Abstract is missing.
- A survey of nature inspired optimization algorithms applied to cooperative strategies in robot soccerAsma Sanam Larik, Sajjad Haider. 1-6 [doi]
- Checking JML-encoded finite state machine propertiesIjaz Ahmed, Néstor Cataño. 1-9 [doi]
- A taxonomy of mobile games based on structural similarityYasir Hussain, Ghulam Rasool. 1-6 [doi]
- Voice morphing: An illusion or realityIjaz Ahmed, Ayesha Sadiq, Muhammad Atif, Mudasser Naseer, Muhammad Adnan. 1-6 [doi]
- A context-aware reasoning framework for heterogeneous systemsHafiz Mahfooz Ul Haque, Sajid Ullah Khan. 1-9 [doi]
- Web content readability evaluation using fuzzy logicNawal Iram, Shareena Zafar, Rida Zahra. 1-8 [doi]
- Evaluation of predictive data mining algorithms in soil data classification for optimized crop recommendationAnsif Arooj, Mohsin Riaz, Malik Naeem Akram. 1-6 [doi]
- Trust-based situation awareness: Agent-based versus population-based modeling a comparative studyZara Nasar, Syed Waqar Jaffry. 1-7 [doi]
- Securing wireless software defined networks: Appraising threats, defenses & research challengesTaimur Bakhshi. 1-6 [doi]
- Measuring authorship legitimacy by statistical linguistic modellingGhazanfar Hussain, Ali Husnain, Rida Zahra, Saira Moin U. Din. 1-7 [doi]
- Management of non-behavioral tasks via auto reminder and notifierSania Bhatti, Amirita Dewani, Tahseen Hafiz, Pashmeena Noor, Mahnoor Gul Memon. 1-6 [doi]
- Ontology based syndrome diagnostic system: (OBSDS)Haya Majid Qureshi, Maliha Qureshi. 1-6 [doi]
- A parametric performance evaluation of SMDBRP and AEDGRP routing protocols in underwater wireless sensor network for data transmissionUmar Draz, Tariq Ali, Sana Yasin, Noman Naseer, Umair Waqas. 1-8 [doi]
- Towards bearing health prognosis using generative adversarial networks: Modeling bearing degradationSheraz Ali Khan, Alexander E. Prosvirin, Jong Myon Kim. 1-6 [doi]
- Adaptive interface for color-blind people in mobile-phonesMuhammad Waseem Iqbal, Syed Khuram Shahzad, Nadeem Ahmad, Alessia Amelio, Darko Brodic. 1-8 [doi]
- Light-weight depth-based routing for underwater wireless sensor networkSafia Gul, Sana Hoor Jokhio, Imran Ali Jokhio. 1-7 [doi]
- NOPT site: An online workbench for modeling and optimization of diverse networksJunaid Aziz, Vladimir Mahalec. 1-5 [doi]
- Energy efficient cluster based routing algorithm for wireless sensors networksKhalid Mahmood Awan, Ahmad Ali, Farhan Aadil, Kashif Naseer Qureshi. 1-7 [doi]
- Preeminent risk factor affecting software developmentHafiz Ali Hamza Gondal, Saira Moin U. Din, Sajida Fayyaz, Muhammad Dahir Zeb, Beenish Nadeem. 1-7 [doi]
- Compliance of problem & modification analysis phase of ISO/IEC 14764: An industrial surveyZishan Hussain Chuhan, Muhammad Nadeem Akhtar, Ibrar Hussain. 1-6 [doi]
- A systematic mapping study on success factors of implementing measurement processes in SMEsMuhammad Noman, Touseef Tahir, Ghulam Rasool. 1-8 [doi]
- Power savings in servers infrastructure under backup and availability constraintsAwais Latif Gouhar, Arshad Ali. 1-8 [doi]
- Systematic literature review on user interfaces of autonomous cars: Liabilities and responsibilitiesSana Urooj, Irum Feroz, Nadeem Ahmad. 1-10 [doi]