Digital Library
Close Browse articles from a journal
     Journal description
       All volumes of the corresponding journal
         All issues of the corresponding volume
                                       All articles of the corresponding issues
 
                             93 results found
no title author magazine year volume issue page(s) type
1 ABCE: A Novel Framework for Improved Branch Coverage Analysis Godboley, Sangharatna
2015
62 C p. 266-273
8 p.
article
2 A Big Data Dashboard for Urban Mobility Prabhakar, Balaji
2015
62 C p. 7-8
2 p.
article
3 A Cloud to Mobile Application for Consumer Behavior Modification Wright, Dustin
2015
62 C p. 343-351
9 p.
article
4 A Distinctive Genetic Approach for Test-Suite Optimization Jeyaprakash, Srividhya
2015
62 C p. 427-434
8 p.
article
5 A Generic Model of Execution for Synthesizing Interpreted Domain-Specific Models Allison, Mark
2015
62 C p. 495-504
10 p.
article
6 A Hierarchical Method for Solving Soft Nonlinear Constraints Hosobe, Hiroshi
2015
62 C p. 378-384
7 p.
article
7 Analysis of a Monte Carlo Tree Search in Knight-Amazons Kato, Hikari
2015
62 C p. 31-38
8 p.
article
8 Analysis of Demographic Characteristics Creating Coronary Artery Disease Susceptibility Using Random Forests Classifier Akyol, Kemal
2015
62 C p. 39-46
8 p.
article
9 An Ameliorated Methodology for the Abstraction of Object Oriented Features from Software Requirements Specification Shivaram, A.M.
2015
62 C p. 274-281
8 p.
article
10 An Ameliorated Methodology to Abstract Object Oriented Features from Programming System Handigund, Shivanand M.
2015
62 C p. 470-477
8 p.
article
11 An Analysis of Software Reliability Assessment with Neuro-Fuzzy based Expert Systems Kotaiah, Bonthu
2015
62 C p. 92-98
7 p.
article
12 An Evaluation of Security and Privacy Threats for Cloud-based Applications Bahrami, Mehdi
2015
62 C p. 17-18
2 p.
article
13 A New Competitive Intelligence-based Strategy for Web Page Search Rasekh, Iman
2015
62 C p. 450-456
7 p.
article
14 An Introduction to Multi-trapdoor Hash Functions and It's Applications Singhal, Mukesh
2015
62 C p. 11-12
2 p.
article
15 ANN Based Robotic Arm Visual Servoing Nonlinear System Al-Junaid, Hessa
2015
62 C p. 23-30
8 p.
article
16 An Optimized Genetic Stowed Biometric Approach to Potent QOS in MANET Zafar, Sherin
2015
62 C p. 410-418
9 p.
article
17 A Parametric Empirical Bayes Model to Predict Software Reliability Growth Barraza, Néstor R.
2015
62 C p. 360-369
10 p.
article
18 A Programming Environment for Visual Block-Based Domain-Specific Languages Kurihara, Azusa
2015
62 C p. 287-296
10 p.
article
19 Arabic Ontology Model for Financial Accounting Hegazy, A.
2015
62 C p. 513-520
8 p.
article
20 A Review of Evaluation Methods and Techniques for Simulation Packages Alomair, Yasmeen
2015
62 C p. 249-256
8 p.
article
21 A Review of the Advances in Cyber Security Benchmark Datasets for Evaluating Data-Driven Based Intrusion Detection Systems Abubakar, Adamu I.
2015
62 C p. 221-227
7 p.
article
22 A Review of the Applications of Bio-inspired Flower Pollination Algorithm Chiroma, Haruna
2015
62 C p. 435-441
7 p.
article
23 A Secure Healthcare System: From Design to Implementation Cankaya, Ebru Celikel
2015
62 C p. 203-212
10 p.
article
24 ASIC Implementation for Improved Character Recognition and Classification using SNN Model Chaturvedi, Mrs. S.
2015
62 C p. 151-158
8 p.
article
25 A Study on the Limitations of Evolutionary Computation and other Bio-inspired Approaches for Integer Factorization Mishra, Mohit
2015
62 C p. 603-610
8 p.
article
26 A Suigeneris Automated Software Testing Methodology Handigund, Shivanand M.
2015
62 C p. 21-22
2 p.
article
27 A Theoretical Framework for the Maintainability Model of Aspect Oriented Systems Sheshasaayee, (Mrs). Ananthi
2015
62 C p. 505-512
8 p.
article
28 Automated Business Rules Transformation into a Persistence Layer Cemus, Karel
2015
62 C p. 312-318
7 p.
article
29 A Web based System for Cricket Talent Identification, Enhancement and Selection (C-TIES) Ahamad, Gulfam
2015
62 C p. 134-142
9 p.
article
30 Big Data- Is a Turnkey Solution Kaur, Er. Ramandeep
2015
62 C p. 326-331
6 p.
article
31 2-Bit Branch Predictor Modeling Using Markov Model Elkhouly, Reem
2015
62 C p. 650-653
4 p.
article
32 2-Bit Branch Predictor Modeling Using Markov Model 2015
62 C p. 467-469
3 p.
article
33 CLOUD Computing: Cost-effective Risk Management with Additional Product Deployment Sahinoglu, Mehmet
2015
62 C p. 319-325
7 p.
article
34 CLOURA: CLOUD Risk Assessor (with Stochastic & Non-Stochastic Simulations) Sahinoglu, Mehmet
2015
62 C p. 19-20
2 p.
article
35 Combinatorial Methods in Software Testing Kuhn, Rick
2015
62 C p. 9-10
2 p.
article
36 Contents 2015
62 C p. iii-vi
nvt p.
article
37 Corrigendum to 2-Bit Branch Predictor Modeling Using Markov Model Elkhouly, Reem
2015
62 C p. 649-
1 p.
article
38 Cost-Efficient Risk Management with Reserve Repair Crew Planning in CLOUD Computing Sahinoglu, Mehmet
2015
62 C p. 335-342
8 p.
article
39 Developing a Novel Holistic Taxonomy of Security Requirements Rjaibi, Neila
2015
62 C p. 213-220
8 p.
article
40 Domain Model Validation of Context-aware Mobile Patient Monitoring Systems Al-Bashayreh, Mahmood Ghaleb
2015
62 C p. 539-546
8 p.
article
41 DTD2OWL2: A New Approach for the Transformation of the DTD to OWL Hacherouf, Mokhtaria
2015
62 C p. 457-466
10 p.
article
42 E-learning Systems Based on Cloud Computing: A Review Riahi, Ghazal
2015
62 C p. 352-359
8 p.
article
43 Evaluation of Visualization of a Fuzzy-Based Recommender System for Political Community-Building Terán, Luis
2015
62 C p. 116-125
10 p.
article
44 Evolution of Modern Management through Taylorism: An Adjustment of Scientific Management Comprising Behavioral Science Uddin, Nasir
2015
62 C p. 578-584
7 p.
article
45 Exploring a Context-based Network Access Control for Mobile Devices Mowafi, Yaser
2015
62 C p. 547-554
8 p.
article
46 Fitness Based Position Update in Spider Monkey Optimization Algorithm Kumar, Sandeep
2015
62 C p. 442-449
8 p.
article
47 Fuzzified Expert System for Employability Assessment Kumari, Rajani
2015
62 C p. 99-106
8 p.
article
48 Fuzzy Measures in Multi-Criteria Decision Making Yager, Ronald R.
2015
62 C p. 107-115
9 p.
article
49 Gaussian Mixture Distribution Analysis as Estimation of Probability Density Function and it's the Periphery Tsukakoshi, Kiyoshi
2015
62 C p. 370-377
8 p.
article
50 Global Collaboration Requirement Analysis System in Cloud Computing Prakasa, Ivan
2015
62 C p. 332-334
3 p.
article
51 High-Level Representation of Time in Diagrammatic Specification Al-Fedaghi, Sabah
2015
62 C p. 478-486
9 p.
article
52 High Speed Database Sequence Comparison Bonny, Talal
2015
62 C p. 73-80
8 p.
article
53 Hybrid Analysis of Audience Gaze and Slide Construction to Obtain the Clues for Improving Presentations Funayama, Tomohiro
2015
62 C p. 628-630
3 p.
article
54 Impact of Developer Choices on Energy Consumption of Software on Servers Singh, Jasmeet
2015
62 C p. 385-394
10 p.
article
55 Impact on SDN Powered Network Services Under Adversarial Attacks Niyaz, Quamar
2015
62 C p. 228-235
8 p.
article
56 Implementation of Fuzzy Decision Based Mobile Robot Navigation Using Stereo Vision Al-Mutib, Khalid
2015
62 C p. 143-150
8 p.
article
57 Impulsive Noise Cancellation of ECG signal based on SSRLS Mirza, Alina
2015
62 C p. 196-202
7 p.
article
58 Integration of Object Oriented Host Program with Network DBMS Handigund, Shivanand M.
2015
62 C p. 178-185
8 p.
article
59 2015 International Conference on Soft Computing and Software Engineering [SCSE’15] 2015
62 C p. 4-6
3 p.
article
60 Jitter Buffer Modelling and Analysis for TDM over PSN Seshasayee, Usha Rani
2015
62 C p. 186-195
10 p.
article
61 Knowledge Representation through Graphs Portmann, Edy
2015
62 C p. 245-248
4 p.
article
62 Mobile Platform Detect and Alerts System for Driver Fatigue Abulkhair, Maysoon
2015
62 C p. 555-564
10 p.
article
63 Modeling Firewalls for Behavior Analysis Clark, Patrick G.
2015
62 C p. 159-166
8 p.
article
64 Morphological Analysis in the Environment “TELA” Bacha, Khaireddine
2015
62 C p. 521-528
8 p.
article
65 MRAI Optimization for BGP Convergence Time Reduction without Increasing the Number of Advertisement Messages Alabdulkreem, E.A.
2015
62 C p. 419-426
8 p.
article
66 Multi-View Human Action Recognition Using Wavelet Data Reduction and Multi-Class Classification Aryanfar, Alihossein
2015
62 C p. 585-592
8 p.
article
67 New Theory for Code-translation; Punctuator and Qualifier as Two Token Categories and Supplementary Concepts of Programming Hutabarat, Bernaridho I.
2015
62 C p. 282-286
5 p.
article
68 Optimal Design of A Standing Wave Thermoacoustic Refrigerator Using GAMS Tartibu, L.K.
2015
62 C p. 611-618
8 p.
article
69 OWA based Book Recommendation Technique Sohail, Shahab Saquib
2015
62 C p. 126-133
8 p.
article
70 Precepts and Evolvability of Complex Systems Vora, Urjaswala
2015
62 C p. 565-574
10 p.
article
71 Predicting Number of Faults in Software System using Genetic Programming Rathore, Santosh S.
2015
62 C p. 303-311
9 p.
article
72 Predicting Unit Testing Effort Levels of Classes: An Exploratory Study based on Multinomial Logistic Regression Modeling Badri, Mourad
2015
62 C p. 529-538
10 p.
article
73 Quality Assurance through Rigorous Software Specification and Testing: A Case Study Lin, Lan
2015
62 C p. 257-265
9 p.
article
74 Ranking of Fuzzy Similar Faces Using Relevance Matrix and Aggregation Operators Rahman, Abdul
2015
62 C p. 84-91
8 p.
article
75 Real-Time Languages, Timed Alternating Automata, and Timed Temporal Logics: Relationships and Specifications Fellah, Abdelaziz
2015
62 C p. 47-54
8 p.
article
76 Requirement Management in Agile Software Environment Baruah, Nomi
2015
62 C p. 81-83
3 p.
article
77 Revealing of Earth Quake Magnitude Using Seismic Signals and Wavelet Transforms Raju, G.V.S.
2015
62 C p. 619-627
9 p.
article
78 Satellite Derived pH Estimation for Acidity in Precipitation Using Water Vapor and Nitrogen Dioxide Imagery Prasad, L.V. Narasimha
2015
62 C p. 637-648
12 p.
article
79 Second-Order Spline-Wavelet Robust Code under Non-Uniform Codeword Distribution Levina, Alla
2015
62 C p. 297-302
6 p.
article
80 Simulation Studies for Analysis of Inherent Resilience Properties of an Amine Regeneration Column used in a Gas Sweetening Unit Guha, Sirshendu
2015
62 C p. 593-602
10 p.
article
81 Soft Computing Methodology for Software Evaluation Dujmovic, Jozo
2015
62 C p. 13-14
2 p.
article
82 Strategic Accumulation and Organization of the Polish Contexts in Research Document Creation Onuma, Ryo
2015
62 C p. 575-577
3 p.
article
83 Tagged-Sub Optimal Code (TSC) Compression for Improving Performance of Web Services Rassan, Iehab Al
2015
62 C p. 167-169
3 p.
article
84 The Impact of Search Algorithms in Automated Program Repair Assiri, Fatmah Yousef
2015
62 C p. 65-72
8 p.
article
85 Towards a Knowledge Based Approach to Style Driven Architecture Design Moaven, Shahrouz
2015
62 C p. 236-244
9 p.
article
86 Towards Generating Essence Kernels Using Genetic Algorithms Sedano, Todd
2015
62 C p. 55-64
10 p.
article
87 Towards Search Engine Optimization: Feedback Collation Al-Shammari, Eiman Tamah
2015
62 C p. 395-402
8 p.
article
88 Unequal Clustering by Improved Particle Swarm Optimization in Wireless Sensor Network Salehian, Solmaz
2015
62 C p. 403-409
7 p.
article
89 Usability Evaluation of Tadarus: Student Perceptions Alkhattabi, Mona
2015
62 C p. 631-636
6 p.
article
90 Using Essence Reflection Meetings in Team-based Project Courses Sedano, Todd
2015
62 C p. 15-16
2 p.
article
91 Using First-Order Logic to Query Heterogeneous Internet Data Sources Cohen, Donald
2015
62 C p. 170-177
8 p.
article
92 Validation of Usability Driven Web based Software Process Model using Simulation Gull, Hina
2015
62 C p. 487-494
8 p.
article
93 Welcome Message Bahrami, Mehdi
2015
62 C p. 1-3
3 p.
article
                             93 results found
 
 Koninklijke Bibliotheek - National Library of the Netherlands