13 | -- | 0 | Fawaz Alassery, Walid K. M. Ahmed, Mohsen Sarraf, Victor Lawrence. Collision Detection in Wireless Sensor Networks Through Pseudo-Coded ON-OFF Pilot Periods per Packet: A Novel Low-Complexity and Low-Power Design Technique |
51 | -- | 63 | Wala'a M. AlOmari, Hesham Abusaimeh. Modified USB Security Token for User Authentication |
64 | -- | 70 | H. M. Hijawi, M. H. Saheb. Sequence Pattern Mining in Data Streams |
71 | -- | 82 | Itimad Raheem Ali, Ghazali Sulong, Hoshang Kolivand. Realistic Lip Syncing for Virtual Character Using Common Viseme Set |
83 | -- | 102 | Ahmad A. Rabaa'i. An Empirical Investigation on the Adoption of e-Government in Developing Countries: The Case of Jordan |
103 | -- | 118 | Sanjay Ahuja. Hadoop Based Data Intensive Computation on IaaS Cloud Platforms |
119 | -- | 133 | Nermin Abdel-Hakim Othman, Ahmed Sharaf Eldin, Doaa Saad El Zanfaly. Handling Uncertainty in Database: An Introduction and Brief Survey |
134 | -- | 144 | Issam Jebreen. Requirements Determination as a Social Practice: Perceptions and Preferences of Novice Analysts |
145 | -- | 154 | Jianyu Zheng. The research on Repeater Coordination Based on band plan |
155 | -- | 179 | Sarah N. Abdulkader, Ayman Atia, Mostafa-Sami M. Mostafa. Authentication systems: principles and threats |
180 | -- | 185 | David Salb. Using Technology to Retain Baby Boomers in the Workforce |
186 | -- | 194 | Baydaa Al-Hamadani, Thikra Shubita. A Novel Hyper-Active Algorithm to Estimate Missing Microarray Attributes |
195 | -- | 291 | Baback Khodadoost. The Computed Scripture: Exponentially Based Fourier Regulated Construct of Quran and its Fundamentally Important Consequences |
292 | -- | 0 | Chris Lee. Reviewer Acknowledgements for Computer and Information Science, Volume 8, Number 3 |