Search Paper
Home
Login
Categories
Archive
Post URL
Academic Resources
Contact Us
Research Sharing System - Share URL
Title
Author
Category
Volume, Issue, Month, Year
DATA VIRTUALIZATION FOR ANALYTICS AND BUSINESS INTELLIGENCE IN BIG DATA
Manoj Muniswamaiah, Tilak Agerwala and Charles Tappert
Computer Science & Information Technology
9, 9, July, 2019
EFFECTIVE SERVICE COMPOSITION APPROACH BASED ON PRUNING PERFORMANCE BOTTLENECKS
Navinderjit Kaur Kahlon and Kuljit Kaur Chahal
Computer Science & Information Technology
9, 9, July, 2019
DATA AUGMENTATION BASED ON PIXELLEVEL IMAGE BLEND AND DOMAIN ADAPTATION
Di LIU
Computer Science & Information Technology
9, 9, July, 2019
THREE-DIMENSIONAL RECONSTRUCTION USING THE DEPTH MAP
A.El abderrahmani
Computer Science & Information Technology
9, 9, July, 2019
SEA SURFACE ELECTROMAGNETIC SCATTERING CHARACTERISTICS OF JONSWAP SPECTRUM INFLUENCED BY ITS PARAMETERS
Xiaolin Mi, Xiaobing Wang, Xinyi He, Fei Dai
Computer Science & Information Technology
9, 9, July, 2019
MOTION COMPENSATED RESTORATION OF COLONOSCOPY IMAGES
Nidhal Azawi and John Gauch
Computer Science & Information Technology
9, 9, July, 2019
BLIND IMAGE QUALITY ASSESSMENT USING SINGULAR VALUE DECOMPOSITION BASED DOMINANT EIGENVECTORS FOR FEATURE SELECTION
Besma Sadou
Computer Science & Information Technology
9, 9, July, 2019
CHALLENGES OF BIG DATA APPLICATIONS IN CLOUD COMPUTING
Manoj Muniswamaiah, Dr. Tilak Agerwala and Dr. Charles Tappert
Computer Science & Information Technology
9, 9, July, 2019
INTEGRATING CLOUD COMPUTING TO SOLVE ERP COST CHALLENGE
Amal Alhosban and Anvitha Akurathi
Computer Science & Information Technology
9, 9, July, 2019
A MAPREDUCE BASED ALGORITHM FOR DATA MIGRATION IN A PRIVATE CLOUD ENVIRONMENT
Anurag Kumar Pandey, Ruppa K. Thulasiram, and A. Thavaneswaran
Computer Science & Information Technology
9, 9, July, 2019
SECURITY CONSIDERATIONS FOR EDGE COMPUTING
John M. Acken
Computer Science & Information Technology
9, 9, July, 2019
VIRTUAL ENTERPRISE ARCHITECTURE SUPPLY CHAIN (VEASC) MODEL ON CLOUD COMPUTING: A SIMULATION-BASED STUDY THROUGH OPNET MODELLING
Tlamelo Phetlhu and Sam Lubbe
Computer Science & Information Technology
9, 9, July, 2019
A SOFTWARE TOOL FOR LIVE-LOCK AVOIDANCE IN SYSTEMS MODELLED USING A CLASS OF PETRI NETS
E. Salimi1 , N. Somnath1 and R.S. Sreenivas1
Computer Science & Information Technology
5, 2, April, 2015
TRUST MODELLING FOR SECURITY OF IOT DEVICES
Naresh K. Sehgal1 , Shiv Shankar2 and John M. Acken3
Computer Science & Information Technology
9, 9, July, 2019
REGISTRATION TECHNOLOGIES and THEIR CLASSIFICATION IN AUGMENTED REALITY THE KNOWLEDGE-BASED Registration, COMPUTER VISION-BASED REGISTRATION and TRACKERBASED REGISTRATION TECHNOLOGY
Prabha Shreeraj Nair
Computer Science & Information Technology
6, 1, February, 2016
QOS-DRIVEN JOB SCHEDULING: MULTI-TIER DEPENDENCY CONSIDERATIONS
Husam Suleiman and Otman Basir
Computer Science & Information Technology
9, 9, July, 2019
2d Image Features Detector and Descriptor Selection Expert System
Ibon Merino, Jon Azpiazu, Anthony Remazeilles and Basilio Sierra
Computer Science & Information Technology
9, 12, September, 2019
1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33
34
35
36
37
38
39
40
41
42
43
44
45
46
47
48
49
50
51
52
53
54
55
56
57
58
59
60
61
62
63
64
65
66
67
68
69
70
71
72
73
74
75
76
77
78
79
80
81
82
83
84
85
86
87
88
89
90
91
92
93
94
95
96
97
98
99
100
101
102
103
104
105
106
107
108
109
110
111
112
113
114
115
116
117
118
119
120
121
122
123
124
125
126
127
128
129