default search action
International Journal of Web Applications, Volume 2
Volume 2, Number 1, 2010
- Moheb R. Girgis, Tarek M. Mahmoud, Tarek Abd El-Hafeez:
A New Effective System for Filtering Pornography Images from Web Pages and PDF Files. 1-13 - Khalil Shihab:
Cooperation of Autonomous Mobile Robots Using an Intelligent Integrated Approach. 14-22 - Jan Vosecky, Dan Hong, Vincent Y. Shen:
User Identification across Social Networks using the Web Profile and Friend Network. 23-34 - Jan Vosecky, Dan Hong, Vincent Y. Shen:
A Quality of Service Aware Routing Using Multiple Paths for TDMA-Based Ad hoc Networks. 35-44 - Saeed Parsa, Amin Shokri:
A Novel Market Learning Algorithm for Grid Resource Allocation. 45-54 - Hongyao Deng, Xiuli Song:
An Advanced Method for Iris Segmentation and Normalization. 55-65
Volume 2, Number 2, 2010
- Melek Oktay, Haci Ali Mantar:
WEDF - Distance Aware Scheduler for Real-Time Applications in Wimax. 83-91 - Haishan Wang, Cheng Ma, Huibo Jia:
Data Transmission System Design on 8b10b. 92-100 - K. Kannan, S. Arumugaperumal:
Performance of Feature level fusion of Multi-focused images using Stationary Wavelet Packet Transform. 101-108 - Lihua Yin, Binxing Fang, Yunchuan Guo, Hui He:
Formalization and Quantitative Analysis of Controllability on Internet Information Security. 109-120 - Zheng Tan, Hanhu Wang, Mei Chen, Xiaoping Zhang:
Improving the Accuracy and Efficiency of CBA Algorithm. 121-128 - Pinaki Mitra, Kamal Baid:
Generation of Targeted Advertisements for Online Social Networks. 129-136 - Veli Hakkoymaz, Ismail Alan:
Design of an Adaptive Security Manager for Distributed Systems. 137-148
Volume 2, Number 3, 2010
- Pierluigi Di Nunzio, Federico Di Gregorio, Giuseppe Rizzo, Antonio Servetti:
Reliable SPARQL queries with consistent results over P2P-shared RDF storage. 151-163 - Peyman Kabiri, Gholam Reza Zargar:
Identification of Effective Optimal Network Feature Set for Probing Attack Detection Using PCA Method. 164-174 - M. Elarbi Boudihir:
A Visual Knowledge-Based Navigation for a Robotic Wheelchair. 175-186 - Timo Koskela, Otso Kassinen, Erkki Harjula, Jani Pellikka, Mika Ylianttila:
Case Study on a Community-Centric Mobile Service Environment. 187-205 - Omaima N. A. Al-Allaf:
The Adoption of Agile Processes in Large Web Development Enterprises: A Survey in Jordan. 206-216
Volume 2, Number 4, 2010
- Sabah S. Al-Fedaghi:
Modeling in Ethics Engineering. 221-236 - Hai Tao, Jasni Mohamad Zain, Ahmed N. Abd Alla, Jing Wang:
An Improved Blind Watermarking Scheme in Wavelet Domain. 237-242 - Serdar Yilmaz:
Gray Level Based Face Detection Using Template Face Mask and L1 norm. 243-249 - Sattam Allahawiah, Haroon Altarawneh, Mohd. M. I. Tarawneh:
A Proposed Theoretical Framework for Software Project Success. 250-260 - Samir Moalla, Sami Yangui:
Discovery of Capacity-driven Web services. 261-279
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.