Super User
23 February 2012
Enhancements of A Three-Party Password-Based Authenticated Key Exchange Protocol
Shuhua Wu 1,2,3 , Kefei
Published in
Vol 10, No. 3, May 2013
23 February 2012
Medical Image Segmentation using a Multi-Agent System Approach
Mahsa Chitsaz and Woo
Published in
Vol 10, No. 3, May 2013
23 February 2012
Submesh Allocation in 2D-Mesh Multicomputers:
Partitioning at the Longest Dimension of Requests
Published in
Vol 10, No. 3, May 2013
23 February 2012
Applying Artificial Neural Network and eXtended Classifier System for Network Intrusion Detection
(ANNXCS-NID)
<
Published in
Vol 10, No. 3, May 2013
23 February 2012
Query Dispatching Tool Supporting Fast Access to Data Warehouse
Anmar Aljanabi1, Alaa
Published in
Vol 10, No. 3, May 2013
23 February 2012
A Technique for Handling Range and Fuzzy Match Queries on Encrypted Data
Published in
Vol 10, No. 3, May 2013
23 February 2012
Semantic Method for Query Translation
Mohd Amin Mohd Yunus, Roziati Zainuddin, and
Published in
Vol 10, No. 3, May 2013
23 February 2012
A Dynamic Linkage Clustering using KD-Tree
Shadi Abudalfa1 and Mohammad Mikki2
1
1
Published in
Vol 10, No. 3, May 2013
23 February 2012
Attack Tree Based Information Security Risk Assessment Method Integrating Enterprise Objectives with Vulnerabilities
Published in
Vol 10, No. 3, May 2013
23 February 2012
Implementing New Approach for Enhancing Performance and Throughput in A Distributed Database
Published in
Vol 10, No. 3, May 2013