| Issue | Title | |
| Vol 9, No 1 (2001) | Training Artificial Neural Networks: Backpropagation via Nonlinear Optimization | Abstract PDF |
| Jadranka Skorin-Kapov, K. Wendy Tang | ||
| Vol 14, No 2 (2006) | Transclusions in an HTML-Based Environment | Abstract PDF |
| Josef Kolbitsch, Hermann Maurer | ||
| Vol 10, No 1 (2002): Special Issue on Domain-Specific Languages Part II | Transforming XML Documents using fxt | Abstract PDF |
| Alexandru Berlea, Helmut Seidl | ||
| Vol 26, No 2 (2018) | Transforming XML to RDF(S) with Temporal Information | Abstract PDF |
| Dan Yang, Li Yan | ||
| Vol 14, No 2 (2006) | Translating XML Update Language into SQL | Abstract PDF |
| Pensri Amornsinlaphachai, Nick Rossiter, Akhtar Ali | ||
| Vol 21, No 3 (2013) | Trust Based Routing to Improve Network Lifetime of Mobile Ad Hoc Networks | Abstract PDF |
| Sumathy Subramaniam, R. Saravanan, Pooja K. Prakash | ||
| Vol 23, No 2 (2015) | Trust Integrated Congestion Aware Energy Efficient Routing forWireless Multimedia Sensor Networks (TCEER) | Abstract PDF |
| Arpita Chakraborty, Srinjoy Ganguly, Mrinal Kanti Naskar, Anupam Karmakar | ||
| Vol 17, No 2 (2009) | TUKAB: An Efficient NAT Traversal Scheme on Security of VoIP Network System Based on Session Initiation Protocol | Abstract PDF |
| K. M. Azharul Hasan, Ifta Khirul, Kamrul Islam | ||
| Vol 20, No 4 (2012) | Twenty Years of CIT: An Interview with the first Editor-in-Chief Leo Budin | Abstract PDF |
| Leo Budin's Interview Given to Nataša Dobrenić | ||
| Vol 7, No 2 (1999) | Two-Phase Load Modelling in Three-Phase Load Flow | Abstract PDF |
| Zdravko Hebel, Ivica Pavić, Marko Delimar | ||
| Vol 6, No 2 (1998): Special Issue on Biomedical Image Processing and Analysis | Ultrasound Image Segmentation using Stochastic Templates | Abstract PDF |
| C. A. Glasbey | ||
| Vol 17, No 4 (2009) | UML Modeling of Network Topologies for Distributed Computer System | Abstract PDF |
| Vipin Saxena, Deepak Arora | ||
| Vol 4, No 2 (1996) | Understanding and Supporting Information Systems Evaluation | Abstract PDF |
| Vasilis Serafeimidis, Steve Smithson | ||
| Vol 25, No 1 (2017) | Unibot, a Universal Agent Architecture for Robots | Abstract PDF |
| Goran Zaharija, Saša Mladenović, Lada Maleš | ||
| Vol 4, No 4 (1996) | University Automated Timetabling | Abstract PDF |
| Nuno Mamede, Pedro Soares | ||
| Vol 21, No 4 (2013) | Unsupervised Color Image Segmentation Based on Non Parametric Clustering | Abstract PDF |
| Imène Kirati, Yamina Tlili | ||
| Vol 16, No 4 (2008): Special Issue: Selected Papers from ITI 2008 Conference | Useful Oblivion Versus Information Overload in e-Learning Examples in the Context of Wiki Systems | Abstract PDF |
| Christian Stickel, Martin Ebner, Andreas Holzinger | ||
| Vol 10, No 3 (2002): Special Issue on ITI 2002 - Information Technology Interfaces | User Interface Specification Issues for Computerized Educational Systems | Abstract PDF |
| Andrina Granić, Vlado Glavinić | ||
| Vol 16, No 4 (2008): Special Issue: Selected Papers from ITI 2008 Conference | Using a Typed Mind Map as a Data Model in a TDD DICE System | Abstract PDF |
| Li-Ren Chien, Daniel J. Buehrer | ||
| Vol 19, No 2 (2011) | Using Actors to Build a Parallel DBMS | Abstract PDF |
| Walid-Khaled Hidouci, Djamel Eddine Zegour | ||
| Vol 18, No 2 (2010): The Overseas Contribution to the ITI Conference, including some 2009 Conference Examples | Using Case Studies as a Lens to Observe Teaching Evaluations | Abstract PDF |
| Patrick Halloran | ||
| Vol 23, No 1 (2015): Special Issue on Emerging Web Technologies and Applications | Using Cloud Services in a Modern Learning Management System | Abstract PDF |
| Alexei Scerbakov, Martin Ebner, Nikolai Scerbakov | ||
| Vol 2, No 4 (1994) | Using Conceptual Graphs to Represent Database Inference Security Analysis | Abstract PDF |
| Harry S. Delugach, Thomas H. Hinke | ||
| Vol 3, No 1 (1995) | Using Hypertext in Developing the Human Computer Interface to Gaming-Simulation Environments that Incorporate Intelligent Tutoring Support | Abstract PDF |
| Marios C. Angelides, Ka Yan Tong | ||
| Vol 2, No 2 (1994) | Using Hypertext to Implement Multiple Tutoring Strategies in an Intelligent Tutoring System for Music Learning | Abstract PDF |
| Marios C. Angelides, Amelia K. Y. Tong | ||
| Vol 14, No 1 (2006): Special Issue on Computer-Assisted Craniofacial Reconstruction and Modeling | Using Image Analysis Software to Create a Physical Skull Model for the Facial Reconstruction of a Wrapped Akhmimic Mummy | Abstract PDF |
| Heather Gill-Robinson, Jonathan Elias, Frank Bender, Travis T. Allard, Robert D. Hoppa | ||
| Vol 20, No 2 (2012) | Using Influence Nets in Financial Informatics: A Case Study of Pakistan | Abstract PDF |
| Sajjad Haider, Muhammad Shafqat, Shabih Haider | ||
| Vol 10, No 3 (2002): Special Issue on ITI 2002 - Information Technology Interfaces | Using Inverted Files to Compress Text | Abstract PDF |
| Strahil Ristov | ||
| Vol 18, No 4 (2010): Special Issue from the 2010 ITI Conference | Using Machine Learning on Sensor Data | Abstract PDF |
| Alexandra Moraru, Marko Pesko, Maria Porcius, Carolina Fortuna, Dunja Mladenic | ||
| Vol 15, No 1 (2007) | Using Network Processor to Establish Security Agent for AODV Routing Protocol | Abstract PDF |
| Chen Hongsong, Fu Zhongchuan, Wang Chengyao, Ji Zhenzhou, Hu Mingzeng | ||
| 1111 - 1140 of 1162 Items | << < 33 34 35 36 37 38 39 > >> | |
Journal of Computing and Information Technology

