Abstract is missing.
- Evaluating Contact-Ignorant and History-Based Routing Protocols of Disrupted Mobile NetworksMah-Rukh Fida, Tabinda Salam, Ameer Shakayb Arsalaan. 1-8 [doi]
- Fully Distributed Cooperative Spectrum Sensing for Cognitive Radio Ad Hoc NetworksWaleed Ejaz, Najam Ul Hasan, Hyung Seok Kim, Muhammad Awais Azam. 9-13 [doi]
- A Delay-Scheduler Coupled Game Theoretic Resource Allocation Scheme for LTE NetworksSalman Ali, Muhammad Zeeshan. 14-19 [doi]
- On Robust Approaches to the Semidefinite Relaxation DetectorJaffer Ali, Hafiz Muhammad Tariq, Muhammad T. N. Qaisrani. 20-24 [doi]
- Assessment and Support for Software Capstone Projects at the Undergraduate Level: A Survey and RubricsEhsan Ahmad, Bilal Raza, Robert Feldt. 25-32 [doi]
- SBVR2UML: A Challenging TransformationHina Afreen, Imran Sarwar Bajwa, Behzad Bordbar. 33-38 [doi]
- A Systematic Review on Software Measurement ProgramsTahir Touseef, Jafar Ali. 39-44 [doi]
- Factors Influencing Adoption of Information Technology Based Banking Services: A Case Study of PakistanAzim Malia, Ali Adil, Sattar Jahanzeb. 45-50 [doi]
- An Application of Markov Jump Process Model for Activity-Based Indoor Mobility Prediction in Wireless NetworksJoanna Kolodziej, Samee Ullah Khan, Lizhe Wang, Nasro Min-Allah, Sajjad Ahmad Madani, Nasir Ghani, Hongxiang Li. 51-56 [doi]
- Network Performance Optimization: A Case Study of Enterprise Network Simulated in OPNETMunam Ali Shah, Ghazanfar Ali Safdar, Carsten Maple, Khurram Sardar. 57-62 [doi]
- Evolution of Orthogonal Frequency Division Multiplexing Modulation to Discrete Wavelet MultitoneTabassum Nawaz Bajwa, Arsla Khan, Sobia Baig. 63-68 [doi]
- The Pervasive Nature of Variability in SOCAteeq Khan, Christian Kästner, Veit Köppen, Gunter Saake. 69-74 [doi]
- Detect HTTP Specification Attacks Using OntologyRana Faisal Munir, Nabeel Ahmed, Hafiz Abdul Razzaq, Ali Hur, Hafiz Farooq Ahmad. 75-78 [doi]
- Polymorphic Circuit Design for Speedy Handwritten Character Recognition Using Cartesian Genetic ProgrammingAbdul Rehman, Gul Muhammad Khan. 79-84 [doi]
- Palm Print Recognition Using Oriented Hausdorff Distance TransformMianMahmood Ali, Mubeen Ghafoor, Imtiaz A. Taj, Khizar Hayat. 85-88 [doi]
- Efficient Image Retrieval Based on Quantized Histogram Texture Features in DCT DomainFazal-e-Malik, Baharum Baharudin, Kifayat Ullah. 89-94 [doi]
- A Survey on Sign Language RecognitionSumaira Kausar, M. Younus Javed. 95-98 [doi]
- Operating System-Aware Cache Optimization Techniques for Multi Core ProcessorsHasina Khatoon, Shahid H. Mirza, Talat Altaf. 99-105 [doi]
- Architecture and Implementation of Modular Airthmetic Unit for SOCMohammad Hammad Ahmad, Syed Wasi Alam, Irum Baig. 106-109 [doi]
- Digital Forensics for EucalyptusZafarullah, Faiza Anwar, Zahid Anwar. 110-116 [doi]
- DOFUR: DDoS Forensics Using MapReduceRana Khattak, Shehar Bano, Shujaat Hussain, Zahid Anwar. 117-120 [doi]
- Texture Analysis for Liver Segmentation and Classification: A SurveySaima Rathore, Muhammad Aksam Iftikhar, Mutawarra Hussain, Abdul Jalil. 121-126 [doi]
- Medical Image Segmentation Using H-minima Transform and Region Merging TechniqueKamran Ali, Abdul Jalil, M. Umair Gull, Mustansar Fiaz. 127-132 [doi]
- Updating Farmland Satellite Imagery Using High Resolution Aerial ImagesSajid Saleem, Abdul Bais, Yahya M. Khawaja. 133-136 [doi]
- Vision Based Intelligent Traffic Management SystemMuhammad Hassam Malhi, Muhammad Hassan Aslam, Faisal Saeed, Owais Javed, Muhammad Fraz. 137-141 [doi]
- SWAM: Stuxnet Worm Analysis in MetasploitRahat Masood, Um-e-Ghazia, Zahid Anwar. 142-147 [doi]
- Enhancing Stealthiness & Efficiency of Android Trojans and Defense Possibilities (EnSEAD) - Android's Malware Attack, Stealthiness and Defense: An ImprovementMohammad Ali, Humayun Ali, Zahid Anwar. 148-153 [doi]
- Optimizing Predictive Prefetching in Multi-client Single-Server EnvironmentNaveed Ahmad, Azam Khan, Faiza Bibi. 154-160 [doi]
- A Study to Examine If Integration of Technology Acceptance Model's (TAM) Features Help in Building a Hybrid Digital Business Ecosystem Framework for Small and Medium Enterprises (SMEs)Muhammad Abdul Tawab Khalil, P. D. D. Dominic, Hassan B. Kazemian, Usman Habib. 161-166 [doi]
- Implementation of a Novel Microcontroller-Based Voltage Source Sine-Wave InverterMuhammad Usman Rafique, Saad Aslam, Jahanzeb Anwer. 167-172 [doi]
- Analysis of Fast Parallel Sorting Algorithms for GPU Architectures'Fiaz Gul Khan, Omar Usman Khan, Bartolomeo Montrucchio, Paolo Giaccone. 173-178 [doi]
- Kalman Filter Based State Estimation for Linearized Twin Rotor SystemKhawaja Shafiq Haider, Ijaz Hussain Kazmi, M. Inam-ur Rehman. 179-182 [doi]
- Real-Time Control of an Inverted Pendulum: A Comparative StudyMuhammad Hamza, Zaka-ur-Rehman, Qamar Zahid, Furqan Tahir, Zulfiqar Khalid. 183-188 [doi]
- High Throughput Hardware Implementation of Secure Hash Algorithm (SHA-3) Finalist: BLAKEKashif Latif, Athar Mahboob, Arshad Aziz. 189-194 [doi]
- Improving Generation in Machine Translation by Separating Syntactic and Morphological ProcessesNayyara Karamat, Muhammad Kamran Malik, Sarmad Hussain. 195-200 [doi]
- A Novel Key-Based Transposition Scheme for Text EncryptionSidra Malik. 201-205 [doi]
- Dynamic Collaborations for Information Sharing within and across Virtual TeamsAhmad Kamran Malik, Schahram Dustdar. 206-211 [doi]
- Understandablity of Concrete versus Parametric Test CasesTahir Touseef, Jafar Ali, Maharajan Mohan. 212-217 [doi]
- Using Component-Oriented Process Models for Multi-metamodel ApplicationsFahad R. Golra, Fabien Dagnat. 218-223 [doi]
- Quantifying Non-functional Requirements in Service Oriented DevelopmentJawaria Sadiq, Athar Mohsin, Fahim Arif. 224-229 [doi]
- Particle Swarm Optimization Based Methodology for Solving Network Selection Problem in Cognitive Radio NetworksNajam Ul Hasan, Waleed Ejaz, Hyung Seok Kim, Jae-Hun Kim. 230-234 [doi]
- Clock Frequency Offset Correction through Computationally Simple AlgorithmsQasim M. Chaudhari. 235-237 [doi]
- Reflection Considerations in Seeded DWDM Transmission LinksSyed Aun Abbas, Hee-Yeal Rhy, ChangHee Lee, Bongsoo Kim, Jun-Young Kim. 238-241 [doi]
- Computer-Based Simulation of Multiphase FlowAbdullah Shah. 242-246 [doi]
- Secure Solution to Data Transfer from Sensor Node to Sink against Aggregator CompromisesSarfraz Azam, Rizwana Manzoor, Mata ur Rehman. 247-252 [doi]
- Turbo-Coded HARQ with Switchable Relaying Mechanism in Single Hop Cooperative Wireless SystemIbrahim Khalil, Adnan Ahmed Khan, Zohaib-Ur-Rehman. 253-257 [doi]
- Iterative Common Phase Error Correction in OFDM SystemsAsma Bibi, Aizaz Ali Shah, Shahid Khattak. 258-262 [doi]
- MCDM Method and Semantics Integration for Unified Communication Management and ControlSajjad Ali Musthaq, Christophe Lohr, Annie Gravey. 263-269 [doi]
- Efficient Gender Classification Using Interlaced Derivative Pattern and Principal Component AnalysisSajid Ali Khan, M. Nazir, Usman Asghar, Naveed Riaz Ansari. 270-274 [doi]
- Gradient Adjusted Predictor with Pseudo-Distance Technique for Lossless Compression of Color-Mapped ImagesBasar Koc, Ziya Arnavut. 275-280 [doi]
- Lossless Data Hiding Using Optimized Interpolation Error ExpansionTalat Naheed, Imran Usman, Amir Hanif Dar. 281-286 [doi]
- Browsed-Back Post Event AnalyzerAhmad Ali, Ilyas Butt, Asifullah Khan. 287-290 [doi]
- Investigating Integration Challenges and Solutions in Global Software DevelopmentAtique Zafar, Sajad Ali, Raja Khurram Shahzad. 291-297 [doi]
- Automated Change Request Triage Using Alpha Frequency MatrixSana Nasim, Saad Razzaq, Javed Ferzund. 298-302 [doi]
- Fuel Nozzle Spray Pattern ClassifierMubeen Ghafoor, Usama Ijaz Bajwa, Imtiaz A. Taj. 303-307 [doi]
- Trusted Framework for Health Information ExchangeMuhammad Afzal, Maqbool Hussain, Mahmood Ahmad, Zahid Anwar. 308-313 [doi]
- Online UPnP A/V Device Database for Quick and Easy Capability CheckingAndreas Riener, Martin Gutenbrunner. 314-320 [doi]
- Development of an Optical Sensor for the Detection of Volatile Organic CompoundsUsman Masud, Muhammad Iram Baig. 321-326 [doi]