Abstract is missing.
- An Internet-Based Scientific Programming EnvironmentMichael Weeks. 1-12 [doi]
- Testing of Transmission Channels Quality for Different Types of Communication TechnologiesRobert Bestak, Zuzana Vranova, Vojtech Ondryhal. 13-23 [doi]
- Haptic Feedback for Passengers Using Public TransportRicky Jacob, Bashir Shalaik, Adam C. Winstanley, Peter Mooney. 24-32 [doi]
- Toward a Web Search Personalization Approach Based on Temporal ContextDjalila Boughareb, Nadir Farah. 33-44 [doi]
- On Flexible Web Services Composition NetworksChantal Cherifi, Vincent Labatut, Jean François Santucci. 45-59 [doi]
- Influence of Different Session Timeouts Thresholds on Results of Sequence Rule Analysis in Educational Data MiningMichal Munk, Martin Drlík. 60-74 [doi]
- Analysis and Design of an Effective E-Accounting Information System (EEAIS)Sarmad Mohammad. 75-82 [doi]
- DocFlow: A Document Workflow Management System for Small OfficeBoonsit Yimwadsana, Chalalai Chaihirunkarn, Apichaya Jaichoom, Apichaya Thawornchak. 83-92 [doi]
- Computing Resources and Multimedia QoS Controls for Mobile AppliancesChing-Ping Tsai, Hsu-Yung Kung, Mei-Hsien Lin, Wei Kuang Lai, Hsien-Chang Chen. 93-105 [doi]
- Measure a Subjective Video Quality Via a Neural NetworkHasnaa El Khattabi, Ahmed Tamtaoui, Driss Aboutajdine. 121-130 [doi]
- Image Quality Assessment Based on Intrinsic Mode Function Coefficients ModelingAbdelkaher Ait Abdelouahad, Mohammed El Hassouni, Hocine Cherifi, Driss Aboutajdine. 131-145 [doi]
- Vascular Structures Registration in 2D MRA ImagesMarwa Hermassi, Hejer Jelassi, Kamel Hamrouni. 146-160 [doi]
- Design and Implementation of Lifting Based Integer Wavelet Transform for Image Compression ApplicationsMorteza Gholipour. 161-172 [doi]
- Detection of Defects in Weld Radiographic Images by Using Chan-Vese Model and Level Set FormulationYamina Boutiche. 173-183 [doi]
- Adaptive and Statistical Polygonal Curve for Multiple Weld Defects Detection in Radiographic ImagesAicha-Baya Goumeidane, Mohammed Khamadja, Nafaa Nacereddine. 184-198 [doi]
- A Method for Plant Classification Based on Artificial Immune System and Wavelet TransformEsma Bendiab, Mohamed-Khireddine Kholladi. 199-208 [doi]
- Adaptive Local Contrast Enhancement Combined with 2D Discrete Wavelet Transform for Mammographic Mass Detection and ClassificationDaniela Giordano, Isaak Kavasidis, Concetto Spampinato. 209-218 [doi]
- Texture Image Retrieval Using Local Binary Edge PatternsAbdelhamid Abdesselam. 219-230 [doi]
- Detection of Active Regions in Solar Images Using Visual AttentionFlavio Cannavó, Concetto Spampinato, Daniela Giordano, Fatima Rubio da Costa, Silvia Nunnari. 231-241 [doi]
- A Comparison between Different Fingerprint Matching TechniquesSaeed Mehmandoust, Asadollah Shahbahrami. 242-253 [doi]
- Classification of Multispectral Images Using an Artificial Ant-Based AlgorithmRadja Khedam, Aichouche Belhadj-aissa. 254-266 [doi]
- PSO-Based Multiple People TrackingChing-Han Chen, Miao-Chun Yan. 267-276 [doi]
- A Neuro-fuzzy Approach of Bubble Recognition in Cardiac Video ProcessingIsmail Burak Parlak, Salih Murat Egi, Ahmet Ademoglu, Costantino Balestra, Peter Germonpre, Alessandro Marroni, Salih Aydin. 277-286 [doi]
- Three-Dimensional Segmentation of Ventricular Heart Chambers from Multi-Slice Computerized Tomography: An Hybrid ApproachAntonio Bravo, Miguel A. Vera, Mireille Garreau, Rubén Medina. 287-301 [doi]
- Fingerprint Matching Using an Onion Layer Algorithm of Computational Geometry Based on Level 3 FeaturesSamaneh Mazaheri, Bahram Sadeghi Bigham, Rohollah Moosavi Tayebi. 302-314 [doi]
- Multiple Collaborative Cameras for Multi-Target Tracking Using Color-Based Particle Filter and Contour InformationVictoria Rudakova, Sajib Kumar Saha, Faouzi Alaya Cheikh. 315-326 [doi]
- Automatic Adaptive Facial Feature Extraction Using CDF AnalysisSushil Kumar Paul, Saïda Bouakaz, Mohammad Shorif Uddin. 327-338 [doi]
- Digital Characters MachineJaume Duran Castells, Sergi Villagrasa Falip. 339-344 [doi]
- CREA: Defining Future Multiplatform Interaction on TV Shows through a User Experience StudyMarc Pifarré, Eva Villegas, David Fonseca. 345-354 [doi]
- Visual Interfaces and User Experience: Augmented Reality for Architectural Education: One Study Case and Work in ProgressErnest Redondo, Isidro Navarro, Albert Sánchez, David Fonseca. 355-367 [doi]
- Communications in Computer and Information Science: Using Marker Augmented Reality Technology for Spatial Space Understanding in Computer GraphicsMalinka Ivanova, Georgi Ivanov. 368-379 [doi]
- User Interface Plasticity for GroupwareSonia Mendoza, Dominique Decouchant, Gabriela Sánchez, José Rodríguez, Alfredo Piero Mateos Papis. 380-394 [doi]
- Mobile Phones in a Retirement Home: Strategic Tools for Mediated CommunicationMireia Fernández-Ardèvol. 395-406 [doi]
- Mobile Visualization of Architectural Projects: Quality and Emotional Evaluation Based on User ExperienceDavid Fonseca, Ernest Redondo, Isidro Navarro, Marc Pifarré, Eva Villegas. 407-416 [doi]
- Semi-Automatic Hand/Finger Tracker Initialization for Gesture-Based Human Computer InteractionDaniel Popa, Vasile Gui, Marius Otesteanu. 417-430 [doi]
- Security Evaluation for Graphical PasswordArash Habibi Lashkari, Azizah Abdul Manaf, Maslin Masrom, Salwani Mohd Daud. 431-444 [doi]
- A Wide Survey on BotnetArash Habibi Lashkari, Seyedeh Ghazal Ghalebandi, Mohammad Reza Moradhaseli. 445-454 [doi]
- Alternative DNA Security Using BioJavaMircea-Florin Vaida, Radu Terec, Lenuta Alboaie. 455-469 [doi]
- An Intelligent System for Decision Making in Firewall ForensicsHassina Bensefia, Nacira Ghoualmi. 470-484 [doi]
- Static Parsing SteganographyHikmat Farhat, Khalil Challita, Joseph Zalaket. 485-492 [doi]
- Dealing with Stateful Firewall CheckingNihel Ben Youssef, Adel Bouhoula. 493-507 [doi]
- A Novel Proof of Work Model Based on Pattern Matching to Prevent DoS AttackAli Ordi, Hamid Mousavi, Bharanidharan Shanmugam, Mohammad Reza Abbasy, Mohammad Reza Najaf Torkaman. 508-520 [doi]
- A New Approach of the Cryptographic AttacksOtilia Cangea, Gabriela Moise. 521-534 [doi]
- A Designated Verifier Proxy Signature Scheme with Fast Revocation without Random OraclesM. Beheshti-Atashgah, M. Gardeshi, M. Bayat. 535-550 [doi]
- Risk Assessment of Information Technology Projects Using Fuzzy Expert SystemSanaz Pourdarab, Hamid Eslami Nosratabadi, Ahmad Nadali. 563-576 [doi]
- Automatic Transmission Period Setting for Intermittent Periodic Transmission in Wireless BackhaulGuangri Jin, Li Gong, Hiroshi Furukawa. 577-592 [doi]
- Towards Fast and Reliable Communication in MANETsKhaled Day, Bassel R. Arafeh, Abderezak Touzene, Nasser Alzeidi. 593-602 [doi]
- Proactive Defense-Based Secure Localization Scheme in Wireless Sensor NetworksNabila Labraoui, Mourad Gueroui, Makhlouf Aliouat. 603-618 [doi]
- Decision Directed Channel Tracking for MIMO-Constant Envelope ModulationEhab Mahmoud Mohamed, Osamu Muta, Hiroshi Furukawa. 619-633 [doi]
- A New Backoff Algorithm of MAC Protocol to Improve TCP Protocol Performance in MANETSofiane Hamrioui, Mustapha Lalam. 634-648 [doi]
- A Link-Disjoint Interference-Aware Multi-Path Routing Protocol for Mobile Ad Hoc NetworkPhu Hung Le, Guy Pujolle. 649-661 [doi]
- Strategies to Carry and Forward Packets in VANETGianni Fenu, Marco Nitti. 662-674 [doi]
- Three Phase Technique for Intrusion Detection in Mobile Ad Hoc NetworkK. V. Arya, Prerna Vashistha, Vaibhav Gupta. 675-684 [doi]
- DFDM: Decentralized Fault Detection Mechanism to Improving Fault Management in Wireless Sensor NetworksShahram Babaie, Ali Ranjideh Rezaie, Saeed Rasouli Heikalabad. 685-692 [doi]
- RLMP: Reliable and Location Based Multi-Path Routing Algorithm for Wireless Sensor NetworksSaeed Rasouli Heikalabad, Naeim Rahmani, Farhad Nematy, Hossein Rasouli. 693-703 [doi]
- Contention Window Optimization for Distributed Coordination Function (DCF) to Improve Quality of Service at MAC LayerMaamar Sedrati, Azeddine Bilami, Ramdane Maamri, Mohamed Benmohamed. 704-713 [doi]
- A Novel Credit Union Model of Cloud ComputingDunren Che, Wen-Chi Hou. 714-727 [doi]
- A Trial Design of e-Healthcare Management Scheme with IC-Based Student ID Card, Automatic Health Examination System and Campus Information NetworkYoshiro Imai, Yukio Hori, Hiroshi Kamano, Tomomi Mori, Eiichi Miyazaki, Tadayoshi Takai. 728-740 [doi]
- Survey of Security Challenges in Grid EnvironmentUsman Ahmad Malik, Mureed Hussain, Mehnaz Hafeez, Sajjad Asghar. 741-752 [doi]
- Hybrid Wavelet-Fractal Image Coder Applied to Radiographic Images of Weld DefectsFaiza Mekhalfa, Daoud Berkani. 753-761 [doi]
- New Prediction Structure for Stereoscopic Video Coding Based on the H.264/AVC StandardSid Ahmed Fezza, Kamel Mohamed Faraoun. 762-769 [doi]
- Histogram Shifting as a Data Hiding Technique: An Overview of Recent DevelopmentsYasaman Zandi Mehran, Mona Nafari, Alireza Nafari, Nazanin Zandi Mehran. 770-786 [doi]
- New Data Hiding Method Based on Neighboring Correlation of Blocked ImageMona Nafari, Gholam Hossein Sheisi, Mansour Nejati Jahromi. 787-801 [doi]