Issues 1/2, March/June 2013

PagesTitleAuthor(s)Papers
123 - 130Cognitive Topology Mapping based on HumanComputer Interaction

DOI: 10.20533/jitst.2046.3723.2013.0017
Meng Shimin, Cheng Rengui, Liu Yonglin Download Paper
131 - 140Buddy System: Available, Consistent, Durable Web Service Transactions

DOI: 10.20533/jitst.2046.3723.2013.0018
Aspen Olmsted, Csilla Farkas Download Paper
141 - 146Optimizations of a Cryptographic Method Using Gray Scale Digital Images

DOI: 10.20533/jitst.2046.3723.2013.0019
M. Y. R. Gadelha, C. F. F. Costa Filho, M. G. F. Costa Download Paper
147 - 154Performance Evaluation of Trust Based Access Control for XML Databases

DOI: 10.20533/jitst.2046.3723.2013.0020
Norah Farooqi, Siobhan North Download Paper

Issues 3/4, September/December 2013

PagesTitleAuthor(s)Papers
155 - 166Protecting Data Assets in a Smart Grid SOA

DOI: 10.20533/jitst.2046.3723.2013.0021
Markus Jung, Thomas Hofer, Wolfgang Kastner, Susen Döbelt Download Paper
167 - 175Cloud-based NFC Mobile Payments

DOI: 10.20533/jitst.2046.3723.2013.0022
Pardis Pourghomi, Gheorghita Ghinea Download Paper
176 - 184A Comparative Study of Hidden Markov Model and Support Vector Machine in Anomaly Intrusion Detection

DOI: 10.20533/jitst.2046.3723.2013.0023
Ruchi Jain, Nasser S. Abouzakhar Download Paper
185 - 190Mobile Spatial Mapping and Augmented Reality Applications for Environmental Geoscience

DOI: 10.20533/jitst.2046.3723.2013.0024
Westhead R.K., Smith M., Shelley W.A., Pedley R.C., Ford J., Napier B. Download Paper