Войти
Регистрация
Научные статьи
Журналы
Издательства
Подписки
Войти
Регистрация
Научные статьи
\
Общие вопросы науки и культуры
\
Информационные технологии. Вычислительная техника. Обработка данных
Человеко-машинное взаимодействие. Человеко-машинный интерфейс. Пользовательский интерфейс. Операционная среда пользователя - 004.5
Научные статьи
В разделе "Человеко-машинное взаимодействие. Человеко-машинный интерфейс. Пользовательский интерфейс. Операционная среда пользователя"
Resource Allocation Strategy with Lease Policy and Dynamic Load Balancing
Pooja S. Kshirsagar,
Anita M. Pujar
Novel Framework for Automation Testing of Mobile Applications using Appium
Ashwaq A. Alotaibi,
Rizwan J. Qureshi
Two-Level Alloyed Branch Predictor based on Genetic Algorithm for Deep Pipelining Processors
Shivam Goyal,
Jaskirat Singh
Evaluation of Information Retrieval Based Ontology Development Editors for Semantic Web
N. Kaur,
H. Aggarwal
Interconnect network on chip topology in multi-core processors: a comparative study
Manju Khari,
Raghvendra Kumar,
Dac-Nhuong Le,
Jyotir Moy Chatterjee
Estimating the sample size for training intrusion detection systems
Yasmen Wahba,
Ehab ElSalamouny,
Ghada ElTaweel
An analytical study of cellular automata and its applications in cryptography
G. Kumaresan,
N.P. Gopalan
Application of geo-location-based access control in an enterprise environment
Victor L. Yisa,
Baba Meshach,
Oluwafemi Osho,
Anthony Sule
Effective use method of cloudlet resources by mobile users
Rashid G. Alakbarov,
Oqtay R. Alakbarov
Optimization of different queries using optimization algorithm (DE)
Sahil Saharan,
J.S. Lather,
R. Radhakrishnan
Chaotic Genetic-fuzzy encryption technique
Hamdy M. Mousa
Computer security and software watermarking based on return-oriented programming
Ashwag Alrehily,
Vijey Thayananthan
Ethical network surveillance using packet sniffing tools: a comparative study
Ibrahim Ali Ibrahim Diyeb,
Anwar Saif,
Nagi Ali Al-Shaibany
Simulation analysis of OLSR and its variant with cooperative MPR selection on NS-2.35 in mobile ad-hoc networks
Shelja Sharma,
Suresh Kumar
Implementing security features in MANET routing protocols
Abhishek Vyas,
Satheesh A.
MANETs: QoS and investigations on optimized link state routing protocol
Lakshman Naik.L,
R.U.Khan,
R.B.Mishra
A feed-forward and pattern recognition ANN model for network intrusion detection
Ahmed Iqbal,
Shabib Aftab
A novel scheme for isolation of distributed denial of service attack in VANETs
Palak Shandil,
Rakesh Kumar
A new classification based model for malicious PE files detection
Imad Abdessadki,
Saiida Lazaar
An approach to develop a transactional calculus for semi-structured database system
Rita Ganguly,
Anirban Sarkar
An efficiency optimization for network intrusion detection system
Mahmoud M. Sakr,
Medhat A. Tawfeeq,
Ashraf B. El-Sisi
Quine-McCluskey: a novel concept for mining the frequency patterns from web data
Bina Bhandari,
R. H. Goudar,
Kaushal Kumar
An enhanced approach for quantitative prediction of personality in Facebook posts
Azhar Imran,
Muhammad Faiyaz,
Faheem Akhtar
An efficient approach for Web mining using semantic Web
Md. Motiur Rahman,
Ferdusee Akter
design and development of Real-Time E-Voting system with high security features
Amit Mishra,
Abdullahi Ofujeh Ahmad
Design and implementation of control Unit-ALU of 32 bit asynchronous microprocessor based on FPGA
Archana Rani,
Naresh Grover
Efficient 2D convolution filters implementations on graphics processing unit using NVIDIA CUDA
Mouna Afif,
Yahia Said,
Mohamed Atri
Types of navigation from websites and analyzing their characteristics
Goran Bidjovski
A comparative investigation into edge detection techniques based on computational intelligence
Naveen Singh Dagar,
Pawan Kumar Dahiya
Design of an arbiter for two systems accessing a single DDR3 memory on a reconfigurable platform
Arun S. Tigadi,
Hansraj Guhilot
Parallel bat algorithm using mapreduce model
Kapil Sharma,
Sanchi Girotra
Time effective workflow scheduling using genetic algorithm in cloud computing
Rohit Nagar,
Deepak K. Gupta,
Raj M. Singh
Designing a rule based expert systems for contact lenses patients
İbrahim Berkan Aydilek,
Abdülkadir Gümüşçü
E-learning to m-learning: framework for data protection and security in cloud infrastructure
Olugbenga W. Adejo,
Isaiah Ewuzie,
Abel Usoro,
Thomas Connolly
Story scrambler - automatic text generation using word level RNN-LSTM
Dipti Pawade,
Avani Sakhapara,
Mansi Jain,
Neha Jain,
Krushi Gada
Consistency of UML design
Iryna Zaretska,
Oleksandra Kulankhina,
Hlib Mykhailenko,
Tamara Butenko
ScrumFall: a hybrid software process model
Shamsur Rahim,
AZM Ehtesham Chowdhury,
Dip Nandi,
Mashiour Rahman,
Shahadatul Hakim
Prediction and monitoring agents using weblogs for improved disaster recovery in cloud
Rushba Javed,
Sidra Anwar,
Khadija Bibi,
M. Usman Ashraf,
Samia Siddique
Subset matching based selection and ranking (SMSR) of web services
Abdur Rahman,
Belal Hossain,
Sharifur Rahman,
Saeed Siddik
Evaluating and comparing size, complexity and coupling metrics as web applications vulnerabilities predictors
Mohammed Zagane,
Mustapha Kamel Abdi
← Предыдущая
Следующая страница →
1
|
...
|
7
|
8
|
9
|
10
|
11
|
12
|
13
|
...
|
В конец
Нет соединения с интернетом.
Проверьте соединение и повторите попытку.