11.
|
Using thematic contexts and previous solutions for maintaining and accessing institutional repositories Delgado, Pablo H. - Maguitman, Ana Gabriela - Ferracutti, Victor M. - Herrera, Luis A.
|
12.
|
Image steganography: hiding short audio messages withidin digital images Khalil, M.I.
|
13.
|
Forward-link throughput optimization for wireless cellular packet data networks Ekpenyong, Moses E.
|
14.
|
Fuzzy classification to classify the income category based on entropy Srinivasan, Vaiyapuri - Govind, Rajenderan - Jagannathan, Vandar Kuzhali - Murugesan, Aruna
|
15.
|
Formal analysis of a novel mutual authentication and key agreement protocol Saraireh, Ja'afer M. al - Saraireh, Saleh S. - Saraireh , Mohammad S. - Nabhan, Mohammad M. al
|
16.
|
A formal structure of separation of duty and trust in modelling delegation policy Ogundele, Oloruntoba Samuel - Adewale, O. S. - Alese, B. K. - Falaki, S. O.
|
17.
|
Fortran refactorings for legacy systems Méndez, Mariano
|
18.
|
Methodology for efficient execution of SPMD applications on multicore clusters Muresano, Ronal
|
19.
|
The seven ages of Fortran Metcalf, Michael
|
20.
|
Multipath fault-tolerant routing policies to deal with dynamic link failures in high speed interconnection networks Zarza, Gonzalo
|