Call for Papers - Ongoing round of submission, notification and publication.
    
  
Home    |    Login or Register    |    Contact CSC
By Title/Keywords/Abstract   By Author
Browse CSC-OpenAccess Library.
  • HOME
  • LIST OF JOURNALS
  • AUTHORS
  • EDITORS & REVIEWERS
  • LIBRARIANS & BOOK SELLERS
  • PARTNERSHIP & COLLABORATION
Home   >   CSC-OpenAccess Library   >    Search By Manuscript Authors
CSC-OpenAccess Library
BROWSE BY
Complete List
Subjects
Year / Volume
Current Issues
Issues
Special Issues

EXPLORE PUBLICATIONS BY COUNTRIES

EUROPE
MIDDLE EAST
ASIA
AFRICA
.............................
United States of America
United Kingdom
Canada
Australia
Italy
France
Brazil
Germany
Malaysia
Turkey
China
Taiwan
Japan
Saudi Arabia
Jordan
Egypt
United Arab Emirates
India
Nigeria

SEARCH RESULT FOR "Europe"

Total 1572 records found in CSC-OpenAccess Library.
Page 26 of 79    Previous | Next
When to Ask Participants to Think Aloud: A Comparative Study of Concurrent and Retrospective Think-Aloud Methods
Thamer Alshammari, Obead Alhadreti, Pam J. Mayhew
School of Computing Sciences University of East Anglia Norwich, NR4 7TJ, UK
Pages - 48 - 64     |    Revised - 30-06-2015     |    Published - 31-07-2015
Volume - 6,   Issue - 3, International Journal of Recent Trends in Human Computer Interaction (IJHCI)
Fast Mobile IPv6 Handover Using Link and Location Information
Mahmud Mansour, Mohamed Alnas
Mahmud Faculty of Information Technology Department of Network Engineering Tripoli University Tripoli, Libya
Pages - 174 - 184     |    Revised - 31-05-2015     |    Published - 30-06-2015
Volume - 9,   Issue - 3, International Journal of Computer Science and Security (IJCSS)
Cloud Storage Client Application Analysis
Rakesh Malik, Narasimha Karpoor Shashidhar, Lei Chen
Sam Houston State University
Pages - 1 - 14     |    Revised - 31-05-2015     |    Published - 30-06-2015
Volume - 9,   Issue - 1, International Journal of Security (IJS)
Fixed Point Realization of Iterative LR-Aided Soft MIMO Decoding Algorithm
Mehnaz Rahman, Gwan S. Choi
Texas A&M University
Pages - 14 - 24     |    Revised - 01-05-2015     |    Published - 31-05-2015
Volume - 9,   Issue - 2, Signal Processing: An International Journal (SPIJ)
Reliability of Three-dimensional Photonic Scanner Anthropometry Performed by Skilled and Naïve Operators
Carlo Zancanaro, Chiara Milanese, Christian Lovato, Marco sandri, Andrea Giachetti
Department of Neurological & Movement Sciences University of Verona Verona, I'37134, Italy
Pages - 1 - 11     |    Revised - 01-05-2015     |    Published - 31-05-2015
Volume - 5,   Issue - 1, International Journal of Ergonomics (IJEG)
Sine and Cosine Fresnel Transforms
Habib Hamam
University of Moncton
Pages - 80 - 88     |    Revised - 31-03-2015     |    Published - 30-04-2015
Volume - 9,   Issue - 2, International Journal of Image Processing (IJIP)
A Path Planning Technique For Autonomous Mobile Robot Using Free-Configuration Eigenspaces
Shyba Zaheer, Tauseef Gulrez
T.K.M College of Engineering
Pages - 14 - 28     |    Revised - 31-03-2015     |    Published - 30-04-2015
Volume - 6,   Issue - 1, International Journal of Intelligent Systems and Applications in Robotics (IJRA)
Big Data Analytics on Customer Behaviors with Kinect Sensor Network
Hongye Zhong, Jitian Xiao
School of Computer and Security Science Edith Cowan University WA, 6050
Pages - 36 - 47     |    Revised - 01-03-2015     |    Published - 31-03-2015
Volume - 6,   Issue - 2, International Journal of Recent Trends in Human Computer Interaction (IJHCI)
Storage Virtualization: Towards an Efficient and Scalable Framework
Bilal Y. Siddiqui, Ahmed M. Mahdy
Texas A&M University-Corpus Christi
Pages - 12 - 17     |    Revised - 01-03-2015     |    Published - 31-03-2015
Volume - 7,   Issue - 1, International Journal of Computer Networks (IJCN)
The Principles of Modern Attacks Analysis for Penetration Tester
Adam Ali.Zare Hudaib
Licensed Penetration Tester |EC-Council Certified Ethical Hacker |EC-Council Certified Security Analyst |EC-Council Certified Network Analyst | WireShark University Information & Cyber Security Expert CEH , ECSA , LPT , WCNA
Pages - 22 - 84     |    Revised - 01-03-2015     |    Published - 31-03-2015
Volume - 9,   Issue - 2, International Journal of Computer Science and Security (IJCSS)
You can contact us anytime since we have 24 x 7 support.
Join Us|List of Journals|
    
Copyrights © 2025 Computer Science Journals (CSC Journals). All rights reserved. Privacy Policy | Terms of Conditions