


default search action
Computer and Information Science, Volume 6
Volume 6, Number 1, 2013
- Oliver Hummel, Alexander Gerhart, Bernhard Schäfer:

Analyzing Citation Frequencies of Leading Software Engineering Scholars. 1-14 - Jarmila Honzíková, Jan Janovec:

Conceptual and Methodical Procedures of Psychomotor Learning. 15-31 - Faraz Abid Lakhani, Anwar Ali Shah G. Syed, Nizamuddin Channa, Faiz. M. Shaikh:

Consumer Perceived Risk and Risk Relievers in E-shopping in Pakistan. 32-38 - Zhiwei Sun:

Analysis and Evaluation of WebTrends Log Analyzer. 39-46 - Saleem Zeyad Ramadan:

Reducing Premature Convergence Problem in Genetic Algorithm: Application on Travel Salesman Problem. 47-57 - Urmila Shrawankar

, Vilas M. Thakare:
An Adaptive Methodology for Ubiquitous ASR System. 58-69 - Marios Poulos

, Ioannis Deliyannis, Andreas Floros
:
Efficient Audio Fingerprint Application Verification Using the Adapted Computational Geometry Algorithm. 70-82 - Manuel Alberto M. Ferreira

:
A M/G/inf Queue Busy Period Distribution Characterizing Parameter. 83-88 - Sheikh Muhammad Sarwar, Md. Mustafizur Rahman, Md. Haider Ali, Ashique Mahmood Adnan:

A Scalable Image Snippet Extraction Framework for Integration with Search Engines. 89-99 - Ward Douglas Maurer:

A Programming Language without Keywords. 100-132 - Sania Vahedian Movahed:

The Hybrid Method of Fuzzy Feed-Forward Neural Network for Predicting Protein Secondary Structure. 133-139 - Yasir Ahmad, Abdullah Aljumah:

Paradigm Shift in the Security-n-Privacy Implementation of Semi-Distributed Online Social Networking. 140-148
Volume 6, Number 2, 2013
- Athanasios I. Margaris:

Local Area Multicomputer (LAM -MPI). 1-8 - Wojciech Walat

:
Cognitive and Constructivist Perspective of IT Based Education. 9-17 - Fadi A. O. Najadat, Ghassan G. Kanaan, Raed K. Kanaan, Omar S. Aldabbas, Riyad Al-Shalabi:

Genetic Algorithm Solution of the Knapsack Problem Used in Finding Full Issues in the Holy Quran Based on the Number (19). 18-30 - Jiang Li, Liu Chen:

A Digital Watermarking Algorithm Based on Chaos in Interpolatory Orthogonal Multiwavelets Domain. 31-37 - Vadim V. Romanuke

:
Setting the Hidden Layer Neuron Number in Feedforward Neural Network for an Image Recognition Problem under Gaussian Noise of Distortion. 38-54 - Mohd Adham Isa

, Mohd Z. M. Zaki, Dayang N. A. Jawawi:
A Survey of Design Model for Quality Analysis: From a Performance and Reliability Perspective. 55-70 - Mohammad Shkoukani, Rawan Abu Lail, Hesham Abusaimeh, Loai Al Hamarneh:

The Impact of Establishing a Governmental Consumer Agency in Jordan towards Expanding the Use of E-business. 71-83 - Ivaylo Donchev, Emilia Todorova:

Training in Object-Oriented Programming and C++11. 84-92 - Stepan Belan, Sergey Yuzhakov

:
A Homogenous Parameter Set for Image Recognition Based on Area. 93-102 - Arindam Chaudhuri:

Bankruptcy Prediction Using Bayesian, Hazard, Mixed Logit and Rough Bayesian Models: A Comparative Analysis. 103-125 - Ajay Prasad

, Prasun Chakrabarti:
Centralized Access Management and Monitoring as a Service in Cloud Environments-A Critical Study. 126-133 - Riad Jabri:

A Generic Tool for Teaching Compilers. 134-150 - Amavi Djimido Noutchet:

Novel User Centric RFID Fridge Design. 151-157
Volume 6, Number 3, 2013
- Juliette Stephens, Raul Valverde:

Security of E-Procurement Transactions in Supply Chain Reengineering. 1-20 - K. Lavrischeva, Andrey Aronov, Artem Dzyubenko:

Program Factory - A Conception of Knowledge Representation of Scientific Artifacts from Standpoint of Software Engineering. 21-27 - Jesús González-Feliu

:
Vehicle Routing in Multi-Echelon Distribution Systems with Cross-Docking: A Systematic Lexical-Metanarrative Analysis. 28-47 - Elma Zannatul Ferdousy, Md. Mafijul Islam, M. Abdul Matin:

Combination of Naïve Bayes Classifier and K-Nearest Neighbor (cNK) in the Classification Based Predictive Models. 48-56 - Debora Souza, Rúbens de Souza Matos Júnior

, Jean Araujo
, Vandi Alves, Paulo Romero Martins Maciel:
A Tool for Automatic Dependability Test in Eucalyptus Cloud Computing Infrastructures. 57-67 - Yirsaw Ayalew, Kagiso Mguni

:
An Assessment of Changeability of Open Source Software. 68-79 - Yuanchao Liu, Xin Wang, Chengjie Sun, Bingquan Liu:

A Novel Approach for Dynamic Polarity Mining from Customer Reviews. 80-88 - Mohammad Hasan Haggag, Amal Aboutabl, Najla Mukhtar:

Clustering of Web Search Results Based on Document Segmentation. 89-95 - Yongping Huang, Shufan Yang, Yushan Jin:

An Efficient Cursor Search Algorithm. 96-107 - John Wachira Kamau, Ian Douglas Sanders:

An Empirical Investigation into the Effect of Usability on Adoption of Desktop Open Source Software by University Students in Kenya. 108-117 - Emad A. Awada, Mohammad H. Alomari:

Application of Wavelet Transform Analysis to ADCs Harmonics Distortion. 118-124 - Amal Elsayed Aboutabl:

Exploiting Parallelism in Query Processing for Web Document Search Using Shared-Memory and Cluster-Based Architectures. 125-137
Volume 6, Number 4, 2013
- Edward Red, C. Greg Jensen, Prasad Weerakoon, David French, Steven E. Benzley, Karl G. Merkley:

Architectural Limitations in Multi-User Computer-Aided Engineering Applications. 1-16 - Nikolay Fedotov, Sergey Romanov, Daria Goldueva:

Application of Triple Features Theory to the Analysis of Half-Tone Images and Colored Textures. Feature Construction by Virtue of Stochastic Geometry and Functional Analysis. 17-24 - Bai Yan, Ren Qingchang, Ma Ke:

Modeling and Generalized Predictive Control for Chilled Water in Central Air-conditioning System. 25-36 - Udoinyang G. Inyang

, Enobong E. Joshua:
Fuzzy Clustering of Students' Data Repository for At-Risks Students Identification and Monitoring. 37-50 - Huai Yang Chen, Jinjie Chen:

Improvements Based on the Harris Algorithm. 51-58 - Ahmad Abdel-Hafez, Yue Xu:

A Survey of User Modelling in Social Media Websites. 59-71 - Xiaoxia Wang:

Dimensions of Practical Interactions in New Digital Primary Classrooms: Framework for Preservice Teachers. 72-79 - Guillermo L. Rodríguez, Patricia Silvana San Martín, Griselda Guarnieri:

Monitoring and Analytical Evaluation of Interactivity Mediated by a Dynamic Hypermedia Device. 80-87 - Bandar Mohammed, Malek Mouhoub, Eisa Alanazi, Samira Sadaoui:

Data Mining Techniques and Preference Learning in Recommender Systems. 88-102 - Laye Hadji Diakite, Li Yu, Rabiu Haruna:

Testing of Event Detection Lateness in Wireless Sensor Networks. 103-109 - Guangwei Zhang:

Research of the Stereo Measure Technology for Firearms Chamber. 110-114 - Stepan Belan, Sergey Yuzhakov

:
Machine Vision System Based on the Parallel Shift Technology and Multiple Image Analysis. 115-124 - Yuanchao Liu, Feng Wu, Ming Liu, Bingquan Liu:

Abstract Sentence Classification for Scientific Papers Based on Transductive SVM. 125-131 - Ahmad Khader Haboush:

Handling Safety-Related Requirements in Critical Systems Product Lines. 132-138

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.


Google
Google Scholar
Semantic Scholar
Internet Archive Scholar
CiteSeerX
ORCID














