Issue | Title | |
Vol 2, No 1 (2014) | A Case Study of Industry-Institute Collaboration Project: Improving Software Engineering Learning Process | Abstract |
Shilpa Bhalerao, Jayant Bihare | ||
Vol 3, No 2 (2015) | A Complete Inter-Class Sharing During the Inheritance to Enhance Reusability of Public Data and their Access Control Using Dominance | Abstract |
Jyoti Lakhani, Dharmesh Harwani | ||
Vol 4, No 2 (2016) | A Comprehensive Analysis of Various Community Detection Algorithm | Abstract |
Gunjan J. Bhalala, Kamal K. Sutaria | ||
Vol 2, No 2 (2014) | A Dynamic Neural Network Model for Estimation in Software Development having Reusable Components | Abstract |
Jyoti Mahajan | ||
Vol 2, No 2 (2014) | A Lexicon Based Method for Opinion Mining | Abstract |
Adavi Lakshmi Bhargav, B. Prajna | ||
Vol 5, No 2 (2017) | A Loci Features Based Method to Convert Images of Differential Calculus Expressions to Their Text Equivalent | Abstract |
H. N. Sharada, Basavaraj S. Anami, K. B. Nagasundara | ||
Vol 3, No 1 (2015) | A Multi-Factor Coverage Based Test Case Prioritization Technique for Object Oriented Software | Abstract |
Vedpal, Naresh Chauhan | ||
Vol 1, No 1 (2013) | A New Approach to Design of CPG Model for Stable Humanoid Locomotion Using Neural Oscillators | Abstract |
Rajeev Kumar | ||
Vol 5, No 2 (2017) | A Novel Image Restoration Algorithm Using NSCT and Pixel Level Fusion | Abstract |
M. Shanmugasundaram, N. Shanmuga Vadivu | ||
Vol 4, No 2 (2016) | A Proposed Paper on Gene Expression with PSO and K-Mean | Abstract |
Somesh Shakya, Anshul Atre | ||
Vol 6, No 2 (2018) | A Survey on Big Data Security:Issues, Challenges and Techniques | Abstract |
Kimmi Kumari, M. Mrunalini | ||
Vol 1, No 1 (2013) | An Algorithm for the Construction of Decision Diagram by Eliminating, Merging and Rearranging the Input Cube Set | Abstract |
Manjunath Managuli, M. H Yogeshkumar | ||
Vol 1, No 1 (2013) | An Empirical Study of Software Testing Approaches | Abstract |
Nishu Rastogi | ||
Vol 3, No 2 (2015) | An Idea Towards Improving Design Pattern Detection | Abstract |
Arti Chaturvedi, Manjari Gupta, Sanjay Kumar Gupta | ||
Vol 3, No 2 (2015) | An Optimisation Approach for Construction of a Distributed Minimum Spanning Tree (DMST) Using MPI | Abstract |
Md. Akkas Ali | ||
Vol 1, No 2 (2013) | An Uml Based Safety Analysis for Safe Software | Abstract |
Bandaru Esther Sunanda | ||
Vol 5, No 1 (2017) | Applications of Artificial Intelligence and Data Mining in Optimizing Software Engineering | Abstract |
Upamanyu Chakravarty, Rajit Pimpale, Raghav Sharma, L. Ramanathan | ||
Vol 6, No 2 (2018) | Are Open Source Web Applications Secure? Static Analysis Findings | Abstract |
Mamdouh Alenezi, Mohammad Zarour, Khawlah Alomar | ||
Vol 2, No 2 (2014) | Autonomous System Reference Framework and Early Design Decisions | Abstract |
Rosteslaw Husar, Jerrell Stracener | ||
Vol 1, No 1 (2013) | Blind XPath Injection Attack: A Case Study | Abstract |
Jyoti Lakhani | ||
Vol 7, No 1 (2019) | Challenges and Prospects of Using Software Products in Ethiopian Higher Educational Institutions | Abstract |
Meseret Assefa Adamu | ||
Vol 6, No 2 (2018) | Challenges in the Integration of Artificial Intelligence and Internet of Things | Abstract |
Geetanjali Katare, Gourish Padihar, Zeba Qureshi | ||
Vol 4, No 1 (2016) | Cloud Computing Libraries in the Era of ICT | Abstract |
Shivaputrappa Fakkirappa Kattimani | ||
Vol 6, No 1 (2018) | CLUBA:A Clustering-Based Approach for Bug Assignment | Abstract |
Mamdouh Alenezi, Shadi Banitaan, Mohammad Zarour | ||
Vol 1, No 2 (2013) | Comfortable Voter Design in Highly Effective Bandwidth Usage and Dynamic Threshold Selection for Safety Critical System | Abstract |
Umamaheswararao Batta, Seetharamaiah Panchumarthy, Phanikumar Singamsetty | ||
1 - 25 of 66 Items | 1 2 3 Next Last |
Browse Title Index
Scroll