


default search action
International Journal of Computing, Volume 13
Volume 13, Number 1, 2014
- Keisuke Kato, Vitaly Klyuev:

Password Protection: End User Security Behavior. 8-16 - Christof Pieloth, Thomas R. Knösche, Burkhard Maess, Mirco Fuchs

:
Online Distributed Source localization from EEG/MEG Data. 17-24 - Aleksandra Kawala-Janik, Jerzy Baranowski, Michal Podpora, Pawel Piatek, Mariusz Pelc:

Use of a Cost-Effective Neuroheadset Emotiv EPOC for Pattern Recognition Purposes. 25-33 - Vitaliy Pavlenko, Sergei Pavlenko, Viktor O. Speranskyy:

Noise Immunity Research for nonlinear dynamical Systems identification based on Volterra Model in frequency Domain. 34-41 - Agata Manolova, Krasimir Tonchev:

Study of two 3D Face Representation Algorithms using Range Image and Curvature-based Representations. 42-49 - Daniel Caspari, Mircea Strutu, Lucas Riedhammer, Uwe Grossmann:

Sensor based Algorithms for dead Reckoning: a Comparison of two Approaches for Smartphones. 50-60 - Viktor Artemenko

:
Agent-based Modeling of the E-Learning Users' Behavior. 61-69
Volume 13, Number 2, 2014
- Yuriy P. Kondratenko, Volodymyr V. Korobko, Oleksiy V. Korobko, Oleksiy Moskovko:

Design of the fuzzy control System for the waste heat Utilization plants Driven by the thermoacoustic Engine. 88-96 - S. P. Malarvizhi, B. Sathiyabhama:

Enhanced Reconfigurable Weighted Association Rule Mining for Frequent Patterns of Web Logs. 97-105 - Ontje Helmich, Michael A. Herzog, Christian Neumann:

Seamless and Secure Integration of Socialmedia, E-portfolio and Alumn Services into University Information Architecture. 106-115 - Di Zhao:

Fast Solver for interior Point method of SVM Training by Parallel GMRES and HSS. 116-124 - Omar S. Sonbul

, Alexander N. Kalashnikov:
Determining the Operating Distance of Air ultrasound Range finders: calculations and Experiments. 125-131 - Alexey Lagunov, Darina Lagunova, Irina Berdennikova:

Cognitive System of the Hepatorenal Syndrome Screening in Persons with Alcohol Abuse. 132-140
Volume 13, Number 3, 2014
- Bakhta Meroufel, Ghalem Belalem:

Abstraction Checkpointing Levels: Problems and solutions. 158-169 - Sergey A. Subbotin:

The Instance Selection method for Neuro-fuzzy Model synthesis. 170-175 - Hanna Balakhontseva, Jürgen Sieck:

Web-Server Application for Fast and robust Recognition of Exhibits in the Museum. 176-182 - Bohdan Y. Volochiy, Leonid Ozirkovskyi

, Oleksandr Shkiliuk, Andriy Mashchak:
Technique of Construction Models of Behavior Algorithms of Radio Electronic Complex System using the Scheme of Paths method. 183-190 - Anbu Megelin star, Perumal Subburaj:

Wavelet shrinkage adaptive Histogram equalization for Medical Images. 191-196
Volume 13, Number 4, 2014
- Wolfgang Tysiak:

A Deeper Insight in some effects in Project Risk Management. 214-220 - Sergey D. Bushuyev, Magomed Zh. Ozdoyev:

Management of Projects for Organization Development on the Basis of Entrepreneurship. 221-226 - Bassam A. Hussein, Kristin H. J. Hafseld:

Impact of Conformity, Commitment and Management Style on an Information System Project. 227-239 - Igor Kononenko, Anna Kharazii:

The Methods of Selection of the Project Management Methodology. 240-247 - Carsten Wolff, Burkhard Igel, Uwe Lauschner:

A Structured Process for Transferring Academic Research into Innovation Projects - Pimes Case Study. 248-256 - Anatoliy J. Gaida, Tigran G. Grigorian, Yuriy N. Kharitonov, Volodymyr K. Koshkin:

The Project Management of water supply complexes Reconstruction on the Basis of Decision Support Systems. 257-263 - Marian Turek, Adam Sojda:

A fuzzy Pay-off method for Real option Valuation in determination of Mining Enterprise Value. 264-270

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.


Google
Google Scholar
Semantic Scholar
Internet Archive Scholar
CiteSeerX
ORCID














