Home
Editorial Board
Current
Archives
Guide for Authors
Submit Your Paper
Login
Register
Home
Archives
Vol 24 No 2
Review Articles
A program anomaly intrusion detection scheme based on fuzzy inference
Dao Xuan Hoang, Minh Ngoc Nguyen
PDF
Finding upper bounds of component instances with deallocation beyond local scope
Hoang A Truong
PDF
Checking the conformability in CORBA component mode specifications
Tran Thi Mai Thuong, Vo Van Thanh, Truong Ninh Thuan
PDF
Conflicting chip firing games on graphs and on trees
Pham Tra An, Phan Thi Ha Duong, Tran Thi Thu Huong
PDF
Ranking objective interestingness measures with sensitivity values
Hiep Xuan Huynh, Fabrice Guillet, Thang Quyet Le, Henri Briand
PDF
A knowledge management approach of ICT
C. Rosenthal Sabroux, M Grundstein
PDF
Security of information processing based on grid environment
Huey Ming Lee, Tsang Yean Lee, Lily Lin
PDF
Moving parabolic approximation model of point clouds and its application
Zhouwang Yang, Tea Wan Kim
PDF
Published:
2008-06-15