Volume 2, Issue 3 & 4
December 2014

Binary Tree Banded Linear Equation System Solver Read, William Journal of Computer Science and Information Technology, 2(3&4), pp. 01-13
DOI: 10.15640/jcsit.v2n3-4a1      URL: http://dx.doi.org/10.15640/jcsit.v2n3-4a1
View Abstract | Full Text (PDF)
3D Segmentation by Spectral Clustering Using Shape Index Rajaallah, E.; Herouane, O.; Moumoun, L.; Gadi, T. Journal of Computer Science and Information Technology, 2(3&4), pp. 15-33
DOI: 10.15640/jcsit.v2n3-4a2      URL: http://dx.doi.org/10.15640/jcsit.v2n3-4a2
View Abstract | Full Text (PDF)
A Non-Invasive Approach for the Detection and Monitoring of Diabetes in Mexico Luis Enrique Colmenares-Guillen, Omar Ariosto Niño Prieto, Aldo Enrique Águila Jurado, Samuel Treviño Mora Journal of Computer Science and Information Technology, 2(3&4), pp. 35-54
DOI: 10.15640/jcsit.v2n3-4a3      URL: http://dx.doi.org/10.15640/jcsit.v2n3-4a3
View Abstract | Full Text (PDF)
Generating the PIM Behavioral Model from the CIM using QVT Najiba Addamssiri, Abdelouhaed Kriouile, Youssef Balouki, Gadi Taoufiq Journal of Computer Science and Information Technology, 2(3&4), pp. 55-81
DOI: 10.15640/jcsit.v2n3-4a4      URL: http://dx.doi.org/10.15640/jcsit.v2n3-4a4
View Abstract | Full Text (PDF)
Context Dependent Threat-Based Access Control System Adejimi Alaba Olusesi, Sodiya Adesina Simeon Journal of Computer Science and Information Technology, 2(3&4), pp. 83-105
DOI: 10.15640/jcsit.v2n3-4a5      URL: http://dx.doi.org/10.15640/jcsit.v2n3-4a5
View Abstract | Full Text (PDF)
Comprehensive Analysis of Broadcast Authentication protocols in Wireless Sensor Networks Masoum Farahmandian, Mohammad Masdari, Vahid Farahmandian Journal of Computer Science and Information Technology, 2(3&4), pp. 107-125
DOI: 10.15640/jcsit.v2n3-4a6      URL: http://dx.doi.org/10.15640/jcsit.v2n3-4a6
View Abstract | Full Text (PDF)