Search

Showing total 67 results

Search Constraints

Start Over You searched for: Search Limiters Available in Library Collection Remove constraint Search Limiters: Available in Library Collection Topic computer science Remove constraint Topic: computer science Topic computer security Remove constraint Topic: computer security Database Supplemental Index Remove constraint Database: Supplemental Index
67 results

Search Results

1. An Ameliorated Methodology to Abstract Object Oriented Features from Programming System.

2. A Study on the Limitations of Evolutionary Computation and other Bio-inspired Approaches for Integer Factorization.

3. Knowledge Representation through Graphs.

4. Fuzzified Expert System for Employability Assessment.

5. High-Level Representation of Time in Diagrammatic Specification.

6. New Theory for Code-translation; Punctuator and Qualifier as Two Token Categories and Supplementary Concepts of Programming.

7. A Hierarchical Method for Solving Soft Nonlinear Constraints.

8. An Ameliorated Methodology for the Abstraction of Object Oriented Features from Software Requirements Specification.

9. MRAI Optimization for BGP Convergence Time Reduction without Increasing the Number of Advertisement Messages.

10. Automated Business Rules Transformation into a Persistence Layer.

11. Second-Order Spline-Wavelet Robust Code under Non-Uniform Codeword Distribution.

12. A Review of the Applications of Bio-inspired Flower Pollination Algorithm.

13. Validation of Usability Driven Web based Software Process Model using Simulation.

14. Big Data- Is a Turnkey Solution.

15. An Optimized Genetic Stowed Biometric Approach to Potent QOS in MANET.

16. Arguing Security of Generic Avionic Mission Control Computer System (MCC) using Assurance Cases.

17. Tagged-Sub Optimal Code (TSC) Compression for Improving Performance of Web Services.

18. Design of an Integrated Role-Based Access Control Infrastructure for Adaptive Workflow Systems.

19. A Multi-Agent Case-Based Reasoning Architecture for Phishing Detection.

20. Impact of Neighbors on the Privacy of Individuals in Online Social Networks.

21. The Case for Fairness of Trust Management.

22. A New Competitive Intelligence-based Strategy for Web Page Search.

23. Gaussian Mixture Distribution Analysis as Estimation of Probability Density Function and it's the Periphery.

24. A Web based System for Cricket Talent Identification, Enhancement and Selection (C-TIES).

25. Developing a Novel Holistic Taxonomy of Security Requirements.

26. A Distinctive Genetic Approach for Test-Suite Optimization.

27. ANN Based Robotic Arm Visual Servoing Nonlinear System.

28. Predicting Number of Faults in Software System using Genetic Programming.

29. Jitter Buffer Modelling and Analysis for TDM over PSN.

30. Mobile Platform Detect and Alerts System for Driver Fatigue.

31. Evolution of Modern Management through Taylorism: An Adjustment of Scientific Management Comprising Behavioral Science.

32. Arabic Ontology Model for Financial Accounting.

33. Integration of Object Oriented Host Program with Network DBMS.

34. A Review of Evaluation Methods and Techniques for Simulation Packages.

35. A Programming Environment for Visual Block-Based Domain-Specific Languages.

36. OWA based Book Recommendation Technique.

37. Fitness Based Position Update in Spider Monkey Optimization Algorithm.

38. A Generic Model of Execution for Synthesizing Interpreted Domain-Specific Models.

39. Simulation Studies for Analysis of Inherent Resilience Properties of an Amine Regeneration Column used in a Gas Sweetening Unit.

40. Domain Model Validation of Context-aware Mobile Patient Monitoring Systems.

41. Multi-View Human Action Recognition Using Wavelet Data Reduction and Multi-Class Classification.

42. A Theoretical Framework for the Maintainability Model of Aspect Oriented Systems.

43. Towards a Knowledge Based Approach to Style Driven Architecture Design.

44. The Impact of Search Algorithms in Automated Program Repair.

45. Using First-Order Logic to Query Heterogeneous Internet Data Sources.

46. Impulsive Noise Cancellation of ECG signal based on SSRLS.

47. Impact of Developer Choices on Energy Consumption of Software on Servers.

48. ABCE: A Novel Framework for Improved Branch Coverage Analysis.

49. Real-Time Languages, Timed Alternating Automata, and Timed Temporal Logics: Relationships and Specifications.

50. Exploring a Context-based Network Access Control for Mobile Devices.