- 2012
- Thuneibat S. A., Ababneh M. S.:
Sigma-Delta Modulator Simulation and Analysis Using MatLab. Comput. Inf. Sci. 5(5): 76-80 (2012) - Hawrra Hassan Abass, Firas Mahdi Muhsin Al-Salbi:
Rotation and Scaling Image Using PCA. Comput. Inf. Sci. 5(1): 97-106 (2012) - Abbass S. Abbass, Aliaa A. A. Youssif, Atef Z. Ghalwash:
Hybrid-Based Compressed Domain Video Fingerprinting Technique. Comput. Inf. Sci. 5(5): 25-34 (2012) - Azizol Abdullah, Rohaya Latip, Wan Mohd Azraei Wan Mustapha:
Evaluation of an Economy-Based File Replication Strategy for Malaysian Research and Education Network (MYREN) Data Grid Model. Comput. Inf. Sci. 5(1): 62-76 (2012) - Rusli Abdullah, Amir Mohamed Talib:
Towards a Personal Knowledge Model (PKM) in Collaborative Environment of School Teachers' Community. Comput. Inf. Sci. 5(6): 50-57 (2012) - A. K. Akinwole, O. J. Emuoyibofarhe:
Performance Comparison of Mobile Ad Hoc Network Routing Protocol and Transmission Control Protocol. Comput. Inf. Sci. 5(4): 102-109 (2012) - Hend S. Al-Khalifa:
WCAG 2.0 Semi-automatic Accessibility Evaluation System: Design and Implementation. Comput. Inf. Sci. 5(6): 73-87 (2012) - Eisa Alanazi, Malek Mouhoub, Bandar Mohammed:
A Preference-Aware Interactive System for Online Shopping. Comput. Inf. Sci. 5(6): 33-42 (2012) - Abdallah Alashqur:
Using a Lattice Intension Structure to Facilitate User-Guided Association Rule Mining. Comput. Inf. Sci. 5(2): 11-21 (2012) - Sami M. Alhomod, Mohd Mudasir Shafi:
Privacy Policy in E Government Websites: A Case Study of Saudi Arabia. Comput. Inf. Sci. 5(2): 88-93 (2012) - Youyun Ao:
An Empirical Analysis of Fitness Assignment and Diversity-Preserving in Evolutionary Multi-Objective Optimization. Comput. Inf. Sci. 5(2): 111-128 (2012) - Nabil Arman:
A Materialized View for the Same Generation Query in Deductive Databases. Comput. Inf. Sci. 5(6): 1-5 (2012) - Raymond Aschheim, Smain Femmam, M. Faouzi Zerarka:
New "Graphiton" Model: a Computational Discrete Space, Self-Encoded as a Trivalent Graph. Comput. Inf. Sci. 5(1): 2-12 (2012) - Belkacem Athamena, Zina Houhamdi:
Structured Acceptance Test Suite Generation Process for Multi-Agent System. Comput. Inf. Sci. 5(1): 55-61 (2012) - Youssef Bassil, Mohammad Alwani:
Context-sensitive Spelling Correction Using Google Web 1T 5-Gram Information. Comput. Inf. Sci. 5(3): 37-48 (2012) - Pradip Kumar Biswas, Alberto Moreira Baptista:
Growth of ICT Capital and Deceleration of Labour Productivity in the EU Countries: The Missing Links. Comput. Inf. Sci. 5(5): 55-68 (2012) - Maged Bouchahma, Wanglin Yan:
Automatic Measurement of Shoreline Change on Djerba Island of Tunisia. Comput. Inf. Sci. 5(5): 17-24 (2012) - Majed Bouchahma, Wanglin Yan, Mohammed Ouessar:
Island Coastline Change Detection Based on Image Processing and Remote Sensing. Comput. Inf. Sci. 5(3): 27-36 (2012) - Jeff Butterfield, Thad Crews:
Casting a Wider Net: A Longitudinal Study Exploring Gender Differences, Influences and Attitudes Impacting Academic Major Selection in Computing. Comput. Inf. Sci. 5(2): 2-10 (2012) - Gary Cantrell, David A. Dampier, Yoginder S. Dandass, Nan Niu, A. Chris Bogen:
Research toward a Partially-Automated, and Crime Specific Digital Triage Process Model. Comput. Inf. Sci. 5(2): 29-38 (2012) - Arindam Chaudhuri:
Forecasting Financial Time Series Using Multiple Regression, Multi Layer Perception, Radial Basis Function and Adaptive Neuro Fuzzy Inference System Models: A Comparative Analysis. Comput. Inf. Sci. 5(6): 13-24 (2012) - Kaige Chen, Xiaojun Han, Tenghao Huang:
Target Detection Algorithm Based on the Movement of Codebook Model. Comput. Inf. Sci. 5(2): 49-54 (2012) - Justice G. Djokoto:
The Use of Farm Information Systems among Grasscutter Farmers in Ga-South Municipality and Awutu-Senya District in Ghana. Comput. Inf. Sci. 5(2): 55-68 (2012) - Marwa M. A. Elfattah, Aliaa A. A. Youssif, Ebada Sarhan Ahmed:
Handset Malwares Threats Feature Extraction Based on Behavior Analysis. Comput. Inf. Sci. 5(2): 79-87 (2012) - Moses Ekpenyong, Emem Obong Udoh:
Morpho-Syntactic Analysis Framework for Tone Language Text-to-Speech Systems. Comput. Inf. Sci. 5(4): 83-101 (2012) - Mohamed A. El-Zawawy, Nagwan Moustafa Daoud:
New Error-recovery Techniques for Faulty-Calls of Functions. Comput. Inf. Sci. 5(3): 67-75 (2012) - Mohamed A. El-Zawawy, Hamada A. Nayel:
Type Systems Based Data Race Detector. Comput. Inf. Sci. 5(4): 53-60 (2012) - Mina Elmaallam, Abdelaziz Kriouile:
A Model of Maturity for IS Risk Management Case Study. Comput. Inf. Sci. 5(3): 97-109 (2012) - Jingchun Feng, Fujie Zhang, Dandan Zhu, Fei Zhang:
Function Point Estimation and Demonstration on Website Projects. Comput. Inf. Sci. 5(3): 122-135 (2012) - Manuel Alberto M. Ferreira, Marina Andrade, José António Filipe:
The Age or Excess of the M|G|inf Queue Busy Cycle Mean Value. Comput. Inf. Sci. 5(5): 93-97 (2012)