default search action
Computer and Information Science, Volume 10
Volume 10, Number 1, 2017
- Nasr Y. Gharaibeh:
A Novel Approach for Detection of Microaneurysms in Diabetic Retinopathy Disease from Retinal Fundus Images. 1-15 - Shuaiqi Liu, Yu Zhang, Qi Hu, Ming Liu, Jie Zhao:
SAR Image De-Noising based on GNL-Means with Optimized Pixel-Wise Weighting in Non-Subsample Shearlet Domain. 16-22 - Kenmogne Edith Belise:
The Impact of the Pattern-Growth Ordering on the Performances of Pattern Growth-Based Sequential Pattern Mining Algorithms. 23-33 - Rodrigo da Rosa Righi, Vinicius Facco Rodrigues, Cristiano André da Costa, Roberto de Quadros Gomes:
Exploiting Data-Parallelism on Multicore and SMT Systems for Implementing the Fractal Image Compressing Problem. 34-47 - Mohamed S. Farag, M. M. Mohie-Eldin, H. A. El Shenbary:
Smart Parking Guidance Using Optimal Cost Function. 48-53 - Natarajan Meghanathan:
Complex Network Analysis of the Contiguous United States Graph. 54-76 - Adnan Imeri, Abdelaziz Khadraoui, Thang Le Dinh, Djamel Khadraoui:
Personalization of Legal and Ethical Information in ICT Platforms: The Approach of Legal Decision Tree. 77-88
Volume 10, Number 2, 2017
- Maxime Ambard:
Software Design for Low-Latency Visuo-Auditory Sensory Substitution on Mobile Devices. 1-14 - Hussain Mohammad Abu-Dalbouh, Maryah Al-Buhairy, Izdehar Al-Motiry:
Applied the Technology Acceptance Model in Designing a Questionnaire for Mobile Reminder System. 15-24 - Guohua Zhang, Xiang Li, Yang Yang, Minghuang Chen:
Study on Loading-Machine Production Scheduling Algorithm of Forest-Pulp-Paper Enterprise. 25-29 - Zhuhui He, Rui Kong, Bing Zhang, Cong Xiao, Zhanhong Gong, Yijian Liu:
Research on Traffic Flow Statistics Algorithm Based on Inter - Frame Similarity. 30-38 - Mohamad Malli, Nadine Said, Ahmad Fadlallah:
A New Model for Rating Users' Profiles in Online Social Networks. 39-51 - Natarajan Meghanathan:
A Binary Search Algorithm for Correlation Study of Decay Centrality vs. Degree Centrality and Closeness Centrality. 52-75 - Areej Malibari, Amina Gamlo:
Agent-Based Adaptive Cooling Optimising Systems for Homes in KSA. 76-86 - Faten Karim, Giselle Rampersad:
Cloud Computing in Education in Developing Countries. 87-96 - Mikus Vanags, Rudite Cevere:
Type Safe Metadata Combining. 97-103 - Cheng Ji:
On The Improvement of Combinatorial Mathematics Teaching From Generating Function. 104-108 - Faten Karim, Giselle Rampersad:
Factors Affecting the Adoption of Cloud Computing in Saudi Arabian Universities. 109-123
Volume 10, Number 3, 2017
- Mohannad Najjar:
Using Improved d-HMAC for Password Storage. 1-9 - Kyota Okubo, Kazumasa Oida:
A Successful Advertising Strategy over Twitter. 10-22 - Naser Attar, Hossein Deldari, Marzie Kalantari:
AES Encryption Algorithm Parallelization in Order to Use Big Data Cloud Naser Attar, Hossein Deldari, Marzie Kalantari. 23-28 - Justice Opara-Martins, Reza Sahandi, Feng Tian:
A Holistic Decision Framework to Avoid Vendor Lock-in for Cloud SaaS Migration. 29-53 - Lijuan Liu, Changliang Zhai:
Research and Application of Data Mining in College Students' Employment Based on Association Rules. 54-59 - Lunshan Gao:
The Application of Possibility Distribution for Solving Standard Quadratic Optimization Problems. 60-78 - Chris Lee:
Reviewer Acknowledgements for Computer and Information Science, Vol. 10 No. 3. 79
Volume 10, Number 4, 2017
- Esraa Omran, David Nelson, Ali M. Roumani:
A Comparative Study to the Semantics of Ontology Chain-Based Data Access Control versus Conventional Methods in Healthcare Applications. 1-15 - Haifeng Jiang, Chang Wan:
Realization of Dynamic Interface and High Performance Data Retrieval. 16-21 - Florian Stahl, Fabian Schomm, Lara Vomfell, Gottfried Vossen:
Marketplaces for Digital Data: Quo Vadis? 22-37 - Munira Al-Ageili, Malek Mouhoub, Joseph M. Piwowar:
Remote Sensing, Gis and Cellular Automata for Urban Growth Simulation. 38-49 - Bikash Chandra Singh, Mohammad Muntasir Rahman, Md. Sipon Miah, Mrinal Kanti Baowaly:
Community Detection Using Node Attributes and Structural Patterns in Online Social Networks. 50-59 - Licai Zhu:
A Linguistic Steganalysis Approach Base on Source Features of Text and Immune Mechanism. 60-66 - Zhi wu, Chu Yi Song, De Xi Bao:
An Approximation Method of Bézier Curve. 67-72 - Licai Zhu:
A Method of Semantic Hidden Reduction Based on Collocation. 73-80 - Chris Lee:
Reviewer Acknowledgements for Computer and Information Science, Vol. 10 No. 4. 81
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.