Academic Journals Database
Disseminating quality controlled scientific knowledge

International Journal of Computer Science & Applications

ISSN: 0972--9038
Publisher: Technomathematics Research Foundation


ADD TO MY LIST
 
Editorial & Cover Page PDF available

Author(s): Dumitru Dan Burdescu
Volume: 7
Issue: 3
Year: 2010
DISCONTINUITY IN SVD EMBEDDING MAPPING USED FOR WATERMARKS PDF available

Author(s): Kazuo Ohzeki, | Yuki Seo, | Engyoku Gi
Volume: 7
Issue: 3
Year: 2010
A MULTIMEDIA DATABASE SERVER: IMPLEMENTATION AND FUNCTIONS PDF available

Author(s): Cosmin Stoica Spahiu
Volume: 7
Issue: 3
Year: 2010
THE SIMULATION OF THE IMPACT OF THE POLLUTION FACTORS ON THE PHYSICAL AND CHEMICAL PARAMETERS OF THE AIR QUALITY ALONG THE ROMANIAN COAST OF BLACK SEA USING NEURAL MODELS. PDF available

Author(s): Nicolae Tudoroiu, | Gabriela Neacsu, | Tiberiu Letia, | Nicolae Ilias, | Roxana-Elena Tudoroiu
Volume: 7
Issue: 3
Year: 2010
COLLUSION-RESISTANT FINGERPRINTS BASED ON REAL SUPERIMPOSED CODES PDF available

Author(s): Valery Korzhik, | Anton Ushmotkin, | Artem Razumov, | Guillermo Morales-Luna, | Irina Marakova-Begoc
Volume: 7
Issue: 3
Year: 2010
AN OBJECT ORIENTED GRAPH APPROACH FOR IMAGE REPRESENTATION AND QUERY BASED ON CONTENT PDF available

Author(s): Eugen Ganea, | Marius Brezovan
Volume: 7
Issue: 3
Year: 2010
EXPLOITING AUDIO-VISUAL CORRELATION BY MEANS OF GAZE TRACKING PDF available

Author(s): Bartosz Kunka, | Bozena Kostek
Volume: 7
Issue: 3
Year: 2010
STRUCTURE BASED FEATURE EXTRACTION IN BASKETBALL ZONE-DEFENSE STRATEGIES PDF available

Author(s): Aihua Zheng, | Jixin Ma, | Miltos Petridis, | Jin Tang, | Bin Luo
Volume: 7
Issue: 3
Year: 2010
CHARACTERIZING APPLICATION ATTENTIVENESS TO ITS USERS: A METHOD AND POSSIBLE USE CASES PDF available

Author(s): Milan Z. Bjelica, | Nikola Teslić
Volume: 7
Issue: 3
Year: 2010
HUMAN-COMPUTER INTERFACE BASED ON VISUAL LIP MOVEMENT AND GESTURE RECOGNITION PDF available

Author(s): Piotr Dalka, | Andrzej Czyzewski
Volume: 7
Issue: 3
Year: 2010
Editorial & Cover Page PDF available

Author(s): R. Akerkar
Volume: 7
Issue: 2
Year: 2010
Mechanized Cultural Reasoning as a Tool to Assess Trust in Virtual Enterprises PDF available

Author(s): Jacques Calmet, | Pierre Maret | Marvin Schneider
Volume: 7
Issue: 2
Year: 2010
A Framework for Manual Ontology Engineering for Management of Learning Material Repository PDF available

Author(s): Plaban Kumar Bhowmick, | Devshri Roy, | Sudeshna Sarkar, | Anupam Basu
Volume: 7
Issue: 2
Year: 2010
Information Integration in Searchy: An Ontology and Web Services Based Approach PDF available

Author(s): David F. Barrero, | María D. R-Moreno
Volume: 7
Issue: 2
Year: 2010
Selecting Effective Expansion Terms for Better Information Retrieval PDF available

Author(s): Hazra Imran | Aditi Sharan
Volume: 7
Issue: 2
Year: 2010
Achieving Maturity: the State of Practice in Ontology Engineering in 2009. PDF available

Author(s): E. Simperl, | M. Mochol | T. . Bürger
Volume: 7
Issue: 1
Year: 2010
Ontology Based User Modeling for Personalized Information Access. PDF available

Author(s): P. K. Bhawmick, | S. Sarkar | . Basu
Volume: 7
Issue: 1
Year: 2010
Semantic Web Prefetching Scheme using Naïve Bayes Classifier. PDF available

Author(s): P. Venketesh, | R.. Venkatesan | L. Arunprakash
Volume: 7
Issue: 1
Year: 2010
Automatic Language Identification: An Alternative Unsupervised Approach Using a New Hybrid Algorithm. PDF available

Author(s): A. Amine, | Z. Elberrichi | M. Simonet
Volume: 7
Issue: 1
Year: 2010
Towards SDL Ontology. PDF available

Author(s): M. B. Babac | M. Kunštić
Volume: 7
Issue: 1
Year: 2010
Editorial & Cover Page PDF available

Author(s): R. Akerkar
Volume: 7
Issue: 1
Year: 2010
A method for creating entreprise architecture metamodels applied to systems modifiability. PDF available

Author(s): Robert Lagerstorm, | Ulrik Franke, | Pontus Johnson | Johan Ullberg
Volume: 6
Issue: 5
Year: 2009
Efficient skyline refinement using trade-offs respecting don’t care attributes. PDF available

Author(s): Christoph Lofi | Wolf-Tilo Balke
Volume: 6
Issue: 5
Year: 2009
Protecting agents from malicious hosts using TPM. PDF available

Author(s): Antonio Muñoz, | Antonio Maña | Daniel Serrano
Volume: 6
Issue: 5
Year: 2009
3MSF: A framework to select mobile office devices. PDF available

Author(s): Carlos Cares | Xavier Franch
Volume: 6
Issue: 5
Year: 2009
Integration of domain-specific modelling languages and UML through UML profile extension mechanism. PDF available

Author(s): Giovanni Giachetti, B | eatriz Marin | Oscar Pastor
Volume: 6
Issue: 5
Year: 2009
A pattern-based method for building requirements documents in call-for-tender processes. PDF available

Author(s): Samuel Renault, | Oscar Mendez-Bonilla, | Xavier Franch, | Carme Quer
Volume: 6
Issue: 5
Year: 2009
Guest Editorial PDF available

Author(s): André Flory | Martine Collard
Volume: 6
Issue: 5
Year: 2009
e3alignment: Exploring inter-organizational alignment in net worked value constellations. PDF available

Author(s): Vincent Pijpers, | Jaap Gordijn | Hans Akkermans
Volume: 6
Issue: 5
Year: 2009
DESIGN OF RECONFIGURABLE IMAGE ENCRYPTION PROCESSOR USING 2-D CELLULAR AUTOMATA GENERATOR. PDF available

Author(s): Machhout Mohsen | Guitouni Zied | Zeghid Medien | Tourki Rached
Volume: 6
Issue: 4
Year: 2009
DYNAMIC RECONFIGURATION OF WIRELESS SENSOR NETWORKS. PDF available

Author(s): Koustubh Kulkarni | Sudip Sanyal | Hameed Al-Qaheri | Sugata Sanyal
Volume: 6
Issue: 4
Year: 2009
THE FEATURE ORIENTED REUSE METHOD WITH BUSINESS COMPONENT SEMANTICS. PDF available

Author(s): Marcel Fouda Ndjodo | Amougou Ngoumou
Volume: 6
Issue: 4
Year: 2009
A METHODOLOGY FOR COMPARING SERVICE POLICIES USING A TRUST MODEL. PDF available

Author(s): Henry Hexmoor
Volume: 6
Issue: 4
Year: 2009
A Fault Management and Monitoring Mechanism for Secure Medical Sensor Network. PDF available

Author(s): Hayoung Oh, | Inshil Doh, | Kijoon Chae
Volume: 6
Issue: 3
Year: 2009
Mobile Node Authentication Protocol for Proxy Mobile. PDF available

Author(s): Jungwook Song, | Sunyoung Han
Volume: 6
Issue: 3
Year: 2009
Novel Authentication & Authorization Management for Sensitive Information Privacy Protection Using Dynamic Key Based Group Key Management. PDF available

Author(s): Xianping Wu, | Huy Hoang Ngo, | Phu Dung Le, | Balasubramaniam Srinivasan
Volume: 6
Issue: 3
Year: 2009
A More Secure MFE Multivariate Public Key Encryption Scheme PDF available

Author(s): Xin Wang, | Feng Feng, | Xinmei Wang, | Qi Wang
Volume: 6
Issue: 3
Year: 2009
Editorial: Network Security and Applications PDF available

Author(s): Natarajan Meghanathan | Dhinaharan Nagamalai
Volume: 6
Issue: 3
Year: 2009
A Forensic Logging System Based on a Secure OS. PDF available

Author(s): Ilkyeun Ra, | Tae-Kyou Park
Volume: 6
Issue: 3
Year: 2009
Attack Classification Based on Data Mining Technique and Its Application for Reliable Medical Sensor Communication. PDF available

Author(s): Hayoung Oh, | Inshil Doh, | Kijoon Chae
Volume: 6
Issue: 3
Year: 2009
Improvement of Carrier Sorting Rate of Letter in Postal Logistics. PDF available

Author(s): Boo-Hyung Lee, | Jeong-Hyun Park
Volume: 6
Issue: 3
Year: 2009
The RP-Index and the CP-Index for Evaluating the Productivity of Researchers and their Communities PDF available

Author(s): Jörn Altmann, | Alireza Abbasi | Junseok Hwang
Volume: 6
Issue: 2
Year: 2009
Context-Awareness, The Missing Block of Social Networking PDF available

Author(s): Adrien Joly, | Pierre Maret | Johann Daigremont
Volume: 6
Issue: 2
Year: 2009
Agent-Based Knowledge Communities PDF available

Author(s): Pierre Maret | Jacques Calmet
Volume: 6
Issue: 2
Year: 2009
Mobile Virtual Communities for Telemedicine: Research Challenges and Opportunities PDF available

Author(s): B.J.F. van Beijnum, | P. Pawar, | C.B. Dulawan | H.J. Hermens
Volume: 6
Issue: 2
Year: 2009
Editorial: Networking Mobile Virtual Knowledge PDF available

Author(s): Jacques Calmet | Pierre Maret
Volume: 6
Issue: 2
Year: 2009
Dynamic Evacuation Architecture using Context-Aware Policy Management PDF available

Author(s): Ulrich Hofmann, | Armin Veichtlbauer | Ilka Miloucheva
Volume: 6
Issue: 2
Year: 2009
Trust and Privacy: Informal Ways to Assess Risk on Opportunistic Exchanges PDF available

Author(s): Müller Robertro Pereira Gonçalves, | Edson Dos Santos Moreira | Luciana Andréia Fondazzi Martimiano
Volume: 6
Issue: 2
Year: 2009
RPA Switzerland

Robotic Process Automation Switzerland

    

Tango Rapperswil
Tango Rapperswil