A Model for Semantic Integration of Business Components |
Larbi Kzaz, Hicham Elasri, Abderrahim Sekkaki |
Vol 2, No 1 (2010), Pagination: 1-12
|
ABSTRACT |
PDF
|
|
Abstract Views: 451 |
PDF Views: 222
|
Agent Based Trust Management Framework in Distributed E-Business Environment |
E. Sathiyamoorthy, N. Ch. Sriman Narayana Iyenger |
Vol 2, No 1 (2010), Pagination: 14-28
|
ABSTRACT |
PDF
|
|
Abstract Views: 480 |
PDF Views: 211
|
Multi Dimensional CTL and Stratified Datalog |
Theodore Andronikos, Vassia Pavlaki |
Vol 2, No 1 (2010), Pagination: 29-53
|
ABSTRACT |
PDF
|
|
Abstract Views: 487 |
PDF Views: 223
|
An Efficient Gait Recognition System For Human Identification Using Modified ICA |
M. Pushpa Rani, G. Arumugam |
Vol 2, No 1 (2010), Pagination: 55-67
|
ABSTRACT |
PDF
|
|
Abstract Views: 508 |
PDF Views: 268
|
Cartographic Generalization (Selection) For 2D Map of Urban Area |
Jagdish Lal Raheja, Umesh Kumar, K. C. Saravanan |
Vol 2, No 1 (2010), Pagination: 69-75
|
ABSTRACT |
PDF
|
|
Abstract Views: 508 |
PDF Views: 218
|
A BPT Application: Semi-Automatic Image Retrieval Tool |
Shirin Ghanbari, John C. Woods, Simon M. Lucas, Hamid R. Rabiee |
Vol 2, No 1 (2010), Pagination: 77-83
|
ABSTRACT |
PDF
|
|
Abstract Views: 696 |
PDF Views: 265
|
Analyzing the P2P Traffic Using Probability Schemes |
M. Sadish Sendil, N. Nagarajan |
Vol 2, No 1 (2010), Pagination: 85-94
|
ABSTRACT |
PDF
|
|
Abstract Views: 459 |
PDF Views: 232
|
Low Power VLSI Design with Resistive Feedback Logic |
C. Ashok Kumar, B. K. Madhavi, K. Lal Kishore |
Vol 2, No 1 (2010), Pagination: 96-104
|
ABSTRACT |
PDF
|
|
Abstract Views: 421 |
PDF Views: 214
|
Dynamic Probe Window Based Optimization for Surveillance in Home Security System |
Bhaskar Kapoor, Anamika Chhabra |
Vol 2, No 1 (2010), Pagination: 106-114
|
ABSTRACT |
PDF
|
|
Abstract Views: 467 |
PDF Views: 206
|
Performance Evaluation of Face Recognition Using Gabor Filter, Log Gabor filter and Discrete Wavelet Transform |
D. Murugan, S. Arumugam, K. RajalakshmiDepartment of CSE, Francis Xavier Engineering College, T. I. Manish |
Vol 2, No 1 (2010), Pagination: 125-133
|
ABSTRACT |
PDF
|
|
Abstract Views: 444 |
PDF Views: 293
|
A Mobility-Based CheckPointing Protocol for Mobile Computing System |
Suparna Biswas, Sarmistha Neogy |
Vol 2, No 1 (2010), Pagination: 135-151
|
ABSTRACT |
PDF
|
|
Abstract Views: 465 |
PDF Views: 218
|