researchr
explore
Tags
Journals
Conferences
Authors
Profiles
Groups
calendar
New Conferences
Events
Deadlines
search
search
You are not signed in
Sign in
Sign up
External Links
Journal: I. J. Comput. Appl.
Home
Index
Info
Issue
Volume
15
, Issue
4
237
--
251
Khaled Alghathbar
,
Duminda Wijesekera
.
Enforcing Security Policies in Requirements Engineering Using AFUML
252
--
262
Yasser Ganjisaffar
,
Hassan Abolhassani
.
Towards a Framework for Brokering Semantic Web Services
263
--
273
Mahdi Abadi
,
Saeed Jalili
.
Minimization Analysis of Network Attack Graphs Using Genetic Algorithms
274
--
282
Esmail Amini
,
Mehrdad Najibi
,
Hossein Pedram
.
Automatic Generation of Globally Asynchronous Locally Synchronous Wrapper Circuits
283
--
296
Saad Bani-Mohammad
,
Mohamed Ould-Khaoua
,
Ismail Ababneh
.
Greedy-Available Non-Contiguous Processor Allocation Strategy and Job Scheduling for 2D Mesh Connected Multicomputers