Search

Showing total 306 results

Search Constraints

Start Over You searched for: Search Limiters References Available Remove constraint Search Limiters: References Available Topic computer Remove constraint Topic: computer Language undetermined Remove constraint Language: undetermined Journal 2010 3rd international conference on computer science and information technology Remove constraint Journal: 2010 3rd international conference on computer science and information technology Publisher ieee Remove constraint Publisher: ieee
306 results

Search Results

1. RFID-based ticketing for public transport system: Perspective megacity Dhaka

2. Development and application of online energy analysis system based on software integration and communications

3. Trusted connection system based on virtual machine architecture

4. A query optimization trategy for implementing multi dimensional model in spatial database system

5. Information retrieval using fuzzy c-means clustering and modified vector space model

6. A new scheduling algorithm for dynamic task and fault tolerant in heterogeneous grid systems using Genetic Algorithm

7. Learning to integrate unlabeled data in text classification

8. Notice of Retraction: Apply data mining to predict teachers' position settlement: A case study of university

9. Operation Code Authentication preventing shoulder surfing attacks

10. A general model for trust and reputation systems

11. Face recognition using Eigenfaces-Fisher Linear Discriminant and Dynamic Fuzzy Neural Network

12. Embedded C code generation and embedded target development based on RTW-EC

13. Improved boosting algorithm through weighted k-nearest neighbors classifier

14. Notice of Retraction: Research on the development of stability evaluation system of landslide based on the underlying GIS platform

15. A novel implementation of observer pattern by aspect based on Java annotation

16. A resource discovery mechanism integrating P2P and Grid

17. Comparison of vector data compression algorithms in Mobile GIS

18. RVM assessment model for computer network attack

19. Analysis of cryptographic protocol using Strand Spaces

20. Research on improving Apriori algorithm based on interested table

21. An approach to the identification of temperature in intelligent building based on feed forward neural network and genetic algorithm

22. Notice of Retraction: Tamper resistance protection Of logs based on forward-secure

23. Notice of Retraction: Knowledge collaborative supply chain management system based on SOA under SaaS model

24. System verifacation based on VMM and SOPC

25. Implementation of interactive database system for STEP-geometric data from EXPRESS entities

26. Object modeling language for C4ISR capability requirement analysis

27. A game-trust-risk based framework to enhance reliable interaction in e-commerce

28. Event descriptive unit identify based on rules

29. 3D terrain visualization system of coastal zone

30. Next generation internet protocol -Technical realms

31. Surface scan voxel coloring: A surface scan algorithm for scene reconstruction by voxel coloring

32. Design and Implementation of Examination Evaluation System with Multimedia Training Simulation in the background

33. Effective SPARQL query on SSD based RDBMS

34. Design of 3D game based on forestry science popularization

35. Application of data mining based on Rough Sets in the field of telecommunications

36. A framework for consolidating laboratory data using Enterprise Service Bus

37. Implementation of BIM/RFID in computer-aided design-manufacturing-installation process

38. Study on a system level simulation method of TD-HSUPA

39. Improvement of the DAA protocol based on TPM

40. The technology for the remote upgrade based on wireless network optimization monitoring system

41. MATLAB implementation of image segmentation algorithms

42. Automated test case generation from use case: A model based approach

43. Key technologies on rapid web publication of spatial data

44. An efficient forward-secure proxy-protected signature scheme based on the strong RSA assumption

45. Digital watermarking technique for protecting digital images

46. Service-oriented storage resource architecture for cloud computing

47. Research on memory leakage in Java application

48. The authentication and identity delegation about mobile agent system based on trusted computing platform

49. On the design of a mobile agent environment for context-aware M-commerce

50. Network intrusion detection method by least squares support vector machine classifier