Journal: J. King Saud Univ. Comput. Inf. Sci.

Volume 23, Issue 2

45 -- 58Mishaal Abdullah Al-Kadhi. Assessment of the status of spam in the Kingdom of Saudi Arabia
59 -- 70Mourad Ykhlef, Sarra M. Alqahtani. A survey of graphical query languages for XML data
71 -- 78Jalal Al-Muhtadi, Raquel L. Hill, Sumayah Al-Rwais. Access control using threshold cryptography for ubiquitous computing environments
79 -- 89Raed I. Hamed, Syed I. Ahson. Confidence value prediction of DNA sequencing with Petri net model
91 -- 104Shaker H. Ali El-Sappagh, Abdeltawab M. A. Hendawi, Ali El-Bastawissy. A proposed model for data warehouse ETL processes
105 -- 113Yaser M. Khamayseh, Ghadeer Obiedat, Munner Bani Yassin. Mobility and Load aware Routing protocol for ad hoc networks

Volume 23, Issue 1

1 -- 6Mourad Ykhlef. A Quantum Swarm Evolutionary Algorithm for mining association rules in large databases
7 -- 14Naif Alajlan. HopDSW: An approximate dynamic space warping algorithm for fast shape matching and retrieval
15 -- 28Abdulaziz S. Almazyad. Optical omega networks with centralized buffering and wavelength conversion
29 -- 36Yousef Al-Ohali. Computer vision based date fruit grading system: Design and implementation
37 -- 43Sami S. Alwakeel, Nasser M. Alotaibi. End-to-end Measurement Based Admission Control VoIP protocol with loss policy