|
Issue |
Title |
|
Vol 46, No 5 (2022): Online-only issue |
OLAP Mining with Educational Data Mart to Predict Students’ Performance |
Abstract
PDF
|
Ihab Ahmed Najm, Jasim Mohammed Dahr, Alaa Khalaf Hamoud, Ali Salah Alasady, Wid Akeel Awadh, Mohammed B. M. Kamel, Aqeel Majeed Humadi |
|
Vol 46, No 4 (2022) |
OMCOKE: A Machine Learning Outlier-based Overlapping Clustering Technique for Multi-Label Data Analysis |
Abstract
PDF
|
Said Baadel, Fadi Thabtah, Joan Lu, Saida Harguem |
|
Vol 43, No 1 (2019) |
On embedding degree sequences |
Abstract
PDF
|
Béla Csaba, Bálint Márk Vásárhelyi |
|
Vol 30, No 2 (2006) |
On Integrating Conversations into Web Services Composition |
Abstract
PDF
|
Z. Maamar, S.K. Mostéfaoui |
|
Vol 47, No 1 (2023) |
On Integrating Multiple Restriction Domains to Automatically Generate Test Cases of Model Transformations |
Abstract
PDF
|
Hanh Thi Nguyen, Hanh Duc Dang |
|
Vol 32, No 4 (2008) |
On Interchange between Drools and Jess |
Abstract
PDF
|
Oana Nicolae, Adrian Giurca, Gerd Wagner |
|
Vol 36, No 3 (2012) |
On Similarity-based Approximate Reasoning in Interval-valued Fuzzy Environments |
Abstract
Untitled
PDF
|
Z.-Q. Feng, C.-G. Liua |
|
Vol 32, No 4 (2008) |
On the Compilation of Programs into their Equivalent Constraint Representation |
Abstract
PDF
|
Franz Wotawa, Mihai Nica |
|
Vol 30, No 3 (2006) |
On the Crossing Number of Almost Planar Graphs |
Abstract
PDF
|
B. Mohar |
|
Vol 38, No 3 (2014) |
On the Inverse Problem for Generalized One-Sided Concept Lattices |
Abstract
PDF
|
Jozef Pócs, Jana Pócsová |
|
Vol 43, No 2 (2019) |
On the Properties of Epistemic and Temporal Epistemic Logics of Authentication |
Abstract
PDF
|
Sharar Ahmadi, Mehran S. Fallah, Massoud Pourmahdian |
|
Vol 29, No 4 (2005) |
On the Role of Environments in Multiagent Systems |
Abstract
PDF
|
D. Weyns, T. Holvoet |
|
Vol 29, No 3 (2005) |
On the Security of a Digital Signature with Message Recovery Using Self-certified Public Key |
Abstract
PDF
|
J. Zhang, W. Zou, D. Chen, Y. Wang |
|
Vol 34, No 2 (2010) |
On the Security of Two Group Signature Schemes with Forward Security |
Abstract
PDF
PDF
|
K. Kim, I. Yie, D. Nyang |
|
Vol 35, No 2 (2011) |
Online Motion Planning for Humanoid Robot Based on Embedded Vision System |
Abstract
PDF
|
Q. Zhong, Q. Pan, B. Hong, B. Fang, S. Piao |
|
Vol 33, No 3 (2009) |
Online WordNet Based Tagging System for Social Sharing and Retrieval of Images on Visited Pages |
Abstract
PDF
|
T. Özyer |
|
Vol 34, No 4 (2010) |
Ontology Extension Towards Analysis of Business News |
Abstract
PDF
|
I. Novalija, D. Mladenič |
|
Vol 29, No 4 (2005) |
Open Source Software Usage Implications in the Context of Software Development |
Abstract
PDF
|
G. Polancic, M. Hericko, R. V. Horvat |
|
Vol 36, No 2 (2012) |
Optimal Allocation of Rates in Guaranteed Service Networks |
Abstract
PDF
|
A. Diwan, J. Kuri, S. Sanyal |
|
Vol 35, No 2 (2011) |
Optimal Decision Tree Based Multi-class Support Vector Machine |
Abstract
PDF
|
M. Bala, R.K. Agrawal |
|
Vol 36, No 3 (2012) |
Optimal Motion Paths in Ambient Fields |
Abstract
PDF
|
T. Kämpke |
|
Vol 47, No 5 (2023): Online-only issue |
Optimal path planning of logistics distribution of urban and rural agricultural products from the perspective of supply chain |
Abstract
PDF
|
Xiumei Wang, Xiaoli Song |
|
Vol 41, No 3 (2017) |
Optimization, Modeling and Simulation of Microclimate and Eenergy Management of the Greenhouse by Modeling the Associated Heating and Cooling Systems and Implemented by a Fuzzy Logic Controller using Artificial Intelligence |
Abstract
PDF
|
Faouzi Didi, Nacereddine Bibi-Triki, Bentchikou Mohamed, Abderrahmane Abène |
|
Vol 33, No 3 (2009) |
Optimization of Actions in Activation Timed Influence Nets |
Abstract
PDF
|
M.F. Rafi, A.K. Zaidi, A.H. Levis, P. Papantoni-Kazakos |
|
Vol 48, No 7 (2024): Online-only issue |
Optimization of Asynchronous Parallel Tasks Scheduling with Multi-resource Constraints |
Abstract
PDF
|
Zhang Xinyu, Liu JinJian, Zhang Guanwei, Guo Wei |
|
1026 - 1050 of 1426 Items |
<< < 37 38 39 40 41 42 43 44 45 46 > >> |