Abstract is missing.
- Dumb Web, Smart Web, Knowledgable WebGabriele Anderst-Kotsis. 1 [doi]
- Domain Specific Languages: From Craft to EngineeringJean-Marc Jézéquel. 2 [doi]
- Resilient Optical Network VirtualizationBrigitte Jaumard. 3 [doi]
- Empirical Research in Information SecurityEdgar R. Weippl. 4 [doi]
- NetLuke: Web-Based Teaching of Algorithm and Data Structure Concepts Harnessing Mobile EnvironmentsGeorg Prenner, Alexander Rotheneder, Erich Schikuta. 7-16 [doi]
- EduCo: An Integrated Social Environment for Teaching and Learning Software Engineering CoursesHai H. Dang, Vu Nguyen, Kha N. Do, Thu D. Tran. 17-26 [doi]
- Exemplary Use Cases Based on the Generic Data Model for the Integrated Intelligent Computer-Assisted Language Learning (iiCALL) EnvironmentHarald Wahl, Werner Winiwarter. 27-34 [doi]
- A Technological, Pedagogical and Content Knowledge (TPACK) Framework in the context of a Social Networking Site used for Academic EngagementMatt Glowatz, Orna O'Brien. 35-39 [doi]
- Improving Engagement in Hypermedia Learning: A Design for Navigation SupportNorliza Katuk, Mazni Omar, Noor A'qilah Halim. 40-43 [doi]
- A comparative case study of Irish and Vietnamese students' eLearning perceptions and acceptanceTri Tran, Matthias Glowatz. 44-48 [doi]
- Skill and Competence Development Through GamesDavid Gouveia, António Andrade, Paula Escudeiro, Carlos Vaz de Carvalho. 49-53 [doi]
- New approach for extracting information on Freebase based on user's preferencesBach N. Son, Pham H. Hoang. 54-58 [doi]
- A Seeding Cellular Learning Automata Approach for Viral Marketing In Social NetworkMashael Aldrees, Mourad Ykhlef. 59-63 [doi]
- An Evaluation of the Hibernate Object-Relational Mapping for Processing Interactive Social Networking ActionsShahram Ghandeharizadeh, Ankit Mutha. 64-70 [doi]
- Optimal Derotation of Shared Acceleration Time Series by Determining Relative Spatial AlignmentRene Mayrhofer, Helmut Hlavacs, Rainhard Dieter Findling. 71-78 [doi]
- Item Reputation-Aware Recommender SystemsAhmad Abdel-Hafez, Yue Xu, Nan Tian. 79-86 [doi]
- Towards Activity Recommendation from LifelogsGunjan Kumar, Houssem Jerbi, Cathal Gurrin, Michael P. O'Mahony. 87-96 [doi]
- A Social Networking Platform for Semantic Time Series ProcessingBojan Bozic, Werner Winiwarter, Marco DiCiano. 97-106 [doi]
- Role of Emoticons for Multidimensional Sentiment Analysis of TwitterYuki Yamamoto, Tadahiko Kumamoto, Akiyo Nadamoto. 107-115 [doi]
- Visualizing Temporal Changes in Impressions from TweetsTadahiko Kumamoto, Hitomi Wada, Tomoya Suzuki. 116-125 [doi]
- CDPort: A Framework of Data Portability in Cloud PlatformsEbtesam Alomari, Ahmed Barnawi, Sherif Sakr. 126-133 [doi]
- Evaluation of Scheduling Method for Heterogeneous Clients in NVoD SystemsYusuke Gotoh, Tomoki Yoshihisa. 134-141 [doi]
- What's new with WhatsApp & Co.? Revisiting the Security of Smartphone Messaging ApplicationsRobin Mueller, Sebastian Schrittwieser, Peter Frühwirt, Peter Kieseberg, Edgar R. Weippl. 142-151 [doi]
- Effectiveness of Fully Homomorphic Encryption to Preserve the Privacy of Biometric DataWilson Abel Alberto Torres, Nandita Bhattacharjee, Bala Srinivasan. 152-158 [doi]
- Hosting a Server on a Browser Using Wemu Architecture: Secure File Sharing Service ImplementationShunsuke Kurumatani, Yumiko Kasae, Masashi Toyama, Hiroki Akama. 159-162 [doi]
- Energy Smart Grid Cyber-Threat Exposure Analysis and Evaluation FrameworkShahir Majed, Suhaimi Ibrahim, Mohamed Shaaban. 163-169 [doi]
- Architecting and Development of the SecureCyber: A SCADA Security platform Over Energy Smart GridShahir Majed, Suhaimi Ibrahim, Mohamed Shaaban. 170-174 [doi]
- An Empirical Pilot Study of CAPTCHA Complexity Using Eye TrackingHend S. Al-Khalifa. 175-179 [doi]
- Efficiently Managing the Security and Costs of Big Data Storage using Visual AnalyticsSabri Hassan, Günther Pernul. 180-184 [doi]
- A Decision Framework Model for Migration into Cloud: Business, Application, Security and Privacy PerspectivesShareeful Islam, Edgar R. Weippl, Katharina Krombholz. 185-189 [doi]
- SecureCyber: Risk-Based Optimization through Common Vulnerability Systems Scoring Over Energy Smart GridShahir Majed, Suhaimi Ibrahim, Mohamed Shaaban. 190-195 [doi]
- The Role of Trust in Web-Based Election System UsabilityRex Perez Bringula, Aaron Noel De Leon. 196-199 [doi]
- Interactive Framework for Exploratory Search, Integration, and Visual Analysis of Semantic Web ResourcesBin Piao, Yuzuru Tanaka. 200-206 [doi]
- QFed: Query Set For Federated SPARQL Query BenchmarkNur Aini Rakhmawati, Muhammad Saleem, Sarasi Lalithsena, Stefan Decker. 207-211 [doi]
- Supervised Learning Method for Mobile International Number Plate RecognitionHong-Nghi Tran, Tuan Nguyen. 212-216 [doi]
- Capri: Programmable Analytics for Linked DataBo Hu, Eduarda Mendes Rodrigues, Emeric Viel. 217-223 [doi]
- Measuring Energy Consumption for Web Service Product ConfigurationI. Made Murwantara, Behzad Bordbar, Leandro L. Minku. 224-228 [doi]
- An Architecture for Web Services Mash-Up based on Mobile AgentsQuang-Dung Vu, Ha-Thanh Nguyen, Danh-Viet Vu, Viet Ha Nguyen, Nobuyasu Nakajima. 229-232 [doi]
- Design and Implementation of Rule-Based Framework for Context-Aware Services with Web ServicesHiroki Takatsuka, Sachio Saiki, Shinsuke Matsumoto, Masahide Nakamura. 233-242 [doi]
- Resilient Web Services for Timeless Business ProcessesTomasz Miksa, Rudolf Mayer, Marco Unterberger, Andreas Rauber. 243-252 [doi]
- A Web-based Platform for Dynamic Integration of Heterogeneous DataTuan-Dat Trinh, Peter Wetz, Ba-Lam Do, Amin Anjomshoaa, Elmar Kiesling, A Min Tjoa. 253-261 [doi]
- Intelligent Cooperative Least Recently Used Web Caching Policy based on J48 ClassifierWaheed Yasin, Hamidah Ibrahim, Nur Izura Udzir, Nor Asilah Wati Abdul Hamid. 262-269 [doi]
- An Empirical Study on Retrieving Structural Clones Using Sequence Pattern Mining AlgorithmsYoshihisa Udagawa. 270-276 [doi]
- The Problem of Searching Interdisciplinary Learning ObjectsJuha Puustjärvi, Leena Puustjärvi. 277-282 [doi]
- Refactoring Object-Relational Database Applications by Applying Transformation Rules to Develop better PerformanceZahra Davasr, Handoko. 283-288 [doi]
- An Intermediate Query Model for Structured Retrieval's Queries ConstructionKeng Hoon Gan, Phang Keat Keong. 289-295 [doi]
- Investigations into Missing Values Imputation Using Random Forests for Semi-supervised DataTsunenori Ishioka. 296-301 [doi]
- Enhancement of Sentence-Generation Based Summarization Method By Modelling Inter-Sentential Consequent-RelationshipsTrung Tran, Dang Tuan Nguyen. 302-309 [doi]
- Refining User and Item Profiles based on Multidimensional Data for Top-N Item RecommendationXiaoyu Tang, Yue Xu, Shlomo Geva. 310-319 [doi]
- Canonical Model: Construction PrinciplesManuk Manukyan. 320-329 [doi]
- Enterprise Workload Management through Ant Colony OptimizationSami J. Habib, Paulvanna Nayaki Marimuthu, Naser Al-Ibrahim. 330-335 [doi]
- Top-Down Design of Collaborating ProcessesJulius Köpke, Johann Eder, Markus Künstner. 336-345 [doi]
- Information Systems Implementation Delays and Inactivity Gaps: The End User PerspectivesMatt Glowatz, David Malone, Ian Fleming. 346-355 [doi]
- Automatic creation of semantic data about football transfer in sport newsQuang Minh Nguyen, Tuan-Dung Cao, Thanh-Tam Nguyen. 356-364 [doi]
- Maintaining Semantic Networks: Challenges and AlgorithmsBernd Michelberger, Klaus Ulmschneider, Birte Glimm, Bela Mutschler, Manfred Reichert. 365-374 [doi]
- Toward a platform for building and exploiting semantic annotation of photo taken with smart phoneTuan-Dung Cao, Thi Nhu Nguyen. 375-384 [doi]
- Music Retrieval and Adjustment Technique to Support and Motivate Ergotherapy and Daily ExercisesNaoko Kosugi, Sachiko Shimizu, Shiori Sasaki, Diep Thi Ngoc Nguyen, Yasushi Kiyoki. 385-394 [doi]
- Ontology-based Learning Object Searching Technique with Granular Feature ExtractionA. A. Gede Yudhi Paramartha, Harry Budi Santoso, Zainal A. Hasibuan. 395-400 [doi]
- Towards adding Linked Data to Ontology Learning LayersMeisam Booshehri, Peter Luksch 0001. 401-409 [doi]
- Filtering XML Streams by XPath and KeywordsSavong Bou, Toshiyuki Amagasa, Hiroyuki Kitagawa. 410-419 [doi]
- Extracting Facets from Textual Contents for Faceted Search over XML DataTakahiro Komamizu, Toshiyuki Amagasa, Hiroyuki Kitagawa. 420-429 [doi]
- A New Approach for Meaningful XML Schema MergingAbdullah Baqasah, Eric Pardede, Wenny Rahayu. 430-439 [doi]
- Comparative Analysis of Sizzle Words on the InternetDaisuke Kato, Mai Miyabe, Eiji Aramaki, Akiyo Nadamoto. 440-444 [doi]
- GeT-based Ontology Construction for Semantic DisambiguationVo Xuan Vinh, Hong-Quang Nguyen, Khoi-Nguyen Tran. 445-453 [doi]
- Building Information Extraction System Based on Computing Domain OntologyChien D. C. Ta, Tuoi Phan Thi. 454-458 [doi]
- Query Decomposition Strategy for Integration of Semistructured DataHandoko, J. R. Getta. 459-463 [doi]
- Representing Annotations in XML Document using String-Trees ModelKeng Hoon Gan. 464-468 [doi]
- Evaluation of User Interface Design of Semergy SystemIman Paryudi, Stefan Fenz. 469-473 [doi]
- A model-driven approach for generating interfaces from user interaction diagramsNatan Vinícius Zeferino, Patricia Vilain. 474-478 [doi]
- A Proof of the Correctness of a Transformation Approach from UML Activity Diagrams to Event-B ModelsAhlem Ben Younes, Yousra Bendaly Hlaoui, Leila Jemni Ben Ayed. 479-483 [doi]
- Improving Techniques for Summarizing the Meaning of Two Vietnamese Sentences by Adding a Meaningful Relationship between Two ActionsTrung Tran, Dang Tuan Nguyen. 484-488 [doi]
- An Implication for Design of Enterprise Information Systems from the Cultural Features on the User Behaviors at SNS SitesTetsuya Uchiki. 491-498 [doi]
- ERP User Adoption Constraints: A Significant Risk for Emerging Economy SMEsLisa F. Seymour, Isabel Jansen van Vuuren. 499-507 [doi]
- Analytics Service Oriented Architecture for Enterprise Information SystemsZhaohao Sun, Kenneth D. Strang, John Yearwood. 508-516 [doi]
- Enterprise Application Management in Cloud Computing ContextGeorge Feuerlicht, Hong Thai Tran. 517-523 [doi]
- Causal Analysis for Supporting Users' Understanding of Investment TrustsYuki Awano, Qiang Ma 0001, Masatoshi Yoshikawa. 524-528 [doi]
- gSLM: The Initial Steps for the Specification of a Service Management Standard for Federated e-InfrastructuresJoan Serrat, Tomasz Szepieniec, Adam Belloum, Javier Rubio-Loyola, Owen Appleton, Thomas Schaaf, Joanna Kocot. 529-536 [doi]
- Analysis of the lean IT penetration in selected Czech and Polish companiesJosef Basl, Michal Sasiadek. 537-541 [doi]
- A study of users' perception of soft systems approaches during IT adoption in organizationsOsden Jokonya. 542-546 [doi]
- Semantic Cubing Platform enabling Interoperability Analysis among Cloud-based Linked Data CubesBinh Thanh Nguyen, Ngoc Sy Ngo. 547-553 [doi]
- Proposal of a Framework of Lean Governance and Management of Enterprise ITMauro Gonçalves Pinheiro, Mehran Misaghi. 554-558 [doi]
- Is Privacy Supportive for Adaptive ICT Systems?Sven Wohlgemuth. 559-570 [doi]