Vol. 26 No. 2 (2010)

Published: 25-04-2012

Computer Science

  • Enhancing Privacy in Distributed Data Clustering
    Luong The Dung, Ho Tu Bao
    87-102

    DOI: https://doi.org/10.15625/1813-9663/26/2/524
  • A genetic algorithm based Pareto optimization hedge-algebra-based fuzzy rules-sets
    Nguyễn Cát Hồ, Trần Thái Sơn, Dương Thăng Long, Trần Duy Hùng
    103-118

    DOI: https://doi.org/10.15625/1813-9663/26/2/525
  • Constructing inverse mappings of hedges
    Trần Đình Khang, Tạ Quang Trung, Lê Anh Phương
    119-130

    DOI: https://doi.org/10.15625/1813-9663/26/2/526
  • alpha-functional dependencies and alpha-closure in the database model of block form
    Vũ Đức Thi, Trịnh Đình Vinh
    131-140

    DOI: https://doi.org/10.15625/1813-9663/26/2/527
  • A method for service reusability measuring
    Huỳnh Quyết Thắng, Phạm Thị Quỳnh, Tạ Quang Dũng
    141-152

    DOI: https://doi.org/10.15625/1813-9663/26/2/528
  • Grammar extraction LTAG for Vietnamese
    Lê Hồng Phương, Nguyễn Thị Minh Huyền, Nguyễn Phương Thái, Phan Thị Hà
    153-172

    DOI: https://doi.org/10.15625/1813-9663/26/2/539
  • Checking the compliance of timing constraints in software applications
    Trịnh Thanh Bình, Trương Ninh Thuận, Nguyễn Việt Hà
    173-184

    DOI: https://doi.org/10.15625/1813-9663/26/2/559
  • Detecting copy/move forgery images based on invariant features.
    Lê Thị Kim Nga, Đỗ Năng Toàn
    185-195

    DOI: https://doi.org/10.15625/1813-9663/26/2/560
  • Table of Contents
    - -

    DOI: https://doi.org/10.15625/1813-9663/26/2/561