


Остановите войну!
for scientists:


default search action
Journal of Information Technology Research, Volume 5
Volume 5, Number 1, 2012
- Frank Ortmeier:
Dependability in Pervasive Computing: Challenges and Chances. 1-17 - Ekaterine Kldiashvili
:
The Cloud Computing as the Tool for Implementation of Virtual Organization Technology for eHealth. 18-34 - Richard A. Stein:
Direct-to-Consumer Genetic Testing: Interdisciplinary Crossroads. 35-67 - John Lindström, Claas Hanken:
Security Challenges and Selected Legal Aspects for Wearable Computing. 68-87
Volume 5, Number 2, 2012
- Norazah Mohd Suki
:
Correlations of Perceived Flow, Perceived System Quality, Perceived Information Quality, and Perceived User Trust on Mobile Social Networking Service (SNS) Users' Loyalty. 1-14 - Shrikant Tiwari
, Sanjay Kumar Singh
:
Newborn Verification Using Headprint. 15-30 - Regina Connolly
, Cliona Patricia McParland:
Dataveillance: Employee Monitoring & Information Privacy Concerns in the Workplace. 31-45 - Ronald John Lofaro, Kevin M. Smith
:
Critique and Proposed Revision of Crew Resource Management (CRM): A New Paradigm. 46-72 - Mohamed Taher:
Digital Preservation of Cultural Heritage Collection: Among Libraries of India and Iran: A Comparative Study. 73-74
Volume 5, Number 3, 2012
- Suraya Miskon
, Wasana Bandara
, Guy G. Gable
, Erwin Fielt
:
Success Factors for ICT Shared Services in the Higher Education Sector. 1-24 - Awang Hendrianto Pratomo
, Anton Satria Prabuwono
, Siti Norul Huda Sheikh Abdullah
, Mohammad Faidzul Nasrudin, Muhamad Syafiq Shohaimi, Teddy Mantoro
:
Adaptive Robot Soccer Defence Strategy via Behavioural Trail. 25-45 - Siti Norul Huda Sheikh Abdullah
, Muhammad Nuruddin Sudin, Anton Satria Prabuwono
, Teddy Mantoro
:
License Plate Detection and Segmentation Using Cluster Run Length Smoothing Algorithm. 46-70 - Sardjoeni Moedjiono, Ali Mas'at:
Cloud Computing Implementation Strategy for Information Dissemination on Meteorology, Climatology, Air Quality, and Geophysics (MKKuG). 71-84 - Norsaremah Salleh
, Ramlah Hussein, Norshidah Mohamed
:
An Empirical Investigation on Internet Privacy on Social Network Sites among Malaysian Youths. 85-97 - Media A. Ayu
, Swaleh Maulid Omari:
ICT Based Communication Channels Preferences towards Knowledge Sharing among Multicultural Students. 98-113
Volume 5, Number 4, 2012
- Camelia-Mihaela Pintea
, Gloria Cerasela Crisan
, Mihai Manea:
Parallel ACO with a Ring Neighborhood for Dynamic TSP. 1-13 - Maryam S. Nuser:
A Molecular Solution to the Three-Partition Problem. 14-29 - Vikas Singh, Deepak Singh, Ritu Tiwari
, Anupam Shukla
:
MDABC: Motif Discovery Using Artificial Bee Colony Algorithm. 30-47 - Prakash Tekchandani, Aditya Trivedi:
Clock Drift Management Using Nature Inspired Algorithms. 48-62 - Irina Georgescu
:
Computing the Risk Indicators in Fuzzy Systems. 63-84 - László Kovács:
Classification Method for Learning Morpheme Analysis. 85-98

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.