IJSEIA Vol. 12, No. 2, 2018
 


        Home


        Organization


        Journals


        Conferences

        Conference Calendar


        Conference Gallery


        Proceedings


        Organizer Tools


        Conference Support


        Workshops


        Advertisement


ISSN: 1738-9984

Vol.1, No.1, 2007
Vol.2, No.1, 2008
Vol.2, No.2, 2008
Vol.2, No.3, 2008
Vol.2, No.4, 2008
Vol.3, No.1, 2009
Vol.3, No.2, 2009
Vol.3, No.3, 2009
Vol.3, No.4, 2009
Vol.4, No.1, 2010
Vol.4, No.2, 2010
Vol.4, No.3, 2010
Vol.4, No.4, 2010
Vol.5, No.1, 2011
Vol.5, No.2, 2011
Vol.5, No.3, 2011
Vol.5, No.4, 2011
Vol.6, No.1, 2012
Vol.6, No.2, 2012
Vol.6, No.3, 2012
Vol.6, No.4, 2012
Vol.7, No.1, 2013
Vol.7, No.2, 2013
Vol.7, No.3, 2013
Vol.7, No.4, 2013
Vol.7, No.5, 2013
Vol.7, No.6, 2013
Vol.8, No.1, 2014
Vol.8, No.2, 2014
Vol.8, No.3, 2014
Vol.8, No.4, 2014
Vol.8, No.5, 2014
Vol.8, No.6, 2014
Vol.8, No.7, 2014
Vol.8, No.8, 2014
Vol.8, No.9, 2014
Vol.8, No.10, 2014
Vol.8, No.11, 2014
Vol.8, No.12, 2014
Vol.9, No.1, 2015
Vol.9, No.2, 2015
Vol.9, No.3, 2015
Vol.9, No.4, 2015
Vol.9, No.5, 2015
Vol.9, No.6, 2015
Vol.9, No.7, 2015
Vol.9, No.8, 2015
Vol.9, No.9, 2015
Vol.9, No.10, 2015
Vol.9, No.11, 2015
Vol.9, No.12, 2015
Vol.10, No.1, 2016
Vol.10, No.2, 2016
Vol.10, No.3, 2016
Vol.10, No.4, 2016
Vol.10, No.5, 2016
Vol.10, No.6, 2016
Vol.10, No.7, 2016
Vol.10, No.8, 2016
Vol.10, No.9, 2016
Vol.10, No.10, 2016
Vol.10, No.11, 2016
Vol.10, No.12, 2016
Vol.11, No.1, 2017
Vol.11, No.2, 2017
Vol.11, No.3, 2017
Vol.11, No.4, 2017
Vol.11, No.5, 2017
Vol.11, No.6, 2017
Vol.11, No.7, 2017
Vol.11, No.8, 2017
Vol.11, No.9, 2017
Vol.11, No.10, 2017
Vol.11, No.11, 2017
Vol.11, No.12, 2017
Vol.12, No.1, 2018
Vol.12, No.2, 2018


 


Contents

  • Cover Page
  • Inside Cover Page
  • Editorial Board
  • Foreword and Editorial
  • Table of Contents
  • A Constraint-Based Verification Approach for Java Bytecode Programs, Safaa Achour, Ali Chouenyib and Mohammed Benattou (pp. 1-16). (Abstract)
  • A Survey of the Bug Localisation Techniques, Kavya Shree N S and Pushpalatha M N (pp. 17-30). (Abstract)
  • Mathematical Model and Algorithms for some Type of Concurrency Control Problems in Database Applications, Moukouop Nguena Ibrahim and Ngassa Kaam Cedric (pp. 31-46). (Abstract)
  • IoT-based Software Platform for Delivering Ubiquitous Healthcare, Carlos Ramos, Subramaniam Ganesan and Regin Conejar (pp. 47-56). (Abstract)
  • A Study of a Elgg Framework for Social Networking Application Development, Sabah Mohammed, Byeongho Kang and Ronnie Caytiles (pp. 57-66). (Abstract)
  • Copyright




 
____________________________________________