Found: 20
Select item for more details and to access through your institution.
Multi-Agent Architecture for Business Modeling of Web Services Composition Based on WS2JADE Framework.
- Published in:
- International Review on Computers & Software, 2014, v. 9, n. 10, p. 1167, doi. 10.15866/irecos.v9i10.3491
- By:
- Publication type:
- Article
An Enriched Audio Steganography for Secret Message Communication Using Novel Embedding Technique.
- Published in:
- International Review on Computers & Software, 2014, v. 9, n. 10, p. 1645
- By:
- Publication type:
- Article
Increasing Energy Efficiency of Mobile Nodes Using Distributed Energy-Adaptive Location Based Cooperative-Medium Access Control Protocol (DEL-CMAC) in Large Scale MANETs.
- Published in:
- International Review on Computers & Software, 2014, v. 9, n. 10, p. 1651
- By:
- Publication type:
- Article
Algorithm to Find the Closest Concept in a Knowledge Model to a Query: Solving the Matching Problem.
- Published in:
- International Review on Computers & Software, 2014, v. 9, n. 10, p. 1659, doi. 10.15866/irecos.v9i10.4282
- By:
- Publication type:
- Article
Wavelet Based Adaptive Filtering Algorithms for Acoustic Noise Cancellation.
- Published in:
- International Review on Computers & Software, 2014, v. 9, n. 10, p. 1675
- By:
- Publication type:
- Article
Design and Develop Misconfiguration Vulnerabilities Scanner for Web Applications.
- Published in:
- International Review on Computers & Software, 2014, v. 9, n. 10, p. 1682, doi. 10.15866/irecos.v9i10.3840
- By:
- Publication type:
- Article
Subspace Clustering of Text Documents Using Collection and Document Frequencies of Terms.
- Published in:
- International Review on Computers & Software, 2014, v. 9, n. 10, p. 1692, doi. 10.15866/irecos.v9i10.3894
- By:
- Publication type:
- Article
Multi Key Word Search and Trusted Auditing System to Verify the Integrity of Outsourced Data in Cloud Computing.
- Published in:
- International Review on Computers & Software, 2014, v. 9, n. 10, p. 1700, doi. 10.15866/irecos.v9i10.3710
- By:
- Publication type:
- Article
Green Cognitive Radio Networks by Using Coalitional Game Approach in Partition Form.
- Published in:
- International Review on Computers & Software, 2014, v. 9, n. 10, p. 1705, doi. 10.15866/irecos.v9i10.3765
- By:
- Publication type:
- Article
Flow-Based Admission Control and QoS Maintenance for Real Time Traffic Over MANETs.
- Published in:
- International Review on Computers & Software, 2014, v. 9, n. 10, p. 1712, doi. 10.15866/irecos.v9i10.3929
- By:
- Publication type:
- Article
Lightweight Message Authentication Protocol for Mobile Multihop Relay Networks.
- Published in:
- International Review on Computers & Software, 2014, v. 9, n. 10, p. 1720, doi. 10.15866/irecos.v9i10.4149
- By:
- Publication type:
- Article
A Novel Fuzzy Clustering Algorithm Based on K-Means Algorithm.
- Published in:
- International Review on Computers & Software, 2014, v. 9, n. 10, p. 1731, doi. 10.15866/irecos.v9i10.1639
- By:
- Publication type:
- Article
An Analysis of the Parameter Modifications in Varieties of Harmony Search Algorithm.
- Published in:
- International Review on Computers & Software, 2014, v. 9, n. 10, p. 1736, doi. 10.15866/irecos.v9i10.3025
- By:
- Publication type:
- Article
A Robust Image Watermarking Scheme Using Steerable Pyramid Transform.
- Published in:
- International Review on Computers & Software, 2014, v. 9, n. 10, p. 1750, doi. 10.15866/irecos.v9i10.2238
- By:
- Publication type:
- Article
Car License Plate Localization Using Hole Filling and Support Vector Machine Approach.
- Published in:
- International Review on Computers & Software, 2014, v. 9, n. 10, p. 1760, doi. 10.15866/irecos.v9i10.4027
- By:
- Publication type:
- Article
Towards Decreasing the Associated Risks with Payment Settlement Systems.
- Published in:
- International Review on Computers & Software, 2014, v. 9, n. 10, p. 1767, doi. 10.15866/irecos.v9i10.4105
- By:
- Publication type:
- Article
A Practical Rule Based Technique by Splitting SMS Phishing from SMS Spam for Better Accuracy in Mobile Device.
- Published in:
- International Review on Computers & Software, 2014, v. 9, n. 10, p. 1776, doi. 10.15866/irecos.v9i10.3909
- By:
- Publication type:
- Article
Time Series Prediction Techniques for Estimating Remaining Useful Lifetime of Cutting Tool Failure.
- Published in:
- International Review on Computers & Software, 2014, v. 9, n. 10, p. 1783, doi. 10.15866/irecos.v9i10.3004
- By:
- Publication type:
- Article
A Secured and Time Efficient Electronic Business Framework Based on Public Key Cryptography.
- Published in:
- International Review on Computers & Software, 2014, v. 9, n. 10, p. 1791, doi. 10.15866/irecos.v9i10.3781
- By:
- Publication type:
- Article
Systems of Systems Paradigm in a Hospital Environment: Benefits for Requirements Elicitation Process.
- Published in:
- International Review on Computers & Software, 2014, v. 9, n. 10, p. 1798, doi. 10.15866/irecos.v9i10.3843
- By:
- Publication type:
- Article