Stop the war!
Остановите войну!
for scientists:
default search action
Advances in Information Sciences and Service Sciences, Volume 2
Volume 2, Number 1, March 2010
- Mamoun Hussein Mamoun:
A New Routing Scheme for MANET. 6-15 - Chi-Yen Yin, Yan-Ping Chi:
A Trend Analysis of Information Management Research by Bibliometric Methodology, 1957 - 2008. 16-30 - Jing Sha, Changjun Jiang:
An Approach to Predict Performance of Component-based Software with the Palladio Component Model and Stochastic Well-formed Nets. 31-42 - Wann-Jyi Horng, Jih-Ming Chyan:
An Impact of High and Low Oil Price Periods' Volatility for Two Stock Market Returns: Study of Singapore and Hong Kong's Stock Markets. 43-56 - Chuanxu Wang:
Analyzing the Bullwhip Effect in a Supply Chain with ARMA(1, 1) Demand Using MMSE Forecasting. 57-70 - Alaa Mohamed Riad, Ahmed E. Hassan, Qusay F. Hassan:
Design of SOA-based Grid Computing with Enterprise Service Bus. 71-82 - Yang Zhang:
Dependable ESB Routing in Hybrid Service Execution Environment. 83-93 - Umesh Hodeghatta Rao Xavier, Sanjay Mohapatra:
Mobile Solution for Improving Operational Efficiency in Agricultural Sector. 94-101 - Alaa Mohamed Riad, Hamdy K. El-Minir, Mohamed Abu ElSoud, Sahar F. Sabbeh:
PSSE: An Architecture For A Personalized Semantic Search Engine. 102-112
Volume 2, Number 2, June 2010
- Aida Amini Motlagh, Mir Ali Seyyedi:
Service Oriented Business Modeling To Identify Software Services. 6-12 - Mei Liu, Dao-ping Huang, Xiaoling Xu:
Node Task Allocation Based on PSO in WSN Multi-target Tracking. 13-18 - Mohamad Farhan Mohamad Mohsin, Mohd Helmy Abd Wahab, Mohd Fairuz Zaiyadi, Cik Fazilah Hibadullah:
An Investigation into Influence Factor of Student Programming Grade Using Association Rule Mining. 19-27 - Yonsik Lee, Minseok Jang:
The Naming Service of Multi-Agent for the Sensor Network Applications. 28-33 - Yonsik Lee, Kwangwoo Nam:
The Object Replication Method for the Efficient Migration of Agent. 34-41 - Joseph Gallart Suarez, Manuel Tupia Anticona:
Two GRASP Metaheuristic for the Capacitated Vehicle Routing Problem Considering Split Delivery and Solving the Three Dimensional Bin Packing Problem. 42-50 - Mohammad Kazem Haki, Maia Wentland Forte:
Service-Oriented Business-IT Alignment: A SOA Governance Model. 51-60 - Youssef M. ElSayed, Moataz H. Khalil, Khairia E. Al-Nadi:
Neural Network Modeling for Proton Exchange Membrane Fuel Cell (PEMFC). 61-66 - José Crispín Zavala Díaz, Marco Antonio Cruz-Chavez, Martín Heriberto Cruz-Rosales:
Mathematical Multi-objective Model for the selection of a portfolio of investment in the Mexican Stock Market. 67-76 - Sun-Young Lee:
Network Connection and Perfectly Secure Message Transmission on Wireless Mobile Networks. 77-83 - Berdakh Abibullaev, Won-Seok Kang, Seung-Hyun Lee, Jinung An:
A Simple Wavelet Method for Automated Detection of Epileptic Neural Spikes in Electroencephalogram. 84-92 - Apitep Saekow, Choompol Boonmee:
A Practical Method of Reducing the Gaps in e-Government Interoperability Implementation: Case of Patient Referral Information Exchange. 93-106 - Min-Lang Huang, Jung-Hong Hong:
A Geospatial Service Approach towards the Development of a Debris Flow Early-warning Systems. 107-117 - Aurobi Das, V. Balakrishnan:
A Next Generation Smart Energy Technology. 118-131 - Colin Lemmon, Siu Man Lui, Ickjai Lee:
Review of Location-Aware Routing Protocols. 132-143
Volume 2, Number 3, September 2010
- Shigeki Kobayashi, Yasuyuki Nogami, Tatsuo Sugimura:
A Relation between Self-Reciprocal Transformation and Normal Basis over Odd Characteristic Field. 6-13 - Ashwin C. S., Harihar V., Karthick G., Karthik A., Rangarajan K. R.:
PIXBAS "Pixel Based Offline Signature Verification". 14-17 - Shaoliang Meng, Wei Cao, Yixin Yan, Shengming Li:
Bit Replacement Audio Watermarking Using Stereo Signals. 18-24 - Shrabani Mallick, Dharmender Singh Kushwaha:
LWSDM: Layered Web Service Discovery Mechanism. 25-31 - Seongdong Kim, Christoph Hoffmann, Jae Moon Lee:
An Experimental in Rule-based Crowd Behavior for Intelligent Games. 32-39 - Jin-Wook Lee, Jae-Soo Cho:
Effective Lane Detection and Tracking Method Using Statistical Modeling of Color and Lane Edge-orientation. 40-47 - Yih-Jiun Lee:
Context Awareness Information Sharing Service based on Location-based Communication Policy. 48-55 - Bogdan Carstoiu, Dorin Carstoiu:
Zatara, the Plug-in-able Eventually Consistent Distributed Database. 56-67 - M. R. Aliabadi, Mohammad Reza Ahmadi:
Proposing a Comprehensive Storage Virtualization Architecture with Related Verification for Data Center Application. 68-75 - Mustarum Musaruddin, Rastko Zivanovic:
Web Services for Automated Fault Analysis in Electrical Power Systems. 76-81 - Seungchul Park:
A QoS-based P2P Streaming for Ubiquitous Personal IPTV. 82-90 - J. Wang, Kyeong-Yuk Min, Jong-Wha Chong:
Cost Effective Block Truncation Coding for Color Image Compression. 91-98 - Wang-xian Yang, Dong-hua Liu, Ding-ju Zhu:
An Adaptive HW/SW Dual Communication Mode. 99-105 - ChangKug Kim, UngHan Yoon, GangSeob Lee, DoWon Yun, HyeonSo Ji, ByoungOhg Ahn, SooChul Park:
An Integrated Analysis System for Agricultural Biotechnology Information and Web Service. 106-110 - Hossein Monttaghi-far:
The Traditions of Persian "Tazkirah" Writing in the 18th & 19th Centuries and Some Special Hints. 111-117 - Abdul Majid, Yeon Soo Lee:
Correlating Lattice Constant of Cubic Perovskites to Atomic Parameters Using Support Vector Regression. 118-127 - Yusuke Gotoh, Tomoki Yoshihisa, Hideo Taniguchi, Masanori Kanazawa:
A Scheduling Method on Selective Contents Delivery with Node Relay-based Webcast Considering Data Size. 128-137
Volume 2, Number 4, December 2010
- Yumi Sakemi, Hidehiro Kato, Shoichi Takeuchi, Yasuyuki Nogami, Yoshitaka Morikawa:
Two Improvements of Twisted Ate Pairing with Barreto-Naehrig Curve by Dividing Miller's Algorithm. 1-13 - Zaiz Faouzi, Abdelhamid Djeffal, Mohamed Chaouki Babahenini:
An Approach Based on Structural Segmentation for the Recognition of Arabic Handwriting. 14-24 - Do-Yoon Ha, Chang-Yong Lee, Hyun-Cheol Jeong, Bong-Nam Noh:
Design and Implementation of SIP-aware DDoS Attack Detection System. 25-32 - Jiang Guo:
Towards Automatic Analysis of Software Requirement Stability. 33-42 - Lilac A. E. Al-Safadi:
A Dual-Mode Intelligent Shopping Assistant. 43-54 - R. K. Selvakumar, Durga Karthik:
Analysing Parameter for Nuclear Explosion Using Digital Images. 55-60 - Waralak V. Siricharoen:
Using Integrated Ontologies for Determining Objects towards Software Engineering Approach. 61-70 - J. G. R. Sathiaseelan, S. Albert Rabara, J. Ronald Martin:
MLSF: A Framework for Multi-Level Secure Composite Web Services. 71-78 - Jungyeop Kim:
Robust Vector Digital Watermarking Using Angles and a Random Table. 79-90 - Fazal Wahab Karam, Terje Jensen:
A Survey on QoS in Next Generation Networks. 91-102 - Hathairat Ketmaneechairat, Phoemphun Oothongsap, Anirach Mingkhwan:
Smart Buffer Management for Different Start Video Broadcasting. 103-114 - JinKyoung Heo:
Distributed Cipher Services Using Object Activation. 115-122 - Tomoya Kato:
Kindergarten-Family Collaboration Model (KFCM) to Support Raising Children. 123-133 - Hochul Jeon, Taehwan Kim, Joongmin Choi:
Personalized Information Retrieval by Using Adaptive User Profiling and Collaborative Filtering. 134-142 - Lihua Zhou, Ming Yang, Hongmei Chen, Qin Xiao:
Applying Influence Diagrams to Infer Rival's Private Information. 143-151 - Hochul Jeon, Taehwan Kim, Joongmin Choi:
Personal Semantic Search in a Mobile Environment Using Adaptive User Profiling. 152-157 - Sahar Sohangir, Mir Ali Seyyedi:
A New Method for Service Binding in Service Oriented Architecture Using Auction Algorithm. 158-166 - Wonhyuk Lee, Gisung Yoo, Gwangsub Go, Gwangho Kim, Byungyeon Park:
Proposal for Computation Model for Computing an Inter-layer Path Based on PCE. 167-171 - Ahmad Shaban, Fatemeh Naderi Kharaji:
The Process of Development and Evolution of Reading in the Field of Library and Information Science. 172-178 - Hochul Jeon, Taehwan Kim, Joongmin Choi:
A Predictable Fault Tolerance Approach for Robust Routing Algorithms in Ad-hoc Network. 179-185
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.