| Issue | Title | |
| Vol 14, No 4 (2006) | An Approach to Grid Scheduling by Using Condor-G Matchmaking Mechanism | Abstract PDF |
| Emir Imamagic, Branimir Radic, Dobrisa Dobrenic | ||
| Vol 2, No 2 (1994) | An Approach to Register Number Determination Based on Simulation of Register Allocation via Graph Colouring | Abstract PDF |
| Bojana Dalbelo Bašić | ||
| Vol 6, No 1 (1998) | An Approach to Representation and Extraction of Terminological Knowledge in ICALL | Abstract PDF |
| Darina Dicheva, Vania Dimitrova | ||
| Vol 10, No 3 (2002): Special Issue on ITI 2002 - Information Technology Interfaces | An Approach to Validation of Fuzzy Qualitative Temporal Relations | Abstract PDF |
| Slobodan Ribarić, Bojana Dalbelo Bašić, Lada Maleš | ||
| Vol 20, No 3 (2012): Special Issue: Selected Papers from ITI 2012 Conference | An Approach towards Balanced Energy Consumption in Hierarchical Cluster-based Wireless Sensor Networks | Abstract PDF |
| Plamen Z. Zahariev, Georgi V. Hristov, Ivanka D. Tsvetkova | ||
| Vol 6, No 3 (1998): Special Issue on Emerging Technologies | An Architecture for Multicast Telepresentations | Abstract PDF |
| Jim Gemmell, Eve Schooler, Roger Kermode | ||
| Vol 16, No 4 (2008): Special Issue: Selected Papers from ITI 2008 Conference | An Assessment of Machine Learning Methods for Robotic Discovery | Abstract PDF |
| Ivan Bratko | ||
| Vol 28, No 4 (2020) | An Effective Data Sampling Procedure for Imbalanced Data Learning on Health Insurance Fraud Detection | Abstract PDF |
| Shamitha S Kotekani, Ilango Velchamy | ||
| Vol 16, No 3 (2008) | An Efficient Coding Method for Teleconferencing Video and Confocal Microscopic Image Sequences | Abstract PDF |
| Vinay Arya, Ankush Mittal, Amit Pande, Ramesh C. Joshi | ||
| Vol 7, No 2 (1999) | An Efficient Implementation of the Iterative ML-EM Image Reconstruction Algorithm for PET on a Pentium PC Platform | Abstract PDF |
| George Kontaxakis, Ludwig G. Strauss, George S. Tzanakos | ||
| Vol 9, No 2 (2001) | An Efficient Method for Selecting the Optimal Structure of a Fuzzy Neural Network Architecture | Abstract PDF |
| Bojan Novak | ||
| Vol 25, No 4 (2017) | An Efficient Rule-Hiding Method for Privacy Preserving in Transactional Databases | Abstract PDF |
| Farsad Zamani Boroujeni, Doryaneh Hossein Afshari | ||
| Vol 16, No 1 (2008) | An Efficient Unit-selection Method for Concatenative Text-to-speech Synthesis Systems | Abstract PDF |
| Jerneja Zganec Gros, Mario Zganec | ||
| Vol 18, No 4 (2010): Special Issue from the 2010 ITI Conference | An Empirical Investigation of Code Smell 'Deception' and Research Contextualisation through Paul's Criteria | Abstract PDF |
| Steve Counsell, Hamza Hamza, Rob M. Hierons | ||
| Vol 22, No 4 (2014) | An Empirical Study of Offshore Software Development: the Case of a Ticketing Application | Abstract PDF |
| Carlo Consoli, Paolo Rocchi, Paolo Spagnoletti | ||
| Vol 16, No 4 (2008): Special Issue: Selected Papers from ITI 2008 Conference | An Enhancement of Futures Runtime in Presence of Cache Memory Hierarchy | Abstract PDF |
| Matko Botincan, Davor Runje | ||
| Vol 20, No 2 (2012) | An ETL Metadata Model for Data Warehousing | Abstract PDF |
| Nayem Rahman, Jessica Marz, Shameem Akhter | ||
| Vol 13, No 2 (2005): Special Issue on Information Systems: Simulation Modelling, E-Commerce and Knowledge Management | An Evaluation of the World-Views for the Grab-and-Glue Framework | Abstract PDF |
| Tillal Eldabi, Man Wai Lee, Ray J. Paul | ||
| Vol 20, No 1 (2012) | An Evolutionary Algorithm Based on Repeated Mutations for Solving the Capacitated Vehicle Routing Problem | Abstract PDF |
| Krunoslav Puljić | ||
| Vol 11, No 3 (2003): Special Issue on ITI 2003 - Information Technology Interfaces | An Evolutionary Framework for 3-SAT Problems | Abstract PDF |
| István Borgulya | ||
| Vol 8, No 3 (2000): Special Issue on Real-Time Systems Design | An Experiment in Design and Analysis of Real-Time Applications | Abstract PDF |
| Roman Gumzej, Domen Verber, Matjaž Colnarič, Jean-Philippe Babau, Jacques J. Skubich | ||
| Vol 15, No 3 (2007) | An Expert System-Based Site Security Officer | Abstract PDF |
| Adesina Simon Sodiya, Aderonke Ikuomola, Olusola J. Adeniran | ||
| Vol 2, No 3 (1994) | An Extended G-Net Model for Knowledge Representation | Abstract PDF |
| Maja Gerkšič, Nikola Pavešić | ||
| Vol 21, No 4 (2013) | An Extended Model for Multi-Criteria Software Component Allocation on a Heterogeneous Embedded Platform | Abstract PDF |
| Ivan Švogor, Ivica Crnkovic, Neven Vrcek | ||
| Vol 18, No 1 (2010) | An Illumination Invariant Accurate Face Recognition with Down Scaling of DCT Coefficients | Abstract PDF |
| Virendra P. Vishwakarma, Sujata Pandey, M. N. Gupta | ||
| Vol 26, No 2 (2018) | An Improved Coloured Petri Net Model for Software Component Allocation on Heterogeneous Embedded Systems | Abstract PDF |
| Issam Al-Azzoni | ||
| Vol 26, No 4 (2018) | An Improved Dynamic Load Balancing Routing Protocol Based on Mesh Network | Abstract PDF |
| Lu Yan, Ding Xiong | ||
| Vol 13, No 1 (2005) | An Information Management Protocol to Control Routing and Clustering in Sensor Networks | Abstract PDF |
| Marzieh Veyseh, Belle Wei, Nader F. Mir | ||
| Vol 31, No 3 (2023) | An Innovative Deep Learning Approach for Image Semantic and Instance Segmentation | Abstract PDF |
| Chuangchuang Chen, Guang Gao, Linlin Liu, Yangyang Qiao | ||
| Vol 23, No 3 (2015) | An Integrated Distributed Storage Design Offering Data Retrievability and Recoverability Using Soft Decision Decoding of Block Codes | Abstract PDF |
| Coimbatore Kandasamy Shyamala, Tattamangalam Ramachandran Padmanabhan | ||
| 151 - 180 of 1152 Items | << < 1 2 3 4 5 6 7 8 9 10 > >> | |
Journal of Computing and Information Technology

