Volume 2, Number 1, 2010
Volume 2, Number 2, 2010
- Melek Oktay, Haci Ali Mantar:
WEDF - Distance Aware Scheduler for Real-Time Applications in Wimax.
- Haishan Wang, Cheng Ma, Huibo Jia:
Data Transmission System Design on 8b10b.
- K. Kannan, S. Arumugaperumal:
Performance of Feature level fusion of Multi-focused images using Stationary Wavelet Packet Transform.
- Lihua Yin, Binxing Fang, Yunchuan Guo, Hui He:
Formalization and Quantitative Analysis of Controllability on Internet Information Security.
- Zheng Tan, Hanhu Wang, Mei Chen, Xiaoping Zhang:
Improving the Accuracy and Efficiency of CBA Algorithm.
- Pinaki Mitra, Kamal Baid:
Generation of Targeted Advertisements for Online Social Networks.
- Veli Hakkoymaz, Ismail Alan:
Design of an Adaptive Security Manager for Distributed Systems.
Volume 2, Number 3, 2010
Volume 2, Number 4, 2010
Last update Wed May 22 17:48:03 2013
CET by the DBLP Team — Data released under the ODC-BY 1.0 license — See also our legal information page