


default search action
Journal of Computers, Volume 2
Volume 2, Number 1, February 2007
- Christian Philip Kunze, Sonja Zaplata, Winfried Lamersdorf:

Mobile Processes: Enhancing Cooperation in Distributed Mobile Environments. 1-11 - Nicolas Chapados, Yoshua Bengio:

Noisy K Best-Paths for Approximate Dynamic Programming with Application to Portfolio Optimization. 12-19 - Allan Caine, Robin Cohen:

Tutoring an Entire Game with Dynamic Strategy Graphs: The Mixed-Initiative Sudoku Tutor. 20-32 - Christophe Simon, Philippe Weber, Eric Levrat:

Bayesian Networks and Evidence Theory to Model Complex Systems Reliability. 33-43 - Omar Batarfi, Lindsay F. Marshall:

Conformance Testing a Set of Criteria for Assessing Trust. 44-49
Volume 2, Number 2, April 2007
- Iman Saleh, Mohamed Eltoweissy:

P3ARM-t: Privacy-Preserving Protocol for Association Rule Mining with t Collusion Resistance. 1-12 - Sudip Chakraborty

, Indrajit Ray:
p-Trust: A New Model of Trust to Allow Finer Control Over Privacy in Peer-to-Peer Framework. 13-24 - Neil C. Rowe, E. John Custy, Binh T. Duong:

Defending Cyberspace with Fake Honeypots. 25-36 - Dimitris Karadimas

, Kostas Efstathiou:
An Integrated Educational Platform Implementing Real, Remote Lab-Experiments for Electrical Engineering Courses. 37-44 - Dietmar Janetzko:

Authoring of Units of Learning via Dialogue Systems. 45-52 - Mohammad Shirali-Shahreza:

Taking Multiple-Choise Quiz by SMS on Mobile Phones Including Analyzing Property. 53-60 - Francesco Palmieri:

Introducing Virtual Private Overlay Network Services in Large Scale Grid Infrastructures. 61-72 - Erik Lilienblum, Bernd Michaelis:

Optical 3D Surface Reconstruction by a Multi-Period Phase Shift Method. 73-83 - Tara Whalen, Carrie Gates:

A Psychological Profile of Defender Personality Traits. 84-93
Volume 2, Number 3, May 2007
- Barbara Endicott-Popovsky, Deborah A. Frincke, Carol A. Taylor:

A Theoretical Framework for Organizational Network Forensic Readiness. 1-11 - Youzou Miyadera, Kunimi Kurasawa, Shoichi Nakamura, Nobuyoshi Yonezawa, Setsuo Yokoyama:

A Real-time Monitoring System for Programming Education using a Generator of Program Animation Systems. 12-20 - Ivan Ganchev

, Stanimir Stojanov, Máirtín O'Droma, Damien Meere:
An InfoStation-Based Multi-Agent System Supporting Intelligent Mobile Services Across a University Campus. 21-33 - Olivier Motelet, Nelson A. Baloian

, José A. Pino:
Hybrid System for Generating Learning Object Metadata. 34-42 - Meurig Beynon, Antony Harfield:

Lifelong Learning, Empirical Modelling and the Promises of Constructivism. 43-54 - Carolina Pinart:

Alternatives for In-Service BER Estimation in All-Optical Networks: Towards Minimum Intrusion. 55-62 - Gabriella Kókai, Martin Böhner

, Tonia Christ, Hans Holm Frühauf:
Parallel Dynamic Parameter Adaption of Adaptive Array Antennas Based on Nature Inspired Optimisation. 63-75
Volume 2, Number 4, June 2007
- David Parsons

, Hokyoung Ryu, Mark Cranshaw:
A Design Requirements Framework for Mobile Learning Environments. 1-8 - Cristina Carmona, David Bueno

:
From MITO to SAMO: Evolution of an Educational Game for Spanish Orthography. 9-16 - Jayfus T. Doswell, Pauline H. Mosley:

A Virtual Instructor Service-Oriented Architecture for Teaching Robotics in Mixed Reality. 17-22 - Ana I. Molina, Miguel A. Redondo, Manuel Ortega

:
Applying Task Modeling and Pattern-Based Techniques in Reengineering Processes for Mobile Learning User Interfaces: A Case Study. 23-30 - Carsten Hohendorf, Erwin P. Rathgeb, Esbold Unurkhaan, Michael Tüxen:

Secure End-to-End Transport Over SCTP. 31-40 - Tugba Özacar, Övünç Öztürk, Murat Osman Ünalir

:
Optimizing a Rete-based Inference Engine using a Hybrid Heuristic and Pyramid based Indexes on Ontological Data. 41-48 - María Elena Acevedo-Mosqueda, Cornelio Yáñez-Márquez, Itzamá López-Yáñez:

A New Model of BAM: Alpha-Beta Bidirectional Associative Memories. 49-56 - Cristina Rebollo

, Inmaculada Remolar, Miguel Chover
, Jesús Gumbau, Oscar Ripolles:
A Clustering Framework for Real-time Rendering of Tree Foliage. 57-67 - Erhan AliRiza Ince

, Syed Amjad Ali:
Rule Based Segmentation and Subject Identification Using Fiducial Features and Subspace Projection Methods. 68-75 - Daniele Gianni, Andrea D'Ambrogio:

A Language to Enable Distributed Simulation of Extended Queueing Networks. 76-86
Volume 2, Number 5, July 2007
- Jacques Lonchamp:

Towards a Web Platform for Collaborative Learning Practice, Evaluation and Dissemination. 1-8 - Clare J. Hooper, Les Carr, Hugh C. Davis, David E. Millard, Su White, Gary B. Wills:

AnnAnn and AnnAnn.Net: Tools for Teaching Programming. 9-16 - Diana Rosario Pérez Marín, Enrique Alfonseca, Pilar Rodríguez

, Ismael Pascual-Nieto:
A Study on the Possibility of Automatically Estimating the Confidence Value of Students' Knowledge in Generated Conceptual Models. 17-26 - Vu Minh Chieu:

COFALE: An Authoring System for Creating Web-based Adaptive Learning EnvironmentsSupporting Cognitive Flexibility. 27-37 - Irfan Naufal Umar, Sajap Maswan:

The Effects of a Web-based Guided Inquiry Approach on Students' Achievement. 38-43 - Igor Fischer, Thorsten Herfet:

Watermarks and Text Transformations in Visual Document Authentication. 44-53 - Mohammad Afshar, Christopher Dartnell, Dominique Luzeaux, Jean Sallantin, Yannick Tognetti:

Aristotle's Square Revisited to Frame Discovery Science. 54-66 - Gürhan Küçük, Can Basaran:

Reducing Energy Consumption of Wireless Sensor Networks through Processor Optimizations. 67-74 - Vincenza Carchiolo

, Michele Malgeri, Giuseppe Mangioni, Vincenzo Nicosia:
Fast Information Retrieval in a Self-Organising P2P Network. 75-81
Volume 2, Number 6, August 2007
- Xue Mei, Shaohua Kevin Zhou, Hao Wu, Fatih Porikli:

Integrated Detection, Tracking and Recognition for IR Video-based Vehicle Classification. 1-8 - Pei Gao, Li Chin Khor, Wai Lok Woo

, Satnam Singh Dlay:
Extraction of Unique Independent Components for Nonlinear Mixture of Sources. 9-16 - Naum Chernoguz:

Adaptive-Gain Kinematic Filters of Orders 2-4. 17-25 - Lionel Fillatre, Igor V. Nikiforov

, Florent Retraint:
A Simple Algorithm for Defect Detection From a Few Radiographies. 26-34 - Sichun Wang, François Patenaude, Robert J. Inkol:

Computation of the Normalized Detection Threshold for the FFT Filter Bank-Based Summation CFAR Detector. 35-48 - Arnaud Jarrot, Cornel Ioana, André Quinquis:

Toward The Use Of The Time-Warping Principle With Discrete-Time Sequences. 49-55 - Lei Wang, Niral Patel:

Low-Complexity Analysis of Repetitive Regularities for Biometric Applications. 56-64 - Clive Cheong Took, Saeid Sanei:

Exploiting Sparsity, Sparseness and Super-Gaussianity in Underdetermined Blind Identification of Temporomandibular Joint Sounds. 65-71 - Robert Dinoff, Tin Kam Ho, Richard Hull, Bharat Kumar, Daniel F. Lieuwen, Paulo Santos, Haobo Ren:

Intuitive Network Applications: Learning for Personalized Converged Services Involving Social Networks. 72-84 - Sue Ellen Haupt, George S. Young, Christopher T. Allen:

A Genetic Algorithm Method to Assimilate Sensor Data for a Toxic Contaminant Release. 85-93
Volume 2, Number 7, September 2007
- Dominique Pastor

, Asmaa Amehraye:
Algorithms and Applications for Estimating the Standard Deviation of AWGN when Observations are not Signal-Free. 1-10 - Mehmet Bayram Yildirim

, Ekrem Duman
, Dilek Duman, Coskun Cetinkaya:
Allocation of Component Types to Machines in the Automated Assembly of Printed Circuit Boards. 11-19 - Patrick P. Mercier, Sai Mohan Kilambi, Behrouz Nowrouzian:

Optimization of FRM FIR Digital Filters Over CSD and CDBNS Multiplier Coefficient Spaces Employing a Novel Genetic Algorithm. 20-31 - Venkat Ramachandran, Christian S. Gargour, Ravi Prakash Ramachandran:

Two-Dimensional Digital Filters with Variable Magnitude Characteristics Obtained from a 1-D Monotonic Response. 32-39 - Abraham H. Diaz-Perez, Domingo Rodríguez:

Cyclic Convolution Algorithm Formulations Using Polynomial Transform Theory. 40-48 - Christophe G. Giraud-Carrier, Tony R. Martinez:

Learning by Discrimination: A Constructive Incremental Approach. 49-58 - Robert M. Nickel, Ananth N. Iyer:

A Least-Squares Approach to Blind Source Separation in Multispeaker Environments. 59-67 - Nasiroh Omar

, Colin Higgins, Colin G. Harrison, Diego Campo Millan:
Internet Research Support System: An Application for Immediate Feedback in Authentic Internet Research. 68-74 - Vasyl Semenov

:
Computation of Immittance and Line Spectral Frequencies Based on Inter-frame Ordering Property. 75-80
Volume 2, Number 8, October 2007
- Eyad Elyan, Hassan Ugail:

Reconstruction of 3D Human Facial Images Using Partial Differential Equations. 1-8 - Abdul Rashid Husain

, Mohamad Noh Ahmad, Abdul Halim Mohd Yatim:
Deterministic Models of an Active Magnetic Bearing System. 9-17 - Vinh Bui

, Weiping Zhu, Ruhul A. Sarker:
Modelling Internet End-to-End Loss Behaviors: A Congestion Control Perspective. 18-25 - Ratna Dutta:

Converting Group Key Agreement Protocol into Password-Based Setting - Case Study. 26-33 - Jaruwan Mesit, Ratan K. Guha, Shafaq Chaudhry

:
3D Soft Body Simulation Using Mass-spring System with Internal Pressure Force and Simplified Implicit Integration. 34-43 - Musa Mohd Mokji, Syed Abdul Rahman Abu-Bakar:

Adaptive Thresholding Based On Co-Occurrence Matrix Edge Information. 44-52 - Lorenzo Ibarria, Peter Lindstrom

, Jarek Rossignac:
Spectral Interpolation on 3×3 Stencils for Prediction and Compression. 53-63 - Su Chen, Antonio Nucci:

Dynamic Nonuniform Data Approximation in Databases with Haar Wavelet. 64-76 - Prechanon Kumkratug, Panthep Laohachai:

Direct Method for Transient Stability Assessment of a Power System with a SSSC. 77-82
Volume 2, Number 9, November 2007
- Taro Yabuki, Hiroshi Sakuta:

Development of Collaboration Environments for Web-Based Learning. 1-6 - Debzani Deb

, M. Muztaba Fuad
, Michael J. Oudshoorn
:
ADE: Utility Driven Self-management in a Networked Environment. 7-15 - Serafino Cicerone

, Gianlorenzo D'Angelo, Gabriele Di Stefano, Daniele Frigioni, Alberto Petricola:
Partially Dynamic Algorithms for Distributed Shortest Paths and their Experimental Evaluation. 16-26 - Werner Winiwarter:

JETCAT - Japanese-English Translation Using Corpus-Based Acquisition of Transfer Rules. 27-36 - Tariq M. King, Alain E. Ramirez, Rodolfo Cruz, Peter J. Clarke

:
An Integrated Self-Testing Framework for Autonomic Computing Systems. 37-49 - Giovanni Agosta

, Luca Breveglieri
, Gerardo Pelosi
, Martino Sykora:
Programming Highly Parallel Reconfigurable Architectures for Symmetric and Asymmetric Cryptographic Applications. 50-59 - Muhammad Z. Hasan, Sotirios G. Ziavras:

Partially Reconfigurable Vector Processor for Embedded Applications. 60-66 - Wei-Lun Chang, Soe-Tsyr Yuan:

A Recommendation-Based Pricing System for Information Goods Versioning. 67-76
Volume 2, Number 10, December 2007
- Danielle Nuzillard, Cosmin Lazar:

Partitional Clustering Techniques for Multi-Spectral Image Segmentation. 1-8 - Christopher League

, Kenjone Eng:
Schema-Based Compression of XML Data with Relax NG. 9-17 - Jens Steiner, Matthias Hagner, Ursula Goltz:

Runtime Analysis and Adaptation of a Hard Real-Time Robotic Control System. 18-27 - Tanja Arh, Borka Jerman-Blazic:

Application of Multi-Attribute Decision Making Approach to Learning Management Systems Evaluation. 28-37 - Stanislav Milanovic:

Case Study for Unified Backhaul Performance Optimization. 38-44 - Amy Neustein:

Sequence Package Analysis: A New Method for Intelligent Mining of Patient Dialog, Blogs and Help-line Calls. 45-51 - Andrew Byrne, Nicolas Méloni, Arnaud Tisserand, Emanuel M. Popovici, William P. Marnane:

Comparison of Simple Power Analysis Attack Resistant Algorithms for an Elliptic Curve Cryptosystem. 52-62 - Jarrod Trevathan

, Wayne Read:
Investigating Shill Bidding Behaviour Involving Colluding Bidders. 63-75 - Roman V. Yampolskiy, Venu Govindaraju

:
Direct and Indirect Human Computer Interaction Based Biometrics. 76-88

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.


Google
Google Scholar
Semantic Scholar
Internet Archive Scholar
CiteSeerX
ORCID














