Skip to main content
Skip to main navigation menu
Skip to site footer
Open Menu
Register
Login
Journals
Home
Current
Archives
Guide for Authors
Policies
Ethical Policy
The Use of Artificial Intelligence Policy
About
About the Journal
Editorial Masthead
Order Journal
Search
Register
Login
Home
/
Archives
/
Vol. 2 No. 3 (2007)
Vol. 2 No. 3 (2007)
Articles
Analyzing Authentication in Kerberos-5 Using Distributed Temporal Protocol Logic
Full PDF
3717
260
Pages:163-171
Open-access
A Fourth Order Dual Method for Iteration Regularization with H-1 Fidelity Based Denoising
Full PDF
3667
282
Pages:172-178
Open-access
Estimating Error Bounds for Non-stationary Binary Subdivision Curves / Surfaces
Full PDF
3866
290
Pages:179-190
Open-access
Generating Multivariate Nonnormal Distribution Random Numbers Based on Copula Function
Full PDF
3762
278
Pages:191-196
Open-access
High Dimensional and Large Numbers of Data Clustering Method Based Sensitive Subspace
Full PDF
3782
270
Pages:197-202
Open-access
Computational Algorithm to Obtain Multiple Positive Solutions for Sublinear Semipositone Problems
Full PDF
3783
267
Pages:203-208
Open-access
Eye Location and Eye State Detection in Facial Images with Unconstrained Background
Full PDF
3653
261
Pages:209-214
Open-access
Exploiting word positional information in ngram model for Chinese text input method
Full PDF
3809
279
Pages:215-222
Open-access
A New Reduction Implementation Based on Concept
Full PDF
3967
284
Pages:223-227
Open-access
Towards Designing and Implementing an Expert Network To Manage the Computer Communication Networks
Full PDF
3675
267
Pages:228-234
Open-access
Research on RBAC-based Separation of Duty Constraints
Full PDF
4096
280
Pages:235-240
Open-access
Current Visiting IP:216.73.216.118