Abstract is missing.
- Pixel domain and compressed domain image retrieval featuresGerald Schaefer. 1-3 [doi]
- Data mining in insurance claims (DMICS) two-way mining for extreme valuesSofia Aftab, Waseem Abbas, Muhammad Musa Bilal, Tauqir Hussain, Muhammad Shoaib, Syed Hamza Mehmood. 1-6 [doi]
- An introduction to content-based image retrievalGerald Schaefer. 4-6 [doi]
- Efficient processing of semi-stream dataM. Asif Naeem. 7-10 [doi]
- Analyzing the security techniques used in LTE Advanced and their evaluationIftikhar Rasheed, Asjad Amin, Mahwish Chaudhary, Sadaf Bukhari, Muhammad Rizwan, Kashif Ali. 11-13 [doi]
- Identity based email sender authentication for spam mitigationSufian Hameed, Tobias Kloht, Xiaoming Fu. 14-19 [doi]
- Secure DNS from amplification attack by using modified bloom filtersUzma Sattar, Talha Naqash, Muhammad Raheel Zafar, Kashif Razzaq, Faisal bin Ubaid. 20-23 [doi]
- Minimizing non-coordinated interference in multi-radio multi-channel Wireless Mesh Networks (MRMC-WMNs)Sadiq Shah, Hameed Hussain, Muhammad Shoaib. 24-28 [doi]
- Investigating the impact of group mobility models over the on-demand routing protocol in MANETsMuhammad Shoaib, Nasru Minallah, Sadiq Shah, Shahzad Rizwan, Hameed Hussain. 29-34 [doi]
- Applying authentication tests to discover Man-In-The-Middle attack in security protocolsShahabuddin Muhammad. 35-40 [doi]
- Secure multi-hop routing protocols in Wireless Sensor Networks: Requirements, challenges and solutionsNouman M. Durrani, Nadeem Kafi, Jawwad Shamsi, Waleej Haider, Asad M. Abbsi. 41-48 [doi]
- Exploiting cross-over distance to optimize energy in wireless sensor networksMuhammad Adeel, Zulfiqar Ali, Muhammad Saqib, Muhammad Tauseef, Muhammad Muaz. 49-54 [doi]
- A hybrid approach for preventing Black and Gray hole attacks in MANETHizbullah Khattak, Nizamuddin. 55-57 [doi]
- VANET thread based message trust modelAbdul Rehman, Asad Ali, Riaz ul Amin, Attique Shah. 58-60 [doi]
- Research review of development of novel routing algorithms for mobile Ad-hoc networksMuhammad Asif Khan, Sahibzada Zakiuddin. 61-66 [doi]
- Robust image watermarking in contourlet domain using multi objective genetic algorithmM. Mubeen, S. A. M. Gilani, K. Zafar. 67-72 [doi]
- Secure and privacy enhanced email system as a cloud serviceAmna Joyia, Abdul Ghafoor, Maryam Sajjad, Muhammad Qaisar Choudhary. 73-78 [doi]
- Publishing institutional repositories metadata on the semantic webHumaira Fari, Sharifullah Khan, Muhammad Younus Javed. 79-84 [doi]
- Keyword and form based semantic search tools and their usabilityAqeel Haider, Arif Raza. 85-89 [doi]
- Ontology for feature based selection of web development toolsNeelam Mukhtar, Sara Shahzad, Mohammad Abid Khan, Shah Nazir. 90-95 [doi]
- A declarative Web services composition frameworkMohsen Rouached. 96-101 [doi]
- A goal oriented approach for Web services selection and compositionSana Baccar, Mohsen Rouached, Mohamed Abid. 102-107 [doi]
- Data analysis, quality indexing and prediction of water quality for the management of rawal watershed in PakistanMaqbool Ali, Ali Mustafa Qamar. 108-113 [doi]
- The tecnological business intelligence capabilities and business intelligence system flexibility - The underlying relationshipSergey Kokin, Tienan Wang. 114-118 [doi]
- A robust join operator to process streaming data in real-time data warehousingM. Asif Naeem. 119-124 [doi]
- Telecommunication subscribers' churn prediction model using machine learningSaad Ahmed Qureshi, Ammar Saleem Rehman, Ali Mustafa Qamar, Aatif Kamal, Ahsan Rehman. 131-136 [doi]
- Customer segmentation and analysis of a mobile telecommunication company of Pakistan using two phase clustering algorithmSalar Masood, Moaz Ali, Faryal Arshad, Ali Mustafa Qamar, Aatif Kamal, Ahsan Rehman. 137-142 [doi]
- Handwritten digit recognition through wavelet decomposition and wavelet packet decompositionMuhammad Suhail Akhtar, Hammad Qureshi. 143-148 [doi]
- Application of machine vision for performance enhancement of footing machine used in leather industry of PakistanUmar Farooq, Muhammad Usman Asad, Faiqa Rafiq, Ghulam Abbas, Athar Hanif. 149-154 [doi]
- Assessment of capacity and performance of decentralized EMIS activities in developing countriesSajjad Ahmad Bhatti, Asim Riaz Mohammad Ali, Khawaja Muhammad Saqib, Awais Adnan. 155-160 [doi]
- Adaptive relay selection technique for cooperative network over Nakagami fading channelsSadia Jabeen Siddiqi, Ammara Humayun, Humaira Rehman, Imran Khan, Sadaqat Jan. 161-65 [doi]
- Performance of double threshold energy detection in cooperative-cognitive networks over Nakagami fading channelsAnsar Ul-Haq, Mian Bilal Ayub, Junaid Iqbal, Nagina Zarin, Sajjad Ali, Imran Khan. 166-169 [doi]
- Reliable communication protocol for inter-vehicular networkYasir Malik, Stefan D. Bruda, Bessam Abdulrazak, Usman Tariq. 170-174 [doi]
- User support approche for "Global Users Support Standardization and Establishment Organization (GUSSEO)"Muhammad Shah, Attique Shah, Aftab Ahmed, Abdul Rehman. 175-181 [doi]
- Analyzing impact of video codec, encapsulation methods and streaming protocols on the quality of video streamingAfaq Iqbal, Fahim Arif, Nasru Minallah. 182-186 [doi]
- Design and implementation of a two wheel self balancing robot with a two level adaptive controlAmmar Wasif, Danish Raza, Waqas Rasheed, Zubair Farooq, Syed Qaseem Ali. 187-193 [doi]
- Teeter-totter in testingRafaqut Kazmi, Rao Muhammad Afzal, Imran Sarwar Bajwa. 194-198 [doi]
- A neural network controller for Cartesian PlotterUmar Farooq, Faiqa Rafiq, Muhammad Amar, Ghulam Abbas, Muhammad Usman Asad. 199-205 [doi]
- Brain emotional learning based fuzzy inference system (Modified using radial basis function)Mahboobeh Parsapoor, Urban Bilstrup. 206-211 [doi]
- Automatic event recognition and annotation in business requirement specificationsSofia Tahir, Imran Sarwar Bajwa. 212-216 [doi]
- Scope resolution of logical connectives in NL constraintsShahzad Akbar, Imran Sarwar Bajwa, Saleem Malik. 217-222 [doi]
- Named entity recognition and normalization in tweets towards text summarizationSaima Jabeen, Sajid Shah, Asma Latif. 223-227 [doi]
- Representing history in graph-oriented NoSQL databases: A versioning systemArnaud Castelltort, Anne Laurent. 228-234 [doi]
- Bibliomining on North South University library dataIftekhar Azam, Saniat Javid Sohrawardi, Himadree Shekhar Das, Md. Samsul Alam, Md. Saffan Alvy, Rashedur M. Rahman. 235-240 [doi]
- Genetic programming based degree constrained spanning tree extractionZaheer Babar, Muhammad Waqas, Zahid Halim, Muhammad Arshad Islam. 241-246 [doi]
- Application of Adaptive Neuro-Fuzzy Inference System for dam inflow prediction using long-range weather forecastJehangir Ashraf Awan, Deg-hyo Bae. 247-251 [doi]
- Bangla printed word recognition using histogram based approach and fuzzy logicAnoti Deyala, Putul Saha, Rashedur M. Rahman. 252-255 [doi]
- EPlag: A two layer source code plagiarism detection systemOmer Ajmal, M. M. Saad Missen, Tazeen Hashmat, M. Moosa, Tenvir Ali. 256-261 [doi]
- Secure automotive telematics system (SATS)Imran Jattala, Shakeel Durrani, Junaid Farooqi, Ghalib Junjua, Ambreen Shafique, Faisal Hussian, Hassan Mahmood, Nassar Ikram. 262-267 [doi]
- Speeding up SOR solvers for constraint-based GUIs with a warm-start strategyNoreen Jamil, Johannes Müller, Christof Lutteroth, Gerald Weber. 268-273 [doi]
- Cyclomatic complexity: The nesting problemMir Muhammad Suleman Sarwar, Sara Shahzad, Ibrar Ahmad. 274-279 [doi]
- Quadratic optimization for user interface layoutNoreen Jamil. 280-285 [doi]
- A weighted matrix algorithm for vision based lane following in autonomous navigationUmar Farooq, Jason Gu, Muhammad Amar, Muhammad Usman Asad, Faiqa Rafiq. 286-293 [doi]
- Blue eyes technologyMizna Rehman Mizna, Mamta Bachani, Sundas Memon. 294-298 [doi]
- A survey of automatic lip reading approachesWaqqas ur Rehman Butt, Luca Lombardi. 299-302 [doi]
- Subband configuration of adaptive synthesis filter banks for image compressionAbdul Nadeem, Yangyu Fan. 303-307 [doi]
- Towards decision support model for ubiquitous agricultureWaleej Haider, Aqeel-ur-Rehman, Nouman M. Durrani. 308-313 [doi]
- Prediction of minerals in rock images using Markov logicJuvaria Tahseen, Imran Sarwar Bajwa, M. Asghar Hashmi. 314-319 [doi]
- A Web service based integration model of data-providing sourcesMehedi Masud, Mohsen Rouached. 320-325 [doi]
- Personal integrated process based software architecture design and evalutationWaqar Ul-Hasnain Khokhar. 326-331 [doi]
- An efficient and secure mobile phone voting systemMohib Ullah, Arif Iqbal Umar, Noor Ul Amin, Nizamuddin. 332-336 [doi]
- Extending HTML5 local storage to save more data; efficiently and in more structured waySyed Zagham Naseem, Fiaz Majeed. 337-340 [doi]
- A study on trends of mobile application usage and their distribution methods in PakistanHina Habib, Muhammad Ateeq, Imran Sarwar Bajwa. 341-345 [doi]
- Official digital currencyM. Shoaib, M. Ilyas, M. Sikandar Hayat Khiyal. 346-352 [doi]
- Mood-based e-commerce: A new approach for sub-personality-based marketingToshihiko Yamakami. 353-357 [doi]
- Servicenics approach: A social service engineering frameworkToshihiko Yamakami. 358-362 [doi]
- (2n-1)-point binary approximating schemeGhulam Mustafa, Abdul-Ghaffar, Mehwish Bari. 363-368 [doi]
- Data warehouse enhancement manipulating materialized view hierarchySajid Ullah Khan. 369-372 [doi]
- A data mining based spam detection system for YouTubeRashid Chowdury, Md. Nuruddin Monsur Adnan, G. A. N. Mahmud, Rashedur M. Rahman. 373-378 [doi]
- Web Application fact extractor (WAFE)Imran Zahoor, Onaiza Maqbool, Rashid Naseem. 379-384 [doi]
- Load balancing through task shifting and task splitting strategies in multi-core environmentHameed Hussain, Muhammad Shoaib, Muhammad Bilal Qureshi, Sadiq Shah. 385-390 [doi]
- Maintenance support in open source software projectsArif Raza, Luiz Fernando Capretz, Faheem Ahmed. 391-395 [doi]
- Open innovation - A phased adoption model and its application to German SMEsMatthias Birkle, Heiko Gewald. 396-401 [doi]