A Model for Semantic Integration of Business Components |
Larbi Kzaz, Hicham Elasri, Abderrahim Sekkaki |
Vol 2, No 1 (2010), Pagination: 1-12
|
ABSTRACT |
PDF
|
|
Abstract Views: 342 |
PDF Views: 167
|
Agent Based Trust Management Framework in Distributed E-Business Environment |
E. Sathiyamoorthy, N. Ch. Sriman Narayana Iyenger |
Vol 2, No 1 (2010), Pagination: 14-28
|
ABSTRACT |
PDF
|
|
Abstract Views: 361 |
PDF Views: 152
|
Multi Dimensional CTL and Stratified Datalog |
Theodore Andronikos, Vassia Pavlaki |
Vol 2, No 1 (2010), Pagination: 29-53
|
ABSTRACT |
PDF
|
|
Abstract Views: 374 |
PDF Views: 160
|
An Efficient Gait Recognition System For Human Identification Using Modified ICA |
M. Pushpa Rani, G. Arumugam |
Vol 2, No 1 (2010), Pagination: 55-67
|
ABSTRACT |
PDF
|
|
Abstract Views: 380 |
PDF Views: 197
|
Cartographic Generalization (Selection) For 2D Map of Urban Area |
Jagdish Lal Raheja, Umesh Kumar, K. C. Saravanan |
Vol 2, No 1 (2010), Pagination: 69-75
|
ABSTRACT |
PDF
|
|
Abstract Views: 375 |
PDF Views: 158
|
A BPT Application: Semi-Automatic Image Retrieval Tool |
Shirin Ghanbari, John C. Woods, Simon M. Lucas, Hamid R. Rabiee |
Vol 2, No 1 (2010), Pagination: 77-83
|
ABSTRACT |
PDF
|
|
Abstract Views: 556 |
PDF Views: 207
|
Analyzing the P2P Traffic Using Probability Schemes |
M. Sadish Sendil, N. Nagarajan |
Vol 2, No 1 (2010), Pagination: 85-94
|
ABSTRACT |
PDF
|
|
Abstract Views: 338 |
PDF Views: 164
|
Low Power VLSI Design with Resistive Feedback Logic |
C. Ashok Kumar, B. K. Madhavi, K. Lal Kishore |
Vol 2, No 1 (2010), Pagination: 96-104
|
ABSTRACT |
PDF
|
|
Abstract Views: 304 |
PDF Views: 147
|
Dynamic Probe Window Based Optimization for Surveillance in Home Security System |
Bhaskar Kapoor, Anamika Chhabra |
Vol 2, No 1 (2010), Pagination: 106-114
|
ABSTRACT |
PDF
|
|
Abstract Views: 335 |
PDF Views: 154
|
Performance Evaluation of Face Recognition Using Gabor Filter, Log Gabor filter and Discrete Wavelet Transform |
D. Murugan, S. Arumugam, K. RajalakshmiDepartment of CSE, Francis Xavier Engineering College, T. I. Manish |
Vol 2, No 1 (2010), Pagination: 125-133
|
ABSTRACT |
PDF
|
|
Abstract Views: 327 |
PDF Views: 228
|
A Mobility-Based CheckPointing Protocol for Mobile Computing System |
Suparna Biswas, Sarmistha Neogy |
Vol 2, No 1 (2010), Pagination: 135-151
|
ABSTRACT |
PDF
|
|
Abstract Views: 337 |
PDF Views: 165
|