QoS Protocol Specification for IEEE 802.11 WLAN
Issam JABRI, Adel Soudani, Nicolas Krommenacker, Thierry Divoux and Salem Nasri
Information Technology Journal Volume 7, Number 4, 549-559, 2008
Abstract PDF Fulltext Citations XML References
Color Image Fuzzy Classification Algorithm with Salient Regions
Mingxin Zhang, Junyi Shen and Zhaowei Shang
Information Technology Journal Volume 7, Number 4, 560-569, 2008
Abstract PDF Fulltext Citations XML References
Mobile Broadband: Comparison of Mobile WiMAX and Cellular 3G/3G+ Technologies
Muhammad Khalil Shahid, Tang Shoulian and Ao Shan
Information Technology Journal Volume 7, Number 4, 570-579, 2008
Abstract PDF Fulltext Citations XML References
Minimizing Maximum Tardiness in Single Computer Numerical Control Machine Scheduling with Tool Changes
Ming- Cheng Lo, Jen-Shiang Chen and Yi-Chien Chen
Information Technology Journal Volume 7, Number 4, 580-589, 2008
Abstract PDF Fulltext Citations XML References
On P2P and Hybrid Approaches for Replica Placement in Grid Environment
Qaisar Rasool, Jianzhong Li, Shuo Zhang, Ehsan Ullah Munir and George S. Oreku
Information Technology Journal Volume 7, Number 4, 590-598, 2008
Abstract PDF Fulltext Citations XML References
Replicated R-Resilient Process Allocation for Load Distribution in Fault Tolerant System
Jian Wang, Jianling Sun, xinyu Wang and Hang Chen
Information Technology Journal Volume 7, Number 4, 599-606, 2008
Abstract PDF Fulltext Citations XML References
Constraint Rectangle: A Novel Approach to Modeling Continuously Moving Objects
Peiquan Jin, Xu Zhang, Shouhong Wan and Lihua Yue
Information Technology Journal Volume 7, Number 4, 607-614, 2008
Abstract PDF Fulltext Citations XML References
Design of Portable Personal Information Management System with XML Technique
Information Technology Journal Volume 7, Number 4, 615-622, 2008
Abstract PDF Fulltext Citations XML References
Combination of Model Checking and Theorem Proving to Develop and Verify Embedded Software
Zhong Xu and Xiao Jianyu
Information Technology Journal Volume 7, Number 4, 623-630, 2008
Abstract PDF Fulltext Citations XML References
PRI-Based Communication and Collaboration Between Agents
Liguo Liu and Jianhua Zou
Information Technology Journal Volume 7, Number 4, 631-638, 2008
Abstract PDF Fulltext Citations XML References
Research on Structure Learning of Product Unit Neural Networks by Particle Swarm Optimization
Xian-Hui Wang, Zheng Qin, Xing-Chen Heng and Yu Liu
Information Technology Journal Volume 7, Number 4, 639-646, 2008
Abstract PDF Fulltext Citations XML References
Advance of Dynamic Production-Inventory Strategy for Multiple Policies Using Genetic Algorithm
Information Technology Journal Volume 7, Number 4, 647-653, 2008
Abstract PDF Fulltext Citations XML References
MIMIC-PPT: Mimicking-Based Steganography for Microsoft Power Point Document
Yuling Liu, Xingming Sun, Yongping Liu and Chang-Tsun Li
Information Technology Journal Volume 7, Number 4, 654-660, 2008
Abstract PDF Fulltext Citations XML References
GRFR: Greedy Rumor Forwarding Routing for Wireless Sensor/Actor Networks
Jiming Chen, Jialu Fan, Xianghui Cao and Yousian Sun
Information Technology Journal Volume 7, Number 4, 661-666, 2008
Abstract PDF Fulltext Citations XML References
Performance Evaluation of Reusable Learning Objects in e-Learning System-A Blended Approach to Make-Learning to Work
M.K. Jayanthi, S.K. Srivatsa and T. Ramesh
Information Technology Journal Volume 7, Number 4, 667-672, 2008
Abstract PDF Fulltext Citations XML References
D-S Evidence Theory Based Quality Evaluation Mechanism for Network Services
Zhu Haiping, Li Zengzhi, Wang Yunlan and Chen Yanping
Information Technology Journal Volume 7, Number 4, 673-678, 2008
Abstract PDF Fulltext Citations XML References
MaxStd: A Task Scheduling Heuristic for Heterogeneous Computing Environment
Ehsan Ullah Munir, Jianzhong Li, Shengfei Shi, Zhaonian Zou and Donghua Yang
Information Technology Journal Volume 7, Number 4, 679-683, 2008
Abstract PDF Fulltext Citations XML References
Study on the Capacity of Hopfield Neural Networks
Humayun Karim Sulehria and Ye Zhang
Information Technology Journal Volume 7, Number 4, 684-688, 2008
Abstract PDF Fulltext Citations XML References
Petri Net Methods of Constructing Kleene-Closure Operations of Regular Languages
WenJuan Lian, Hao Fan, YuYue Du and YongQuan Liang
Information Technology Journal Volume 7, Number 4, 689-693, 2008
Abstract PDF Fulltext Citations XML References
A Dynamic Clustering-Based Routing Algorithm for Wireless Senor Networks
Kai Zhou, Limin Meng, Zhijiang Xu, Gang Li and Jingyu Hua
Information Technology Journal Volume 7, Number 4, 694-697, 2008
Abstract PDF Fulltext Citations XML References
Fault Proneness Model for Object-Oriented Software: Design Phase Perspective
R.A. Khan and K. Mustafa
Information Technology Journal Volume 7, Number 4, 698-701, 2008
Abstract PDF Fulltext Citations XML References