Browse Title Index


 
Issue Title
 
Vol 4, No 3 (2013): September Steganography & the Art of Deception: A Comprehensive Survey Abstract   PDF
Youssef Bassil
 
Vol 2, No 3 (2011): September Survey of Clustering in Mobile Ad Hoc Networks Abstract   PDF
Abolfazle Akbari
 
Vol 2, No 3 (2011): September The Relationship between Reinforcement Learning and Hash Tables Abstract   PDF
MOHAMMAD MEHDI HASSANI
 
Vol 2, No 3 (2011): September Theory of Fuzzy Soft Sets from a New Perspective Abstract   PDF
Tridiv Jyoti Neog
 
Vol 5, No 1 (2014): March Trusted CCIPS: A Trust Security Model for Cloud Services Based on a Collaborative Intrusion Detection and Prevention Framework Abstract   PDF
Fahad F Alruwaili, T. Aaron Gulliver
 
Vol 2, No 3 (2011): September Utilizing UHF RFID in Supply Chains: Examples from Similarities in Paper and Cell Phone Industries Abstract   PDF
Kari Määttänen, Jussi Nummela, Leena Ukkonen, Lauri Sydänheimo
 
Vol 3, No 3 (2012): September Verification of Sediment Bed Load in Dez River(Case study: in Tale Zang Station) Abstract   PDF
Nader Parsazadeh, Mohammad Mahmoudian Shoushtari, Mehdi Ghomishi
 
51 - 57 of 57 Items << < 1 2 3