Skip to main content Skip to main navigation menu Skip to site footer
  • Current
  • Archives
  • Indexing/abstracting
  • Legal Information
  • Announcements
  • Editorial Team
  • About
    • About the Journal
    • Submissions
    • Plagiarism Ethics
    • Contact
Search
  • Register
  • Login
  1. Home /
  2. Archives /
  3. Vol. 5 No. 2 (2014)

Vol. 5 No. 2 (2014)

Published: 2014-05-08

Editorial

  • EDITORIAL

    Jorge Alberto Ruiz Vanoye
    1
    • PDF

Articles

  • Strategic Planning for the Computer Security: A Practice Case of an Electrical Research Institute

    Jorge A. Ruiz-Vanoye, Ocotlán Díaz-Parra, Ana Canepa Saénz, Ricardo A. Barrera-Cámara, Alejandro Fuentes-Penna, Beatriz Bernabe-Loranca
    2-28
    • PDF
  • A Pair-wise Key Distribution Mechanism and Distributed Trust Evaluation Model for Secure Data Aggregation in Mobile Sensor Networks

    Natarajan Meghanathan
    29-46
    • PDF
  • Bounds for the permutation flowshop scheduling problem with exact time lags to minimize the total earliness and tardiness

    Imen Hamdi, Taıcir Loukil
    47-57
    • PDF
  • A Novel Constructive Routing Algorithm for Fleet Size and Mix Vehicle Routing Problem

    Kenan Karagul
    58-73
    • PDF

Information

  • For Readers
  • For Authors
  • For Librarians

Current Issue

  • Atom logo
  • RSS2 logo
  • RSS1 logo

© International Journal of Combinatorial Optimization Problems and Informatics (http://ijcopi.org), EDITADA, ISSN: 2007-1558, Country: Mexico, editor@ijcopi.org.

More information about the publishing system, Platform and Workflow by OJS/PKP.

Support by Cultural Hosting