Call for Papers - Ongoing round of submission, notification and publication.
    
  
Home    |    Login or Register    |    Contact CSC
By Title/Keywords/Abstract   By Author
Browse CSC-OpenAccess Library.
  • HOME
  • LIST OF JOURNALS
  • AUTHORS
  • EDITORS & REVIEWERS
  • LIBRARIANS & BOOK SELLERS
  • PARTNERSHIP & COLLABORATION
Home   >   CSC-OpenAccess Library   >    Search By Manuscript Authors
CSC-OpenAccess Library
BROWSE BY
Complete List
Subjects
Year / Volume
Current Issues
Issues
Special Issues

EXPLORE PUBLICATIONS BY COUNTRIES

EUROPE
MIDDLE EAST
ASIA
AFRICA
.............................
United States of America
United Kingdom
Canada
Australia
Italy
France
Brazil
Germany
Malaysia
Turkey
China
Taiwan
Japan
Saudi Arabia
Jordan
Egypt
United Arab Emirates
India
Nigeria

SEARCH RESULT FOR "Malaysia"

Total 806 records found in CSC-OpenAccess Library.
Page 12 of 41    Previous | Next
Testing of Contextual Role-Based Access Control Model (C-RBAC)
Muhammad Nabeel Tahir
Pages - 62 - 75     |    Revised - 20-02-2009     |    Published - 15-03-2009
Volume - 3,   Issue - 1, International Journal of Computer Science and Security (IJCSS)
Integration of Least Recently Used Algorithm and Neuro-Fuzzy System into Client-side Web Caching
Waleed Ali Ahmed, Siti Mariyam Shamsuddin
Pages - 1 - 15     |    Revised - 20-02-2009     |    Published - 15-03-2009
Volume - 3,   Issue - 1, International Journal of Computer Science and Security (IJCSS)
MMI Diversity Based Text Summarization
Mohammed Salem Binwahlan, Naomie Salim , Ladda Suanmali
UTM
Pages - 23 - 33     |    Revised - 20-03-2009     |    Published - 15-03-2009
Volume - 3,   Issue - 1, International Journal of Computer Science and Security (IJCSS)
Separation of Duty and Context Constraints for Contextual Role-Based Access Control (C-RBAC)
Muhammad Nabeel Tahir
Pages - 16 - 26     |    Revised - 20-02-2009     |    Published - 15-03-2009
Volume - 3,   Issue - 1, International Journal of Security (IJS)
Empirical Evaluation of Decomposition Strategy for Wavelet Video Compression
Rohmad Fakeh, Abdul Azim Abd Ghani
Pages - 31 - 54     |    Revised - 20-02-2009     |    Published - 15-03-2009
Volume - 3,   Issue - 1, International Journal of Image Processing (IJIP)
Implementation of Artificial Intelligence Techniques for Steady State Security Assessment in Pool Market
Ibrahim salem saeh, A. Khairuddin
Pages - 1 - 11     |    Revised - 20-02-2009     |    Published - 15-03-2009
Volume - 3,   Issue - 1, International Journal of Engineering (IJE)
Content Modelling for Human Action Detection via Multidimensional Approach
Lili Nurliyana Abdullah, Fatimah Khalid
Pages - 17 - 30     |    Revised - 20-02-2009     |    Published - 15-03-2009
Volume - 3,   Issue - 1, International Journal of Image Processing (IJIP)
Soft Decision Scheme for Multiple Descriptions Coding over Rician Fading Channels
Abdulkarem Hussein Almawgani, Mohd Fadzli Mohd
Pages - 12 - 16     |    Revised - 20-02-2009     |    Published - 15-03-2009
Volume - 3,   Issue - 1, International Journal of Image Processing (IJIP)
Asking Users: A Continuous Evaluation on Systems in a Controlled Environment
Suziah Sulaiman, Dayang Rohaya Awang Rambli, Wan Fatimah Wan Ahmad, Halabi Hasbullah, Foong Oi Mean, M Nordin Zakaria, Goh Kim Nee, Siti Rokhmah M Shukri
Pages - 34 - 42     |    Revised - 20-02-2009     |    Published - 15-03-2009
Volume - 3,   Issue - 1, International Journal of Computer Science and Security (IJCSS)
Experimental Scrutinization on Treatment of Industrial Effluents and Models Representing the Kinetics for Aerobic Digestion
A.M. Saravanan, Singaram Lakshmanan
Pages - 1 - 7     |    Revised - 15-8-2008     |    Published - 15-11-2008
Volume - 2,   Issue - 4, International Journal of Engineering (IJE)
You can contact us anytime since we have 24 x 7 support.
Join Us|List of Journals|
    
Copyrights © 2025 Computer Science Journals (CSC Journals). All rights reserved. Privacy Policy | Terms of Conditions