A Model for Semantic Integration of Business Components |
Larbi Kzaz, Hicham Elasri, Abderrahim Sekkaki |
Vol 2, No 1 (2010), Pagination: 1-12
|
ABSTRACT |
PDF
|
|
Abstract Views: 320 |
PDF Views: 158
|
Agent Based Trust Management Framework in Distributed E-Business Environment |
E. Sathiyamoorthy, N. Ch. Sriman Narayana Iyenger |
Vol 2, No 1 (2010), Pagination: 14-28
|
ABSTRACT |
PDF
|
|
Abstract Views: 344 |
PDF Views: 139
|
Multi Dimensional CTL and Stratified Datalog |
Theodore Andronikos, Vassia Pavlaki |
Vol 2, No 1 (2010), Pagination: 29-53
|
ABSTRACT |
PDF
|
|
Abstract Views: 353 |
PDF Views: 150
|
An Efficient Gait Recognition System For Human Identification Using Modified ICA |
M. Pushpa Rani, G. Arumugam |
Vol 2, No 1 (2010), Pagination: 55-67
|
ABSTRACT |
PDF
|
|
Abstract Views: 362 |
PDF Views: 186
|
Cartographic Generalization (Selection) For 2D Map of Urban Area |
Jagdish Lal Raheja, Umesh Kumar, K. C. Saravanan |
Vol 2, No 1 (2010), Pagination: 69-75
|
ABSTRACT |
PDF
|
|
Abstract Views: 354 |
PDF Views: 144
|
A BPT Application: Semi-Automatic Image Retrieval Tool |
Shirin Ghanbari, John C. Woods, Simon M. Lucas, Hamid R. Rabiee |
Vol 2, No 1 (2010), Pagination: 77-83
|
ABSTRACT |
PDF
|
|
Abstract Views: 531 |
PDF Views: 200
|
Analyzing the P2P Traffic Using Probability Schemes |
M. Sadish Sendil, N. Nagarajan |
Vol 2, No 1 (2010), Pagination: 85-94
|
ABSTRACT |
PDF
|
|
Abstract Views: 317 |
PDF Views: 154
|
Low Power VLSI Design with Resistive Feedback Logic |
C. Ashok Kumar, B. K. Madhavi, K. Lal Kishore |
Vol 2, No 1 (2010), Pagination: 96-104
|
ABSTRACT |
PDF
|
|
Abstract Views: 278 |
PDF Views: 138
|
Dynamic Probe Window Based Optimization for Surveillance in Home Security System |
Bhaskar Kapoor, Anamika Chhabra |
Vol 2, No 1 (2010), Pagination: 106-114
|
ABSTRACT |
PDF
|
|
Abstract Views: 314 |
PDF Views: 143
|
Performance Evaluation of Face Recognition Using Gabor Filter, Log Gabor filter and Discrete Wavelet Transform |
D. Murugan, S. Arumugam, K. RajalakshmiDepartment of CSE, Francis Xavier Engineering College, T. I. Manish |
Vol 2, No 1 (2010), Pagination: 125-133
|
ABSTRACT |
PDF
|
|
Abstract Views: 305 |
PDF Views: 213
|
A Mobility-Based CheckPointing Protocol for Mobile Computing System |
Suparna Biswas, Sarmistha Neogy |
Vol 2, No 1 (2010), Pagination: 135-151
|
ABSTRACT |
PDF
|
|
Abstract Views: 315 |
PDF Views: 152
|