|
Issue |
Title |
|
Vol 17, No 2 (2009) |
TUKAB: An Efficient NAT Traversal Scheme on Security of VoIP Network System Based on Session Initiation Protocol |
Abstract
PDF
|
K. M. Azharul Hasan, Ifta Khirul, Kamrul Islam |
|
Vol 20, No 4 (2012) |
Twenty Years of CIT: An Interview with the first Editor-in-Chief Leo Budin |
Abstract
PDF
|
Leo Budin's Interview Given to Nataša Dobrenić |
|
Vol 7, No 2 (1999) |
Two-Phase Load Modelling in Three-Phase Load Flow |
Abstract
PDF
|
Zdravko Hebel, Ivica Pavić, Marko Delimar |
|
Vol 6, No 2 (1998): Special Issue on Biomedical Image Processing and Analysis |
Ultrasound Image Segmentation using Stochastic Templates |
Abstract
PDF
|
C. A. Glasbey |
|
Vol 17, No 4 (2009) |
UML Modeling of Network Topologies for Distributed Computer System |
Abstract
PDF
|
Vipin Saxena, Deepak Arora |
|
Vol 4, No 2 (1996) |
Understanding and Supporting Information Systems Evaluation |
Abstract
PDF
|
Vasilis Serafeimidis, Steve Smithson |
|
Vol 25, No 1 (2017) |
Unibot, a Universal Agent Architecture for Robots |
Abstract
PDF
|
Goran Zaharija, Saša Mladenović, Lada Maleš |
|
Vol 4, No 4 (1996) |
University Automated Timetabling |
Abstract
PDF
|
Nuno Mamede, Pedro Soares |
|
Vol 21, No 4 (2013) |
Unsupervised Color Image Segmentation Based on Non Parametric Clustering |
Abstract
PDF
|
Imène Kirati, Yamina Tlili |
|
Vol 16, No 4 (2008): Special Issue: Selected Papers from ITI 2008 Conference |
Useful Oblivion Versus Information Overload in e-Learning Examples in the Context of Wiki Systems |
Abstract
PDF
|
Christian Stickel, Martin Ebner, Andreas Holzinger |
|
Vol 10, No 3 (2002): Special Issue on ITI 2002 - Information Technology Interfaces |
User Interface Specification Issues for Computerized Educational Systems |
Abstract
PDF
|
Andrina Granić, Vlado Glavinić |
|
Vol 16, No 4 (2008): Special Issue: Selected Papers from ITI 2008 Conference |
Using a Typed Mind Map as a Data Model in a TDD DICE System |
Abstract
PDF
|
Li-Ren Chien, Daniel J. Buehrer |
|
Vol 19, No 2 (2011) |
Using Actors to Build a Parallel DBMS |
Abstract
PDF
|
Walid-Khaled Hidouci, Djamel Eddine Zegour |
|
Vol 18, No 2 (2010): The Overseas Contribution to the ITI Conference, including some 2009 Conference Examples |
Using Case Studies as a Lens to Observe Teaching Evaluations |
Abstract
PDF
|
Patrick Halloran |
|
Vol 23, No 1 (2015): Special Issue on Emerging Web Technologies and Applications |
Using Cloud Services in a Modern Learning Management System |
Abstract
PDF
|
Alexei Scerbakov, Martin Ebner, Nikolai Scerbakov |
|
Vol 2, No 4 (1994) |
Using Conceptual Graphs to Represent Database Inference Security Analysis |
Abstract
PDF
|
Harry S. Delugach, Thomas H. Hinke |
|
Vol 3, No 1 (1995) |
Using Hypertext in Developing the Human Computer Interface to Gaming-Simulation Environments that Incorporate Intelligent Tutoring Support |
Abstract
PDF
|
Marios C. Angelides, Ka Yan Tong |
|
Vol 2, No 2 (1994) |
Using Hypertext to Implement Multiple Tutoring Strategies in an Intelligent Tutoring System for Music Learning |
Abstract
PDF
|
Marios C. Angelides, Amelia K. Y. Tong |
|
Vol 14, No 1 (2006): Special Issue on Computer-Assisted Craniofacial Reconstruction and Modeling |
Using Image Analysis Software to Create a Physical Skull Model for the Facial Reconstruction of a Wrapped Akhmimic Mummy |
Abstract
PDF
|
Heather Gill-Robinson, Jonathan Elias, Frank Bender, Travis T. Allard, Robert D. Hoppa |
|
Vol 20, No 2 (2012) |
Using Influence Nets in Financial Informatics: A Case Study of Pakistan |
Abstract
PDF
|
Sajjad Haider, Muhammad Shafqat, Shabih Haider |
|
Vol 10, No 3 (2002): Special Issue on ITI 2002 - Information Technology Interfaces |
Using Inverted Files to Compress Text |
Abstract
PDF
|
Strahil Ristov |
|
Vol 18, No 4 (2010): Special Issue from the 2010 ITI Conference |
Using Machine Learning on Sensor Data |
Abstract
PDF
|
Alexandra Moraru, Marko Pesko, Maria Porcius, Carolina Fortuna, Dunja Mladenic |
|
Vol 15, No 1 (2007) |
Using Network Processor to Establish Security Agent for AODV Routing Protocol |
Abstract
PDF
|
Chen Hongsong, Fu Zhongchuan, Wang Chengyao, Ji Zhenzhou, Hu Mingzeng |
|
Vol 22, No 3 (2014) |
Using of DEVS and MAS Tools for Modeling and Simulation of an Industrial Steam Generator |
Abstract
PDF
|
Noureddine Seddari, Mohammed Redjimi, Sofiane Boukelkoul |
|
Vol 27, No 4 (2019) |
Using Poisson Disk Sampling to Render Oil Particles at Sea |
Abstract
PDF
|
Vancuong Do, Hongxiang Ren |
|
Vol 1, No 4 (1993) |
Using Problem Structuring Methods to Assist in Information Systems Strategy Development: A Case Study |
Abstract
PDF
|
Edgar A. Whitley, Ioulia Doukaki |
|
Vol 1, No 1 (1993) |
Using the m-estimate in rule induction |
Abstract
PDF
|
Sašo Džeroski, Bojan Cestnik, Igor Petrovski |
|
Vol 6, No 1 (1998) |
Using the WWW System Hyperwave as the Basis of a General Networked Teaching and Learning Environment |
Abstract
PDF
|
Hermann Maurer |
|
Vol 14, No 3 (2006) |
Utilizing Object Compression for Better J2ME Remote Method Invocation in 2.5G Networks |
Abstract
PDF
|
Jalal Kawash, Ahmad El Halabi, Ghassan Samara |
|
Vol 17, No 3 (2009) |
Verification of Complex Real-time Systems using Rewriting Logic |
Abstract
PDF
|
Mustapha Bourahla |
|
1081 - 1110 of 1125 Items |
<< < 32 33 34 35 36 37 38 > >> |