Abstract is missing.
- Efficient Research in Community Semantic Overlay NetworksGilles Nachouki, Mohamed Quafafou. 1-11 [doi]
- Modeling Push-Based Live P2P Streaming by Stochastic Activity NetworksPeiqing Zhang, Bjarne E. Helvik. 12-23 [doi]
- Viral Message Passing Framework for Crowd and Sensor ApplicationsEiman Kanjo, Elisabeth Platzer, Christian Kittl. 24-33 [doi]
- Practical Analysis of xDR Based Signaling Network Performance and End-to-End QoSNermina Basic, Vlatko Lipovac, Adriana Lipovac. 34-45 [doi]
- Validating Applicability of Smart-M3 Platform for a Multi-vendor Micropayment System in the Context of Small BusinessAnna Rohunen, Matti Eteläperä, Kari Liukkunen, Kai Wen Chan, Tero Tulppo. 46-53 [doi]
- A Metamodeling and Transformation Approach for Knowledge ExtractionInaya Lahoud, Davy Monticolo, Vincent Hilaire, Samuel Gomes. 54-68 [doi]
- An SQA e-Learning System for Agile Software DevelopmentNada Bajnaid, Rachid Benlamri, Boris I. Cogan. 69-83 [doi]
- Context-Driven and Service Oriented Semantic Mediation in DaaS CompositionIdir Amine Amarouche, Karim Benouaret, Djamal Benslimane, Zaia Alimazighi, Michael Mrissa. 84-98 [doi]
- Interlinking Scientific Authors with the LOD Cloud: A Case StudyAtif Latif, Patrick Höfler, Klaus Tochtermann. 99-108 [doi]
- Multi-Viewpoints Ontology Alignment Based on Description LogicsLynda Djakhdjakha, Mounir Hemam, Zizette Boufaïda. 109-122 [doi]
- Ontology-Based Database Multi-representation Using Viewpoints and ViewsChahinez Bachtarzi, Fouzia Benchikha. 123-135 [doi]
- Well-Founded IT Architecture Ontology: An Approach from a Service Continuity PerspectiveHedwio Carvalho e Silva, Rita de Cassia Cordeiro de Castro, Marcos Jose Negreiros Gomes, Anilton Salles Garcia. 136-150 [doi]
- A Cross Layer Energy Efficient Security Mechanism for Denial of Sleep Attacks on Wireless Sensor NetworkDjallel Eddine Boubiche, Azeddine Bilami, Samir Athmani. 151-164 [doi]
- Architecting Interoperable Privacy within User-Centric Federated Digital Identity Systems: Overview of a Service-Oriented Implementation FrameworkGhazi Ben Ayed, Solange Ghernaouti-Helie. 165-177 [doi]
- Bypassing Workflow Satisfiability Problem Due to Access Control ConstraintsHanan El Bakkali. 178-191 [doi]
- Cloud-Ready Biometric System for Mobile Security AccessF. Omri, R. Hamila, S. Foufou, M. Jarraya. 192-200 [doi]
- Detection of Attacks for Restoring Privacy of Users to Improve Mobile Collaborative Learning (MCL) over Heterogeneous NetworkAbdul Razaque, Khaled M. Elleithy. 201-216 [doi]
- Digital Image Steganography: An FFT ApproachTamer F. Rabie. 217-230 [doi]
- Evaluation of Acceleration Algorithm for Biometric IdentificationSerina Egawa, Ali Ismail Awad, Kensuke Baba. 231-242 [doi]
- High-Capacity Image Steganography Based on Overlapped Pixel Differences and Modulus FunctionEl-Sayed M. El-Alfy, Azzat A. Al-Sadi. 243-252 [doi]
- Improved Personal Identification Using Face and Hand Geometry Fusion and Support Vector MachinesEl-Sayed M. El-Alfy, Galal M. BinMakhashen. 253-261 [doi]
- Leveraging Cognitive Principles to Improve Security VisualizationMatthew Dunlop, William Urbanski, Randy C. Marchany, Joseph G. Tront. 262-276 [doi]
- LPC-Based Narrowband Speech SteganographyDriss Guerchi, Emad Eldin Mohamed. 277-288 [doi]
- Toward a Threat Model for Energy-Harvesting Wireless Sensor NetworksAlessio Di Mauro, Davide Papini, Roberto Vigo, Nicola Dragoni. 289-301 [doi]
- A New Algorithm for Watermarking Colour Images Using the Green ChannelKamal A. Ahmed, Hussain Al-Ahmad, Patrick Gaydecki. 302-311 [doi]
- A New Approach to Learning System in Cognitive Radio Based on Elman NetworksNaveed Ahmed. 312-320 [doi]
- Improvement of Spotting Words Speech Recognition Agent for Tele-Operating a Manipulator ArmMohamed Fezari, Ibrahiem El Emary, Mohamed Serghir Boumaz, Hamza Attoui. 321-331 [doi]
- Mobile Authentication Using Iris BiometricsM. Gargi, J. Jasmine Sylvia Rani, Madhu Ramiah, N. T. Naresh Babu, A. Annis Fathima, Vijay Vaidehi. 332-341 [doi]
- Nonlinear-Based Human Activity Recognition Using the Kernel TechniqueAbdunnaser Diaf, Rachid Benlamri, Boubakeur Boufama. 342-355 [doi]
- Object Detection and Tracking in Secured Area with Wireless and Multimedia Sensor NetworkS. Vasuhi, A. Annis Fathima, S. Anand Shanmugam, Vijay Vaidehi. 356-367 [doi]
- Performance Comparison of Video Compression and Streaming over Wireless Ad Hoc and Sensor Networks Using MPEG-4 and H.264Muhammad Akhlaq, Tarek R. Sheltami. 368-377 [doi]
- Threshold-Based Cross Layer Design for Video Streaming over Lossy ChannelsYakubu Suleiman Baguda, Norsheila Fisal, Rozeha A. Rashid, Sharifah Kamilah Syed Yusof, Sharifah Hafiza Syed. 378-389 [doi]
- Viewpoint Invariant Face DetectionMokhtar Taffar, Serge Miguet, Mohamed Benmohammed. 390-402 [doi]
- A Formal Framework and a Tool to Process and Simulate Labelled Reconfigurable Nets Models Based on Graph TransformationNardjes Dehimi, Raida Elmansouri, Allaoua Chaoui. 403-414 [doi]
- Quality Adapting of Role-Based Interactive ApplicationsSoufiane Boulehouache, Ramdane Maamri, Zaïdi Sahnoun. 415-428 [doi]
- Digital Social Literacy: Literacy Demands for the Virtual-WorldToshihiko Yamakami. 429-437 [doi]
- Exploiting Title-Keywords Relation to Develop Concept Classifier for Scientific CommunitySher Afgun Khan, Muhammad Tanvir Afzal, Muhammad Abdul Qadir. 438-448 [doi]
- FLMin: An Approach for Mining Frequent Links in Social NetworksErick Stattner, Martine Collard. 449-463 [doi]
- Recursive Incentives with Guided Recruiting EncouragementNawfal A. Mehdi. 464-474 [doi]
- Sensor-Cloud Computing: Novel Applications and Research ProblemsYu-Hsn Liu, Kok-Leong Ong, Andrzej Goscinski. 475-486 [doi]
- The Use of Mobile Technology for Citizen E-ParticipationDuaa Sinnari, Hana Al-Nuaim. 487-500 [doi]
- A Dynamic Web Service and Business Process Logic Composition and ConsistencySamir Elmougy. 501-521 [doi]
- Composing Web Services Using Profiles SimilarityOuahrani Atika, Abdelkader Belkhir. 522-536 [doi]
- UML Refinement for Mapping UML Activity Diagrams into BPEL Specifications to Compose Service-Oriented WorkflowsHayat Bendoukha, Yahya Slimani, Abdelkader Benyettou. 537-548 [doi]