Software Engineering, Artificial Intelligence, Networking and Parallel/Distributed Computing

A Data Mining Based Publish/Subscribe System over Structured Peer-to-Peer Networks
A Data Mining Based Publish/Subscribe System over Structured Peer-to-Peer Networks
A Data Mining Based Publish/Subscribe System over Structured Peer-to-Peer Networks
A Data Mining Based Publish/Subscribe System over Structured Peer-to-Peer Networks
A Data Mining Based Publish/Subscribe System over Structured Peer-to-Peer Networks
A Data Mining Based Publish/Subscribe System over Structured Peer-to-Peer Networks
A Data Mining Based Publish/Subscribe System over Structured Peer-to-Peer Networks
A Data Mining Based Publish/Subscribe System over Structured Peer-to-Peer Networks
A Data Mining Based Publish/Subscribe System over Structured Peer-to-Peer Networks
A Data Mining Based Publish/Subscribe System over Structured Peer-to-Peer Networks
A Data Mining Based Publish/Subscribe System over Structured Peer-to-Peer Networks
A Data Mining Based Publish/Subscribe System over Structured Peer-to-Peer Networks
A Data Mining Based Publish/Subscribe System over Structured Peer-to-Peer Networks
A Data Mining Based Publish/Subscribe System over Structured Peer-to-Peer Networks
A Data Mining Based Publish/Subscribe System over Structured Peer-to-Peer Networks
Secure Identity Management System for Federated Cloud Environment
Secure Identity Management System for Federated Cloud Environment
Secure Identity Management System for Federated Cloud Environment
Secure Identity Management System for Federated Cloud Environment
Secure Identity Management System for Federated Cloud Environment
Secure Identity Management System for Federated Cloud Environment
Secure Identity Management System for Federated Cloud Environment
Secure Identity Management System for Federated Cloud Environment
Secure Identity Management System for Federated Cloud Environment
Secure Identity Management System for Federated Cloud Environment
Secure Identity Management System for Federated Cloud Environment
Secure Identity Management System for Federated Cloud Environment
Secure Identity Management System for Federated Cloud Environment
Secure Identity Management System for Federated Cloud Environment
Secure Identity Management System for Federated Cloud Environment
Secure Identity Management System for Federated Cloud Environment
Secure Identity Management System for Federated Cloud Environment
Using Word N-Grams as Features in Arabic Text Classification
Using Word N-Grams as Features in Arabic Text Classification
Using Word N-Grams as Features in Arabic Text Classification
Using Word N-Grams as Features in Arabic Text Classification
Using Word N-Grams as Features in Arabic Text Classification
Using Word N-Grams as Features in Arabic Text Classification
Using Word N-Grams as Features in Arabic Text Classification
Using Word N-Grams as Features in Arabic Text Classification
Using Word N-Grams as Features in Arabic Text Classification
Optimization of Emotional Learning Approach to Control Systems with Unstable Equilibrium
Optimization of Emotional Learning Approach to Control Systems with Unstable Equilibrium
Optimization of Emotional Learning Approach to Control Systems with Unstable Equilibrium
Optimization of Emotional Learning Approach to Control Systems with Unstable Equilibrium
Optimization of Emotional Learning Approach to Control Systems with Unstable Equilibrium
Optimization of Emotional Learning Approach to Control Systems with Unstable Equilibrium
Optimization of Emotional Learning Approach to Control Systems with Unstable Equilibrium
Optimization of Emotional Learning Approach to Control Systems with Unstable Equilibrium
Optimization of Emotional Learning Approach to Control Systems with Unstable Equilibrium
Optimization of Emotional Learning Approach to Control Systems with Unstable Equilibrium
Optimization of Emotional Learning Approach to Control Systems with Unstable Equilibrium
Optimization of Emotional Learning Approach to Control Systems with Unstable Equilibrium
An Evaluation of the MiDCoP Method for Imputing Allele Frequency in Genome Wide Association Studies
An Evaluation of the MiDCoP Method for Imputing Allele Frequency in Genome Wide Association Studies
An Evaluation of the MiDCoP Method for Imputing Allele Frequency in Genome Wide Association Studies
An Evaluation of the MiDCoP Method for Imputing Allele Frequency in Genome Wide Association Studies
An Evaluation of the MiDCoP Method for Imputing Allele Frequency in Genome Wide Association Studies
An Evaluation of the MiDCoP Method for Imputing Allele Frequency in Genome Wide Association Studies
An Evaluation of the MiDCoP Method for Imputing Allele Frequency in Genome Wide Association Studies
An Evaluation of the MiDCoP Method for Imputing Allele Frequency in Genome Wide Association Studies
An Evaluation of the MiDCoP Method for Imputing Allele Frequency in Genome Wide Association Studies
An Evaluation of the MiDCoP Method for Imputing Allele Frequency in Genome Wide Association Studies
An Evaluation of the MiDCoP Method for Imputing Allele Frequency in Genome Wide Association Studies
An Approach to Construct Weighted Minimum Spanning Tree in Wireless Sensor Networks
An Approach to Construct Weighted Minimum Spanning Tree in Wireless Sensor Networks
An Approach to Construct Weighted Minimum Spanning Tree in Wireless Sensor Networks
An Approach to Construct Weighted Minimum Spanning Tree in Wireless Sensor Networks
An Approach to Construct Weighted Minimum Spanning Tree in Wireless Sensor Networks
An Approach to Construct Weighted Minimum Spanning Tree in Wireless Sensor Networks
An Approach to Construct Weighted Minimum Spanning Tree in Wireless Sensor Networks
An Approach to Construct Weighted Minimum Spanning Tree in Wireless Sensor Networks
An Approach to Construct Weighted Minimum Spanning Tree in Wireless Sensor Networks
An Approach to Construct Weighted Minimum Spanning Tree in Wireless Sensor Networks
An Approach to Construct Weighted Minimum Spanning Tree in Wireless Sensor Networks
An Approach to Construct Weighted Minimum Spanning Tree in Wireless Sensor Networks
An Approach to Construct Weighted Minimum Spanning Tree in Wireless Sensor Networks
An Approach to Construct Weighted Minimum Spanning Tree in Wireless Sensor Networks
An Approach to Construct Weighted Minimum Spanning Tree in Wireless Sensor Networks
An Approach to Construct Weighted Minimum Spanning Tree in Wireless Sensor Networks
Elements of Difficulty Level in Mathematics*
Elements of Difficulty Level in Mathematics*
Elements of Difficulty Level in Mathematics*
Elements of Difficulty Level in Mathematics*
Elements of Difficulty Level in Mathematics*
Elements of Difficulty Level in Mathematics*
Elements of Difficulty Level in Mathematics*
Elements of Difficulty Level in Mathematics*
Elements of Difficulty Level in Mathematics*
Elements of Difficulty Level in Mathematics*
Elements of Difficulty Level in Mathematics*
Elements of Difficulty Level in Mathematics*
Elements of Difficulty Level in Mathematics*
Identify a Specified Fish Species by the Co-occurrence Matrix and AdaBoost
Identify a Specified Fish Species by the Co-occurrence Matrix and AdaBoost
Identify a Specified Fish Species by the Co-occurrence Matrix and AdaBoost
Identify a Specified Fish Species by the Co-occurrence Matrix and AdaBoost
Identify a Specified Fish Species by the Co-occurrence Matrix and AdaBoost
Identify a Specified Fish Species by the Co-occurrence Matrix and AdaBoost
Identify a Specified Fish Species by the Co-occurrence Matrix and AdaBoost
Identify a Specified Fish Species by the Co-occurrence Matrix and AdaBoost
Identify a Specified Fish Species by the Co-occurrence Matrix and AdaBoost
Identify a Specified Fish Species by the Co-occurrence Matrix and AdaBoost
Identify a Specified Fish Species by the Co-occurrence Matrix and AdaBoost
Identify a Specified Fish Species by the Co-occurrence Matrix and AdaBoost
Identify a Specified Fish Species by the Co-occurrence Matrix and AdaBoost
Identify a Specified Fish Species by the Co-occurrence Matrix and AdaBoost
Constraint-Based Verification of Compositions in Safety-Critical Component-Based Systems
Constraint-Based Verification of Compositions in Safety-Critical Component-Based Systems
Constraint-Based Verification of Compositions in Safety-Critical Component-Based Systems
Constraint-Based Verification of Compositions in Safety-Critical Component-Based Systems
Constraint-Based Verification of Compositions in Safety-Critical Component-Based Systems
Constraint-Based Verification of Compositions in Safety-Critical Component-Based Systems
Constraint-Based Verification of Compositions in Safety-Critical Component-Based Systems
Constraint-Based Verification of Compositions in Safety-Critical Component-Based Systems
Constraint-Based Verification of Compositions in Safety-Critical Component-Based Systems
Constraint-Based Verification of Compositions in Safety-Critical Component-Based Systems
Constraint-Based Verification of Compositions in Safety-Critical Component-Based Systems
Constraint-Based Verification of Compositions in Safety-Critical Component-Based Systems
Constraint-Based Verification of Compositions in Safety-Critical Component-Based Systems
Constraint-Based Verification of Compositions in Safety-Critical Component-Based Systems
Constraint-Based Verification of Compositions in Safety-Critical Component-Based Systems
Constraint-Based Verification of Compositions in Safety-Critical Component-Based Systems
Constraint-Based Verification of Compositions in Safety-Critical Component-Based Systems
Constraint-Based Verification of Compositions in Safety-Critical Component-Based Systems
A Polynomial-Time Algorithm for Checking the Equivalence of Deterministic Restricted One-Counter Transducers Which Accept by Final State
A Polynomial-Time Algorithm for Checking the Equivalence of Deterministic Restricted One-Counter Transducers Which Accept by Final State
A Polynomial-Time Algorithm for Checking the Equivalence of Deterministic Restricted One-Counter Transducers Which Accept by Final State
A Polynomial-Time Algorithm for Checking the Equivalence of Deterministic Restricted One-Counter Transducers Which Accept by Final State
A Polynomial-Time Algorithm for Checking the Equivalence of Deterministic Restricted One-Counter Transducers Which Accept by Final State
A Polynomial-Time Algorithm for Checking the Equivalence of Deterministic Restricted One-Counter Transducers Which Accept by Final State
A Polynomial-Time Algorithm for Checking the Equivalence of Deterministic Restricted One-Counter Transducers Which Accept by Final State
A Polynomial-Time Algorithm for Checking the Equivalence of Deterministic Restricted One-Counter Transducers Which Accept by Final State
A Polynomial-Time Algorithm for Checking the Equivalence of Deterministic Restricted One-Counter Transducers Which Accept by Final State
A Polynomial-Time Algorithm for Checking the Equivalence of Deterministic Restricted One-Counter Transducers Which Accept by Final State
A Polynomial-Time Algorithm for Checking the Equivalence of Deterministic Restricted One-Counter Transducers Which Accept by Final State
A Polynomial-Time Algorithm for Checking the Equivalence of Deterministic Restricted One-Counter Transducers Which Accept by Final State
A Polynomial-Time Algorithm for Checking the Equivalence of Deterministic Restricted One-Counter Transducers Which Accept by Final State
A Polynomial-Time Algorithm for Checking the Equivalence of Deterministic Restricted One-Counter Transducers Which Accept by Final State
An Unsupervised Ensemble Approach for Emotional Scene Detection from Lifelog Videos
An Unsupervised Ensemble Approach for Emotional Scene Detection from Lifelog Videos
An Unsupervised Ensemble Approach for Emotional Scene Detection from Lifelog Videos
An Unsupervised Ensemble Approach for Emotional Scene Detection from Lifelog Videos
An Unsupervised Ensemble Approach for Emotional Scene Detection from Lifelog Videos
An Unsupervised Ensemble Approach for Emotional Scene Detection from Lifelog Videos
An Unsupervised Ensemble Approach for Emotional Scene Detection from Lifelog Videos
An Unsupervised Ensemble Approach for Emotional Scene Detection from Lifelog Videos
An Unsupervised Ensemble Approach for Emotional Scene Detection from Lifelog Videos
An Unsupervised Ensemble Approach for Emotional Scene Detection from Lifelog Videos
An Unsupervised Ensemble Approach for Emotional Scene Detection from Lifelog Videos
An Unsupervised Ensemble Approach for Emotional Scene Detection from Lifelog Videos
An Unsupervised Ensemble Approach for Emotional Scene Detection from Lifelog Videos
An Unsupervised Ensemble Approach for Emotional Scene Detection from Lifelog Videos
An Unsupervised Ensemble Approach for Emotional Scene Detection from Lifelog Videos
A Discovery Method of Anteroposterior Correlation for Big Data Era
A Discovery Method of Anteroposterior Correlation for Big Data Era
A Discovery Method of Anteroposterior Correlation for Big Data Era
A Discovery Method of Anteroposterior Correlation for Big Data Era
A Discovery Method of Anteroposterior Correlation for Big Data Era
A Discovery Method of Anteroposterior Correlation for Big Data Era
A Discovery Method of Anteroposterior Correlation for Big Data Era
A Discovery Method of Anteroposterior Correlation for Big Data Era
A Discovery Method of Anteroposterior Correlation for Big Data Era
A Discovery Method of Anteroposterior Correlation for Big Data Era
A Discovery Method of Anteroposterior Correlation for Big Data Era
A Discovery Method of Anteroposterior Correlation for Big Data Era
A Discovery Method of Anteroposterior Correlation for Big Data Era
A Discovery Method of Anteroposterior Correlation for Big Data Era
A Discovery Method of Anteroposterior Correlation for Big Data Era
A Discovery Method of Anteroposterior Correlation for Big Data Era
A Discovery Method of Anteroposterior Correlation for Big Data Era
Increasing the Accuracy of Software Fault Prediction Using Majority Ranking Fuzzy Clustering*
Increasing the Accuracy of Software Fault Prediction Using Majority Ranking Fuzzy Clustering*
Increasing the Accuracy of Software Fault Prediction Using Majority Ranking Fuzzy Clustering*
Increasing the Accuracy of Software Fault Prediction Using Majority Ranking Fuzzy Clustering*
Increasing the Accuracy of Software Fault Prediction Using Majority Ranking Fuzzy Clustering*
Increasing the Accuracy of Software Fault Prediction Using Majority Ranking Fuzzy Clustering*
Increasing the Accuracy of Software Fault Prediction Using Majority Ranking Fuzzy Clustering*
Increasing the Accuracy of Software Fault Prediction Using Majority Ranking Fuzzy Clustering*
Increasing the Accuracy of Software Fault Prediction Using Majority Ranking Fuzzy Clustering*
Increasing the Accuracy of Software Fault Prediction Using Majority Ranking Fuzzy Clustering*
Increasing the Accuracy of Software Fault Prediction Using Majority Ranking Fuzzy Clustering*
Increasing the Accuracy of Software Fault Prediction Using Majority Ranking Fuzzy Clustering*
Increasing the Accuracy of Software Fault Prediction Using Majority Ranking Fuzzy Clustering*
Increasing the Accuracy of Software Fault Prediction Using Majority Ranking Fuzzy Clustering*
Increasing the Accuracy of Software Fault Prediction Using Majority Ranking Fuzzy Clustering*