


default search action
Journal of Computing and Information Technology, Volume 27
Volume 27, Number 1, 2019
Agent and Multiagent Systems Design
- C. I. T. Editorial Office:

Guest Editorial. i-iii - Mohammed El Habib Souidi, Abderrahim Siam, Zhaoyi Pei, Songhao Piao:

Multi-Agent Pursuit-Evasion Game Based on Organizational Architecture. 1-11 - Salma Noorunnisa, Dennis Jarvis, Jacqueline Jarvis, Marcus Watson:

Application of the GORITE BDI Framework to Human-Autonomy Teaming: A Case Study. 13-24 - Costin Badica, Milan Vidakovic, Sorin Ilie, Mirjana Ivanovic, Jovana Vidakovic:

Role of Agent Middleware in Teaching Distributed Systems and Agent Technologies. 25-42 - Matteo Cristani, Francesco Olivieri, Claudio Tomazzoli, Luca Viganò, Margherita Zorzi:

Diagnostics as a Reasoning Process: From Logic Structure to Software Design. 43-57 - Robert Bucki, Petr Suchánek:

The Cost-Based Lean Approach to the Information Logistics Business System Modelling. 59-75 - Impressum.

Volume 27, Number 2, 2019
- C. I. T. Editorial Office:

Editorial for Vol.27, No.2. i-ii - Soufiane Zahid, Abdeslam En-Nouaary, Slimane Bah:

Practical Model Checking of a Home Area Network System: Case Study. 1-16 - Zhongping Chen:

Load Balancing Dynamic Source Routing Protocol Based on Multi-Path Routing. 17-27 - Saidat Adebukola Onashoga

, Adio Taofiki Akinwale, Opeyemi L. Amusa, Gboyega Adebayo:
CK-RAID: Collaborative Knowledge Repository for Intrusion Detection System. 29-39 - Jian Feng, Lianyang Zou, Tianzhu Nan:

A Phishing Webpage Detection Method Based on Stacked Autoencoder and Correlation Coefficients. 41-54 - Tausif Diwan, Jitendra V. Tembhurne

:
A Parallelization of Non-Serial Polyadic Dynamic Programming on GPU. 55-66 - Impressum.

Volume 27, Number 3, 2019
- C. I. T. Editorial Office:

Editorial for Vol.27, No.3. i-ii - Mehmet Hakan Karaata:

An Algorithm for Finding Two Node-Disjoint Paths in Arbitrary Graphs. 1-14 - Ruizhe Ma, Liangli Zuo, Li Yan:

A Shapelet Transform Classification over Uncertain Time Series. 15-28 - Sihem Oujdi, Hafida Belbachir, Faouzi Boufarès:

C4.5 Decision Tree Algorithm for Spatial Data, Alternatives and Performances. 29-43 - Wadie Berrahal, Rabia Marghoubi

, Zineb El Akkaoui:
Towards the Control and Prevention of Waste in IT Service Operation Using Fuzzy Logic: Focus in Incident Management Process. 45-56 - Peng Li, Bo Sun, Maozu Guo:

Identification of Novel Cancer-Related Genes with a Prognostic Role Using Gene Expression and Protein-Protein Interaction Network Data. 57-71 - Impressum.

Volume 27, Number 4, 2019
- C. I. T. Editorial Office:

Editorial for Vol.27, No.4. i-ii - Meenal Jain, Gagandeep Kaur:

A Study of Feature Reduction Techniques and Classification for Network Anomaly Detection. 1-16 - Li Yan, Zheqing Zhang, Dan Yang:

Temporal RDF(S) Data Storage and Query with HBase. 17-30 - Vancuong Do, Hongxiang Ren:

Using Poisson Disk Sampling to Render Oil Particles at Sea. 31-46 - Adebukola Onashoga

, Adesina S. Sodiya, Idowu Ademola Osinuga:
Privacy Preserving Location-Based Client-Server Service Using Standard Cryptosystem. 47-63

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.


Google
Google Scholar
Semantic Scholar
Internet Archive Scholar
CiteSeerX
ORCID














