Journal of Computer Science

Research Article

A New Type of Network Security Protocol Using Hybrid Encryption in Virtual Private Networking

Pages : 672-675

DOI : 10.3844/jcssp.2006.672.675

Published On : September 30, 2006

Adaptive Hybrid Mobile Agent Protocol for Wireless Multihop Internet Access

Pages : 676-682

DOI : 10.3844/jcssp.2006.676.682

Published On : September 30, 2006

An Integrated Approach to Digital Objects Storage and Retrieval

Pages : 683-689

DOI : 10.3844/jcssp.2006.683.689

Published On : September 30, 2006

Ontology-based Knowledge Networks for users' training: The Enterprise Resource Planning (ERP) case

Pages : 690-697

DOI : 10.3844/jcssp.2006.690.697

Published On : September 30, 2006

MFTPM: Maximum Frequent Traversal Pattern Mining with Bidirectional Constraints

Pages : 704-709

DOI : 10.3844/jcssp.2006.704.709

Published On : September 30, 2006

A Backpropagation Neural Network for Computer Network Security

Pages : 710-715

DOI : 10.3844/jcssp.2006.710.715

Published On : September 30, 2006

Tolerances Applied in Combinatorial Optimization

Pages : 716-734

DOI : 10.3844/jcssp.2006.716.734

Published On : September 30, 2006

Data Mining: A Preprocessing Engine

Pages : 735-739

DOI : 10.3844/jcssp.2006.735.739

Published On : September 30, 2006

A framework to Deal with Missing Data in Data Sets

Pages : 740-745

DOI : 10.3844/jcssp.2006.740.745

Published On : September 30, 2006

Design of an IP Library for the Synthesis of Image Compression Systems

Pages : 746-753

DOI : 10.3844/jcssp.2006.746.753

Published On : September 30, 2006

Rotational Linear Discriminant Analysis Using Bayes Rule for Dimensionality Reduction

Pages : 754-757

DOI : 10.3844/jcssp.2006.754.757

Published On : September 30, 2006