A Critical Review of Receipt-Freeness and Coercion-Resistance
Information Technology Journal Volume 8, Number 7, 934-964, 2009
Abstract PDF Fulltext Citations XML References
A Review of Hardware Transactional Memory in Multicore Processors
X. Wang, Zhenzhou Ji, Chen Fu and Mingzeng Hu
Information Technology Journal Volume 8, Number 7, 965-970, 2009
Abstract PDF Fulltext Citations XML References
Off-Line Jawi Handwriting Recognition using Hamming Classification
Z. Razak, N.A. Ghani, E.M. Tamil, M.Y.I. Idris, N.M. Noor, R. Salleh, M. Yaacob, M. Yakub and Z.B.M. Yusoff
Information Technology Journal Volume 8, Number 7, 971-981, 2009
Abstract PDF Fulltext Citations XML References
Blind and Robust Watermarking for Street-Network Vector Maps
Yu-Chi Pu and I-Chang Jou
Information Technology Journal Volume 8, Number 7, 982-989, 2009
Abstract PDF Fulltext Citations XML References
Conditioning for State Space Reduction in Program Model Checking
Information Technology Journal Volume 8, Number 7, 990-997, 2009
Abstract PDF Fulltext Citations XML References
A Process Generation Approach of Dynamic Workflows Based Description Logics
FuXin Zhang and YuYue Du
Information Technology Journal Volume 8, Number 7, 998-1005, 2009
Abstract PDF Fulltext Citations XML References
SRRG: An Effective Self Recovery Routing Game for Mobile Ad hoc Network
Q. Dan-Yang, M. Lin, S. Xue-Jun and X. Yu-Bin
Information Technology Journal Volume 8, Number 7, 1006-1012, 2009
Abstract PDF Fulltext Citations XML References
Performance Study of Cooperative Diversity System over Nakagami-m Fading Channels
Jingning Wang, Xuejun Sha, Linan Sun and Zhongzhao Zhang
Information Technology Journal Volume 8, Number 7, 1013-1019, 2009
Abstract PDF Fulltext Citations XML References
The Application of Value Analysis Based on Kanos Two Dimensions Model and Value Expansion Model
Information Technology Journal Volume 8, Number 7, 1020-1026, 2009
Abstract PDF Fulltext Citations XML References
A Quantum Secure Direct Communication with Authentication
Zu-Ning Chen, Zheng Qin and Lei Lu
Information Technology Journal Volume 8, Number 7, 1027-1032, 2009
Abstract PDF Fulltext Citations XML References
A Study on Unified Term Co-Occurrence Model
Qiao Ya-Nan, Qi Yong and Hou Di
Information Technology Journal Volume 8, Number 7, 1033-1038, 2009
Abstract PDF Fulltext Citations XML References
Inducing Positive and Negative Rules Based on Rough Set
Tinghuai Ma, Jiazhao Leng, Mengmeng Cui and Wei Tian
Information Technology Journal Volume 8, Number 7, 1039-1043, 2009
Abstract PDF Fulltext Citations XML References
An Energy-Aware Cluster-Based Routing Protocol for Wireless Sensor and Actor Network
Zhicheng Dai, Zhi Li, Bingwen Wang and Qiang Tang
Information Technology Journal Volume 8, Number 7, 1044-1048, 2009
Abstract PDF Fulltext Citations XML References
The Design of Firewall in Mobile Phone Based on Cross-Layer Collaboration
Hao Yu, Ming-Xiang He and Hai-Chun Sun
Information Technology Journal Volume 8, Number 7, 1049-1053, 2009
Abstract PDF Fulltext Citations XML References
Modeling Multimedia Synchronization using Petri Nets
Information Technology Journal Volume 8, Number 7, 1054-1058, 2009
Abstract PDF Fulltext Citations XML References
Connectivity Preserving Distributed Coordination Control with Few Long Range Interactions
Dong-Mei Wang and Hua Jing Fang
Information Technology Journal Volume 8, Number 7, 1059-1064, 2009
Abstract PDF Fulltext Citations XML References
Applying SMV for Security Protocol Verification
Jia Mei, Huaikou Miao and Pan Liu
Information Technology Journal Volume 8, Number 7, 1065-1070, 2009
Abstract PDF Fulltext Citations XML References
An Efficient MDC Framework Based on DCT and SPIHT
Information Technology Journal Volume 8, Number 7, 1071-1075, 2009
Abstract PDF Fulltext Citations XML References
Detection on the Period of Long PN Code in DS/SS Signals at Low SNR
Zhong Zhi, Zhao Xintong and Ren Guanghui
Information Technology Journal Volume 8, Number 7, 1076-1079, 2009
Abstract PDF Fulltext Citations XML References
A Novel Approach for MMIC Reliability Testing Based on Weibull Distribution
Zheng-Liang Huang, Fa-Xin Yu, Shu-Ting Zhang, Yao Zheng and Ji-Xin Liu
Information Technology Journal Volume 8, Number 7, 1080-1083, 2009
Abstract PDF Fulltext Citations XML References