Main Navigation
Main Content
Sidebar
Register
Login
Toggle navigation
Home
About the Journal
Contact
Open Access Policy
Free Acces and Publishing
Code of Ethics
Peer Review Process
Possible conflict of interest statement
Financing Statement
Responsibility for content
Editorial Team
Current
Archives
Privacy Statement
Submissions
Announcements
Search
Home
Archives
Vol. 8 No. 02
DOI:
https://doi.org/10.22201/icat.24486736e.2010.8.02
Published:
2010-08-01
Articles
An Architecture for Intrusion Detection Based on an Extension of the Method of Remaining Elements
P. Velarde-Alvarado, C. Vargas-Rosales, D. Torres-Roman, A. Martinez-Herrera
PDF
Scheduling strategy for Real-Time Distributed Systems
A. Menéndez-Leonel de Cervantes, H. Benítez-Pérez
PDF
Fingerprint Matching and Non-Matching Analysis for Different Tolerance Rotation Degrees in Commercial Matching Algorithms
A. J. Perez-Diaz, I. C. Arronte-Lopez
PDF
Automation Of An I-V Characterization System
J. R. Noriega, A. Vera-Marquina, C. Acosta Enríquez
PDF
Application of nonlinear compensation to limit input dynamic range in analog optical fiber links
J. Rodriguez, J. Velazquez, R. Garduno, J. Montero
PDF
Vibration Analysis Of a Self-Excited Elastic Beam
M. A. Barrón-Meza
PDF
Detection of mixed-culture growth in the total biomass data by wavelet transforms
H.C. Rosu, J.S. Murguía, V. Ibarra-Junquera
PDF
Shock Performance of Different Semiactive Damping Strategies
D. F. Ledezma-Ramirez, N. Ferguson, M. Brennan
PDF
Reference Fields Analysis of a Markov Random Field Model to Improve Image Segmentation
E. D. López-Espinoza, L. Altamirano-Robles
PDF
Control of a Class of Sulfate Reducing Chemostat Via Feedback Polynomial Injection
R. Aguilar-Lopez, V. Peña-Caballero, M. I. Neria-Gonzalez
PDF