Skip to main content
Skip to main navigation menu
Skip to site footer
Open Menu
Register
Login
Journals
Home
Current
Archives
Guide for Authors
Policies
Ethical Policy
The Use of Artificial Intelligence Policy
About
About the Journal
Editorial Masthead
Order Journal
Search
Register
Login
Home
/
Archives
/
Vol. 2 No. 3 (2007)
Vol. 2 No. 3 (2007)
Articles
Analyzing Authentication in Kerberos-5 Using Distributed Temporal Protocol Logic
Full PDF
3662
254
Pages:163-171
Open-access
A Fourth Order Dual Method for Iteration Regularization with H-1 Fidelity Based Denoising
Full PDF
3620
277
Pages:172-178
Open-access
Estimating Error Bounds for Non-stationary Binary Subdivision Curves / Surfaces
Full PDF
3807
278
Pages:179-190
Open-access
Generating Multivariate Nonnormal Distribution Random Numbers Based on Copula Function
Full PDF
3709
264
Pages:191-196
Open-access
High Dimensional and Large Numbers of Data Clustering Method Based Sensitive Subspace
Full PDF
3729
262
Pages:197-202
Open-access
Computational Algorithm to Obtain Multiple Positive Solutions for Sublinear Semipositone Problems
Full PDF
3729
260
Pages:203-208
Open-access
Eye Location and Eye State Detection in Facial Images with Unconstrained Background
Full PDF
3598
255
Pages:209-214
Open-access
Exploiting word positional information in ngram model for Chinese text input method
Full PDF
3751
263
Pages:215-222
Open-access
A New Reduction Implementation Based on Concept
Full PDF
3913
275
Pages:223-227
Open-access
Towards Designing and Implementing an Expert Network To Manage the Computer Communication Networks
Full PDF
3622
257
Pages:228-234
Open-access
Research on RBAC-based Separation of Duty Constraints
Full PDF
4019
265
Pages:235-240
Open-access