |
| Simon Kolmanič, Nikola Guid | ||
| Vol 21, No 3 (2013) | A New Model for Semiautomatic Student Source Code Assessment | Abstract PDF |
| Emil Stankov, Mile Jovanov, Ana Madevska Bogdanova, Marjan Gusev | ||
| Vol 24, No 3 (2016) | A New QoS-Aware Routing Protocol for MANET Using Artificial Neural Network | Abstract PDF |
| Prakash Srivastava, Rakesh Kumar | ||
| Vol 15, No 3 (2007) | A New Signal Type Classifier for Fading Environments | Abstract PDF |
| Ataollah Ebrahimzadeh, Gholam Reza Ardeshir | ||
| Vol 16, No 2 (2008): Special Issue on Recent Advances in Computer and Communication Networks Technology | A Niched Pareto GA Approach for Scheduling Scientific Workflows in Wireless Grids | Abstract PDF |
| Shajulin Benedict, V. Vasudevan | ||
| Vol 28, No 2 (2020) | A Nonlinear System Identification Method Based on Adaptive Neural Network | Abstract PDF |
| Junju Sun, Liyun Lin | ||
| Vol 24, No 3 (2016) | A Novel Load Balancing Scheme for Multipath Routing Protocol in MANET | Abstract PDF |
| Kokilamani Mounagurusamy, Karthikeyan Eswaramurthy | ||
| Vol 13, No 3 (2005) | A Novel Modified Secant Method for Computing the Fair Share Rate | Abstract PDF |
| Dong Wei, Nirwan Ansari | ||
| Vol 20, No 2 (2012) | A One-Time Server-Specific Password Authentication Scheme | Abstract PDF |
| Adebukola Onashoga, Adesina Sodiya, A. Afolorunso | ||
| Vol 15, No 1 (2007) | A Paradigm for Object-Oriented Conceptual Modeling of Optical Networks | Abstract PDF |
| Sudip Misra, Subhas Misra, Isaac Woungang | ||
| Vol 22, No 4 (2014) | A Parallel Hyper-heuristic Approach for the Two-dimensional Rectangular Strip-packing Problem | Abstract PDF |
| Istvan Borgulya | ||
| Vol 27, No 2 (2019) | A Parallelization of Non-Serial Polyadic Dynamic Programming on GPU | Abstract PDF |
| Tausif Diwan, Jitendra Tembhurne | ||
| Vol 16, No 3 (2008) | A Patient-specific Knee Joint Computer Model Using MRI Data and 'in vivo' Compressive Load from the Optical Force Measuring System | Abstract PDF |
| Bozidar Potocnik, Damjan Zazula, Boris Cigale, Dusan Heric, Edvard Cibula, Tomaz Tomazic | ||
| Vol 27, No 2 (2019) | A Phishing Webpage Detection Method Based on Stacked Autoencoder and Correlation Coefficients | Abstract PDF |
| Jian Feng, Lianyang Zou, Tianzhu Nan | ||
| Vol 30, No 2 (2022) | A Prey-Predator Defence Mechanism For Ad Hoc On-Demand Distance Vector Routing Protocol | Abstract PDF |
| Abiodun Akinwale, Emmanuel Ajayi Olajubu, Ganiyu Adesola Aderounmu | ||
| 61 - 90 of 1152 Items | << < 1 2 3 4 5 6 7 8 9 10 > >> | |
Journal of Computing and Information Technology

