|
Issue |
Title |
|
Vol 43, No 3 (2019) |
Retraction of the Paper |
Abstract
PDF
|
Tanmoy Chakraborty |
|
Vol 46, No 7 (2022): Online-only issue |
Risk prediction of enterprise credit financing using machine learning |
Abstract
PDF
|
Jingjing Gu |
|
Vol 45, No 1 (2021) |
Risks Analyzing and management in Software Project Management Using Fuzzy Cognitive Maps with Reinforcement Learning |
Abstract
PDF
|
Ahmed Tlili, Salim Chikhi |
|
Vol 41, No 4 (2017) |
Robust Computer Algebra, Theorem Proving, and Oracle AI |
Abstract
PDF
|
Gopal P. Sarma, Nick J. Hay |
|
Vol 33, No 2 (2009) |
Robust H1 Control of a Doubly Fed Asynchronous Machine |
Abstract
PDF
|
G. Sofiane, Y. Said, S. Moussa |
|
Vol 46, No 9 (2022): Online-only issue |
Robust Method for Embedding an Image inside Cover Image based on Least Significant Bit Steganography |
Abstract
PDF
|
Sahera A. Sead Almola, Najat Hameed Qasim, Hamid Ali Abed Alasadi |
|
Vol 32, No 3 (2008) |
Robust Speech Recognition Using Perceptual Wavelet Denoising and Mel-frequency Product Spectrum Cepstral Coefficient Features |
Abstract
PDF
|
M.C.A. Korba, D. Messadeg, R. Djemili, H. Bourouba |
|
Vol 33, No 3 (2009) |
Robustness and Visualization of Decision Models |
Abstract
PDF
|
A. Bregar, J. Györkös, M.B. Juric |
|
Vol 40, No 3 (2016) |
Rough-Mereology Framework for Making Medical Treatment Decisions Based on Granular Computing |
Abstract
PDF
|
Mohammed M. Eissa, Mohammed Mahfouz Elmogy, Mohamed Hashem |
|
Vol 45, No 2 (2021) |
Routing Algorithm in Networks on the Globe |
Abstract
PDF
|
Sujit Kumar Bose |
|
Vol 33, No 2 (2009) |
Routing Scalability in Multicore-Based Ad Hoc Networks |
Abstract
PDF
|
A. Marowka |
|
Vol 33, No 3 (2009) |
Run-time Manipulation of Programs in a Statically-Typed Language |
Abstract
PDF
|
S. Greiner |
|
Vol 46, No 9 (2022): Online-only issue |
SADetection: Security Mechanisms to Detect SLAAC Attack in IPv6 Link-Local Network |
Abstract
PDF
|
Mahmood A. Al-Shareeda, Selvakumar Manickam, Murtaja Ali Saare, Nazrool Bin Omar |
|
Vol 37, No 3 (2013) |
Searching for Credible Relations in Machine Learning |
Abstract
PDF
|
V. Vidulin |
|
Vol 47, No 6 (2023): Online-only issue |
Secure and Low-Complexity Medical Image Exchange Based on Compressive Sensing and LSB Audio Steganography |
Abstract
PDF
|
Wafaa Al-Chaab, Zaid Ameen Abduljabbar, Enas Wahab Abood, Vincent Omollo Nyangaresi, Hussein M. Mohammed, Junchao Ma |
|
Vol 33, No 4 (2009) |
Secure Convertible Authenticated Encryption Scheme Based on RSA |
Abstract
PDF
|
T.-S. Wu, H.-Y. Lin |
|
Vol 36, No 1 (2012) |
Secure Key Exchange Scheme for IPTV Broadcasting |
Abstract
PDF
|
R.S. Pippal, S. Tapaswi, C.D. Jaidhar |
|
Vol 33, No 1 (2009) |
Secure, Portable, and Customizable Video Lectures for E-learning on the Move |
Abstract
PDF
|
M. Furini |
|
Vol 46, No 8 (2022): Online-only issue |
Secure Routing Protocol for WSNs Using Bacterial Foraging Optimization and Improved RC4 |
Abstract
PDF
|
Imad Alshawi, Hasan Al-badrei |
|
Vol 40, No 1 (2016) |
Secured Storage for Dynamic Data in Cloud |
Abstract
PDF
|
Veeralakshmi Ponnuramu, Latha Tamilselvan |
|
Vol 30, No 1 (2006) |
Self-Organisation and Emergence in MAS: An Overview |
Abstract
PDF
|
G. Di M. Serugendo, M.-P. G. Irit, A. Karageorgos |
|
Vol 30, No 1 (2006) |
Self-Organising Mechanisms from Social and Business/Economics Approaches |
Abstract
PDF
|
S. Hassas, G. Di Marzo-Serugendo, A. Karageorgos, C. Castelfranchi |
|
Vol 42, No 1 (2018) |
Semantic Annotation of Documents Based on Wikipedia Concepts |
Abstract
PDF
|
Janez Brank, Gregor Leban, Marko Grobelnik |
|
Vol 38, No 4 (2014) |
Semantic Annotations for Workflow Interoperability |
Abstract
PDF
|
Hamri Salah, Boudjlida Nacer, Boufaida Mahmoud |
|
Vol 33, No 3 (2009) |
Semantic Graphs Derived From Triplets pplicwith Aation in Document Summarization |
Abstract
PDF
|
D. Rusu, B. Fortuna, M. Grobelnik, D. Mladenić |
|
1001 - 1025 of 1192 Items |
<< < 36 37 38 39 40 41 42 43 44 45 > >> |