|
Issue |
Title |
|
Vol 18, No 4 (2010): Special Issue from the 2010 ITI Conference |
Measuring True Performance of the Work Function Algorithm for Solving the On-line k-Server Problem |
Abstract
PDF
|
Tomislav Rudec, Alfonzo Baumgartner, Robert Manger |
|
Vol 12, No 2 (2004): Special Issue on ITI 2004 - Information Technology Interfaces |
Methodological Framework of Business Reengineering within Logistics System |
Abstract
PDF
|
Marina Čičin-Šain, Slavomir Vukmirović, Zvonko Čapko |
|
Vol 17, No 2 (2009) |
mFrame: An Application Framework for Mobile Resource-constrained Computing Environments |
Abstract
PDF
|
Hinko Vincar, Hossein Saiedian, Serhiy Morozov |
|
Vol 24, No 4 (2016) |
Microcanonical Annealing and Threshold Accepting for Parameter Determination and Feature Selection of Support Vector Machines |
Abstract
PDF
|
Seyyid Ahmed Medjahed, Tamazouzt Ait Saadi, Abdelkader Benyettou, Mohammed Ouali |
|
Vol 23, No 3 (2015) |
Mining Individual Behavior Pattern Based on Semantic Knowledge Discovery of Trajectory |
Abstract
PDF
|
Min Ren, Feng Yang, Guangchun Zhou, Haiping Wang |
|
Vol 15, No 1 (2007) |
Missing Data Correction in Still Images Using Multi-Resolution Analysis |
Abstract
PDF
|
Blerim Mustafa, Vladimir Trajkovik, Danco Davcev |
|
Vol 24, No 3 (2016) |
Mitigating Malicious Attacks Using Trust Based Secure-BEFORE Routing Strategy in Mobile Ad Hoc Networks |
Abstract
PDF
|
Rutuja Shah, Sumathy Subramaniam, Dhinesh Babu Lekala Dasarathan |
|
Vol 25, No 2 (2017) |
Mix Multiple Features to Evaluate the Content and the Linguistic Quality of Text Summaries |
Abstract
PDF
|
Samira Ellouze, Maher Jaoua, Lamia Hadrich Belguith |
|
Vol 20, No 3 (2012): Special Issue: Selected Papers from ITI 2012 Conference |
Mixnets: Implementation and Performance Evaluation of Decryption and Re-encryption Types |
Abstract
PDF
|
Pance Ribarski, Ljupcho Antovski |
|
Vol 24, No 2 (2016) |
Mobile Agent-Based Software Systems Modeling Approaches: A Comparative Study |
Abstract
PDF
|
Aissam Belghiat, Elhillali Kerkouche, Allaoua Chaoui, Mokhtar Beldjehem |
|
Vol 17, No 1 (2009): Special Issue on Advanced Mobile Robotics |
Mobile Robot as Physical Agent of Intelligent Space |
Abstract
PDF
|
Drazen Brscic, Hideki Hashimoto |
|
Vol 7, No 2 (1999) |
Mobile Robot Path Planning in 2D Using Network of Equidistant Path |
Abstract
PDF
|
Mladen Crneković, Branko Novaković, Dubravko Majetić |
|
Vol 18, No 2 (2010): The Overseas Contribution to the ITI Conference, including some 2009 Conference Examples |
Model of the Hydro-Information System of the Republic of Macedonia |
Abstract
PDF
|
Blagoj Todor Delipetrev, Dragan Mihajlov, Marjan Delipetrov, Todor Delipetrov |
|
Vol 11, No 1 (2003) |
Modeling a Multi-Agent System for Retrieving Information from Distributed Sources |
Abstract
PDF
|
Sophie-Julie Pelletier, Samuel Pierre, Hai Hoc Hoang |
|
Vol 16, No 4 (2008): Special Issue: Selected Papers from ITI 2008 Conference |
Modeling and Optimization Techniques of Electronic Devices Using Genetic Algorithm |
Abstract
PDF
|
Sherif Michael |
|
Vol 8, No 3 (2000): Special Issue on Real-Time Systems Design |
Modeling and Simulation of a Hard Real-Time Processor |
Abstract
PDF
|
Vlado Glavinić, Stjepan Groš, Matjaž Colnarič |
|
Vol 16, No 2 (2008): Special Issue on Recent Advances in Computer and Communication Networks Technology |
Modeling and Simulation of Quality of Service in VoIP Wireless LAN |
Abstract
PDF
|
Ahmed Al-Naamany, Hadj Bourdoucen, Wadeh Al-Menthari |
|
Vol 24, No 4 (2016) |
Modeling Topological Relationships between Fuzzy Spatio-Temporal Objects |
Abstract
PDF
|
Haitao Cheng, Fu Zhang |
|
Vol 3, No 2 (1995) |
Modeling Trusted Processing Architectures for Mandatory Access Control |
Abstract
PDF
|
Thomas H. Hinke |
|
Vol 23, No 2 (2015) |
Modelling and Evaluating Software Project Risks with Quantitative Analysis Techniques in Planning Software Development |
Abstract
PDF
|
Abdelrafe Elzamly, Burairah Hussin |
|
Vol 9, No 3 (2001): Special Issue on ITI 2001 - Information Technology Interfaces |
Modelling Continuing Professional Development in an Innovative Context |
Abstract
PDF
|
Flemming K. Fink |
|
Vol 5, No 2 (1997) |
Modelling of Seawater Quality Management |
Abstract
PDF
|
Tarzan Legović |
|
Vol 26, No 1 (2018) |
Modified Token Based Congestion Control Scheme for Opportunistic Networks |
Abstract
PDF
|
Emmanuel Adewale Adedokun, Hamisu Abubakar Adamu, Idris Salawu Shaibu |
|
Vol 18, No 2 (2010): The Overseas Contribution to the ITI Conference, including some 2009 Conference Examples |
Motivation for Writing the Paper Risk Effect on Offshore Systems Development Project Cost |
Abstract
PDF
|
Gerald DeHondt II, George Nezlek |
|
Vol 18, No 2 (2010): The Overseas Contribution to the ITI Conference, including some 2009 Conference Examples |
Motivation for Writing the Paper What an Information System Is, and Why Is It Important to Know This : Why I Give Lectures and Seminars |
Abstract
PDF
|
Ray J. Paul |
|
Vol 18, No 2 (2010): The Overseas Contribution to the ITI Conference, including some 2009 Conference Examples |
Motivation for Writing the Paper: Designing Quick and Dirty Applications for Mobiles: Making the Case for the Utility of HCI Principles |
Abstract
PDF
|
Lynne Baillie |
|
Vol 3, No 4 (1995) |
MSSI - Modular Structure of Stochastic Process Information for Power System Control |
Abstract
PDF
|
Juraj Šimunić |
|
Vol 27, No 1 (2019): Special Issue on Agent and Multiagent Systems Design |
Multi-Agent Pursuit-Evasion Game Based on Organizational Architecture |
Abstract
PDF
|
Mohammed El Habib Souidi, Abderrahim Siam, Zhaoyi Pei, Songhao Piao |
|
Vol 14, No 3 (2006) |
Multi-level and Secured Agent-based Intrusion Detection System |
Abstract
PDF
|
Adesina Simon Sodiya |
|
Vol 5, No 2 (1997) |
Multilevel Logic Programming for Software Engineering |
Abstract
PDF
|
Maria Bielikova, Pavol Navrat |
|
751 - 780 of 1134 Items |
<< < 21 22 23 24 25 26 27 28 29 30 > >> |