|
Journals in DBLP
- Mohamed F. Ababneh, Ibrahiem M. M. El Emary
An Analytical Simulation Technique Suitable for Performance Evaluation of Various CSMA/CD LANs. [Citation Graph (0, 0)][DBLP] Egyptian Computer Science Journal, 2004, v:26, n:2, pp:- [Journal]
- Asma M. A. Bahurmoz
The Analytic Hierarchy Process: A Methodology For Win- Win Management. [Citation Graph (0, 0)][DBLP] Egyptian Computer Science Journal, 2004, v:26, n:2, pp:- [Journal]
- Ibrahiem M. M. El Emary, Farouq Al Taweel
On The Application Of Intelligent Autonomous Agents For Managing The Real Time Communication Network. [Citation Graph (0, 0)][DBLP] Egyptian Computer Science Journal, 2004, v:26, n:2, pp:- [Journal]
- Laila Mohamed El Fangary
Forecasting the Load Data for Cairo Power System. [Citation Graph (0, 0)][DBLP] Egyptian Computer Science Journal, 2004, v:26, n:2, pp:- [Journal]
- Alaa El-Din M. El Ghazali
Conceptual Framework to Manage Security of GPRS Interfaces. [Citation Graph (0, 0)][DBLP] Egyptian Computer Science Journal, 2004, v:26, n:2, pp:- [Journal]
- Hassan D. Hassanin, Badr Eldin A. Mousa, Essam A. Sharaf, A. M. Salem
A Prototype Case-Based Reasoning System for Prediction of The Structural Number of Asphalt Pavement. [Citation Graph (0, 0)][DBLP] Egyptian Computer Science Journal, 2004, v:26, n:2, pp:- [Journal]
- Yehia M. K. Helmy, Riham M. Haggag, Mohamed I. Marie
A Survey on Data Warehouse Quality. [Citation Graph (0, 0)][DBLP] Egyptian Computer Science Journal, 2004, v:26, n:2, pp:- [Journal]
- T. M. Nazmy, Khaled Ahmed Nagaty, Tarek F. Gharib, A. S. Abbass
An Image Signature Based PCNN for Skilled Forgery Signature Detection. [Citation Graph (0, 0)][DBLP] Egyptian Computer Science Journal, 2004, v:26, n:2, pp:- [Journal]
|