Smart as a Cryptographic Processor |
Saroja Kanchi, Nozar Tabrizi and Cody Hayden, Kettering University, USA |
Volume : 6 volume number : 6 pdf |
Effects of The Different Migration Periods on Parallel Multi-Swarm PSO |
S¸aban Gülcü1 and Halife Kodaz2, 1Necmettin Erbakan University, Turkey and 2Selcuk University, Turkey |
Volume : 6 volume number : 6 pdf |
Applications of the Erlang B and C Formulas to Model a Network of Banking Computer Systems - Moving Towards Green IT and Performant Banking |
Florin-Catalin ENACHE and Adriana-Nicoleta TALPEANU, The Bucharest University of Economic Studies, Romania |
Volume : 6 volume number : 6 pdf |
Configuration of a Guidance Process for Software Process Modeling |
Hamid Khemissa1 and Mourad Oussalah2, 1USTHB University, Algeria and 2University of Nantes, France |
Volume : 6 volume number : 6 pdf |
Using Mutation in Fault Localization |
Chenglong Sun and Tian Huang, Chinese Academy of Sciences, China |
Volume : 6 volume number : 6 pdf |
Testing and Improving Local Adaptive Importance Sampling in LFJ Local-JT in Multiply Sectioned Bayesian Networks |
Dan Wu and Sonia Bhatti, University of Windsor, Canada |
Volume : 6 volume number : 6 pdf |
Weights Stagnation in Dynamic Local Search for SAT |
Abdelraouf Ishtaiwi, University of Petra, Jordan |
Volume : 6 volume number : 6 pdf |
Corrosion Detection Using A.I : A Comparison of Standard Computer Vision Techniques and Deep Learning Model |
Luca Petricca1, Tomas Moss2, Gonzalo Figueroa2 and Stian Broen1, 1Broentech Solutions A.S., Norway and 2Orbiton A.S. Horten, Norway |
Volume : 6 volume number : 6 pdf |
Nonlinear Extension of Asymmetric Garch Model within Neural Network Framewo |
Josip Arneri?1 and Tea Poklepovi?2, 1University of Zagreb, Croatia and 2University of Split, Croatia |
Volume : 6 volume number : 6 pdf |
Modified Vortex Search Algorithm for Real Parameter Optimization |
Berat Dog?an, Inonu University, Turkey |
Volume : 6 volume number : 6 pdf |
Analysis of Rising Tutition Rates in The United States Based on Clustering Analysis and Regression Models |
Long Cheng and Chenyu You, Rensselaer Polytechnic Institute, USA |
Volume : 6 volume number : 6 pdf |
Performance Evaluation of Trajectory Queries on Multiprocessor and Cluster |
Christine Niyizamwiyitira and Lars Lundberg, Blekinge Institute of Technology, Sweden |
Volume : 6 volume number : 6 pdf |
Exploring Peer-To-Peer Data Mining |
Andrea Marcozzi and Gianluca Mazzini, Lepida SpA, Italy |
Volume : 6 volume number : 6 pdf |
Enhanced Protocol for Wireless Content-Centric Network |
Chan-Min Park, Rana Asif Rehman, Tran Dinh Hieu and Byung-Seo Kim, Hongik University, Republic of Korea |
Volume : 6 volume number : 6 pdf |
A Text Mining Research Based on LDA Topic Modelling |
Zhou Tong and Haiyi Zhang, Acadia University, Canada |
Volume : 6 volume number : 6 pdf |
Management Architecture for Dynamic Federated Identity Management |
Daniela Pöhn and Wolfgang Hommel, Leibniz Supercomputing Centre, Germany |
Volume : 6 volume number : 6 pdf |
Surveillance Video Based Robust Detection and Notification of Real Time Suspicious Activities in Indoor Scenarios |
Nithya Shree R, Rajeshwari Sah and Shreyank N Gowda, R.V.College of Engineering, India |
Volume : 6 volume number : 6 pdf |
Majority Voting Approach for the Identification of Differentially Expressed Genes to Understand Gender-Related Skeletal Muscle Aging |
Abdouladeem Dreder, Muhammad Atif Tahir, Huseyin Seker and Muhammad Naveed Anwar, The University of Northumbria, United Kingdom |
Volume : 6 volume number : 6 pdf |
Vulnerabilities of the SSL/TLS Protocol |
Jelena ?urguz, Post of Republic of Srpska in Banja Luka, Bosnia and Herzegovina |
Volume : 6 volume number : 6 pdf |
Semantic Analysis Over Lessons Learned Contained in Social Networks for Generating Organizational Memory in Centers R&D |
Marco Javier Suárez Barón, UNITEC/FODESEP, Colombia |
Volume : 6 volume number : 6 pdf |
Avoiding Duplicated Computation to Improve The Performance of PFSP on CUDA GPUs |
Chao-Chin Wu1, Kai-Cheng Wei1, Wei-Shen Lai2, Yun-Ju Li1, 1National Changhua University of Education, Taiwan and 2Chienkuo Technology University, Taiwan |
Volume : 6 volume number : 6 pdf |
A Proxy Signature Scheme Based on New Secure Authenticated Key Agreement Protocol |
H. Elkamchouchi1, Heba G. Mohamed2, Fatma Ahmed1 and Dalia H. ElKamchouchi1, 1Alexandria University, Egypt and 2Arab Academy for Science and Technology (AAST), Egypt |
Volume : 6 volume number : 6 pdf |
A Secure Digital Signature Scheme with Fault Tolerance Based on The Improved RSA System |
H. Elkamchouchi1, Heba G. Mohamed2, Fatma Ahmed1 and Dalia H. ElKamchouchi1, 1Alexandria University, Egypt and 2Arab Academy for Science and Technology (AAST), Egypt |
Volume : 6 volume number : 6 pdf |
Improving Scheduling of Data Transmission in TDMA Systems |
Timotheos Aslanidis and Leonidas Tsepenekas, National Technical University of Athens, Greece |
Volume : 6 volume number : 6 pdf |
Measuring Technological, Organizational and Environmental Factors Influencing the Adoption Intentions of Public Cloud Computing Using a Proposed Integrated Model |
Minimol Anil Job, Arab Open University, Kingdom of Bahrain |
Volume : 6 volume number : 6 pdf |
Employees Characteristics in Knowledge Transfer and Performance |
Saide1, Hsiao-Lan Wei1, Apol Pribadi Subriadi2, Okfalisa3, Nurul Aini4, and Nesdi Evrilyan Rozanda3, 1National Taiwan University of Science and Technology (NTUST), Taiwan, 2Institute Technology of Sepuluh Nopember (ITS), Indonesia, 3State Islamic University of Sultan Syarif Kasim Riau (UIN Suska Riau), Indonesia and 4Diponegoro University, Indonesia |
Volume : 6 volume number : 6 pdf |