Abstract is missing.
- Mobile Government in Action at Local Councils: A Case StudyShadi Al-Khamayseh, Elaine Lawrence. 1-7 [doi]
- Intelligent e-Tools for Wound Image Understanding and EvaluationAugustin Prodan, Madalina Rusu, Cornelia Revnic, Remus Câmpean, Paulina Mitrea, Rodica Prodan. 8-13 [doi]
- ICT for Good: Opportunities, Challenges and the Way ForwardBirhanu Eshete, Andrea Mattioli, Adolfo Villafiorita, Komminist Weldemariam. 14-19 [doi]
- Combining Biometric ID Cards and Online Credit Card TransactionsMuhammet Yildiz, Mehmet Gokturk. 20-24 [doi]
- The Future of the Internet: Tussles and Challenges in the Evolution Path as IdentifiedBorka Jerman-Blazic. 25-30 [doi]
- Electronic Voting Using Identity Based CryptographyGina Gallegos-Garcia, Roberto Gómez Cárdenas, Gonzalo I. Duchen-Sanchez. 31-36 [doi]
- The All-In Publication PolicyChristoph Bartneck. 37-40 [doi]
- Improving the Acknowledgment Handling of SCTPIrene Rüngeler, Michael Tüxen, Erwin P. Rathgeb. 41-46 [doi]
- Service Discovery in Future Open Mobile EnvironmentsNor Shahniza Kamal Bashah, Ivar Jørstad, Do Van Thanh. 47-53 [doi]
- A New Paradigm of CAC Dimensioning for VoIP Traffic over Wireless Access NetworksKiril Kassev, Yakim Mihov, Adriana Kalaydzhieva, Boris Tsankov. 54-59 [doi]
- A Study of Time between Retried Calls in Voice over Internet Protocol NetworksZoltan Gaspar, Izabella Gocza. 60-65 [doi]
- An Efficient DSP Implantation of Wavelet Audio Coding for Digital CommunicationGaoyong Luo. 66-71 [doi]
- A Modular UPnP Proxy for Secure Remote AccessTobias Wegner. 72-77 [doi]
- Scheduling and Channel Assignment of Backhaul Traffic in Infrastructure Wireless Mesh Networks with Near-Minimal Delay and JitterT. H. Szymanski. 78-85 [doi]
- A Crawler for Local SearchPedro Huitema, Perry Fizzano. 86-91 [doi]
- Reserving Clinical Resources for Healthcare ProcessesJuha Puustjärvi, Leena Puustjärvi. 92-97 [doi]
- Inernet Tool for Electronic Circuit AnalysisJaroslav Kadlec, Lukas Popelka, Radek Kuchta, Radimir Vrba. 98-101 [doi]
- The Future of Online Distance Education (ODE) in Public Universities in Quebec, CanadaBastien Sasseville. 102-105 [doi]
- How to Summarize an OWL Domain OntologyChristian Kop. 106-111 [doi]
- The Metric Model for Personal Information DisclosureRyosuke Yasui, Atsushi Kanai, Takashi Hatashima, Keiichi Hirota. 112-117 [doi]
- Evaluation of WS-* Standards Based Interoperability of SOA Products for the Hungarian e-Government InfrastructureBalazs Simon, Zoltán László, Balázs Goldschmidt, Károly Kondorosi, Peter Risztics. 118-123 [doi]
- Detecting Opinion Leaders and Trends in Online CommunitiesFreimut Bodendorf, Carolin Kaiser. 124-129 [doi]
- Aiding Social Interaction via a Mobile Peer to Peer NetworkSoulakshmee D. Nagowah. 130-135 [doi]
- Relationship between Mobile Switching Center Information and Social Behavior in Week Days and Holidays in a Telecommunication AreaRasim Aguliyev, Yadigar Imamverdiyev, Hamid Zargari, Saeid Bairami. 136-138 [doi]
- Public Internet Portal for Primary and High SchoolsRadek Kuchta, Jaroslav Kadlec, Radimir Vrba. 139-143 [doi]
- Towards a Virtual Organisation for Computational IntelligenceWajeeha Khalil, Erich Schikuta. 144-149 [doi]
- Proposing a Federated Approach to Global Software DevelopmentOzgur Tufekci, Semih Cetin, Ali Arifoglu. 150-157 [doi]
- Information Communication Technologies Role in Extended and Dynamics ClusteringRimantas Gatautis, Elena Vitkauskaite, Takis Damaskopolous. 158-163 [doi]
- Towards Learning Domain Ontology from Legacy DocumentsYijian Wu, Shaolei Zhang, Wenyun Zhao. 164-171 [doi]
- Detecting Return-to-libc Buffer Overflow Attacks Using Network Intrusion Detection SystemsDavid J. Day, Zhengxu Zhao, Minhua Ma. 172-177 [doi]
- Is McAfee SecurityCenter/Firewall Software Providing Complete Security for Your Computer?Sirisha Surisetty, Sanjeev Kumar. 178-181 [doi]
- Confidentiality Labeling Using Structured Data TypesAljosa Jerman-Blazic, Svetlana Saljic. 182-187 [doi]
- Performance of Windows XP, Windows Vista and Apple s Leopard Computers under a Denial of Service AttackRaja Sekhar Reddy Gade, Hari Vellalacheruvu, Sanjeev Kumar. 188-191 [doi]
- A Web Client Authentication System Using Smart Card for e-Systems: Initial Testing and EvaluationShadi Aljawarneh, Maher Dababneh, Hiba Hosseny, Eklass Alwadi. 192-197 [doi]
- Children s Information Technology (IT) Use and Their Physical, Cognitive, Social and Psychological Well-BeingLinda A. Jackson, Edward A. Witt, Alexander von Eye, Hiram E. Fitzgerald, Yong Zhao. 198-203 [doi]
- Body Sensor Networks for Mobile Health Monitoring: Experience in Europe and AustraliaVal Jones, Valérie Gay, Peter Leijdekkers. 204-209 [doi]
- Context Information Refinement for Pervasive Medical SystemsDawit Bekele, Birhanu Eshete, Adolfo Villafiorita, Komminist Weldemariam. 210-215 [doi]
- Improving Recall and Precision of a Personalized Semantic Search Engine for E-learningOlfa Nasraoui, Leyla Zhuhadar. 216-221 [doi]
- The Level of International Business and Its Association with Different Internet E-Commerce PracticesLuc Cassivi, Pierre-Majorique Léger, Michael Wybo, Pierre Hadaya. 222-225 [doi]
- Doubts about Digitization: An Explorative Case StudyChing-Cha Hsieh, Chia-Hui Lo. 226-231 [doi]
- Credit Fraud Detection in the Banking Sector in UK: A Focus on E-BusinessMd Delwar Hussain Mahdi, Karim Mohammed Rezaul, Muhammad Azizur Rahman. 232-237 [doi]
- E-Banking and Its Impact on Banks Performance and Consumers BehaviourAqeel Ahmed, Karim Mohammed Rezaul, Muhammad Azizur Rahman. 238-242 [doi]
- Customer Segmentation Architecture Based on Clustering TechniquesGuillem Lefait, M. Tahar Kechadi. 243-248 [doi]
- Implementing an ITIL-Based IT Service Management Measurement SystemAntti Lahtela, Marko Jäntti, Jukka Kaukola. 249-254 [doi]
- A Fuzzy Logic System for Classification of the Lung Nodule in Digital Images in Computer Aided DetectionRahil Hosseini, Jamshid Dehmeshki, Sarah Barman, Mahdi Mazinani, Anne-Marie Jouannic, Salah D. Qanadli. 255-259 [doi]
- Compression of Digital Medical Images Based on Multiple Regions of InterestM. Firoozbakht, Jamshid Dehmeshki, M. Martini, Y. Ebrahimdoost, Hamdan Amin, M. Dehkordi, A. Youannic, Salah D. Qanadli. 260-263 [doi]
- Analysis of Deputy and Party Similarities through Hierarchical ClusteringGuillem Lefait, Tahar Kechadi. 264-268 [doi]
- Medical Image Segmentation Using Active Contours and a Level Set Model: Application to Pulmonary Embolism (PE) SegmentationY. Ebrahimdoost, Jamshid Dehmeshki, T. S. Ellis, M. Firoozbakht, A. Youannic, Salah D. Qanadli. 269-273 [doi]
- Automatic Segmentation of Soft Plaque by Modeling the Partial Volume Problem in the Coronary ArteryMahdi Mazinani, Jamshid Dehmeshki, Rahil Hosseini, T. Ellis, Salah D. Qanadli. 274-278 [doi]
- Utilization of an Image Specific Areas in SearchingRadoslav Fasuga, Petr Kaspar, Martin Surkovský. 279-284 [doi]
- Visualizing Plot in 3DTeresa Dobson, Piotr Michura, Stan Ruecker. 285-289 [doi]
- Automated Detection of Peripheral Arteries in CTA DatasetsAdina Ion, Jamshid Dehmeshki, Hamdan Amin, A. Jouannic, Salah D. Qanadli. 290-293 [doi]
- FLOSS for the Canadian Public Sector: Open DemocracyMark Perry, Thomas Margoni. 294-300 [doi]
- Interpreting Network Discrimination in the CRTC and FCCMark Perry, Thomas Margoni. 301-306 [doi]
- The Digital Divide and Internet Voting AcceptanceFrance Belanger, Lemuria Carter. 307-310 [doi]
- Regulatory Measures to Support eDemocracyLasse Berntzen, Evika Karamagioli. 311-316 [doi]
- Content Filtering and the New CensorshipLilian Edwards. 317-322 [doi]
- Squaring the Circle of Smart Surveillance and PrivacyJoseph A. Cannataci. 323-328 [doi]
- e-Fraud Prevention Based on the Self-Authentication of e-DocumentsJ. M. Blackledge, E. Coyle. 329-338 [doi]
- Legal Issues Regarding Distributed and High Performance Computing in Geosciences and ExplorationClaus-Peter Rückemann. 339-344 [doi]
- E-Banking and e-Fraud: A Comparison Investigation in Jamaica and the UKClare Chambers, Umut Turksen. 345-352 [doi]
- Modeling and Analysis of Laws Using BPR and Goal-Oriented FrameworkAdolfo Villafiorita, Komminist Weldemariam, Angelo Susi, Alberto Siena. 353-358 [doi]