Abstract is missing.
- A New Approach for Fingerprint Matching Using Logic SynthesisFatih Basçiftçi, Celal Karaca. 1-6 [doi]
- Extracting Fuzzy Rules to Classify Motor Imagery Based on a Neural Network with Weighted Fuzzy Membership FunctionsSang-Hong Lee, Joon S. Lim, Dong-Kun Shin. 7-14 [doi]
- Distributed Data-Mining in the LISp-Miner System Using Techila GridMilan Simunek, Teppo Tammisto. 15-20 [doi]
- Non-negative Matrix Factorization on GPUJan Platos, Petr Gajdos, Pavel Krömer, Václav Snásel. 21-30 [doi]
- Chatbot Enhanced Algorithms: A Case Study on Implementation in Bahasa Malaysia Human LanguageAbbas Saliimi Lokman, Jasni Mohamad Zain. 31-44 [doi]
- Handwritten Digits Recognition Based on Swarm Optimization MethodsSalima Nebti, Abdellah Boukerram. 45-54 [doi]
- A Framework of Dashboard System for Higher Education Using Graph-Based Visualization TechniqueWan Maseri Binti Wan Mohd, Abdullah Embong, Jasni Mohamad Zain. 55-69 [doi]
- An Efficient Indexing and Compressing Scheme for XML Query ProcessingI-En Liao, Wen-Chiao Hsu, Yu-Lin Chen. 70-84 [doi]
- Development of a New Compression SchemeEyas El-Qawasmeh, Ahmed Mansour, Mohammad Al-Towiq. 85-90 [doi]
- Compression of Layered DocumentsBruno Carpentieri. 91-97 [doi]
- Classifier Hypothesis Generation Using Visual Analysis MethodsChristin Seifert, Vedran Sabol, Michael Granitzer. 98-111 [doi]
- Exploiting Punctuations along with Sliding Windows to Optimize STREAM Data ManagerLokesh Tiwari, Hamid Shahnasser. 112-119 [doi]
- A Framework for In-House Prediction MarketsMiguel Velacso, Nenad Jukic. 120-127 [doi]
- Road Region Extraction Based on Motion Information and Seeded Region Growing for Foreground DetectionHongwu Qin, Jasni Mohamad Zain, Xiuqin Ma, Tao Hai. 128-134 [doi]
- Process Mining Approach to Promote Business Intelligence in Iranian Detectives PoliceMehdi Ghazanfari, Mohammad Fathian, Mostafa Jafari, Saeed Rouhani. 135-142 [doi]
- Copyright Protection of Relational Database SystemsAli Al-Haj, Ashraf Odeh, Shadi Masadeh. 143-150 [doi]
- Resolving Semantic Interoperability Challenges in XML Schema MatchingChiw Yi Lee, Hamidah Ibrahim, Mohamed Othman, Razali Yaakob. 151-162 [doi]
- Some Results in Bipolar-Valued Fuzzy ::::BCK::::/::::BCI::::-AlgebrasA. Borumand Saeid, M. Kuchaki Rafsanjani. 163-168 [doi]
- The Effect of Attentiveness on Information SecurityAdeeb M. Alhomoud. 169-174 [doi]
- A Secured Mobile Payment Model for Developing MarketsBossi Masamila, Fredrick Mtenzi, Jafari Said, Rose Tinabo. 175-182 [doi]
- Security Mapping to Enhance Matching Fine-Grained Security PoliciesMonia Ben Brahim, Maher Ben Jemaa, Mohamed Jmaiel. 183-196 [doi]
- Implementation and Evaluation of Fast Parallel Packet Filters on a Cell ProcessorYoshiyuki Yamashita, Masato Tsuru. 197-212 [doi]
- On the Algebraic Expression of the AES S-Box Like S-BoxesM. Tolga Sakalli, Bora Aslan, Ercan Bulus, Andac Sahin Mesut, Fatma Büyüksaraçoglu, Osman Karaahmetoglu. 213-227 [doi]
- Student's Polls for Teaching Quality Evaluation as an Electronic Voting SystemMarcin Kucharczyk. 228-233 [doi]
- An Improved Estimation of the RSA Quantum Breaking Success RatePiotr Zawadzki. 234-240 [doi]
- Mining Bluetooth Attacks in Smart PhonesSeyed Morteza Babamir, Reyhane Nowrouzi, Hadi Naseri. 241-253 [doi]
- Users Acceptance of Secure Biometrics Authentication System: Reliability and Validate of an Extended UTAUT ModelFahad Al-Harby, Rami Qahwaji, Mumtaz Kamala. 254-258 [doi]
- Two Dimensional Labelled Security Model with Partially Trusted Subjects and Its Enforcement Using SELinux DTE MechanismJaroslav Janácek. 259-272 [doi]
- A Roaming-Based Anonymous Authentication Scheme in Multi-domains Vehicular NetworksChih-Hung Wang, Po-Chin Lee. 273-287 [doi]
- Aerial Threat Perception Architecture Using Data MiningM. Anwar-ul-Haq, Asad Waqar Malik, Shoab A. Khan. 297-305 [doi]
- Payload Encoding for Secure Extraction Process in Multiple Frequency Domain SteganographyRaoof Smko, Abdelsalam Almarimi, K. Negrat. 306-313 [doi]
- An Implementation of Digital Image Watermarking Based on Particle Swarm OptimizationHai Tao, Jasni Mohamad Zain, Ahmed N. Abd Alla, Hongwu Qin. 314-320 [doi]
- Genetic CryptanalysisAbdelwadood Mesleh, Bilal Zahran, Anwar Al-Abadi, Samer Hamed, Nawal Al-Zabin, Heba Bargouthi, Iman Maharmeh. 321-332 [doi]
- Multiple Layer Reversible Images Watermarking Using Enhancement of Difference Expansion TechniquesShahidan M. Abdullah, Azizah A. Manaf. 333-342 [doi]
- Modeling and Analysis of Reconfigurable Systems Using Flexible NetsKahloul Laid, Chaoui Allaoua, Karim Djouani. 343-357 [doi]
- Using Privilege Chain for Access Control and Trustiness of Resources in Cloud ComputingJong P. Yoon, Z. Chen. 358-368 [doi]
- Modeling of Trust to Provide Users Assisted Secure Actions in Online CommunitiesLenuta Alboaie, Mircea-F. Vaida. 369-382 [doi]
- A Collaborative Social Decision Model for Digital Content Credibility ImprovementYuan-Chu Hwang. 383-390 [doi]
- Improving Similarity-Based Methods for Information Propagation on Social NetworksFrancesco Buccafurri, Gianluca Lax. 391-401 [doi]
- Approaches to Privacy Protection in Location-Based ServicesAnna Rohunen, Jouni Markkula. 402-409 [doi]
- Social Media as Means for Company Communication and Service DesignElina Annanperä, Jouni Markkula. 410-419 [doi]
- A Problem-Centered Collaborative Tutoring System for Teachers Lifelong Learning: Knowledge Sharing to Solve Practical Professional ProblemsThierry Condamines. 420-429 [doi]
- Bridging the Gap between Web 2.0 Technologies and Social Computing PrinciplesGiorgos Kormaris, Marco Spruit. 430-443 [doi]
- Using Similarity Values for Ontology Matching in the GridAxel Tenschert. 444-450 [doi]
- Rapid Creation and Deployment of Communities of Interest Using the CMap Ontology Editor and the KAoS Policy Services FrameworkAndrzej Uszok, Jeffrey M. Bradshaw, Thomas C. Eskridge, James Hanna. 451-466 [doi]
- Incorporating Semantics into an Intelligent Clothes Search System Using OntologyChing-I Cheng, Damon Shing-Min Liu, Li-Ting Chen. 467-472 [doi]
- SPPODL: Semantic Peer Profile Based on Ontology and Description LogicYounes Djaghloul, Zizette Boufaïda. 473-488 [doi]
- Ontology Based Tracking and Propagation of Provenance MetadataMiroslav Vacura, Vojtech Svátek. 489-496 [doi]
- A Real-Time In-Air Signature Biometric Technique Using a Mobile Device Embedding an AccelerometerJavier Guerra Casanova, Carmen Sánchez Ávila, Alberto de Santos Sierra, G. Bailador del Pozo, V. Jara Vera. 497-503 [doi]
- On-Demand Biometric Authentication of Computer Users Using Brain WavesIsao Nakanishi, Chisei Miyamoto. 504-514 [doi]
- Encrypting Fingerprint Minutiae Templates by Random QuantizationBian Yang, Davrondzhon Gafurov, Christoph Busch, Patrick Bours. 515-522 [doi]
- Method for Countering Social Bookmarking Pollution Using User SimilaritiesTakahiro Hatanaka, Hiroyuki Hisamatsu. 523-528 [doi]
- A Human Readable Platform Independent Domain Specific Language for WSDLBalazs Simon, Balázs Goldschmidt. 529-536 [doi]
- A Human Readable Platform Independent Domain Specific Language for BPELBalazs Simon, Balázs Goldschmidt, Károly Kondorosi. 537-544 [doi]
- Impact of the Multimedia Traffic Sources in a Network Node Using FIFO schedulerTatiana Annoni Pazeto, Renato Moraes Silva, Shusaburo Motoyama. 545-555 [doi]
- Assessing the LCC Websites QualitySaleh Alwahaishi, Václav Snásel. 556-565 [doi]
- Expediency Heuristic in University Conference WebpageRoslina Mohd Sidek, Noraziah Ahmad, Mohammad Fadel Jamil Klaib, Mohd Helmy Abd Wahab. 566-576 [doi]