Volume 2 (2013)
Issues 1/2, March/June 2013
Pages | Title | Author(s) | Papers |
123 - 130 | Cognitive Topology Mapping based on HumanComputer Interaction DOI: 10.20533/jitst.2046.3723.2013.0017 |
Meng Shimin, Cheng Rengui, Liu Yonglin | |
131 - 140 | Buddy System: Available, Consistent, Durable Web Service Transactions DOI: 10.20533/jitst.2046.3723.2013.0018 |
Aspen Olmsted, Csilla Farkas | |
141 - 146 | Optimizations of a Cryptographic Method Using Gray Scale Digital Images DOI: 10.20533/jitst.2046.3723.2013.0019 |
M. Y. R. Gadelha, C. F. F. Costa Filho, M. G. F. Costa | |
147 - 154 | Performance Evaluation of Trust Based Access Control for XML Databases DOI: 10.20533/jitst.2046.3723.2013.0020 |
Norah Farooqi, Siobhan North |
Issues 3/4, September/December 2013
Pages | Title | Author(s) | Papers |
155 - 166 | Protecting Data Assets in a Smart Grid SOA DOI: 10.20533/jitst.2046.3723.2013.0021 |
Markus Jung, Thomas Hofer, Wolfgang Kastner, Susen Döbelt | |
167 - 175 | Cloud-based NFC Mobile Payments DOI: 10.20533/jitst.2046.3723.2013.0022 |
Pardis Pourghomi, Gheorghita Ghinea | |
176 - 184 | A Comparative Study of Hidden Markov Model and Support Vector Machine in Anomaly Intrusion Detection DOI: 10.20533/jitst.2046.3723.2013.0023 |
Ruchi Jain, Nasser S. Abouzakhar | |
185 - 190 | Mobile Spatial Mapping and Augmented Reality Applications for Environmental Geoscience DOI: 10.20533/jitst.2046.3723.2013.0024 |
Westhead R.K., Smith M., Shelley W.A., Pedley R.C., Ford J., Napier B. |