×
Log in
Upload File
Most Popular
Study
Business
Design
Technology
Travel
Explore all categories
The top documents of eyas
Ftth Council Ftth Infrastructure Components Deployment Methods
66 views
[Communications in Computer and Information Science] Informatics Engineering and Information Science Volume 254 || Point-to-Point Communication on Gigabit Ethernet and InfiniBand Networks
219 views
[Communications in Computer and Information Science] Informatics Engineering and Information Science Volume 253 || Third Order Accelerated Runge-Kutta Nyström Method for Solving Second-Order
213 views
[Communications in Computer and Information Science] Informatics Engineering and Information Science Volume 253 || Experimental Study of Sensing Performance Metrics for Cognitive Radio
212 views
[Communications in Computer and Information Science] Informatics Engineering and Information Science Volume 252 || Persian Text Summarization Using Fractal Theory
215 views
[Communications in Computer and Information Science] Digital Information and Communication Technology and Its Applications Volume 166 || A Novel Proof of Work Model Based on Pattern
220 views
[Communications in Computer and Information Science] Networked Digital Technologies Volume 88 || Solving the Problem of Flow Shop Scheduling by Neural Network Approach
213 views
[Communications in Computer and Information Science] Informatics Engineering and Information Science Volume 253 || Cluster - Head Selection by Remaining Energy Consideration in a Wireless
213 views
[Communications in Computer and Information Science] Networked Digital Technologies Volume 87 || Multiple Layer Reversible Images Watermarking Using Enhancement of Difference Expansion
212 views
[IEEE 2012 International Conference on Cyber Security, Cyber Warfare and Digital Forensic (CyberSec) - Kuala Lumpur, Malaysia (2012.06.26-2012.06.28)] Proceedings Title: 2012 International
217 views
[Communications in Computer and Information Science] Networked Digital Technologies Volume 88 || Agent Behavior Diagram for Intelligent Agents
217 views
[Communications in Computer and Information Science] Software Engineering and Computer Systems Volume 180 || Computer Security Threats Towards the E-Learning System Assets
216 views
[Communications in Computer and Information Science] Software Engineering and Computer Systems Volume 179 || Zero Watermarking for Text on www Using Semantic Approach
213 views
[Communications in Computer and Information Science] Digital Information and Communication Technology and Its Applications Volume 166 || A Wide Survey on Botnet
217 views
[Communications in Computer and Information Science] Digital Information and Communication Technology and Its Applications Volume 166 || A New Approach of the Cryptographic Attacks
218 views
[Communications in Computer and Information Science] Digital Enterprise and Information Systems Volume 194 || Maturity Assessment of Business/IT Alignment Using Fuzzy Expert System
212 views
[Communications in Computer and Information Science] Networked Digital Technologies Volume 87 || Genetic Cryptanalysis
213 views
[Communications in Computer and Information Science] Informatics Engineering and Information Science Volume 251 || Development of a Dynamic and Intelligent Software Quality Model
216 views
[Communications in Computer and Information Science] e-Technologies and Networks for Development Volume 171 || A Preview Study on UWB Imaging System to Detect Early Breast Tumor
214 views
[Communications in Computer and Information Science] Software Engineering and Computer Systems Volume 180 || The UTLEA: Uniformization of Non-uniform Iteration Spaces in Three-Level
212 views
Next >