| Business and Technical Requirements of Software-As-A-Service: Implications in Portuguese Enterprise Business Context |
| Virginia Maria Araujo and Jose Ayude Vazquez, University of Vigo, Spain |
| Volume : 3 volume number : 6 pdf |
| Cloud Computing Technology for Egovernment Architecture |
| Sajjad Hashemi, Islamic Azad University, Iran |
| Volume : 3 volume number : 6 pdf |
| An Interactive Approach to Requirements Prioritization Using Quality Factors |
| Dinesh Singh1 and Aman Jatain2, 1M.D.University, India and 2ITM University, India |
| Volume : 3 volume number : 6 pdf |
| Protect Mobile Agent Against Malicious Host Using Partial-Mobility Mechanism |
| Tarig Mohamed Ahmed, University of Khartoum, Sudan |
| Volume : 3 volume number : 6 pdf |
| A New Approach to Analyze Visual Secret Sharing Schemes For Biometric Authentication-A Survey |
| TRajendra A B1 and Sheshadri H S2, 1PET Research Centre, India and 2PES College of Engineering, India |
| Volume : 3 volume number : 6 pdf |
| Improving Data Transmission in the Vanet Using Multi-Criteria Decision Making Method Based on Fuzzy Logic |
| Javad Badali, Mortaza Mokhtari Nazarlou and Parvin Fartut, Islamic Azad University, Iran |
| Volume : 3 volume number : 6 pdf |
| A Comparative Study on Remote Tracking of Parkinson’s Disease Progression Using Data Mining Methods |
| Peyman Mohammadi, Abdolreza Hatamlou and Mohammad Masdari, Islamic Azad University, Iran |
| Volume : 3 volume number : 6 pdf |