default search action
Journal of King Saud University - Computer and Information Sciences, Volume 25
Volume 25, Number 1, January 2013
- Hakim Fourar-Laidi:
A smart card based framework for securing e-business transactions in distributed systems. 1-5 - S. Venkatesan, M. S. Saleem Basha, Chenniappan Chellappan, Anurika Vaish, P. Dhavachelvan:
Analysis of accounting models for the detection of duplicate requests in web services. 7-24 - T. Senthil Kumaran, V. Sankaranarayanan:
Dynamic congestion detection and control routing in ad hoc networks. 25-34 - Hari T. S. Narayanan, Geetha Ilangovan, Sumitra Narayanan:
Feasibility of SNMP OID compression. 35-42 - Habiba Dahmani, Sid-Ahmed Selouani, Douglas D. O'Shaughnessy, Mohamed Chetouani, Noureddine Doghmane:
Assessment of dysarthric speech through rhythm metrics. 43-49 - SK Hafizul Islam, G. P. Biswas:
Provably secure certificateless strong designated verifier signature scheme based on elliptic curve bilinear pairings. 51-61 - Latifa Ben Arfa Rabai, Mouna Jouini, Anis Ben Aissa, Ali Mili:
A cybersecurity model in cloud computing environments. 63-75 - Aloysius George, D. Binu:
An approach to products placement in supermarkets using PrefixSpan algorithm. 77-87 - Nasser-Eddine Rikli, Saad Almogari:
Efficient priority schemes for the provision of end-to-end quality of service for multimedia traffic over MPLS VPN networks. 89-98 - Zohair Chentouf, Ahmed Khoumsi:
A high abstraction level approach for detecting feature interactions between telecommunication services. 99-115
Volume 25, Number 2, July 2013
- Bipul Goswami, Durbadal Mandal:
A genetic algorithm for the level control of nulls and side lobes in linear antenna arrays. 117-126 - Abdullah A. Aljumah, Mohammed Gulam Ahamad, Mohammad Khubeb Siddiqui:
Application of data mining: Diabetes health care in young and old patients. 127-136 - Nosaiba A. Sabto, Khalid Al Mutib:
Autonomous mobile robot localization based on RSSI measurements using an RFID sensor and neural network BPANN. 137-143 - Mohammed A. Awadallah, Ahamad Tajudin Khader, Mohammed Azmi Al-Betar, Asaju La'aro Bolaji:
Global best Harmony Search with a new pitch adjustment designed for Nurse Rostering. 145-162 - Amit Phadikar:
Multibit quantization index modulation: A high-rate robust data-hiding method. 163-171 - Supratim Mukherjee, Samarjit Kar:
A three phase supplier selection method based on fuzzy preference degree. 173-185 - A. Britton, Rossitza Setchi, A. Marsh:
Intuitive interaction with multifunctional mobile interfaces. 187-196 - Gamal Abdel Fadeel Mohamed Khalaf, Hesham Zarief Badr:
A comprehensive approach to vertical handoff in heterogeneous wireless networks. 197-205 - Fazal-e-Malik, Baharum Baharudin:
Analysis of distance metrics in content-based image retrieval using statistical quantized histogram texture features in the DCT domain. 207-218 - Ashok Kumar Das, Ashish Massand, Sagar Patil:
A novel proxy signature scheme based on user hierarchical access control policy. 219-228 - Walid Al-Ahmad, Abedallah Al-Oqaili:
Towards a unified model for successful implementation of outsourcing and reversibility of information systems. 229-240
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.