Abstract is missing.
- Focused Crawling Using Vision-Based Page SegmentationMahdi Naghibi, Adel Torkaman Rahmani. 1-12 [doi]
- The Co-design of Business and IT Systems: A Case in Supply Chain ManagementNavid Karimi Sani, Shokoofeh Ketabchi, Kecheng Liu. 13-27 [doi]
- Cardinality Statistics Based Maximal Frequent Itemsets MiningMeera M. Dhabu, Parag S. Deshpande. 28-39 [doi]
- Ranked Criteria Profile for Multi-criteria Rating RecommenderSaranya Maneeroj, Pannawit Samatthiyadikun, Warat Chalermpornpong, Sasipa Panthuwadeethorn, Atsuhiro Takasu. 40-51 [doi]
- A Graph API for Complex Business Network Query and TraversalDaniel Ritter 0001, Christoph Herrmann 0002. 52-63 [doi]
- A Survey of Process Model Reuse RepositoriesMturi Elias, Paul Johannesson. 64-76 [doi]
- The Dynamics of Implementation of Finance Information SystemsDavid Kiwana, Björn Johansson. 77-88 [doi]
- Profiting from IT Investments in Small and Medium Enterprises: How Does the Industry Environment Influence the Returns of IT-Based Capabilities?Paolo Neirotti, Elisabetta Raguseo. 89-100 [doi]
- Item's Characterization for Model's Development in Information Retrieval System EvaluationBernard Ijesunor Akhigbe, Babajide Samuel Afolabi, Emmanuel Rotimi Adagunodo. 101-111 [doi]
- Knowledge Contribution in Social Media: Exploring Factors Influencing Social Taggers' Acceptance towards Contributing and Sharing TagsHesham Allam, James Blustein, Michael Bliemel, Louise Spiteri. 112-123 [doi]
- Mitigation of Random Query String DoS via GossipStefano Ferretti, Vittorio Ghini. 124-134 [doi]
- Public Verifiable Signcryption Schemes with Forward Secrecy Based on Hyperelliptic Curve CryptosystemShehzad Ashraf, Nizamuddin, Muhammad Sher. 135-142 [doi]
- Analytical Modelling of Fluid Credit Congestion Control Scheme in MultiProtocol Label Switching (MPLS) NetworksAdebayo Oyekan, Ifetayo Ojiwusi, Ayodeji Oludola Oluwatope, G. Adesola Aderounmu, Emmanuel Rotimi Adagunodo. 143-151 [doi]
- Efficient Semi-supervised Learning BitTorrent Traffic Detection with Deep Packet and Deep Flow InspectionsRaymond Siulai Wong, Teng-Sheng Moh, W. Melody Moh. 152-163 [doi]
- An Intelligent Multi Agent Framework for E-commerce Using Case Based Reasoning and Argumentation for NegotiationPooja Jain, Deepak Dahiya. 164-175 [doi]
- Pair-Wise Time-Aware Test Case Prioritization for Regression TestingPrem Parashar, Arvind Kalia, Rajesh Bhatia. 176-186 [doi]
- Is Technology Universal Panacea for Knowledge and Experience Management? Answers from Indian IT SectorNeeraj Sharma, Kawaljeet Singh, D. P. Goyal. 187-198 [doi]
- A Review of Coupling and Cohesion Measurement in OO Systems Using Program SlicingSunint Kaur Khalsa, Rajesh Kumar Bhatia, Jitender Kumar Chhabra, Maninder Singh. 199-210 [doi]
- Fast On-Line Summarization of RFID Probabilistic Data StreamsRazia Haider, Federica Mandreoli, Riccardo Martoglia, Simona Sassatelli. 211-223 [doi]
- An Efficient and Highly Available Distributed Data Management SystemNobuhiko Matsuura, Seiji Suzuki, Maki Ohata, Ken Ohta, Hiroshima Inamura, Tadanori Mizuno, Hiroshi Mineno. 224-234 [doi]
- Quo vadis: Descriptive and Thematic Analysis on IT OutsourcingStefan Bensch. 235-246 [doi]
- Energy Analysis of Services through Green Metrics: Towards Green CertificatesMariagrazia Fugini, José Antonio Parejo Maestre. 247-258 [doi]
- Uncertainty Interval Temporal Sequences ExtractionAsma Ben Zakour, Sofian Maabout, Mohamed Mosbah, Marc Sistiaga. 259-270 [doi]
- Enterprise Knowledge Management System: A Multi Agent PerspectiveDeepak Dahiya, Mohit Gupta, Pooja Jain. 271-281 [doi]
- Developing a Template for Organizational Knowledge ManagementAkhilesh Bajaj, Meredith Bates. 282-291 [doi]
- Towards of E-Learning Quality Standards for Electrical EngineersNadezhda Kunicina, Anastasija Zhiravecka, Antons Patlins, Yelena Chaiko, Leonids Ribickis. 292-303 [doi]
- A Comparative Study of Recognition of Speech Using Improved MFCC Algorithms and Rasta FiltersLavneet Singh, Girija Chetty. 304-314 [doi]
- Fuzzy-Based Simulation Model to Predict Flow Rate in Water Distribution Network SystemOlayiwola Ojo, Ayodeji Oludola Oluwatope, Adesola Oke, G. Adesola Aderounmu. 315-324 [doi]
- An FPGA Noise Resistant Digital Temperature Sensor with Auto CalibrationBrandon A. Brown, Todd R. Andel, Yong Kim. 325-335 [doi]
- Twisting Additivity in Program ObfuscationMila Dalla Preda, Wu Feng, Roberto Giacobazzi, Richard Greechie, Arun Lakhotia. 336-347 [doi]
- Automatic Simplification of Obfuscated JavaScript Code (Extended Abstract)Gen Lu, Kevin Coogan, Saumya K. Debray. 348-359 [doi]
- Improved Malware Classification through Sensor Fusion Using Disjoint UnionCharles LeDoux, Andrew Walenstein, Arun Lakhotia. 360-371 [doi]
- Dynamic Architectural Countermeasure to Protect RSA against Side Channel Power Analysis AttacksJohn Barron, Todd R. Andel, Yong Kim. 372-383 [doi]
- Deployable Classifiers for Malware DetectionAnshuman Singh, Sumi Singh, Andrew Walenstein, Arun Lakhotia. 384-395 [doi]
- Interconnecting Workflows Using Services: An Approach for "Case Transfer" with Centralized ControlSaïda Boukhedouma, Zaia Alimazighi, Mourad Oussalah, Dalila Tamzalit. 396-401 [doi]
- Assessing Key Success Factors in an ERP Implementation Project: A Case Study in Automotive IndustryIskander Zouaghi, Abderrazak Laghouag. 402-407 [doi]
- Automatic Light Control for White Marker Board in Conference/Seminar Hall Using Ultrasound Sensor via RF Wireless CommunicationN. Hema, Krishna Kant, Hima Bindu Maringanti. 408-413 [doi]
- Wireless Environmental Monitoring System (WEMS) Using Data Aggregation in a Bidirectional Hybrid ProtocolTapan Jain. 414-420 [doi]
- Detecting Healthcare Fraud through Patient Sharing SchemesAryya Gangopadhyay, Song Chen, Yelena Yesha. 421-426 [doi]
- Software Security by Obscurity - A Programming Language PerspectiveRoberto Giacobazzi. 427-432 [doi]
- System-Level Methods to Prevent Reverse-Engineering, Cloning, and Trojan InsertionSylvain Guilley, Jean-Luc Danger, Robert Nguyen, Philippe Nguyen. 433-438 [doi]
- The Grand Challenge in Metamorphic AnalysisMila Dalla Preda. 439-444 [doi]
- The Art and Science of ObfuscationClark D. Thomborson. 445-450 [doi]
- Capturing the Essence of Practical ObfuscationJ. Todd McDonald. 451-456 [doi]