- Alexander Uskov:
The Efficiency of Encryption Algorithms in EAX Moder of Operation in IPSEC-based Virtual Private Networks for Streaming Rich Multimedia Data. Int. J. Comput. Sci. Appl. 11(1): 18-36 (2014) - Nisha Yadav, Ambuja Salgaonkar, Mayank N. Vahia:
Computational Techniques for Inferring the Syntax of Un-deciphered Scripts. Int. J. Comput. Sci. Appl. 11(2): 50-61 (2014) - 2013
- Rajaa Ayadi, Youssef Benadada:
Memetic Algorithm for a Multi-Objective Vehicle Routing Problem with Multiple Trips. Int. J. Comput. Sci. Appl. 10(2): 72-91 (2013) - Ghizlane Bencheikh, Fatima El Khoukhi, Mohamed Baccouche, Dalila Boudebous, Abdelhaq Belkadi, Abdellah Ait Ouahman:
Hybrid Algorithms for the Multiple Runway Aircraft Landing Problem. Int. J. Comput. Sci. Appl. 10(2): 53-71 (2013) - Marek Blok:
On Sample Rate Conversion Based on Variable Fractional Delay Filters. Int. J. Comput. Sci. Appl. 10(1): 98-116 (2013) - Dumitru Dan Burdescu:
Guest Editorial. Int. J. Comput. Sci. Appl. 10(1): iii (2013) - Mohammed Essaadi, Jaouad Boukachour:
Guest Editorial. Int. J. Comput. Sci. Appl. 10(2): iii (2013) - Chrysoula Gatsou, Anastasios Politis, Dimitrios Zevgolis:
Exploring Novice User Considerations for a Mobilde Device Application Through Card Sorting. Int. J. Comput. Sci. Appl. 10(1): 46-62 (2013) - Ghizlane Hamdouni, Amina Elomri, Khalid Moussaid:
Assignment of Container Trucks of a Road Transport Company with Consideration of the Load Balancing Problem. Int. J. Comput. Sci. Appl. 10(2): 1-14 (2013) - Artur Janicki, Dariusz Wawer:
Voice-Driven Computer Game in Noisy Environments. Int. J. Comput. Sci. Appl. 10(1): 31-45 (2013) - Mohamed Kasraoui, Adnane Cabani, Joseph Mouzna:
Zbr-M: A New Zigbee Routing Protocol. Int. J. Comput. Sci. Appl. 10(2): 15-32 (2013) - Irina S. Kipyatkova, Alexey Karpov, Vasilisa Verkhodanova, Milos Zelezný:
Modeling of Pronunciation, Language and Nonverbal Units at Conversational Russian Speech Recognition. Int. J. Comput. Sci. Appl. 10(1): 11-30 (2013) - Valery I. Korzhik, Guillermo Morales-Luna, Ivan Fedyanin:
Audio Watermarking Based on Echo Hiding with Zero Error Probability. Int. J. Comput. Sci. Appl. 10(1): 1-10 (2013) - Marian Cristian Mihaescu:
Software Architectures of Applications Used for Enhancing On-line Educational Environments. Int. J. Comput. Sci. Appl. 10(1): 63-77 (2013) - Mehdi Najib, Jaouad Boukachour, Abdelaziz El Fazziki:
A Multi Agent Framework for Risk Management in Container Terminal: Suspect Containers Targeting. Int. J. Comput. Sci. Appl. 10(2): 33-52 (2013) - Marco Querini, Giuseppe F. Italiano:
Facial Recognition with 2D Color Barcodes. Int. J. Comput. Sci. Appl. 10(1): 78-97 (2013) - 2012
- Terje Aaberge, Rajendra Akerkar:
Ontology and Ontology Construction: Background and Practices. Int. J. Comput. Sci. Appl. 9(2): 32-41 (2012) - Rajendra Akerkar:
Editorial. Int. J. Comput. Sci. Appl. 9(1) (2012) - Rajendra Akerkar:
Editorial. Int. J. Comput. Sci. Appl. 9(2) (2012) - Fatemeh Alamdar, Mohammadreza Keyvanpour:
Effects of Quaghistogram on Image Retrievl and Clustering. Int. J. Comput. Sci. Appl. 9(3): 141-153 (2012) - Sergey Anfinogenov, Valery I. Korzhik, Guillermo Morales-Luna:
A Multiple Robust Digital Watermarking System for Still Images. Int. J. Comput. Sci. Appl. 9(3): 37-46 (2012) - Dumitru Dan Burdescu:
Guest Editorial & Cover Page. Int. J. Comput. Sci. Appl. 9(3) (2012) - Jacques Calmet, Marvin Oliver Schneider:
Logical Fibering and Knowledge Bases. Int. J. Comput. Sci. Appl. 9(2): 42-52 (2012) - Brett Drury, Luís Torgo, José João Almeida:
Classifying News Stories with a Constrained Learning Strategy to Estimate the Direction of a Market Index. Int. J. Comput. Sci. Appl. 9(1): 1-22 (2012) - Tatiana Evreinova, Grigori E. Evreinov, Roope Raisamo:
Evaluation of Effectiveness of the Stickgrip Device for Detecting the Topographic Heights on Digital Maps. Int. J. Comput. Sci. Appl. 9(3): 61-76 (2012) - David Garrido Garrido, Leticia Carnero Pascual, Belén Ríos-Sánchez, Carmen Lastres Redondo:
A Computer Application for 3D Craniofacial Reconstruction and Automatic Skull-Photo Identification. Int. J. Comput. Sci. Appl. 9(3): 108-127 (2012) - Chrysoula Gatsou, Anastasios Politis, Dimitrios Zevgolis:
The Importance of Mobile Interface Icons on User Interaction. Int. J. Comput. Sci. Appl. 9(3): 92-107 (2012) - Henry Hexmoor, Deepti Shetty:
A Culturally Aware Rescue Model for Natural Disasters. Int. J. Comput. Sci. Appl. 9(2): 1-14 (2012) - Yutaka Hirakawa, Motohiro Take, Kazuo Ohzeki:
Pass-Image Authentication Method Tolerant to Random and Video-Recording Attacks. Int. J. Comput. Sci. Appl. 9(3): 20-36 (2012) - Yuh-Jong Hu, Win-Nan Wu, Jiun-Jan Yang:
Semantics-enabled Policies for Super-Peer Data Integration and Protection. Int. J. Comput. Sci. Appl. 9(1): 23-49 (2012)