|
Issue |
Title |
|
Vol 23, No 4 (2015): Special Issue on Network Security |
Protecting User Privacy for Cloud Computing by Bivariate Polynomial Based Secret Sharing |
Abstract
PDF
|
Ching-Nung Yang, Jia-Bin Lai, Zhangjie Fu |
|
Vol 1, No 4 (1993) |
Prototyping - a Technique for Participative Information Systems Design |
Abstract
PDF
|
David W. Wilson |
|
Vol 29, No 2 (2021) |
Providing Physical Layer Security for IoTs in the Last Mile |
Abstract
PDF
|
Hong Zhao, Paul Ratazzi |
|
Vol 32, No 3 (2024) |
PW-FBPNN: A Hybrid Fault Diagnosis Method for Power Circuit Systems Combining Principal Component Analysis, Wavelet Packet Transform, and Fuzzy Neural Networks |
Abstract
PDF
|
Xu Chen, Chao Zhang, Haomiao Zhang, Zhiqiang Cheng, Yu Yan |
|
Vol 11, No 3 (2003): Special Issue on ITI 2003 - Information Technology Interfaces |
Qualitative Data Mining and Its Applications |
Abstract
PDF
|
Ivan Bratko, Dorian Šuc |
|
Vol 20, No 4 (2012) |
Quality of Service Issues for Reinforcement Learning Based Routing Algorithm for Ad-Hoc Networks |
Abstract
PDF
|
Shrirang Ambaji Kulkarni, G. Raghavendra Rao |
|
Vol 9, No 3 (2001): Special Issue on ITI 2001 - Information Technology Interfaces |
Quasi-regular Tessellation of Hexagons |
Abstract
PDF
|
Branko Kaučič, Borut Žalik |
|
Vol 12, No 2 (2004): Special Issue on ITI 2004 - Information Technology Interfaces |
Quick Adaptation of Web-Based Information Systems with Aspect-Oriented Features |
Abstract
PDF
|
Sašo Greiner, Simon Tutek, Janez Brest, Viljem Žumer |
|
Vol 9, No 2 (2001) |
Railway Simulation with the CASSANDRA Simulation System |
Abstract
PDF
|
Gábor Szűcs |
|
Vol 31, No 2 (2023) |
RANSAC Algorithm and Distributed Framework for Point Cloud Processing of Ancient Buildings |
Abstract
PDF
|
Zhu Shen, Ni Luo, Wei Wang, Bo Yang |
|
Vol 11, No 1 (2003) |
Real Laboratories for Distance Education |
Abstract
PDF
|
Stuart McCracken, Zeljko Zilic, Henry Chan |
|
Vol 3, No 2 (1995) |
Realizing a Software Design Measurement Tool: Concepts and Results |
Abstract
PDF
|
Christof Ebert |
|
Vol 10, No 4 (2002) |
Reasoning with Non-Numeric Linguistic Variables |
Abstract
PDF
|
Jon Williams, Nigel Steele, Helen Robinson |
|
Vol 4, No 1 (1996) |
Recognition and Learning with Polymorphic Structural Components |
Abstract
PDF
|
Mark Burge, Wilhelm Burger, Wolfgang Mayr |
|
Vol 5, No 4 (1997) |
Recognition of Linguistic Features by Hidden Markov Model (HMM) |
Abstract
PDF
|
Božidar Tepeš, Lajos Szirovicza, Anita Sujoldžić, Martina Primorac |
|
Vol 9, No 2 (2001) |
Recognizing Typeset Documents using Walsh Transformation |
Abstract
PDF
|
Attila Fazekas, András Hajdu |
|
Vol 7, No 3 (1999) |
Reconceptualizing Information Systems as a Field of the Transdiscipline Informing Science: From Ugly Duckling to Swan |
Abstract
PDF
|
Eli Cohen |
|
Vol 18, No 1 (2010) |
Refined Deterministic Algorithm for Biplane Construction |
Abstract
PDF
|
Ivica Martinjak, Mario-Osvin Pavčević |
|
Vol 31, No 3 (2023) |
Refining Short-Term Power Load Forecasting: An Optimized Model with Long Short-Term Memory Network |
Abstract
PDF
|
Sile Hu, Wenbin Cai, Jun Liu, Hao Shi, Jiawei Yu |
|
Vol 21, No 4 (2013) |
Relationships Between Relevant Contextual Influences and Information Security Threats and Controls in Global Financial Services Industry |
Abstract
PDF
|
Princely Ifinedo |
|
Vol 22, No 4 (2014) |
Relay Selection Considering Successive Packets Transmission in Cooperative Communication Networks |
Abstract
PDF
|
Qilin Wu, Xianzhong Zhou, Shiyi Wang |
|
Vol 7, No 1 (1999): Special Issue on Evolutionary Computing |
Replacement Strategies in Steady State Genetic Algorithms: Dynamic Environments |
Abstract
PDF
|
Jim E. Smith, Frantisek Vavak |
|
Vol 22, No 1 (2014) |
Report on Plagiarism Case |
Abstract
PDF
|
Vlado Glavinić |
|
Vol 9, No 3 (2001): Special Issue on ITI 2001 - Information Technology Interfaces |
Representing Time-dependent Information in Multidimensional XML |
Abstract
PDF
|
Theodoros Mitakos, Manolis Gergatsoulis, Yannis Stavrakas, Efstathios V. Ioannidis |
|
Vol 7, No 4 (1999) |
Re-routing Multicast Connections: A Distributed Approach |
Abstract
PDF
|
Roman Novak, Jože Rugelj, Gorazd Kandus |
|
Vol 21, No 3 (2013) |
Research and Pedagogy in Business Analytics: Opportunities and Illustrative Examples |
Abstract
PDF
|
Ramesh Sharda, Daniel Adomako Asamoah, Natraj Ponna |
|
Vol 22, LISS 2013, 2014 |
Research on Cluster Analysis Method of E-government Public Hotspot Information Based on Web Log Analysis |
Abstract
PDF
|
Suozhu Wang, Jianlin Zhang, Fuze Yang, Jia Ye |
|
Vol 22, LISS 2013, 2014 |
Research on Construction and Application of Individual Knowledge Management Maturity Evaluation Model |
Abstract
PDF
|
Dan Chang, Xiaoying Han, Baowei Chen |
|
Vol 30, No 3 (2022) |
Research on Keywords Variations in Linguistics Based on TF-IDF and N-gram |
Abstract
PDF
|
Yuyao Li, Xueyi Wen, Xingyu Liu |
|
Vol 24, No 2 (2016) |
Research on Outage Performance Optimization of Cognitive Relay Network with Cooperative Sensing |
Abstract
PDF
|
Yaolian Song, YuHao Li, Shujuan Wang, Ya Zhang |
|
871 - 900 of 1140 Items |
<< < 25 26 27 28 29 30 31 32 33 34 > >> |