default search action
Journal of Computing and Information Technology, Volume 27
Volume 27, Number 1, 2019
Agent and Multiagent Systems Design
- C. I. T. Editorial Office:
Guest Editorial. i-iii - Mohammed El Habib Souidi, Abderrahim Siam, Zhaoyi Pei, Songhao Piao:
Multi-Agent Pursuit-Evasion Game Based on Organizational Architecture. 1-11 - Salma Noorunnisa, Dennis Jarvis, Jacqueline Jarvis, Marcus Watson:
Application of the GORITE BDI Framework to Human-Autonomy Teaming: A Case Study. 13-24 - Costin Badica, Milan Vidakovic, Sorin Ilie, Mirjana Ivanovic, Jovana Vidakovic:
Role of Agent Middleware in Teaching Distributed Systems and Agent Technologies. 25-42 - Matteo Cristani, Francesco Olivieri, Claudio Tomazzoli, Luca Viganò, Margherita Zorzi:
Diagnostics as a Reasoning Process: From Logic Structure to Software Design. 43-57 - Robert Bucki, Petr Suchánek:
The Cost-Based Lean Approach to the Information Logistics Business System Modelling. 59-75 - Impressum.
Volume 27, Number 2, 2019
- C. I. T. Editorial Office:
Editorial for Vol.27, No.2. i-ii - Soufiane Zahid, Abdeslam En-Nouaary, Slimane Bah:
Practical Model Checking of a Home Area Network System: Case Study. 1-16 - Zhongping Chen:
Load Balancing Dynamic Source Routing Protocol Based on Multi-Path Routing. 17-27 - Saidat Adebukola Onashoga, Adio Taofiki Akinwale, Opeyemi L. Amusa, Gboyega Adebayo:
CK-RAID: Collaborative Knowledge Repository for Intrusion Detection System. 29-39 - Jian Feng, Lianyang Zou, Tianzhu Nan:
A Phishing Webpage Detection Method Based on Stacked Autoencoder and Correlation Coefficients. 41-54 - Tausif Diwan, Jitendra V. Tembhurne:
A Parallelization of Non-Serial Polyadic Dynamic Programming on GPU. 55-66 - Impressum.
Volume 27, Number 3, 2019
- C. I. T. Editorial Office:
Editorial for Vol.27, No.3. i-ii - Mehmet Hakan Karaata:
An Algorithm for Finding Two Node-Disjoint Paths in Arbitrary Graphs. 1-14 - Ruizhe Ma, Liangli Zuo, Li Yan:
A Shapelet Transform Classification over Uncertain Time Series. 15-28 - Sihem Oujdi, Hafida Belbachir, Faouzi Boufarès:
C4.5 Decision Tree Algorithm for Spatial Data, Alternatives and Performances. 29-43 - Wadie Berrahal, Rabia Marghoubi, Zineb El Akkaoui:
Towards the Control and Prevention of Waste in IT Service Operation Using Fuzzy Logic: Focus in Incident Management Process. 45-56 - Peng Li, Bo Sun, Maozu Guo:
Identification of Novel Cancer-Related Genes with a Prognostic Role Using Gene Expression and Protein-Protein Interaction Network Data. 57-71 - Impressum.
Volume 27, Number 4, 2019
- C. I. T. Editorial Office:
Editorial for Vol.27, No.4. i-ii - Meenal Jain, Gagandeep Kaur:
A Study of Feature Reduction Techniques and Classification for Network Anomaly Detection. 1-16 - Li Yan, Zheqing Zhang, Dan Yang:
Temporal RDF(S) Data Storage and Query with HBase. 17-30 - Vancuong Do, Hongxiang Ren:
Using Poisson Disk Sampling to Render Oil Particles at Sea. 31-46 - Adebukola Onashoga, Adesina S. Sodiya, Idowu Ademola Osinuga:
Privacy Preserving Location-Based Client-Server Service Using Standard Cryptosystem. 47-63
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.