default search action
International Journal of Computing, Volume 4
Volume 4, Number 1, 2005
- Axel Sikora, Voicu F. Groza:
Coexistence of Standardized Wireless Systems in the 2.4 GHz-ISM-band. 5-11 - Volodymyr Turchenko, Viktor Demchuk:
Efficiency Analysis of Parallel Routine using Processor Time Visualization. 12-18 - Lubomyr B. Petryshyn:
Bases of Elementary Arithmetics in Galois's Fields. 19-26 - Mounir Bouhedda, Mokhtar Attari:
Synthesis and FPGA-Implementation based Neural Technique of a nonlinear ADC Model. 27-33 - Petro Stakhiv, Serhiy Rendzinyak:
A Parallel multirate Algorithm for the numerical Integration of System of nonlinear differential equations. 34-41 - Bakhtiyar Khudayarov:
Investigation of the nonlinear flutter of viscoelastic plates in a supersonic Flow. 42-45 - Konstantin Dimitrov:
Smart silicon Sensor - magnetic compass on the Base of a 3-d Hall Structure. 46-51 - Olena V. Mul, Delfim F. M. Torres:
Numerical method of vibrations Research in Large flexible Systems. 52-59 - Hiroyuki Ukida, Yoshio Tanimoto, Hideki Yamamoto:
Object tracking System by two Pan-tilt Moving Cameras and arm robot. 60-67 - Sergiy Golovashych:
The Perspective Technologies of identification and Authentication of Financial Transactions. 68-79 - Petru Cascaval, Doina Cascaval:
Fault Tolerant Memory System with Active Redundancy for Critical Applications. 80-86 - Oleksandra Belz:
Method of consideration a changeability of External Environment as an Alternative method of Socio-Economic Processes Modeling. 87-93 - Bakhtiyar Khudayarov:
Mathematical modelling of Problem on non-linear flutter of visco-elastic shells. 94-98 - Ivan Boiko, Sergiy Lupenko, Andriy Luckiv:
Open Source Software for the Development of Informational Systems: Comparative Analysus and Development Prospects in Ukraine. 99-106
Volume 4, Number 2, 2005
- Philip Attfield, Ming-Yuh Huang:
Real-World Access control Systematic Failures; Reality or Virtual Reality? 8-16 - Vlasti Broucek, Paul Turner:
Considerations for E-Forensics: Insights into Implications of uncoordinated Technical, organisational and Legal responses to Illegal or Inappropriate on-Line Behaviours. 17-25 - Dan Cvrcek, Václav Matyás Jr., Marek Kumpost:
On Privacy Classification in Ubiquitous Computing Systems. 26-35 - Nicolas Prigent, Christophe Bidan:
Securing Devices Communities in spontaneous Networks. 36-45 - Viktor Lokazyuk, Oksana Pomorova:
The Problems of Information Defence in Diagnosis Intelligent Systems of Microprocessor Devices. 46-53 - Anastasios Fragopoulos, Dimitrios N. Serpanos:
Sources of Randomness for Use in Random number Generation. 54-60 - Georgy Loutsky, Valerij Shyrotchin, Vadim Mukhin:
Integrated Systems of Information Security in Computer Networks. 61-68 - Andriy Horpenyuk:
Fast Algorithms and Computing means of cryptological Functions. 69-76 - Sankalp Singh, Adnan Agbaria, Fabrice Stevens, Tod Courtney, John F. Meyer, William H. Sanders, Partha P. Pal:
Validation of a survivable Publish-Subscribe System. 77-94 - Andrian Piskozub:
Modern Approaches of Securing Computer Networks from Denial of Service Attacks. 95-104 - Akio Shiibashi, Kinji Mori:
Autonomous Decentralized Data Consistency for High-Assurance Embedded System. 105-112 - Igor V. Kotenko, Alexander Ulanov:
Agent-based simulation of DDoS Attacks and Defense Mechanisms. 113-123 - Zdravko Karakehayov, Ivan Radev:
A Scalable Security Service for Geographic Ad-Hoc Routing. 124-132
Volume 4, Number 3, 2005
- Volodymyr Turchenko, Chefi Triki, Lucio Grandinetti, Anatoly Sachenko:
Efficiency estimation of Parallel Algorithm of Enhanced Historical Data Integration on Computational Grid. 9-19 - El Khier Bouyoucef, Abdennasser Chebira, Mariusz Rybnik, Kurosh Madani:
Multiple Neural Network Models Generator with Complexity estimation and Self-Organization Abilities. 20-29 - Pawel Falat, Lucyna Brzozowska, Krzysztof Brzozowski:
Application of Object Oriented Neural Network to control motion of the Load of a Sea crane. 30-36 - Vladimir A. Golovko, Pavel A. Kochurko:
Intrusion Recognition using Neural Networks. 37-42 - Rauf Kh. Sadykhov, Vladimir A. Samokhval:
Face identification Algorithm based on Mesh-derived Synthetic linear Descriptors. 43-48 - Vicente Díaz Casás, Richard J. Duro, Fernando López-Peña:
Evolutionary Design of wind turbine blades. 49-55 - Adolfo Lamas Rodríguez, Richard J. Duro:
Evolutionary Environment for 3D Morphological Design. 56-62 - Domenico Luca Carnì, Domenico Grimaldi, Francesco Lamonaca:
Alteration correction in Lymphocyte Image for micro Nucleuses Detection. 63-69 - Gábor Takács, Béla Pataki:
Fast Detection of Masses in Mammograms with Difficult Case Exclusion. 70-75 - Anthony C. Davies, Sergio A. Velastin:
Progress in Computational Intelligence to Support CCTV Surveillance Systems. 76-84 - Vladimir A. Oleshchuk:
Privacy Preserving Pattern Matching on sequences of Events. 85-90 - Pierre M. Fiorini, Robert W. Rowan:
Analytically Modeling unreliable Parallel Processing Systems with General Task Time distributions. 91-101 - Nikolaos Vassiliadis, A. Chormoviti, Nikolaos Kavvadias, Spiridon Nikolaidis:
The effect of Data-Reuse Transformations on Multimedia Applications for Application Specific Processors. 102-109 - Linda Markowsky:
A Comparison of Aggregation/Broadcast Methods and Multicomputer Architectures, and an Examination of the Communication Overhead on the IBM pSeries 655. 110-116 - Rainer Leisten, Pascal Reusch:
Mechanisms for Coordination of Master Planning and lot sizing within a Hierarchical production Planning Model. 117-123 - Miki Sirola, Golan Lampi, Jukka Parviainen:
Som based Decision Support in Failure Management. 124-130 - Peter J. A. Reusch, Bastian Stoll, Daniel Studnik, Joerg Swade:
Voicexml-Applications for E-Commerce and E-Learning. 131-137
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.