Pages | Title and author(s) |
4-13 | An algorithm for computing theory prime implicates in first order logicArindama Singh, Manoj K. Raut DOI: 10.1504/IJICT.2007.013273 |
14-25 | Software testing: a graph theoretic approachVandana Bhattacherjee, Deepti Suri, Prabhat Kumar Mahanti DOI: 10.1504/IJICT.2007.013274 |
26-37 | Mobile agent location management in global networksR.B. Patel, Nikos E. Mastorakis, Kumkum Garg DOI: 10.1504/IJICT.2007.013275 |
38-49 | A parallel algorithm for dynamic slicing of distributed Java programs in non-DSM systemsDurga Prasad Mohapatra, Rajib Mall, Rajeev Kumar DOI: 10.1504/IJICT.2007.013276 |
50-61 | Measuring user's role to assess organisation preparedness in a systems acquisition life cycle: a cognitive frameworkH. Misra, M. Satpathy, B. Mohanty DOI: 10.1504/IJICT.2007.013277 |
62-75 | A hardware accelerator for controlling access to multiple-unit resources in safety/time-critical systemsPhilippe Marchand, Purnendu Sinha DOI: 10.1504/IJICT.2007.013278 |
76-88 | Size invariant shape recognition by modulated competitive neural circuitLai Si Wu, Lakhmi Jain DOI: 10.1504/IJICT.2007.013319 |
89-97 | An improved heuristic for permutation flowshop schedulingUday Kumar Chakraborty, Dipak Laha DOI: 10.1504/IJICT.2007.013279 |
98-111 | Data-based adaptive computation techniqueNishchal K. Verma, B.K. Panigrahi DOI: 10.1504/IJICT.2007.013280 |
112-128 | Efficient transmission of periodic data that follows a consistent daily pattern: experimental study of transmitting performance data in a wireless networkMouayad Albaghdadi, Kumail Razvi DOI: 10.1504/IJICT.2007.013281 |