Issues 1/2, March/June 2013

Pages Title Author(s) Papers
123 - 130 Cognitive Topology Mapping based on HumanComputer Interaction

DOI: 10.20533/jitst.2046.3723.2013.0017
Meng Shimin, Cheng Rengui, Liu Yonglin Download Paper
131 - 140 Buddy System: Available, Consistent, Durable Web Service Transactions

DOI: 10.20533/jitst.2046.3723.2013.0018
Aspen Olmsted, Csilla Farkas Download Paper
141 - 146 Optimizations of a Cryptographic Method Using Gray Scale Digital Images

DOI: 10.20533/jitst.2046.3723.2013.0019
M. Y. R. Gadelha, C. F. F. Costa Filho, M. G. F. Costa Download Paper
147 - 154 Performance Evaluation of Trust Based Access Control for XML Databases

DOI: 10.20533/jitst.2046.3723.2013.0020
Norah Farooqi, Siobhan North Download Paper

Issues 3/4, September/December 2013

Pages Title Author(s) Papers
155 - 166 Protecting Data Assets in a Smart Grid SOA

DOI: 10.20533/jitst.2046.3723.2013.0021
Markus Jung, Thomas Hofer, Wolfgang Kastner, Susen Döbelt Download Paper
167 - 175 Cloud-based NFC Mobile Payments

DOI: 10.20533/jitst.2046.3723.2013.0022
Pardis Pourghomi, Gheorghita Ghinea Download Paper
176 - 184 A Comparative Study of Hidden Markov Model and Support Vector Machine in Anomaly Intrusion Detection

DOI: 10.20533/jitst.2046.3723.2013.0023
Ruchi Jain, Nasser S. Abouzakhar Download Paper
185 - 190 Mobile Spatial Mapping and Augmented Reality Applications for Environmental Geoscience

DOI: 10.20533/jitst.2046.3723.2013.0024
Westhead R.K., Smith M., Shelley W.A., Pedley R.C., Ford J., Napier B. Download Paper