Browse Title Index

Issue Title
Vol 46, No 7 (2022): Online-only issue Risk prediction of enterprise credit financing using machine learning Abstract   PDF
Jingjing Gu
Vol 45, No 1 (2021) Risks Analyzing and management in Software Project Management Using Fuzzy Cognitive Maps with Reinforcement Learning Abstract   PDF
Ahmed Tlili, Salim Chikhi
Vol 41, No 4 (2017) Robust Computer Algebra, Theorem Proving, and Oracle AI Abstract   PDF
Gopal P. Sarma, Nick J. Hay
Vol 33, No 2 (2009) Robust H1 Control of a Doubly Fed Asynchronous Machine Abstract   PDF
G. Sofiane, Y. Said, S. Moussa
Vol 46, No 9 (2022): Online-only issue Robust Method for Embedding an Image inside Cover Image based on Least Significant Bit Steganography Abstract   PDF
Sahera A. Sead Almola, Najat Hameed Qasim, Hamid Ali Abed Alasadi
Vol 32, No 3 (2008) Robust Speech Recognition Using Perceptual Wavelet Denoising and Mel-frequency Product Spectrum Cepstral Coefficient Features Abstract   PDF
M.C.A. Korba, D. Messadeg, R. Djemili, H. Bourouba
Vol 33, No 3 (2009) Robustness and Visualization of Decision Models Abstract   PDF
A. Bregar, J. Györkös, M.B. Juric
Vol 40, No 3 (2016) Rough-Mereology Framework for Making Medical Treatment Decisions Based on Granular Computing Abstract   PDF
Mohammed M. Eissa, Mohammed Mahfouz Elmogy, Mohamed Hashem
Vol 45, No 2 (2021) Routing Algorithm in Networks on the Globe Abstract   PDF
Sujit Kumar Bose
Vol 33, No 2 (2009) Routing Scalability in Multicore-Based Ad Hoc Networks Abstract   PDF
A. Marowka
Vol 33, No 3 (2009) Run-time Manipulation of Programs in a Statically-Typed Language Abstract   PDF
S. Greiner
Vol 46, No 9 (2022): Online-only issue SADetection: Security Mechanisms to Detect SLAAC Attack in IPv6 Link-Local Network Abstract   PDF
Mahmood A. Al-Shareeda, Selvakumar Manickam, Murtaja Ali Saare, Nazrool Bin Omar
Vol 37, No 3 (2013) Searching for Credible Relations in Machine Learning Abstract   PDF
V. Vidulin
Vol 47, No 6 (2023): Online-only issue Secure and Low-Complexity Medical Image Exchange Based on Compressive Sensing and LSB Audio Steganography Abstract   PDF
Wafaa Al-Chaab, Zaid Ameen Abduljabbar, Enas Wahab Abood, Vincent Omollo Nyangaresi, Hussein M. Mohammed, Junchao Ma
Vol 33, No 4 (2009) Secure Convertible Authenticated Encryption Scheme Based on RSA Abstract   PDF
T.-S. Wu, H.-Y. Lin
Vol 36, No 1 (2012) Secure Key Exchange Scheme for IPTV Broadcasting Abstract   PDF
R.S. Pippal, S. Tapaswi, C.D. Jaidhar
Vol 33, No 1 (2009) Secure, Portable, and Customizable Video Lectures for E-learning on the Move  Abstract   PDF
M. Furini
Vol 46, No 8 (2022): Online-only issue Secure Routing Protocol for WSNs Using Bacterial Foraging Optimization and Improved RC4 Abstract   PDF
Imad Alshawi, Hasan Al-badrei
Vol 40, No 1 (2016) Secured Storage for Dynamic Data in Cloud Abstract   PDF
Veeralakshmi Ponnuramu, Latha Tamilselvan
Vol 30, No 1 (2006) Self-Organisation and Emergence in MAS: An Overview Abstract   PDF
G. Di M. Serugendo, M.-P. G. Irit, A. Karageorgos
Vol 30, No 1 (2006) Self-Organising Mechanisms from Social and Business/Economics Approaches Abstract   PDF
S. Hassas, G. Di Marzo-Serugendo, A. Karageorgos, C. Castelfranchi
Vol 42, No 1 (2018) Semantic Annotation of Documents Based on Wikipedia Concepts Abstract   PDF
Janez Brank, Gregor Leban, Marko Grobelnik
Vol 38, No 4 (2014) Semantic Annotations for Workflow Interoperability Abstract   PDF
Hamri Salah, Boudjlida Nacer, Boufaida Mahmoud
Vol 33, No 3 (2009) Semantic Graphs Derived From Triplets pplicwith Aation in Document Summarization Abstract   PDF
D. Rusu, B. Fortuna, M. Grobelnik, D. Mladenić
Vol 32, No 1 (2008) Semantic Grid Platform in Support of Engineering Virtual Organisations Abstract   PDF
M. Dolenc, R. Klinc, Ž. Turk, P. Katranuschkov, K. Kurowski
1001 - 1025 of 1191 Items << < 36 37 38 39 40 41 42 43 44 45 > >>