Abstract is missing.
- A Mobile Head-Mounted Display for Action SportsReynald Hoskinson, Etienne Naugle. 1-4 [doi]
- Connectivity Analysis of Mobile Ad Hoc Networks Using Destination Guided Mobility ModelsMd. Azizur Rahman, Alex Aravind. 5-12 [doi]
- An Empirical Case of a Context-Aware Mobile Recommender System in a Banking EnvironmentDaniel Gallego, Gabriel Huecas. 13-20 [doi]
- A Proxy-Based Mobile Computing InfrastructureAzade Khalaj, Hanan Lutfiyya, Mark Perry. 21-28 [doi]
- Real-Time Collaborative Video Watching on Mobile Devices with REST ServicesSusan Juan Pan, Li Li 0001, Wu Chou. 29-34 [doi]
- Density Maps: Determining Where to Sample in Participatory Sensing SystemsDiego Mendez, Miguel A. Labrador. 35-40 [doi]
- Query-by-Humming/Singing of MIDI and Audio Files by Fuzzy Inference SystemYo-Ping Huang, Shin-Liang Lai, Tsun-Wei Chang, Maw-Sheng Horng. 41-46 [doi]
- Location-Based Large-Scale Landmark Image Recognition Scheme for Mobile DevicesDaehoon Kim, Eenjun Hwang, Seungmin Rho. 47-52 [doi]
- Generating OWL Ontology from Relational DatabaseJi-Woong Choi, Myung Ho Kim. 53-59 [doi]
- Characterizing User Behavior in WeiboZhengbiao Guo, Zhitang Li, Hao Tu, Long Li. 60-65 [doi]
- An Adjustable Heuristic for Offset Assignment Problems in Embedded System DesignTong-Chai Wang. 66-71 [doi]
- UVote: A Ubiquitous E-voting SystemReem Abdelkader, Moustafa Youssef. 72-77 [doi]
- Evaluating Success of Innovation Ideas in Social Computing Technologies Using Fuzzy Expert SystemAhmad Nadali, Pouria Goldasteh, Mohammad Ghazivakili, Sami Ahmari. 78-83 [doi]
- Recommend Significant Tags to Travel Photos Based on Web MiningJin-Yao Wang, Yu-Lun Chang, Wei-Sheng Zeng, Shian-Hua Lin. 84-89 [doi]
- Building a Semantic Social Network Based on Interpersonal RelationshipsKee-Sung Lee, Myung-Duk Hong, Jin-Guk Jung, GeunSik Jo. 90-95 [doi]
- Application of Internet of Things in Smart Grid Power TransmissionQinghai Ou, Yan Zhen, Xiangzhen Li, Yi-Ying Zhang, Lingkang Zeng. 96-100 [doi]
- Efficient Group Key Management in Wireless LANsCelia Li, Uyen Trang Nguyen. 101-108 [doi]
- Database Encryption Implementation and Analysis Using Graphics Processing UnitInkyung Jeun, Hyun-Chul Jung, Nan Ki Lee, Dongho Won. 109-113 [doi]
- Credit Card Fraud Detection: Personalized or Aggregated ModelMohammed Ibrahim Alowais, Lay-Ki Soon. 114-119 [doi]
- A Privacy-Preserving Biometric Matching Protocol for Iris Codes VerificationKok Seng Wong, Myung Ho Kim. 120-125 [doi]
- Modeling Context-Aware RBAC Models for Business Processes in Ubiquitous Computing EnvironmentsSigrid Schefer-Wenzl, Mark Strembeck. 126-131 [doi]
- A Multiple Watermarking Scheme for Color ImagesHui-Wen Liao. 132-137 [doi]
- Secure OTP and Biometric Verification Scheme for Mobile BankingChang-Lung Tsai, Chun-Jung Chen, Deng-Jie Zhuang. 138-141 [doi]
- An Architecture Proposal for User-Generated Mobile ServicesDirk Werth, Andreas Emrich, Alexandra Chapko. 142-147 [doi]
- Quality-Optimized Authentication of Scalable Media Streams with Flexible Transcoding over Wireless NetworksXiaowei Yi, Mingyu Li, Gang Zheng, Changwen Zheng. 148-153 [doi]
- Data Overhead Impact of Multipath Routing for Multicast in Wireless Mesh NetworksYi Zheng, Uyen Trang Nguyen, Hoang Lan Nguyen. 154-157 [doi]
- A Secure Multicast Scheme for Wireless Sensor NetworksQian Yu, Chang N. Zhang. 158-163 [doi]
- Target Identification Using Multifrequency Radar Sensor NetworksJen-Shiun Chen. 164-169 [doi]
- A SINR Guaranteed Power and Spectrum Allocation Algorithm for Cognitive NetworksGang Hu, Lixia Liu, Ming Xu. 170-175 [doi]
- A Multi-level Fuzzy Comprehensive Evaluation Approach for Message Verification in VANETsBo-Chao Cheng, Guo-Tan Liao, Chun-Yu Chen, Huan Chen 0002. 176-181 [doi]
- Convergence Time of Wang's kWTA Network with Stochastic Output NodesKevin I.-J. Ho, Wei-Bin Lee, Siu-Chung Lau, John Sum. 182-187 [doi]
- A Node Control Model for the Charging and Accounting Problem in MANETsInna Kofman, Uyen Trang Nguyen, Hoang Lan Nguyen. 188-194 [doi]
- Deployment of Flow-Sensors in Internet of Things' Virtualization via OpenFlowArif Mahmud, Rahim Rahmani, Theo Kanter. 195-200 [doi]
- Evaluation of Base Station Placement Scenarios for Mobile Node LocalizationA. Bais, Yasser L. Morgan. 201-206 [doi]
- Mesh Network Deployment to Ensure Global ReachabilityShah Mostafa Khaled, Robert Benkoczi, Yuanzhu Peter Chen. 207-213 [doi]
- Towards Global Connectivity by Joint Routing and Scheduling in Wireless Mesh NetworksStephen Atambire Nsoh, Robert Benkoczi. 214-219 [doi]
- Coverage-Based Placement in RFID Networks: An OverviewAshraf E. Al-Fagih, Fadi M. Al-Turjman, Hossam S. Hassanein, Waleed Alsalih. 220-224 [doi]
- The Use of Artificial Neural Network in the Classification of EMG SignalsMd. Rezwanul Ahsan, Muhammad Ibn Ibrahimy, Othman Omran Khalifa. 225-229 [doi]
- Service-Oriented Wireless Multimedia Sensor Network Middleware Using Infra-Red CamerasFatemeh Sheikhha, Mohsen Ebrahimi Moghaddam. 230-235 [doi]
- An Electric Power Asset Localization Scheme Based on LLA and ZigBeeRuixue Li, Jianming Liu, Xiangzhen Li. 236-239 [doi]
- A Source-Based Share-Tree Like Multicast Routing in Satellite Constellation NetworksYanpeng Ma, Jinshu Su, Chunqing Wu, Xiaofeng Wang, Wanrong Yu, BaoKang Zhao, Xiaofeng Hu. 240-245 [doi]
- HIPAA and QMS Based Architectural Requirements to Cope with the OCR Audit ProgramSyeda Uzma Gardazi, Arshad Ali Shahid, Christine Salimbene. 246-253 [doi]
- Implementation of Network Framework for Development and Integration of Network-Based Humanoid Robot SystemJoo-Hyung Kim, Ho-Dong Lee, Gwi-Tae Park, Jung Min Park. 254-259 [doi]
- Evaluation of WiFi-Based Indoor (WBI) Positioning AlgorithmAhed Aboodi, Tat Chee Wan. 260-264 [doi]