Search Paper
  • Home
  • Login
  • Categories
  • Archive
  • Post URL
  • Academic Resources
  • Contact Us

 

Research Sharing System - Share URL

  • Title
  • Author
  • Category
  • Volume, Issue, Month, Year
  • THE PERCEPTIONS OF AGILE METHODOLOGY IN SOUTH AFRICA
  • Thierry Mbah Mbelli
  • Computer Science & Information Technology
  • 6, 1, November, 2016

  • Extended Tuple Constraint Type as a Complex Integrity Constraint Type in XML Data Model – Definition and Enforcement
  • Jovana Vidaković , Sonja Ristić, Slavica Kordić
  • Computer Science & Information Technology
  • 15, 3, October, 2018

  • Natural sd-RCCA Secure Public-key Encryptions from Hybrid Paradigms
  • Yuan Chen,Qingkuan Dong,Yannan Li
  • Computer Science & Information Technology
  • 25, 3, March, 2019

  • NEAR-REAL-TIME PARALLEL ETL+Q FOR AUTOMATIC SCALABILITY IN BIGDATA
  • Pedro Martins
  • Computer Science & Information Technology
  • 6, 1, November, 2016

  • Learning Syntactic Tagging of Macedonian Language
  • Martin Bonchanoski and Katerina Zdravkova
  • Computer Science & Information Technology
  • 15, 3, October, 2018

  • Provably Secure Ciphertext-Policy Attribute-Based Encryption from Identity-Based Encryption
  • Yi-Fan Tseng,Chun-I Fan
  • Computer Science & Information Technology
  • 25, 3, March, 2019

  • COMBINED CLASSIFIERS FOR TIME SERIES SHAPELETS
  • Ivan S. Mitzev
  • Computer Science & Information Technology
  • 6, 1, November, 2016

  • Using Screencasts to Enhance Coding Skills: the case of Logic Programming
  • Petros Kefalas and Ioanna Stamatopoulou
  • Computer Science & Information Technology
  • 15, 3, October, 2018

  • Ontology and Weighted D-S Evidence Theory-Based Vulnerability Data Fusion Method
  • Xiaoling Tao,Liyan Liu
  • Computer Science & Information Technology
  • 25, 3, March, 2019

  • A Novel Distributed Registry Approach for Efficient and Resilient Service Discovery in Megascale Distributed Systems
  • Lars Braubach and Kai Jander,Alexander Pokahr
  • Computer Science & Information Technology
  • 15, 3, October, 2018

  • Towards Multi-user Searchable Encryption Supporting Boolean Query and Fast Decryption
  • Yunling Wang, Jianfeng Wang
  • Computer Science & Information Technology
  • 25, 3, March, 2019

  • A SWITCHED-ANTENNA NADIR-LOOKING INTERFEROMETRIC SAR ALTIMETER FOR TERRAIN-AIDED NAVIGATION
  • Inchan Paek
  • Computer Science & Information Technology
  • 6, 1, November, 2016

  • The Contribution of Electronic Banking to Customer Satisfaction: A Case of Gcb Bank Limited - Koforidua
  • Martin Otu Offei and Kwaku Nuamah-Gyambrah
  • Computer Science & Information Technology
  • 8, 1, February, 2016

  • OPTIMIZATION IN ENGINE DESIGN VIA FORMAL CONCEPT ANALYSIS USING NEGATIVE ATTRIBUTES
  • Rodríguez-Jiménez
  • Computer Science & Information Technology
  • 6, 1, November, 2016

  • On the Use of Self Island-based Evolutionary Computation Methods on Complex Environments?
  • Rafael Nogueras and Carlos Cotta
  • Computer Science & Information Technology
  • 15, 3, October, 2019

  • CCA-Secure Deterministic Identity-Based Encryption Scheme
  • Meijuan Huang,Bo Yang ,Yi Zhao
  • Computer Science & Information Technology
  • 25, 3, March, 2019

  • AN ENTROPIC OPTIMIZATION TECHNIQUE IN HETEROGENEOUS GRID COMPUTING USING BIONIC ALGORITHMS
  • Saad M. Darwish
  • Computer Science & Information Technology
  • 7, 6, December, 2017

1  2  3  4  5  6  7  8  9  10  11  12  13  14  15  16  17  18  19  20  21  22  23  24  25  26  27  28  29  30  31  32  33  34  35  36  37  38  39  40  41  42  43  44  45  46  47  48  49  50  51  52  53  54  55  56  57  58  59  60  61  62  63  64  65  66  67  68  69  70  71  72  73  74  75  76  77  78  79  80  81  82  83  84  85  86  87  88  89  90  91  92  93  94  95  96  97  98  99  100  101  102  103  104  105  106  107  108  109  110  111  112  113  114  115  116  117  118  119  120  121  122  123  124  125  126  127  128  129 

 

About Us | Post Cfp | Share URL Main | Share URL category | Post URL
All Rights Reserved @ Call for Papers - Conference & Journals