Index of /coursework/University/Computer-Science
Name
Last modified
Size
Description
Parent Directory
-
Linux.doc
2013-02-02 19:43
9.0K
Backup-system-manual.doc
2013-01-13 18:59
12K
Semantic-Web-Framework.doc
2013-01-06 20:19
14K
what_are_computer_graphics.pdf
2011-03-01 15:29
15K
Windows-Mobile.doc
2013-01-14 20:49
15K
introduction-to-opnet-simulator.doc
2013-01-11 09:47
15K
Databases-serve-as-the-digital-bank.doc
2013-02-11 20:53
16K
Social-networking.doc
2013-01-31 11:18
16K
social-networking.doc
2013-01-31 11:18
16K
Digital-Ants-as-Network-Guards.doc
2013-02-10 23:03
16K
Free-Wireless-Access-and-Impact-to-Law-Enforcement.doc
2013-03-08 19:40
16K
The-interactive-fiction.doc
2013-01-19 19:47
16K
Editor-for-single-user-interface.doc
2013-02-09 20:55
17K
Essay-about-Data-Information-and-Knowledge.doc
2013-02-09 13:21
17K
Microsoft-Windows-CE.doc
2013-02-02 19:39
17K
Multiple-realisation-argument.doc
2013-01-26 21:59
17K
OPEN-OFFICE.doc
2013-01-09 09:58
17K
Virtualization-and-Cloud-Computing.doc
2013-01-13 17:50
17K
A-Rich-Internet-Application.doc
2013-02-17 13:51
17K
OS-Platforms-and-Computer-Technologies.doc
2013-01-25 19:41
17K
Pre-processing.doc
2013-01-25 19:21
17K
Student-System-Attendance.doc
2013-01-22 21:26
17K
Windows-XP-environment.doc
2013-01-14 20:27
17K
Wireless-LAN-in-hospital.doc
2013-01-14 20:47
17K
APIT-snapshots-on-Windows.doc
2013-01-14 20:08
18K
IP-multicast-deployment.doc
2013-01-11 09:46
18K
Input-Media.doc
2013-01-13 18:19
18K
Macintosh-operating-system.doc
2013-02-04 17:52
18K
Research-method-some-form-of-data-collection-and-some-form-of-evaluation-of-results.doc
2013-01-24 19:28
18K
24-hours-without-being-digital.doc
2013-02-17 16:22
18K
About-email-viruses.doc
2012-10-14 10:38
18K
Classes-and-objects.doc
2013-02-14 20:33
18K
Developed-hierarchical-network-model.doc
2013-02-09 21:09
18K
Methodologies.doc
2013-02-02 18:15
18K
Myanma-Computer-Company-Ltd.doc
2013-01-31 18:41
18K
Optical-technology.doc
2013-01-07 20:51
18K
Social-networking-benefits.doc
2013-01-07 20:41
18K
A-glimpse-on-artificial-intelligence.doc
2013-02-17 13:58
19K
About-wireless-networks.doc
2013-02-17 14:13
19K
Computer-School-Friend.doc
2013-01-12 17:35
19K
Developing-a-quality-database.doc
2013-02-09 21:03
19K
For-security-shell.doc
2013-02-07 22:50
19K
Linux-.doc
2013-02-02 19:44
19K
Linux-is-a-powerful-non-proprietary-standards-based-operating-system.doc
2013-02-01 18:54
19K
Modifying-an-Authorization-Right.doc
2013-02-02 19:16
19K
Network-devices-thing-cable.doc
2013-01-09 09:20
19K
Power-Over-Ethernet.doc
2013-01-25 19:22
19K
Research-into-office-automation-systems.doc
2013-01-24 20:27
19K
Supercomputers-vs-microprocessors.doc
2013-01-22 20:20
19K
The-standard-security-technology.doc
2013-01-17 20:24
19K
Z-notation.doc
2013-01-14 20:18
19K
microsoft-and-linux.doc
2012-11-23 11:27
19K
About-c-program.doc
2013-02-17 14:29
19K
All-spheres-of-life.doc
2013-02-16 19:29
19K
Computer-Programmer-Job.doc
2013-02-13 19:55
19K
Computer-Systems-Architecture-ACPU-cache.doc
2013-02-12 19:57
19K
Credit-card-processing-and-its-vendors.doc
2013-01-12 19:27
19K
Google-chrome-OS.doc
2013-02-09 12:49
19K
How-can-the-internet-affect-a-country's-culture.doc
2012-11-26 10:52
19K
In-front-of-a-computer.doc
2013-02-05 20:34
19K
MIMO-In-IEEE.doc
2013-01-11 19:45
19K
describing-the-ip-transport-mechanisms.doc
2013-02-10 23:13
19K
A-Heurstic-method-for-improving-the-efficiency-of-the-k-means.doc
2013-01-13 19:47
20K
Embedded-multimedia-and-today's-web-development-environment.doc
2013-02-09 20:44
20K
Existence-of-video-games.doc
2013-02-09 13:56
20K
Majority-of-the-world’s-computers-work-on-Microsoft’s-operating-platform.doc
2012-11-01 09:19
20K
Model-and-uses-of-the-software-testing-process.doc
2013-02-02 19:35
20K
The-metadata-repository.doc
2012-10-19 09:26
20K
To-reduce-function-call-overhead.doc
2013-01-17 19:01
20K
A-conceptual-description-of-a-framework.doc
2013-02-17 16:36
20K
About-AODV-protocol.doc
2013-02-17 14:30
20K
Constructing-and-designing-a-database.doc
2013-02-12 19:50
20K
MAC-OS-X.doc
2013-02-02 19:56
20K
Microchip-implantation.doc
2013-02-02 19:08
20K
Shareware.doc
2013-01-23 21:05
20K
Starbucks-wifi-internet-access.doc
2013-01-22 21:56
20K
Uses-of-mainframe-desktop-in-client-server.doc
2013-01-17 18:15
20K
Vanilla-log-files.doc
2012-11-14 10:14
20K
Human-computer-interface.doc
2013-02-07 10:45
21K
Microelectronics-and-nano-electronics.doc
2013-02-02 18:25
21K
Modulation-Technique.doc
2013-02-02 19:13
21K
Most-WLAN-hardwares.doc
2013-02-02 18:28
21K
Network-router-simulation.doc
2013-01-31 19:27
21K
Public-key-infrastructure.doc
2013-01-24 21:24
21K
Secure-communication-in-cognitive-radio-networks.doc
2013-01-06 07:56
21K
Security-enhanced-linux.doc
2013-01-24 18:24
21K
Similarities-and-differences-of-linux-and-microsoft-windows-operating-system.doc
2013-01-23 20:48
21K
Audio-Steganography.doc
2013-02-15 19:27
21K
Computer-aided-diagnosis.doc
2013-02-13 19:31
21K
Design-for-data-warehouse.doc
2013-01-05 19:40
21K
Mobil-device-policy.doc
2012-11-23 11:21
21K
Scheduling-basically-deals.doc
2013-01-24 19:54
21K
Selecting-the-Image-menu.doc
2013-01-23 20:41
21K
Short-Message-Service-(SMS).doc
2013-01-06 20:13
21K
Symbian-OS.doc
2013-01-22 20:27
21K
The-Benefits-of-Computer-Information-Systems.doc
2013-02-06 23:56
21K
The-Linux-Kernel-2.6.doc
2013-01-18 18:28
21K
UDP-datagrams.doc
2012-11-14 09:42
21K
WMDA.doc
2012-10-19 09:37
21K
Web-Development-Browser-Server.doc
2013-01-16 19:30
21K
Illegal-production-of-computer-software.doc
2013-02-07 22:37
22K
Micro-operations-are-the-operation.doc
2013-02-02 18:26
22K
Microprocessor-and-central-processing-unit.doc
2013-01-31 18:25
22K
Strategy-relevant-databases.doc
2013-01-22 21:21
22K
Tracking-the-up-to-date-information.doc
2013-01-17 18:56
22K
Values-in-the-same-instance.doc
2013-01-17 16:33
22K
Vital-for-the-success.doc
2013-01-15 20:49
22K
Wireless-Network-Link.doc
2013-01-06 18:47
22K
A-computer-file-format.doc
2013-02-17 16:13
22K
Assembler-compiler-and-interpreter.doc
2013-02-15 19:29
22K
Benefits-of-extreme-programming-method-of-development.doc
2013-02-15 19:23
22K
Buyer’s-Guide-to-Phone-Systems.doc
2013-01-12 20:36
22K
DISTRIBUTED-DENIAL-OF-SERVICE.doc
2013-02-09 20:25
22K
Different-lan-technologies.doc
2013-02-10 22:50
22K
Factors-for-a-reliable-wed-site.doc
2013-02-09 14:07
22K
In-flat-routing-algorithms.doc
2013-02-06 23:44
22K
Major-system-files-of-windows-xp.doc
2013-02-02 20:15
22K
Media-formats-and-storage-mechanisms-for-3d-web-prototype.doc
2013-02-02 18:14
22K
The-'Data-Explosion�-and-its-Implications.doc
2013-03-08 19:33
22K
VBLAST-architecture.doc
2013-01-16 19:52
22K
Web-data-mining.doc
2013-01-13 20:18
22K
Windows-2003-Server-Troubleshooting-Tools.doc
2013-01-14 21:05
22K
World's-leading-supercomputer-company.doc
2013-01-14 20:14
22K
3d-computer-graphics-and-web.doc
2013-02-13 20:38
23K
Behaviour-finite-state-machine.doc
2013-02-15 19:14
23K
Blowfish-is-a-variable-length.doc
2013-02-14 20:16
23K
Computer-imaging-techniques.doc
2013-02-13 20:22
23K
Internet-Group-management-protocol.doc
2013-01-06 18:08
23K
Motion-capture-technique.doc
2013-01-26 21:53
23K
Network-architects.doc
2013-01-31 18:55
23K
Object-oriented-concepts-of-java.doc
2013-01-26 20:42
23K
Supporting-Users-and-Troubleshooting-a-Desktop.doc
2013-01-22 20:33
23K
Tetra-network.doc
2013-01-06 19:04
23K
The-importance-vulnerabilities.doc
2013-01-19 20:18
23K
Being-born-into-a-family.doc
2013-02-15 19:16
23K
Clustering-benefit.doc
2013-01-12 20:10
23K
Cyberpunk-outlaws-and-hackers-on-the-computer-frontier.doc
2013-02-11 20:27
23K
IP6-over-ip4-arguments.doc
2013-02-04 18:47
23K
Indexing.doc
2013-02-07 10:32
23K
Mobile-Databases-and-GPS.doc
2013-01-09 10:10
23K
Optical-layer.doc
2013-01-09 10:03
23K
Regulatory-frameworks-for-the-internet.doc
2012-10-15 10:11
23K
Synaptic-transmission.doc
2012-12-15 21:02
23K
The-network.doc
2013-01-26 17:29
23K
Administrator-and-user-activity.doc
2013-02-16 19:10
24K
Creating-tables-of-pre-joined-data.doc
2013-02-12 20:24
24K
Databases-before-and-since-electronic-computers.doc
2013-02-12 19:45
24K
Different-processes-of-software-engineering.doc
2013-02-10 23:05
24K
Human-information-interaction-and-collaborative-information-retrieval.doc
2013-02-07 10:48
24K
Individual-report-on-usb-flash-drives.doc
2013-02-07 10:29
24K
Knowledge-Base.doc
2013-02-04 19:22
24K
Network-transmission-method-methodology.doc
2013-01-26 17:23
24K
Networking-technologies-and-security-systems.doc
2013-01-25 20:01
24K
Share-a-same-interest.doc
2013-01-23 19:59
24K
Skilled-testers-and-advantages-of-script-engineering.doc
2013-01-23 19:39
24K
TECHNOLOGY-USED-IN-CDMA.doc
2013-01-14 19:26
24K
The-combination-of-living-one's-values.doc
2013-01-19 21:34
24K
The-modulation-technique-Gaussian-minimum-shift-keying.doc
2013-01-18 18:10
24K
skilled-testers-and-advantages-of-script-engineering.doc
2013-01-23 19:39
24K
Activities-for-which-i-plan-to-use-the-computer-system.doc
2013-01-14 21:23
24K
Computational-rna-structure-prediction.doc
2012-12-23 16:38
24K
Different-uses-for-spreadsheets.doc
2013-02-10 23:08
24K
Graphics-file-formats.doc
2013-02-09 13:10
24K
Indexing-only-need-one-lookup.doc
2013-02-07 10:23
24K
Parallel-stereoscopic-video-images-quality-assessment.doc
2013-01-25 19:55
24K
Reason-for-RAM.doc
2013-01-24 20:06
24K
Security-Issues-in-Multimedia-Transmission.doc
2013-01-09 08:43
24K
Security-in-multicasting.doc
2013-01-06 17:45
24K
Service-oriented-computing.doc
2013-01-23 20:37
24K
Style-translation-for-human-motion.doc
2013-01-22 21:11
24K
The-latest-technologies.doc
2013-01-18 19:55
24K
Understanding-of-LAN.doc
2013-01-17 18:04
24K
Windows-vs.-Macintosh.doc
2013-01-14 20:29
24K
X-Cart-Review.doc
2013-01-14 20:57
24K
After-the-arrival-of-java.doc
2013-02-16 19:11
25K
An-object-that-groups-multiple.doc
2013-02-16 19:27
25K
Cloud-Computing-information-and-communication-technology.doc
2013-02-14 20:32
25K
Creating-a-formal-model-for-the-identification-of-semantic-similarity-between-documents.doc
2013-02-12 20:20
25K
Current-state-of-IDS.doc
2013-02-12 20:15
25K
Digital-library-services.doc
2013-02-10 22:59
25K
Information-systems.doc
2013-02-05 20:02
25K
Mobile-and-Wireless-Communication.doc
2013-01-11 09:42
25K
Optical-network-demand-bundling-using-DS3-forming.doc
2013-01-09 10:02
25K
Performance-evaluation-of-CDMA.doc
2013-01-24 21:54
25K
Super-memo-method.doc
2013-01-22 20:37
25K
The-process-of-communication-managing-information-knowledge.doc
2013-01-06 20:08
25K
Use-of-networks.doc
2013-01-17 17:13
25K
Voice-over-ip-and-its-uses.doc
2013-01-15 20:53
25K
A-Grade-Exam-Technique-for-Data-Response-Papers.doc
2012-11-03 22:39
25K
Communicationinvestigative-Report-on-Website-Development.doc
2012-11-16 23:54
25K
Database-systems-development.doc
2013-02-11 21:10
25K
File-transfer-application.doc
2013-02-09 13:44
25K
Internet-base-technologies.doc
2013-01-09 10:32
25K
Markets-section-for-ftgh-website.doc
2012-11-24 08:48
25K
Network-security-weaknesses.doc
2013-01-31 19:30
25K
Services-of-information-technology.doc
2013-01-23 19:58
25K
Signal-processing.doc
2013-01-06 20:10
25K
Software-Testing-Tools.doc
2013-01-17 20:44
25K
The-Trojan-horses.doc
2012-12-30 17:32
25K
Wi-fi-and-the-Development-of-Multimedia.doc
2013-01-05 20:23
25K
services-of-information-technology.doc
2013-01-23 19:58
25K
Confidentiality.doc
2013-01-06 07:58
26K
End-to-End-Available-Bandwidth.doc
2013-01-14 18:57
26K
Leveraging-the-benefits-from-internet.doc
2013-02-01 19:06
26K
Microcomputer-CPU-Processing.doc
2013-02-02 18:34
26K
Microprocessor-Game-Components.doc
2013-02-02 19:07
26K
Microsoft-share-Point.doc
2013-01-13 20:09
26K
Mobile-and-Wireless-Communications.doc
2013-01-09 09:30
26K
Network-address-translation.doc
2013-01-31 18:49
26K
Object-oriented-programming-with-subclasses.doc
2013-01-26 21:10
26K
Paper-reading-report:-motion-synthesis-from-annotations.doc
2013-01-25 19:53
26K
Paper-reading-report_-motion-synthesis-from-annotations.doc
2013-01-25 19:53
26K
Qualitative-data-analysis-and-commentary.doc
2013-01-05 18:36
26K
Search-strategy-using-relevant-databases-to-identify-an-article-on-evidenced-based-practice-in-the-healthcare-setting.doc
2013-01-24 19:12
26K
Summarizing-qualitative-data-_.doc
2012-11-03 21:37
26K
The-polymorphism.doc
2013-01-18 19:26
26K
Common-bus-system.doc
2012-10-18 10:07
26K
Cybercrime-computer-network.doc
2013-03-08 19:36
26K
Distributed-system-transations.doc
2013-02-09 14:10
26K
Micro-controller-based-temperature-indicator.doc
2013-01-13 20:10
26K
The-diversity-database-consists.doc
2013-01-19 20:53
26K
The-google-talk.doc
2013-01-18 20:04
26K
Usability-of-computer-software.doc
2013-01-17 17:59
26K
Cloud-Computing.doc
2013-02-14 20:31
27K
Microcomputer-applications-for-technology.doc
2013-01-31 20:01
27K
Multi-resolution-mesh-morphing.doc
2013-01-26 21:36
27K
Security-mechanisms-to-protect-sensitive-data-for-easy-shopping.doc
2013-01-13 19:48
27K
Software-testing-is-the-independent-view.doc
2013-01-22 21:45
27K
The-project-studies-methodologies.doc
2013-01-17 21:11
27K
3g-mobile-telecommunication.doc
2013-01-06 07:53
27K
Data-collection-and-processing.doc
2012-12-23 16:43
27K
Digital-data-communications.doc
2013-02-10 23:00
27K
Direct-Manipulation-and-Multi-touch-Interactions.doc
2012-10-14 23:45
27K
Direct-manipulation-and-multi-touch-interactions.doc
2012-10-14 23:45
27K
How-does-Yield-Keyword-of-CUse-Lazy-Evaluation.doc
2013-02-04 18:32
27K
Preserving-the-digital-information.doc
2013-01-25 19:04
27K
Ruby-on-rails.doc
2013-01-24 19:35
27K
Supercomputer-and-cray-inc-of-high-performance-computing.doc
2013-01-22 20:21
27K
Technical-writing-in-computer-hardware-electronics-and-aerospace.doc
2013-01-21 19:06
27K
The-relevant-research-topics.doc
2013-01-17 21:20
27K
The-rich-internet-experience-of-Web-2.0.doc
2013-01-13 20:23
27K
Ad-Hoc-routing-protocols-wireless-network.doc
2013-02-16 19:25
28K
Denial-of-Service-(DoS)-attacks.doc
2013-02-09 23:19
28K
Increasing-number-of-ubiquitous-devices.doc
2013-02-07 10:24
28K
Need-and-practical-application-of-objects.doc
2013-01-31 19:14
28K
Problems-caused-by-viruses.doc
2013-01-24 20:59
28K
The-Wi-Max-standards.doc
2013-01-17 19:48
28K
The-introduction-of-delay.doc
2013-01-19 19:57
28K
The-network-requirements.doc
2013-01-18 19:41
28K
Advantages-And-Disadvantages-Of-Data-On-Rape-Crimes-Criminology-Essay.doc
2013-02-20 19:13
28K
Constructors-in-c++-language.doc
2013-02-12 19:56
28K
Database-management-for-information-work.doc
2013-02-11 21:04
28K
Dcumentation-of-information.doc
2013-02-09 14:20
28K
Digital-video-recorders.doc
2012-10-16 10:06
28K
Distributed-Denial-of-Service-(DDOS).doc
2013-02-09 20:24
28K
Distributed-Firewalls.doc
2013-02-09 20:28
28K
Information-systems-In-Banking.doc
2012-11-28 09:00
28K
Introduce-computers.doc
2013-02-05 20:08
28K
Mashups-Application-Widget.doc
2013-02-02 18:40
28K
Most-popular-amongst-the-home-users.doc
2013-02-02 19:29
28K
Samba-server.doc
2013-01-24 19:58
28K
Signaling-Network-Routing.doc
2013-01-06 20:11
28K
The-experimental-study-reveals.doc
2013-01-18 20:17
28K
The-various-Methods-of-data-collection.doc
2013-03-02 21:01
28K
Widely-installed-operating-system.doc
2013-01-14 21:50
28K
COMPUTER-AND-CYBER-CRIME.doc
2013-02-13 19:30
29K
Data-warehouse-bus-matrix.doc
2013-02-11 21:03
29K
Dynamic-Web-Engineering.doc
2013-01-13 17:47
29K
Hardware-practice-and-networks.doc
2013-02-09 13:00
29K
Integrating-data.doc
2013-02-04 19:31
29K
Internet:-web-technology-and-security.doc
2013-02-05 20:09
29K
Internet_-web-technology-and-security.doc
2013-02-05 20:09
29K
Master-thesis-in-computer-science.doc
2013-01-13 20:12
29K
Michael-Dell-and-his-vision-of-customizable-home-computers.doc
2012-10-25 19:36
29K
Static-and-dynamic-IP-address.doc
2013-01-22 21:57
29K
THE-NUMERATI-by-Stephen-Baker.doc
2013-01-18 19:52
29K
The-computer-game-industries.doc
2013-01-21 19:55
29K
The-programming-methods.doc
2013-01-17 21:12
29K
Wireless-transmission.doc
2013-01-14 21:16
29K
A-very-appreciable-freeware.doc
2013-02-17 14:09
29K
Agile-development-methods.doc
2013-02-16 19:07
29K
Assembling-a-desktop-computer.doc
2013-02-15 19:26
29K
Digital-Access-System.doc
2013-01-12 19:55
29K
Software-Development.doc
2013-01-13 17:29
29K
Supplement-Email.doc
2013-01-07 20:09
29K
Wireless-Mesh-Networks.doc
2013-01-06 18:52
29K
Wireless-mesh-networks.doc
2013-01-06 18:52
29K
Artificial-Intelligent-Browser.doc
2013-02-14 21:13
30K
Bug-tracking.doc
2013-01-13 18:57
30K
Computer-Science:-Fulfilment-Logistics-Fulfilment-Strategy..doc
2013-01-13 18:28
30K
Computer-Science_-Fulfilment-Logistics-Fulfilment-Strategy..doc
2013-01-13 18:28
30K
Dell-Computer-Corporation.doc
2012-10-11 19:38
30K
Development-of-the-internet.doc
2013-01-06 18:15
30K
Forensic-data-recovery.doc
2013-02-09 12:49
30K
Hacker-Security-Technology.doc
2013-02-09 13:13
30K
IP-Telephony-Advent-and-Future.doc
2013-01-09 10:33
30K
Image-processing-applications.doc
2013-02-07 21:46
30K
In-the-use-of-metadata.doc
2013-02-07 10:22
30K
QoS-guaranteed-adaptive-load-sharing-for-network-processors.doc
2013-01-24 21:00
30K
Some-web-templates-codes.doc
2013-01-23 18:52
30K
The-internet-is-a-large-market.doc
2013-01-19 19:43
30K
What's-social-network-analysis.doc
2013-01-14 21:35
30K
Wireless-Network-Hacking.doc
2013-01-14 20:36
30K
eXtensible-Markup-Language.doc
2013-01-05 20:18
30K
Advanced-congestion-control-algorithm.doc
2013-02-16 19:02
30K
Assessment-must-be-the-students-own.doc
2013-02-15 19:24
30K
Cad-system-and-building-information-modelling.doc
2013-02-20 11:41
30K
Dynamic-unicast-addressing.doc
2013-02-09 20:52
30K
Effects-of-GPS-on-Human-Life.doc
2013-02-09 20:31
30K
History-of-Digital-signatures.doc
2013-01-06 07:47
30K
Local-area-network-design.doc
2013-01-13 18:34
30K
QNX-Operating-System.doc
2013-01-24 21:06
30K
Satellite-Channel-Simulator.doc
2013-01-07 21:02
30K
Television-and-networking.doc
2012-11-16 15:00
30K
The-main-objective-of-the-paper.doc
2013-01-18 18:32
30K
Enhancing-three-dimensional-image-ray-tracing-to-predict-the-propagation-channel-parameters.doc
2013-02-09 13:37
31K
First-things-first.doc
2013-01-05 19:43
31K
My-academic-report.doc
2013-01-26 21:29
31K
Present-and-the-future-market-scenario-of-software-components.doc
2013-01-25 19:19
31K
Punishing-Treating-Preventing.doc
2013-03-07 21:13
31K
STUDY-OF-DATA-ANALYSIS-AND-INTERPRETATION.doc
2012-12-06 10:58
31K
Security-protocol-standard.doc
2013-01-23 19:42
31K
TASK-Analysis-for-AZ-electronic-Application.doc
2013-01-13 18:15
31K
The-personal-computer.doc
2013-01-18 19:00
31K
The-psychoacoustic-model.doc
2013-01-17 21:09
31K
The-scalable-video-coding-standard.doc
2013-01-17 20:58
31K
Aspect-of-warfare.doc
2013-01-06 18:20
31K
Computer-utilization-between-the-United-States-and-France.doc
2013-02-12 19:58
31K
Data-models.doc
2013-02-10 22:46
31K
Evaluate-the-performance.doc
2013-01-06 18:11
31K
Global-positioning-system-and-programmable-intelligent-computer.doc
2013-02-07 22:46
31K
Granularity-in-granular-computing.doc
2013-02-09 13:15
31K
Latest-mobile-and-wireless-technologies.doc
2013-02-04 19:19
31K
Mobile-multimedia-services.doc
2013-01-09 10:18
31K
Multimedia-Applications.doc
2012-10-14 11:50
31K
Partially-importing-the-ontologies.doc
2013-01-25 19:51
31K
Web-Development.doc
2013-01-16 19:20
31K
Wi-fi-Wireless-Technology.doc
2013-01-06 18:51
31K
Adaptive-Query-Processing.doc
2013-02-16 19:18
32K
Digital-art.doc
2012-10-21 20:40
32K
Mobile-computing.doc
2013-02-02 19:40
32K
Radio-Technology.doc
2013-01-09 08:49
32K
Steganography.doc
2013-01-22 21:39
32K
WINDOWS-XP-STRUCTURE.doc
2013-01-14 20:24
32K
multitree-database-architecture-for-mobile-networks.doc
2012-10-19 10:10
32K
Cyber-terrorism-at-various.doc
2013-02-12 20:14
32K
Effect-of-using-different-codes-for-Power-reduction.doc
2013-02-09 20:34
32K
Encryption.doc
2012-12-21 10:25
32K
Handwritten-character-recognition.doc
2013-01-13 18:52
32K
Networks-question.doc
2013-01-09 10:17
32K
SelARC-with-content-mining.doc
2013-01-23 20:33
32K
Sensor-Technology.doc
2013-01-23 20:38
32K
TCP-Illinois-achieves-high-throughout.doc
2013-01-21 19:12
32K
The-basic-concepts-of-database-theory.doc
2013-01-19 21:02
32K
US-homeland-security-related-critical-infrastructure-matters.doc
2013-02-26 19:46
32K
Using-stacks-and-queues.doc
2013-01-17 16:37
32K
Wireless-Network-Computer.doc
2013-01-14 20:52
32K
kinds-of-virus.doc
2013-02-04 19:26
32K
the-word-internet.doc
2012-11-15 08:48
32K
3G:-Sophistication-Guaranteed.doc
2013-01-05 20:41
33K
3G_-Sophistication-Guaranteed.doc
2013-01-05 20:41
33K
A-microcomputer-system.doc
2013-02-17 14:03
33K
Logical-and-physical-network-design.doc
2013-02-01 19:01
33K
Overviews-of-the-VPN-technologies.doc
2012-10-21 10:05
33K
Structure-of-a-second-course.doc
2013-01-22 21:36
33K
Wireless-network.doc
2013-01-14 21:06
33K
An-exchange-server-or-configuring.doc
2013-02-16 19:34
33K
Asynchronous-JavaScript-and-XML.doc
2013-02-15 19:29
33K
Describing-the-Arpanet.doc
2013-01-12 19:00
33K
Development-of-microprocessor-chips.doc
2012-11-13 10:33
33K
Government-website-on-the-internet.doc
2013-02-09 13:04
33K
Importance-of-software-testing-process-in-software-development-engineering.doc
2013-02-07 10:16
33K
Mining-model-algorithm-and-data-mining-algorithm-used-in-sql-server.doc
2013-01-31 18:23
33K
Pc-tech;-consulting-repairs-training-networking-and-upgrading.doc
2012-10-19 09:48
33K
Risk-assessment.doc
2013-01-24 20:01
33K
Shop-Harrods-Merkur.doc
2012-11-19 09:04
33K
The-DSpace-system.doc
2013-01-22 19:38
33K
The-Geography-of-News-in-Digital-Times.doc
2012-10-14 23:41
33K
Thermal-Grating-NDE.doc
2013-01-17 19:47
33K
Transmission-Control-Protocol-Westwood.doc
2013-01-17 19:30
33K
Voice-over-Internet-Protocol-Applications.doc
2013-01-06 19:31
33K
What-is-DL-and-KM.doc
2013-01-14 21:43
33K
Wireless-local-area-networks.doc
2013-01-14 20:41
33K
Ad-hoc-network.doc
2013-02-16 19:17
34K
Band-Width-TDM.doc
2013-01-12 22:22
34K
Client-server-architecture.doc
2013-02-14 20:21
34K
Commutative-encryption-and-decryption.doc
2013-01-12 21:09
34K
Computer-and-its-effects-on-human-life.doc
2013-02-13 19:28
34K
Computers-are-increasing-day-by-day.doc
2013-02-12 20:05
34K
Establishing-a-Web-Presence-for-Myself.doc
2013-02-09 13:23
34K
Joint-Strategic-Initiative-Acceptable-Use-Policy.doc
2013-02-04 17:59
34K
Mac-Protocol.doc
2013-01-11 19:48
34K
Module-based-framework-for-communication-in-heterogeneous-networks.doc
2013-01-05 21:36
34K
Network-System-Windows.doc
2013-01-09 10:13
34K
Neural-architecture.doc
2012-10-19 10:11
34K
A-critical-evaluation-of-web-engineering-tools-technologies.doc
2013-02-17 16:35
34K
Data-mining-and-its-significance.doc
2013-02-10 22:45
34K
Fibre-network-user-service-survivability.doc
2013-01-12 17:46
34K
RF-communication-technology.doc
2013-01-06 07:57
34K
Structured-systems-analysis.doc
2013-01-22 21:31
34K
The-new-web-site.doc
2012-11-15 10:06
34K
Various-data-transmission-protocols.doc
2013-01-16 09:34
34K
computers-which-are-hacked.doc
2013-03-01 21:11
34K
Enhanced-database-systems.doc
2013-02-09 13:36
35K
Information-Security-Strategy-for-Easy-Shopping.doc
2013-01-13 18:49
35K
Latest-technological-development.doc
2013-02-04 18:51
35K
Network-Matrix-Reduction.doc
2013-01-31 19:38
35K
Pervasive-systems.doc
2013-01-24 21:44
35K
Project-preparation-essay.doc
2013-01-24 21:16
35K
The-Nyquist-theorem.doc
2013-01-18 19:37
35K
The-field-of-computer-and-information-security.doc
2013-01-13 20:29
35K
The-great-advances-in-information-storage.doc
2013-01-18 20:06
35K
Water-level-controller.doc
2013-01-06 19:48
35K
About-amazon.com-website.doc
2013-02-17 14:27
35K
Automated-public-turing-test.doc
2013-02-15 19:22
35K
Basic-local-alignment-search-tool.doc
2012-12-03 09:30
35K
Characteristics-of-a-good-database-design.doc
2013-02-14 20:42
35K
Computer-gaming.doc
2013-02-13 20:26
35K
Microsoft-Computer-Windows.doc
2012-11-23 11:28
35K
Pakistan's-telecommunication-authority-to-block-access-to-youtube.doc
2013-01-25 19:46
35K
Patient-OS-installation-guide.doc
2013-01-25 19:33
35K
Trust-and-security-in-internet.doc
2013-01-17 16:19
35K
Uses-of-internet-and-internet-in-client-or-server.doc
2013-01-17 18:42
35K
Weber's-bureaucratic-model.doc
2012-11-15 08:40
35K
Wireless-communications.doc
2013-01-06 18:55
35K
Code-a-simple-web-server.doc
2013-02-13 19:38
36K
Designing-a-finest-WiMAX-network.doc
2013-01-06 18:53
36K
Designing-a-web-based-postgraduate-application-system-for-university-al-j-al-gharbe.doc
2013-02-10 22:42
36K
Eliminating-handoff-latencies-in-802.11-wlans-using-multiple-radios.doc
2013-02-09 20:38
36K
History-and-facts-about-DEll-Computer-Corporation.doc
2012-10-23 09:34
36K
Human-computer-interaction2.doc
2013-02-07 10:47
36K
Information-security-training-for-mnscu-campus-technical-staff.doc
2013-02-05 20:01
36K
RNA-Structural-BLAST:-A-New-RNA-Structure-Database-Searching-Service.doc
2012-12-11 12:29
36K
RNA-Structural-BLAST_-A-New-RNA-Structure-Database-Searching-Service.doc
2012-12-11 12:29
36K
Software-upgrade.doc
2013-01-22 21:52
36K
Sources-model-and-use-of-location.doc
2013-01-22 21:42
36K
The-client-server-problem.doc
2013-01-19 21:15
36K
Types-of-content-and-applications.doc
2013-01-17 16:35
36K
Universal-Software-Solutions-Ltd.doc
2012-11-14 10:15
36K
Virus-Attacks.doc
2013-01-15 20:45
36K
Web-content-designing.doc
2013-01-15 21:20
36K
Analysing-digital-evidence-and-computer-crime.doc
2013-02-23 20:04
36K
Computer-hard-drive.doc
2013-02-13 20:31
36K
Computer-technology-and-client-server-technology.doc
2013-02-12 19:59
36K
GIS-Visualization-Web-Services.doc
2013-02-09 21:24
36K
High-level-programming-languages.doc
2013-02-09 13:03
36K
How-can-we-effectively-use-the-internet-for-research.doc
2013-02-07 21:23
36K
Internet-banking-in-anz-bank.doc
2012-11-12 09:57
36K
Preserving-memories-of-life.doc
2013-01-24 21:40
36K
Synchrounous-optical-network.doc
2013-01-06 20:31
36K
Trade-communication-equipment-and-components-for-optical-fiber-cables.doc
2013-01-17 19:11
36K
VIDEO-STREAMING-THROUGH-CACHES.doc
2013-01-06 19:36
36K
A-database-mail-account.doc
2013-02-17 16:30
37K
Agent-based-Systems.doc
2013-02-16 19:05
37K
Improving-integration-of-mobile-web-applications-with-networks.doc
2013-02-06 23:49
37K
Looking-inside-the-lid-of-a-computer.doc
2013-01-13 20:14
37K
The-existence-of-Web-2.0.doc
2013-01-19 20:54
37K
The-website-navigation.doc
2013-01-17 19:54
37K
With-the-great-explosion-of-use-of-Internet.doc
2012-12-12 12:19
37K
A-cellular-network.doc
2013-01-12 21:40
37K
Advantages-and-usages-of-wireless-technology.doc
2013-01-12 21:29
37K
Dos-Attacks-VoIP.doc
2013-01-12 20:04
37K
Firewall-Network-Traffic.doc
2013-02-09 13:51
37K
Information-systems-analysis.doc
2012-10-10 21:07
37K
Internet-as-medium-getaway.doc
2013-02-05 20:21
37K
Microsoft-windows-2000;-NetBIOS.doc
2013-01-31 19:00
37K
Needs-of-personal-computers-and-its-its-impacts-on-environment.doc
2013-01-31 19:08
37K
Security-of-personal-information.doc
2013-01-23 19:56
37K
The-Semantic-Web.doc
2013-01-17 20:34
37K
crimes-committed-by-the-use-of-computer-systems.doc
2013-03-01 21:13
37K
Machine-vision.doc
2013-01-13 20:04
38K
Motherboard-CPU-RAM.doc
2013-01-26 23:36
38K
Network-congestion.doc
2013-01-31 19:18
38K
Newest-software-and-hardware-tools.doc
2013-01-26 20:41
38K
Non-functional-requirements-with-the-data-mining.doc
2013-01-26 20:20
38K
Optical-communication-system.doc
2013-01-09 10:04
38K
Preoccupation-with-managing-security-and-risk-inevitable.doc
2013-02-23 20:33
38K
Process-of-choosing-video-format.doc
2013-01-24 20:49
38K
Software-Design.doc
2013-01-23 20:34
38K
Telecommunication-in-the-21st-Century.doc
2013-01-05 20:24
38K
The-fibre-optics-as-copper-wires.doc
2013-01-19 18:22
38K
Two-important-problems-of-survivability.doc
2013-01-06 08:00
38K
Users-access-and-expensive-to-implement.doc
2013-01-17 17:48
38K
Implementation-of-terrain-rendering.doc
2013-02-07 21:52
38K
Measurement-of-network-recovery.doc
2013-01-06 18:00
38K
Peer-to-peer-networks.doc
2013-01-24 21:52
38K
Pretty-good-privacy.doc
2013-01-24 21:26
38K
School-of-computer-sciences.doc
2013-01-24 19:52
38K
Crysis-Game-Software.doc
2013-02-12 20:10
39K
Data-mining-will-happen.doc
2013-02-10 22:44
39K
Different-possibilities-of-allocating-IP.doc
2013-02-10 23:00
39K
Experience-of-Developing-a-game.doc
2012-10-21 21:07
39K
Identify-Robot-Using-RFID.doc
2013-02-07 22:41
39K
OS-Features.doc
2013-01-24 21:38
39K
Routing.doc
2013-01-24 19:33
39K
Telecommunication-Networks-MNP.doc
2013-01-07 20:31
39K
Comparison-of-the-OSI-and-TCP.doc
2013-02-12 20:32
39K
Harmonic-vector-excitation-coding.doc
2013-01-12 18:37
39K
Internet-Protocol-Television-(IPTV).doc
2013-02-05 20:30
39K
Next-generation-networks-ngn.doc
2013-01-09 10:16
39K
Server-side-code-and-client-side-code.doc
2013-01-23 20:36
39K
The-Nyquist-theorem-is-one-of-the-deciding-factor-in-data-communication..doc
2013-01-18 19:51
39K
Transmission-signal.doc
2013-01-17 19:20
39K
microchip.doc
2013-01-02 16:51
39K
Critique:-Why-Don't-we-encrypt-email.pdf
2011-03-01 15:22
39K
Critique_-Why-Don't-we-encrypt-email.pdf
2011-03-01 15:22
39K
Aerospace-computational-techniques.doc
2012-10-22 10:39
40K
Channel-Coding-Wireless.doc
2013-01-12 20:09
40K
Identify-areas-of-security-risk.doc
2013-02-07 22:38
40K
In-the-area-of-Information-System.doc
2013-02-07 10:41
40K
OFDM-Frequency-Data.doc
2013-01-09 09:53
40K
Explain-the-obstacles-and-advantages-of-the-competing-technologies-J2EE-and-Microsoft's-.NET-with-respect-to-teaching-and-learning-in-a-university-environment.doc
2013-01-13 18:26
40K
MICROSOFT-WINDOWS-7.doc
2013-02-02 19:32
40K
Software-Components-CORBA.doc
2013-01-23 20:58
40K
Software-development-to-support-the-IFS.doc
2012-11-01 09:11
40K
Software-outsourcing-releases.doc
2013-01-22 21:24
40K
The-SQL-server.doc
2013-01-17 20:28
40K
The-gnutella-software.doc
2013-02-07 22:44
40K
Ubiquitous-electronic-super-highway.doc
2013-01-17 18:33
40K
Wired-radio-communication.doc
2013-01-06 18:40
40K
Arabic-speech-recognition-systems.doc
2013-02-14 21:05
41K
Asynchronous-transfer-mode.doc
2013-02-15 19:33
41K
Communication-Serial-Data.doc
2013-01-12 20:58
41K
Creation-of-european-and-mediterranean-digital-preservation-community.doc
2013-02-12 20:26
41K
Developing-high-quality-multimedia-products.doc
2013-01-13 18:54
41K
Internet-and-web-programming.doc
2013-02-05 20:23
41K
Klings-web-model.doc
2013-01-13 18:17
41K
Many-possible-network-topologies.doc
2013-02-02 20:06
41K
Natural-language-processing.doc
2013-01-31 19:10
41K
Project-Data-Warehousing-In-Construction.doc
2013-02-18 10:38
41K
Relational-databases.doc
2013-01-24 20:32
41K
Risk-assessment-Amazon-S3.doc
2013-01-24 19:42
41K
Software-crisis.doc
2013-01-23 20:40
41K
The-IT-governance.doc
2013-01-18 19:56
41K
Uses-and-benefits-of-data-warehouse.doc
2013-01-17 18:44
41K
World-Wide-Web-global-information-space.doc
2013-01-06 18:37
41K
the-role-of-firewall.doc
2013-01-17 21:25
41K
Computing-bus.doc
2013-02-12 20:06
41K
Emerging-technologies.doc
2013-02-09 20:42
41K
Four-dimensional-computer-aided-design.doc
2013-02-19 19:59
41K
Information-security-officer.doc
2013-02-05 19:59
41K
Internet-message-access-protocol.doc
2013-02-09 21:02
41K
New-claims-payment-system.doc
2013-01-25 20:03
41K
Online-computer-service-system.doc
2013-01-14 18:47
41K
Specific-database-management-software.doc
2013-01-22 21:55
41K
3D-COMPUTER-GRAPHICS.doc
2013-02-13 20:24
42K
Best-features-of-IPsec.doc
2013-02-14 20:00
42K
Cryptography.doc
2013-02-12 20:11
42K
Methodology-Dynamic-Spectrum-Success-for-Cognitive-Radio-Networks.doc
2013-01-11 19:36
42K
Prototype.doc
2013-01-24 21:11
42K
RED-HAT-LINUX.doc
2013-01-24 20:22
42K
The-data-structure.doc
2013-01-19 20:47
42K
The-database-engine.doc
2013-01-14 18:21
42K
Uses-and-types-of-robots.doc
2013-01-17 18:46
42K
Vertical-handoff-daemon-for-communication-in-heterogeneous-networks.doc
2013-01-05 21:33
42K
failure-of-automation-interaction-complexity-and-failure.doc
2013-07-22 11:30
42K
A-methodology-to-build-a-domain.doc
2013-02-17 14:07
42K
A-popular-lexical-analyzer.doc
2013-02-17 13:48
42K
About-world-wide-web.doc
2013-02-17 14:18
42K
Computer-networking.doc
2013-01-12 19:05
42K
Data-mining-cluster-analysis.doc
2013-02-10 22:49
42K
Microcomputer-Games-Software.doc
2013-02-02 18:32
42K
Microsoft-VB.NET-is-part-of-the-.NET-framework..doc
2013-01-13 18:11
42K
Necessary-to-discuss.doc
2013-01-31 19:12
42K
Network-load-detection.doc
2013-01-31 19:44
42K
One-of-the-main-concerns.doc
2013-01-26 19:41
42K
Process-of-disaster-recovery.doc
2013-01-24 20:53
42K
Most-new-electronic-items.doc
2013-01-14 18:49
43K
Network-Protocols-and-Algorithms.doc
2013-01-14 20:10
43K
OLAP-data-models.doc
2013-01-26 20:03
43K
The-GUI-engine.doc
2013-01-19 20:08
43K
The-rapid-growth.doc
2013-01-18 17:29
43K
URL-graphs.doc
2013-01-17 18:02
43K
A-pivotal-aspect-of-everyday-life.doc
2013-02-17 13:48
43K
COMPUTER-SIMULATION-OF-ACTION-POTENTIALS-IN-SQUID-AXON.doc
2012-12-09 18:23
43K
PH-Measurement-Data.doc
2012-12-17 19:28
43K
TYPES-OF-OPERATING-SYSTEM:.doc
2013-01-17 18:50
43K
TYPES-OF-OPERATING-SYSTEM_.doc
2013-01-17 18:50
43K
The-booms-of-new-technologies.doc
2013-01-19 21:32
43K
The-security-concerns.doc
2013-01-17 20:36
43K
raditional-and-Context-Semantic-Web-services.doc
2013-01-14 19:06
43K
A-computing-and-networking-solution.doc
2013-02-17 16:24
44K
Anti-Phishing-Enforcement-and-Prevention.doc
2013-01-05 21:08
44K
Api-represent-network-addresses.doc
2013-02-14 21:25
44K
During-the-last-decade.doc
2013-02-09 20:40
44K
Is-search-engine-a-tool-design.doc
2013-01-13 18:45
44K
Networking-hardware-components.doc
2013-01-25 20:00
44K
Telecom-Telecommunication-Telephone.doc
2013-01-06 20:29
44K
Telephone-Connections-Network.doc
2013-01-07 20:12
44K
The-simulation-tool-software.doc
2013-01-17 20:32
44K
Web-Technologies-Enterprises.doc
2012-11-14 09:51
44K
An-optimised-messaging-framework-for-mobile-web-service-clients.doc
2013-02-16 19:26
44K
Arabic-e-learning-website.doc
2013-02-14 20:51
44K
Common-Vulnerabilities-and-Exposure.doc
2013-02-13 19:54
44K
Computing-and-concurrent-system-design.doc
2013-02-12 20:03
44K
Distributed-behavioural-model.doc
2013-02-09 20:30
44K
Emirates-telecommunication-co.doc
2012-11-12 09:23
44K
Hierarchical-Mobile-Wireless-Cellular.doc
2013-02-09 13:07
44K
NS2-Network-IP.doc
2013-01-09 09:54
44K
Optical-Flow-Computation-Methods.doc
2013-01-24 21:42
44K
Popularity-of-multimedia-transmissions.doc
2013-01-25 19:25
44K
The-pros-and-cons-of-the-technological-side-of-hures.doc
2013-01-17 21:08
44K
Although-reusable-software-components.doc
2013-02-16 19:35
45K
An-insight-to-client-server.doc
2013-02-16 19:31
45K
Continual-advancement-of-computer-technology.doc
2013-02-12 19:52
45K
Designed-for-human-safety.doc
2012-11-13 10:35
45K
Different-malicious-programs.doc
2013-02-10 22:51
45K
Human-agent-negotiations.doc
2013-02-07 10:46
45K
The-DDoS-attacks.doc
2013-01-19 20:43
45K
The-motion-estimation.doc
2013-01-18 18:18
45K
To-replace-the-human-factor.doc
2013-01-17 18:59
45K
Grid-Monitoring.doc
2013-01-11 20:05
45K
Historical-reporting-of-security.doc
2013-02-09 13:05
45K
Run-on-the-web-based-system.doc
2013-01-24 19:45
45K
Social-Network-Phenomena.doc
2013-01-23 19:19
45K
The-rapid-technological-progression.doc
2012-10-19 09:34
45K
The-villagers-of-Stanwell.doc
2013-01-17 20:46
45K
Transition-from-analogue-to-digital-media.doc
2012-12-01 09:35
45K
What-is-supervisory-control-and-data-acquisition..doc
2013-01-06 19:02
45K
Zone-alarm-comodo-and-cisco-firewalls.doc
2013-01-14 20:20
45K
internal-communication-system.doc
2013-01-09 10:35
45K
Database-System-Information.doc
2013-01-12 18:45
46K
Digital-cameras.doc
2012-11-29 09:56
46K
Filters-all-network-traffic.doc
2013-02-09 13:47
46K
Modulation-Amplitude-Signal.doc
2013-01-09 09:02
46K
Study-of-mass-mailing-worm.doc
2013-01-22 20:47
46K
Web-2.0-and-its-implementation-in-national-aeronautics-and-space-administration-(nasa).doc
2013-02-07 21:53
46K
First-instance-to-explain.doc
2013-02-09 13:50
46K
Level-of-automation.doc
2013-02-01 19:12
46K
Massively-Parallel-Computation.doc
2013-02-02 18:09
46K
Migration-between-routing-protocols-in-a-specific-environment-Westminster-LEA-network-and-key-issues-of-EIGRP.doc
2013-02-02 19:31
46K
Network-based-IDSs-and-Host-Based-IDS.doc
2013-01-31 19:16
46K
The-text-classification.doc
2013-01-17 20:57
46K
Benefits-of-configuring-mail-on-database.doc
2013-02-15 19:18
47K
Cloud-computing-and-NGA.doc
2013-02-14 20:26
47K
ENERGY-EFFICIENT-AD-HOC-ON-DEMAND-MULTIPATH-DISTANCE-VECTOR.doc
2012-12-06 09:43
47K
Importances-of-agile-software-engineering-and-its-mathodologies.doc
2013-02-07 10:21
47K
Information-Strategy-Competitive.doc
2013-02-05 20:03
47K
Software-copyrights-and-patents.doc
2013-01-23 21:01
47K
Workplace-Motherboard-CPU.doc
2013-01-14 21:11
47K
Applications-are-dynamic-now-days.doc
2013-02-14 21:23
47K
Data-mining-and-semantic-web.doc
2013-02-10 22:47
47K
Development-of-digital-terrain-model.doc
2013-02-09 21:14
47K
Feature-extraction-using-crossing-number-(cn)-and-ridge-tracking-technique.doc
2013-02-09 13:53
47K
File-transfer-–-security-importance-protocols.doc
2013-02-09 13:43
47K
Indexing-Searching-Methods-Implemented.doc
2013-02-12 20:29
47K
Secure-Networking-Concepts-Within-the-Enterprise.doc
2012-12-03 09:26
47K
The-Friend-of-a-Friend-(FOAF)-Project.doc
2013-01-18 20:13
47K
The-operating-system.doc
2013-01-18 19:27
47K
The-role-of-intelligence-in-aviation-security.doc
2013-02-25 21:18
47K
Types-of-memory.doc
2013-01-16 19:33
47K
X-window-system's-architecture-and-understanding-of-its-design.doc
2013-01-14 20:55
47K
Bulgaria:-High-Internet-penetration-–-potential-for-e-commerce.doc
2012-12-08 09:42
48K
Bulgaria_-High-Internet-penetration-–-potential-for-e-commerce.doc
2012-12-08 09:42
48K
Data-mining-and-knowledge-discovery.doc
2013-02-10 22:48
48K
The-proposed-multi-agent-system.doc
2013-01-17 21:05
48K
Website-translation.doc
2013-01-06 19:06
48K
Database-mail-account.doc
2013-02-11 21:01
48K
Semantic-Web-Data.doc
2013-01-06 20:18
48K
The-digital-library.doc
2013-01-19 20:51
48K
The-small-group-development-process.doc
2013-01-17 20:26
48K
Computer-controlled-world.doc
2013-02-12 20:31
49K
Computer-security-in-information-technology.doc
2013-02-13 20:04
49K
Cyber-terrorism.doc
2013-02-11 20:29
49K
Hyper-text-transfer-protocol.doc
2013-02-07 10:52
49K
OPERATING-SYSTEM.doc
2013-01-14 20:12
49K
Operating-System.doc
2013-01-14 20:12
49K
SECURITY-IN-DISTRIBUTED-SYSTEM.doc
2013-01-14 19:28
49K
Technology-Crime-Computers.doc
2013-03-07 21:04
49K
The-implications-of-the-use-of-Closed-Circuit-Television.doc
2013-02-25 21:54
49K
Why-does-knowing-how-the-Software-works-influence-how-and-what-you-should-test.doc
2013-01-14 21:55
49K
A-steganography-system.doc
2013-02-17 13:53
49K
Developing-high-quality-multimedia-products-and-security.doc
2013-01-13 17:38
49K
Different-firewall-architecture.doc
2013-02-10 22:54
49K
Kerberos-Authentication.doc
2013-02-04 18:10
49K
Programming-languages-and-their-types-and-uses.doc
2013-01-24 21:31
49K
Robot-network.doc
2013-01-24 19:40
49K
Telecommunication-sector-profile-of-Saudi-Arabia.doc
2013-01-09 08:40
49K
Transmission-control-protocol-Tahoe-Reno-and-New-Reno.doc
2013-01-06 19:16
49K
WEB-SERVER-MONITORING.doc
2013-01-15 20:42
49K
Blue-tooth-Connection-GFSK.doc
2013-01-12 21:51
50K
Plan-to-build-Intel-microprocessor.doc
2013-01-25 19:14
50K
Software-to-record-name-of-the-term-paper-allotted.doc
2013-01-22 21:48
50K
The-efficiency-of-some-search-engines.doc
2013-01-19 21:05
50K
The-multilevel-database-systems.doc
2013-01-18 18:55
50K
Web-Application-Attacks.doc
2013-01-14 21:47
50K
importance-of-quality-database-design.doc
2013-02-07 10:18
50K
telecommunications-technologies.doc
2013-01-07 20:40
50K
Feasibility-of-Web-Enabling-an-Application..doc
2013-01-13 17:52
50K
Importances-of-data-mining-and-data-warehouse-in-database-management-systems.doc
2013-02-05 20:36
50K
Introduces-series-parallel-signing-group.doc
2013-02-05 20:11
50K
Search-engine-optimization.doc
2013-01-24 19:53
50K
Shopping-on-internet.doc
2013-01-23 21:04
50K
University-computer-system-analysis.doc
2012-12-30 17:19
50K
neural-networks-introduction.doc
2012-12-18 09:59
50K
Components-Software-Engineering.doc
2013-02-12 20:28
51K
Dynamic-Data-Mining.doc
2013-02-09 20:57
51K
Influence-of-social-networking-website-on-human-resource-performance.doc
2012-10-23 17:44
51K
Primitive-exploration-with-little.doc
2013-01-24 20:52
51K
Artificial-intelligence-and-distinction-between-mind-and-cognition.doc
2013-02-14 21:02
51K
Controlling-the-access.doc
2013-02-12 20:07
51K
Impact-of-social-networking.doc
2013-02-07 21:48
51K
Study-of-various-RISC-and-CISC-processor.doc
2013-01-22 21:08
51K
The-chip-design-technologies.doc
2013-01-19 21:13
51K
An-Essay-on-Phylum-Chordata.doc
2012-12-03 09:32
52K
Bibliometrics-Webometrics-Information.doc
2013-01-12 21:49
52K
Gaming-Processor-Ram.doc
2013-02-07 22:45
52K
Improvements-for-scalable-and-accurate-plagiarism-detection-in-digital-documents.doc
2013-02-05 20:31
52K
Is-the-concept-of-the-mass-audience-becoming-increasingly-redundant-as-new-communications-technologies-such-as-the-internet-and-interactive-tv-develop.doc
2013-01-05 20:26
52K
Local-area-network.doc
2013-02-01 19:03
52K
A-MLP-training.doc
2013-02-17 14:02
52K
Developing-an-appropriate-and-accurate-client-and-architecture-for-the-hures.doc
2013-02-09 21:20
52K
Internet-Online-Auction.doc
2012-11-25 20:43
52K
OFDMA-for-Wireless-Communications.doc
2013-01-09 09:35
52K
Software-test-initiative.doc
2013-01-22 21:16
52K
The-MS-DOS.doc
2013-01-18 18:12
52K
Windows-Networking-Features.doc
2013-01-14 20:32
52K
A-collection-of-commands.doc
2013-02-17 16:21
53K
Artificial-intelligence-in-natural-language-processing.doc
2013-02-14 21:00
53K
Checkout-Systems.doc
2013-02-14 20:47
53K
Development-of-computer-programs.doc
2012-11-13 10:31
53K
Engineering-application-grimblebot-report.doc
2013-02-09 13:35
53K
Hackers-digital-profiling-and-an-alternative-approach-of-investigation.doc
2013-03-08 10:02
53K
In-the-present-day.doc
2013-02-07 10:42
53K
Information-seeking-model.doc
2013-02-05 19:53
53K
Object-oriented-analysis-and-design.doc
2013-01-26 20:15
53K
Software-Engineering.doc
2013-01-22 21:18
53K
Softwares-for-information-and-communication-technology.doc
2013-02-19 11:04
53K
Sound-can-be-distinguished.doc
2013-01-23 19:15
53K
Strategic-information-systems-planning.doc
2013-01-30 21:41
53K
The-Software-BPO-industry-growth-within-Pakistan.doc
2012-10-26 11:37
53K
Definition-of-web-service.doc
2013-02-11 20:51
53K
Effect-of-information-privacy.doc
2013-02-09 20:45
53K
JSCC-scheme.doc
2013-01-09 10:20
53K
Open-source-operating-systems-vs.-microsoft-windows.doc
2013-01-26 17:45
53K
Papers-explore-sensor-networks.doc
2013-01-07 20:54
53K
Shared-memory-MIMD-architecture.doc
2012-10-19 10:46
53K
Survey-Network-Solutions.doc
2013-01-22 19:48
53K
Data-information-and-importances-of-sql.doc
2013-02-11 20:21
54K
Dynamic-Systems-Development-Method-(DSDM).doc
2013-02-09 20:53
54K
Mail-Network-Data.doc
2013-01-11 19:46
54K
Security-using-process.doc
2013-01-23 19:53
54K
Mail-Message-Computer.doc
2013-01-06 18:28
54K
Use-of-web-resources.doc
2013-01-17 17:16
54K
A-least-grade-page-replacement-algorithm-for-web-cache-optimization.doc
2013-01-13 19:40
55K
Analysing-security-issues-and-policies.doc
2013-02-16 19:30
55K
CDMA-Technology.doc
2013-01-12 20:40
55K
Computer-Operating-Systems.doc
2013-02-13 19:57
55K
Models-of-computation.doc
2013-02-02 19:27
55K
Parallel-processing.doc
2013-01-25 19:57
55K
Signaling-Telephone-Network.doc
2013-01-06 20:16
55K
Analysis-on-source-code.doc
2013-02-14 21:12
55K
Appropriate-routing-protocol.doc
2013-02-14 20:53
55K
Cellular-data-transmission-technologies.doc
2013-02-14 20:41
55K
Component-Software-Engineering.doc
2013-02-12 20:30
55K
Concepts-of-data-warehouse-and-data-mining.doc
2013-02-12 19:49
55K
Croydon-accident-claim-and-hire-and-their-database-management-systems.doc
2013-02-12 20:16
55K
Dell-computer-ship-system.doc
2012-11-13 10:48
55K
Google-Online-Internet.doc
2012-11-07 15:05
55K
Growth-of-internet.doc
2013-02-09 13:18
55K
Importance-of-network-security.doc
2013-02-06 23:52
55K
Linux-terminal-server-project.doc
2013-02-01 18:58
55K
Multimedia-Communication-Systems.doc
2013-01-26 21:57
55K
Open-Source-Software.doc
2013-01-26 20:55
55K
Sending-e-mail-messages.doc
2013-01-14 18:32
55K
Statistical-techniques-for-cryptanalysis.doc
2013-01-22 21:44
55K
The-MPS-network-impact-negatively.doc
2013-01-18 18:14
55K
With-a-mounting-demand.doc
2013-01-14 21:18
55K
Addresses-fundamental-questions.doc
2013-02-16 19:24
56K
The-functional-aspects.doc
2013-01-18 20:03
56K
A-mobile-network-operator.doc
2012-10-22 10:17
56K
Categories-of-client-server-architecture-and-problems-faced-by-hures.doc
2013-02-14 20:07
56K
Optimal-level-of-performance.doc
2013-01-24 21:34
56K
Privacy-implications-in-the-deployment-of-radio-frequency-identification-based-card-for-university-students-and-staff.doc
2013-01-24 20:46
56K
Reasons-of-using-extreme-programming.doc
2013-01-24 20:08
56K
Store-and-forward-datagram-oriented-network.doc
2013-01-22 21:23
56K
Video-Service-Peer.doc
2013-01-06 19:40
56K
Video-texture-synthesis.doc
2013-01-15 21:09
56K
Zig-Bee-Physical-IEEE.doc
2013-01-06 18:34
56K
Image-hatching-for-visual-cryptography.doc
2013-02-07 21:48
57K
Implication-of-agency-theory-in-MCSs.doc
2012-10-10 20:56
57K
Micro-electro-mechanical-systems-(MEMS)-technology.doc
2013-02-02 18:35
57K
3G-mobile-system.doc
2013-02-09 12:55
57K
Areas-of-the-operations-within-Amax-Computer-Services.doc
2012-10-28 08:35
57K
Asterisk-is-software.doc
2013-02-15 19:28
57K
In-Software-industry-Software-reuse.doc
2013-02-07 10:44
57K
MICROPROCESSOR-VS-SUPERCOMPUTER.doc
2013-02-02 19:23
57K
CDMA-and-GSM.doc
2013-01-12 20:42
58K
Lack-of-infrastructure.doc
2013-02-04 19:23
58K
Mobility-Capacity-Conversion.doc
2013-01-09 09:03
58K
Secure-e-mail-protocols.doc
2013-01-24 19:10
58K
TCP-Congestion-Algorithm.doc
2013-01-21 19:13
58K
Basic-classes-that-internet-is-network.doc
2013-01-12 21:54
58K
Computer-Hardware-and-Software.doc
2013-02-13 20:28
58K
Installing-ubuntu-linux.doc
2013-02-04 19:32
58K
K-Means-Data-Mining-Algorithm.doc
2013-01-14 18:53
58K
Mobile-computing-technology.doc
2013-01-09 10:09
58K
computing-technology.doc
2013-02-12 19:55
58K
Computer-Fraud.doc
2013-02-13 20:18
59K
Computers-Microcomputer-System.doc
2013-02-12 20:04
59K
Keitai-and-Its-Effects-on-Youth.doc
2013-02-25 19:41
59K
Optimized-secure-network-coding-algorithms.doc
2013-01-24 21:35
59K
Passive-Optical-Networks.doc
2013-01-07 20:58
59K
Securing-IEEE-802.11-wireless-networks.doc
2013-01-23 21:06
59K
THE-ADVENT-OF-INTERNET-BANKING-(IB)-TRENDS-IN-UK-IB.doc
2012-11-14 09:06
59K
The-Future-of-Software-Delivery.doc
2013-01-13 21:00
59K
The-GSM-frequencies.doc
2013-01-19 19:42
59K
The-purpose-of-research.doc
2013-01-17 21:19
59K
Virtualisation-provides-a-layer.doc
2013-01-15 20:58
59K
Authentication-Techniques-in-Ubiquitous-Computing..doc
2013-01-13 18:14
59K
Computer-Systems-Architecture.doc
2013-02-13 20:05
59K
Computer-forensic-investigation.doc
2013-02-13 20:16
59K
DiLERN-for-digital-library-education.doc
2013-02-09 20:27
59K
Fast-multiport-bridge.doc
2013-02-09 13:58
59K
Introduction-to-Fuzzy-Logic.doc
2013-02-05 20:13
59K
The-Introduction-of-Data-Warehousing-at-Tronics-PLC..doc
2013-01-13 18:30
59K
Wireless-Wire-Network.doc
2013-01-14 21:21
59K
Development-operation-and-maintenance-of-software.doc
2013-01-13 17:34
60K
Different-types-of-DBMS.doc
2013-02-10 23:07
60K
Internet-Web-Security.doc
2013-02-05 20:10
60K
Professional-Ethical-Issues-in-Information-Systems.doc
2013-01-14 20:06
60K
The-birth-of-the-internet.doc
2012-10-24 16:33
60K
The-fibre-optics.doc
2013-01-19 20:27
60K
Uses-of-formal-approaches-for-agent-based-systems.doc
2013-01-17 18:48
60K
Advento-da-internet.doc
2012-10-14 08:47
60K
Internet-protocol-(ipv4).doc
2013-02-05 20:29
60K
The-deployment-of-wireless-sensor.doc
2013-01-19 20:32
60K
Wireless-mesh-network.doc
2013-01-06 18:56
60K
Personalization.doc
2013-01-24 21:48
61K
The-wireless-communication.doc
2013-01-17 19:41
61K
Wavelet-Transform-Signal.doc
2013-01-06 19:18
61K
GSM-Implementation-in-various-places.doc
2013-01-11 20:32
61K
Global-strategy-of-computer-manufacturers-and-the-digital-divide.doc
2012-12-28 16:29
61K
High-Speed-Downlink-Packet-Access-(HSDPA).doc
2013-01-12 18:35
61K
Internet-technology-and-its-security.doc
2013-02-05 20:17
61K
Software-Web-Computing.doc
2013-01-22 21:51
61K
Telecommunication-services-are-using-Internet-as-single-network-for-voice.doc
2013-01-13 20:33
61K
Blind-image-deconvolution.doc
2013-02-14 20:17
62K
H.264-PARAMETER-OPTIMIZATION.doc
2013-01-12 18:32
62K
The-wireless-sensor-networks.doc
2013-01-17 19:45
62K
Cloud-computing-in-the-modern-world.doc
2013-02-14 20:29
62K
Documentation-Of-Information.doc
2013-02-11 20:07
62K
Internet-and-mobile-communications.doc
2013-01-09 10:34
62K
Terrorism-Airports-Security.doc
2013-03-07 21:08
62K
Use-of-a-channel-simulator-to-evaluate-data-transmission-via-Satellite-under-Ionospheric-Scintillation-conditions.doc
2013-01-05 20:31
62K
Air-Traffic-Control-System.doc
2013-02-16 19:06
63K
Air-traffic-control-system.doc
2013-02-16 19:06
63K
Applying-formal-methods-to-j2ee-design-patterns.doc
2013-02-14 20:57
63K
Clean-Windows-installation.doc
2013-02-14 20:25
63K
International-diploma-in-computer-science.doc
2013-02-05 19:50
63K
Multi-resolution-based-feature-extraction-method-for-breast-cancer-diagnosis-in-digital-mammogram.doc
2013-01-13 20:01
63K
The-modern-computer-system-specification.doc
2013-01-18 17:37
63K
About-mp3.doc
2013-02-17 14:12
63K
Important-factor-on-communication-networks-survivability.doc
2013-01-12 18:25
63K
Internet-is-transforming-enterprise-networking.doc
2013-02-05 20:27
63K
Literally-means-hidden-writing.doc
2013-01-13 18:43
63K
The-data-mining-tasks.doc
2013-01-19 20:45
63K
Violent-video-game.doc
2013-01-03 20:58
63K
World-wide-web.doc
2013-01-14 20:16
63K
About-the-bridge-and-router.doc
2013-02-17 14:10
64K
Generation-of-initial-centroids.doc
2013-02-07 22:43
64K
Windows-7.doc
2013-01-14 20:51
64K
Digital-television.doc
2013-01-12 19:57
64K
Identification-of-major-technologies-and-protocols-involved-in-the-client-side-of-a-web-application.doc
2013-02-07 22:36
64K
Test-case-prioritization-and-regression-test-selection.doc
2013-01-22 19:59
64K
Growth-of-computing-power-and-database-capacity.doc
2013-01-13 17:31
65K
Implement-biometric-system-(finger-prints)-in-specific-Bank-ATM-Centers.doc
2012-11-13 10:06
65K
Legal-Issues-of-Social-Networking-Sites.doc
2013-02-04 19:17
65K
Privacy-in-online-social-networks.doc
2013-01-24 21:02
65K
Subset-of-a-group-of-technologies.doc
2013-01-30 22:47
65K
Types-and-importances-of-formal-methods.doc
2013-01-16 20:20
65K
Mac-OS-X-is-the-world's-most-advanced-operating-system..doc
2013-02-02 19:51
66K
Parametric-and-algorithmic-design.doc
2012-10-19 09:47
66K
Router-Connection-Internet.doc
2013-01-24 19:31
66K
Secure-communication-across-the-world.doc
2013-01-24 19:14
66K
The-nulls-or-missing-values.doc
2013-01-18 19:49
66K
The-problems-existing-in-encrypted.doc
2013-01-18 17:31
66K
Applications-of-genetic-algorithm-in-software-testing.doc
2013-02-14 21:01
66K
Automatic-Software-Structural-Testing.doc
2013-02-14 23:34
66K
Computer-Virus-System.doc
2013-02-12 20:01
66K
Implementation-and-investigation-of-virtualisation-and-load-balancing.doc
2013-02-07 21:50
66K
Network-simulation.doc
2013-01-09 10:11
66K
System-Analysis-and-Design.doc
2013-01-22 20:30
66K
The-intrusion-detection.doc
2013-01-19 19:55
66K
The-network-systems.doc
2013-01-18 19:40
66K
overview-of-ns-network-simulator-project.doc
2013-01-07 20:50
66K
Image-denoising-based-on-double-density.doc
2013-02-07 21:54
67K
Investigation-of-zero-knowledge-protocols.doc
2013-02-04 18:17
67K
Security-in-wireless-sensor-network.doc
2013-01-09 08:46
67K
Semantics-based-web-application-security.doc
2012-10-08 20:29
67K
DATA-ANALYSIS-FINDINGS-AND-CONCLUSION.doc
2012-10-16 10:09
68K
Ad-hoc-and-sensor-networks.doc
2013-02-16 19:16
68K
Aggregate-data-produced.doc
2013-02-16 19:09
68K
Bug-tracking-software.doc
2013-02-14 20:19
68K
Computer-cyber-crime-and-child-grooming.doc
2013-03-01 21:25
68K
Knowledge-and-Data-Management-in-Charity.doc
2012-11-25 12:07
68K
Performance-simulation-of-WiMAX-in-HD-video-streaming.doc
2013-01-24 21:50
68K
Virtualization.doc
2013-01-15 20:47
68K
Wireless-Network-Security.doc
2013-01-06 18:38
68K
ADVANCED-DATABASE-ICA.doc
2013-01-14 18:59
69K
Aircrafts.doc
2012-10-22 10:36
69K
How-to-install-GPG-on-your-system.doc
2013-01-11 20:29
69K
Range-of-data-items.doc
2013-01-24 21:28
69K
The-internet-traffic.doc
2013-01-19 19:53
69K
Trends-of-outsourcing-of-software.doc
2013-01-16 20:24
69K
Yahoo-Internet-Industry.doc
2012-11-06 10:05
69K
About-network-security.doc
2013-02-17 14:11
70K
Really-simple-syndication.doc
2013-01-24 20:05
70K
Survey-of-wireless-sensor-networks.doc
2013-01-06 20:28
70K
Phases-of-software-engineering.doc
2013-01-24 21:47
70K
About-html-and-css.doc
2013-02-17 14:25
71K
Micro-Processor-CPU.doc
2013-02-02 18:37
71K
A-Framework-of-Multi-Agent-Systems.doc
2013-01-14 19:01
71K
A-case-study-of-key-dependent-permutations-in-feistel-ciphers.doc
2013-01-14 19:04
71K
Companies-invest-a-sum-of-money-to-setup-computer-network.doc
2013-01-13 17:36
71K
Computer-Cyber-Crime.doc
2013-02-13 19:41
71K
Market-Internet-Customers.doc
2012-11-07 10:29
71K
The-computer-ethics.doc
2013-01-21 18:25
72K
The-insight-of-computer-forensics.doc
2013-01-19 20:01
72K
Implementation-Testing-Justification.doc
2013-02-06 23:54
72K
Online-networked-communities.doc
2013-01-09 09:32
72K
Software-development-methodology-model.doc
2013-01-23 19:47
72K
Computer-network.doc
2013-02-13 19:48
73K
Manage-information-flow.doc
2013-01-11 19:56
73K
Performance-evaluation-of-web-services-with-distributed-objects.doc
2013-01-07 20:55
73K
Protocol-Wireless-Nodes.doc
2013-01-24 21:14
73K
Smart-card-technology.doc
2013-01-24 19:22
73K
Libyan-Telecommunications.doc
2012-11-25 12:17
73K
Load-balancing-policy.doc
2013-01-13 18:36
73K
This-report-explores-system-vulnerabilities.doc
2013-01-17 20:14
73K
A-summarizing-note-on-the-cases.doc
2013-02-17 13:59
74K
Distributed-System.doc
2013-02-09 14:11
74K
Achieving-consistency-and-reusability-in-presentation-layer-design-using-formal-methods-and-design-patterns.doc
2013-02-17 14:15
74K
Supply-chain-management-for-Dell-computers.doc
2012-10-27 18:06
74K
The-data-warehouses.doc
2013-01-19 20:50
74K
The-field-of-cloud-computing.doc
2013-01-18 20:16
74K
Voice-over-internet-protocol.doc
2013-01-15 20:52
74K
A-network-security.doc
2013-02-17 14:08
75K
Digital-signal-processing-Overview.doc
2013-01-12 19:37
75K
Experimental-evaluation-data-handling-workshop.doc
2012-12-20 19:24
75K
Matrix-Overlay-To-Networking.doc
2012-11-24 08:53
75K
Security-Instant-Messaging.doc
2013-01-09 08:48
75K
WIMAX-LTE.doc
2013-01-14 21:49
75K
WiMAX-LTE.doc
2013-01-14 21:49
75K
Information-Overload.pdf
2011-03-03 08:33
75K
Multimedia-Broadband-WiMAX.doc
2013-01-26 21:39
75K
NGN-Network-Technology.doc
2013-01-09 10:15
75K
The-integrated-control.doc
2013-01-19 19:59
75K
Network-security.doc
2013-01-09 09:17
76K
The-microelectronics-revolution.doc
2013-01-18 18:21
76K
crime-on-the-internet.doc
2013-02-12 20:27
76K
Application-Web-ECommerce.doc
2013-01-12 23:02
77K
Application-Web-E-Commerce.doc
2013-01-13 17:00
77K
Cluster-analysis.doc
2012-10-12 09:47
77K
The-process-of-writing-assessments.doc
2013-01-17 21:14
77K
Topology.doc
2012-11-28 09:30
77K
Extraction-Indexing-Keyphrases.doc
2013-02-09 14:04
78K
Identifying-present-network-services-in-home-environment-and-developing-a-total-home-network-solution-box.doc
2013-02-07 22:40
78K
Internet-communication-services.doc
2013-02-05 20:26
78K
The-comparative-networking-features.doc
2013-01-21 18:54
78K
Exploring-cloud-computing.doc
2013-02-09 13:59
78K
Model-based-software-testing.doc
2013-01-13 20:05
78K
Packet-Routing-Network.doc
2013-01-25 19:36
78K
Since-the-evolution.doc
2013-01-23 21:02
79K
The-virtual-world-of-Internet.doc
2013-01-17 20:48
79K
Wireless-VOIP.doc
2013-01-05 20:22
79K
Wireless-communication.doc
2013-01-06 18:35
79K
Wireless-mode-of-communication.doc
2013-01-06 18:49
80K
Windows-XP-networking-features-and-enhancements.doc
2012-12-13 09:48
80K
A-tremendous-change.doc
2013-02-17 14:24
81K
Autonomous-and-rational-routing-for-improving-performance.doc
2013-01-13 19:36
81K
Background-of-the-research-domain.doc
2013-02-14 21:28
81K
ID-T's-Network.doc
2012-10-10 20:04
81K
Networking-features-of-Windows.doc
2012-12-23 16:57
81K
Smart-cards-are-being-used-extensively.doc
2013-01-23 19:33
81K
Web-services.doc
2013-01-13 19:18
82K
CUDA-Brook-Parallel.doc
2013-02-12 20:09
82K
Network-media.doc
2013-01-31 19:36
82K
Program-called-firewall.doc
2013-01-24 21:29
82K
Types-of-communication-networks.doc
2013-01-17 16:31
83K
Introduction-to-hacking.doc
2013-02-05 20:16
83K
The-carrier-ethernet.doc
2013-01-19 21:36
84K
Computer-forensics.doc
2013-02-13 20:20
84K
SaaS-is-open-source-software.doc
2013-01-24 19:50
84K
implementation.doc
2013-02-06 23:59
84K
Developing-a-game.doc
2013-02-20 11:31
85K
Project-management-software-appraisal.doc
2012-11-20 09:12
86K
Adaptive-fast-convergecast-MAC.doc
2013-02-16 19:23
86K
Traditional-security-techniques.doc
2013-01-17 19:15
87K
Data-over-the-world-wide-web.doc
2013-02-11 20:41
87K
Grid-computing-with-XML-web-services.doc
2013-02-09 13:14
87K
Enhanced-Interior-Gateway-Routing-Protocol-(EIGRP).doc
2013-02-09 21:05
88K
Optics-Communication-Light.doc
2013-01-24 21:37
88K
What-is-Viper-and-how-does-it-work.doc
2012-10-29 09:08
88K
IP-switching.doc
2013-02-04 18:42
88K
Networks-and-Operating-Systems.doc
2013-01-25 20:06
89K
Semantic-desktop:-pim-meets-semantic-web13.doc
2013-01-23 20:43
89K
Semantic-desktop_-pim-meets-semantic-web13.doc
2013-01-23 20:43
89K
Duplicate-Data-Semantic.doc
2013-02-09 20:05
89K
The-future-of-3D-web-applications.doc
2013-01-18 19:58
89K
To-input-handwriting-characters.doc
2013-01-17 19:38
89K
Enterprise-networking.doc
2013-01-06 18:13
90K
Network-resource-provisioning.doc
2013-01-13 19:21
90K
Security-in-VoIP-systems-and-applications.doc
2013-01-23 20:04
90K
WIMAX-LTE-Comparisons.doc
2013-01-14 21:41
90K
Modelling-software-process.doc
2013-01-13 19:15
91K
The-internet-banking.doc
2013-01-19 19:45
91K
Features-of-grid-computing.doc
2013-02-09 13:45
91K
Build-a-remote-working-network.doc
2013-02-14 19:48
92K
Relevance-to-the-system-analysis.doc
2013-01-24 20:31
92K
Introduction-to-neural-network.doc
2013-02-05 20:19
93K
Bus-networks-topology.doc
2013-02-13 20:40
94K
Traffic-Congestion.doc
2013-02-19 15:59
94K
Video-coding-standard.doc
2013-01-16 09:19
94K
Accessibility-and-usability.doc
2013-02-17 14:16
96K
Communication-Computer-Network.doc
2013-01-12 20:34
96K
Network-topology.doc
2013-01-26 17:18
96K
Software-infrastructure-for-health-sector.doc
2013-01-22 21:28
96K
Video-based-human-motion-analysis.doc
2013-01-16 20:44
96K
Web-content-accessibility-guidelines.doc
2013-01-14 21:53
96K
Applications-of-SSL-VPN.doc
2013-02-14 20:54
96K
Knowledge-deal-with-java-programming.doc
2013-02-04 19:25
96K
Major-reconciliation-mechanisms.doc
2013-02-02 19:55
97K
Network-devices.doc
2013-01-31 19:40
97K
The-synopsis-provides-the-introduction.doc
2013-01-17 20:42
97K
CISCO-System.doc
2013-02-14 20:49
97K
GSM-Security-.pdf
2011-03-01 15:23
97K
Computer-network-and-management.doc
2013-02-13 20:13
98K
Free-Space-Optical-communication.doc
2013-01-11 20:03
98K
Linux-emulators.doc
2013-01-13 18:40
98K
Dependability-explicit-computing.doc
2013-02-09 21:29
99K
Mobile-ad-hoc-networks.doc
2013-02-01 18:48
99K
Traditionally-the-advancement-of-internet.doc
2013-01-13 20:19
99K
Video-summarization-techniques.doc
2013-01-13 20:54
99K
Network-learning.doc
2013-01-31 19:42
99K
Program-of-login-java.doc
2013-01-14 18:39
99K
TLS-record-layer.doc
2013-01-13 20:56
100K
Transmission-Signal-Symbols.doc
2013-01-17 19:28
100K
The-model-driven-software.doc
2013-01-18 18:00
100K
Benefits-of-Linux-operating-system.doc
2013-02-14 20:05
101K
Encoder-Viterbi-Matlab.doc
2013-01-12 19:44
101K
The-recent-advances-of-hardware.doc
2013-01-18 17:23
101K
The-field-of-computer-graphics.doc
2013-01-19 18:31
102K
Display-the-slides-for-this-course.doc
2013-02-09 20:23
102K
The-increase-in-applications-using-ontologies.doc
2013-01-19 20:16
103K
applied_encryption_standard.pdf
2011-03-01 15:12
103K
Wireless-LAN-IEEE.doc
2013-01-14 20:35
105K
4G-Communication-System.doc
2013-02-13 19:50
105K
Audio-gaming.doc
2013-02-15 19:31
105K
Computer-security-applications.doc
2013-02-13 20:02
105K
Mobile-security-using-j2me.doc
2013-01-13 19:59
107K
The-real-time-transport-protocol.doc
2013-01-18 17:26
107K
Communication-media-for-requirements-engineering.doc
2013-02-13 19:45
108K
Transport-Layer-Security.doc
2013-01-17 19:25
108K
Various-networking-technologies-and-services-like-tls-ipsec-ip-and-ids.doc
2013-01-16 09:38
108K
Implementation-of-the-data-gloves-in-various-fields.doc
2013-02-07 21:55
110K
Internet-and-social-life.doc
2013-02-05 20:15
110K
Homer;-designing-the-microgrid-system.doc
2012-11-05 22:40
111K
Survey-of-performance-evaluation-models.doc
2013-01-22 21:15
111K
The-internet-protocol-IP.doc
2013-01-19 19:50
112K
A-sequential-machine.doc
2013-02-17 13:55
112K
Class-of-cryptographic-algorithms.doc
2013-02-14 20:37
112K
CASE-Network-Studies-Analyses-No.401-Mergers-and-Acquisitions-.doc
2012-11-06 18:24
113K
Increasing-efficiency-of-wireless-netork-using-multicast-algorithm.doc
2013-02-07 10:31
113K
Literature-review-about-data-warehouse.doc
2013-02-01 19:05
113K
Intrusion-Detection-System-Tool.doc
2013-02-04 18:26
115K
Level-design.doc
2012-10-21 15:34
116K
The-digital-age.doc
2013-01-19 20:38
117K
Computer-viruses.doc
2013-02-12 20:02
117K
Fuzzy-based-approach-for-predicting-software-development-effort.doc
2013-02-09 12:52
117K
Overview-of-positioning-system.doc
2013-01-25 19:40
117K
How-the-topologies-operate.doc
2013-02-07 21:34
118K
In-computer-term-vulnerability.doc
2013-02-06 23:46
118K
SOFTWARE-STUDY.doc
2013-01-13 20:17
119K
4G-Mobile-System.doc
2013-01-12 21:36
120K
Mobile-ip-and-vertical-handoff-algorithms-in-wireless-networks.doc
2013-01-13 19:07
121K
Multi-sensor-data-fusion-and-integration.doc
2013-01-26 21:33
122K
Network-Services.doc
2013-01-31 19:32
122K
The-performance-of-ATM-network.doc
2013-01-18 17:35
123K
Computer-networks-have-been-growing-explosively.doc
2013-02-13 19:59
124K
Sports-blogging-system.doc
2013-01-23 19:06
124K
Object-Oriented-Testing.doc
2013-01-26 20:58
125K
Security-in-computer-network.doc
2013-01-09 08:42
127K
Regression-Testing.doc
2013-01-24 20:36
128K
Virtual-novel-interfaces-that-are-used-to-control-the-synthesiser-called-Midi.doc
2013-01-15 21:12
129K
GIS-Network-Genetic.doc
2013-02-07 22:42
131K
A-new-flexible-software.doc
2013-02-17 13:52
131K
History-of-computers.doc
2013-02-07 10:54
131K
Inventory-Systems-Using-Relational-Database-Systems.doc
2013-02-04 18:37
131K
Java-2-Micro-Edition.doc
2013-01-09 10:23
131K
Global-System-for-Mobile-Communications.doc
2013-02-09 12:57
132K
C++-features-with-the-Object-Oriented-Method-(OOM).doc
2013-02-14 19:54
132K
Grid-computing-infrastructures.doc
2013-02-09 13:09
132K
-Wireless-LAN.doc
2013-01-14 20:45
136K
This-century-we-depend-on-computer.doc
2013-01-17 20:01
136K
The-advanced-technologies.doc
2013-01-22 20:01
137K
Psychophysical-Phenomenon-called-Masking.doc
2012-12-12 20:23
140K
The-multi-threaded-socket-classes.doc
2013-01-18 18:50
142K
Uni-e-text-solution.doc
2012-11-13 09:22
143K
A-main-component-to-design-fish-recognition-and-classification-system-architecture.doc
2012-10-18 19:07
144K
individual-private-home-networks.doc
2013-02-07 10:27
144K
Third-generation-3G-wireless-in-evolution-security-threats-and-analysis.doc
2013-01-17 19:57
145K
A-Critical-Evaluation-of-the-Advantages-and-Disadvantages-of-the-Relational-Object-Relational-and-Object-Oriented-Data-Models..doc
2013-01-13 18:33
145K
Quality-of-wireless-network.doc
2013-01-24 20:45
145K
Wireless-Sensor-Networks.doc
2013-01-14 21:09
145K
Quality-Based-Web-Service-Selection.doc
2013-01-14 19:42
146K
Local-area-network-investigation.doc
2013-02-01 19:00
148K
3SFE518-Computer-System-Organisation-Piping.pdf
2011-03-02 10:13
148K
Case-Study-of_Beijing-2008_-a-Digital-Olympics_.doc
2012-11-15 23:30
148K
Internet-Security.doc
2013-01-13 18:24
148K
Real-time-video-distribution.doc
2013-01-24 20:13
148K
Transition-Mechanisms-from-IPv4-to-IPv6.doc
2013-01-17 19:36
149K
Telecommunications-sector-in-indias-development.doc
2012-11-16 14:35
149K
New-version-of-the-internet-protocol.doc
2013-01-26 17:43
150K
QoS-prediction-for-web-services.doc
2013-01-24 21:04
151K
About-internet.doc
2013-01-12 21:45
153K
Concepts-of-web-projects.doc
2013-02-12 19:48
153K
PSTN-(Public-Switched-Telephone-Network).doc
2013-01-21 19:18
153K
Video-rental-and-sales-system.doc
2013-01-14 19:08
153K
OSPF-EIGRP-with-CISCO-products-over-ISP-level-network-2009.doc
2013-01-25 19:44
154K
Operating-system's-file-system-structure.doc
2013-01-26 21:02
155K
Growth-of-information.doc
2013-02-09 13:17
157K
Windows-and-Linux.doc
2012-10-20 21:18
159K
Computer-supported-cooperative-work.doc
2013-02-13 20:09
160K
Wimax-wireless-radio-frequency-system.doc
2013-01-14 21:03
160K
Evaluation-of-Software-Industry-in-Bangladesh_-a-Study-on-Hello-Dacca-(Pvt.)-Ltd.doc
2012-11-05 18:39
163K
Semantic-Web-Meta-data.doc
2013-01-06 20:20
166K
Designing-an-olap-solution-architecture-by-using-microsoft-sql-server-2008.doc
2013-02-09 21:08
167K
Protocol-Network-System.doc
2013-01-24 21:19
167K
The-new-functions-of-DL.doc
2013-01-18 19:47
168K
Image-processing-is-any-form-of-signal-processing.doc
2013-01-12 18:41
168K
An-artificial-neural-network.doc
2013-02-16 19:38
169K
To-say-that-Internet-has-become-an-important-commodity.doc
2013-02-05 20:06
171K
Java-and-web-programming-languages.doc
2013-02-04 18:02
175K
Home-shopping-online-experience-database-project.doc
2013-02-07 21:18
181K
Impact-of-information-technology-on-banking.doc
2013-02-07 21:45
183K
speech-recognition.pdf
2012-03-15 07:35
184K
internet-technologies-help-foreign-people-with-learning-languages.doc
2013-02-05 20:25
185K
Communication-MIMO-Wireless.doc
2013-01-12 21:22
189K
quality_assurance.pdf
2011-03-01 15:15
189K
Types-of-IT-Security-Threats.pdf
2011-03-01 19:38
193K
Network-Protocol-Monitoring.doc
2013-01-09 09:16
206K
introduction-to-the-IEEE-802.11p-WAVE-standard.pdf
2011-03-02 10:02
209K
Movie-trailers-streamed.doc
2013-01-26 21:44
213K
Horizontal-and-vertical-handover-in-wireless-and-cellular-environment.doc
2013-02-07 21:22
216K
Security-in-mobile-communications-using-j2me.doc
2013-01-13 19:55
231K
High-data-rates-and-wireless-access-network.doc
2013-01-13 18:47
237K
Information-Systems.pdf
2011-03-02 10:03
240K
VoWLAN-WLAN-VoIP.doc
2013-01-06 18:25
260K
UK-Copyright-and-File-Sharing.pdf
2011-03-01 15:24
263K
Computer-Language-Reading.doc
2013-01-12 19:13
267K
Discuss-the-role-of-the-following-facilities-information:·-Data-bases·-Client-servers·-Expert-systems-and-AI-Data-warehousing..pdf
2011-03-01 19:14
277K
Discuss-the-role-of-the-following-facilities-information_·-Data-bases·-Client-servers·-Expert-systems-and-AI-Data-warehousing..pdf
2011-03-01 19:14
277K
Star-College-Student-Accommodation.pdf
2011-03-02 10:09
318K
Impact-of-Social-Networking-on-e-business.pdf
2011-03-02 10:06
337K
attitudes_towards_software_piracy.pdf
2011-03-01 15:03
360K
online-detection-and-prevention-of-phishing.pdf
2011-03-01 19:34
409K
Investigating-the-viability-of-e-commerce-in-an-organization.pdf
2011-03-02 10:04
413K
forensic_crime_msc.pdf
2011-03-01 15:05
439K
Airline-reservation-system.pdf
2011-03-02 10:08
455K
Information_systems_and_benefits_to_companies.pdf
2011-03-02 10:16
471K
florest_project.pdf
2011-03-02 10:25
490K
Computer-Networks-and-Distributed-Systems-Wireless-network-of-devices.pdf
2012-03-23 08:13
522K
What-is-Spoofing.pdf
2012-03-23 23:36
589K
Foundation-Degree-Computing-Statistical-Methods.pdf
2011-03-15 08:47
597K
OPTIMAL-PATH-PLANNING-USING-AN-IMPROVED-A*-ALGORITHM-FOR-HOMELAND-SECURITY-APPLICATIONS.pdf
2011-03-12 20:26
635K
OPTIMAL-PATH-PLANNING-USING-AN-IMPROVED-A@-ALGORITHM-FOR-HOMELAND-SECURITY-APPLICATIONS.pdf
2011-03-12 20:26
635K
3ISE517-Internet-Application-Programming-CGI.pdf
2011-03-02 10:12
662K
database_systems_web_transactions_msc.pdf
2011-03-01 15:01
739K
This-report-details-the-progress-over-the-last-6-months-of-our-R-D-team-for-Apple’s-new-domestic-product-service-area-iHome.pdf
2012-03-15 07:37
950K
motorcycle-apparel-online-project.pdf
2011-03-02 10:24
951K
MATLAB-is-one-of-the-most-popular-computer-languages-for-technical-and-scientific-programming.pdf
2012-03-15 07:29
1.0M
Usability-Evaluation-Methods.pdf
2011-03-02 10:06
1.0M
Operating-system.pdf
2011-03-02 10:07
1.0M
A-bucketing-framework-for-Database-security.pdf
2011-03-01 15:19
1.1M
Mathematics-for-Computing.pdf
2011-08-13 07:58
1.1M
Methods-and-technology-used-in-Computer-Forensics.pdf
2011-03-01 19:37
1.3M
3SFE504-Object-Oriented-Programming-Linear-and-Independent-Hash-Table-code.pdf
2011-03-02 10:14
1.5M
Visual-Basic.pdf
2011-03-02 10:14
1.8M
Wireless-LANs-WLANs-are-now-deployed-at-great-pace-both-on-company-premises-and-in-public-hot-spots.pdf
2011-03-01 19:15
1.9M
determinants-of-knowledge-sharing.pdf
2011-03-01 15:20
2.0M
Voice-Encryption-using-RSA-Algorithm.pdf
2012-03-15 07:35
2.7M