default search action
Computer and Information Science, Volume 6
Volume 6, Number 1, 2013
- Oliver Hummel, Alexander Gerhart, Bernhard Schäfer:
Analyzing Citation Frequencies of Leading Software Engineering Scholars. 1-14 - Jarmila Honzikova, Jan Janovec:
Conceptual and Methodical Procedures of Psychomotor Learning. 15-31 - Faraz Abid Lakhani, Anwar Ali Shah G. Syed, Nizamuddin Channa, Faiz. M. Shaikh:
Consumer Perceived Risk and Risk Relievers in E-shopping in Pakistan. 32-38 - Zhiwei Sun:
Analysis and Evaluation of WebTrends Log Analyzer. 39-46 - Saleem Zeyad Ramadan:
Reducing Premature Convergence Problem in Genetic Algorithm: Application on Travel Salesman Problem. 47-57 - Urmila Shrawankar, Vilas M. Thakare:
An Adaptive Methodology for Ubiquitous ASR System. 58-69 - Marios Poulos, Ioannis Deliyannis, Andreas Floros:
Efficient Audio Fingerprint Application Verification Using the Adapted Computational Geometry Algorithm. 70-82 - Manuel Alberto M. Ferreira:
A M/G/inf Queue Busy Period Distribution Characterizing Parameter. 83-88 - Sheikh Muhammad Sarwar, Md. Mustafizur Rahman, Md. Haider Ali, Ashique Mahmood Adnan:
A Scalable Image Snippet Extraction Framework for Integration with Search Engines. 89-99 - Ward Douglas Maurer:
A Programming Language without Keywords. 100-132 - Sania Vahedian Movahed:
The Hybrid Method of Fuzzy Feed-Forward Neural Network for Predicting Protein Secondary Structure. 133-139 - Yasir Ahmad, Abdullah Aljumah:
Paradigm Shift in the Security-n-Privacy Implementation of Semi-Distributed Online Social Networking. 140-148
Volume 6, Number 2, 2013
- Athanasios I. Margaris:
Local Area Multicomputer (LAM -MPI). 1-8 - Wojciech Walat:
Cognitive and Constructivist Perspective of IT Based Education. 9-17 - Fadi A. O. Najadat, Ghassan G. Kanaan, Raed K. Kanaan, Omar S. Aldabbas, Riyad Al-Shalabi:
Genetic Algorithm Solution of the Knapsack Problem Used in Finding Full Issues in the Holy Quran Based on the Number (19). 18-30 - Jiang Li, Liu Chen:
A Digital Watermarking Algorithm Based on Chaos in Interpolatory Orthogonal Multiwavelets Domain. 31-37 - Vadim V. Romanuke:
Setting the Hidden Layer Neuron Number in Feedforward Neural Network for an Image Recognition Problem under Gaussian Noise of Distortion. 38-54 - Mohd Adham Isa, Mohd Z. M. Zaki, Dayang N. A. Jawawi:
A Survey of Design Model for Quality Analysis: From a Performance and Reliability Perspective. 55-70 - Mohammad Shkoukani, Rawan Abu Lail, Hesham Abusaimeh, Loai Al Hamarneh:
The Impact of Establishing a Governmental Consumer Agency in Jordan towards Expanding the Use of E-business. 71-83 - Ivaylo Donchev, Emilia Todorova:
Training in Object-Oriented Programming and C++11. 84-92 - Stepan Belan, Sergey Yuzhakov:
A Homogenous Parameter Set for Image Recognition Based on Area. 93-102 - Arindam Chaudhuri:
Bankruptcy Prediction Using Bayesian, Hazard, Mixed Logit and Rough Bayesian Models: A Comparative Analysis. 103-125 - Ajay Prasad, Prasun Chakrabarti:
Centralized Access Management and Monitoring as a Service in Cloud Environments-A Critical Study. 126-133 - Riad Jabri:
A Generic Tool for Teaching Compilers. 134-150 - Amavi Djimido Noutchet:
Novel User Centric RFID Fridge Design. 151-157
Volume 6, Number 3, 2013
- Juliette Stephens, Raul Valverde:
Security of E-Procurement Transactions in Supply Chain Reengineering. 1-20 - K. Lavrischeva, Andrey Aronov, Artem Dzyubenko:
Program Factory - A Conception of Knowledge Representation of Scientific Artifacts from Standpoint of Software Engineering. 21-27 - Jesús González-Feliu:
Vehicle Routing in Multi-Echelon Distribution Systems with Cross-Docking: A Systematic Lexical-Metanarrative Analysis. 28-47 - Elma Zannatul Ferdousy, Md. Mafijul Islam, M. Abdul Matin:
Combination of Naïve Bayes Classifier and K-Nearest Neighbor (cNK) in the Classification Based Predictive Models. 48-56 - Debora Souza, Rúbens de Souza Matos Júnior, Jean Araujo, Vandi Alves, Paulo Romero Martins Maciel:
A Tool for Automatic Dependability Test in Eucalyptus Cloud Computing Infrastructures. 57-67 - Yirsaw Ayalew, Kagiso Mguni:
An Assessment of Changeability of Open Source Software. 68-79 - Yuanchao Liu, Xin Wang, Chengjie Sun, Bingquan Liu:
A Novel Approach for Dynamic Polarity Mining from Customer Reviews. 80-88 - Mohammad Hasan Haggag, Amal Aboutabl, Najla Mukhtar:
Clustering of Web Search Results Based on Document Segmentation. 89-95 - Yongping Huang, Shufan Yang, Yushan Jin:
An Efficient Cursor Search Algorithm. 96-107 - John Wachira Kamau, Ian Douglas Sanders:
An Empirical Investigation into the Effect of Usability on Adoption of Desktop Open Source Software by University Students in Kenya. 108-117 - Emad A. Awada, Mohammad H. Alomari:
Application of Wavelet Transform Analysis to ADCs Harmonics Distortion. 118-124 - Amal Elsayed Aboutabl:
Exploiting Parallelism in Query Processing for Web Document Search Using Shared-Memory and Cluster-Based Architectures. 125-137
Volume 6, Number 4, 2013
- Edward Red, C. Greg Jensen, Prasad Weerakoon, David French, Steven E. Benzley, Karl G. Merkley:
Architectural Limitations in Multi-User Computer-Aided Engineering Applications. 1-16 - Nikolay Fedotov, Sergey Romanov, Daria Goldueva:
Application of Triple Features Theory to the Analysis of Half-Tone Images and Colored Textures. Feature Construction by Virtue of Stochastic Geometry and Functional Analysis. 17-24 - Bai Yan, Ren Qingchang, Ma Ke:
Modeling and Generalized Predictive Control for Chilled Water in Central Air-conditioning System. 25-36 - Udoinyang G. Inyang, Enobong E. Joshua:
Fuzzy Clustering of Students' Data Repository for At-Risks Students Identification and Monitoring. 37-50 - Huai Yang Chen, Jinjie Chen:
Improvements Based on the Harris Algorithm. 51-58 - Ahmad Abdel-Hafez, Yue Xu:
A Survey of User Modelling in Social Media Websites. 59-71 - Xiaoxia Wang:
Dimensions of Practical Interactions in New Digital Primary Classrooms: Framework for Preservice Teachers. 72-79 - Guillermo L. Rodríguez, Patricia Silvana San Martín, Griselda Guarnieri:
Monitoring and Analytical Evaluation of Interactivity Mediated by a Dynamic Hypermedia Device. 80-87 - Bandar Mohammed, Malek Mouhoub, Eisa Alanazi, Samira Sadaoui:
Data Mining Techniques and Preference Learning in Recommender Systems. 88-102 - Laye Hadji Diakite, Li Yu, Rabiu Haruna:
Testing of Event Detection Lateness in Wireless Sensor Networks. 103-109 - Guangwei Zhang:
Research of the Stereo Measure Technology for Firearms Chamber. 110-114 - Stepan Belan, Sergey Yuzhakov:
Machine Vision System Based on the Parallel Shift Technology and Multiple Image Analysis. 115-124 - Yuanchao Liu, Feng Wu, Ming Liu, Bingquan Liu:
Abstract Sentence Classification for Scientific Papers Based on Transductive SVM. 125-131 - Ahmad Khader Haboush:
Handling Safety-Related Requirements in Critical Systems Product Lines. 132-138
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.