New Generating Technique for Image Steganography

Author(s): Seifedine Kadry | Sara Nasr
Volume: 1
Issue: 2
Year: 2013





Parametric Models for Effort Estimation for Global Software Development

Author(s): S. Ramacharan | K. Venu Gopala Rao
Volume: 1
Issue: 2
Year: 2013





A Comprehensive Analysis of Factors Influencing Quality of Requirements

Author(s): V. Suma | B. R. Shubhamangala
Volume: 1
Issue: 2
Year: 2013





A Comparative Analysis of Trust Models for Multi-Agent Systems

Author(s): Vimala Balakrishnan | Elham Majd
Volume: 1
Issue: 2
Year: 2013





Extraction and Classification of Twitter Messages to Apply in Business Intelligence

Author(s): De La Cruz S. Carlos | Cortez H. Paola
Volume: 1
Issue: 2
Year: 2013





A Study of Biometric Approach Using Fingerprint Recognition

Author(s): Ravi Subban | Dattatreya P. Mankame
Volume: 1
Issue: 2
Year: 2013





An Overview of Technical Models for Dynamic Analysis

Author(s): Radhika D. Venkatasubramanyam | Snigdha Nayak
Volume: 1
Issue: 2
Year: 2013





A Design and Implementation of an Emotion Reasoning Chip Based Emotion Reasoning System

Author(s): Yong-Seok Lim | Seung-Ok Lim | Young-Choong Park | Byoung-Ha Park | Joongjin Kook
Volume: 1
Issue: 2
Year: 2013





Automatic Segmentation of Femur Bone Features and Analysis of Osteoporosis

Author(s): P. Santhoshini | R. Tamilselvi | R. Sivakumar
Volume: 1
Issue: 2
Year: 2013





A Survey on Application of Machine Learning to Resource Management in Grid Environment

Author(s): Susmita Singh | Sarbani Roy | Madhulina Sarkar, Sarbani Roy
Volume: 1
Issue: 2
Year: 2013





Comparative Analysis of Andrew Files System and Hadoop Distributed File System

Author(s): Monali Mavani
Volume: 1
Issue: 2
Year: 2013





Decision Tree Applied to Learning Relations between Ontologies

Author(s): R. Mirambicka | A. Razia Sulthana | G. Vadivu
Volume: 1
Issue: 2
Year: 2013





Interactive Data Mining: A Brief Survey

Author(s): M. Manohara | R. Dinesh | S. M. Sowmya
Volume: 1
Issue: 2
Year: 2013





Software Sizing and Productivity with Function Points

Author(s): H. K. Raju | Y. T. Krishnegowda
Volume: 1
Issue: 2
Year: 2013





A Component-Based Approach to Verification of Formal Software Models to Check Safety Properties of Distributed Systems

Author(s): Sungeetha Dakshinamurthy | Vasumathi K. Narayanan
Volume: 1
Issue: 2
Year: 2013





Myths and Over-Simplifications in Software Engineering

Author(s): Magne Jørgensen
Volume: 1
Issue: 1
Year: 2013





A Systematic Mapping Study on Requirements Elicitation Techniques in Collaborative Application

Author(s): Noorihan Abdul Rahman | Shamsul Sahibuddin
Volume: 1
Issue: 1
Year: 2013





Congestion Detection and Control with Control Plane Functionality (CDC-CPF) in Cross Layer Designing of Multihop Networks

Author(s): S. Sreenivasa Chakravarthi | K. Madhavi
Volume: 1
Issue: 1
Year: 2013





Release Management for Parallel Development:A Case Study

Author(s): De Sujoy | Rahut Amit Kumar | Bhattacharya Uttam
Volume: 1
Issue: 1
Year: 2013





Medical Diagnostics Using Cloud Computing with FuzzyLogic and Uncertainty Factors in Mobile Devices

Author(s): V. Aswin | S. Deepak
Volume: 1
Issue: 1
Year: 2013





Traditional and Systematic Review of Critic Taxonomy Development

Author(s): Norhayati Mohd Ali | Salmi Baharom
Volume: 1
Issue: 1
Year: 2013




