To search, Click below search items.
All Published Papers Search Service
Title
Visual Features Comparison of Smartphone and Tablet in Visual Mobile Data Mining Framework
Author
Dr. Muzammil Khan
Vol. 20 No. 5 pp. 44-53
Keywords
Visual Mobile Data Mining framework, Data mining result¡¯s interactivity, Drill down interactive visualization technique, Legend navigation interaction, Mobile device visualization interactivity
How Secure is Your Cloud: Classification of Security Threats and Countermeasures within Cloud Computing
Atif Saeed, Muhmmad Shahid, Mohammed A. Alghamdi, Khalid Masood, Arfan Ali Nagra, Muhmmad Asif
Vol. 20 No. 5 pp. 22-43
Cloud Computing, Cross-VM attacks, Countermeasures, Virtual Machine, Virtualization.
The Role of Small and Medium Enterprises in Achieving Local Development
Tahar Ammar Jouili, Mohamed Anis Allouche
Vol. 20 No. 5 pp. 18-21
Local development, Small and Medium-sized Enterprises, Northern Borders Region.
Process Calculus and Horn Clauses-Based Deduction in the Verification of Security Protocols
Nguyen Truong Thang, Khuat Thanh Son
Vol. 20 No. 5 pp. 11-17
Undecidability, security protocols, process calculus, Horn clauses, formal verification.