default search action
Journal of Computing and Information Technology, Volume 21
Volume 21, Number 1, 2013
- Hadj Bourdoucen, Fatma Al Azzani, Ahmed M. Al-Naamany:
Study of Fuzzy Logic-based Controller for Diff-Serv Bandwidth Broking. 1-11 - Hichem Debbi, Mustapha Bourahla:
Generating Diagnoses for Probabilistic Model Checking Using Causality. 13-23 - Izzat Alsmadi, Maryam S. Nuser:
Evaluation of Cost Estimation Metrics: Towards a Unified Terminology. 25-36 - Abdesslem Layeb, Meryem Ammi, Salim Chikhi:
A GRASP Algorithm Based on New Randomized Heuristic for Vehicle Routing Problem. 37-48 - Szilvia Szeghalmy, Judit Bedekovics, Gabor Mehes, Attila Fazekas:
Digital Measurement of Myelofibrosis Associated Platelet Derived Growth Factor Receptor ß (PDGFR ß) Expression in Bone Marrow Biopsies. 49-58
Volume 21, Number 2, 2013
- Vlado Glavinic:
Editorial. i-ii - Hermann Maurer, Rizwan Mehmood, Petra Korica-Pehserl:
How Dangerous is the Web for Creative Work? 59-69 - Rajni Mohana, Deepak Dahiya:
Specifying Access Policies for Secure Content Dissemination of XML: A Technique Inspired by DNA Cryptography. 71-84 - Monika Simjanoska, Marjan Gusev, Sasko Ristov, Goran Velkoski:
Scaling the Performance and Cost for Elastic Cloud Web Services. 85-95 - James Pope, Robert Simon:
The Impact of Packet Fragmentation and Reassembly in Resource Constrained Wireless Networks. 97-107 - Jonnalagadda Annapurna, Aswani Kumar Cherukuri:
Exploring Attributes with Domain Knowledge in Formal Concept Analysis. 109-123 - Nikica Hlupic, Ivo Beros, Danko Basch:
A Derivative-free Algorithm for Finding Least Squares Solutions of Quasi-linear and Linear Systems. 125-135
Volume 21, Number 3, 2013
- Vlado Glavinic:
Editorial. - Sofiane Hamrioui, Pascal Lorenz, Jaime Lloret, Mustapha Lalam:
A Cross Layer Solution for Better Interactions Between Routing and Transport Protocols in MANET. 137-147 - Sumathy Subramaniam, R. Saravanan, Pooja K. Prakash:
Trust Based Routing to Improve Network Lifetime of Mobile Ad Hoc Networks. 149-160 - Boris Jukic, Nenad Jukic, Svetlozar Nestorov:
Process and Data Logic Integration: Logical Links between UML Use Case Narratives and ER Diagrams. 161-170 - Ramesh Sharda, Daniel Adomako Asamoah, Natraj Ponna:
Research and Pedagogy in Business Analytics: Opportunities and Illustrative Examples. 171-183 - Emil Stankov, Mile Jovanov, Ana Madevska Bogdanova, Marjan Gusev:
A New Model for Semiautomatic Student Source Code Assessment. 185-194 - Zeljko Agic, Bozo Bekavac:
Domain-aware Evaluation of Named Entity Recognition Systems for Croatian. 195-209
Volume 21, Number 4, 2013
- Vlado Glavinic:
Editorial. i-ii - Ivan Svogor, Ivica Crnkovic, Neven Vrcek:
An Extended Model for Multi-Criteria Software Component Allocation on a Heterogeneous Embedded Platform. 211-222 - Harshvardhan Tiwari, Krishna Asawa:
Enhancing the Security Level of SHA-1 by Replacing the MD Paradigm. 223-233 - Princely Ifinedo:
Relationships Between Relevant Contextual Influences and Information Security Threats and Controls in Global Financial Services Industry. 235-246 - Imène Kirati, Yamina Tlili Guiyassa:
Unsupervised Color Image Segmentation Based on Non Parametric Clustering. 247-254 - Mohamed Elhadi Bounif, Mustapha Bourahla:
Decision Support Technique for Supply Chain Management. 255-268 - Zhi-yuan Li, Chong Wu, Xin-Ying Zhang, Yujin Li:
Evaluating Profitability Based on Integrated Method: A Case Study of Chinese Listed Airlines and Airports. 269-279
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.