Academic Journals Database
Disseminating quality controlled scientific knowledge

Search Articles for "Internet Resources"

ADD TO MY LIST
 
OntoFire: an ontology-based geo-portal for wildfires

Author(s): K. Kalabokidis | N. Athanasis | M. Vaitis
Efficient Search Techniques in Peer to Peer Networks

Author(s): Tarunpreet Bhatia | Dr. Deepak Garg
A Cloud-based Approach for Context Information Provisioning

Author(s): Elarbi Badidi | Larbi Esmahi
Intrusion Detection System Inside Grid Computing Environment (IDS-IGCE)

Author(s): Basappa B. Kodada | Ramesh Nayak | Raghavendra Prabhu | Suresha D
Leading dental journals availability through academic network of Serbia

Author(s): Jaćimović Jelena | Živković Slavoljub
CIFKAS A Measurer of Functional Disability Status in Knee Osteoarthritis

Author(s): Vijay Batra | Vijai Prakash Sharma | Meenakshi Batra | Vineet Sharma | Girdhar Gopal Agarwal | Vijay K Singh | Ravindra Mohan Pandey
From the Editor

Author(s): Ugur Demiray
Cloud Computing

Author(s): Rahul Pareek
USE OF EDUCATIONAL TECHNOLOGY IN PROMOTING DISTANCE EDUCATION

Author(s): Muhammad RASHID | Uzma ELAHI
Protection Switching and Rerouting in MPLS

Author(s): S. Veni | Dr.G.M.Kadhar Nawaz Bharathiar University
Question Answering System for an Effective Collaborative Learning

Author(s): Prof. Kohei Arai | Anik Nur Handayani
La gestión del conocimiento en la Universidad Politécnica de Madrid

Author(s): Conde Lázaro, Carlos | Arriaga G.ª de Andoain, Jesús | Carpeño Ruiz, Antonio
Enhancing Security Measures by Tunnelling Protocol in Distributed Grid Network

Author(s): T. Mohan Raj | S. Shahul Hammed | Amala Deepan
Students' profile as autonomous learners in an Internet-based EAP course

Author(s): Antonia Soler Cervera | Carmen Rueda Ramos | Elisabet Arnó Macià
Internet Use and the Political Knowledge Gap in Spain

Author(s): Anduiza, Eva | Gallego, Aina | Jorba, Laia
A review of the RBV of the firm within the e-Business literature: What’s next?

Author(s): Pedro Soto Acosta | Ricardo Colomo-Palacios | Euripidis N. Loukis
IP Traceback for Flooding Attacks on Internet Threat Monitors (ITM ) Using Honeypots

Author(s): K.Munivara Prasad | A.Rama Mohan Reddy | V Jyothsna
Pattern-Based Development and Management of Cloud Applications

Author(s): Christoph Fehling | Frank Leymann | Jochen Rütschlin | David Schumm
THE SIX SIGMA SYSTEM IN RELATION TO THE BUSINESS STRATEGY AND PRIORITIES

Author(s): Dragoi Ionut | David Marcel | Boldea Monica
Shooting short videos in French with mobile phones

Author(s): Serge Gabarre | Cécile Gabarre
Internet and education for the patient

Author(s): Bastos, Bárbara Guimarães | Ferrari, Deborah Viviane
Identifyng barriers to successful research during medical school

Author(s): Chayan Chakraborti | Daniel J. Bourgeois III | Elizabeth Gleeson | William Gunderson
Trends in the social and interpersonal relations of young people and digital natives in the Web 2.0

Author(s): Patricia Núñez-Gómez | María-Luisa García-Guardia | Lourdes-Ainhoa Hermida-Ayala
Identifying barriers to successful research during medical school

Author(s): Chayan Chakraborti | Daniel J. Bourgeois III | Elizabeth Gleeson | William Gunderson
Lossy Image Compression using Discrete Cosine Transform

Author(s): Pravin B. Pokle | N. G. Bawane
IntellectCloud cloud application's mÉnage

Author(s): Deepti Ghuge | Girish Tere
Mobile Viruses

Author(s): Pranav R Shah | Yash Shah | Saurabh Madan
A Survey On Meta Search Engine in Semantic Web

Author(s): G.Sudeepthi | Prof. M.Surendra Prasad Babu
Medical resources presentation on WWW

Author(s): Anamarija Rožić-Hristovski | Sonja Pogačnik | Boža Oberč
Implementing and Managing framework for PaaS in Cloud Computing

Author(s): Junaid Qayyum | Faheem Khan | Muhammad LaL | Fayyaz Gul | Muhammad Sohaib | Fahad Masood
A Review of DDOS Attack and its Countermeasures in TCP Based Networks

Author(s): Akash Mittal | Ajit Kumar Shrivastava | Manish Manoria
Keyword Extraction Based Summarization of Categorized Kannada Text Documents

Author(s): Jayashree.R | Srikanta Murthy.K | Sunny.K,
Can Emergency Medicine Residents Reliably Use the Internet to Answer Clinical Questions?

Author(s): Richard Krause | Ronald Moscati | Shravanti Halpern | Diane G. Schwartz | June Abbas
McAfee SecurityCenter Evaluation under DDoS Attack Traffic

Author(s): Sirisha Surisetty | Student Member | Sanjeev Kumar
Efficient bitstream switching for streaming of H.264/AVC coded video

Author(s): Altaf Muhammad | Khan Ekram | Ghanbari Mohammad | Qadri Nadia
CloVR: A virtual machine for automated and portable sequence analysis from the desktop using cloud computing

Author(s): Angiuoli Samuel | Matalka Malcolm | Gussman Aaron | Galens Kevin | Vangala Mahesh | Riley David | Arze Cesar | White James | White Owen | Fricke W Florian
ZSBT: A Novel Algorithm for Tracing DoS Attackers in MANETs

Author(s): Jin Xin | Zhang Yaoxue | Pan Yi | Zhou Yuezhi
QoS-Aware Active Queue Management for Multimedia Services over the Internet

Author(s): Hwang Bor-Jiunn | Hwang I-Shyan | Chang Pen-Ming
Rural Australian community pharmacists' views on complementary and alternative medicine: a pilot study

Author(s): Bushett Nicole | Dickson-Swift Virginia | Willis Jon | Wood Pene
Channel Resource Allocation for VoIP Applications in Collaborative IEEE 802.11/802.16 Networks

Author(s): Gao Deyun | Foh ChuanHeng | Cai Jianfei | Zhang Hongke
Optimizing the search operation in P2P networks

Author(s): Diana Chinces | Florian Mircea Boian
Information preferences of people living with fibromyalgia – a survey of their information needs and preferences

Author(s): Lubna Daraz | Joy C. MacDermid | Seanne Wilkins | Jane Gibson | Lynn Shaw
LiLa Booking System: Architecture and Conceptual Model of a Rig Booking System for On-Line Laboratories

Author(s): Veronica Mateos | Alberto Gallardo | Thomas Richter | Luis Bellido | Peter Debicki | Dr. Víctor A. Villagrá
A Framework of Information Technology for Water Resources Management

Author(s): P.S.V.S. Sridhar | T. N. Jowhar | Anant Bhaskar Garg | U. Kedareswarudu
Natural Resource Knowledge and Information Management via the Victorian Resources Online Website

Author(s): Mark Imhof | Matthew Cox | Angela Fadersen | Wayne Harvey | Sonia Thompson | David Rees | Christopher Pettit
Comparison of Workflow Scheduling Algorithms in Cloud Computing

Author(s): Navjot Kaur | Taranjit Singh Aulakh | Rajbir Singh Cheema
Decision Support for Radiologists

Author(s): M. Fatehi
E-learning in Radiology

Author(s): D. Caramella
Effect of Local Market and IT Infrastructure of Emerging Markets on American’s MNCs

Author(s): Pooya Sabetfar | Cheng Fan Fah | Reza Hajimohammadi
THE IMPACT OF THE ECONOMY BASED ON KNOWLEDGE ON MODERN ORGANIZATIONS

Author(s): Simona BUTA | Ghiorghi PRISĂCARU
THE IMPORTANCE OF MODERN E-BANKS FOR DEVELOPMENT OF NEW ECONOMY

Author(s): Camelia Catalina MIHALCIUC | Anisoara Niculina APETRI | Muvuny BONAVENTURE
Internet access constrains science development and training at South African universities

Author(s): Bernard Slippers | Thokozani Majozi | Fulufhelo V. Nelwamondo | Christine M. Steenkamp | Esta van Heerden | Caradee Y. Wright
Network resources management in a multi-agent system: A simulative approach

Author(s): Emmanuel A. Olajubu | Ganiyu A. Aderounmu | Emmanuel R. Adagunodo
H-RBAC: A Hierarchical Access Control Model for SaaS Systems

Author(s): Dancheng Li | Cheng Liu | Binsheng Liu
Primary-Backup Access Control Scheme for Securing P2P File-Sharing Systems

Author(s): Jianfeng Lu | Ruixuan Li | Zhengding Lu | Xiaopu Ma
Preliminary Evaluation of the teaching of Homeopathy in undergraduate Pharmacy Courses in Brazilian states Paraná and Santa Catarina

Author(s): Susan Andreise Cipriano Baracho | Karen Denez | Javier Salvador Gamarra Junior
SIMULATION OF THE COMBINED METHOD

Author(s): Ilya Levin | Victor Yakovlev
Security Architecture of Cloud Computing

Author(s): V.KRISHNA REDDY | Dr. L.S.S.REDDY
WEBQUEST: AN ALTERNATIVE FOR THE TEACHING OF CHEMISTRY

Author(s): María B. Núñez | Mónica Reguera | Nora B. Okulik
Semantic Retrieval Approach for Web Documents

Author(s): Hany M. Harb | Khaled M. Fouad | Nagdy M. Nagdy
A STUDY OF INTELLIGENT CONTROLLERS APPLICATION IN DISTRIBUTED SYSTEMS

Author(s): RAVI KUMAR GULLAPALLI | DR.CHELLIAH MUTHUSAMY | DR.A.VINAYA BABU
Search Engine System Based on Ontology of Technological Resources

Author(s): Weihui Dai | Yu You | Wenjuan Wang | Yiming Sun | Tong Li
Guest Editorial

Author(s): Sabu M. Thampi
Streaming Media Caching Model Based on Knapsack Problem

Author(s): Lei Shi | Zhanhong Wang | Yao Yao | Lin Wei
Networking as a Service: a Cloud-based Network Architecture

Author(s): Tao Feng | Jun Bi | Hongyu Hu | Hui Cao
Guest Editorial

Author(s): Mohammad S. Obaidat | José Luis (Sevi) Sevillano
A QoS Control Approach in Differentiated Web Caching Service

Author(s): Ang Gao | Dejun Mu | Yansu Hu
Guest Editorial

Author(s): Antonio Teixeira | Anna Tzanakaki | Davide Careglio | Miroslaw Klinkowski
Guest Editorial

Author(s): Hsing-Chung Chen | Franz I.S. Ko | Yung-Chen Chou | Shyan-Ming Yuan | Yaw-Chung Chen | Chin-Chen Chang | Jyh-Horng Wen | Shiuh-Jeng Wang | Yuh-Ren Tsai | Keh-Ming Lu
A Novel User Authentication Scheme Based on QR-Code

Author(s): Kuan-Chieh Liao | Wei-Hsun Lee
Adaptive Object Re-Ranking Mechanism for Ubiquitous Learning Environment

Author(s): Neil Y. Yen | Timothy K. Shih | Qun Jin | Jason C. Hung | Qingguo Zhou | Louis R. Chao
A Cloud Computing Infrastructure on Heterogeneous Computing Resources

Author(s): Baomin XU | Ning Wang | Chunyan Li
Guest Editorial

Author(s): Malin Song | Dingding Pan | Jie Wu | Li Yang | Hongping Zhou | Christopher Clemence
Foreword of Special Issue on “E-Service and Applications”

Author(s): Jason C. Hung | Hsing-I Wang
A Study of Travel Agencies’ Human Resources in Relation to Internet Marketing

Author(s): Huang-Wei Su | Li-Tze Lee | Chiang Ku Fan | Jason C. Hung
Exploiting Location-aware Mechanism for Distributed Web Crawling over DHTs

Author(s): Xiao Xu | Weizhe Zhang | Hongli Zhang | Binxing Fang
Guest Editorial

Author(s): Khan Mohammad Iftekharuddin | Mohammed Nazrul Islam | Mohammad Ataul Karim | Mohammad Abdus Salam
Utility Maximization Model for Deep Web Source Selection and Integration

Author(s): Xuefeng Xian | Zhiming Cui | Pengpeng Zhao | Yuanfeng Yang | Guangming Zhang
Guest Editorial

Author(s): Sudhanshu Gaur | Geoffrey Ye Li | Li-Chun Wang | Neelesh B. Mehta
Why do you need a reservation system?      Save time & money - Smart Internet Solutions