Skip to main content
Skip to main navigation menu
Skip to site footer
Open Menu
Register
Login
Journals
Home
Current
Archives
Guide for Authors
Policies
Ethical Policy
The Use of Artificial Intelligence Policy
About
About the Journal
Editorial Masthead
Order Journal
Search
Register
Login
Home
/
Archives
/
Vol. 2 No. 3 (2007)
Vol. 2 No. 3 (2007)
Articles
Analyzing Authentication in Kerberos-5 Using Distributed Temporal Protocol Logic
Full PDF
3671
256
Pages:163-171
Open-access
A Fourth Order Dual Method for Iteration Regularization with H-1 Fidelity Based Denoising
Full PDF
3627
279
Pages:172-178
Open-access
Estimating Error Bounds for Non-stationary Binary Subdivision Curves / Surfaces
Full PDF
3817
281
Pages:179-190
Open-access
Generating Multivariate Nonnormal Distribution Random Numbers Based on Copula Function
Full PDF
3719
267
Pages:191-196
Open-access
High Dimensional and Large Numbers of Data Clustering Method Based Sensitive Subspace
Full PDF
3739
263
Pages:197-202
Open-access
Computational Algorithm to Obtain Multiple Positive Solutions for Sublinear Semipositone Problems
Full PDF
3738
262
Pages:203-208
Open-access
Eye Location and Eye State Detection in Facial Images with Unconstrained Background
Full PDF
3606
257
Pages:209-214
Open-access
Exploiting word positional information in ngram model for Chinese text input method
Full PDF
3760
266
Pages:215-222
Open-access
A New Reduction Implementation Based on Concept
Full PDF
3921
278
Pages:223-227
Open-access
Towards Designing and Implementing an Expert Network To Manage the Computer Communication Networks
Full PDF
3633
262
Pages:228-234
Open-access
Research on RBAC-based Separation of Duty Constraints
Full PDF
4029
266
Pages:235-240
Open-access