Browse Title Index

Issue Title
Vol 4, No 1 (2015) Altmetric gender bias? – An exploratory study Abstract   PDF
Judit Bar-Ilan, Inge van der Weiden
Vol 3, No 3 (2015) An Improved call admission control (CAC) scheme in IEEE 802.16e Networks Abstract   PDF
Ibrahim Saidu
Vol 4, No 1 (2015) Application of Requirement Engineering and Agent Oriented Software Engineering Modelling techniques for Mobile Device Technologies Integration in Learning Establishments Abstract   PDF
Motunrayo O Remy Olasoji
Vol 4, No 1 (2015) Complex Adaptive Responses of Organizational Teams - From Situational Software Engineering to the Enterprise Amoeba Abstract   PDF
Albertus Barry Myburgh
Vol 3, No 1 (2015) Creating maps defining the level of acidification by fuzzy analysis Abstract   PDF
Michal Grec, Matej Horacek, Vilem Novak
Vol 3, No 1 (2015) Developing a Marketplace for Smart Cities Foundational Services with Policy and Trust Abstract   PDF
William H. Money, Stephen Cohen
Vol 2, No 1 (2014) Distributed and Typed Role-based Access Control Mechanisms Driven by CRUD Expressions Abstract   PDF
Diogo Domingues Regateiro, Rui Luís Aguiar, Óscar Mortágua Pereira
Vol 3, No 1 (2015) Enhanced ESPRIT Algorithm for Optimal Wind Turbine Fault recognizing Abstract   PDF
Saad Chakkor, Mostafa Baghouri, Abderrahmane Hajraoui
Vol 1, No 1 (2014) Fire-LEACH: A Novel Clustering Protocol for Wireless Sensor Networks based on Firefly Algorithm Abstract   PDF
Sandeep Kumar E, Kusuma S.M., Vijaya Kumar B.P.
Vol 3, No 1 (2015) Inference Control on Information Flow in Logic Programming Abstract   PDF
Antoun Yaacoub, Ali Awada
Vol 3, No 2 (2015) Information Extraction for Ontology Population Tasks. An Application to the Italian Archaeological Domain Abstract   PDF
Maria Pia di Buono
Vol 3, No 3 (2015) Measuring Limits on the Ability of Colluding Countries to Partition the Internet Abstract   PDF
Peter Mell, Richard Harang, Assane Gueye
Vol 3, No 2 (2015) On Architecture and Desgin of Event-Based Continuous Integration Server Abstract   PDF
Ondrej Kupka, Filip Zavoral
Vol 1, No 1 (2014) Proposing a formal method for workflow modelling:Temporal Logic of Actions (TLA) Abstract   PDF
Jose L. Caro
Vol 1, No 2 (2014) Random Keying technique for Security in Wireless Sensor Networks based on Memetics Abstract   PDF
Suman S.B., Ranjith Kumar P.V., Sandeep Kumar E
Vol 1, No 2 (2014) The Logical Implication Table in Binary Propositional Calculus: Justification, Proof Automatability, and Effect on Scientific Reasoning Abstract   PDF
Ahmed Shawky Moussa
Vol 2, No 2 (2014) Towards a Personalized E-Government Platform Abstract   PDF
I. Zaoui
Vol 2, No 2 (2014) Towards the Verification and Validation of Software Security Properties Using Static Code Analysis Abstract   PDF
Zeineb Zhioua, Stuart Short, Yves Roudier
Vol 3, No 3 (2015) Using Neural Networks and Feature Selection Algorithm to Perform Early Diagnosis of Alzheimer and Mild Cognitive Impairment Disease Abstract   PDF
Lara Dantas Coutinho, Mêuser Valença
Vol 2, No 2 (2014) Using Stream Computing Techniques to Process Big Quantities of Textual Information Abstract   PDF
Xabier Artola, Zuhaitz Beloki, Aitor Soroa
1 - 20 of 20 Items

ISSN: 2336-0984