Abstract is missing.
- KeynoteZygmunt J. Haas. 6 [doi]
- PrefaceRidha Khédri, Karim Djouani. 7-8 [doi]
- Adaptive Green Routing Mechanism over Optical NetworksYashar Fazili, Alireza Nafarieh, William Robertson. 9-17 [doi]
- Personalized Security Approaches in E-banking Employing Flask Architecture over Cloud EnvironmentNayer A. Hamidi, G. K. Mahdi Rahimi, Alireza Nafarieh, Ali Hamidi, Bill Robertson. 18-24 [doi]
- Dynamic Inter-domain Negotiation for Green Algorithms in Optical NetworksAlireza Nafarieh, Yashar Fazili, William Robertson. 25-32 [doi]
- Analysis of Lightpath Re-provisioning in Green Optical NetworksAlireza Nafarieh, Yashar Fazili, William Robertson. 33-39 [doi]
- An Optimal Energy Efficient and Minimum Delay Scheduling for Periodic WSN ApplicationsTayseer Alkhdour, Elhadi Shakshuki, Shokri Z. Selim, Uthman Baroudi. 40-49 [doi]
- An Algebraic Approach Towards Data CleaningRidha Khédri, Fei Chiang, Khair Eddin Sabri. 50-59 [doi]
- OBAME: Optimized Bio-inspired Algorithm to Maximize Search Efficiency in P2P DatabasesHeba A. Kurid, Thanaa S. Alnusairi, Hajar S. Almujahed. 60-67 [doi]
- Data Programming for Non-programmersDave Mason. 68-74 [doi]
- A New Data Mining System for Ontology Learning Using Dynamic Time Warping Alignment as a CaseChoukri Djellali. 75-82 [doi]
- Centralized Micro-clouds: An Infrastructure for Service Distribution in Collaborative Smart DevicesEleana Asimakopoulou, Stelios Sotiriadis, Nik Bessis, Ciprian Dobre, Valentin Cristea. 83-90 [doi]
- Authentication Systems Using ID Cards over NFC Links: The Spanish Experience Using DNIeJ. M. Leon-Coca, D. G. Reina, Sergio L. Toral Marín, Federico Barrero, Nik Bessis. 91-98 [doi]
- Performance Evaluation of Interoperable Micro-cloudsStelios Sotiriadis, Eleana Asimakopoulou, Nik Bessis, Florin Pop, Valentin Cristea. 99-106 [doi]
- An Autonomic Agent Trust Model for IoT systemsX. Xu, Nik Bessis, J. Cao. 107-113 [doi]
- The Talking Museum ProjectFlora Amato, Angelo Chianese, Antonino Mazzeo, Vincenzo Moscato, Antonio Picariello, Francesco Piccialli. 114-121 [doi]
- Guidelines for Internet of Things Deployment Approaches - The Thing CommandmentsEdewede Oriwoh, Paul Sant, Gregory Epiphaniou. 122-131 [doi]
- Interaction System based on Internet of Things as Support for EducationJorge Gómez, Juan F. Huete, Oscar Hoyos, Luis Perez, Daniela Grigori. 132-139 [doi]
- Usage-pattern based Statistical Web Testing and Reliability MeasurementChao Chen, Yihai Chen, Huaikou Miao, Hao Wang. 140-147 [doi]
- Modeling and Simulation Agent-based of Natural Disaster Complex SystemsKaram Mustapha, Hamid Mcheick, Sehl Mellouli. 148-155 [doi]
- A Higher-order Agent Model for Ambient SystemsA.-C. Chaouche, A. El Fallah-Seghrouchni, Jean-Michel Ilié, Djamel-Eddine Saïdouni. 156-163 [doi]
- A Negotiation Protocol for Meeting Scheduling AgentS. M. Mozammal Hossain, Elhadi Shakshuki. 164-173 [doi]
- Electroencephalograms for Ubiquitous Robotic SystemsDavid Swords, Anara Sandygulova, Sameh Abdalla, Gregory M. P. O'Hare. 174-182 [doi]
- Regenerating Code based Secure Distributed Storage for Wireless Sensor NetworksJun Wu, Mianxiong Dong, Kaoru Ota, Zhenyu Zhou. 183-190 [doi]
- A Reliable A-MSDU Frame Aggregation Scheme in 802.11n Wireless NetworksAnwar Saif, Mohamed Othman. 191-198 [doi]
- An Enhanced Energy Saving Approach for WSNsTarek Sheltami. 199-206 [doi]
- A Distributed Compressive Sensing Technique for Data Gathering in Wireless Sensor NetworksAlireza Masoum, Nirvana Meratnia, Paul J. M. Havinga. 207-216 [doi]
- RH-mote for Next-generation Wireless Sensor NetworksAli Elkateeb. 217-224 [doi]
- Integrated Development Environment for Debugging Policy-based Applications in Wireless Sensor NetworksNidal Qwasmi, Daniel Smullen, Ramiro Liscano. 225-233 [doi]
- Redundancy and Criticality based Scheduling in Wireless Video Sensor Networks for Monitoring Critical AreasAli Benzerbadj, Kechar Bouabdellah. 234-241 [doi]
- MobileCA: Accumulative Secure Group Association with a Certification PathOyuntungalag Chagnaadorj, Jiro Tanaka. 242-249 [doi]
- Stack Memory Buffer Overflow Protection based on Duplication and RandomizationSahel Alouneh, Mazen Kharbutli, Rana AlQurem. 250-256 [doi]
- Correct by Construction Security Approach to Design Fault Tolerant Smart Homes for Disabled PeopleSébastien Guillet, Bruno Bouchard, Abdenour Bouzouane. 257-264 [doi]
- Centralized Management of Scalable Cyber Foraging SystemsManjinder Nir, Ashraf Matrawy. 265-273 [doi]
- Improving Adaptation Rules Quality Using Genetic ProgrammingMakram Soui, Asma Abdelbaki, Marouane Kessentini, Khaled Ghédira. 274-281 [doi]
- Design of a Social Collaboration and Precise Localization Services for the Blind and Visually ImpairedMohammed Elbes, Ala I. Al-Fuqaha. 282-291 [doi]
- PrefaceJanet Light, Mohyuddin. 292-294 [doi]
- Analyzing the Impact of UMLS Relations on Word-sense Disambiguation AccuracyWessam Gad El Rab, Osmar R. Zaïane, Mohammad El-Hajj. 295-301 [doi]
- Transparent Digital Watermark on Drug's ImagesChaiwoot Seetha, Suthida Goollawattanaporn, Chularat Tanprasert. 302-309 [doi]
- Apnea Detection based on Respiratory Signal ClassificationLaiali Almazaydeh, Khaled Elleithy, Miad Faezipour, Ahmad Abushakra. 310-316 [doi]
- A User-friendly Tool for Model Checking Healthcare WorkflowsAdrian Rutle, Fazle Rabbi, Wendy MacCaull, Yngve Lamo. 317-326 [doi]
- Towards Intelligent Personal Health Record Systems: Review, Criteria and ExtensionsIrini Genitsaridi, Haridimos Kondylakis, Lefteris Koumakis, Kostas Marias, Manolis Tsiknakis. 327-334 [doi]
- Barriers to Health Information Systems and Electronic Medical Records Implementation. A Field Study of Saudi Arabian HospitalsMohamed Khalifa. 335-342 [doi]
- Personal Health Service FrameworkShirin Ghorbani, Weichang Du. 343-350 [doi]
- The Future of Mobile E-health Application Development: Exploring HTML5 for Context-aware Diabetes MonitoringDavy Preuveneers, Yolande Berbers, Wouter Joosen. 351-359 [doi]
- Tennis Racket Customization for Supporting RehabilitationThitipong Tanprasert, Chularat Tanprasert. 360-367 [doi]
- Identification Protocols based on Discrete Log Representation ProblemMohamed Rasslan, Mahmoud Nasreldin. 368-373 [doi]
- Security Techniques for Counteracting Attacks in Mobile Healthcare ServicesUdaya Kiran Tupakula, Vijay Varadharajan. 374-381 [doi]
- Towards a Context-Aware Biofeedback Activity Recommendation Mobile Application for Healthy LifestyleHawazin Badawi, Abdulmotaleb El-Saddik. 382-389 [doi]
- Context-based and Rule-based Adaptation of Mobile User Interfaces in mHealthReem Al-Nanih, Olga Ormandjieva, T. Radhakrishnan. 390-397 [doi]
- Proceed with Caution: Transition from Paper to Computerized Pain Body MapsEllen A. A. Jaatun, Dagny F. Haugen, Yngve Dahl, Anders Kofod-Petersen. 398-406 [doi]
- A Feasibility Study Scheme of an Android-based Integrated Wearable ECG Monitoring SystemArini Widhiasi, Rosnah Idrus, Muhammad Fermi Pasha, Mohammad Syukur. 407-414 [doi]
- PrefaceZahoor Ali Khan, Nadeem Javaid. 415 [doi]
- Enhancing Collection Tree Protocol for Mobile Wireless Sensor NetworksDixit Sharma, Ramiro Liscano, Shahram Shah-Heydari. 416-423 [doi]
- Feasibility Study of Direct Communication in Wireless Sensor NetworksIttipong Khemapech. 424-429 [doi]
- Detecting Primary User Emulation Attacks in Cognitive Radio Networks via Physical Layer Network CodingXiongwei Xie, Weichao Wang. 430-435 [doi]
- The Effects of Interference on Video Quality Over Wireless Sensor NetworksHouda Zeghilet, Yacine Baziz, Moufida Maimour, Kechar Bouabdellah, Nadjib Badache. 436-441 [doi]
- Smart, Autonomous and Reliable Internet of ThingsDimosthenis Kyriazis, Theodora A. Varvarigou. 442-448 [doi]
- AID: An Energy Efficient Decoding Scheme for LDPC Codes in Wireless Body Area Sensor NetworksNadeem Javaid, Obaid Ur Rehman, N. Alrajeh, Z. A. Khan, Basit Manzoor, S. Ahmed. 449-454 [doi]
- A Trust-based Probabilistic Coverage Algorithm for Wireless Sensor NetworksZahra Taghikhaki, Nirvana Meratnia, Paul J. M. Havinga. 455-464 [doi]
- Methods for Using Intrusion Logs to Establish Criminal Evidence Against IntrudersNehinbe Ojo Joshua, Nehibe Johnson Ige. 465-470 [doi]
- PrefaceTarek R. Sheltami. 471 [doi]
- Selective Power Aware Data Management Approach for Wireless Sensor NetworksHazem Morsy, Hesham El-Rewini. 472-478 [doi]
- Satellite Monitoring of Wireless Sensor Networks (WSNs)Farrukh Shahzad. 479-484 [doi]
- Z-MAC: Performance Evaluation and EnhancementsShoieb Arshad, Azzat Al-Sadi, Abdulaziz Barnawi. 485-490 [doi]
- Wireless Sensor Networks for Leakage Detection in Underground Pipelines: A Survey PaperTariq Al-Kadi, Ziyad Al-Tuwaijri, Abdullah Al-Omran. 491-498 [doi]
- Hardware Design and Software Simulation for Four Classical CryptosystemsQasem Abu Al-Haija, Hanan Al-Mubarak, Abdulla Al-Humam. 500-505 [doi]
- An 8-bit Scientific Calculator based Intel 8086 Virtual Machine EmulatorQasem Abu Al-Haija, Saleh Al-Abdulatif, Mohaned Al-Ghofaily. 506-511 [doi]
- An Engineering Design of 4-bit Special Purpose Microprogrammed ProcessorQasem Abu Al-Haija, Hasan Al-Amri, Mohamed Al-Nashri, Sultan Al-Muhaisen. 512-516 [doi]
- Case Study: Monitoring of AIR Quality in King Faisal University Using a Microcontroller and WSNQasem Abu Al-Haija, Hasan Al-Qadeeb, Abdulmohsen Al-Lwaimi. 517-521 [doi]
- Arduino Wi-Fi Network AnalyzerTariq Al-Kadi, Ziyad Al-Tuwaijri, Abdullah Al-Omran. 522-529 [doi]