Academic Journals Database
Disseminating quality controlled scientific knowledge

Advanced Computing : an International Journal

ISSN: 2229--726X
Publisher: Academy & Industry Research Collaboration Center (AIRCC)


ADD TO MY LIST
 
Justification of Montgomery Modular Reduction PDF available

Author(s): Salem Sherif Elfard
Volume: 3
Issue: 6
Year: 2012
Map /Reduce Design and Implementation of Apriori Algorithm for Handling Voluminous Data - Sets PDF available

Author(s): Anjan K Koundinya | Srinath N K, K A K Sharma | Kiran Kumar | Madhu M N | Kiran U Shanbag
Volume: 3
Issue: 6
Year: 2012
A Multi - Population Based Frog - Memetic Algorithm for Job Shop Scheduling Problem PDF available

Author(s): Somayeh Kalantari | Mohammad Saniee Abadeh
Volume: 3
Issue: 6
Year: 2012
Web Mining - A Catalyst For E-Business PDF available

Author(s): Abdul Rahaman Wahab Sait | T.Meyappan
Volume: 3
Issue: 6
Year: 2012
Obesity Heuristic, New Way on Artificial Immune Systems PDF available

Author(s): M. A. El-Dosuky | M. Z. Rashad | T. T. Hamza | A.H. EL-Bassiouny
Volume: 3
Issue: 6
Year: 2012
A Secure Key Transfer Protocol for Group Communication PDF available

Author(s): R. Velumadhava Rao | K Selvamani | R Elakkiya
Volume: 3
Issue: 6
Year: 2012
Vector Quantization for Privacy Preserving Clustering in Data Mining PDF available

Author(s): D.Aruna Kumari | Rajasekhara Rao | M.Suman
Volume: 3
Issue: 6
Year: 2012
A Comparative Study of Root -Based and Stem -Based Approaches for Measuring the Similarity Between Arabic Words for Arabic Text Mining Applications PDF available

Author(s): Hanane FROUD | Abdelmonaim LACHKAR | Said ALAOUI OUATIK
Volume: 3
Issue: 6
Year: 2012
A Study of Image Compression Based Transmission Algorithm Using Spiht for Low Bit Rate Application PDF available

Author(s): Ritu Chourasiya | Ajit Shrivastava
Volume: 3
Issue: 6
Year: 2012
Multi-Touch Screen Interfaces And Gesture Analysis: A Study PDF available

Author(s): Mrudula Nimbarte
Volume: 2
Issue: 6
Year: 2011
Computation Of Transformer Losses Under The Effects Of Non-Sinusoidal Currents PDF available

Author(s): Amit Gupta | Ranjana Singh
Volume: 2
Issue: 6
Year: 2011
Optimized Performance With Process Chains PDF available

Author(s): M. Victoria Hebseeba | Dr. T. Bhaskara Reddy
Volume: 2
Issue: 6
Year: 2011
The Expert System Designed To Improve Customer Satisfaction PDF available

Author(s): P.Isakki alias Devi | S.P.Rajagopalan
Volume: 2
Issue: 6
Year: 2011
Controlling The Problem Of Bloating Using Stepwise Crossover And Double Mutation Technique PDF available

Author(s): Arpit Bhardwaj | Aditi Sakalle | Harshita Chouhan | Harshit Bhardwaj
Volume: 2
Issue: 6
Year: 2011
Design, Implementation And Characterization Of Xor Phase Detector For Dpll In 45 Nm Cmos Technology PDF available

Author(s): Delvadiya Harikrushna I | Mukesh Tiwari | Jay Karan Singh | Jay Karan Sing
Volume: 2
Issue: 6
Year: 2011
Cyclic Combination Method For Digital Image Steganography With Uniform Distribution Of Message PDF available

Author(s): Rajkumar Yadav | Ravi Saini | Kamaldeep
Volume: 2
Issue: 6
Year: 2011
Improving Text Categorization By Using A Topic Model PDF available

Author(s): Wongkot Sriurai
Volume: 2
Issue: 6
Year: 2011
A New Algorithm For Cell Tracking Technique PDF available

Author(s): Ashraf A. Aly | Safaai Bin Deris | Nazar Zaki
Volume: 2
Issue: 6
Year: 2011
Graduate School Cyber Portfolio: The Innovative Menu For Sustainable Development PDF available

Author(s): Ava Clare Marie O. Robles
Volume: 2
Issue: 6
Year: 2011
A Novel Approach For Pass Word Authentication Using Bidirectional Associative Memory PDF available

Author(s): A S N Chakravarthy | Penmetsa V Krishna Raja | P S Avadhani
Volume: 2
Issue: 6
Year: 2011
Fingerprint Image Enhancement By Develop Mehtre Technique PDF available

Author(s): Mustafa Salah Khalefa | Zaid Amin Abduljabar | Huda Ameer Zeki
Volume: 2
Issue: 6
Year: 2011
Empirical Studies On Machine Learning Based Text Classification Algorithms PDF available

Author(s): Shweta C. Dharmadhikari | Maya Ingle | Parag Kulkarni
Volume: 2
Issue: 6
Year: 2011
Overview Of Streaming-Data Algorithms

Author(s): T. Soni Madhulatha
Volume: 2
Issue: 6
Year: 2011
Using Triangular Function To Improve Size Of Population In Quantum Evolution Algorithm For Fractal Image Compression PDF available

Author(s): Amin Qorbani | Ali Nodehi | Saeed Nodehi
Volume: 2
Issue: 6
Year: 2011
Frameworks Between Components And Objects PDF available

Author(s): Mohamed Belal | Ayman Khedr | Ahmed Gohar
Volume: 3
Issue: 5
Year: 2012
An Integrated ERP with Web Portal PDF available

Author(s): Yehia M. Helmy | Mohamed I. Marie | Sara M. Mosaad
Volume: 3
Issue: 5
Year: 2012
Generating domain specific sentiment lexicons using the Web Directory PDF available

Author(s): Akshay Minocha | Navjyoti Singh
Volume: 3
Issue: 5
Year: 2012
Comparative Performance Analysis Of Rnsc And Mcl Algorithms On Power-Law Distribution PDF available

Author(s): Mousumi Dhara | K. K. Shukla
Volume: 3
Issue: 5
Year: 2012
Enhancement Of Improved Balanced LEACH For Heterogeneous Wireless Sensor Networks PDF available

Author(s): Yogesh Kuma | Kanwaljit Singh
Volume: 3
Issue: 5
Year: 2012
Directional Based Watermarking Scheme Using A Novel Data Embedding Approach PDF available

Author(s): Y. RaghavenderRao | P. Nikhil | E.Nagabhooshanam
Volume: 3
Issue: 5
Year: 2012
Dynamic Allocation Method For Efficient Load Balancing In Virtual Machines For Cloud Computing Environment PDF available

Author(s): Bhaskar. R | Deepu. S.R | B.S. Shylaja
Volume: 3
Issue: 5
Year: 2012
An Efficient Integrated Approach for the Detection of Exudates and Diabetic Maculopathy in Colour fundus Images

Author(s): B.Ramasubramanian | G.Mahendran
Volume: 3
Issue: 5
Year: 2012
Justification of Montgomery Modular Reduction PDF available

Author(s): Salem Sherif Elfard
Volume: 3
Issue: 5
Year: 2012
Enterprise Integration Using Service Oriented Architecture PDF available

Author(s): Oldooz karimi | Nasser modiri
Volume: 2
Issue: 5
Year: 2011
Cross Lingual Information Retrieval With SMT And Query Mining PDF available

Author(s): Suneet Kumar Gupta | Amit Sinha | Mradul Jain
Volume: 2
Issue: 5
Year: 2011
Analysis Of Spiht Algorithm For Satellite Image Compression PDF available

Author(s): K Nagamani | AG Ananth
Volume: 2
Issue: 5
Year: 2011
Pre-Processing Of Medical Documents And Reducing Dimensionality PDF available

Author(s): S.Sagar Imambi | T.Sudha
Volume: 2
Issue: 5
Year: 2011
Adaptive Data Stream Management System Using Learning Automata PDF available

Author(s): Shirin Mohammadi | Ali A. Safaei | Fatemeh Abdi | Mostafa S. Haghjoo
Volume: 2
Issue: 5
Year: 2011
Privacy Preserving through Segment-Based Visual Cryptography PDF available

Author(s): Sesha Pallavi Indrakanti | Avadhani P S
Volume: 3
Issue: 4
Year: 2012
A New Approach to Theftware-Efficient Solution PDF available

Author(s): Prabhat Kumar | Abhishek, Milan Jain | Niraj Upadhyay | Avinash Thakur
Volume: 3
Issue: 4
Year: 2012
Implementation of AES as a Custom Hardware using NIOS II Processor PDF available

Author(s): Meghana Hasamnis | Priyanka Jambhulkar | S.S. Limaye
Volume: 3
Issue: 4
Year: 2012
A Novel Method for Obtaining a Better Quality Speech Signal for Cochlear Implants using Kalman with DRNL and SSB Technique PDF available

Author(s): Rohini S. Hallikar | Uttara Kumari | K Padmaraju
Volume: 3
Issue: 4
Year: 2012
Adaptive Real Time Data Mining Methodology for Wireless Body Area Network Based Healthcare Applications PDF available

Author(s): Dipti Durgesh Patil | Vijay M. Wadhai
Volume: 3
Issue: 4
Year: 2012
Freeman Code Based Online Handwritten Character Recognition for Malayalam using Backpropagation Neural Networks PDF available

Author(s): Amritha Sampath | Tripti C | Govindaru V
Volume: 3
Issue: 4
Year: 2012
Named Entity Recognition in Turkish Using Association Measures PDF available

Author(s): Senem Kumova Metin | Tarik Kisla | Bahar Karaoglan
Volume: 3
Issue: 4
Year: 2012
Analyzing the Efficient Test Order for Integration Testing PDF available

Author(s): Reena Dadhich | Sourabh Sehgal
Volume: 3
Issue: 4
Year: 2012
A Modified Fault Tolerant Location-Based Service Discovery Protocol for Vehicular Networks PDF available

Author(s): Saeed Fathi Ghiri | Morteza Rahmani | Hassan Almasi
Volume: 3
Issue: 4
Year: 2012
'CodeAliker' - Plagiarism Detection on the Cloud PDF available

Author(s): Nitish Upreti | Rishi Kumar
Volume: 3
Issue: 4
Year: 2012
Study and Implementation of Advanced Neuroergonomic Techniques PDF available

Author(s): B.F.Momin | Mamata S.Kalas
Volume: 3
Issue: 4
Year: 2012
Image Content in Location-Based Shopping Recommender Systems For Mobile Users PDF available

Author(s): Tranos Zuva | Sunday O. Ojo | Seleman M. Ngwira | Oludayo O. Olugbara
Volume: 3
Issue: 4
Year: 2012
Security Model For Service-Oriented Architecture PDF available

Author(s): Oldooz Karimi
Volume: 2
Issue: 4
Year: 2011
A NOVEL APPROACH FOR AUTHENTICATING TEXTUAL OR GRAPHICAL PASSWORDS USING HOPFIELD NEURAL NETWORK PDF available

Author(s): ASN Chakravarthy | P S Avadhani | P. E. S. N Krishna Prasad | N.Rajeev | D.Rajasekhar reddy
Volume: 2
Issue: 4
Year: 2011
Time complexity analysis of genetic- fuzzy system for disease diagnosis PDF available

Author(s): Ephzibah.E.P
Volume: 2
Issue: 4
Year: 2011
Transport Layer Protocols Taxonomy From Voice Over Ip Perspective PDF available

Author(s): Mosleh M. Abu-Alhaj | Ahmed Manasrah | Mahmoud Baklizi | Nibras
Volume: 2
Issue: 4
Year: 2011
The Effects on Cells Mobility Due to Exposure to EMF Radiation PDF available

Author(s): Ashraf A. Aly | Safaai Bin Deris | Nazar Zaki
Volume: 2
Issue: 4
Year: 2011
Performance Evaluation of Ontology and Fuzzybase CBIR PDF available

Author(s): Tajman sandhu | Parminder Singh
Volume: 4
Issue: 3
Year: 2013
The Verification of Virtual Community Member's Socio-Demographic Profile PDF available

Author(s): Fedushko Solomia | Peleschyshyn Oksana | Peleschyshyn Andriy | Syerov Yuriy
Volume: 4
Issue: 3
Year: 2013
A Model to Compare the Degree of Refactoring Opportunities of Three Projects Using A Machine Algorithm PDF available

Author(s): Gauri Khurana | Sonika Jindal
Volume: 4
Issue: 3
Year: 2013
CUDA Based Performance Evaluation of the Computational Efficiency of the DCT Image Compression Technique on Both the CPU and GPU PDF available

Author(s): Kgotlaetsile Mathews Modieginyane | Zenzo Polite Ncube and Naison Gasela
Volume: 4
Issue: 3
Year: 2013
New Approch For Wireless Communication Security Protocol By Using Mutual Authentication PDF available

Author(s): Atishay Bansal | Dinesh Sharma | Gajendra Singh | Tumpa Roy
Volume: 3
Issue: 3
Year: 2012
Availability Of JobTracker Machine In Hadoop/MapReduce Zookeeper Coordinated Clusters PDF available

Author(s): Ekpe Okorafor | Mensah Kwabena Patrick
Volume: 3
Issue: 3
Year: 2012
Improvement Of Loadability In Distribution System Using Genetic Algorithm PDF available

Author(s): Mojtaba Nouri | Mahdi Bayat Mokhtari | Sohrab Mirsaeidi | Mohammad Reza Miveh
Volume: 3
Issue: 3
Year: 2012
Security Implementation through PCRE Signature over Cloud Network PDF available

Author(s): Gaurav Raj | Munish Katoch
Volume: 3
Issue: 3
Year: 2012
Alpha-Qwerty Cipher: An Extended Vigenere Cipher PDF available

Author(s): Md. Khalid Imam Rahmani | Neeta Wadhwa | Vaibhav Malhotra
Volume: 3
Issue: 3
Year: 2012
Dispelling Classes Gradually to Improve Quality of Feature Reduction Approaches PDF available

Author(s): Shervan Fekri Ershad | Sattar Hashemi
Volume: 3
Issue: 3
Year: 2012
Detecting Phishing Attacks In Purchasing Process Through Proactive Approach PDF available

Author(s): S.Arun | D.Ananda | T.Selvaprabhu | B.Sivakumar | P.Revathi | H.Shine
Volume: 3
Issue: 3
Year: 2012
A New Approach To Enhance Security In Mpls Network PDF available

Author(s): S.Veni | G.M.Kadhar Nawaz
Volume: 3
Issue: 3
Year: 2012
Data Security by Preprocessing the Text with Secret Hiding PDF available

Author(s): Ajit Singh | Upasana Jauhari
Volume: 3
Issue: 3
Year: 2012
Semantic Plagiarism Detection System Using Ontology Mapping PDF available

Author(s): Manjula Shenoy K | U.Dinesh Acharya | K.C.Shet
Volume: 3
Issue: 3
Year: 2012
Development Of Growth Models For Electronics Hardware And Software Components PDF available

Author(s): Sarojamma B | Venkatramana Reddy S | Suresh Kumar Reddy K | Hari Mallikarjuna Reddy B
Volume: 3
Issue: 3
Year: 2012
Distance Transform Based Hand Gestures Recognition For Powerpoint Presentation Navigation PDF available

Author(s): Ram Rajesh J | Nagarjunan D | Arunachalam RM | Aarthi R
Volume: 3
Issue: 3
Year: 2012
Development of Mechanism for Enhancing Data Security in Quantum Cryptography PDF available

Author(s): Ajit Singh | Nidhi Sharma
Volume: 2
Issue: 3
Year: 2011
Power Management During Scan Based Sequential Circuit Testing PDF available

Author(s): Reshma.P | M.Geetha Priya
Volume: 2
Issue: 3
Year: 2011
Path Finding Solutions For Grid Based Graph PDF available

Author(s): R.Anbuselvi
Volume: 4
Issue: 2
Year: 2013
Scaling Transform Methods For Compressing a 2D Graphical image PDF available

Author(s): A. J. Rajeswari Joe | N. Rama
Volume: 4
Issue: 2
Year: 2013
Rsa Signature: Behind The Scenes PDF available

Author(s): Dragan Vidakovic | Dusko Parezanovic | Olivera Nikolic | Jelena Kaljevic
Volume: 4
Issue: 2
Year: 2013
Method-Level Code Clone Modification using Refactoring Techniques for Clone Maintenance PDF available

Author(s): E. Kodhai | S. Kanmani
Volume: 4
Issue: 2
Year: 2013
Symmetric-Key Based Privacy-Preserving Scheme For Mining Support Counts PDF available

Author(s): Yu Li | Sheng Zhong
Volume: 4
Issue: 2
Year: 2013
Data Load Manifestation In Process Chains In SAP Business Ware House PDF available

Author(s): M. Victoria Hebseeba
Volume: 3
Issue: 2
Year: 2012
Role Of Context In Usability Evaluations: A Review PDF available

Author(s): Munesh Chandra Trivedi | Mohammadi Akheela Khanum
Volume: 3
Issue: 2
Year: 2012
Neighbor Attack And Detection Mechanism In Mobile Ad-Hoc Networks PDF available

Author(s): S. Parthiban | A. Amuthan | N.Shanmugam | K.Suresh Joseph
Volume: 3
Issue: 2
Year: 2012
Analysis of Various Symbol Detection Techniques in Multiple-Input Multiple-Output System (MIMO) PDF available

Author(s): Shuchi Jani | Shrikrishan Yadav | B. L. Pal
Volume: 3
Issue: 2
Year: 2012
Edge Preserving Image Coding For High Resolution Image Representation PDF available

Author(s): M. Nagaraju Naik | K. Kumar Naik | P. Rajesh Kumar
Volume: 3
Issue: 2
Year: 2012
Aspect-Oriented Software Quality Model: The AOSQ Model PDF available

Author(s): Pankaj Kumar
Volume: 3
Issue: 2
Year: 2012
A Survey for Load Balancing in Mobile WiMAX Networks PDF available

Author(s): Camellia Askarian | Hamid Beigy
Volume: 3
Issue: 2
Year: 2012
Construction of Community Web Directories based on Web usage Data PDF available

Author(s): Ramancha Sandhyarani | Bodakuntla Rajkumar | Jayadev Gyani
Volume: 3
Issue: 2
Year: 2012
Physical Unclonable Function (PUF) Based Random Number Generator PDF available

Author(s): Ali Sadr | Mostafa Zolfaghari-Nejad
Volume: 3
Issue: 2
Year: 2012
Controlled Multimedia Cloud Architecture And Advantages PDF available

Author(s): Selvaraj Kesavan | Jerome Anand | J.Jayakumar
Volume: 3
Issue: 2
Year: 2012
Feature Extraction Methods For Color Image Similarity PDF available

Author(s): R.Venkata Ramana Chary | D.Rajya Lakshmi | K.V.N Sunitha
Volume: 3
Issue: 2
Year: 2012
How To Improve Software Quality Assurance In Developing Countries PDF available

Author(s): Ali Javed | Muazzam Maqsood | KhurramAshfaqQazi | Khurram Ali Shah
Volume: 3
Issue: 2
Year: 2012
Cloud Computing And Privacy Regulations: An Exploratory Study On Issues And Implications PDF available

Author(s): Mohammed A. T. AlSudiari | TGK Vasista
Volume: 3
Issue: 2
Year: 2012
Anonymity And Accountability In Web Based Transactions PDF available

Author(s): H.Jayasree | .Damodaram
Volume: 3
Issue: 2
Year: 2012
Quantum parity algorithms as oracle calls, and application in Grover Database search PDF available

Author(s): M. Z. Rashad,
Volume: 3
Issue: 2
Year: 2012
Computerized Shape Analysis of Erythrocytes and Their Formed Aggregates in Patients Infected With P.Vivax Malaria PDF available

Author(s): R.Renuka Devi | V.Rajagopal | M.Senthil kumar | G.Magesh
Volume: 2
Issue: 2
Year: 2011
Application of Threshold Techniques for Readability Improvement of Jawi Historical Manuscript Images PDF available

Author(s): Hafizan Mat Som | Jasni Mohamad Zain | Amzari Jihadi Ghazali
Volume: 2
Issue: 2
Year: 2011
Energy Efficient Coverage Problems in Wireless Ad Hoc Sensor Networks PDF available

Author(s): D.G.Anand | H.G.Chandrakanth | M.N.Giriprasad
Volume: 2
Issue: 2
Year: 2011
New Results on the Output Regulation of the Modified Arneodo Chaotic System by State Feedback Control PDF available

Author(s): Sundarapandian Vaidyanathan
Volume: 2
Issue: 2
Year: 2011
Employing Reverse Polish Notation in Encryption PDF available

Author(s): S.S. Dhenakaran
Volume: 2
Issue: 2
Year: 2011
Medical Image Denoising Using Adaptive Threshold Based on Contourlet Transform PDF available

Author(s): S.Satheesh | KVSVR Prasad
Volume: 2
Issue: 2
Year: 2011
Spam Detection By Stackelberg Game PDF available

Author(s): Alireza Naeimi Sadigh | Sattar Hashemi | Ali Hamzeh
Volume: 2
Issue: 2
Year: 2011
Insider Threat Analysis of Case Based System Dynamics PDF available

Author(s): Sang-Chin Yang | Yi-Lu Wang
Volume: 2
Issue: 2
Year: 2011
Do New Mobile Devices in Enterprises Pose A Serious Security Threat? PDF available

Author(s): Ali A Altalbe
Volume: 4
Issue: 1
Year: 2013
Speaker Verification Using Acoustic and Prosodic Features PDF available

Author(s): Utpal Bhattacharjee | Kshirod Sarmah
Volume: 4
Issue: 1
Year: 2013
Two Phase Clandestain Image Encryption PDF available

Author(s): V Hemanth | R Praveen Kumar
Volume: 4
Issue: 1
Year: 2013
Secure Cloud Architecture PDF available

Author(s): Kashif Munir | Sellapan Palaniappan
Volume: 4
Issue: 1
Year: 2013
Veritas Mouseion 3d - Technology and Museum Information PDF available

Author(s): Janaina Mello | Irla Rocha
Volume: 4
Issue: 1
Year: 2013
Effect of Symlet Filter Order on Denoising of Still Images PDF available

Author(s): S. Kumari | R. Vijay
Volume: 3
Issue: 1
Year: 2012
Modeling of Packet Switched Network over TCP Veno: TCP Improvement for Transmission over Wireless Access Networks. PDF available

Author(s): Baswaraj | D.C. Tomar | K.Prasad Rao
Volume: 3
Issue: 1
Year: 2012
MULTICLASS CLASSIFIER DESIGNED USING STEPWISE CROSSOVER AND SPECIAL MUTATION TECHNIQUE PDF available

Author(s): Pankaj Patidar | Bhupendra Verma | Arpit Bhardwaj
Volume: 3
Issue: 1
Year: 2012
GPGPU PROCESSING IN CUDA ARCHITECTURE PDF available

Author(s): Jayshree Ghorpade | Jitendra Parande | Madhura Kulkarni | Amit Bawaskar
Volume: 3
Issue: 1
Year: 2012
Exploiting Logical Structures to Reduce Quorum Sizes of Replicated Databases PDF available

Author(s): Parul Pandey | Maheshwari Tripathi
Volume: 3
Issue: 1
Year: 2012
A NEW TREND FOR E-LEARNING IN KSA USING EDUCATIONAL CLOUDS PDF available

Author(s): Abdullah Alshwaier | Ahmed Youssef | Ahmed Emam
Volume: 3
Issue: 1
Year: 2012
A Novel Image Retrieval Method Using Segmentation and Color Moments PDF available

Author(s): T.V. Saikrishna | Dr.A.Yesubabu | Dr.A.Anandarao | T.Sudha Rani
Volume: 3
Issue: 1
Year: 2012
COLLABORATION FOR ENHANCING THE SYSTEM DEVELOPMENT PROCESS IN OPEN SOURCE DILIGENCE PDF available

Author(s): Murtaza Hussain Shaikh
Volume: 3
Issue: 1
Year: 2012
EMBEDDED pH DATA ACQUISITION AND LOGGING PDF available

Author(s): V. Ramya | B. Palaniappan
Volume: 3
Issue: 1
Year: 2012
Presenting a hybrid method in order to predict the2009 pandemic influenza A (H1N1) PDF available

Author(s): Reza Boostani | Mojtaba Rismanchi | Abbas Khosravani | Lida Rashidi
Volume: 3
Issue: 1
Year: 2012
MULTI-AGENTS SIMULATION OF HUMAN BEHAVIOR IN A SITUATION OF EMERGENCY PDF available

Author(s): Benkhedda Samira | Bendella Fatima
Volume: 3
Issue: 1
Year: 2012
BREAKING A FEISTEL-TYPE BLOCK CIPHER BY BACTERIA ENGINEERING PDF available

Author(s): Arash Karimi | Hadi Shahriar Shahhoseini
Volume: 3
Issue: 1
Year: 2012
QoS Based User Driven Scheduler for Grid Environment PDF available

Author(s): Sanjay Patel | Madhuri Bhavsar
Volume: 2
Issue: 1
Year: 2011
Reversible Data Hiding Based on Two-level HDWT Coefficient Histograms PDF available

Author(s): Xu-Ren Luo | Chen-Hui Jerry Lin | Te-Lung Yi
Volume: 2
Issue: 1
Year: 2011
Why do you need a reservation system?      Save time & money - Smart Internet Solutions