Journal: Computer and Information Science

Volume 8, Issue 3

13 -- 0Fawaz Alassery, Walid K. M. Ahmed, Mohsen Sarraf, Victor Lawrence. Collision Detection in Wireless Sensor Networks Through Pseudo-Coded ON-OFF Pilot Periods per Packet: A Novel Low-Complexity and Low-Power Design Technique
51 -- 63Wala'a M. AlOmari, Hesham Abusaimeh. Modified USB Security Token for User Authentication
64 -- 70H. M. Hijawi, M. H. Saheb. Sequence Pattern Mining in Data Streams
71 -- 82Itimad Raheem Ali, Ghazali Sulong, Hoshang Kolivand. Realistic Lip Syncing for Virtual Character Using Common Viseme Set
83 -- 102Ahmad A. Rabaa'i. An Empirical Investigation on the Adoption of e-Government in Developing Countries: The Case of Jordan
103 -- 118Sanjay Ahuja. Hadoop Based Data Intensive Computation on IaaS Cloud Platforms
119 -- 133Nermin Abdel-Hakim Othman, Ahmed Sharaf Eldin, Doaa Saad El Zanfaly. Handling Uncertainty in Database: An Introduction and Brief Survey
134 -- 144Issam Jebreen. Requirements Determination as a Social Practice: Perceptions and Preferences of Novice Analysts
145 -- 154Jianyu Zheng. The research on Repeater Coordination Based on band plan
155 -- 179Sarah N. Abdulkader, Ayman Atia, Mostafa-Sami M. Mostafa. Authentication systems: principles and threats
180 -- 185David Salb. Using Technology to Retain Baby Boomers in the Workforce
186 -- 194Baydaa Al-Hamadani, Thikra Shubita. A Novel Hyper-Active Algorithm to Estimate Missing Microarray Attributes
195 -- 291Baback Khodadoost. The Computed Scripture: Exponentially Based Fourier Regulated Construct of Quran and its Fundamentally Important Consequences
292 -- 0Chris Lee. Reviewer Acknowledgements for Computer and Information Science, Volume 8, Number 3