default search action
International Journal of Information and Communication Technology, Volume 5
Volume 5, Number 1, 2013
- Anwar Mousa:
Interoperability mechanisms and criteria for LTE and mobile-WIMAX. 1-21 - Mohamed Aissani, Sofiane Bouznad, A. Fareb, M. A. Laidoui:
EA-SPEED: energy-aware real-time routing protocol for wireless sensor networks. 22-44 - Rajender Kumar, Brahmjit Singh:
Reduced VHO latency using EVM measurement and ad hoc cooperation for heterogeneous ubiquitous networks. 45-63 - Razvan-Daniel Albu, Florin Popentiu Vladicescu:
A prototype for web services reliability prediction. 64-74 - Govind P. Gupta, Manoj Misra, Kumkum Garg:
Energy efficient data gathering using prediction-based filtering in wireless sensor networks. 75-94
Volume 5, Number 2, 2013
- Manu Vardhan, Dharmender Singh Kushwaha:
TBFR: a threshold-based file replication approach for increased file availability and its formal verification. 97-121 - Kandarpa Kumar Sarma, Abhijit Mitra:
Stochastic MIMO channel modelling using FMLP-based inference engine. 122-136 - Peng Xiao, Dongbo Liu:
Configurable performance analysis and evaluation framework for cloud systems. 137-149 - Arockia Anand Raj, T. Mala:
Cloudpress 2.0: a new-age news retrieval system on the cloud. 150-166 - B. R. Purushothama, B. Shrinath, B. B. Amberker:
Secure cloud storage service and limited proxy re-encryption for enforcing access control in public cloud. 167-186 - Pradeep Kumar, Yogesh Singh:
A study on software reliability prediction models using soft computing techniques. 187-204 - Srimathi Chandrasekaran, Veeranjaneyulu Gangineni:
Performance analysis of replication mechanism using mobile agent in computational grid using WADE. 205-215
Volume 5, Numbers 3/4, 2013
- Qingke Zhang, Bo Yang, Lin Wang, Jianzhang Jiang:
An improved multi-expression programming algorithm applied in function discovery and data prediction. 218-233 - Deng-yin Zhang, Zhou-yang Wang:
The method of gaze tracking based on iris detection. 234-242 - Yi-Nan Guo, Jian Cheng, Meirong Chen, Dandan Liu:
Community-based multi-agent cooperative interactive evolutionary computation model. 243-256 - Xiang Jian:
3D motion retrieval based on double index and user interaction. 257-262 - Qigang Liu, Li Zhou, Xiangyang Sun:
A fast fuzzy c-means algorithm for colour image segmentation. 263-271 - Jun Shi, Hui Li, Lidong Zhou:
The technical security issues in cloud computing. 272-282 - Sarot Srang, Masaki Yamakita:
Adaptive friction compensation for a position control system with Stribeck friction using hybrid unscented Kalman filter. 283-295 - Jun Yang, Weiwei Shan, Junyin Liu, Huafang Sun:
Implementation of correlation power analysis attack on an FPGA DES design. 296-306 - Jianhua Han, Yuan Luo, Jianping Huang:
A study on the scalable flow model of web services choreography and orchestration based on dynamic workflow. 307-320 - Sheng Luo, Junjie Peng, Yuanyuan Chen, Rong Shen:
A low energy consumption wireless sensor network control system. 321-331 - Dengyin Zhang, Lei Cui:
Domain-epidemic spray and forward routing algorithm of opportunistic networks. 332-342 - Ruoqing Wang, Sufei Li, Ercan E. Kuruoglu:
A novel algorithm for image denoising based on unscented Kalman filtering. 343-353
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.