Browse Title Index


 
Issue Title
 
Vol 4, No 6 (2012) R-Hash: Hash Function Using Random Quadratic Polynomials over GF(2) Abstract   PDF
Dhananjoy Dey, Noopur Shrotriya, Indranath Sengupta
 
Vol 8, No 4 (2016) Risk Management Frameworks for Cloud Computing: A Critical Review Abstract   PDF
Rana Alosaimi, Mohammad Alnuem
 
Vol 7, No 5 (2015) Robot Pose Estimation: A Vertical Stereo Pair Versus a Horizontal One Abstract   PDF
Mohammad Ehab Ragab, Kin Hong Wong
 
Vol 3, No 5 (2011) Robust Seed Selection Algorithm for K-Means Type Algorithms Abstract   PDF
K. Karteeka Pavan, Allam Appa Rao, A. V. Dattatreya Rao, G. R. Sridhar
 
Vol 14, No 5 (2022) Robust Watermarking Method for Secure Transmission of Medical Images in EHR Systems Abstract   PDF
Abderrahmane Daham, Mohamed Ouslim
 
Vol 4, No 6 (2012) Rotation Invariant Color Retrieval Abstract   PDF
Swapna Borde, Udhav Bhosle
 
Vol 5, No 3 (2013) SAAS Quality - A Method for Quality Evaluation of Software as a Service (SAAS) Abstract   PDF
Nemesio Freitas Duarte Filho, Clarindo Isaias Pereira da Silva e Padua, Paulo Henrique de Souza Bermejo, Andre Luiz Zambalde, Urlan Salgado de Barros
 
Vol 14, No 1 (2022) Safely Scaling Virtual Private Network For A Major Telecom Company During A Pandemic Abstract   PDF
Shannon Roberson, Mohammad Abdus Salam, Mathieu Kourouma, Osman Kandara
 
Vol 10, No 4 (2018) Search for Answers in Domain-Specific Supported by Intelligent Agents Abstract   PDF
Fernando Zacarias, Rosalba Cuapa, Guillermo De Ita, Miguel Bracamontes
 
Vol 3, No 1 (2011) Search-Based Software Test Data Generation Using Evolutionary Computation Abstract   PDF
P. Maragathavalli
 
Vol 2, No 3 (2010) Secret Sharing and Proactive Renewal of Shares in Hierarchical Groups Abstract   PDF
Ruchira Naskar, Indranil Sengupta
 
Vol 15, No 5 (2023) Secure Arcade: A Gamified Defense Against Cyber Attacks Abstract   PDF
Sean Loesch, Ryan Hrastich, Jordan Herbert, Ben Drangstveit, Jacob Weber, Mounika Vanamala
 
Vol 13, No 6 (2021) Secureti: Advanced SDLC And Project Management Tool For TI (Philippines) Abstract   PDF
Amelie Anne Gutierrez
 
Vol 2, No 6 (2010) Security Enhencement & Solution for Authentication Frame Work in IEEE 802.16 Abstract   PDF
A. K. M. Nazmus Sakib
 
Vol 2, No 6 (2010) Security in Wireless Sensor Networks Using Key Management Schemes Abstract   PDF
P. Soundarya, L. M. Varalakshmi
 
Vol 14, No 3 (2022) Security In Wireless Sensor Networks: Comparative Study Abstract   PDF
Fatimah Khalil Aljwari, Hajer Abdullah Alwadei, Aseel Abdullah Alfaidi
 
Vol 5, No 3 (2013) Security Threats on Cloud Computing Vulnerabilities Abstract   PDF
Te-Shun Chou
 
Vol 2, No 6 (2010) Segmentation and Object Recognition Using Edge Detection Techniques Abstract   PDF
Y. Ramadevi, T. Sridevi, B. Poornima, B. Kalyani
 
Vol 8, No 1 (2016) Segmentation of Magnetic Resonance Brain Tumor Using Integrated Fuzzy K-Means Clustering Abstract   PDF
P. Pedda Sadhu Naik, T. Venu Gopal
 
Vol 3, No 4 (2011) Self-Adaptation Mechanism to Control the Diversity of the Population in Genetic Algorithm Abstract   PDF
Chaiwat Jassadapakorn, Prabhas Chongstitvatana
 
Vol 11, No 6 (2019) Self-Learning AI Framework for Skin Lesion Image Segmentation and Classification Abstract   PDF
Anandhanarayanan Kamalakannan, Shiva Shankar Ganesan, Govindaraj Rajamanickam
 
Vol 7, No 4 (2015) Sensitivity Analysis of Information Retrieval Metrics Abstract   PDF
Marina Marjanovic-Jakovljevic
 
Vol 7, No 6 (2015) Service Oriented Quality Requirement Framework for Cloud Computing Abstract   PDF
Madhushi Rathnaayke, Janaka I. Wijayanayake
 
Vol 15, No 2 (2023) Sex Detection in the Early Stage of Feretilized Chicken Eggsvia Image Recognition Abstract   PDF
Ufuk Asil, Efendi Nasibov
 
Vol 7, No 2 (2015) SFAMSS: A Secure Framework for ATM Machines via Secret Sharing Abstract   PDF
Zeinab Ghafari, Taha Arian, Morteza Analoui
 
726 - 750 of 887 Items First Previous 25 26 27 28 29 30 31 32 33 34 Next Last