Abstract is missing.
- New challenges for universities in the knowledge triangleGabriele Kotsis. 1 [doi]
- Cloud architecture: a preliminary lookWon Kim. 2-6 [doi]
- How the cloud computing paradigm could shape the future of enterprise information processingAmin Anjomshoaa, A. Min Tjoa. 7-10 [doi]
- Data integration in a collaborative decision support system: a three-way collaboration effort between university, industry, and international standard bodyJ. Wenny Rahayu. 11 [doi]
- A novel technique for singular point detection based on Poincaré indexLi Wang, Nandita Bhattacharjee, Bala Srinivasan. 12-18 [doi]
- On the commonality of iris biometricsParman Sukarno, Nandita Bhattacharjee, Bala Srinivasan. 19-25 [doi]
- Implicit context awareness by face recognitionSeiji Takeda, Tsutomu Terada, Masahiko Tsukamoto. 26-33 [doi]
- Long term carefully learning for person detection application to intelligent surveillance systemNguyen Dang Binh. 34-41 [doi]
- Untraceable, anonymous and fair micropayment schemeAndreu Pere Isern-Deyà, Magdalena Payeras-Capellà, Macià Mut Puigserver, Josep Lluís Ferrer-Gomila. 42-49 [doi]
- On detection of changes in sensor data streamsDang-Hoan Tran, Kai-Uwe Sattler. 50-57 [doi]
- Data gathering using mobile agents in dense mobile wireless sensor networksKeisuke Goto, Yuya Sasaki, Takahiro Hara, Shojiro Nishio. 58-65 [doi]
- Efficient in-network aggregation for wireless sensor networks with fine grain location-based clusterMaznah Kamat, Abdul Samad Ismail, Stephan Olariu. 66-71 [doi]
- Web-enabled smart home using wireless node infrastructureTeddy Mantoro, Media A. Ayu, Elbara E. Elnour. 72-79 [doi]
- Neighborhood discovery in a wireless sensor networksShazirawati Mohd Puzi, Shaharuddin Salleh, Ruzana Ishak, Stephan Olariu. 80-86 [doi]
- A generic middleware framework for handling process intensive hybrid cloud services from mobilesHuber Flores, Satish Narayana Srirama, Carlos Paniagua. 87-94 [doi]
- Improving travel information access with semantic search application on mobile environmentTuan-Dung Cao, Nguyen-Dat Tuan. 95-102 [doi]
- A multimedia quorum-based (MQB) protocol in P2P overlay networksTadateru Ohkawara, Ailixier Aikebaier, Tomoya Enokido, Makoto Takizawa. 103-109 [doi]
- Performance evaluation for different settings of crossover and mutation rates considering number of covered users: a case studyLeonard Barolli, Evjola Spaho, Tetsuya Oda, Admir Barolli, Fatos Xhafa, Makoto Takizawa. 110-115 [doi]
- A method to reduce waiting time for close-range broadcastingYusuke Gotoh, Tomoki Yoshihisa, Hideo Taniguchi, Masanori Kanazawa, Wenny Rahayu, Yi-Ping Phoebe Chen. 116-122 [doi]
- A method to control LED blinking for position detection of devices on conductive clothesNaoya Isoyama, Tsutomu Terada, Junichi Akita, Masahiko Tsukamoto. 123-130 [doi]
- Online multiple tasks one-shot learning of object categories and visionNguyen Dang Binh. 131-138 [doi]
- QoS-aware multipath-TCP extensions for mobile and multimedia applicationsCodé Diop, Guillaume Dugué, Christophe Chassot, Ernesto Exposito. 139-146 [doi]
- Robust GME in encoded MPEG videoVahid Kiani, Hamid Reza Pourreza. 147-154 [doi]
- Can Skype be used beyond video calling?Georgios Exarchakos, Vlado Menkovski, Antonio Liotta. 155-161 [doi]
- Query-based data aggregation within WSN through Monte Carlo simulationSami J. Habib, Paulvanna Nayaki Marimuthu. 162-168 [doi]
- A routing strategy for non-cooperation wireless multi-hop ad hoc networksDung T. Tran, Trang T. M. Truong. 169-174 [doi]
- Online multiple object tracking by hierarchical association of detection responsesLoc Huynh, Dat Nguyen, Thang Ba Dinh, Tien Ba Dinh. 175-181 [doi]
- A pure P2P paradigm for query processing in mobile ad-hoc networksThao P. Nghiem, Agustinus Borgy Waluyo. 182-189 [doi]
- An efficient audio fingerprint design for MP3 musicChih-Chin Liu, Po-Feng Chang. 190-193 [doi]
- Model driven development for data-centric sensor network applicationsNguyen Xuan Thang, Michael Zapf, Kurt Geihs. 194-197 [doi]
- Analysis of ISB watermarking model: block based methods vs embedding repetition methodsAkram M. Zeki, Azizah A. Manaf, Shayma'a S. Mahmod. 198-201 [doi]
- Issues on information dissemination and routing in wireless sensor networksQuan Le Trung, Minh-Son Nguyen. 202-205 [doi]
- Technique for privacy preserving real-time vehicle tracking using 802.11p technologyJaipal Singh. 206-209 [doi]
- A simple modeling method for mobile password schemes and its analysisSung-Hwan Kim, Kwanghwi Kim, Hwan-Gue Cho. 210-213 [doi]
- Can altruism spare energy in ad hoc networking?Minh Tri Tran, Vilmos Simon. 214-217 [doi]
- Smart books: adding context-awareness and interaction to electronic booksWolfgang Beer, Alexander Wagner. 218-222 [doi]
- TASKREC: a task-based user interface for smart spacesChuong Cong Vo, Seng Wai Loke, Torab Torabi, T. Nguyen. 223-226 [doi]
- Situation semantics for things: everyday artifacts that come with pre-specified behavioursSeng Wai Loke. 227-230 [doi]
- Pag cloud: a method to show an image setEmanuela De Vita, Ivan Marcialis, Valentina Marotto, Gavino Paddeu. 231-235 [doi]
- Adaptation for enriching services taking into account mobile contextual featuresMaría Paula Arias-Báez, Luis Guillermo Torres-Ribero, Angela Carrillo Ramos, Alexandra Pomares Quimbaya, Enrique González. 236-239 [doi]
- Automatic player detection, tracking and mapping to field model for broadcast soccer videosQuang Tran, Bac Vo, Tien Dinh, Duc Duong. 240-243 [doi]
- A framework for long-term archiving of pervasive device informationReza Rawassizadeh, Amin Anjomshoaa, Martin Tomitsch. 244-247 [doi]
- Multimedia curriculum for an introductory course for information technologistTony de Souza-Daw, Ondris Pui, Ngoc Hoang Le. 248-251 [doi]
- Advanced images research based on an ontological extensionYassine Ayadi, Ikram Amous, Faïez Gargouri. 252-255 [doi]
- Mobile phones security: the spread of malware via MMS and Bluetooth, prevention methodsMohamed Ghallali, Driss El Ouadghiri, Mohammad Essaaidi, Mohamed Boulmalf. 256-259 [doi]
- Puebla in the palm of your handsFernando Zacarías, Rosalba Cuapa, Antonio Sánchez, Iris Cerecedo. 260-263 [doi]
- Application development of mobile Transjakarta route map: (case study: Jakarta Indonesia)Qurrotul Aini, Bakri La Katjong, Elsy Rahajeng dan Kartika Sari Puteri. 264-267 [doi]
- Feature interaction analysis in mobile phones: on the borderline between application functionalities and platform componentsMichael Lettner, Michael Tschernuth, Rene Mayrhofer. 268-272 [doi]
- A highly flexible and light mobile service oriented architectureSteven Rigby, Victor Guana, Francisco Rueda. 273-276 [doi]
- Featured concurrency of mobile ad hoc computingPhan Cong Vinh. 277-280 [doi]
- Material detection based on fractal approachDo Nang Toan, Le Thi Kim Nga. 281-284 [doi]
- Designing gestures for hands and feet in daily lifeTetsuya Yamamoto, Tsutomu Terada, Masahiko Tsukamoto. 285-288 [doi]
- Exploring end-user preferences of 3D mobile interactive navigation designAdamu I. Abubakar, Teddy Mantoro, Media A. Ayu, Murni Mahmud. 289-292 [doi]
- Policy-based security management in mobile environmentsMhammed Chraibi, Hamid Harroud, Ahmed Karmouch. 293-296 [doi]
- Surrogate object based data mining for distributed mobile systemsRavimaran Shanmugam, Maluk Mohamed. 297-300 [doi]