|
Issue |
Title |
|
Vol 4, No 3 (2013): September |
Steganography & the Art of Deception: A Comprehensive Survey |
Abstract
PDF
|
Youssef Bassil |
|
Vol 2, No 3 (2011): September |
Survey of Clustering in Mobile Ad Hoc Networks |
Abstract
PDF
|
Abolfazle Akbari |
|
Vol 2, No 3 (2011): September |
The Relationship between Reinforcement Learning and Hash Tables |
Abstract
PDF
|
MOHAMMAD MEHDI HASSANI |
|
Vol 2, No 3 (2011): September |
Theory of Fuzzy Soft Sets from a New Perspective |
Abstract
PDF
|
Tridiv Jyoti Neog |
|
Vol 5, No 1 (2014): March |
Trusted CCIPS: A Trust Security Model for Cloud Services Based on a Collaborative Intrusion Detection and Prevention Framework |
Abstract
PDF
|
Fahad F Alruwaili, T. Aaron Gulliver |
|
Vol 2, No 3 (2011): September |
Utilizing UHF RFID in Supply Chains: Examples from Similarities in Paper and Cell Phone Industries |
Abstract
PDF
|
Kari Määttänen, Jussi Nummela, Leena Ukkonen, Lauri Sydänheimo |
|
Vol 3, No 3 (2012): September |
Verification of Sediment Bed Load in Dez River(Case study: in Tale Zang Station) |
Abstract
PDF
|
Nader Parsazadeh, Mohammad Mahmoudian Shoushtari, Mehdi Ghomishi |
|
51 - 57 of 57 Items |
<< < 1 2 3 |