


default search action
International Journal of Computers and Their Applications, Volume 17
Volume 17, Number 1, March 2010
- Baoying Wang, Imad Rahal, William Perrizo:

DAVYD: An iterative Density-Based Approach for Clusters with VarYing Densities. Int. J. Comput. Their Appl. 17(1): 2-15 (2010) - Sharad Sharma:

Fuzzy Approach for Predicting Probability of Reaching a Target in a Battlefield Environment. Int. J. Comput. Their Appl. 17(1): 16-24 (2010) - Wei Dong, Yang Wang, Hua Li, Chang Nian Zhang:

A Novel Watermarking Scheme for Blind Objective Image Quality Assessment. Int. J. Comput. Their Appl. 17(1): 25-33 (2010) - T. Justin Jose, P. Mythilli:

A Novel Hybrid Model for Content Based Mammogram Image Retrieval. Int. J. Comput. Their Appl. 17(1): 34-40 (2010) - Sandip C. Patel, Jeffrey L. Hieb, James H. Graham:

Secure Internet-Based SCADA for Monitoring and Control of Industrial Processes. Int. J. Comput. Their Appl. 17(1): 41-51 (2010) - Rong Yang, Adel Said Elmaghraby:

Simulating Web Domains Using Graph Models. Int. J. Comput. Their Appl. 17(1): 52-57 (2010)
Volume 17, Number 2, June 2010
- Bradley F. Dutton, Charles E. Stroud:

On-Line Single Event Upset Detection and Correction in Field Programmable Gate Array Configuration Memories. Int. J. Comput. Their Appl. 17(2): 59-69 (2010) - Smita S. Potdar, Kenneth G. Ricks:

Overhead Reduction for an Off-the-Shelf Real-Time Operating System. Int. J. Comput. Their Appl. 17(2): 70-83 (2010) - Sin Ming Loo, JingXia Wang:

Optimizing Reconfigurable Hardware Resource Usage in System-on-a-Programmable-Chip with Location Aware Genetic Algorithm. Int. J. Comput. Their Appl. 17(2): 84-94 (2010) - JingXia Wang, Sin Ming Loo:

Case Study of Finite Resource Optimization in FPGA using Genetic Algorithm. Int. J. Comput. Their Appl. 17(2): 95-101 (2010) - Chang N. Zhang, Hua Li:

Design of Optimal Fault-Tolerant VLSI Systolic Array. Int. J. Comput. Their Appl. 17(2): 102-107 (2010) - Mustafa Al-Fayoumi, Sattar J. Aboud, Mohammad Ahmed Al-Fayoumi:

A New Digital Signature Scheme Based on Integer Factoring and Discrete Logarithm Problem. Int. J. Comput. Their Appl. 17(2): 108-115 (2010)
Volume 17, Number 3, September 2010
- Sarah Tasneem, Reda A. Ammar, Lester Lipsky, Howard A. Sholl:

Improvement of Real-Time Job Completion Using Residual Time-Based (RTB) Scheduling. Int. J. Comput. Their Appl. 17(3): 117-132 (2010) - Ahmad Alsaeed Tolba, Hamayun Ahmed Khan, Hazem M. Raafat:

Feature Fusion for Automated Visual Inspection of Flat Surface Products. Int. J. Comput. Their Appl. 17(3): 133-143 (2010) - Arunu Anand, Gautam B. Singh:

Modified SACO Algorithm for Productive Emergence. Int. J. Comput. Their Appl. 17(3): 144-149 (2010) - Dayong Ye, Minjie Zhang, Quan Bai, Khin Than Win:

A Novel Task Allocation Protocol in Agent Organizations and Its Application to Health Care Problems. Int. J. Comput. Their Appl. 17(3): 150-160 (2010) - Yasser Fouad Hassan:

Rough Set Genetic Programming. Int. J. Comput. Their Appl. 17(3): 161-171 (2010) - Paolino Di Felice, Massimo Ianni, Luigi Pomante:

Design and Evaluation of a Spatial Extension of TinyDB for Wireless Sensor Networks. Int. J. Comput. Their Appl. 17(3): 172-193 (2010)
Volume 17, Number 4, December 2010
- Dunren Che:

Guest Editor's Note. Int. J. Comput. Their Appl. 17(4): 195 (2010) - Gongzhu Hu:

Sentiment Analysis of Surveys using Both Numeric Ratings. Int. J. Comput. Their Appl. 17(4): 196-203 (2010) - Gordon K. Lee, Edward Grant:

Adaptive Fuzzy Inference for Edge Detection Using Compander Functions and Linear Fitness Function Transformations. Int. J. Comput. Their Appl. 17(4): 204-211 (2010) - Ahmad M. Sarhan:

Cancer Classification Based on DNA Microarray Data Using Cosine Transformation and Vector Quantization. Int. J. Comput. Their Appl. 17(4): 212-222 (2010) - Ziping Liu, Bidyut Gupta:

Data Broadcast Scheduling With Multiple Channels. Int. J. Comput. Their Appl. 17(4): 223-232 (2010) - Gary Thorpe, Nagi N. Mekhiel:

Modeling an Adaptable Memory Controller. Int. J. Comput. Their Appl. 17(4): 233-240 (2010) - Chet Langin, Dunren Che, Michael S. Wainer, Shahram Rahimi:

SOM with Vulture Fest Model Discovers Feral Malware and Visually Profiles the Security of Subnets. Int. J. Comput. Their Appl. 17(4): 241-249 (2010) - Guangzhi Qu, Osamah A. Rawashdeh, Dunren Che:

Self-Protection against Attacks in an Autonomic Computing Environment. Int. J. Comput. Their Appl. 17(4): 250-256 (2010)

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.


Google
Google Scholar
Semantic Scholar
Internet Archive Scholar
CiteSeerX
ORCID














