|
Issue |
Title |
|
Vol 24, No 2 (2016) |
Penguins Search Optimisation Algorithm for Association Rules Mining |
Abstract
PDF
|
Youcef Gheraibia, Abdelouahab Moussaoui, Youcef Djenouri, Sohag Kabir, Peng Yeng Yin |
|
Vol 5, No 4 (1997) |
Performance Analysis of Beam Search with Look Ahead |
Abstract
PDF
|
Suranjan De, Anita Lee-Post |
|
Vol 12, No 3 (2004) |
Performance Analysis of Signaling Delay for Wireless Cellular Networks |
Abstract
PDF
|
Masashi Sugano, Doo Seop Eom, Masayuki Murata, Hideo Miyahara |
|
Vol 8, No 1 (2000): Special Issue on Parallel Numerics and Parallel Image Processing, Video Processing and Multimedia |
Performance Analysis, PVM and MPI Implementation of a DSCF Hartree Fock Program |
Abstract
PDF
|
Siegfried Hoefinger, Othmar Steinhauser, Peter Zinterhof |
|
Vol 30, No 1 (2022) |
Performance Comparison of the Cogent Confabulation Classifier with Other Commonly Used Supervised Machine Learning Algorithms for Bathing Water Quality Assessment |
Abstract
PDF
|
Antonia Ivanda, Ljiljana Šerić, Maja Braović, Darko Stipaničev |
|
Vol 12, No 1 (2004) |
Personalized Trust Management in Decision Making: A Dynamic Clustering Approach |
Abstract
PDF
|
Georgios P Papamichail, Dimitrios P Papamichail |
|
Vol 3, No 2 (1995) |
PILOT - A Simple Process Improvement Tool for Small and Midsize Manufacturing Companies |
Abstract
PDF
|
Rodolfo De Dominicis, Vesna Luzar-Stiffler, Laura Granata |
|
Vol 8, No 1 (2000): Special Issue on Parallel Numerics and Parallel Image Processing, Video Processing and Multimedia |
Polyvalent Parallelizations for Hierarchical Block Matching Motion Estimation |
Abstract
PDF
|
Charalampos G. Konstantopoulos, Andreas I. Svolos, Christos Kaklamanis |
|
Vol 32, No 3 (2024) |
Power Load Prediction Algorithm Based on Wavelet Transform |
Abstract
PDF
|
Xu Chen, Haomiao Zhang, Chao Zhang, Zhiqiang Cheng, Yinzhe Xu |
|
Vol 20, No 4 (2012) |
Practical Implications of Real Time Business Intelligence |
Abstract
PDF
|
Dale Rutz, Tara Nelakanti, Nayem Rahman |
|
Vol 27, No 2 (2019) |
Practical Model Checking of a Home Area Network System: Case Study |
Abstract
PDF
|
Soufiane Zahid, Abdeslam En-Nouaary, Slimane Bah |
|
Vol 20, No 1 (2012) |
Predicting Number of Zombies in DDoS Attacks Using Pace Regression Model |
Abstract
PDF
|
B. B. Gupta |
|
Vol 29, No 1 (2021) |
Prediction of Spot Price of Iron Ore Based on PSR-WA-LSSVM Combined Model |
Abstract
PDF
Untitled
PDF
|
Xiangjun Cai, Shihua Luo |
|
Vol 30, No 2 (2022) |
Predictive Control of an Intelligent Energy-saving Operation System Based on Deep Learning |
Abstract
PDF
|
Yongfang Lu, Xiaofang Lu |
|
Vol 16, No 2 (2008): Special Issue on Recent Advances in Computer and Communication Networks Technology |
Pre-emptive Dynamic Source Routing: A Repaired Backup Approach and Stability Based DSR with Multiple Routes |
Abstract
PDF
|
Susmit Maity, Soumen Saha, Sk. Sahnawaj, Barun Kumar Saha, Chandan Tilak Bhunia |
|
Vol 5, No 2 (1997) |
Principal Typing for Parallel and non-Deterministic Lambda-calculus |
Abstract
PDF
|
Ali S. Aoun, Franco Barbanera, Mariangiola Dezani-Ciancaglini, Seref Mirasyedioglu |
|
Vol 11, No 2 (2003) |
Priority Traffic Modeling in Multicellular Communication Networks |
Abstract
PDF
|
Pietro Camarda, Giovanna Schiraldi, Fabrizio Talucci |
|
Vol 27, No 4 (2019) |
Privacy Preserving Location-Based Client-Server Service Using Standard Cryptosystem |
Abstract
PDF
|
Adebukola Onashoga, Adesina Sodiya, Idowu Osinuga |
|
Vol 20, No 3 (2012): Special Issue: Selected Papers from ITI 2012 Conference |
Proactive Personalized Mobile Multi-Blogging Service on Smart-M3 |
Abstract
PDF
|
Dmitry G. Korzun, Ivan V. Galov, Sergey I. Balandin |
|
Vol 21, No 3 (2013) |
Process and Data Logic Integration: Logical Links between UML Use Case Narratives and ER Diagrams |
Abstract
PDF
|
Boris Jukic, Nenad Jukic, Svetlozar Nestorov |
|
Vol 13, No 1 (2005) |
Process Synchronization with Readers and Writers Revisited |
Abstract
PDF
|
Jalal Kawash |
|
Vol 1, No 2 (1993) |
Product Analysis with a View to Determining the Mounting Process |
Abstract
PDF
|
Jakša Galić |
|
Vol 1, No 1 (1993) |
Program Partitioning for a Control/Data Driven Computer |
Abstract
PDF
|
Jurij Šilc, Borut Robič |
|
Vol 1, No 3 (1993) |
Pronominal and Anaphor Resolution |
Abstract
PDF
|
Nikitas N. Karanikolas |
|
Vol 23, No 4 (2015): Special Issue on Network Security |
Protecting User Privacy for Cloud Computing by Bivariate Polynomial Based Secret Sharing |
Abstract
PDF
|
Ching-Nung Yang, Jia-Bin Lai, Zhangjie Fu |
|
Vol 1, No 4 (1993) |
Prototyping - a Technique for Participative Information Systems Design |
Abstract
PDF
|
David W. Wilson |
|
Vol 29, No 2 (2021) |
Providing Physical Layer Security for IoTs in the Last Mile |
Abstract
PDF
|
Hong Zhao, Paul Ratazzi |
|
Vol 32, No 3 (2024) |
PW-FBPNN: A Hybrid Fault Diagnosis Method for Power Circuit Systems Combining Principal Component Analysis, Wavelet Packet Transform, and Fuzzy Neural Networks |
Abstract
PDF
|
Xu Chen, Chao Zhang, Haomiao Zhang, Zhiqiang Cheng, Yu Yan |
|
Vol 11, No 3 (2003): Special Issue on ITI 2003 - Information Technology Interfaces |
Qualitative Data Mining and Its Applications |
Abstract
PDF
|
Ivan Bratko, Dorian Šuc |
|
Vol 20, No 4 (2012) |
Quality of Service Issues for Reinforcement Learning Based Routing Algorithm for Ad-Hoc Networks |
Abstract
PDF
|
Shrirang Ambaji Kulkarni, G. Raghavendra Rao |
|
841 - 870 of 1134 Items |
<< < 24 25 26 27 28 29 30 31 32 33 > >> |