Abstract is missing.
- E-podium Technology: A Medium of Managing Knowledge at Al Buraimi University College via M-learningMustafa Al Emran, Khaled F. Shaalan. [doi]
- A New Watermarking Algorithm for Scanned Grey PDF Files Using Robust Logo and Hash FunctionWalid Alakk, Hussain Al-Ahmad. [doi]
- IT Governance from Theory to Practice: The Importance of AccountabilityMarie Griffiths, Leena Janahi, Hesham Al-Ammal. [doi]
- E-HRM and Outsourcing For Arabic Countries and Large OrganisationsGhassan Kbar, Wathiq Mansoor. [doi]
- Number of Paths and Neighbours Effect on Multipath Routing in Mobile Ad Hoc NetworksOday Jerew, Kim L. Blackmore, Masoud Mohammadian. [doi]
- Two Levels Block Based Wavelet Watermarking Algorithm For Still Colour ImagesTaha Dawod Jassim, Hussain Al-Ahmad, Raed A. Abd-Alhameed, Ahmed Al-Gindy. [doi]
- Data Aggregation in Wireless Sensor Networks with Minimum Delay and Minimum Use of Energy: A Comparative StudyBushra Qayyum, Mohammed Saeed. [doi]
- A Novel Long Term Traffic Forecast AlgorithmDongchen Zhang, Shoufeng Wang, Xiaoyan Xu, Xingzheng Li, Wenwen Yao, Tinglan Wang. [doi]
- Mobile Malaria Larval Source SurveillanceDavid Ming Liu, Benjamin Hirsch, Bashir Aden, Ahmed Mohammad Abdalla. [doi]
- ICAPS: Intelligent Context Aware Profile SwitchingSaeed Al Mannaee, Rashid Al Matar, Yousef Al Ahmedi, Jamal Zemerly, Ahmed Bentiba. [doi]
- Is Your IT Investment Adding Value to the EnterpriseSiva Sankaran. [doi]
- Developing an IT Help Desk Troubleshooter Expert System for diagnosing and solving IT ProblemsHani Al Chalabi, Mustafa Al Emran. [doi]
- User Experience in Arabia: The Business Case for User-Centred Design and Usability EngineeringAli al-Azzawi. [doi]
- Two-factor Protection Scheme in Securing the Source Code of Android ApplicationsDaniel Tse, Zihuan Li, Ka-Fai Wong, Yuhui Tao, Wei Liu, Wai Hou Choi. [doi]
- Impact of Assurance of Learning (AOL) in Programming Course for NovicesSohail Iqbal, Roy Mathew, Morshed Chowdhury, Jo Coldwell-Neilson. [doi]