Abstract is missing.
- Towards Smaller-Sized Cache for Mobile Processors Using Shared Set-AssociativityNaveen Davanam, Byeong Kil Lee. 1-6 [doi]
- Designing Efficient Many-Core Parallel Algorithms for All-Pairs Shortest-Paths Using CUDAQuoc-Nam Tran. 7-12 [doi]
- Synthesis of Processor Allocator for Torus-Based Chip MultiProcessorsDawid Zydek, Henry Selvaraj, Laxmi Gewali. 13-18 [doi]
- Evaluating MPI Implementations Using HPL on an Infiniband Nehalem Linux ClusterMohamad Sindi. 19-25 [doi]
- Architectural Design of an Automated Software ToolJason R. Meek, Narayan C. Debnath. 26-31 [doi]
- Web Application to Improve Police Management Performance: A Web Application to Prepare Police Stations to Face an ISO 9001: 2008 Certification Process and to Improve Watching Activities of Human RightsNarayan C. Debnath, Robert Uzal, German Montejano, Daniel Riesco. 32-35 [doi]
- Analysis and Simulation of System SurvivabilityYanjun Zuo, Suhas Lande, Malvika Pimple. 36-41 [doi]
- Assisting Students with Typical Programming Errors During a Coding SessionMarcel Karam, Mario Awa, Angela Carbone, Joumana Dargham. 42-47 [doi]
- The Development of Web-Based System for Blood Requisition within Blood Supply ChainWijai Boonyanusith, Phongchai Jittamai. 48-52 [doi]
- Robustness of Distributed RTLS for Dense Large-Scale EnvironmentsHyunsung Jang, Hoon Choi, Yeonsu Jung, Yunju Baek. 58-63 [doi]
- Multi-layered Collaborative Semantic Omni-functional DocumentsJoseph Pally, Salih Yurttas. 64-69 [doi]
- Efficient Data Centers, Cloud Computing in the Future of Distributed ComputingDoina Bein, Wolfgang W. Bein, Shashi Phoha. 70-75 [doi]
- Rigorous Definition/Specification in RAISE Specification Language of a Framework for Web Services about Geographic Information SystemsNarayan C. Debnath, Oscar Testa, German Montejano, Daniel Riesco. 76-81 [doi]
- Provenance Collection in Reservoir Management Workflow EnvironmentsFan Sun, Jing Zhao, Karthik Gomadam, Viktor K. Prasanna. 82-87 [doi]
- ACAT: A Web-Based Software Tool to Facilitate Course Assessment for ABET AccreditationEugene Essa, Andrew Dittrich, Sergiu M. Dascalu, Frederick C. Harris Jr.. 88-93 [doi]
- Non-interactive Secure and Privacy Preserving Protocol for Inter-vehicle Communication NetworksFatty M. Salem, Maged H. Ibrahim, I. I. Ibrahim. 108-113 [doi]
- A Stepwise Approach Towards an Interoperable and Flexible Logging Principle for Audit TrailsDavid Huemer, A. Min Tjoa. 114-119 [doi]
- Advanced XML Security: Framework for Building Secure XML Management System (SXMS)Faisal T. Ammari, Joan Lu. 120-125 [doi]
- Tuning Neural Networks by Both Connectivity and SizeIan Stewart, Wenying Feng, Selim G. Akl. 126-131 [doi]
- A Simple Password Less Authentication System for Web SitesKirit Saelensminde, Veera Boonjing. 132-137 [doi]
- Managing Media Rich Geo-spatial Annotations for a Map-Based Mobile Application Using ClusteringKhasfariyati Razikin, Dion Hoe-Lian Goh, Ee-Peng Lim, Aixin Sun, Yin Leng Theng, Thi Nhu Quynh Kim, Kalyani Chatterjea, Chew-Hung Chang. 138-143 [doi]
- Augmented Ontology-Based Information Retrieval System with External Open Source ResourcesLeyla Zhuhadar, Olfa Nasraoui. 144-149 [doi]
- SASSY: A Petri Net Based Student-Driven Advising Support SystemRay R. Hashemi, James Blondin. 150-155 [doi]
- Medical Image Segmentation Using Improved Mountain Clustering Technique Version-2Nishchal K. Verma, Abhishek Roy, Shantaram Vasikarla. 156-161 [doi]
- An Indexing Structure for Mobile Objects Utilizing Late UpdateJustin Barrios, S. Kami Makki, Masoumeh Karimi. 162-167 [doi]
- On the Estimating Burr XII Distribution ParametersBabak Abbasi, Seyedeh Zahra Hosseinifard, Mali Abdollahian. 168-170 [doi]
- Analysis of Sporting Events Using SoftbotsMark Smith. 171-175 [doi]
- Predicting Phishing Websites Using Classification Mining Techniques with Experimental Case StudiesMaher Ragheb Aburrous, M. Alamgir Hossain, Keshav P. Dahal, Fadi A. Thabtah. 176-181 [doi]
- Microarray Data Mining: A New Algorithm for Gene Selection Using Lorenz Curves & Gini RatiosQuoc-Nam Tran. 182-187 [doi]
- Model Based Testing Using Software ArchitectureHassan Reza, Suhas Lande. 188-193 [doi]
- DRXQP: A Dynamic Relational XML Query ProcessorB. M. Monjurul Alom, Frans Henskens, Michael Hannaford. 194-199 [doi]
- Image Retrieval Using Color Moment InvariantXiaoyin Duanmu. 200-203 [doi]
- A Fast and Stable Incremental Clustering AlgorithmSteven Young, Itamar Arel, Thomas P. Karnowski, Derek Rose. 204-209 [doi]
- Analyzing the Impact of XML Storage Models on the Performance of Native XML Database SystemsNtima Mabanza. 210-215 [doi]
- A Framework for Testing RESTful Web ServicesHassan Reza, David Van Gilst. 216-221 [doi]
- Effects of Similarity Metrics on Document ClusteringKazem Taghva, Rushikesh Veni. 222-226 [doi]
- Improving of Initial Clusters Fitness in Genetic Guided-Clustering EnsemblesReza Ghaemi, Md. Nasir bin Sulaiman, Norwati Mustapha, Hamidah Ibrahim. 227-232 [doi]
- A Supervised Learning Method in Monitoring Linear ProfileSeyedeh Zahra Hosseinifard, Mali Abdollahian. 233-237 [doi]
- Weighted Association Rule Mining and Clustering in Non-binary Search SpaceG. Praveen Kumar, Anirban Sarkar. 238-243 [doi]
- Extracting Conceptual Relations from Persian ResourcesHakimeh Fadaei, Mehrnoush Shamsfard. 244-248 [doi]
- Using Social Networks to Solve Data Sparsity Problem in One-Class Collaborative FilteringHamza Kaya, Ferda Nur Alpaslan. 249-252 [doi]
- Solving Recursive Queries Using Depth First SearchJesús Ubaldo Quevedo-Torrero. 253-258 [doi]
- Environmental Noise Source Classification Using Neural NetworksBuket D. Barkana, Inci Sariçiçek. 259-263 [doi]
- Issues and Challenges of an Inductive Learning Algorithm for Self-Healing ApplicationsMohammad Muztaba Fuad. 264-269 [doi]
- Three Genetic Algorithm Approaches to Parallel Machine Scheduling and Comparison with a HeuristicSumeyye Samur, Serol Bulkan. 270-274 [doi]
- Building Customized Cushion Seats Using Stereo Visions for DisabledWeifeng Xu, Ben Luebbert, Stephen T. Frezza, Sreela Sasi, Todd Dinner. 275-280 [doi]
- Hybrid Satisfiability TechniquesSandeep Kumar Singla, Pradeep Kumar Jaswal. 281-284 [doi]
- A Meiosis Genetic AlgorithmNattavut Wiriyasermkul, Veera Boonjing, Pisit Chanvarasuth. 285-289 [doi]
- Negotiation in Heterogeneous EnvironmentsMaruf Pasha, Flávio Oquendo, Hafiz Farooq Ahmad. 290-295 [doi]
- Generalization of Shortest Path MapLaxmi Gewali, Victor Roman. 296-300 [doi]
- Fuzzy Spatio-temporal Relations AnalysisNadeem Salamat, El-Hadi Zahzah. 301-306 [doi]
- On the Way to Smart Emergency SystemPavel Pesout, Ondrej Matustik. 311-316 [doi]
- Real-Time Monitoring of Fetus Movements and Uterine Contractions Using MEMS Acoustic SensorSarwan Kumar, Sneh Anand, Amit Sengupta. 317-321 [doi]
- Continuous Real-Time Ambulatory Urodynamic Monitoring Using Personal Digital AssistanceK. S. Kim, S. H. Yu, M. H. Kim, D. H. Shin, C. G. Song. 322-326 [doi]
- Impulse Noise Removal Based on Grey Polynomial InterpolationCheng-Hsiung Hsieh, Sheng-Yung Hung, Chia-Wei Lan, Po-Chin Huang. 327-331 [doi]
- Is Phoneme Level Better than Word Level for HMM Models in Limited Vocabulary ASR Systems?Yousef Ajami Alotaibi. 332-337 [doi]
- Effect of Accent on Speech Intelligibility in Multiple Speaker Environment with Sound SpatializationM. Joshi, M. Iyer, N. Gupta. 338-342 [doi]
- English Vowel Production by Native Mandarin and Hindi SpeakersYemi Olagbaju, Buket D. Barkana, Navarun Gupta. 343-347 [doi]
- An Automatic Brain Alignment ToolDeborah Sturm, Philip Koshy, Diana Kovalerchik, Nirav Thakkar. 348-351 [doi]
- An Improved Seed Point Detection Algorithm for Centerline Tracing in Coronary AngiogramsFarsad Zamani Boroujeni, Rahmita Wirza, Oteh Maskon, Alireza Khosravi, Madjid Khalilian. 352-357 [doi]
- Multiple Description Multiwavelet Based Image CodingNing Wang, Baobin Li, Lizhong Peng. 358-363 [doi]
- Discriminating the Machine-Printed and Hand-Written Words Based on LegibilityShahin Akbarpour, Md. Nasir bin Sulaiman, Norwati Mustapha, Rahmita Wirza O. K. Rahmat. 364-369 [doi]
- Method for Automatic E-Comic Scene Frame Extraction for Reading Comic on Mobile DevicesKohei Arai, Tolle Herman. 370-375 [doi]
- Fuzzy External Force for SnakeRahman Arshizadeh, Mohammad Mehdi Ebadzadeh. 376-381 [doi]
- Fast Mode Decision for H.264 Based on DC CoefficientGuanghui Lu, Leiting Chen. 382-386 [doi]
- Secure Compressed Domain Watermarking for H.264 VideoSampath K. Bavipati, Xiao Su. 387-391 [doi]
- A New Method for Line Segmentation of Handwritten Hindi TextNaresh Kumar Garg, Lakhwinder Kaur, M. K. Jindal. 392-397 [doi]
- Interactive Manipulation of Augmented Objects in Marker-Less AR Using Vision-Based Hand InteractionByungsung Lee, Junchul Chun. 398-403 [doi]
- Edge Detection with Self-Adaptive MAS Using Multi-distance GradientShi-Wei Gao, Wei Cao. 404-409 [doi]
- Simmered Greedy Optimization for Co-clusteringSadik Kapadia, Richard Rohwer. 410-419 [doi]
- A Forecasting Capability Study of Empirical Mode Decomposition for the Arrival Time of a Parallel Batch SystemLinh Ngo, Amy W. Apon, Doug Hoffman. 420-425 [doi]
- High Dynamic Range Fuzzy Color Image EnhancementOm Prakash Verma, Madasu Hanmandlu, Vamsi Krishna Madasu, Shantaram Vasikarla. 426-431 [doi]
- A Computer-Based Model for Studying the Effects of Lasers on the RetinaPamela K. Fink, Xioawen Zhu, Sandra Ryan, Lisa Ibekwe, Michael L. Denton, Jeffrey Oliver. 432-437 [doi]
- An Automatic MRI Brain Volume Alignment ToolDeborah Sturm, Philip Koshy, Diana Kovalerchik, Nirav Thakkar. 438-441 [doi]
- A Private and Anonymous Data Repository ServiceJarrod Trevathan, Wayne Read. 442-447 [doi]
- A Negotiation Protocol to Support Agent Argumentation and Ontology Interoperability in MAS-Based Virtual EnterprisesG. Wang, T. N. Wong, X. H. Wang. 448-453 [doi]
- Analysis of Users Behavior on Web 2.0 Social Network Sites: An Empirical StudyShwu-Min Horng. 454-459 [doi]
- Healthcare Modelling through Enterprise Architecture: A Hospital CaseKamran Ahsan, Hanifa Shah, Paul Kingston. 460-465 [doi]
- Partners in Science Education: An Undergraduate ExperienceSarah Zelikovitz, Herbert Schanker, Donna Scimeca. 466-470 [doi]
- Mobile Application Development: Essential New Directions for ITChia-Chi Teng, Richard Helps. 471-475 [doi]
- BAUT: A Bayesian Driven Tutoring SystemSong Tan, Kai Qian, Xiang Fu, Prabir Bhattacharya. 476-481 [doi]
- Experiences from a Time-Condensed Computer Security ClassWeiqing Sun. 482-487 [doi]
- Continuous Biometric User Authentication in Online ExaminationsEric Flior, Kazimierz Kowalski. 488-492 [doi]
- Quorum Based Mutual Exclusion in Asynchronous Systems with Unreliable Failure DetectorsSung-Hoon Park, Yoon Kim, Jong-Ho Han, Jong-Sul Park. 499-505 [doi]
- Machine Learning for Adaptive Quantum MeasurementAlexander Hentschel, Barry C. Sanders. 506-511 [doi]
- An Evaluation Framework For Distributed Collaboration ToolsDavid Christian, Shmuel Rotenstreich. 512-517 [doi]
- Continuous Query Processing on Combined Data Stream: Sensor, Location and IdentificationJaekwan Park, Kyeongju Kim, Sungwoo Ahn, Bonghee Hong. 518-522 [doi]
- Careflow System with Case-Handling Flexibility - Case Study of Gastric CancerKanhai Shah, Boleslaw Mikolajczak. 523-528 [doi]
- Effects of System Characteristics on Users Self-Disclosure in Social Networking SitesYanli Jia, Yi Zhao, Yuli Lin. 529-533 [doi]
- Selection of the Best Answer in CQA ServicesMohan John Blooma, Alton Yeow-Kuan Chua, Dion Hoe-Lian Goh. 534-539 [doi]
- Mobile Alternate Reality Gaming Engine: A Usability EvaluationAlton Yeow-Kuan Chua, Dion Hoe-Lian Goh, Chei Sian Lee, Keng Tiong Tan. 540-545 [doi]
- Tag and Resource-Aware Collaborative Filtering Algorithms for Resource RecommendationGayatri Gadepalli, Elke A. Rundensteiner, David Brown, Kajal T. Claypool. 546-551 [doi]
- Corporate Blog: Consideration for the Impact of CommunicationSunghan Ryu, Chungkon Shi. 552-556 [doi]
- Personal Digital Information Resources Management BehaviorYun-Ke Chang, Miguel A. Morales Arroyo, Chan-Choy Chum, Tin-Seng Lim, Kok-Yuin Yuen. 557-562 [doi]
- Twitter in Government: Building Relationships One Tweet at a TimeDianne Lux Wigand. 563-567 [doi]
- Patent Search Decision Support ServiceAviv Segev, Jussi Kantola. 568-573 [doi]
- A Mixed-Initiative Model for Quality-Based E-Services PricingWei-Lun Chang, Chia-Yun Ho. 574-579 [doi]
- Community-Based Social Network Service for Travel Blog SharingWei-Feng Tung, Chien-Liang Liu. 580-585 [doi]
- Applying Semantic Web Techniques to Reservoir Engineering: Challenges and Experiences from Event ModelingTao Zhu, Amol Bakshi, Viktor K. Prasanna, Karthik Gomadam. 586-591 [doi]
- A Framework of Hybrid Recommendation System for Government-to-Business Personalized E-ServicesQusai Shambour, Jie Lu. 592-597 [doi]
- Novel {Architect@Place} Pattern Activity in ISRUP FrameworkSamad Sabouri, Amir Masoud Rahmani. 598-602 [doi]
- Information Systems and Activity Theory: A Case Study of Doctors and Mobile Knowledge WorkMichael Er, Robert Kay, Elaine Lawrence. 603-607 [doi]
- Customized E-Government Foresight Model in IranFatemeh Saghafi, Maryam MohamedPour, Akbar Kary Dolat Abadi. 608-612 [doi]
- Securely Querying Sensor Enabled RFID Virtual Databases (SERVDs)Yanjun Zuo, Wen-Chen Hu, Timothy O Keefe. 619-624 [doi]
- Mobile Platform for Networked RFID ApplicationsDonggeon Lee, Seongyun Kim, Howon Kim, Namje Park. 625-630 [doi]
- A Situation-Aware Middleware Based on Ontology Modeling and RuleTaewoo Nam, Keunhyuk Yeom. 631-636 [doi]
- Temporal Web AlertsNader Mohamed, Jameela Al-Jaroodi. 637-641 [doi]
- QARI: Quality Aware Software Deployment for Wireless Sensor NetworksWouter Horré, Sam Michiels, Wouter Joosen, Danny Hughes. 642-647 [doi]
- Towards a Mobile Middleware Product Line: A Requirement AnalysisYuri Morais, Thais Burity, Gledson Elias. 648-653 [doi]
- Middleware for Heterogeneous Sensor Networks in Urban ScenariosYicheng We, Doina Bein, Shashi Phoha. 654-659 [doi]
- Intelligent Sensor Independent Decisions for Entropic TargetsJ. Hill, R. Guidry, S. Kami Makki, B. Sun. 660-665 [doi]
- On the Design of User-Centric Supporting Service Composition EnvironmentsEduardo Goncalves da Silva, Luís Ferreira Pires, Marten van Sinderen. 666-671 [doi]
- Service Provisioning Support for Non-technical Service ClientsLuiz Olavo Bonino da Silva Santos, Luís Ferreira Pires, Marten van Sinderen. 672-677 [doi]
- Towards Adaptive Replication Reconfiguration for QoSRaihan Al-Ekram, Richard C. Holt. 678-683 [doi]
- Service-Oriented Cloud Computing ArchitectureWei-Tek Tsai, Xin Sun, Janaka Balasooriya. 684-689 [doi]
- Regulating Orchestration in SOA-Based SystemsTin Lam, Naftaly Minsky. 690-695 [doi]
- Middleware Specialization for Product-Lines Using Feature-Oriented Reverse EngineeringAkshay Dabholkar, Aniruddha S. Gokhale. 696-701 [doi]
- Privacy and Information Security in Brazil? Yes, We Have It and We Do It!Joel Mana Gonçalves. 702-707 [doi]
- Enabling Trust through Continuous Compliance AssuranceBonnie Morris, Cynthia Tanner, Joseph D Alessandro. 708-713 [doi]
- Design of a New Block Cipher Based on Conditional EncryptionSakshi Dhall, Saibal K. Pal. 714-718 [doi]
- Personal Information Protection Model Based on Mobile AgentSeong-Hee Bae, Jaejoon Kim. 719-724 [doi]
- Using Network Forensics and Artificial Intelligence Techniques to Detect Bot-nets on an Organizational NetworkIckin Vural, Hein S. Venter. 725-731 [doi]
- Security Improvements to Anonymous ID-Based Group Key Agreement for Wireless NetworksJoseph Chee Ming Teo, Kim-Kwang Raymond Choo. 732-737 [doi]
- A Knowledge-Based System Implementation of Intrusion Detection RulesEric Flior, Tychy Anaya, Cory Moody, Mohsen Beheshti, Jianchao Han, Kazimierz Kowalski. 738-742 [doi]
- The System Integrity Verification for Trusted RFID ProtocolMohd Faizal Mubarak, Jamalul-lail Ab Manan, Saadiah Yahya. 743-747 [doi]
- Record Setting Software Implementation of DES Using CUDAGiovanni Agosta, Alessandro Barenghi, Fabrizio De Santis, Gerardo Pelosi. 748-755 [doi]
- Validation for Digital ForensicsRobert F. Erbacher. 756-761 [doi]
- Asset Assessment in Web ApplicationsBrunil Dalila Romero Marino, Hisham M. Haddad. 762-767 [doi]
- An Integrated Framework for Automated Firewall Testing and ValidationAbdeslam En-Nouaary, Mehdi Akiki. 768-773 [doi]
- Maximizing Ethernet Security by Switch-Based Single Secure DomainKhan Ferdous Wahid. 774-778 [doi]
- MULET: A Multilanguage Encryption TechniqueG. Praveen Kumar, Arjun Kumar Murmu, Biswas Parajuli, Prasenjit Choudhury. 779-782 [doi]
- VoIP Based Telehomecare Application KioskChristian Menkens, Werner Kurschl. 783-790 [doi]
- A Tool for Automated Fall Risk ClassificationWerner Kurschl, Michael Neuhold. 791-797 [doi]
- IHE-Compliant Mobile Application for Integrated Home Healthcare of Elderly PeopleHerwig Mayr, Barbara Franz, Margit Mayr. 798-803 [doi]
- The Internet of Things for Ambient Assisted LivingA. Dohr, R. Modre-Opsrian, Mario Drobics, Dieter Hayn, Günter Schreier. 804-809 [doi]
- Middleware Services for Pervasive Monitoring Elderly and Ill People in Smart EnvironmentsAntonio Coronato, Giuseppe De Pietro, Giovanna Sannino. 810-815 [doi]
- An Efficient Algorithm for the Performance of TCP over Multi-hop Wireless Mesh NetworksPrasanthi Sreekumari, Sang-Hwa Chung. 816-821 [doi]
- An Energy Balancing LEACH Algorithm for Wireless Sensor NetworksHaosong Gou, Younghwan Yoo. 822-827 [doi]
- A Node-Disjoint Multipath Routing Protocol Based on AODV in Mobile Ad Hoc NetworksChang-Woo Ahn, Sang-Hwa Chung, Tae Hun Kim, Su-Young Kang. 828-833 [doi]
- Localization of Pallets Based on Passive RFID TagsSeungwoo Jeon, Mikyung Choi, Gihong Kim, Bonghee Hong. 834-839 [doi]
- Cross-Layer Counter-Based Flooding without Location Information in Wireless Sensor NetworksHyo-Cheol Jeong, Ki-Deok Kwon, Younghwan Yoo. 840-845 [doi]
- Optical Multicast Routing under Light Splitter ConstraintsShadi Jawhar, Bernard Cousin. 846-851 [doi]
- D-SeDGAM: A Dynamic Service Differentiation Based GTS Allocation Mechanism for IEEE 802.15.4 WSNBerta Carballido Villaverde, Susan Rea, Dirk Pesch. 852-857 [doi]
- A Novel Two-Stage Detection Scheme for UWB Signal AcquisitionDahae Chong, Youngpo Lee, Chonghan Song, Seung Goo Kang, Seokho Yoon. 858-861 [doi]
- Accurate Assessment of Link Loss Rate in Wireless Mesh NetworksBing Qi, Saad Biaz, Fangyang Shen. 862-866 [doi]
- A Novel ML Decoding Scheme for MIMO SignalsMyungsoo Lee, Chonghan Song, Youngyoon Lee, Seokho Yoon. 867-872 [doi]
- Tracking Mobile Targets Using Wireless Sensor NetworksGoutham Mallapragada, Yicheng Wen, Shashi Phoha, Doina Bein, Asok Ray. 873-878 [doi]
- Detection of Packet Dropping in Wireless Sensor NetworksYenumula Reddy, Jan Durand, Sanjeev Kafle. 879-884 [doi]
- Derivation of Three Queue Nodes Discrete-Time Analytical Model Based on DRED AlgorithmJafar Ababneh, Hussein Abdel-jaber, Fadi A. Thabtah, Wael Hadi, Emran Badarneh. 885-890 [doi]
- The Quest for Optimum Server Location Selection in Mobile Ad Hoc Networks Utilising Threshold CryptographyAlastair Nisbet, M. A. Rashid, F. Alam. 891-896 [doi]
- Congestion Game Models for Capacity and Bandwidth Relation in Dynamic Spectrum AccessY. B. Reddy, Heather Smith, Michael Terrell. 897-902 [doi]
- Integrated Technique for Data Transmission Reliability in Metal Fill Monitoring Using Wireless Sensor NetworkYogesh D. Barve, Mohamed A. Abdelrahman, Wael A. Deabes. 903-907 [doi]
- Implementation of a Multi-radio, Multi-hop Wireless Mesh Network Using Dynamic WDS Based Link Layer RoutingSeung-Chur Yang, Mi-Kyoung Yoon, Dong-hyun Kim, Jong-Deok Kim. 908-913 [doi]
- Comparative Study of Security in IEEE 802.11-2007 and IEEE 802.15.4-2006 for Patient Monitoring EnvironmentsAftab Ahmad, Anton Riedl, W. Jason Naramore, Nee-Yin Chou, Matthew Scott Alley. 914-918 [doi]
- Scalable Intrusion Detection with Recurrent Neural NetworksLongy O. Anyanwu, Jared Keengwe, Gladys A. Arome. 919-923 [doi]
- Simulation of a Parametric Model for Interference Cancellation in Open Space EMC MeasurementFahim Gohar Awan, Noor M. Sheikh, J. Gohar. 924-928 [doi]
- A DHT-Based Process Migration Policy for Mobile ClustersY. Mohamadi Begum, M. A. Maluk Mohamed. 934-938 [doi]
- RMADV-Hop: An Improved DV-Hop Localization AlgorithmTingting Yi, Zhiyi Fang, Ruixue Li. 939-943 [doi]
- Developing an Architecture Description Language for Data Processing Product LineLi Zheng, Zhanwei Wu, Chao Zhang, Fang Yang. 944-949 [doi]
- Predicting Function Changes by Mining Revision HistoryHaroon Malik, Elhadi Shakshuki. 950-955 [doi]
- Improving Change Impact Analysis with a Tight Integrated Process and ToolGuenter Pirklbauer, Christian Fasching, Werner Kurschl. 956-961 [doi]
- A Process for Gathering Prospective Use Cases from Business ModelingElton Oliveira Ferreira, Breno Lisi Romano, Glaucia Braga e Silva, Helivelton Oliveira Ferreira, Henrique Fernandes de Campos, Adilson Marques da Cunha, Luiz Alberto Vieira Dias. 962-967 [doi]
- An Overview of the MADAE-IDE Multi-agent System Development EnvironmentUiratan Cavalcante, Rosario Girardi. 968-973 [doi]
- Service Oriented Middleware: Trends and ChallengesJameela Al-Jaroodi, Nader Mohamed, Junaid Aziz. 974-979 [doi]
- Using Semantic Inference for Software Understanding and Design RecoveryAwny Alnusair, Tian Zhao. 980-985 [doi]
- Testing the Performance of an SSAS Cube Using VSTSXin Bai. 986-991 [doi]
- An Empirical Study of Pairwise Test Set Generation Using a Genetic AlgorithmJames D. McCaffrey. 992-997 [doi]
- A Case Study of the Factors Associated with Using the F# Programming Language for Software Test AutomationJames D. McCaffrey, Adrian Bonar. 1009-1013 [doi]
- Automating Java Program Testing Using OCL and AspectJYoonsik Cheon, Carmen Avila. 1020-1025 [doi]
- Organizational Testing Management Maturity Model for a Software Product LineEtiene Lamas, Erica Ferreira, Marcos Ribeiro do Nascimento, Luiz Alberto Vieira Dias, Fabio Fagundes Silveira. 1026-1031 [doi]
- Risk-Based Testing: A Case StudyEllen Souza, Cristine Gusmão, Julio Venancio. 1032-1037 [doi]
- A Systematic Capture and Replay Strategy for Testing Complex GUI Based Java ApplicationsOmar el Ariss, Dianxiang Xu, Santosh Dandey, Bradley Vender, Philip E. McClean, Brian M. Slator. 1038-1043 [doi]
- Modeling of System Software for Computer Based TrainingJose R. G. Braga, Joice B. Mendes, Laercio A. B. Junior, Alexandre C. B. Ramos. 1051-1056 [doi]
- Automated GUI Test Coverage Analysis Using GAAbdul Rauf, Sajid Anwar, M. Arfan Jaffer, Arshad Ali Shahid. 1057-1062 [doi]
- A Framework for Normalization of Homogeneous and Semi-homogeneous E-LessonsAzita A. Bahrami. 1063-1068 [doi]
- Development of Online Laboratories for Modulation and Combinational Logic Circuit Analysis Using NI ELVIS IICosmas Mwikirize, Arthur Tumusiime Asiimwe, Lea Musasizi, Victoria Namuswa, Mary Dawn Nakasozi, Charles Mugga, Andrew Katumba, Sandy Stevens Tickodri-Togboa, Julius Butime, Paul Isaac Musasizi. 1069-1073 [doi]
- Evaluating a Cross-Language Semantically Enriched Search EngineLeyla Zhuhadar, Olfa Nasraoui. 1074-1079 [doi]
- A Prompt Response Monitoring System for the Guiding Support of Learning ActivitiesLu-Hui Huang, Chyi-Ren Dow, Yi-Hsung Li, Pa Hsuan, Wei-Luen Koo. 1080-1085 [doi]
- Smart Lifelong Learning System Based on Q-LearningAhmad A. Kardan, Omid R. B. Speily. 1086-1091 [doi]
- Constructivist Pedagogy Meets Agile Development Stephen R. Foster, Rubén Ruiz. 1092-1096 [doi]
- How Consistent Is Students Understanding of Requirements?Ronald J. Leach. 1097-1101 [doi]
- Design of Online Runtime and Testing Environment for Instant Java Programming AssessmentMinzhe Guo, Taolun Chai, Kai Qian. 1102-1106 [doi]
- A Case Study in Software ReengineeringD. Casey Tucker, Devon M. Simmonds. 1107-1112 [doi]
- Experiences on Teaching Software Engineering Concepts for the Design of Communication ProtocolsJesus Martinez Cruz. 1113-1118 [doi]
- Designing Computer Games to Teach AlgorithmsSahar S. Shabanah, Jim X. Chen, Harry Wechsler, Daniel B. Carr, Edward J. Wegman. 1119-1126 [doi]
- Applying MDA Development Approach to a Hydrological ProjectBreno Lisi Romano, Glaucia Braga e Silva, Adilson Marques da Cunha, Walter Itamar Mourao. 1127-1132 [doi]
- Mathematical Problems of Pattern Recognition for TrafficAlexander Buslaev, Marina V. Yashina, Ruslan Abushov, Igor Kotovich. 1133-1136 [doi]
- A Methodology for Assessment Database According to ISO 9126Michelle Dias de Andrade Alves, Danilo Douradinho Fernandes, Denis Avila Montini, Sergio Roberto M. Pelegrino, Paulo Marcelo Tasinaffo, Luiz Alberto Vieira Dias. 1137-1142 [doi]
- Process Model for Decision Making Using GQM approachClaudio Goncalves Bernardo, Denis Avila Montini, Danilo Douradinho Fernandes, Gabriela Maria Cabel Barbarán, Paulo Marcelo Tasinaffo, Luiz Alberto Vieira Dias. 1143-1149 [doi]
- Design of a Vehicular Code Generator for Distributed Automotive SystemsHyunchul Jo, Shiquan Piao, Wooyoung Jung. 1150-1153 [doi]
- Path Planning for Virtual Human Motion Using Improved A* Star AlgorithmJunfeng Yao, Chao Lin, Xiaobiao Xie, Andy Ju An Wang, Chih-Cheng Hung. 1154-1158 [doi]
- A WSN Energy Management Architecture Applied to the Amazonian RegionRicardo Godoi Vieira, Adilson Marques da Cunha, Fabio Fagundes Silveira. 1159-1164 [doi]
- ETL Process Model for a Manufacture Cells Production Line IntegrationHarison Pereira Bila de Carvalho, Danilo Battaglia, Denis Avila Montini, Gabriel de Souza Pereira Moreira, Luiz Alberto Vieira Dias, Paulo Marcelo Tasinaffo. 1165-1171 [doi]
- A Task Oriented Hybrid Framework for Interface Architecture DesignUmer Rashid, Muhammad Afzal Bhatti, Iftikhar Azim Niaz. 1172-1176 [doi]
- Software Product Measurement and Analysis in a Continuous Integration EnvironmentGabriel de Souza Pereira Moreira, Roberto Pepato Mellado, Denis Avila Montini, Luiz Alberto Vieira Dias, Adilson Marques da Cunha. 1177-1182 [doi]
- Design and Implementation of a Real Time Locating Systems over IEEE 802.15.4a Radio for Port LogisticsSanghyun Son, Jamje Kim, Hoon Choi, Yeonsu Jung, Yunju Baek. 1183-1188 [doi]
- Design and Implementation of Low-Power Container Security DeviceSeoung Park, Taekhyun Kim, Hoon Choi, Yunju Baek. 1189-1194 [doi]
- Operation Classification for Control Path Synthetization with NoGAPPer Karlström, Wenbiao Zhou, Dake Liu. 1195-1200 [doi]
- Architecture Design of Reconfigurable Accelerators for Demanding ApplicationsLech Józwiak, Yahya Jan. 1201-1206 [doi]
- Multiphase Interleaving Buck Converter with Input-Output Bypass CapacitorTaufik, Randyco Prasetyo, Arief Hernadi, Dodi Garinto. 1207-1211 [doi]
- VHDL Implementation of High-Performance and Dynamically Configures Multi-port Cache MemoryHassan Bajwa, Isaac Macwan, Vignesh Veerapandian, Xinghao Chen. 1212-1216 [doi]
- Flexile Middleware: Responding to Operational Demands of Critical Network-Based ApplicationsThomas A. DuBois, Richard Perry. 1217-1218 [doi]
- Two Abstractions for Distributed Systems of Mobile NodesMatthias Werner, Jan Richling, Gero Mühl. 1219-1220 [doi]
- A Case Study of the Application of UPnP in Robotic and Home Automation ServicesMercedes R. Fernández Alcalá, Ignacio González Alonso, M. P. Almudena García Fuente, Jose M. Maestre Torreblanca. 1221-1222 [doi]
- A New Approach to Hindi Text Steganography Using Matraye, Core Classification and HHK SchemeKalavathi Alla, R. Siva Rama Prasad. 1223-1224 [doi]
- A Proposal Framework for Investigating Website Success: ANFIS ApproachMona Salehi, Hosein Didehkhani, Abbas Keramati. 1225 [doi]
- Demarcating Risk Management Responsibilities of a Project ManagerMira Kajko-Mattsson. 1227-1232 [doi]
- Toward an Architecture-Based Method for Selecting Composer Components to Make Software Product LineMohammad Tanhaei, Shahrouz Moaven, Jafar Habibi. 1233-1236 [doi]
- An Extended Line-Based Approach to Detect Code Clones Using Syntactic and Lexical InformationKazuaki Maeda. 1237-1240 [doi]
- Cases of Study on the Social Effects of Online GamingJason Pitsch, Jesús Ubaldo Quevedo-Torrero. 1241-1242 [doi]
- Using a Combination of Studios, Mini-lectures, Class Blog and Wiki to Motivate Students Learning in Web Technology CoursesXuesong Zhang, Lorne Olfman. 1243-1244 [doi]
- Importance of KPI in BI System, Case Study: Iranian IndustriesMahdi Seify. 1245-1246 [doi]
- Internet Usage Pattern by Female Students: A Case StudyRozita Jamili Oskouei, B. D. Chaudhary. 1247-1250 [doi]
- Person Wide Web for Ubiquitous Computing: Ubiquitous Version of WWWBokdong Choi, Seongbae Eun, Sun Sup So, Kyoung Jun Lee, Byungho Kim. 1251-1252 [doi]
- Tagging Resources, Tagging CommunitiesLylia Abrouk, David Gross-Amblard, Nadine Cullot, Virginie Thion-Goasdoué. 1253-1254 [doi]
- GOSPL: Grounding Ontologies with Social Processes and Natural LanguageChristophe Debruyne, Quentin Reul, Robert Meersman. 1255-1256 [doi]
- Twitter Quo Vadis: Is Twitter Bitter or Are Tweets Sweet?Brian P. Blake, Nitin Agarwal, Rolf T. Wigand, Jerry D. Wood. 1257-1260 [doi]
- Node Behavior Classification in Mobile Ad Hoc NetworksJun Liu, Ning Ye, Bin Zhao. 1263-1264 [doi]
- XER: A Recommendation for XML ElementSutheetutt Vacharaskunee, Sarun Intakosum. 1265-1266 [doi]
- A Framework for Identifying the Factors Affecting on IOS Development Based on System ApproachAyoub Mohammadian, Kimia Hassanzadeh, Babak Akhgar. 1267-1268 [doi]
- An E-Ambulatory Healthcare System Using Mobile NetworkAfsaneh Rahbar. 1269-1273 [doi]
- Symmetric Rearrangeable Networks: Algorithms and Rearrangement LimitsAmitabha Chakrabarty, Martin Collier, Sourav Mukhopadhyay. 1274-1277 [doi]
- Trend Ontology for Knowledge-Based Trend Mining in Textual InformationOlga Streibel, Malgorzata Mochol. 1285-1288 [doi]
- Experiments with Simple Iris Recognition for Mobile PhonesStan Kurkovsky, Tommy Carpenter, Caleb MacDonald. 1293-1294 [doi]
- Software Development Productivity Prediction of Small Programs Using Fuzzy LogicCuauhtémoc López Martín, Ivica Kalichanin-Balich, Maria Elena Meda-Campaña, Arturo Chavoya-Pena. 1295-1297 [doi]
- A Training Program of Differential Diagnosis Skills Based on Virtual Reality and Artificial IntelligenceJosé Gutiérrez-Maldonado, Claudia Penaloza, Adolfo José Jarne-Esparcia, Antoni Talarn, Antonio Andrés-Pueyo, Angel Aguilar-Alonso, Marta Ferrer. 1298-1299 [doi]
- Change Management and Quality of Service through Business Process Modeling: The N-VIS, a Public Sector ProjectVassilis Loumos, George Christonakis, Girgios Mpardis, Pangiota Tziova. 1300-1303 [doi]
- Formal Approach Use to Choose a Software Manufactoring Cell s SDLCDenis Avila Montini, Danilo Douradinho Fernandes, Francisco Supino Marcondes, Paulo Marcelo Tasinaffo, Ítalo Santiago Vega, Luiz Alberto Vieira Dias. 1304-1305 [doi]
- An Algorithm Model to Mapping Mealy Machines for a Software Manufacture Cell Petri NetDanilo Douradinho Fernandes, Felipe Rafael Motta Cardoso, Denis Avila Montini, Francisco Supino Marcondes, Paulo Marcelo Tasinaffo, Luiz Alberto Vieira Dias. 1306-1308 [doi]
- Syntactic Patterns Recognition Applied to the APF AnalysesStrauss C. Carvalho, Denis Avila Montini, Felipe Rafael Motta Cardoso, Alander Santos, Danilo Douradinho Fernandes, Paulo Marcelo Tasinaffo. 1309-1311 [doi]
- A UML Extension to Graphically Represent Aspect Oriented Systems PerspectivesHelivelton Oliveira Ferreira, Luiz Alberto Vieira Dias. 1312-1313 [doi]
- The Impact of View Spacing in Multi-view Video Compression EfficiencyM. Abdoli, M. Soryani, A. F. Aminian Modarres. 1314-1315 [doi]
- A Set Associative Cache ArchitectureS. Subha. 1316-1317 [doi]
- Color Image Compression Using Wavelet and Ridgelet TransformM. S. Joshi, R. R. Manthalhkar, Y. V. Joshi. 1318-1321 [doi]
- Online Learning Communities to Recruit and Retain Students in Information Technology ProgramsAnu A. Gokhale, Kenton F. Machina. 1322-1323 [doi]
- Channel Access Comparison of IEEE 802.11-2007 and IEEE 802.15.4-2006Aftab Ahmad, Anton Riedl, W. Jason Naramore, Nee-Yin Chou, Matthew Alley. 1324-1325 [doi]