


default search action
Journal of Computing and Information Technology, Volume 24
Volume 24, Number 1, 2016
- Vlado Glavinic:

Editorial. i-ii - Decheng Miao, Jianqing Xi, Yubin Guo, Deyou Tang:

Inductive Data Types Based on Fibrations Theory in Programming. 1-16 - Darko Skorin-Kapov:

The Monotonic Cost Allocation Rule in Steiner Tree Network Games. 17-29 - Rohit Singh, Himadri Nath Saha, Debika Bhattacharyya, Pranab Kumar Banerjee:

Administrator and Fidelity Based Secure Routing (AFSR) Protocol in MANET. 31-43 - Tudor B. Ionescu, Walter Scheuermann:

Improving the Reliability of Decision-Support Systems for Nuclear Emergency Management by Leveraging Software Design Diversity. 45-63 - J. Jabez Christopher, Harichandran Khanna Nehemiah, Arputharaj Kannan:

Knowledge-based Systems and Interestingness Measures: Analysis with Clinical Datasets. 65-78 - Kateryna Novokhatska, Oleksii Kungurtsev:

Application of Clustering Algorithm CLOPE to the Query Grouping Problem in the Field of Materialized View Maintenance. 79-89 - Fatima Zahra Nejme, Siham Boulaknadel, Driss Aboutajdine:

AmAMorph: Finite State Morphological Analyzer for Amazighe. 91-110
Volume 24, Number 2, 2016
- Vlado Glavinic:

Editorial for Vol 24, No 2. i-ii - Yaolian Song, Yuhao Li, Shujuan Wang, Ya Zhang:

Research on Outage Performance Optimization of Cognitive Relay Network with Cooperative Sensing. 111-119 - Victor Ceronmani Sharmila, George Amalanathan:

Construction of Pipelined Strategic Connected Dominating Set for Mobile Ad Hoc Networks. 121-132 - Sumaiya Thaseen Ikram, Aswani Kumar Cherukuri:

Improving Accuracy of Intrusion Detection Model Using PCA and optimized SVM. 133-148 - Aissam Belghiat, Elhillali Kerkouche, Allaoua Chaoui, Mokhtar Beldjehem:

Mobile Agent-Based Software Systems Modeling Approaches: A Comparative Study. 149-163 - Youcef Gheraibia, Abdelouahab Moussaoui, Youcef Djenouri, Sohag Kabir, Peng-Yeng Yin:

Penguins Search Optimisation Algorithm for Association Rules Mining. 165-179 - Sudha Mohankumar, Valarmathi Balasubramanian:

Identifying Effective Features and Classifiers for Short Term Rainfall Forecast Using Rough Sets Maximum Frequency Weighted Feature Reduction Technique. 181-194 - Anass Rachdi, Abdeslam En-Nouaary, Mohamed Dahchour:

Liveness and Reachability Analysis of BPMN Process Models. 195-207
Volume 24, Number 3, 2016
- Vlado Glavinic:

Editorial for Vol 24, No 3. i-ii - Kokilamani Mounagurusamy, Karthikeyan Eswaramurthy

:
A Novel Load Balancing Scheme for Multipath Routing Protocol in MANET. 209-220 - Prakash Srivastava

, Rakesh Kumar:
A New QoS-Aware Routing Protocol for MANET Using Artificial Neural Network. 221-235 - Rutuja Shah, Sumathy Subramaniam, Dhinesh Babu Lekala Dasarathan:

Mitigating Malicious Attacks Using Trust Based Secure-BEFORE Routing Strategy in Mobile Ad Hoc Networks. 237-252 - Pawan Kumar

, Ratneshwer Gupta:
Dependency Modeling of a SOA Based System Through Colored Petri Nets. 253-269 - Yin Li, Zhi-An Sun, Jian-Yong Fang:

Generating an Automated Test Suite by Variable Strength Combinatorial Testing for Web Services. 271-282 - Rajganesh Nagarajan

, Ramkumar Thirunavukarasu
:
A Review on Broker Based Cloud Service Model. 283-292 - Ting Li:

An Object-Oriented Approach of Keyword Querying over Fuzzy XML. 293-309
Volume 24, Number 4, 2016
- Vlado Glavinic:

Editorial for Vol.24, No.4. i-ii - Younes Guellouma

, Hadda Cherroun:
Efficient Implementation for Deterministic Finite Tree Automata Minimization. 311-322 - Haitao Cheng, Fu Zhang:

Modeling Topological Relationships between Fuzzy Spatio-Temporal Objects. 323-348 - Cheah Wai Shiang, Bong Tien Onn, Fu Swee Tee, Muhammad Asyraf bin Khairuddin, Msury Mahunnah:

Developing Agent-Oriented Video Surveillance System through Agent-Oriented Methodology (AOM). 349-368 - Seyyid Ahmed Medjahed

, Tamazouzt Ait Saadi, Abdelkader Benyettou
, Mohammed Ouali:
Microcanonical Annealing and Threshold Accepting for Parameter Determination and Feature Selection of Support Vector Machines. 369-382 - Bouchra Boulkroun, Fouzia Benchikha, Chahinez Bachtarzi:

Integrating Ontological Data Sources Using Viewpoints-Based Approach. 383-400

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.


Google
Google Scholar
Semantic Scholar
Internet Archive Scholar
CiteSeerX
ORCID














