1 | Information Security Issues Facing Internet Cafe Users
Alfred Thaga Kgopa | 580 |
2 | Weaknesses of Wu-Hwang-Liu's Password Authentication Protocol
Hassan M. Elkamchouchi, and Mohamed Hamdy Eldefrawy | 588 |
3 | Photoconductivity of CdTe Semiconductor Radiation Detectors
Ondrej Sik, and Lubomir Grmela | 591 |
4 | Ubiquitous Computing- A Technological Impact for an Intelligent System
Saju Mathew | 595 |
5 | Link Failure Recovery in WDM Networks
Mallika, and Neeraj Mohan | 599 |
6 | Double P-cycle based Dual failure Survivability
Neeraj Mohan, Seema, Dr. Amit Wason, and Dr. Parvinder S. Sandhu | 603 |
7 | FFT based image registration using corner response
R. Kokila, and P. Thangavel | 607 |
8 | Ternary Function Minimization by Map Method
Vikram R. Ghiye, Dr. A.P. Dhande, and Sharan H. Bonde | 614 |
9 | A Systematic Way to Analyse the Performance of DBDCTO Algorithm With Respect To DTC, Greedy Cost, Max-Min and Min-Min Workflow Scheduling Algorithms U
Gaganpreet Kaur, and Yogesh Kumar | 621 |
10 | Searching and analyzing Arabic text using regular expressions e−Quran case study
Ahmed ARARA, Adel SMEDA, and Ismail ELLABIB | 627 |
11 | Analysis of e-Commerce Application in Macedonia and Albania
Rezarta Zhaku, Majlinda Fetaji, and Bekim Fetaji | 632 |
12 | Analysis of the Implementation of Wimax Technology Using Motorola Canopy: Case Study in Macedonia
Afrim Mehmedi, Rezarta Zhaku, Bekim Fetaji, and Majlinda Fetaji | 638 |