Found: 21
Select item for more details and to access through your institution.
ESSENTIAL VIDEO COMMUNICATION TECHNIQUES.
- Published in:
- Annals. Computer Science Series, 2016, v. 14, n. 2, p. 150
- By:
- Publication type:
- Article
SOME PROPERTIES ON THE DETERMINISTIC FINITE AUTOMATA.
- Published in:
- Annals. Computer Science Series, 2016, v. 14, n. 2, p. 146
- By:
- Publication type:
- Article
AN ALGORITHM FOR A RESIDUE NUMBER SYSTEM BASED VIDEO ENCRYPTION SYSTEM.
- Published in:
- Annals. Computer Science Series, 2016, v. 14, n. 2, p. 137
- By:
- Publication type:
- Article
HANDWRITTEN CHARACTER RECOGNITION USING BRAINNET LIBRARY.
- Published in:
- Annals. Computer Science Series, 2016, v. 14, n. 2, p. 129
- By:
- Publication type:
- Article
A STATISTICAL SURVEY UPON THE SIMILARITIES OF STUDENTS' EVALUATION OF THE EDUCATIONAL PROCESS.
- Published in:
- Annals. Computer Science Series, 2016, v. 14, n. 2, p. 123
- By:
- Publication type:
- Article
TOOLBOX SUPPORTS GROUP AWARENESS IN GROUPWARE.
- Published in:
- Annals. Computer Science Series, 2016, v. 14, n. 2, p. 117
- By:
- Publication type:
- Article
SOLVING THE NEXT RELEASE PROBLEM USING A HYBRID METAHEURISTIC.
- Published in:
- Annals. Computer Science Series, 2016, v. 14, n. 2, p. 101
- By:
- Publication type:
- Article
CONSTRUCTION OF PAIRWISE BALANCED DESIGNS USING LOTTO DESIGN WHEN Λ =1 AND WHEN, Λ =2.
- Published in:
- Annals. Computer Science Series, 2016, v. 14, n. 2, p. 97
- By:
- Publication type:
- Article
AN EMPIRICAL INVESTIGATION OF THE MODERATING EFFECTS OF WORK EXPERIENCE AND POSITION ON THE E-VOTING ADOPTION.
- Published in:
- Annals. Computer Science Series, 2016, v. 14, n. 2, p. 84
- By:
- Publication type:
- Article
CEASE: CONFIDENTIALITY AND ACCESS CONTROL FOR SECURING PERSONAL HEALTH RECORDS IN THE CLOUD.
- Published in:
- Annals. Computer Science Series, 2016, v. 14, n. 2, p. 37
- By:
- Publication type:
- Article
A DISTRIBUTED PASSWORD AUTHENTICATED KEY EXCHANGE PROTOCOL USING A HYBRID APPROACH.
- Published in:
- Annals. Computer Science Series, 2016, v. 14, n. 2, p. 76
- By:
- Publication type:
- Article
RISK AWARE HIERARCHICAL ATTRIBUTE SET-BASED ENCRYPTION (RA-HASBE) ACCESS CONTROL MODEL.
- Published in:
- Annals. Computer Science Series, 2016, v. 14, n. 2, p. 63
- By:
- Publication type:
- Article
RESULT PROCESSING SCHEME FOR UNIVERSITY OF IBADAN STATISTICS DEPARTMENT USING ANONYMOUS THRESHOLD SCHEME.
- Published in:
- Annals. Computer Science Series, 2016, v. 14, n. 2, p. 59
- By:
- Publication type:
- Article
A DATA ENCRYPTION STANDARD (DES) BASED WEB SERVICES SECURITY ARCHITECTURE.
- Published in:
- Annals. Computer Science Series, 2016, v. 14, n. 2, p. 53
- By:
- Publication type:
- Article
IMPROVED BAYESIAN FEATURE SELECTION AND CLASSIFICATION METHODS USING BOOTSTRAP PRIOR TECHNIQUES.
- Published in:
- Annals. Computer Science Series, 2016, v. 14, n. 2, p. 46
- By:
- Publication type:
- Article
DATA MINING OF NIGERIANS' SENTIMENTS ON THE ADMINISTRATION OF FEDERAL GOVERNMENT OF NIGERIA.
- Published in:
- Annals. Computer Science Series, 2016, v. 14, n. 2, p. 69
- By:
- Publication type:
- Article
CATEGORICAL DATABASE INFORMATION--THEORETIC APPROACH OF OUTLIER DETECTION MODEL.
- Published in:
- Annals. Computer Science Series, 2016, v. 14, n. 2, p. 29
- By:
- Publication type:
- Article
CRIME PREDICTIVE MODEL USING BIG DATA ANALYTICS.
- Published in:
- Annals. Computer Science Series, 2016, v. 14, n. 2, p. 25
- By:
- Publication type:
- Article
CROWCFIL: A FRAMEWORK FOR CONTENT FILTERING IN CROWDSOURCING ENVIRONMENT.
- Published in:
- 2016
- By:
- Publication type:
- Product Review
FRAMEWORK FOR DETECTION OF ABNORMALITIES IN BRAIN MAGNETIC RESONANCE IMAGES.
- Published in:
- Annals. Computer Science Series, 2016, v. 14, n. 2, p. 14
- By:
- Publication type:
- Article
Assess ICT Competences in Teaching of Teachers and Trainee Teachers at Highland North Vietnam.
- Published in:
- Annals. Computer Science Series, 2016, v. 14, n. 2, p. 9
- By:
- Publication type:
- Article