


default search action
International Journal of Computing, Volume 15
Volume 15, 2016
- Daniel Reynolds, Richard A. Messner:

Video copy Detection utilizing the Log-Polar Transformation. 8-13 - Rihab Lahouli, Manel Ben-Romdhane, Chiheb Rebai, Dominique Dallet:

Programmable Parallel FBD Sigma Delta ADC Reconstruction stage Design for Software Defined Radio receiver. 14-21 - Oliver Kehret, Andreas Walz, Axel Sikora:

Integration of Hardware Security Modules into a Deeply Embedded TLS Stack. 22-30 - Orest Ivakhiv:

Information State of System estimation. 31-39 - Ruggero Donida Labati, Angelo Genovese, Enrique Muñoz Ballester, Vincenzo Piuri, Fabio Scotti, Gianluca Sforza:

Computational Intelligence for Biometric Applications: a Survey. 40-49 - Robert E. Hiromoto:

Parallelism and Complexity of a Small-World Network Model. 72-83 - Vladimir V. Zhikharevich, Nataliia A. Matsiuk, Sergey E. Ostapov:

Solving the Routing Problem by Ant Colony Optimization Algorithms. 84-91 - Janusz Zalewski:

From CAMAC to Wireless Sensor Networks and Time-triggered Systems and beyond: Evolution of Computer Interfaces for Data Acquisition and control. Part I. 92-106 - Miki Sirola, Jaakko Talonen, Mika Sulkava:

Improving Support estimates by fusion of pre-Election Data. 107-118 - Jerzy Kolakowski, Angelo Consoli, Vitomir Djaja-Josko, Jaouhar Ayadi, Lorenzo Morrigia, Francesco Piazza:

Indoor UWB Positioning in EIGER localization System. 119-126 - Mykhaylo Dorozhovets, Ivanna Bubela:

Computing uncertainty of the Extreme Values in Random samples. 127-135 - Jakub Leszek Pach, Piotr Bilski:

A robust Binarization and Text Line Detection in Historical Handwritten Documents Analysis. 154-161 - Madhav Patil, Tamer Abukhalil, Sarosh H. Patel, Tarek M. Sobh:

Ub Swarm: Hardware Implementation of Heterogeneous Swarm robot with Fault Detection and Power Management. 162-176 - Domas Jonaitis, Vidas Raudonis, Arunas Lipnickas:

Application of numerical Intelligence Methods for the Automatic Quality Grading of an embryo Development. 177-183 - Sergei V. Bezobrazov, Anatoly Sachenko, Myroslav Komar, Vladimir S. Rubanau:

The Methods of Artificial Intelligence for Malicious Applications Detection in Android OS. 184-190 - Timothy Heard, Daryl Johnson:

An Extended Discussion on a High-Capacity Covert channel for the Android Operating System. 191-199 - Diana Zahorodnia, Yuriy R. Pigovsky, Pavlo Bykovyy:

Canny-based method of Image Contour Segmentation. 200-205 - Yuriy P. Kondratenko, Oleksandr S. Gerasin, Andriy M. Topalov:

A simulation Model for robot's slip Displacement Sensors. 224-236 - Hippolyte Djonon Tsague, Bhekisipho Twala:

Investigation of carrier Mobility degradation effects on MOSFET Leakage simulations. 237-247 - Markus Schölzel, Evren Eren, Kai-Oliver Detken, Leonid Schwenke:

Monitoring Android Devices by using Events and Metadata. 248-258 - Nikolay I. Korsunov, Dmitrii A. Toropchin:

The method of Finding the Spam Images based on the Hash of the Key Points of the Image. 259-264

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.


Google
Google Scholar
Semantic Scholar
Internet Archive Scholar
CiteSeerX
ORCID














