Index of /coursework/University/Computer-Science

[ICO]NameLast modifiedSizeDescription

[PARENTDIR]Parent Directory  -  
[   ]failure-of-automation-interaction-complexity-and-failure.doc2013-07-22 11:30 42K 
[   ]Free-Wireless-Access-and-Impact-to-Law-Enforcement.doc2013-03-08 19:40 16K 
[   ]Cybercrime-computer-network.doc2013-03-08 19:36 26K 
[   ]The-'Data-Explosion�-and-its-Implications.doc2013-03-08 19:33 22K 
[   ]Hackers-digital-profiling-and-an-alternative-approach-of-investigation.doc2013-03-08 10:02 53K 
[   ]Punishing-Treating-Preventing.doc2013-03-07 21:13 31K 
[   ]Terrorism-Airports-Security.doc2013-03-07 21:08 62K 
[   ]Technology-Crime-Computers.doc2013-03-07 21:04 49K 
[   ]The-various-Methods-of-data-collection.doc2013-03-02 21:01 28K 
[   ]Computer-cyber-crime-and-child-grooming.doc2013-03-01 21:25 68K 
[   ]crimes-committed-by-the-use-of-computer-systems.doc2013-03-01 21:13 37K 
[   ]computers-which-are-hacked.doc2013-03-01 21:11 34K 
[   ]US-homeland-security-related-critical-infrastructure-matters.doc2013-02-26 19:46 32K 
[   ]The-implications-of-the-use-of-Closed-Circuit-Television.doc2013-02-25 21:54 49K 
[   ]The-role-of-intelligence-in-aviation-security.doc2013-02-25 21:18 47K 
[   ]Keitai-and-Its-Effects-on-Youth.doc2013-02-25 19:41 59K 
[   ]Preoccupation-with-managing-security-and-risk-inevitable.doc2013-02-23 20:33 38K 
[   ]Analysing-digital-evidence-and-computer-crime.doc2013-02-23 20:04 36K 
[   ]Advantages-And-Disadvantages-Of-Data-On-Rape-Crimes-Criminology-Essay.doc2013-02-20 19:13 28K 
[   ]Cad-system-and-building-information-modelling.doc2013-02-20 11:41 30K 
[   ]Developing-a-game.doc2013-02-20 11:31 85K 
[   ]Four-dimensional-computer-aided-design.doc2013-02-19 19:59 41K 
[   ]Traffic-Congestion.doc2013-02-19 15:59 94K 
[   ]Softwares-for-information-and-communication-technology.doc2013-02-19 11:04 53K 
[   ]Project-Data-Warehousing-In-Construction.doc2013-02-18 10:38 41K 
[   ]A-conceptual-description-of-a-framework.doc2013-02-17 16:36 20K 
[   ]A-critical-evaluation-of-web-engineering-tools-technologies.doc2013-02-17 16:35 34K 
[   ]A-database-mail-account.doc2013-02-17 16:30 37K 
[   ]A-computing-and-networking-solution.doc2013-02-17 16:24 44K 
[   ]24-hours-without-being-digital.doc2013-02-17 16:22 18K 
[   ]A-collection-of-commands.doc2013-02-17 16:21 53K 
[   ]A-computer-file-format.doc2013-02-17 16:13 22K 
[   ]About-AODV-protocol.doc2013-02-17 14:30 20K 
[   ]About-c-program.doc2013-02-17 14:29 19K 
[   ]About-amazon.com-website.doc2013-02-17 14:27 35K 
[   ]About-html-and-css.doc2013-02-17 14:25 71K 
[   ]A-tremendous-change.doc2013-02-17 14:24 81K 
[   ]About-world-wide-web.doc2013-02-17 14:18 42K 
[   ]Accessibility-and-usability.doc2013-02-17 14:16 96K 
[   ]Achieving-consistency-and-reusability-in-presentation-layer-design-using-formal-methods-and-design-patterns.doc2013-02-17 14:15 74K 
[   ]About-wireless-networks.doc2013-02-17 14:13 19K 
[   ]About-mp3.doc2013-02-17 14:12 63K 
[   ]About-network-security.doc2013-02-17 14:11 70K 
[   ]About-the-bridge-and-router.doc2013-02-17 14:10 64K 
[   ]A-very-appreciable-freeware.doc2013-02-17 14:09 29K 
[   ]A-network-security.doc2013-02-17 14:08 75K 
[   ]A-methodology-to-build-a-domain.doc2013-02-17 14:07 42K 
[   ]A-microcomputer-system.doc2013-02-17 14:03 33K 
[   ]A-MLP-training.doc2013-02-17 14:02 52K 
[   ]A-summarizing-note-on-the-cases.doc2013-02-17 13:59 74K 
[   ]A-glimpse-on-artificial-intelligence.doc2013-02-17 13:58 19K 
[   ]A-sequential-machine.doc2013-02-17 13:55 112K 
[   ]A-steganography-system.doc2013-02-17 13:53 49K 
[   ]A-new-flexible-software.doc2013-02-17 13:52 131K 
[   ]A-Rich-Internet-Application.doc2013-02-17 13:51 17K 
[   ]A-pivotal-aspect-of-everyday-life.doc2013-02-17 13:48 43K 
[   ]A-popular-lexical-analyzer.doc2013-02-17 13:48 42K 
[   ]An-artificial-neural-network.doc2013-02-16 19:38 169K 
[   ]Although-reusable-software-components.doc2013-02-16 19:35 45K 
[   ]An-exchange-server-or-configuring.doc2013-02-16 19:34 33K 
[   ]An-insight-to-client-server.doc2013-02-16 19:31 45K 
[   ]Analysing-security-issues-and-policies.doc2013-02-16 19:30 55K 
[   ]All-spheres-of-life.doc2013-02-16 19:29 19K 
[   ]An-object-that-groups-multiple.doc2013-02-16 19:27 25K 
[   ]An-optimised-messaging-framework-for-mobile-web-service-clients.doc2013-02-16 19:26 44K 
[   ]Ad-Hoc-routing-protocols-wireless-network.doc2013-02-16 19:25 28K 
[   ]Addresses-fundamental-questions.doc2013-02-16 19:24 56K 
[   ]Adaptive-fast-convergecast-MAC.doc2013-02-16 19:23 86K 
[   ]Adaptive-Query-Processing.doc2013-02-16 19:18 32K 
[   ]Ad-hoc-network.doc2013-02-16 19:17 34K 
[   ]Ad-hoc-and-sensor-networks.doc2013-02-16 19:16 68K 
[   ]After-the-arrival-of-java.doc2013-02-16 19:11 25K 
[   ]Administrator-and-user-activity.doc2013-02-16 19:10 24K 
[   ]Aggregate-data-produced.doc2013-02-16 19:09 68K 
[   ]Agile-development-methods.doc2013-02-16 19:07 29K 
[   ]Air-traffic-control-system.doc2013-02-16 19:06 63K 
[   ]Air-Traffic-Control-System.doc2013-02-16 19:06 63K 
[   ]Agent-based-Systems.doc2013-02-16 19:05 37K 
[   ]Advanced-congestion-control-algorithm.doc2013-02-16 19:02 30K 
[   ]Asynchronous-transfer-mode.doc2013-02-15 19:33 41K 
[   ]Audio-gaming.doc2013-02-15 19:31 105K 
[   ]Asynchronous-JavaScript-and-XML.doc2013-02-15 19:29 33K 
[   ]Assembler-compiler-and-interpreter.doc2013-02-15 19:29 22K 
[   ]Asterisk-is-software.doc2013-02-15 19:28 57K 
[   ]Audio-Steganography.doc2013-02-15 19:27 21K 
[   ]Assembling-a-desktop-computer.doc2013-02-15 19:26 29K 
[   ]Assessment-must-be-the-students-own.doc2013-02-15 19:24 30K 
[   ]Benefits-of-extreme-programming-method-of-development.doc2013-02-15 19:23 22K 
[   ]Automated-public-turing-test.doc2013-02-15 19:22 35K 
[   ]Benefits-of-configuring-mail-on-database.doc2013-02-15 19:18 47K 
[   ]Being-born-into-a-family.doc2013-02-15 19:16 23K 
[   ]Behaviour-finite-state-machine.doc2013-02-15 19:14 23K 
[   ]Automatic-Software-Structural-Testing.doc2013-02-14 23:34 66K 
[   ]Background-of-the-research-domain.doc2013-02-14 21:28 81K 
[   ]Api-represent-network-addresses.doc2013-02-14 21:25 44K 
[   ]Applications-are-dynamic-now-days.doc2013-02-14 21:23 47K 
[   ]Artificial-Intelligent-Browser.doc2013-02-14 21:13 30K 
[   ]Analysis-on-source-code.doc2013-02-14 21:12 55K 
[   ]Arabic-speech-recognition-systems.doc2013-02-14 21:05 41K 
[   ]Artificial-intelligence-and-distinction-between-mind-and-cognition.doc2013-02-14 21:02 51K 
[   ]Applications-of-genetic-algorithm-in-software-testing.doc2013-02-14 21:01 66K 
[   ]Artificial-intelligence-in-natural-language-processing.doc2013-02-14 21:00 53K 
[   ]Applying-formal-methods-to-j2ee-design-patterns.doc2013-02-14 20:57 63K 
[   ]Applications-of-SSL-VPN.doc2013-02-14 20:54 96K 
[   ]Appropriate-routing-protocol.doc2013-02-14 20:53 55K 
[   ]Arabic-e-learning-website.doc2013-02-14 20:51 44K 
[   ]CISCO-System.doc2013-02-14 20:49 97K 
[   ]Checkout-Systems.doc2013-02-14 20:47 53K 
[   ]Characteristics-of-a-good-database-design.doc2013-02-14 20:42 35K 
[   ]Cellular-data-transmission-technologies.doc2013-02-14 20:41 55K 
[   ]Class-of-cryptographic-algorithms.doc2013-02-14 20:37 112K 
[   ]Classes-and-objects.doc2013-02-14 20:33 18K 
[   ]Cloud-Computing-information-and-communication-technology.doc2013-02-14 20:32 25K 
[   ]Cloud-Computing.doc2013-02-14 20:31 27K 
[   ]Cloud-computing-in-the-modern-world.doc2013-02-14 20:29 62K 
[   ]Cloud-computing-and-NGA.doc2013-02-14 20:26 47K 
[   ]Clean-Windows-installation.doc2013-02-14 20:25 63K 
[   ]Client-server-architecture.doc2013-02-14 20:21 34K 
[   ]Bug-tracking-software.doc2013-02-14 20:19 68K 
[   ]Blind-image-deconvolution.doc2013-02-14 20:17 62K 
[   ]Blowfish-is-a-variable-length.doc2013-02-14 20:16 23K 
[   ]Categories-of-client-server-architecture-and-problems-faced-by-hures.doc2013-02-14 20:07 56K 
[   ]Benefits-of-Linux-operating-system.doc2013-02-14 20:05 101K 
[   ]Best-features-of-IPsec.doc2013-02-14 20:00 42K 
[   ]C++-features-with-the-Object-Oriented-Method-(OOM).doc2013-02-14 19:54 132K 
[   ]Build-a-remote-working-network.doc2013-02-14 19:48 92K 
[   ]Bus-networks-topology.doc2013-02-13 20:40 94K 
[   ]3d-computer-graphics-and-web.doc2013-02-13 20:38 23K 
[   ]Computer-hard-drive.doc2013-02-13 20:31 36K 
[   ]Computer-Hardware-and-Software.doc2013-02-13 20:28 58K 
[   ]Computer-gaming.doc2013-02-13 20:26 35K 
[   ]3D-COMPUTER-GRAPHICS.doc2013-02-13 20:24 42K 
[   ]Computer-imaging-techniques.doc2013-02-13 20:22 23K 
[   ]Computer-forensics.doc2013-02-13 20:20 84K 
[   ]Computer-Fraud.doc2013-02-13 20:18 59K 
[   ]Computer-forensic-investigation.doc2013-02-13 20:16 59K 
[   ]Computer-network-and-management.doc2013-02-13 20:13 98K 
[   ]Computer-supported-cooperative-work.doc2013-02-13 20:09 160K 
[   ]Computer-Systems-Architecture.doc2013-02-13 20:05 59K 
[   ]Computer-security-in-information-technology.doc2013-02-13 20:04 49K 
[   ]Computer-security-applications.doc2013-02-13 20:02 105K 
[   ]Computer-networks-have-been-growing-explosively.doc2013-02-13 19:59 124K 
[   ]Computer-Operating-Systems.doc2013-02-13 19:57 55K 
[   ]Computer-Programmer-Job.doc2013-02-13 19:55 19K 
[   ]Common-Vulnerabilities-and-Exposure.doc2013-02-13 19:54 44K 
[   ]4G-Communication-System.doc2013-02-13 19:50 105K 
[   ]Computer-network.doc2013-02-13 19:48 73K 
[   ]Communication-media-for-requirements-engineering.doc2013-02-13 19:45 108K 
[   ]Computer-Cyber-Crime.doc2013-02-13 19:41 71K 
[   ]Code-a-simple-web-server.doc2013-02-13 19:38 36K 
[   ]Computer-aided-diagnosis.doc2013-02-13 19:31 21K 
[   ]COMPUTER-AND-CYBER-CRIME.doc2013-02-13 19:30 29K 
[   ]Computer-and-its-effects-on-human-life.doc2013-02-13 19:28 34K 
[   ]Comparison-of-the-OSI-and-TCP.doc2013-02-12 20:32 39K 
[   ]Computer-controlled-world.doc2013-02-12 20:31 49K 
[   ]Component-Software-Engineering.doc2013-02-12 20:30 55K 
[   ]Indexing-Searching-Methods-Implemented.doc2013-02-12 20:29 47K 
[   ]Components-Software-Engineering.doc2013-02-12 20:28 51K 
[   ]crime-on-the-internet.doc2013-02-12 20:27 76K 
[   ]Creation-of-european-and-mediterranean-digital-preservation-community.doc2013-02-12 20:26 41K 
[   ]Creating-tables-of-pre-joined-data.doc2013-02-12 20:24 24K 
[   ]Creating-a-formal-model-for-the-identification-of-semantic-similarity-between-documents.doc2013-02-12 20:20 25K 
[   ]Croydon-accident-claim-and-hire-and-their-database-management-systems.doc2013-02-12 20:16 55K 
[   ]Current-state-of-IDS.doc2013-02-12 20:15 25K 
[   ]Cyber-terrorism-at-various.doc2013-02-12 20:14 32K 
[   ]Cryptography.doc2013-02-12 20:11 42K 
[   ]Crysis-Game-Software.doc2013-02-12 20:10 39K 
[   ]CUDA-Brook-Parallel.doc2013-02-12 20:09 82K 
[   ]Controlling-the-access.doc2013-02-12 20:07 51K 
[   ]Computing-bus.doc2013-02-12 20:06 41K 
[   ]Computers-are-increasing-day-by-day.doc2013-02-12 20:05 34K 
[   ]Computers-Microcomputer-System.doc2013-02-12 20:04 59K 
[   ]Computing-and-concurrent-system-design.doc2013-02-12 20:03 44K 
[   ]Computer-viruses.doc2013-02-12 20:02 117K 
[   ]Computer-Virus-System.doc2013-02-12 20:01 66K 
[   ]Computer-technology-and-client-server-technology.doc2013-02-12 19:59 36K 
[   ]Computer-utilization-between-the-United-States-and-France.doc2013-02-12 19:58 31K 
[   ]Computer-Systems-Architecture-ACPU-cache.doc2013-02-12 19:57 19K 
[   ]Constructors-in-c++-language.doc2013-02-12 19:56 28K 
[   ]computing-technology.doc2013-02-12 19:55 58K 
[   ]Continual-advancement-of-computer-technology.doc2013-02-12 19:52 45K 
[   ]Constructing-and-designing-a-database.doc2013-02-12 19:50 20K 
[   ]Concepts-of-data-warehouse-and-data-mining.doc2013-02-12 19:49 55K 
[   ]Concepts-of-web-projects.doc2013-02-12 19:48 153K 
[   ]Databases-before-and-since-electronic-computers.doc2013-02-12 19:45 24K 
[   ]Database-systems-development.doc2013-02-11 21:10 25K 
[   ]Database-management-for-information-work.doc2013-02-11 21:04 28K 
[   ]Data-warehouse-bus-matrix.doc2013-02-11 21:03 29K 
[   ]Database-mail-account.doc2013-02-11 21:01 48K 
[   ]Databases-serve-as-the-digital-bank.doc2013-02-11 20:53 16K 
[   ]Definition-of-web-service.doc2013-02-11 20:51 53K 
[   ]Data-over-the-world-wide-web.doc2013-02-11 20:41 87K 
[   ]Cyber-terrorism.doc2013-02-11 20:29 49K 
[   ]Cyberpunk-outlaws-and-hackers-on-the-computer-frontier.doc2013-02-11 20:27 23K 
[   ]Data-information-and-importances-of-sql.doc2013-02-11 20:21 54K 
[   ]Documentation-Of-Information.doc2013-02-11 20:07 62K 
[   ]describing-the-ip-transport-mechanisms.doc2013-02-10 23:13 19K 
[   ]Different-uses-for-spreadsheets.doc2013-02-10 23:08 24K 
[   ]Different-types-of-DBMS.doc2013-02-10 23:07 60K 
[   ]Different-processes-of-software-engineering.doc2013-02-10 23:05 24K 
[   ]Digital-Ants-as-Network-Guards.doc2013-02-10 23:03 16K 
[   ]Digital-data-communications.doc2013-02-10 23:00 27K 
[   ]Different-possibilities-of-allocating-IP.doc2013-02-10 23:00 39K 
[   ]Digital-library-services.doc2013-02-10 22:59 25K 
[   ]Different-firewall-architecture.doc2013-02-10 22:54 49K 
[   ]Different-malicious-programs.doc2013-02-10 22:51 45K 
[   ]Different-lan-technologies.doc2013-02-10 22:50 22K 
[   ]Data-mining-cluster-analysis.doc2013-02-10 22:49 42K 
[   ]Data-mining-and-knowledge-discovery.doc2013-02-10 22:48 48K 
[   ]Data-mining-and-semantic-web.doc2013-02-10 22:47 47K 
[   ]Data-models.doc2013-02-10 22:46 31K 
[   ]Data-mining-and-its-significance.doc2013-02-10 22:45 34K 
[   ]Data-mining-will-happen.doc2013-02-10 22:44 39K 
[   ]Designing-a-web-based-postgraduate-application-system-for-university-al-j-al-gharbe.doc2013-02-10 22:42 36K 
[   ]Denial-of-Service-(DoS)-attacks.doc2013-02-09 23:19 28K 
[   ]Dependability-explicit-computing.doc2013-02-09 21:29 99K 
[   ]GIS-Visualization-Web-Services.doc2013-02-09 21:24 36K 
[   ]Developing-an-appropriate-and-accurate-client-and-architecture-for-the-hures.doc2013-02-09 21:20 52K 
[   ]Development-of-digital-terrain-model.doc2013-02-09 21:14 47K 
[   ]Developed-hierarchical-network-model.doc2013-02-09 21:09 18K 
[   ]Designing-an-olap-solution-architecture-by-using-microsoft-sql-server-2008.doc2013-02-09 21:08 167K 
[   ]Enhanced-Interior-Gateway-Routing-Protocol-(EIGRP).doc2013-02-09 21:05 88K 
[   ]Developing-a-quality-database.doc2013-02-09 21:03 19K 
[   ]Internet-message-access-protocol.doc2013-02-09 21:02 41K 
[   ]Dynamic-Data-Mining.doc2013-02-09 20:57 51K 
[   ]Editor-for-single-user-interface.doc2013-02-09 20:55 17K 
[   ]Dynamic-Systems-Development-Method-(DSDM).doc2013-02-09 20:53 54K 
[   ]Dynamic-unicast-addressing.doc2013-02-09 20:52 30K 
[   ]Effect-of-information-privacy.doc2013-02-09 20:45 53K 
[   ]Embedded-multimedia-and-today's-web-development-environment.doc2013-02-09 20:44 20K 
[   ]Emerging-technologies.doc2013-02-09 20:42 41K 
[   ]During-the-last-decade.doc2013-02-09 20:40 44K 
[   ]Eliminating-handoff-latencies-in-802.11-wlans-using-multiple-radios.doc2013-02-09 20:38 36K 
[   ]Effect-of-using-different-codes-for-Power-reduction.doc2013-02-09 20:34 32K 
[   ]Effects-of-GPS-on-Human-Life.doc2013-02-09 20:31 30K 
[   ]Distributed-behavioural-model.doc2013-02-09 20:30 44K 
[   ]Distributed-Firewalls.doc2013-02-09 20:28 28K 
[   ]DiLERN-for-digital-library-education.doc2013-02-09 20:27 59K 
[   ]DISTRIBUTED-DENIAL-OF-SERVICE.doc2013-02-09 20:25 22K 
[   ]Distributed-Denial-of-Service-(DDOS).doc2013-02-09 20:24 28K 
[   ]Display-the-slides-for-this-course.doc2013-02-09 20:23 102K 
[   ]Duplicate-Data-Semantic.doc2013-02-09 20:05 89K 
[   ]Dcumentation-of-information.doc2013-02-09 14:20 28K 
[   ]Distributed-System.doc2013-02-09 14:11 74K 
[   ]Distributed-system-transations.doc2013-02-09 14:10 26K 
[   ]Factors-for-a-reliable-wed-site.doc2013-02-09 14:07 22K 
[   ]Extraction-Indexing-Keyphrases.doc2013-02-09 14:04 78K 
[   ]Exploring-cloud-computing.doc2013-02-09 13:59 78K 
[   ]Fast-multiport-bridge.doc2013-02-09 13:58 59K 
[   ]Existence-of-video-games.doc2013-02-09 13:56 20K 
[   ]Feature-extraction-using-crossing-number-(cn)-and-ridge-tracking-technique.doc2013-02-09 13:53 47K 
[   ]Firewall-Network-Traffic.doc2013-02-09 13:51 37K 
[   ]First-instance-to-explain.doc2013-02-09 13:50 46K 
[   ]Filters-all-network-traffic.doc2013-02-09 13:47 46K 
[   ]Features-of-grid-computing.doc2013-02-09 13:45 91K 
[   ]File-transfer-application.doc2013-02-09 13:44 25K 
[   ]File-transfer-–-security-importance-protocols.doc2013-02-09 13:43 47K 
[   ]Enhancing-three-dimensional-image-ray-tracing-to-predict-the-propagation-channel-parameters.doc2013-02-09 13:37 31K 
[   ]Enhanced-database-systems.doc2013-02-09 13:36 35K 
[   ]Engineering-application-grimblebot-report.doc2013-02-09 13:35 53K 
[   ]Establishing-a-Web-Presence-for-Myself.doc2013-02-09 13:23 34K 
[   ]Essay-about-Data-Information-and-Knowledge.doc2013-02-09 13:21 17K 
[   ]Growth-of-internet.doc2013-02-09 13:18 55K 
[   ]Growth-of-information.doc2013-02-09 13:17 157K 
[   ]Granularity-in-granular-computing.doc2013-02-09 13:15 31K 
[   ]Grid-computing-with-XML-web-services.doc2013-02-09 13:14 87K 
[   ]Hacker-Security-Technology.doc2013-02-09 13:13 30K 
[   ]Graphics-file-formats.doc2013-02-09 13:10 24K 
[   ]Grid-computing-infrastructures.doc2013-02-09 13:09 132K 
[   ]Hierarchical-Mobile-Wireless-Cellular.doc2013-02-09 13:07 44K 
[   ]Historical-reporting-of-security.doc2013-02-09 13:05 45K 
[   ]Government-website-on-the-internet.doc2013-02-09 13:04 33K 
[   ]High-level-programming-languages.doc2013-02-09 13:03 36K 
[   ]Hardware-practice-and-networks.doc2013-02-09 13:00 29K 
[   ]Global-System-for-Mobile-Communications.doc2013-02-09 12:57 132K 
[   ]3G-mobile-system.doc2013-02-09 12:55 57K 
[   ]Fuzzy-based-approach-for-predicting-software-development-effort.doc2013-02-09 12:52 117K 
[   ]Forensic-data-recovery.doc2013-02-09 12:49 30K 
[   ]Google-chrome-OS.doc2013-02-09 12:49 19K 
[   ]For-security-shell.doc2013-02-07 22:50 19K 
[   ]Global-positioning-system-and-programmable-intelligent-computer.doc2013-02-07 22:46 31K 
[   ]Gaming-Processor-Ram.doc2013-02-07 22:45 52K 
[   ]The-gnutella-software.doc2013-02-07 22:44 40K 
[   ]Generation-of-initial-centroids.doc2013-02-07 22:43 64K 
[   ]GIS-Network-Genetic.doc2013-02-07 22:42 131K 
[   ]Identify-Robot-Using-RFID.doc2013-02-07 22:41 39K 
[   ]Identifying-present-network-services-in-home-environment-and-developing-a-total-home-network-solution-box.doc2013-02-07 22:40 78K 
[   ]Identify-areas-of-security-risk.doc2013-02-07 22:38 40K 
[   ]Illegal-production-of-computer-software.doc2013-02-07 22:37 22K 
[   ]Identification-of-major-technologies-and-protocols-involved-in-the-client-side-of-a-web-application.doc2013-02-07 22:36 64K 
[   ]Implementation-of-the-data-gloves-in-various-fields.doc2013-02-07 21:55 110K 
[   ]Image-denoising-based-on-double-density.doc2013-02-07 21:54 67K 
[   ]Web-2.0-and-its-implementation-in-national-aeronautics-and-space-administration-(nasa).doc2013-02-07 21:53 46K 
[   ]Implementation-of-terrain-rendering.doc2013-02-07 21:52 38K 
[   ]Implementation-and-investigation-of-virtualisation-and-load-balancing.doc2013-02-07 21:50 66K 
[   ]Impact-of-social-networking.doc2013-02-07 21:48 51K 
[   ]Image-hatching-for-visual-cryptography.doc2013-02-07 21:48 57K 
[   ]Image-processing-applications.doc2013-02-07 21:46 30K 
[   ]Impact-of-information-technology-on-banking.doc2013-02-07 21:45 183K 
[   ]How-the-topologies-operate.doc2013-02-07 21:34 118K 
[   ]How-can-we-effectively-use-the-internet-for-research.doc2013-02-07 21:23 36K 
[   ]Horizontal-and-vertical-handover-in-wireless-and-cellular-environment.doc2013-02-07 21:22 216K 
[   ]Home-shopping-online-experience-database-project.doc2013-02-07 21:18 181K 
[   ]History-of-computers.doc2013-02-07 10:54 131K 
[   ]Hyper-text-transfer-protocol.doc2013-02-07 10:52 49K 
[   ]Human-information-interaction-and-collaborative-information-retrieval.doc2013-02-07 10:48 24K 
[   ]Human-computer-interaction2.doc2013-02-07 10:47 36K 
[   ]Human-agent-negotiations.doc2013-02-07 10:46 45K 
[   ]Human-computer-interface.doc2013-02-07 10:45 21K 
[   ]In-Software-industry-Software-reuse.doc2013-02-07 10:44 57K 
[   ]In-the-present-day.doc2013-02-07 10:42 53K 
[   ]In-the-area-of-Information-System.doc2013-02-07 10:41 40K 
[   ]Indexing.doc2013-02-07 10:32 23K 
[   ]Increasing-efficiency-of-wireless-netork-using-multicast-algorithm.doc2013-02-07 10:31 113K 
[   ]Individual-report-on-usb-flash-drives.doc2013-02-07 10:29 24K 
[   ]individual-private-home-networks.doc2013-02-07 10:27 144K 
[   ]Increasing-number-of-ubiquitous-devices.doc2013-02-07 10:24 28K 
[   ]Indexing-only-need-one-lookup.doc2013-02-07 10:23 24K 
[   ]In-the-use-of-metadata.doc2013-02-07 10:22 30K 
[   ]Importances-of-agile-software-engineering-and-its-mathodologies.doc2013-02-07 10:21 47K 
[   ]importance-of-quality-database-design.doc2013-02-07 10:18 50K 
[   ]Importance-of-software-testing-process-in-software-development-engineering.doc2013-02-07 10:16 33K 
[   ]implementation.doc2013-02-06 23:59 84K 
[   ]The-Benefits-of-Computer-Information-Systems.doc2013-02-06 23:56 21K 
[   ]Implementation-Testing-Justification.doc2013-02-06 23:54 72K 
[   ]Importance-of-network-security.doc2013-02-06 23:52 55K 
[   ]Improving-integration-of-mobile-web-applications-with-networks.doc2013-02-06 23:49 37K 
[   ]In-computer-term-vulnerability.doc2013-02-06 23:46 118K 
[   ]In-flat-routing-algorithms.doc2013-02-06 23:44 22K 
[   ]Importances-of-data-mining-and-data-warehouse-in-database-management-systems.doc2013-02-05 20:36 50K 
[   ]In-front-of-a-computer.doc2013-02-05 20:34 19K 
[   ]Improvements-for-scalable-and-accurate-plagiarism-detection-in-digital-documents.doc2013-02-05 20:31 52K 
[   ]Internet-Protocol-Television-(IPTV).doc2013-02-05 20:30 39K 
[   ]Internet-protocol-(ipv4).doc2013-02-05 20:29 60K 
[   ]Internet-is-transforming-enterprise-networking.doc2013-02-05 20:27 63K 
[   ]Internet-communication-services.doc2013-02-05 20:26 78K 
[   ]internet-technologies-help-foreign-people-with-learning-languages.doc2013-02-05 20:25 185K 
[   ]Internet-and-web-programming.doc2013-02-05 20:23 41K 
[   ]Internet-as-medium-getaway.doc2013-02-05 20:21 37K 
[   ]Introduction-to-neural-network.doc2013-02-05 20:19 93K 
[   ]Internet-technology-and-its-security.doc2013-02-05 20:17 61K 
[   ]Introduction-to-hacking.doc2013-02-05 20:16 83K 
[   ]Internet-and-social-life.doc2013-02-05 20:15 110K 
[   ]Introduction-to-Fuzzy-Logic.doc2013-02-05 20:13 59K 
[   ]Introduces-series-parallel-signing-group.doc2013-02-05 20:11 50K 
[   ]Internet-Web-Security.doc2013-02-05 20:10 60K 
[   ]Internet_-web-technology-and-security.doc2013-02-05 20:09 29K 
[   ]Internet:-web-technology-and-security.doc2013-02-05 20:09 29K 
[   ]Introduce-computers.doc2013-02-05 20:08 28K 
[   ]To-say-that-Internet-has-become-an-important-commodity.doc2013-02-05 20:06 171K 
[   ]Information-Strategy-Competitive.doc2013-02-05 20:03 47K 
[   ]Information-systems.doc2013-02-05 20:02 25K 
[   ]Information-security-training-for-mnscu-campus-technical-staff.doc2013-02-05 20:01 36K 
[   ]Information-security-officer.doc2013-02-05 19:59 41K 
[   ]Information-seeking-model.doc2013-02-05 19:53 53K 
[   ]International-diploma-in-computer-science.doc2013-02-05 19:50 63K 
[   ]Installing-ubuntu-linux.doc2013-02-04 19:32 58K 
[   ]Integrating-data.doc2013-02-04 19:31 29K 
[   ]kinds-of-virus.doc2013-02-04 19:26 32K 
[   ]Knowledge-deal-with-java-programming.doc2013-02-04 19:25 96K 
[   ]Lack-of-infrastructure.doc2013-02-04 19:23 58K 
[   ]Knowledge-Base.doc2013-02-04 19:22 24K 
[   ]Latest-mobile-and-wireless-technologies.doc2013-02-04 19:19 31K 
[   ]Legal-Issues-of-Social-Networking-Sites.doc2013-02-04 19:17 65K 
[   ]Latest-technological-development.doc2013-02-04 18:51 35K 
[   ]IP6-over-ip4-arguments.doc2013-02-04 18:47 23K 
[   ]IP-switching.doc2013-02-04 18:42 88K 
[   ]Inventory-Systems-Using-Relational-Database-Systems.doc2013-02-04 18:37 131K 
[   ]How-does-Yield-Keyword-of-CUse-Lazy-Evaluation.doc2013-02-04 18:32 27K 
[   ]Intrusion-Detection-System-Tool.doc2013-02-04 18:26 115K 
[   ]Investigation-of-zero-knowledge-protocols.doc2013-02-04 18:17 67K 
[   ]Kerberos-Authentication.doc2013-02-04 18:10 49K 
[   ]Java-and-web-programming-languages.doc2013-02-04 18:02 175K 
[   ]Joint-Strategic-Initiative-Acceptable-Use-Policy.doc2013-02-04 17:59 34K 
[   ]Macintosh-operating-system.doc2013-02-04 17:52 18K 
[   ]Major-system-files-of-windows-xp.doc2013-02-02 20:15 22K 
[   ]Many-possible-network-topologies.doc2013-02-02 20:06 41K 
[   ]MAC-OS-X.doc2013-02-02 19:56 20K 
[   ]Major-reconciliation-mechanisms.doc2013-02-02 19:55 97K 
[   ]Mac-OS-X-is-the-world's-most-advanced-operating-system..doc2013-02-02 19:51 66K 
[   ]Linux-.doc2013-02-02 19:44 19K 
[   ]Linux.doc2013-02-02 19:43 9.0K 
[   ]Mobile-computing.doc2013-02-02 19:40 32K 
[   ]Microsoft-Windows-CE.doc2013-02-02 19:39 17K 
[   ]Model-and-uses-of-the-software-testing-process.doc2013-02-02 19:35 20K 
[   ]MICROSOFT-WINDOWS-7.doc2013-02-02 19:32 40K 
[   ]Migration-between-routing-protocols-in-a-specific-environment-Westminster-LEA-network-and-key-issues-of-EIGRP.doc2013-02-02 19:31 46K 
[   ]Most-popular-amongst-the-home-users.doc2013-02-02 19:29 28K 
[   ]Models-of-computation.doc2013-02-02 19:27 55K 
[   ]MICROPROCESSOR-VS-SUPERCOMPUTER.doc2013-02-02 19:23 57K 
[   ]Modifying-an-Authorization-Right.doc2013-02-02 19:16 19K 
[   ]Modulation-Technique.doc2013-02-02 19:13 21K 
[   ]Microchip-implantation.doc2013-02-02 19:08 20K 
[   ]Microprocessor-Game-Components.doc2013-02-02 19:07 26K 
[   ]Mashups-Application-Widget.doc2013-02-02 18:40 28K 
[   ]Micro-Processor-CPU.doc2013-02-02 18:37 71K 
[   ]Micro-electro-mechanical-systems-(MEMS)-technology.doc2013-02-02 18:35 57K 
[   ]Microcomputer-CPU-Processing.doc2013-02-02 18:34 26K 
[   ]Microcomputer-Games-Software.doc2013-02-02 18:32 42K 
[   ]Most-WLAN-hardwares.doc2013-02-02 18:28 21K 
[   ]Micro-operations-are-the-operation.doc2013-02-02 18:26 22K 
[   ]Microelectronics-and-nano-electronics.doc2013-02-02 18:25 21K 
[   ]Methodologies.doc2013-02-02 18:15 18K 
[   ]Media-formats-and-storage-mechanisms-for-3d-web-prototype.doc2013-02-02 18:14 22K 
[   ]Massively-Parallel-Computation.doc2013-02-02 18:09 46K 
[   ]Level-of-automation.doc2013-02-01 19:12 46K 
[   ]Leveraging-the-benefits-from-internet.doc2013-02-01 19:06 26K 
[   ]Literature-review-about-data-warehouse.doc2013-02-01 19:05 113K 
[   ]Local-area-network.doc2013-02-01 19:03 52K 
[   ]Logical-and-physical-network-design.doc2013-02-01 19:01 33K 
[   ]Local-area-network-investigation.doc2013-02-01 19:00 148K 
[   ]Linux-terminal-server-project.doc2013-02-01 18:58 55K 
[   ]Linux-is-a-powerful-non-proprietary-standards-based-operating-system.doc2013-02-01 18:54 19K 
[   ]Mobile-ad-hoc-networks.doc2013-02-01 18:48 99K 
[   ]Microcomputer-applications-for-technology.doc2013-01-31 20:01 27K 
[   ]Network-load-detection.doc2013-01-31 19:44 42K 
[   ]Network-learning.doc2013-01-31 19:42 99K 
[   ]Network-devices.doc2013-01-31 19:40 97K 
[   ]Network-Matrix-Reduction.doc2013-01-31 19:38 35K 
[   ]Network-media.doc2013-01-31 19:36 82K 
[   ]Network-Services.doc2013-01-31 19:32 122K 
[   ]Network-security-weaknesses.doc2013-01-31 19:30 25K 
[   ]Network-router-simulation.doc2013-01-31 19:27 21K 
[   ]Network-congestion.doc2013-01-31 19:18 38K 
[   ]Network-based-IDSs-and-Host-Based-IDS.doc2013-01-31 19:16 46K 
[   ]Need-and-practical-application-of-objects.doc2013-01-31 19:14 28K 
[   ]Necessary-to-discuss.doc2013-01-31 19:12 42K 
[   ]Natural-language-processing.doc2013-01-31 19:10 41K 
[   ]Needs-of-personal-computers-and-its-its-impacts-on-environment.doc2013-01-31 19:08 37K 
[   ]Microsoft-windows-2000;-NetBIOS.doc2013-01-31 19:00 37K 
[   ]Network-architects.doc2013-01-31 18:55 23K 
[   ]Network-address-translation.doc2013-01-31 18:49 26K 
[   ]Myanma-Computer-Company-Ltd.doc2013-01-31 18:41 18K 
[   ]Microprocessor-and-central-processing-unit.doc2013-01-31 18:25 22K 
[   ]Mining-model-algorithm-and-data-mining-algorithm-used-in-sql-server.doc2013-01-31 18:23 33K 
[   ]social-networking.doc2013-01-31 11:18 16K 
[   ]Social-networking.doc2013-01-31 11:18 16K 
[   ]Subset-of-a-group-of-technologies.doc2013-01-30 22:47 65K 
[   ]Strategic-information-systems-planning.doc2013-01-30 21:41 53K 
[   ]Motherboard-CPU-RAM.doc2013-01-26 23:36 38K 
[   ]Multiple-realisation-argument.doc2013-01-26 21:59 17K 
[   ]Multimedia-Communication-Systems.doc2013-01-26 21:57 55K 
[   ]Motion-capture-technique.doc2013-01-26 21:53 23K 
[   ]Movie-trailers-streamed.doc2013-01-26 21:44 213K 
[   ]Multimedia-Broadband-WiMAX.doc2013-01-26 21:39 75K 
[   ]Multi-resolution-mesh-morphing.doc2013-01-26 21:36 27K 
[   ]Multi-sensor-data-fusion-and-integration.doc2013-01-26 21:33 122K 
[   ]My-academic-report.doc2013-01-26 21:29 31K 
[   ]Object-oriented-programming-with-subclasses.doc2013-01-26 21:10 26K 
[   ]Operating-system's-file-system-structure.doc2013-01-26 21:02 155K 
[   ]Object-Oriented-Testing.doc2013-01-26 20:58 125K 
[   ]Open-Source-Software.doc2013-01-26 20:55 55K 
[   ]Object-oriented-concepts-of-java.doc2013-01-26 20:42 23K 
[   ]Newest-software-and-hardware-tools.doc2013-01-26 20:41 38K 
[   ]Non-functional-requirements-with-the-data-mining.doc2013-01-26 20:20 38K 
[   ]Object-oriented-analysis-and-design.doc2013-01-26 20:15 53K 
[   ]OLAP-data-models.doc2013-01-26 20:03 43K 
[   ]One-of-the-main-concerns.doc2013-01-26 19:41 42K 
[   ]Open-source-operating-systems-vs.-microsoft-windows.doc2013-01-26 17:45 53K 
[   ]New-version-of-the-internet-protocol.doc2013-01-26 17:43 150K 
[   ]The-network.doc2013-01-26 17:29 23K 
[   ]Network-transmission-method-methodology.doc2013-01-26 17:23 24K 
[   ]Network-topology.doc2013-01-26 17:18 96K 
[   ]Networks-and-Operating-Systems.doc2013-01-25 20:06 89K 
[   ]New-claims-payment-system.doc2013-01-25 20:03 41K 
[   ]Networking-technologies-and-security-systems.doc2013-01-25 20:01 24K 
[   ]Networking-hardware-components.doc2013-01-25 20:00 44K 
[   ]Parallel-processing.doc2013-01-25 19:57 55K 
[   ]Parallel-stereoscopic-video-images-quality-assessment.doc2013-01-25 19:55 24K 
[   ]Paper-reading-report_-motion-synthesis-from-annotations.doc2013-01-25 19:53 26K 
[   ]Paper-reading-report:-motion-synthesis-from-annotations.doc2013-01-25 19:53 26K 
[   ]Partially-importing-the-ontologies.doc2013-01-25 19:51 31K 
[   ]Pakistan's-telecommunication-authority-to-block-access-to-youtube.doc2013-01-25 19:46 35K 
[   ]OSPF-EIGRP-with-CISCO-products-over-ISP-level-network-2009.doc2013-01-25 19:44 154K 
[   ]OS-Platforms-and-Computer-Technologies.doc2013-01-25 19:41 17K 
[   ]Overview-of-positioning-system.doc2013-01-25 19:40 117K 
[   ]Packet-Routing-Network.doc2013-01-25 19:36 78K 
[   ]Patient-OS-installation-guide.doc2013-01-25 19:33 35K 
[   ]Popularity-of-multimedia-transmissions.doc2013-01-25 19:25 44K 
[   ]Power-Over-Ethernet.doc2013-01-25 19:22 19K 
[   ]Pre-processing.doc2013-01-25 19:21 17K 
[   ]Present-and-the-future-market-scenario-of-software-components.doc2013-01-25 19:19 31K 
[   ]Plan-to-build-Intel-microprocessor.doc2013-01-25 19:14 50K 
[   ]Preserving-the-digital-information.doc2013-01-25 19:04 27K 
[   ]Performance-evaluation-of-CDMA.doc2013-01-24 21:54 25K 
[   ]Peer-to-peer-networks.doc2013-01-24 21:52 38K 
[   ]Performance-simulation-of-WiMAX-in-HD-video-streaming.doc2013-01-24 21:50 68K 
[   ]Personalization.doc2013-01-24 21:48 61K 
[   ]Phases-of-software-engineering.doc2013-01-24 21:47 70K 
[   ]Pervasive-systems.doc2013-01-24 21:44 35K 
[   ]Optical-Flow-Computation-Methods.doc2013-01-24 21:42 44K 
[   ]Preserving-memories-of-life.doc2013-01-24 21:40 36K 
[   ]OS-Features.doc2013-01-24 21:38 39K 
[   ]Optics-Communication-Light.doc2013-01-24 21:37 88K 
[   ]Optimized-secure-network-coding-algorithms.doc2013-01-24 21:35 59K 
[   ]Optimal-level-of-performance.doc2013-01-24 21:34 56K 
[   ]Programming-languages-and-their-types-and-uses.doc2013-01-24 21:31 49K 
[   ]Program-called-firewall.doc2013-01-24 21:29 82K 
[   ]Range-of-data-items.doc2013-01-24 21:28 69K 
[   ]Pretty-good-privacy.doc2013-01-24 21:26 38K 
[   ]Public-key-infrastructure.doc2013-01-24 21:24 21K 
[   ]Protocol-Network-System.doc2013-01-24 21:19 167K 
[   ]Project-preparation-essay.doc2013-01-24 21:16 35K 
[   ]Protocol-Wireless-Nodes.doc2013-01-24 21:14 73K 
[   ]Prototype.doc2013-01-24 21:11 42K 
[   ]QNX-Operating-System.doc2013-01-24 21:06 30K 
[   ]QoS-prediction-for-web-services.doc2013-01-24 21:04 151K 
[   ]Privacy-in-online-social-networks.doc2013-01-24 21:02 65K 
[   ]QoS-guaranteed-adaptive-load-sharing-for-network-processors.doc2013-01-24 21:00 30K 
[   ]Problems-caused-by-viruses.doc2013-01-24 20:59 28K 
[   ]Process-of-disaster-recovery.doc2013-01-24 20:53 42K 
[   ]Primitive-exploration-with-little.doc2013-01-24 20:52 51K 
[   ]Process-of-choosing-video-format.doc2013-01-24 20:49 38K 
[   ]Privacy-implications-in-the-deployment-of-radio-frequency-identification-based-card-for-university-students-and-staff.doc2013-01-24 20:46 56K 
[   ]Quality-of-wireless-network.doc2013-01-24 20:45 145K 
[   ]Regression-Testing.doc2013-01-24 20:36 128K 
[   ]Relational-databases.doc2013-01-24 20:32 41K 
[   ]Relevance-to-the-system-analysis.doc2013-01-24 20:31 92K 
[   ]Research-into-office-automation-systems.doc2013-01-24 20:27 19K 
[   ]RED-HAT-LINUX.doc2013-01-24 20:22 42K 
[   ]Real-time-video-distribution.doc2013-01-24 20:13 148K 
[   ]Reasons-of-using-extreme-programming.doc2013-01-24 20:08 56K 
[   ]Reason-for-RAM.doc2013-01-24 20:06 24K 
[   ]Really-simple-syndication.doc2013-01-24 20:05 70K 
[   ]Risk-assessment.doc2013-01-24 20:01 33K 
[   ]Samba-server.doc2013-01-24 19:58 28K 
[   ]Scheduling-basically-deals.doc2013-01-24 19:54 21K 
[   ]Search-engine-optimization.doc2013-01-24 19:53 50K 
[   ]School-of-computer-sciences.doc2013-01-24 19:52 38K 
[   ]SaaS-is-open-source-software.doc2013-01-24 19:50 84K 
[   ]Run-on-the-web-based-system.doc2013-01-24 19:45 45K 
[   ]Risk-assessment-Amazon-S3.doc2013-01-24 19:42 41K 
[   ]Robot-network.doc2013-01-24 19:40 49K 
[   ]Ruby-on-rails.doc2013-01-24 19:35 27K 
[   ]Routing.doc2013-01-24 19:33 39K 
[   ]Router-Connection-Internet.doc2013-01-24 19:31 66K 
[   ]Research-method-some-form-of-data-collection-and-some-form-of-evaluation-of-results.doc2013-01-24 19:28 18K 
[   ]Smart-card-technology.doc2013-01-24 19:22 73K 
[   ]Secure-communication-across-the-world.doc2013-01-24 19:14 66K 
[   ]Search-strategy-using-relevant-databases-to-identify-an-article-on-evidenced-based-practice-in-the-healthcare-setting.doc2013-01-24 19:12 26K 
[   ]Secure-e-mail-protocols.doc2013-01-24 19:10 58K 
[   ]Security-enhanced-linux.doc2013-01-24 18:24 21K 
[   ]Securing-IEEE-802.11-wireless-networks.doc2013-01-23 21:06 59K 
[   ]Shareware.doc2013-01-23 21:05 20K 
[   ]Shopping-on-internet.doc2013-01-23 21:04 50K 
[   ]Since-the-evolution.doc2013-01-23 21:02 79K 
[   ]Software-copyrights-and-patents.doc2013-01-23 21:01 47K 
[   ]Software-Components-CORBA.doc2013-01-23 20:58 40K 
[   ]Similarities-and-differences-of-linux-and-microsoft-windows-operating-system.doc2013-01-23 20:48 21K 
[   ]Semantic-desktop_-pim-meets-semantic-web13.doc2013-01-23 20:43 89K 
[   ]Semantic-desktop:-pim-meets-semantic-web13.doc2013-01-23 20:43 89K 
[   ]Selecting-the-Image-menu.doc2013-01-23 20:41 21K 
[   ]Software-crisis.doc2013-01-23 20:40 41K 
[   ]Sensor-Technology.doc2013-01-23 20:38 32K 
[   ]Service-oriented-computing.doc2013-01-23 20:37 24K 
[   ]Server-side-code-and-client-side-code.doc2013-01-23 20:36 39K 
[   ]Software-Design.doc2013-01-23 20:34 38K 
[   ]SelARC-with-content-mining.doc2013-01-23 20:33 32K 
[   ]Security-in-VoIP-systems-and-applications.doc2013-01-23 20:04 90K 
[   ]Share-a-same-interest.doc2013-01-23 19:59 24K 
[   ]services-of-information-technology.doc2013-01-23 19:58 25K 
[   ]Services-of-information-technology.doc2013-01-23 19:58 25K 
[   ]Security-of-personal-information.doc2013-01-23 19:56 37K 
[   ]Security-using-process.doc2013-01-23 19:53 54K 
[   ]Software-development-methodology-model.doc2013-01-23 19:47 72K 
[   ]Security-protocol-standard.doc2013-01-23 19:42 31K 
[   ]skilled-testers-and-advantages-of-script-engineering.doc2013-01-23 19:39 24K 
[   ]Skilled-testers-and-advantages-of-script-engineering.doc2013-01-23 19:39 24K 
[   ]Smart-cards-are-being-used-extensively.doc2013-01-23 19:33 81K 
[   ]Social-Network-Phenomena.doc2013-01-23 19:19 45K 
[   ]Sound-can-be-distinguished.doc2013-01-23 19:15 53K 
[   ]Sports-blogging-system.doc2013-01-23 19:06 124K 
[   ]Some-web-templates-codes.doc2013-01-23 18:52 30K 
[   ]Static-and-dynamic-IP-address.doc2013-01-22 21:57 29K 
[   ]Starbucks-wifi-internet-access.doc2013-01-22 21:56 20K 
[   ]Specific-database-management-software.doc2013-01-22 21:55 41K 
[   ]Software-upgrade.doc2013-01-22 21:52 36K 
[   ]Software-Web-Computing.doc2013-01-22 21:51 61K 
[   ]Software-to-record-name-of-the-term-paper-allotted.doc2013-01-22 21:48 50K 
[   ]Software-testing-is-the-independent-view.doc2013-01-22 21:45 27K 
[   ]Statistical-techniques-for-cryptanalysis.doc2013-01-22 21:44 55K 
[   ]Sources-model-and-use-of-location.doc2013-01-22 21:42 36K 
[   ]Steganography.doc2013-01-22 21:39 32K 
[   ]Structure-of-a-second-course.doc2013-01-22 21:36 33K 
[   ]Structured-systems-analysis.doc2013-01-22 21:31 34K 
[   ]Software-infrastructure-for-health-sector.doc2013-01-22 21:28 96K 
[   ]Student-System-Attendance.doc2013-01-22 21:26 17K 
[   ]Software-outsourcing-releases.doc2013-01-22 21:24 40K 
[   ]Store-and-forward-datagram-oriented-network.doc2013-01-22 21:23 56K 
[   ]Strategy-relevant-databases.doc2013-01-22 21:21 22K 
[   ]Software-Engineering.doc2013-01-22 21:18 53K 
[   ]Software-test-initiative.doc2013-01-22 21:16 52K 
[   ]Survey-of-performance-evaluation-models.doc2013-01-22 21:15 111K 
[   ]Style-translation-for-human-motion.doc2013-01-22 21:11 24K 
[   ]Study-of-various-RISC-and-CISC-processor.doc2013-01-22 21:08 51K 
[   ]Study-of-mass-mailing-worm.doc2013-01-22 20:47 46K 
[   ]Super-memo-method.doc2013-01-22 20:37 25K 
[   ]Supporting-Users-and-Troubleshooting-a-Desktop.doc2013-01-22 20:33 23K 
[   ]System-Analysis-and-Design.doc2013-01-22 20:30 66K 
[   ]Symbian-OS.doc2013-01-22 20:27 21K 
[   ]Supercomputer-and-cray-inc-of-high-performance-computing.doc2013-01-22 20:21 27K 
[   ]Supercomputers-vs-microprocessors.doc2013-01-22 20:20 19K 
[   ]The-advanced-technologies.doc2013-01-22 20:01 137K 
[   ]Test-case-prioritization-and-regression-test-selection.doc2013-01-22 19:59 64K 
[   ]Survey-Network-Solutions.doc2013-01-22 19:48 53K 
[   ]The-DSpace-system.doc2013-01-22 19:38 33K 
[   ]The-computer-game-industries.doc2013-01-21 19:55 29K 
[   ]PSTN-(Public-Switched-Telephone-Network).doc2013-01-21 19:18 153K 
[   ]TCP-Congestion-Algorithm.doc2013-01-21 19:13 58K 
[   ]TCP-Illinois-achieves-high-throughout.doc2013-01-21 19:12 32K 
[   ]Technical-writing-in-computer-hardware-electronics-and-aerospace.doc2013-01-21 19:06 27K 
[   ]The-comparative-networking-features.doc2013-01-21 18:54 78K 
[   ]The-computer-ethics.doc2013-01-21 18:25 72K 
[   ]The-carrier-ethernet.doc2013-01-19 21:36 84K 
[   ]The-combination-of-living-one's-values.doc2013-01-19 21:34 24K 
[   ]The-booms-of-new-technologies.doc2013-01-19 21:32 43K 
[   ]The-client-server-problem.doc2013-01-19 21:15 36K 
[   ]The-chip-design-technologies.doc2013-01-19 21:13 51K 
[   ]The-efficiency-of-some-search-engines.doc2013-01-19 21:05 50K 
[   ]The-basic-concepts-of-database-theory.doc2013-01-19 21:02 32K 
[   ]The-existence-of-Web-2.0.doc2013-01-19 20:54 37K 
[   ]The-diversity-database-consists.doc2013-01-19 20:53 26K 
[   ]The-digital-library.doc2013-01-19 20:51 48K 
[   ]The-data-warehouses.doc2013-01-19 20:50 74K 
[   ]The-data-structure.doc2013-01-19 20:47 42K 
[   ]The-data-mining-tasks.doc2013-01-19 20:45 63K 
[   ]The-DDoS-attacks.doc2013-01-19 20:43 45K 
[   ]The-digital-age.doc2013-01-19 20:38 117K 
[   ]The-deployment-of-wireless-sensor.doc2013-01-19 20:32 60K 
[   ]The-fibre-optics.doc2013-01-19 20:27 60K 
[   ]The-importance-vulnerabilities.doc2013-01-19 20:18 23K 
[   ]The-increase-in-applications-using-ontologies.doc2013-01-19 20:16 103K 
[   ]The-GUI-engine.doc2013-01-19 20:08 43K 
[   ]The-insight-of-computer-forensics.doc2013-01-19 20:01 72K 
[   ]The-integrated-control.doc2013-01-19 19:59 75K 
[   ]The-introduction-of-delay.doc2013-01-19 19:57 28K 
[   ]The-intrusion-detection.doc2013-01-19 19:55 66K 
[   ]The-internet-traffic.doc2013-01-19 19:53 69K 
[   ]The-internet-protocol-IP.doc2013-01-19 19:50 112K 
[   ]The-interactive-fiction.doc2013-01-19 19:47 16K 
[   ]The-internet-banking.doc2013-01-19 19:45 91K 
[   ]The-internet-is-a-large-market.doc2013-01-19 19:43 30K 
[   ]The-GSM-frequencies.doc2013-01-19 19:42 59K 
[   ]The-field-of-computer-graphics.doc2013-01-19 18:31 102K 
[   ]The-fibre-optics-as-copper-wires.doc2013-01-19 18:22 38K 
[   ]The-experimental-study-reveals.doc2013-01-18 20:17 28K 
[   ]The-field-of-cloud-computing.doc2013-01-18 20:16 74K 
[   ]The-Friend-of-a-Friend-(FOAF)-Project.doc2013-01-18 20:13 47K 
[   ]The-great-advances-in-information-storage.doc2013-01-18 20:06 35K 
[   ]The-google-talk.doc2013-01-18 20:04 26K 
[   ]The-functional-aspects.doc2013-01-18 20:03 56K 
[   ]The-future-of-3D-web-applications.doc2013-01-18 19:58 89K 
[   ]The-IT-governance.doc2013-01-18 19:56 41K 
[   ]The-latest-technologies.doc2013-01-18 19:55 24K 
[   ]THE-NUMERATI-by-Stephen-Baker.doc2013-01-18 19:52 29K 
[   ]The-Nyquist-theorem-is-one-of-the-deciding-factor-in-data-communication..doc2013-01-18 19:51 39K 
[   ]The-nulls-or-missing-values.doc2013-01-18 19:49 66K 
[   ]The-new-functions-of-DL.doc2013-01-18 19:47 168K 
[   ]The-network-requirements.doc2013-01-18 19:41 28K 
[   ]The-network-systems.doc2013-01-18 19:40 66K 
[   ]The-Nyquist-theorem.doc2013-01-18 19:37 35K 
[   ]The-operating-system.doc2013-01-18 19:27 47K 
[   ]The-polymorphism.doc2013-01-18 19:26 26K 
[   ]The-personal-computer.doc2013-01-18 19:00 31K 
[   ]The-multilevel-database-systems.doc2013-01-18 18:55 50K 
[   ]The-multi-threaded-socket-classes.doc2013-01-18 18:50 142K 
[   ]The-main-objective-of-the-paper.doc2013-01-18 18:32 30K 
[   ]The-Linux-Kernel-2.6.doc2013-01-18 18:28 21K 
[   ]The-microelectronics-revolution.doc2013-01-18 18:21 76K 
[   ]The-motion-estimation.doc2013-01-18 18:18 45K 
[   ]The-MPS-network-impact-negatively.doc2013-01-18 18:14 55K 
[   ]The-MS-DOS.doc2013-01-18 18:12 52K 
[   ]The-modulation-technique-Gaussian-minimum-shift-keying.doc2013-01-18 18:10 24K 
[   ]The-model-driven-software.doc2013-01-18 18:00 100K 
[   ]The-modern-computer-system-specification.doc2013-01-18 17:37 63K 
[   ]The-performance-of-ATM-network.doc2013-01-18 17:35 123K 
[   ]The-problems-existing-in-encrypted.doc2013-01-18 17:31 66K 
[   ]The-rapid-growth.doc2013-01-18 17:29 43K 
[   ]The-real-time-transport-protocol.doc2013-01-18 17:26 107K 
[   ]The-recent-advances-of-hardware.doc2013-01-18 17:23 101K 
[   ]the-role-of-firewall.doc2013-01-17 21:25 41K 
[   ]The-relevant-research-topics.doc2013-01-17 21:20 27K 
[   ]The-purpose-of-research.doc2013-01-17 21:19 59K 
[   ]The-process-of-writing-assessments.doc2013-01-17 21:14 77K 
[   ]The-programming-methods.doc2013-01-17 21:12 29K 
[   ]The-project-studies-methodologies.doc2013-01-17 21:11 27K 
[   ]The-psychoacoustic-model.doc2013-01-17 21:09 31K 
[   ]The-pros-and-cons-of-the-technological-side-of-hures.doc2013-01-17 21:08 44K 
[   ]The-proposed-multi-agent-system.doc2013-01-17 21:05 48K 
[   ]The-scalable-video-coding-standard.doc2013-01-17 20:58 31K 
[   ]The-text-classification.doc2013-01-17 20:57 46K 
[   ]The-virtual-world-of-Internet.doc2013-01-17 20:48 79K 
[   ]The-villagers-of-Stanwell.doc2013-01-17 20:46 45K 
[   ]Software-Testing-Tools.doc2013-01-17 20:44 25K 
[   ]The-synopsis-provides-the-introduction.doc2013-01-17 20:42 97K 
[   ]The-security-concerns.doc2013-01-17 20:36 43K 
[   ]The-Semantic-Web.doc2013-01-17 20:34 37K 
[   ]The-simulation-tool-software.doc2013-01-17 20:32 44K 
[   ]The-SQL-server.doc2013-01-17 20:28 40K 
[   ]The-small-group-development-process.doc2013-01-17 20:26 48K 
[   ]The-standard-security-technology.doc2013-01-17 20:24 19K 
[   ]This-report-explores-system-vulnerabilities.doc2013-01-17 20:14 73K 
[   ]This-century-we-depend-on-computer.doc2013-01-17 20:01 136K 
[   ]Third-generation-3G-wireless-in-evolution-security-threats-and-analysis.doc2013-01-17 19:57 145K 
[   ]The-website-navigation.doc2013-01-17 19:54 37K 
[   ]The-Wi-Max-standards.doc2013-01-17 19:48 28K 
[   ]Thermal-Grating-NDE.doc2013-01-17 19:47 33K 
[   ]The-wireless-sensor-networks.doc2013-01-17 19:45 62K 
[   ]The-wireless-communication.doc2013-01-17 19:41 61K 
[   ]To-input-handwriting-characters.doc2013-01-17 19:38 89K 
[   ]Transition-Mechanisms-from-IPv4-to-IPv6.doc2013-01-17 19:36 149K 
[   ]Transmission-Control-Protocol-Westwood.doc2013-01-17 19:30 33K 
[   ]Transmission-Signal-Symbols.doc2013-01-17 19:28 100K 
[   ]Transport-Layer-Security.doc2013-01-17 19:25 108K 
[   ]Transmission-signal.doc2013-01-17 19:20 39K 
[   ]Traditional-security-techniques.doc2013-01-17 19:15 87K 
[   ]Trade-communication-equipment-and-components-for-optical-fiber-cables.doc2013-01-17 19:11 36K 
[   ]To-reduce-function-call-overhead.doc2013-01-17 19:01 20K 
[   ]To-replace-the-human-factor.doc2013-01-17 18:59 45K 
[   ]Tracking-the-up-to-date-information.doc2013-01-17 18:56 22K 
[   ]TYPES-OF-OPERATING-SYSTEM_.doc2013-01-17 18:50 43K 
[   ]TYPES-OF-OPERATING-SYSTEM:.doc2013-01-17 18:50 43K 
[   ]Uses-of-formal-approaches-for-agent-based-systems.doc2013-01-17 18:48 60K 
[   ]Uses-and-types-of-robots.doc2013-01-17 18:46 42K 
[   ]Uses-and-benefits-of-data-warehouse.doc2013-01-17 18:44 41K 
[   ]Uses-of-internet-and-internet-in-client-or-server.doc2013-01-17 18:42 35K 
[   ]Ubiquitous-electronic-super-highway.doc2013-01-17 18:33 40K 
[   ]Uses-of-mainframe-desktop-in-client-server.doc2013-01-17 18:15 20K 
[   ]Understanding-of-LAN.doc2013-01-17 18:04 24K 
[   ]URL-graphs.doc2013-01-17 18:02 43K 
[   ]Usability-of-computer-software.doc2013-01-17 17:59 26K 
[   ]Users-access-and-expensive-to-implement.doc2013-01-17 17:48 38K 
[   ]Use-of-web-resources.doc2013-01-17 17:16 54K 
[   ]Use-of-networks.doc2013-01-17 17:13 25K 
[   ]Using-stacks-and-queues.doc2013-01-17 16:37 32K 
[   ]Types-of-content-and-applications.doc2013-01-17 16:35 36K 
[   ]Values-in-the-same-instance.doc2013-01-17 16:33 22K 
[   ]Types-of-communication-networks.doc2013-01-17 16:31 83K 
[   ]Trust-and-security-in-internet.doc2013-01-17 16:19 35K 
[   ]Video-based-human-motion-analysis.doc2013-01-16 20:44 96K 
[   ]Trends-of-outsourcing-of-software.doc2013-01-16 20:24 69K 
[   ]Types-and-importances-of-formal-methods.doc2013-01-16 20:20 65K 
[   ]VBLAST-architecture.doc2013-01-16 19:52 22K 
[   ]Types-of-memory.doc2013-01-16 19:33 47K 
[   ]Web-Development-Browser-Server.doc2013-01-16 19:30 21K 
[   ]Web-Development.doc2013-01-16 19:20 31K 
[   ]Various-networking-technologies-and-services-like-tls-ipsec-ip-and-ids.doc2013-01-16 09:38 108K 
[   ]Various-data-transmission-protocols.doc2013-01-16 09:34 34K 
[   ]Video-coding-standard.doc2013-01-16 09:19 94K 
[   ]Web-content-designing.doc2013-01-15 21:20 36K 
[   ]Virtual-novel-interfaces-that-are-used-to-control-the-synthesiser-called-Midi.doc2013-01-15 21:12 129K 
[   ]Video-texture-synthesis.doc2013-01-15 21:09 56K 
[   ]Virtualisation-provides-a-layer.doc2013-01-15 20:58 59K 
[   ]Voice-over-ip-and-its-uses.doc2013-01-15 20:53 25K 
[   ]Voice-over-internet-protocol.doc2013-01-15 20:52 74K 
[   ]Vital-for-the-success.doc2013-01-15 20:49 22K 
[   ]Virtualization.doc2013-01-15 20:47 68K 
[   ]Virus-Attacks.doc2013-01-15 20:45 36K 
[   ]WEB-SERVER-MONITORING.doc2013-01-15 20:42 49K 
[   ]Why-does-knowing-how-the-Software-works-influence-how-and-what-you-should-test.doc2013-01-14 21:55 49K 
[   ]Web-content-accessibility-guidelines.doc2013-01-14 21:53 96K 
[   ]Widely-installed-operating-system.doc2013-01-14 21:50 28K 
[   ]WiMAX-LTE.doc2013-01-14 21:49 75K 
[   ]WIMAX-LTE.doc2013-01-14 21:49 75K 
[   ]Web-Application-Attacks.doc2013-01-14 21:47 50K 
[   ]What-is-DL-and-KM.doc2013-01-14 21:43 33K 
[   ]WIMAX-LTE-Comparisons.doc2013-01-14 21:41 90K 
[   ]What's-social-network-analysis.doc2013-01-14 21:35 30K 
[   ]Activities-for-which-i-plan-to-use-the-computer-system.doc2013-01-14 21:23 24K 
[   ]Wireless-Wire-Network.doc2013-01-14 21:21 59K 
[   ]With-a-mounting-demand.doc2013-01-14 21:18 55K 
[   ]Wireless-transmission.doc2013-01-14 21:16 29K 
[   ]Workplace-Motherboard-CPU.doc2013-01-14 21:11 47K 
[   ]Wireless-Sensor-Networks.doc2013-01-14 21:09 145K 
[   ]Wireless-network.doc2013-01-14 21:06 33K 
[   ]Windows-2003-Server-Troubleshooting-Tools.doc2013-01-14 21:05 22K 
[   ]Wimax-wireless-radio-frequency-system.doc2013-01-14 21:03 160K 
[   ]X-Cart-Review.doc2013-01-14 20:57 24K 
[   ]X-window-system's-architecture-and-understanding-of-its-design.doc2013-01-14 20:55 47K 
[   ]Wireless-Network-Computer.doc2013-01-14 20:52 32K 
[   ]Windows-7.doc2013-01-14 20:51 64K 
[   ]Windows-Mobile.doc2013-01-14 20:49 15K 
[   ]Wireless-LAN-in-hospital.doc2013-01-14 20:47 17K 
[   ]-Wireless-LAN.doc2013-01-14 20:45 136K 
[   ]Wireless-local-area-networks.doc2013-01-14 20:41 33K 
[   ]Wireless-Network-Hacking.doc2013-01-14 20:36 30K 
[   ]Wireless-LAN-IEEE.doc2013-01-14 20:35 105K 
[   ]Windows-Networking-Features.doc2013-01-14 20:32 52K 
[   ]Windows-vs.-Macintosh.doc2013-01-14 20:29 24K 
[   ]Windows-XP-environment.doc2013-01-14 20:27 17K 
[   ]WINDOWS-XP-STRUCTURE.doc2013-01-14 20:24 32K 
[   ]Zone-alarm-comodo-and-cisco-firewalls.doc2013-01-14 20:20 45K 
[   ]Z-notation.doc2013-01-14 20:18 19K 
[   ]World-wide-web.doc2013-01-14 20:16 63K 
[   ]World's-leading-supercomputer-company.doc2013-01-14 20:14 22K 
[   ]Operating-System.doc2013-01-14 20:12 49K 
[   ]OPERATING-SYSTEM.doc2013-01-14 20:12 49K 
[   ]Network-Protocols-and-Algorithms.doc2013-01-14 20:10 43K 
[   ]APIT-snapshots-on-Windows.doc2013-01-14 20:08 18K 
[   ]Professional-Ethical-Issues-in-Information-Systems.doc2013-01-14 20:06 60K 
[   ]Quality-Based-Web-Service-Selection.doc2013-01-14 19:42 146K 
[   ]SECURITY-IN-DISTRIBUTED-SYSTEM.doc2013-01-14 19:28 49K 
[   ]TECHNOLOGY-USED-IN-CDMA.doc2013-01-14 19:26 24K 
[   ]Video-rental-and-sales-system.doc2013-01-14 19:08 153K 
[   ]raditional-and-Context-Semantic-Web-services.doc2013-01-14 19:06 43K 
[   ]A-case-study-of-key-dependent-permutations-in-feistel-ciphers.doc2013-01-14 19:04 71K 
[   ]A-Framework-of-Multi-Agent-Systems.doc2013-01-14 19:01 71K 
[   ]ADVANCED-DATABASE-ICA.doc2013-01-14 18:59 69K 
[   ]End-to-End-Available-Bandwidth.doc2013-01-14 18:57 26K 
[   ]K-Means-Data-Mining-Algorithm.doc2013-01-14 18:53 58K 
[   ]Most-new-electronic-items.doc2013-01-14 18:49 43K 
[   ]Online-computer-service-system.doc2013-01-14 18:47 41K 
[   ]Program-of-login-java.doc2013-01-14 18:39 99K 
[   ]Sending-e-mail-messages.doc2013-01-14 18:32 55K 
[   ]The-database-engine.doc2013-01-14 18:21 42K 
[   ]The-Future-of-Software-Delivery.doc2013-01-13 21:00 59K 
[   ]TLS-record-layer.doc2013-01-13 20:56 100K 
[   ]Video-summarization-techniques.doc2013-01-13 20:54 99K 
[   ]Telecommunication-services-are-using-Internet-as-single-network-for-voice.doc2013-01-13 20:33 61K 
[   ]The-field-of-computer-and-information-security.doc2013-01-13 20:29 35K 
[   ]The-rich-internet-experience-of-Web-2.0.doc2013-01-13 20:23 27K 
[   ]Traditionally-the-advancement-of-internet.doc2013-01-13 20:19 99K 
[   ]Web-data-mining.doc2013-01-13 20:18 22K 
[   ]SOFTWARE-STUDY.doc2013-01-13 20:17 119K 
[   ]Looking-inside-the-lid-of-a-computer.doc2013-01-13 20:14 37K 
[   ]Master-thesis-in-computer-science.doc2013-01-13 20:12 29K 
[   ]Micro-controller-based-temperature-indicator.doc2013-01-13 20:10 26K 
[   ]Microsoft-share-Point.doc2013-01-13 20:09 26K 
[   ]Model-based-software-testing.doc2013-01-13 20:05 78K 
[   ]Machine-vision.doc2013-01-13 20:04 38K 
[   ]Multi-resolution-based-feature-extraction-method-for-breast-cancer-diagnosis-in-digital-mammogram.doc2013-01-13 20:01 63K 
[   ]Mobile-security-using-j2me.doc2013-01-13 19:59 107K 
[   ]Security-in-mobile-communications-using-j2me.doc2013-01-13 19:55 231K 
[   ]Security-mechanisms-to-protect-sensitive-data-for-easy-shopping.doc2013-01-13 19:48 27K 
[   ]A-Heurstic-method-for-improving-the-efficiency-of-the-k-means.doc2013-01-13 19:47 20K 
[   ]A-least-grade-page-replacement-algorithm-for-web-cache-optimization.doc2013-01-13 19:40 55K 
[   ]Autonomous-and-rational-routing-for-improving-performance.doc2013-01-13 19:36 81K 
[   ]Network-resource-provisioning.doc2013-01-13 19:21 90K 
[   ]Web-services.doc2013-01-13 19:18 82K 
[   ]Modelling-software-process.doc2013-01-13 19:15 91K 
[   ]Mobile-ip-and-vertical-handoff-algorithms-in-wireless-networks.doc2013-01-13 19:07 121K 
[   ]Backup-system-manual.doc2013-01-13 18:59 12K 
[   ]Bug-tracking.doc2013-01-13 18:57 30K 
[   ]Developing-high-quality-multimedia-products.doc2013-01-13 18:54 41K 
[   ]Handwritten-character-recognition.doc2013-01-13 18:52 32K 
[   ]Information-Security-Strategy-for-Easy-Shopping.doc2013-01-13 18:49 35K 
[   ]High-data-rates-and-wireless-access-network.doc2013-01-13 18:47 237K 
[   ]Is-search-engine-a-tool-design.doc2013-01-13 18:45 44K 
[   ]Literally-means-hidden-writing.doc2013-01-13 18:43 63K 
[   ]Linux-emulators.doc2013-01-13 18:40 98K 
[   ]Load-balancing-policy.doc2013-01-13 18:36 73K 
[   ]Local-area-network-design.doc2013-01-13 18:34 30K 
[   ]A-Critical-Evaluation-of-the-Advantages-and-Disadvantages-of-the-Relational-Object-Relational-and-Object-Oriented-Data-Models..doc2013-01-13 18:33 145K 
[   ]The-Introduction-of-Data-Warehousing-at-Tronics-PLC..doc2013-01-13 18:30 59K 
[   ]Computer-Science_-Fulfilment-Logistics-Fulfilment-Strategy..doc2013-01-13 18:28 30K 
[   ]Computer-Science:-Fulfilment-Logistics-Fulfilment-Strategy..doc2013-01-13 18:28 30K 
[   ]Explain-the-obstacles-and-advantages-of-the-competing-technologies-J2EE-and-Microsoft's-.NET-with-respect-to-teaching-and-learning-in-a-university-environment.doc2013-01-13 18:26 40K 
[   ]Internet-Security.doc2013-01-13 18:24 148K 
[   ]Input-Media.doc2013-01-13 18:19 18K 
[   ]Klings-web-model.doc2013-01-13 18:17 41K 
[   ]TASK-Analysis-for-AZ-electronic-Application.doc2013-01-13 18:15 31K 
[   ]Authentication-Techniques-in-Ubiquitous-Computing..doc2013-01-13 18:14 59K 
[   ]Microsoft-VB.NET-is-part-of-the-.NET-framework..doc2013-01-13 18:11 42K 
[   ]Feasibility-of-Web-Enabling-an-Application..doc2013-01-13 17:52 50K 
[   ]Virtualization-and-Cloud-Computing.doc2013-01-13 17:50 17K 
[   ]Dynamic-Web-Engineering.doc2013-01-13 17:47 29K 
[   ]Developing-high-quality-multimedia-products-and-security.doc2013-01-13 17:38 49K 
[   ]Companies-invest-a-sum-of-money-to-setup-computer-network.doc2013-01-13 17:36 71K 
[   ]Development-operation-and-maintenance-of-software.doc2013-01-13 17:34 60K 
[   ]Growth-of-computing-power-and-database-capacity.doc2013-01-13 17:31 65K 
[   ]Software-Development.doc2013-01-13 17:29 29K 
[   ]Application-Web-E-Commerce.doc2013-01-13 17:00 77K 
[   ]Application-Web-ECommerce.doc2013-01-12 23:02 77K 
[   ]Band-Width-TDM.doc2013-01-12 22:22 34K 
[   ]Basic-classes-that-internet-is-network.doc2013-01-12 21:54 58K 
[   ]Blue-tooth-Connection-GFSK.doc2013-01-12 21:51 50K 
[   ]Bibliometrics-Webometrics-Information.doc2013-01-12 21:49 52K 
[   ]About-internet.doc2013-01-12 21:45 153K 
[   ]A-cellular-network.doc2013-01-12 21:40 37K 
[   ]4G-Mobile-System.doc2013-01-12 21:36 120K 
[   ]Advantages-and-usages-of-wireless-technology.doc2013-01-12 21:29 37K 
[   ]Communication-MIMO-Wireless.doc2013-01-12 21:22 189K 
[   ]Commutative-encryption-and-decryption.doc2013-01-12 21:09 34K 
[   ]Communication-Serial-Data.doc2013-01-12 20:58 41K 
[   ]CDMA-and-GSM.doc2013-01-12 20:42 58K 
[   ]CDMA-Technology.doc2013-01-12 20:40 55K 
[   ]Buyer’s-Guide-to-Phone-Systems.doc2013-01-12 20:36 22K 
[   ]Communication-Computer-Network.doc2013-01-12 20:34 96K 
[   ]Clustering-benefit.doc2013-01-12 20:10 23K 
[   ]Channel-Coding-Wireless.doc2013-01-12 20:09 40K 
[   ]Dos-Attacks-VoIP.doc2013-01-12 20:04 37K 
[   ]Digital-television.doc2013-01-12 19:57 64K 
[   ]Digital-Access-System.doc2013-01-12 19:55 29K 
[   ]Encoder-Viterbi-Matlab.doc2013-01-12 19:44 101K 
[   ]Digital-signal-processing-Overview.doc2013-01-12 19:37 75K 
[   ]Credit-card-processing-and-its-vendors.doc2013-01-12 19:27 19K 
[   ]Computer-Language-Reading.doc2013-01-12 19:13 267K 
[   ]Computer-networking.doc2013-01-12 19:05 42K 
[   ]Describing-the-Arpanet.doc2013-01-12 19:00 33K 
[   ]Database-System-Information.doc2013-01-12 18:45 46K 
[   ]Image-processing-is-any-form-of-signal-processing.doc2013-01-12 18:41 168K 
[   ]Harmonic-vector-excitation-coding.doc2013-01-12 18:37 39K 
[   ]High-Speed-Downlink-Packet-Access-(HSDPA).doc2013-01-12 18:35 61K 
[   ]H.264-PARAMETER-OPTIMIZATION.doc2013-01-12 18:32 62K 
[   ]Important-factor-on-communication-networks-survivability.doc2013-01-12 18:25 63K 
[   ]Fibre-network-user-service-survivability.doc2013-01-12 17:46 34K 
[   ]Computer-School-Friend.doc2013-01-12 17:35 19K 
[   ]GSM-Implementation-in-various-places.doc2013-01-11 20:32 61K 
[   ]How-to-install-GPG-on-your-system.doc2013-01-11 20:29 69K 
[   ]Grid-Monitoring.doc2013-01-11 20:05 45K 
[   ]Free-Space-Optical-communication.doc2013-01-11 20:03 98K 
[   ]Manage-information-flow.doc2013-01-11 19:56 73K 
[   ]Mac-Protocol.doc2013-01-11 19:48 34K 
[   ]Mail-Network-Data.doc2013-01-11 19:46 54K 
[   ]MIMO-In-IEEE.doc2013-01-11 19:45 19K 
[   ]Methodology-Dynamic-Spectrum-Success-for-Cognitive-Radio-Networks.doc2013-01-11 19:36 42K 
[   ]introduction-to-opnet-simulator.doc2013-01-11 09:47 15K 
[   ]IP-multicast-deployment.doc2013-01-11 09:46 18K 
[   ]Mobile-and-Wireless-Communication.doc2013-01-11 09:42 25K 
[   ]internal-communication-system.doc2013-01-09 10:35 45K 
[   ]Internet-and-mobile-communications.doc2013-01-09 10:34 62K 
[   ]IP-Telephony-Advent-and-Future.doc2013-01-09 10:33 30K 
[   ]Internet-base-technologies.doc2013-01-09 10:32 25K 
[   ]Java-2-Micro-Edition.doc2013-01-09 10:23 131K 
[   ]JSCC-scheme.doc2013-01-09 10:20 53K 
[   ]Mobile-multimedia-services.doc2013-01-09 10:18 31K 
[   ]Networks-question.doc2013-01-09 10:17 32K 
[   ]Next-generation-networks-ngn.doc2013-01-09 10:16 39K 
[   ]NGN-Network-Technology.doc2013-01-09 10:15 75K 
[   ]Network-System-Windows.doc2013-01-09 10:13 34K 
[   ]Network-simulation.doc2013-01-09 10:11 66K 
[   ]Mobile-Databases-and-GPS.doc2013-01-09 10:10 23K 
[   ]Mobile-computing-technology.doc2013-01-09 10:09 58K 
[   ]Optical-communication-system.doc2013-01-09 10:04 38K 
[   ]Optical-layer.doc2013-01-09 10:03 23K 
[   ]Optical-network-demand-bundling-using-DS3-forming.doc2013-01-09 10:02 25K 
[   ]OPEN-OFFICE.doc2013-01-09 09:58 17K 
[   ]NS2-Network-IP.doc2013-01-09 09:54 44K 
[   ]OFDM-Frequency-Data.doc2013-01-09 09:53 40K 
[   ]OFDMA-for-Wireless-Communications.doc2013-01-09 09:35 52K 
[   ]Online-networked-communities.doc2013-01-09 09:32 72K 
[   ]Mobile-and-Wireless-Communications.doc2013-01-09 09:30 26K 
[   ]Network-devices-thing-cable.doc2013-01-09 09:20 19K 
[   ]Network-security.doc2013-01-09 09:17 76K 
[   ]Network-Protocol-Monitoring.doc2013-01-09 09:16 206K 
[   ]Mobility-Capacity-Conversion.doc2013-01-09 09:03 58K 
[   ]Modulation-Amplitude-Signal.doc2013-01-09 09:02 46K 
[   ]Radio-Technology.doc2013-01-09 08:49 32K 
[   ]Security-Instant-Messaging.doc2013-01-09 08:48 75K 
[   ]Security-in-wireless-sensor-network.doc2013-01-09 08:46 67K 
[   ]Security-Issues-in-Multimedia-Transmission.doc2013-01-09 08:43 24K 
[   ]Security-in-computer-network.doc2013-01-09 08:42 127K 
[   ]Telecommunication-sector-profile-of-Saudi-Arabia.doc2013-01-09 08:40 49K 
[   ]Satellite-Channel-Simulator.doc2013-01-07 21:02 30K 
[   ]Passive-Optical-Networks.doc2013-01-07 20:58 59K 
[   ]Performance-evaluation-of-web-services-with-distributed-objects.doc2013-01-07 20:55 73K 
[   ]Papers-explore-sensor-networks.doc2013-01-07 20:54 53K 
[   ]Optical-technology.doc2013-01-07 20:51 18K 
[   ]overview-of-ns-network-simulator-project.doc2013-01-07 20:50 66K 
[   ]Social-networking-benefits.doc2013-01-07 20:41 18K 
[   ]telecommunications-technologies.doc2013-01-07 20:40 50K 
[   ]Telecommunication-Networks-MNP.doc2013-01-07 20:31 39K 
[   ]Telephone-Connections-Network.doc2013-01-07 20:12 44K 
[   ]Supplement-Email.doc2013-01-07 20:09 29K 
[   ]Synchrounous-optical-network.doc2013-01-06 20:31 36K 
[   ]Telecom-Telecommunication-Telephone.doc2013-01-06 20:29 44K 
[   ]Survey-of-wireless-sensor-networks.doc2013-01-06 20:28 70K 
[   ]Semantic-Web-Meta-data.doc2013-01-06 20:20 166K 
[   ]Semantic-Web-Framework.doc2013-01-06 20:19 14K 
[   ]Semantic-Web-Data.doc2013-01-06 20:18 48K 
[   ]Signaling-Telephone-Network.doc2013-01-06 20:16 55K 
[   ]Short-Message-Service-(SMS).doc2013-01-06 20:13 21K 
[   ]Signaling-Network-Routing.doc2013-01-06 20:11 28K 
[   ]Signal-processing.doc2013-01-06 20:10 25K 
[   ]The-process-of-communication-managing-information-knowledge.doc2013-01-06 20:08 25K 
[   ]Water-level-controller.doc2013-01-06 19:48 35K 
[   ]Video-Service-Peer.doc2013-01-06 19:40 56K 
[   ]VIDEO-STREAMING-THROUGH-CACHES.doc2013-01-06 19:36 36K 
[   ]Voice-over-Internet-Protocol-Applications.doc2013-01-06 19:31 33K 
[   ]Wavelet-Transform-Signal.doc2013-01-06 19:18 61K 
[   ]Transmission-control-protocol-Tahoe-Reno-and-New-Reno.doc2013-01-06 19:16 49K 
[   ]Website-translation.doc2013-01-06 19:06 48K 
[   ]Tetra-network.doc2013-01-06 19:04 23K 
[   ]What-is-supervisory-control-and-data-acquisition..doc2013-01-06 19:02 45K 
[   ]Wireless-mesh-network.doc2013-01-06 18:56 60K 
[   ]Wireless-communications.doc2013-01-06 18:55 35K 
[   ]Designing-a-finest-WiMAX-network.doc2013-01-06 18:53 36K 
[   ]Wireless-mesh-networks.doc2013-01-06 18:52 29K 
[   ]Wireless-Mesh-Networks.doc2013-01-06 18:52 29K 
[   ]Wi-fi-Wireless-Technology.doc2013-01-06 18:51 31K 
[   ]Wireless-mode-of-communication.doc2013-01-06 18:49 80K 
[   ]Wireless-Network-Link.doc2013-01-06 18:47 22K 
[   ]Wired-radio-communication.doc2013-01-06 18:40 40K 
[   ]Wireless-Network-Security.doc2013-01-06 18:38 68K 
[   ]World-Wide-Web-global-information-space.doc2013-01-06 18:37 41K 
[   ]Wireless-communication.doc2013-01-06 18:35 79K 
[   ]Zig-Bee-Physical-IEEE.doc2013-01-06 18:34 56K 
[   ]Mail-Message-Computer.doc2013-01-06 18:28 54K 
[   ]VoWLAN-WLAN-VoIP.doc2013-01-06 18:25 260K 
[   ]Aspect-of-warfare.doc2013-01-06 18:20 31K 
[   ]Development-of-the-internet.doc2013-01-06 18:15 30K 
[   ]Enterprise-networking.doc2013-01-06 18:13 90K 
[   ]Evaluate-the-performance.doc2013-01-06 18:11 31K 
[   ]Internet-Group-management-protocol.doc2013-01-06 18:08 23K 
[   ]Measurement-of-network-recovery.doc2013-01-06 18:00 38K 
[   ]Security-in-multicasting.doc2013-01-06 17:45 24K 
[   ]Two-important-problems-of-survivability.doc2013-01-06 08:00 38K 
[   ]Confidentiality.doc2013-01-06 07:58 26K 
[   ]RF-communication-technology.doc2013-01-06 07:57 34K 
[   ]Secure-communication-in-cognitive-radio-networks.doc2013-01-06 07:56 21K 
[   ]3g-mobile-telecommunication.doc2013-01-06 07:53 27K 
[   ]History-of-Digital-signatures.doc2013-01-06 07:47 30K 
[   ]Module-based-framework-for-communication-in-heterogeneous-networks.doc2013-01-05 21:36 34K 
[   ]Vertical-handoff-daemon-for-communication-in-heterogeneous-networks.doc2013-01-05 21:33 42K 
[   ]Anti-Phishing-Enforcement-and-Prevention.doc2013-01-05 21:08 44K 
[   ]3G_-Sophistication-Guaranteed.doc2013-01-05 20:41 33K 
[   ]3G:-Sophistication-Guaranteed.doc2013-01-05 20:41 33K 
[   ]Use-of-a-channel-simulator-to-evaluate-data-transmission-via-Satellite-under-Ionospheric-Scintillation-conditions.doc2013-01-05 20:31 62K 
[   ]Is-the-concept-of-the-mass-audience-becoming-increasingly-redundant-as-new-communications-technologies-such-as-the-internet-and-interactive-tv-develop.doc2013-01-05 20:26 52K 
[   ]Telecommunication-in-the-21st-Century.doc2013-01-05 20:24 38K 
[   ]Wi-fi-and-the-Development-of-Multimedia.doc2013-01-05 20:23 25K 
[   ]Wireless-VOIP.doc2013-01-05 20:22 79K 
[   ]eXtensible-Markup-Language.doc2013-01-05 20:18 30K 
[   ]First-things-first.doc2013-01-05 19:43 31K 
[   ]Design-for-data-warehouse.doc2013-01-05 19:40 21K 
[   ]Qualitative-data-analysis-and-commentary.doc2013-01-05 18:36 26K 
[   ]Violent-video-game.doc2013-01-03 20:58 63K 
[   ]microchip.doc2013-01-02 16:51 39K 
[   ]The-Trojan-horses.doc2012-12-30 17:32 25K 
[   ]University-computer-system-analysis.doc2012-12-30 17:19 50K 
[   ]Global-strategy-of-computer-manufacturers-and-the-digital-divide.doc2012-12-28 16:29 61K 
[   ]Networking-features-of-Windows.doc2012-12-23 16:57 81K 
[   ]Data-collection-and-processing.doc2012-12-23 16:43 27K 
[   ]Computational-rna-structure-prediction.doc2012-12-23 16:38 24K 
[   ]Encryption.doc2012-12-21 10:25 32K 
[   ]Experimental-evaluation-data-handling-workshop.doc2012-12-20 19:24 75K 
[   ]neural-networks-introduction.doc2012-12-18 09:59 50K 
[   ]PH-Measurement-Data.doc2012-12-17 19:28 43K 
[   ]Synaptic-transmission.doc2012-12-15 21:02 23K 
[   ]Windows-XP-networking-features-and-enhancements.doc2012-12-13 09:48 80K 
[   ]Psychophysical-Phenomenon-called-Masking.doc2012-12-12 20:23 140K 
[   ]With-the-great-explosion-of-use-of-Internet.doc2012-12-12 12:19 37K 
[   ]RNA-Structural-BLAST_-A-New-RNA-Structure-Database-Searching-Service.doc2012-12-11 12:29 36K 
[   ]RNA-Structural-BLAST:-A-New-RNA-Structure-Database-Searching-Service.doc2012-12-11 12:29 36K 
[   ]COMPUTER-SIMULATION-OF-ACTION-POTENTIALS-IN-SQUID-AXON.doc2012-12-09 18:23 43K 
[   ]Bulgaria_-High-Internet-penetration-–-potential-for-e-commerce.doc2012-12-08 09:42 48K 
[   ]Bulgaria:-High-Internet-penetration-–-potential-for-e-commerce.doc2012-12-08 09:42 48K 
[   ]STUDY-OF-DATA-ANALYSIS-AND-INTERPRETATION.doc2012-12-06 10:58 31K 
[   ]ENERGY-EFFICIENT-AD-HOC-ON-DEMAND-MULTIPATH-DISTANCE-VECTOR.doc2012-12-06 09:43 47K 
[   ]An-Essay-on-Phylum-Chordata.doc2012-12-03 09:32 52K 
[   ]Basic-local-alignment-search-tool.doc2012-12-03 09:30 35K 
[   ]Secure-Networking-Concepts-Within-the-Enterprise.doc2012-12-03 09:26 47K 
[   ]Transition-from-analogue-to-digital-media.doc2012-12-01 09:35 45K 
[   ]Digital-cameras.doc2012-11-29 09:56 46K 
[   ]Topology.doc2012-11-28 09:30 77K 
[   ]Information-systems-In-Banking.doc2012-11-28 09:00 28K 
[   ]How-can-the-internet-affect-a-country's-culture.doc2012-11-26 10:52 19K 
[   ]Internet-Online-Auction.doc2012-11-25 20:43 52K 
[   ]Libyan-Telecommunications.doc2012-11-25 12:17 73K 
[   ]Knowledge-and-Data-Management-in-Charity.doc2012-11-25 12:07 68K 
[   ]Matrix-Overlay-To-Networking.doc2012-11-24 08:53 75K 
[   ]Markets-section-for-ftgh-website.doc2012-11-24 08:48 25K 
[   ]Microsoft-Computer-Windows.doc2012-11-23 11:28 35K 
[   ]microsoft-and-linux.doc2012-11-23 11:27 19K 
[   ]Mobil-device-policy.doc2012-11-23 11:21 21K 
[   ]Project-management-software-appraisal.doc2012-11-20 09:12 86K 
[   ]Shop-Harrods-Merkur.doc2012-11-19 09:04 33K 
[   ]Communicationinvestigative-Report-on-Website-Development.doc2012-11-16 23:54 25K 
[   ]Television-and-networking.doc2012-11-16 15:00 30K 
[   ]Telecommunications-sector-in-indias-development.doc2012-11-16 14:35 149K 
[   ]Case-Study-of_Beijing-2008_-a-Digital-Olympics_.doc2012-11-15 23:30 148K 
[   ]The-new-web-site.doc2012-11-15 10:06 34K 
[   ]the-word-internet.doc2012-11-15 08:48 32K 
[   ]Weber's-bureaucratic-model.doc2012-11-15 08:40 35K 
[   ]Universal-Software-Solutions-Ltd.doc2012-11-14 10:15 36K 
[   ]Vanilla-log-files.doc2012-11-14 10:14 20K 
[   ]Web-Technologies-Enterprises.doc2012-11-14 09:51 44K 
[   ]UDP-datagrams.doc2012-11-14 09:42 21K 
[   ]THE-ADVENT-OF-INTERNET-BANKING-(IB)-TRENDS-IN-UK-IB.doc2012-11-14 09:06 59K 
[   ]Dell-computer-ship-system.doc2012-11-13 10:48 55K 
[   ]Designed-for-human-safety.doc2012-11-13 10:35 45K 
[   ]Development-of-microprocessor-chips.doc2012-11-13 10:33 33K 
[   ]Development-of-computer-programs.doc2012-11-13 10:31 53K 
[   ]Implement-biometric-system-(finger-prints)-in-specific-Bank-ATM-Centers.doc2012-11-13 10:06 65K 
[   ]Uni-e-text-solution.doc2012-11-13 09:22 143K 
[   ]Internet-banking-in-anz-bank.doc2012-11-12 09:57 36K 
[   ]Emirates-telecommunication-co.doc2012-11-12 09:23 44K 
[   ]Google-Online-Internet.doc2012-11-07 15:05 55K 
[   ]Market-Internet-Customers.doc2012-11-07 10:29 71K 
[   ]CASE-Network-Studies-Analyses-No.401-Mergers-and-Acquisitions-.doc2012-11-06 18:24 113K 
[   ]Yahoo-Internet-Industry.doc2012-11-06 10:05 69K 
[   ]Homer;-designing-the-microgrid-system.doc2012-11-05 22:40 111K 
[   ]Evaluation-of-Software-Industry-in-Bangladesh_-a-Study-on-Hello-Dacca-(Pvt.)-Ltd.doc2012-11-05 18:39 163K 
[   ]A-Grade-Exam-Technique-for-Data-Response-Papers.doc2012-11-03 22:39 25K 
[   ]Summarizing-qualitative-data-_.doc2012-11-03 21:37 26K 
[   ]Majority-of-the-world’s-computers-work-on-Microsoft’s-operating-platform.doc2012-11-01 09:19 20K 
[   ]Software-development-to-support-the-IFS.doc2012-11-01 09:11 40K 
[   ]What-is-Viper-and-how-does-it-work.doc2012-10-29 09:08 88K 
[   ]Areas-of-the-operations-within-Amax-Computer-Services.doc2012-10-28 08:35 57K 
[   ]Supply-chain-management-for-Dell-computers.doc2012-10-27 18:06 74K 
[   ]The-Software-BPO-industry-growth-within-Pakistan.doc2012-10-26 11:37 53K 
[   ]Michael-Dell-and-his-vision-of-customizable-home-computers.doc2012-10-25 19:36 29K 
[   ]The-birth-of-the-internet.doc2012-10-24 16:33 60K 
[   ]Influence-of-social-networking-website-on-human-resource-performance.doc2012-10-23 17:44 51K 
[   ]History-and-facts-about-DEll-Computer-Corporation.doc2012-10-23 09:34 36K 
[   ]Aerospace-computational-techniques.doc2012-10-22 10:39 40K 
[   ]Aircrafts.doc2012-10-22 10:36 69K 
[   ]A-mobile-network-operator.doc2012-10-22 10:17 56K 
[   ]Experience-of-Developing-a-game.doc2012-10-21 21:07 39K 
[   ]Digital-art.doc2012-10-21 20:40 32K 
[   ]Level-design.doc2012-10-21 15:34 116K 
[   ]Overviews-of-the-VPN-technologies.doc2012-10-21 10:05 33K 
[   ]Windows-and-Linux.doc2012-10-20 21:18 159K 
[   ]Shared-memory-MIMD-architecture.doc2012-10-19 10:46 53K 
[   ]Neural-architecture.doc2012-10-19 10:11 34K 
[   ]multitree-database-architecture-for-mobile-networks.doc2012-10-19 10:10 32K 
[   ]Pc-tech;-consulting-repairs-training-networking-and-upgrading.doc2012-10-19 09:48 33K 
[   ]Parametric-and-algorithmic-design.doc2012-10-19 09:47 66K 
[   ]WMDA.doc2012-10-19 09:37 21K 
[   ]The-rapid-technological-progression.doc2012-10-19 09:34 45K 
[   ]The-metadata-repository.doc2012-10-19 09:26 20K 
[   ]A-main-component-to-design-fish-recognition-and-classification-system-architecture.doc2012-10-18 19:07 144K 
[   ]Common-bus-system.doc2012-10-18 10:07 26K 
[   ]DATA-ANALYSIS-FINDINGS-AND-CONCLUSION.doc2012-10-16 10:09 68K 
[   ]Digital-video-recorders.doc2012-10-16 10:06 28K 
[   ]Regulatory-frameworks-for-the-internet.doc2012-10-15 10:11 23K 
[   ]Direct-manipulation-and-multi-touch-interactions.doc2012-10-14 23:45 27K 
[   ]Direct-Manipulation-and-Multi-touch-Interactions.doc2012-10-14 23:45 27K 
[   ]The-Geography-of-News-in-Digital-Times.doc2012-10-14 23:41 33K 
[   ]Multimedia-Applications.doc2012-10-14 11:50 31K 
[   ]About-email-viruses.doc2012-10-14 10:38 18K 
[   ]Advento-da-internet.doc2012-10-14 08:47 60K 
[   ]Cluster-analysis.doc2012-10-12 09:47 77K 
[   ]Dell-Computer-Corporation.doc2012-10-11 19:38 30K 
[   ]Information-systems-analysis.doc2012-10-10 21:07 37K 
[   ]Implication-of-agency-theory-in-MCSs.doc2012-10-10 20:56 57K 
[   ]ID-T's-Network.doc2012-10-10 20:04 81K 
[   ]Semantics-based-web-application-security.doc2012-10-08 20:29 67K 
[   ]What-is-Spoofing.pdf2012-03-23 23:36 589K 
[   ]Computer-Networks-and-Distributed-Systems-Wireless-network-of-devices.pdf2012-03-23 08:13 522K 
[   ]This-report-details-the-progress-over-the-last-6-months-of-our-R-D-team-for-Apple’s-new-domestic-product-service-area-iHome.pdf2012-03-15 07:37 950K 
[   ]Voice-Encryption-using-RSA-Algorithm.pdf2012-03-15 07:35 2.7M 
[   ]speech-recognition.pdf2012-03-15 07:35 184K 
[   ]MATLAB-is-one-of-the-most-popular-computer-languages-for-technical-and-scientific-programming.pdf2012-03-15 07:29 1.0M 
[   ]Mathematics-for-Computing.pdf2011-08-13 07:58 1.1M 
[   ]Foundation-Degree-Computing-Statistical-Methods.pdf2011-03-15 08:47 597K 
[   ]OPTIMAL-PATH-PLANNING-USING-AN-IMPROVED-A@-ALGORITHM-FOR-HOMELAND-SECURITY-APPLICATIONS.pdf2011-03-12 20:26 635K 
[   ]OPTIMAL-PATH-PLANNING-USING-AN-IMPROVED-A*-ALGORITHM-FOR-HOMELAND-SECURITY-APPLICATIONS.pdf2011-03-12 20:26 635K 
[   ]Information-Overload.pdf2011-03-03 08:33 75K 
[   ]florest_project.pdf2011-03-02 10:25 490K 
[   ]motorcycle-apparel-online-project.pdf2011-03-02 10:24 951K 
[   ]Information_systems_and_benefits_to_companies.pdf2011-03-02 10:16 471K 
[   ]Visual-Basic.pdf2011-03-02 10:14 1.8M 
[   ]3SFE504-Object-Oriented-Programming-Linear-and-Independent-Hash-Table-code.pdf2011-03-02 10:14 1.5M 
[   ]3SFE518-Computer-System-Organisation-Piping.pdf2011-03-02 10:13 148K 
[   ]3ISE517-Internet-Application-Programming-CGI.pdf2011-03-02 10:12 662K 
[   ]Star-College-Student-Accommodation.pdf2011-03-02 10:09 318K 
[   ]Airline-reservation-system.pdf2011-03-02 10:08 455K 
[   ]Operating-system.pdf2011-03-02 10:07 1.0M 
[   ]Usability-Evaluation-Methods.pdf2011-03-02 10:06 1.0M 
[   ]Impact-of-Social-Networking-on-e-business.pdf2011-03-02 10:06 337K 
[   ]Investigating-the-viability-of-e-commerce-in-an-organization.pdf2011-03-02 10:04 413K 
[   ]Information-Systems.pdf2011-03-02 10:03 240K 
[   ]introduction-to-the-IEEE-802.11p-WAVE-standard.pdf2011-03-02 10:02 209K 
[   ]Types-of-IT-Security-Threats.pdf2011-03-01 19:38 193K 
[   ]Methods-and-technology-used-in-Computer-Forensics.pdf2011-03-01 19:37 1.3M 
[   ]online-detection-and-prevention-of-phishing.pdf2011-03-01 19:34 409K 
[   ]Wireless-LANs-WLANs-are-now-deployed-at-great-pace-both-on-company-premises-and-in-public-hot-spots.pdf2011-03-01 19:15 1.9M 
[   ]Discuss-the-role-of-the-following-facilities-information_·-Data-bases·-Client-servers·-Expert-systems-and-AI-Data-warehousing..pdf2011-03-01 19:14 277K 
[   ]Discuss-the-role-of-the-following-facilities-information:·-Data-bases·-Client-servers·-Expert-systems-and-AI-Data-warehousing..pdf2011-03-01 19:14 277K 
[   ]what_are_computer_graphics.pdf2011-03-01 15:29 15K 
[   ]UK-Copyright-and-File-Sharing.pdf2011-03-01 15:24 263K 
[   ]GSM-Security-.pdf2011-03-01 15:23 97K 
[   ]Critique_-Why-Don't-we-encrypt-email.pdf2011-03-01 15:22 39K 
[   ]Critique:-Why-Don't-we-encrypt-email.pdf2011-03-01 15:22 39K 
[   ]determinants-of-knowledge-sharing.pdf2011-03-01 15:20 2.0M 
[   ]A-bucketing-framework-for-Database-security.pdf2011-03-01 15:19 1.1M 
[   ]quality_assurance.pdf2011-03-01 15:15 189K 
[   ]applied_encryption_standard.pdf2011-03-01 15:12 103K 
[   ]forensic_crime_msc.pdf2011-03-01 15:05 439K 
[   ]attitudes_towards_software_piracy.pdf2011-03-01 15:03 360K 
[   ]database_systems_web_transactions_msc.pdf2011-03-01 15:01 739K