|
Issue |
Title |
|
Vol 4, No 2 (1996) |
A Methodology for Topological Design of Computer Communication Networks under Link Reliability Constraints |
Abstract
PDF
|
Debashis Saha, Amitava Mukherjee |
|
Vol 4, No 3 (1996) |
A Model of a Shallow Water Hydroacoustical Communication Channel |
Abstract
PDF
|
Goran Hudec |
|
Vol 13, No 3 (2005) |
A Modified Shared-tree Multicast Routing Protocol in Ad Hoc Network |
Abstract
PDF
|
Ziping Liu, Bidyut Gupta |
|
Vol 4, No 1 (1996) |
A Module for Automated Generation of Planar Object Descriptions |
Abstract
PDF
|
Zoran Kalafatić, Slobodan Ribarić |
|
Vol 25, No 4 (2017) |
A Multi Agent Based Organizational Architecture for Dynamic Pickup and Delivery Problem |
Abstract
PDF
|
Tahar Guerram |
|
Vol 19, No 4 (2011): Special Issue: Selected Papers from ITI 2011 Conference |
A Multilingual Chat System with Image Presentation for Detecting Mistranslation |
Abstract
PDF
|
Eri Hosogai, Tsubasa Mukai, Sinyu Jung, Yasufumi Kowase, Antoine Bossard, Yong Xu, Masatoshi Ishikawa, Keiichi Kaneko |
|
Vol 14, No 1 (2006): Special Issue on Computer-Assisted Craniofacial Reconstruction and Modeling |
A Multi-Modality Computer-Aided Framework Towards Postmortem Identification |
Abstract
PDF
|
Andreas Mang, Jan Müller, Thorsten M Buzug |
|
Vol 2, No 2 (1994) |
A Multiprocessor System for Performing Mail Sorting in Real Time |
Abstract
PDF
|
D. L. Andrews, R. Brown, C. Caldwell, A. R. Hennessey |
|
Vol 15, No 1 (2007) |
A Natural Language Architecture |
Abstract
PDF
|
Adesina Simon Sodiya |
|
Vol 31, No 2 (2023) |
A Network Intrusion Detection Model Based on GA-Improved NSA |
Abstract
PDF
|
Long Li |
|
Vol 10, No 3 (2002): Special Issue on ITI 2002 - Information Technology Interfaces |
A New Approach for Vertex Guarding of Planar Graphs |
Abstract
PDF
|
Branko Kaučič, Borut Žalik |
|
Vol 11, No 4 (2003) |
A New Approach in CAD System for Designing Shoes |
Abstract
PDF
|
Simon Kolmanič, Nikola Guid |
|
Vol 21, No 3 (2013) |
A New Model for Semiautomatic Student Source Code Assessment |
Abstract
PDF
|
Emil Stankov, Mile Jovanov, Ana Madevska Bogdanova, Marjan Gusev |
|
Vol 24, No 3 (2016) |
A New QoS-Aware Routing Protocol for MANET Using Artificial Neural Network |
Abstract
PDF
|
Prakash Srivastava, Rakesh Kumar |
|
Vol 15, No 3 (2007) |
A New Signal Type Classifier for Fading Environments |
Abstract
PDF
|
Ataollah Ebrahimzadeh, Gholam Reza Ardeshir |
|
Vol 16, No 2 (2008): Special Issue on Recent Advances in Computer and Communication Networks Technology |
A Niched Pareto GA Approach for Scheduling Scientific Workflows in Wireless Grids |
Abstract
PDF
|
Shajulin Benedict, V. Vasudevan |
|
Vol 28, No 2 (2020) |
A Nonlinear System Identification Method Based on Adaptive Neural Network |
Abstract
PDF
|
Junju Sun, Liyun Lin |
|
Vol 24, No 3 (2016) |
A Novel Load Balancing Scheme for Multipath Routing Protocol in MANET |
Abstract
PDF
|
Kokilamani Mounagurusamy, Karthikeyan Eswaramurthy |
|
Vol 13, No 3 (2005) |
A Novel Modified Secant Method for Computing the Fair Share Rate |
Abstract
PDF
|
Dong Wei, Nirwan Ansari |
|
Vol 20, No 2 (2012) |
A One-Time Server-Specific Password Authentication Scheme |
Abstract
PDF
|
Adebukola Onashoga, Adesina Sodiya, A. Afolorunso |
|
Vol 15, No 1 (2007) |
A Paradigm for Object-Oriented Conceptual Modeling of Optical Networks |
Abstract
PDF
|
Sudip Misra, Subhas Misra, Isaac Woungang |
|
Vol 22, No 4 (2014) |
A Parallel Hyper-heuristic Approach for the Two-dimensional Rectangular Strip-packing Problem |
Abstract
PDF
|
Istvan Borgulya |
|
Vol 27, No 2 (2019) |
A Parallelization of Non-Serial Polyadic Dynamic Programming on GPU |
Abstract
PDF
|
Tausif Diwan, Jitendra Tembhurne |
|
Vol 16, No 3 (2008) |
A Patient-specific Knee Joint Computer Model Using MRI Data and 'in vivo' Compressive Load from the Optical Force Measuring System |
Abstract
PDF
|
Bozidar Potocnik, Damjan Zazula, Boris Cigale, Dusan Heric, Edvard Cibula, Tomaz Tomazic |
|
Vol 27, No 2 (2019) |
A Phishing Webpage Detection Method Based on Stacked Autoencoder and Correlation Coefficients |
Abstract
PDF
|
Jian Feng, Lianyang Zou, Tianzhu Nan |
|
Vol 30, No 2 (2022) |
A Prey-Predator Defence Mechanism For Ad Hoc On-Demand Distance Vector Routing Protocol |
Abstract
PDF
|
Abiodun Akinwale, Emmanuel Ajayi Olajubu, Ganiyu Adesola Aderounmu |
|
Vol 10, No 2 (2002) |
A Procedure of Conversion of Relational into Multidimensional Database Schema |
Abstract
PDF
|
Mladen Varga |
|
Vol 22, No 2 (2014) |
A Proposal to Expand the Community of Users Able to Process Historical Rainfall Data by Means of the Today Available Open Source Libraries |
Abstract
PDF
|
Paolino Di Felice, Luca Finocchio, Daniele Leombruni, Vittoriano Muttillo |
|
Vol 19, No 2 (2011) |
A Recovery Scheme for Cluster Federations Using Sender-based Message Logging |
Abstract
PDF
|
Bidyut Gupta, Ruslan Nikolaev, Raja Chirra |
|
Vol 22, No 1 (2014) |
A Review of Cross-layer Design in Dynamic Spectrum Access for Cognitive Radio Networks |
Abstract
PDF
|
G. Shine Let, G. Josemin Bala |
|
61 - 90 of 1125 Items |
<< < 1 2 3 4 5 6 7 8 9 10 > >> |