Experimental Study on Item-based P-Tree Collaborative Filtering Algorithm for Netflix. [Citation Graph (, )][DBLP]
An Improved Wave Planning Technique For Material-To-Man Order Picking Operation. [Citation Graph (, )][DBLP]
Robustness Testing on Composed Timed Systems. [Citation Graph (, )][DBLP]
A Strategy to Derive RSL Specification from Feature Models. [Citation Graph (, )][DBLP]
Management Automation Specified by SPEM Work Breakdown Element using Workflow Technology. [Citation Graph (, )][DBLP]
Specifying Requirements for Real-Time Systems. [Citation Graph (, )][DBLP]
Adoption of Technology Acceptance Model (TAM) to Electronic Commerce: A Statistical Meta-Analysis Approach. [Citation Graph (, )][DBLP]
Combination of a MANET Data Communication Protocol with a Service Discovery Protocol for Mobile Ad Hoc Networks in a Framework. [Citation Graph (, )][DBLP]
New Techniques and Algorithms for Text Steganography through Hindi Text. [Citation Graph (, )][DBLP]
Security Requirements Engineering: The Mobile Phones Context. [Citation Graph (, )][DBLP]
Checking for Liskov Substitution Principle Compliance in Java Programs. [Citation Graph (, )][DBLP]
Towards a Framework for Automated Random Testing of Aspect-Oriented Programs. [Citation Graph (, )][DBLP]
A Metaheuristic to Solve a Traveling Salesman Problem. [Citation Graph (, )][DBLP]
(m, k)-frame: A Method to Control the Quality of Service in Distributed Multimedia Systems. [Citation Graph (, )][DBLP]
Internal Corporative Security: Protocols Preventing Leakage of Sensitive Information and Assuring Authorized Network Traffic in the Domain of Gaussian Integers. [Citation Graph (, )][DBLP]