default search action
Computer and Information Science, Volume 8
Volume 8, Number 1, 2015
- Zi-Cheng Lan, Yuan-Biao Zhang, Jing Zhang, Xin-Guang Lv:
Short-Term Wind Power Forecasting Model based on ICA-BP Neural Network. 1-9 - Somayeh Danafar, Kenji Fukumizu, Faustino Gomez:
Kernel-Based Information Criterion. 10-24 - Nidal Yousef, Hassan Altarwaneh, Aysh Alhroob:
Best Test Cases Selection Approach Using Genetic Algorithm. 25-35 - Sarah Naiem, Mahmoud M. Abdellatif, Salama S. E:
Evaluation of Computer Science and Software Engineering Undergraduate's Soft Skills in Egypt from Student's Perspective. 36-53 - Longfei Dai, Wenguo Yang, Suixiang Gao, Yinben Xia, Mingming Zhu, Zhigang Ji:
Non-Real-Time Network Traffic in Software-Defined Networking: A Link Bandwidth Prediction-Based Algorithm. 54-61 - Ashraf A. Shahin:
Virtual Network Embedding Algorithms Based on Best-Fit Subgraph Detection. 62-73 - Ken Kin-Kiu Fong, Stanley Kam Sing Wong:
Hong Kong Wi-Fi Adoption and Security Survey 2014. 74-94 - Yassine El Hafid, Abdessamad Elrharras, Karim Guennoun, Abdelkader Amri, Mohammed Wahbi:
Accelerating the Detection of Spectral Bands by ANN-ED on a GPU. 95-107 - Abdessamad Elrharras, S. El Moukhlis, Rachid Saadane, Mohamed Wahbi, Abdellatif Hamdoun:
FPGA-Based Fully Parallel PCA-ANN for Spectrum Sensing. 108-118 - Abraham Tesso Nedjo, Degen Huang:
Augmenting Performance of SMT Models by Deploying Fine Tokenization of the Text and Part-of-Speech Tag. 119-127 - Qian Cao, Xiaoxia Tian:
The Structural Characteristics of Tourism Economic Network in Xinjiang Province. 128-134 - Tijane Fatima Zohra Badri, Rachid Saadane, Samir Mbarki, Mohammed Wahbi:
Call Admission Control Scheme and Handover Management in LTE Femtocell-Macrocell Integrated Networks. 135-150 - Shu Zhang, Samira Sadaoui, Malek Mouhoub:
An Empirical Analysis of Imbalanced Data Classification. 151-162
Volume 8, Number 2, 2015
- Chengwen Jiao, Suixiang Gao, Wenguo Yang:
Comparing Algorithms for Minimizing Congestion and Cost in the Multi-Commodity k-Splittable Flow. 1-8 - Eman Altameem:
Impact of Agile Methodology on Software Development ? 9-14 - Natarajan Meghanathan, Tiffani Gardner, Justin Lewis:
An Energy-Efficient Tracking Algorithm to Trace a Radioactive Mobile Target in a Wireless Sensor Network. 15-23 - Kazi Mamun:
Combating Shill Bidding in Real Time: Prevention, Detection and Response. 24-36 - Mohammad-Hossein Nadimi-Shahraki, Zahra S. Torabi, Akbar Nabiollahi:
Using J48 Tree Partitioning for scalable SVM in Spam Detection. 37-42 - Daniel Jovan Sooknanan, Ajay Joshi:
Using GUI Design Theory to Develop an Open Source Touchscreen Smartphone GUI. 43-57 - Sanjay Ahuja:
System Level Benchmarks for the Cloud. 58-63 - Dongdong Fei, Chen Deng:
Novel Method for More Precise Determination of Oscillometric Pulse Amplitude Envelopes. 64-72 - Ashraf A. Shahin:
Memetic Elitist Pareto Evolutionary Algorithm for Virtual Network Embedding. 73-88 - Olusegun Folorunso:
Knowledge Sharing Trust Level Measurement Adoption Model Based On Fuzzy Expert System. 89-101 - Muhammad Tanvir Alam, Haozhang Li, Atul Patidar:
Smart Trading in Smart Grid Using Bitcoin. 102-112
Volume 8, Number 3, 2015
- Natarajan Meghanathan:
Maximum Lifetime Communication Topologies of Secondary User Nodes in Cognitive Radio Ad hoc Networks. 1-12 - Fawaz Alassery, Walid K. M. Ahmed, Mohsen Sarraf, Victor B. Lawrence:
Collision Detection in Wireless Sensor Networks Through Pseudo-Coded ON-OFF Pilot Periods per Packet: A Novel Low-Complexity and Low-Power Design Technique. 13-50 - Wala'a M. AlOmari, Hesham Abusaimeh:
Modified USB Security Token for User Authentication. 51-63 - H. M. Hijawi, M. H. Saheb:
Sequence Pattern Mining in Data Streams. 64-70 - Itimad Raheem Ali, Ghazali Sulong, Hoshang Kolivand:
Realistic Lip Syncing for Virtual Character Using Common Viseme Set. 71-82 - Ahmad A. Rabaa'i:
An Empirical Investigation on the Adoption of e-Government in Developing Countries: The Case of Jordan. 83-102 - Sanjay Ahuja:
Hadoop Based Data Intensive Computation on IaaS Cloud Platforms. 103-118 - Nermin Abdel-Hakim Othman, Ahmed Sharaf Eldin, Doaa Saad El Zanfaly:
Handling Uncertainty in Database: An Introduction and Brief Survey. 119-133 - Issam Jebreen:
Requirements Determination as a Social Practice: Perceptions and Preferences of Novice Analysts. 134-144 - Jianyu Zheng:
The research on Repeater Coordination Based on band plan. 145-154 - Sarah N. Abdulkader, Ayman Atia, Mostafa-Sami M. Mostafa:
Authentication systems: principles and threats. 155-179 - David Salb:
Using Technology to Retain Baby Boomers in the Workforce. 180-185 - Baydaa Al-Hamadani, Thikra Shubita:
A Novel Hyper-Active Algorithm to Estimate Missing Microarray Attributes. 186-194 - Baback Khodadoost:
The Computed Scripture: Exponentially Based Fourier Regulated Construct of Quran and its Fundamentally Important Consequences. 195-291 - Chris Lee:
Reviewer Acknowledgements for Computer and Information Science, Volume 8, Number 3. 292
Volume 8, Number 4, 2015
- Olivier Rukundo:
Effects of Improved-Floor Function on the Accuracy of Bilinear Interpolation Algorithm. 1-11 - Kadir Alpaslan Demir:
Multi-View Software Architecture Design: Case Study of a Mission-Critical Defense System. 12-31 - Sabarish Sridhar:
A Comprehensive Approach to Image Watermarking, Encryption and Steganography. 32-39 - Aleksandar Karadimce, Slobodan Kalajdziski, Danco Davcev:
Model of Cloud-Based Services for Data Mining Analysis. 40-50 - Rafeeq Al-Hashemi, Moha'med Al-Jaafreh, Tahseen Al-Ramadin, Ayman Al-Dmour:
A Smart Algorithm for USE-Cases Production Based on Name Entity Recognition. 51-55 - Eman Fares Al Mashagba:
Human Identification by Gait Using Time Delay Neural Networks. 56-63 - Anas A. Hadi, Jonathan Cazalas:
Improved Recommender for Location Privacy Preferences. 64-76 - Suvir P. Mirchandani:
Fuzzy Logic Based Eye-Brain Controlled Web Access System. 77-92 - Muhammad Aqib, Jonathan Cazalas:
Trusted Base Stations-Based Privacy Preserving Technique in Location-Based Services. 93-104 - Chris Lee:
Reviewer Acknowledgements for Computer and Information Science, Vol. 8, No. 4. 105
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.