default search action
International Journal of Autonomic Computing, Volume 2
Volume 2, Number 1, 2014
- Takoua Abdellatif, Ahmed Adouani:
Mosaic: a secure and practical remote voting system. 1-20 - Sanjay Kumar Malik, S. A. M. Rizvi:
A group housing society ontology in Swoop 2.3 Beta 4 and Protege 3.4.4. 21-38 - Aruni Upeksha Alahakone, S. M. N. Arosha Senanayake:
Improving lower extremity joint kinematics during jump landing using an automated vibrotactile biofeedback system. 39-53 - Aaiman Gadafi, Daniel Hagimont, Laurent Broto, Rémi Sharrock, Alain Tchana, Noel De Palma:
Energy-QoS tradeoffs in J2EE hosting centres. 54-72 - Sanjay Kumar Malik, S. A. M. Rizvi:
Ontology design and development using ontology editors along with semantic search patterns towards intelligent retrieval of information on web: case studies. 73-98
Volume 2, Number 2, 2016
- Afreen Fatimah, Rahul Johari:
Delay tolerant network: routing issues and performance. 99-113 - Harley Boughton, Mingyi Zhang, Wendy Powley, Patrick Martin, Paul Bird, Randy Horman:
Using economic models to capture importance policy for tuning in autonomic database management systems. 114-136 - Randy Schauer, Anupam Joshi:
Distributed system configuration management using Markov logic networks. 137-154 - Zeineb Dhouioui, Jalel Akaichi:
A trust-based approach for security policies enhancement in dynamic social networks. 155-175 - Maamar Sedrati, Hafnaoui Taleb:
Evaluating QoS parameters for video streaming transmission in mobile ad hoc networks. 176-190
Volume 2, Number 3, 2017
- Aatif Ahmad Khan, Sanjay Kumar Malik:
A semi search algorithm towards semantic search using domain ontologies. 191-210 - Ahmed Jemal, Riadh Ben Halima, Hend Ktait, Mohamed Jmaiel:
A semantic-based representation and analysis of monitoring data for self-adaptive systems. 211-230 - Oumarou Mamadou Bello, Dina Taiwé Kolyang:
Mesh node placement in wireless mesh network based on multiobjective evolutionary metaheuristic. 231-254 - Anish Pandey, Shalini Pandey, Preeti Gupta:
Intelligent navigation and control of a mobile robot in static and dynamic environments using hybrid fuzzy architecture. 255-281 - Tianren Luo, Xueyong Li, Kun Ma, Xiaoying Luo:
Toward mobile smart data file protection box. 282-309
Volume 2, Number 4, 2017
- P. Hemalatha, J. Vijitha Ananthi, R. Kalaivani:
Analysis of reverse tracing algorithm for the detection of DOS attacks in MANET. 311-322 - Kapil Mangla, Anil Kumar:
Novel concept for reducing the power consumption of look ahead carry adder circuit by using stackiabatic technique. 323-340 - Vaishali Arjun Ingle, Sachin Deshmukh:
Predictive mining for stock market based on live news TF-IDF features. 341-365 - Rafiqul Zaman Khan, Mohammad Oqail Ahmad:
A survey on load balancing algorithms in cloud computing. 366-383 - Kshira Sagar Sahoo, Mayank Tiwary, Bibhudatta Sahoo:
A load prediction model for SDN controllers. 384-400
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.