Business and Technical Requirements of Software-As-A-Service: Implications in Portuguese Enterprise Business Context
[Pdf]
Virginia Maria Araujo and Jose Ayude Vazquez, University of Vigo, Spain
Cloud Computing Technology for Egovernment Architecture
[Pdf]
Sajjad Hashemi, Islamic Azad University, Iran
An Interactive Approach to Requirements Prioritization Using Quality Factors
[Pdf]
Dinesh Singh1 and Aman Jatain2, 1M.D.University, India and 2ITM University, India
Protect Mobile Agent Against Malicious Host Using Partial-Mobility Mechanism
[Pdf]
Tarig Mohamed Ahmed, University of Khartoum, Sudan
A New Approach to Analyze Visual Secret Sharing Schemes For Biometric Authentication-A Survey
[Pdf]
TRajendra A B1 and Sheshadri H S2, 1PET Research Centre, India and 2PES College of Engineering, India
Improving Data Transmission in the Vanet Using Multi-Criteria Decision Making Method Based on Fuzzy Logic
[Pdf]
Javad Badali, Mortaza Mokhtari Nazarlou and Parvin Fartut, Islamic Azad University, Iran
A Comparative Study on Remote Tracking of Parkinson’s Disease Progression Using Data Mining Methods
[Pdf]
Peyman Mohammadi, Abdolreza Hatamlou and Mohammad Masdari, Islamic Azad University, Iran
Secure File Management System for Java Cards
[Pdf]
Reza Asgari and Reza Ebrahimi Atani, University of Guilan, Iran
Simulation and Analysis of AODV, DSDV, ZRP In Vanet
[Pdf]
Abhishek Singh and Anil K. Verma, Thapar University, India
GA-CFS Approach to Increase the Accuracy of Estimates in Elections Participation
[Pdf]
Seyyed Reza Khaze, Ramin Jafarzadeh, Laya Ebrahimi And Isa Maleki, Islamic Azad University, Iran
Optimization of Cross Domain Sentiment Analysis Using Sentiwordnet
[Pdf]
K Paramesha1 and K C Ravishankar2, 1Vidyavardhaka College of Engg, India and 2Government Engineering College, India
Graph Colouring Problem Based on Discrete Imperialist Competitive Algorithm
[Pdf]
Hojjat Emami1 and Shahriar Lotfi2, 1Islamic Azad University, Iran and 2University of Tabriz, Iran
A New Mechanism for Service Recovery Technology by Using Recovering Service’s Data
[Pdf]
Monire Norouzi, Islamic Azad University, Iran
Health Care Monitoring for the CVD Detection Using Soft Computing Techniques
[Pdf]
N.Sathiya Rani, K.Vimala and V.Kalaivani, National Engineering College, India
Wind Speed Data Analysis for Various Seasons during a Decade by Wavelet and S transform
[Pdf]
Sabyasachi Mukhopadhyay and Prasanta K Panigrahi, Indian Institutes of Science Education and Research, India
Logmin: A Model for Call Log Mining in Mobile Devices
[Pdf]
K.S. Kuppusamy, Leena Mary Francis and G. Aghila, Pondicherry University, India
Short Listing Likely Images Using Proposed Modified-Sift Together with Conventional Sift for Quick Sketch to Photo Matching
[Pdf]
Mohd. Ahmed, S. A. Patekar and Mandar Sohani, Vidyalankar Institute of Technology, India
Devnagari Numerals Classification and Recognition Using an Integrated Approach
[Pdf]
Kanika Bansal and Rajiv Kumar, Thapar University, India
Hidden Markov Model Based Named Entity Recognition Tool
[Pdf]
Deepti Chopra, Sudha Morwal and G.N. Purohit, Banasthali Vidyapith,(Raj.), India
Qoe Model for Multimedia Content Delivery from Mcloud to Mobile Devices
[Pdf]
Aleksandar Karadimce and Danco Davcev, University Ss Cyril and Methodius, R. Macedonia
Delivering IT as A Utility- A Systematic Review
[Pdf]
Inderveer Chana and Tarandeep Kaur, Thapar University, India
An Assessment of Security Mechanisms Against Reactive Jammer Attack In Wireless Sensor Networks
[Pdf]
Ramya Shivanagu and Deepti C, The Oxford College of Engineering, India
On 2-Repeated Solid Burst Errors
[Pdf]
P. K. Das, Shivaji College (University of Delhi), India
A Modified Dna Computing Approach To Tackle The Exponential Solution Space Of The Graph Coloring Problem
[Pdf]
Ramin Maazallahi and Aliakbar Niknafs, Shahid Bahonar University of Kerman, Iran
A Review On Semantic Relationship Based Applications
[Pdf]
P.Shanthi Bala and G.Aghila, Pondicherry University, India
A New Research and Design for Grid Portal Security System
[Pdf]
Alireza Souri, Islamic Azad University, Iran
A Novel Metaheuristics To Solve Mixed Shop Scheduling Problems
[Pdf]
V. Ravibabu, Manonmaniam Sundaranar University, India
Evaluation Of The Data Security Methods In Cloud Computing Environments
[Pdf]
Farhad Soleimanian Gharehchopogh and Meysam Bahari, Islamic Azad University, Iran.
Scalable Cluster Based Cloud Storage [Pdf] Parinaz Eskandarian Miyandoab1 and Jaber Karimpour2, 1Islamic Azad University, Iran and 2University of Tabriz, Iran
A New Greedy Randomized Adaptive Search Procedure for Multiobjective RNA Structural Alignment
[Pdf]
Abdesslem Layeb, Amira Boudra, Wissem Korichi and Salim Chikhi, University of Constantine, Algeria
A New MVP Based Approach in Software Architecture for Time Reduction in Software Development
[Pdf]
Farhad Soleimanian Gharehchopogh and Mortaza Abdollahiasl, Islamic Azad University, Iran
Cryptographic Control for Risk Assessment on Unix Operating System-I
[Pdf]
Prashant Kumar Patra1 & Padma Lochan Pradhan2, 1BPUT, India and 2Sikha ‘O’ Anusandhan University (SOA), India