default search action
International Journal of Computing, Volume 15
Volume 15, 2016
- Daniel Reynolds, Richard A. Messner:
Video copy Detection utilizing the Log-Polar Transformation. 8-13 - Rihab Lahouli, Manel Ben-Romdhane, Chiheb Rebai, Dominique Dallet:
Programmable Parallel FBD Sigma Delta ADC Reconstruction stage Design for Software Defined Radio receiver. 14-21 - Oliver Kehret, Andreas Walz, Axel Sikora:
Integration of Hardware Security Modules into a Deeply Embedded TLS Stack. 22-30 - Orest Ivakhiv:
Information State of System estimation. 31-39 - Ruggero Donida Labati, Angelo Genovese, Enrique Muñoz Ballester, Vincenzo Piuri, Fabio Scotti, Gianluca Sforza:
Computational Intelligence for Biometric Applications: a Survey. 40-49 - Robert E. Hiromoto:
Parallelism and Complexity of a Small-World Network Model. 72-83 - Vladimir V. Zhikharevich, Nataliia A. Matsiuk, Sergey E. Ostapov:
Solving the Routing Problem by Ant Colony Optimization Algorithms. 84-91 - Janusz Zalewski:
From CAMAC to Wireless Sensor Networks and Time-triggered Systems and beyond: Evolution of Computer Interfaces for Data Acquisition and control. Part I. 92-106 - Miki Sirola, Jaakko Talonen, Mika Sulkava:
Improving Support estimates by fusion of pre-Election Data. 107-118 - Jerzy Kolakowski, Angelo Consoli, Vitomir Djaja-Josko, Jaouhar Ayadi, Lorenzo Morrigia, Francesco Piazza:
Indoor UWB Positioning in EIGER localization System. 119-126 - Mykhaylo Dorozhovets, Ivanna Bubela:
Computing uncertainty of the Extreme Values in Random samples. 127-135 - Jakub Leszek Pach, Piotr Bilski:
A robust Binarization and Text Line Detection in Historical Handwritten Documents Analysis. 154-161 - Madhav Patil, Tamer Abukhalil, Sarosh H. Patel, Tarek M. Sobh:
Ub Swarm: Hardware Implementation of Heterogeneous Swarm robot with Fault Detection and Power Management. 162-176 - Domas Jonaitis, Vidas Raudonis, Arunas Lipnickas:
Application of numerical Intelligence Methods for the Automatic Quality Grading of an embryo Development. 177-183 - Sergei V. Bezobrazov, Anatoly Sachenko, Myroslav Komar, Vladimir S. Rubanau:
The Methods of Artificial Intelligence for Malicious Applications Detection in Android OS. 184-190 - Timothy Heard, Daryl Johnson:
An Extended Discussion on a High-Capacity Covert channel for the Android Operating System. 191-199 - Diana Zahorodnia, Yuriy R. Pigovsky, Pavlo Bykovyy:
Canny-based method of Image Contour Segmentation. 200-205 - Yuriy P. Kondratenko, Oleksandr S. Gerasin, Andriy M. Topalov:
A simulation Model for robot's slip Displacement Sensors. 224-236 - Hippolyte Djonon Tsague, Bhekisipho Twala:
Investigation of carrier Mobility degradation effects on MOSFET Leakage simulations. 237-247 - Markus Schölzel, Evren Eren, Kai-Oliver Detken, Leonid Schwenke:
Monitoring Android Devices by using Events and Metadata. 248-258 - Nikolay I. Korsunov, Dmitrii A. Toropchin:
The method of Finding the Spam Images based on the Hash of the Key Points of the Image. 259-264
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.