Abstract is missing.
- Analysis of Nonstationary Extreme EventsNorbert A. Agana, Mohammad Gorji Sefidmazgi, Abdollah Homaifar. 7-11 [doi]
- A Comparative Study of Graphical and Alphanumeric Passwords for Mobile Device AuthenticationMohd Anwar, Ashiq Imran. 13-18 [doi]
- Multispectral Recognition Using Genetic and Evolutionary Feature ExtractionPablo A. Arias, Joseph Shelton, Kaushik Roy, Gerry V. Dozier, Foysal Ahmad. 19-24 [doi]
- Hiding Color Images in DNA SequencesMarc B. Beck, Roman V. Yampolskiy. 25-29 [doi]
- A Data Framework to Understand the Lived Context for Dementia Caregiver EmpowermentMarta Belay, Charles Henry, Daran Wynn, Tonya Smith-Jackson. 31-37 [doi]
- Establishing a Human Baseline for the Winograd Schema ChallengeDavid Bender. 39-45 [doi]
- A Multiagent and Workflow System for Structural Health Monitoring Using the Contract Net Protocol and AlternativesGina Bullock, William Nick, Kassahun Asamene, Albert C. Esterline. 47-54 [doi]
- Fast Dominating Set Algorithms for Social NetworksAlina Campan, Traian Marius Truta, Matthew Beckerich. 55-62 [doi]
- Contextual Binding and Deception DetectionJim Q. Chen. 63-67 [doi]
- System RDC: Relevant Data Condenser: A Knowledge System for a Cloud-immersed CultureEric Ciminelli, Jennifer Seitzer. 69-73 [doi]
- The Hunch Factor: Exploration into Using Fuzzy Logic to Model Intuition in Particle Swarm OptimizationStephany Coffman-Wolph. 75-82 [doi]
- Back-Projective Priming: Toward Efficient 3d Model-based Object Recognition via Preemptive Top-down ConstraintsRyan Dellana. 91-96 [doi]
- GAIL: A Genetics Argumentation Inquiry Learning SystemNancy L. Green, Mark Hinshaw, Carl Martensen, Meghana Narasimhan, Tshering Tobgay. 97-101 [doi]
- Examining Security Risks of Mobile Banking Applications through Blog MiningWu He, Xin Tian, Jiancheng Shen. 103-108 [doi]
- Towards Extracting Domains from Research PublicationsShilpa Lakhanpal, Ajay Gupta, Rajeev Agrawal. 117-120 [doi]
- A Game-Theoretic Intelligent Agent for the Board Game Football StrategySean McCulloch. 121-125 [doi]
- A Study of Supervised Machine Learning Techniques for Structural Health MonitoringWilliam Nick, Joseph Shelton, Kassahun Asamene, Albert C. Esterline. 133-138 [doi]
- Image Reduction Using Assorted Dimensionality Reduction TechniquesAugustine S. Nsang, Abdullahi Musa Bello, Hammed Shamsudeen. 139-146 [doi]
- On Fuzzification of Color Spaces for Medical Decision Support in Video Capsule EndoscopyV. B. Surya Prasath. 147-151 [doi]
- Similarity Measure for Social Networks - A Brief SurveyAhmad Rawashdeh, Anca L. Ralescu. 153-159 [doi]
- A Generalized Protocol for Mobile Authentication in Healthcare SystemsEric Reinsmidt, Li Yang. 161-165 [doi]
- A Comparison of Time Series Model Forecasting Methods on Patent GroupsMick Smith, Rajeev Agrawal. 167-173 [doi]
- Massively Parallel kNN using CUDA on Spam-ClassificationJoshua M. Smithrud, Patrick McElroy, Razvan Andonie. 175-180 [doi]
- IPRed: Instance Reduction Algorithm Based on the Percentile of the PartitionsTurki Turki, Zhi Wei. 181-185 [doi]