Journal: JDIM

Volume 7, Issue 6

327 -- 335Pascal Bruegger, Vincenzo Pallotta, Béat Hirsbrunner. Optimizing Heating System Management Using An Activity-Based Pervasive Application
336 -- 342Mohammed Alodib, Behzad Bordbar, Basim Majeed. On automated generation of Diagnosers in Fault tolerant Service oriented Architectures
343 -- 351Yiran Gao, Chris Phillips, Liwen He. GA and PSO-based Resource Scheduling for Orchestrated, Distributed Computing
352 -- 357Jacques M. Bahi, Mirna Eskandar, Ahmed Mostefaoui. Maximizing Mobile Multimedia Adhoc Networks Lifetime Using a Distributed Cooperation mechanism
358 -- 364Chi-Nan Lin, Chin-Chen Chang, Mien-Tsung Tsai. An Image Copyright Protection Scheme Using DCT and a Table Look-up Technique
365 -- 370Renata L. M. E. do Rego, Márcio Ribeiro, Emanuella A. de Barros, Renata M. C. R. de Souza. A Self-organizing Based Approach for Bug Reports Retrieval
371 -- 376Dorothy Ndedi Monekosso, Paolo Remagnino. Discovering Patterns of Behavior in a Smart Home
377 -- 382Fouzi Harrag, Eyas Al-Qawasmah. Performance of Decision Trees on Arabic Text Categorization
383 -- 389Khaled Mahdi, Maytham Safar, Ibrahim Sorkhoh, Ali Kassem. Cycle-Based versus Degree-based Classification of Social Networks
390 -- 398Douglas B. Bock, Bijoy Bordoloi, Susan E. Yager. High Availability with Oracle 11g Data Guard

Volume 7, Issue 5

262 -- 270Cathal Gurrin, Tjalve Aarflot, Sorin Sav, Dag Johansen. Addressing the Challenge of Managing Large-scale Digital Multimedia Libraries
271 -- 276Esraa Omran, Albert Bokma, Shereef Abu Al-Maati, David Nelson. Implementation of a Chain Ontology Based Approach in the Health Care Sector
277 -- 282Abdullah Alnajim, Malcolm Munro. Detecting Phishing Websites: On the Effectiveness of Users Tips
283 -- 289Sofia Stamou, Nikos Mpouloumpasis, Lefteris Kozanidis. Deriving the Impact of Scientifi c Publications by Mining Citation Opinion Terms
290 -- 297Santi Caballé, Àgata Lapedriza, David Masip, Fatos Xhafa, Ajith Abraham. Enabling Automatic Just-in-time Evaluation of In-class Discussions in On-line Collaborative Learning Practices
298 -- 305Wan Abdul Rahim Wan Mohd Isa, Nor Laila Md. Noor, Shafie Mehad. Web Architectural-Inducing Model (WA-IM) for Information Architecture in Cultural Context: An Empirical Investigation
306 -- 313Michael Granitzer, Andreas S. Rath, Mark Kröll, Christin Seifert, Doris Ipsmiller, Didier Devaurs, Nicolas Weber, Stefanie N. Lindstaedt. Machine Learning based Work Task Classification
314 -- 318Fabrice Matulic. Image-Based Technique To Select Visually Salient Pages In Large Documents
319 -- 323A. Noraziah, M. N. Noorhuzaimi, S. Junaida. Smart Electronic Visitor Information Management System with Biometric Verification

Volume 7, Issue 4

193 -- 201Abdul Sattar 0003, Renaud Séguier. HGOAAM: Facial Analysis by Active Appearance Model Optimized by Hybrid Genetic Algorithm
202 -- 210Dell Zhang, Wee Sun Lee. Query-By-Multiple-Examples using Support Vector Machines
211 -- 218Maria Biryukov. Where do the authors come from?
219 -- 226José Bringel Filho, Hervé Martin. Towards Awareness of Privacy and Quality of Context in Context- Based Access Control for Ubiquitous Applications
227 -- 234Teppei Shimada, Tatsuo Tsuji, Ken Higuchi. A Secondary Storage Scheme for Multidimensional Data Preserving Proximity
235 -- 243Efthimios Tambouris, Nikolaos Loutas, Vassilios Peristeras, Konstantinos A. Tarabanis. The Role of Interoperability in eGovernment Applications: An Investigation of Critical Factors
244 -- 251Nikitas N. Karanikolas. CUDL Language Semantics: Conditions

Volume 7, Issue 3

133 -- 142Cheng-Chi Lee, Chu-Chi Yang, Shiow-Yuan Huang. A New Authentication Scheme for Session Initiation Protocol
143 -- 151Xiantong Li, Wei Zhang, Jianzhong Li. A Novel Graph Containment Query Algorithm on Graph Databases
143 -- 0Zarina Dzolkhifli, Hamidah Ibrahim, Lilly Suriani Affendey. A Framework for Improving Integrity Constraints Checking of Mobile Databases by Caching Relevant Data Items
152 -- 158Lichun Kang, Kah Bin Lim, Jin Yao. Image Recognition of Occluded Objects Based on Improved Curve Moment Invariants
159 -- 165Tudor Cioara, Ionut Anghel, Ioan Salomie, Mihaela Dinsoreanu. A Generic Context Model Enhanced with Self-Configuring Features
166 -- 172Christophe Gravier, Jacques Fayolle, Jérémy Lardon, Bernard Bayard. About the reusable software Remote Laboratories have in common
173 -- 177Javier García Zubía, Pablo Orduña, Unai Hernández, Ignacio Angulo, Jaime Irurzun. Students review of acceptance, usability and usefulness of WebLab-Deusto
178 -- 184Michael E. Auer, Danilo Garbi Zutin. Mobile Lab Clients for testing Application Specific Integrated Circuits in Education
185 -- 0Mary Magdalene Jane F., Ilayaraja N., R. Nadarajan, Maytham Safar. Cache Pre-fetching and Replacement strategies for location dependent data in mobile environments

Volume 7, Issue 2

59 -- 62Richard Chbeir, Youakim Badr. Editorial Preface
63 -- 73Somchart Fugkeaw, Piyawit Manpanpanich. Design and Development of the Dynamic DRBAC Model using PMI and XACML-based Authorization
74 -- 82Somchart Fugkeaw, Piyawit Manpanpanich. Data Authentication and the Corresponding Provenance Information Management
83 -- 89Ali M. Al-Haj, Tuqa Manasrah. SVD-Based Image Water marking
90 -- 95Alexander Kolesnikov. Vector maps compression for progressive transmission over the Internet
96 -- 105Xin Xu, Martin Tomlinson, Marcel Ambroze, Mohammed Ahmed. Biorthogonal Matrix Dirty Paper Coding for Information Hiding in Still Images
106 -- 113Francesco Buccafurri, Gianluca Lax. Signing Digital Documents in Hostile Environments
114 -- 119Andreas Juffinger, Thomas Neidhart, Michael Granitzer, Roman Kern, Albert Weichselbraun, Gerhard Wohlgenannt, Arno Scharl. Distributed Web 2.0 Crawling for Ontology Evolution
120 -- 127Tilmann Rabl, Christoph Koch 0004, Günther Hölbling, Harald Kosch. Design and Implementation of the Fast Send Protocol

Volume 7, Issue 1

2 -- 8Gaurav Bhatnagar, Balasubramanian Raman, K. Swaminathan. Dual Watermarking Scheme for Copyright Protection and Authentication
9 -- 15Giovanna Castellano, Anna Maria Fanelli, Maria Alessandra Torsello. The NEWER system: how to exploit a Neuro-fuzzy strategy for Web recommendation
16 -- 21Azzam Sleit, Wesam Almobaideen, Mohammad Qatawneh. A Query Answering Surveillance System for Detecting and Tracking Moving Objects using Bounding Rectangles
22 -- 30Dion Hoe-Lian Goh, Chei Sian Lee, Alton Yeow-Kuan Chua, Brendan Luyt. Design and Development of a Query Graph Visualization System
31 -- 35Saïd Bettayeb, David A. Hoelzeman. Upper and Lower bounds on the Pagenumber of the Book Embedding of the k-ary Hypercube
36 -- 44Jianquan Liu, Hanxiong Chen, Kazutaka Furuse, Nobuo Ohbo. Improving User s Web Search Experience by Interactive Re-ranking and Zooming Interfaces
45 -- 53Abdullah Abdulaziz Al-Tameem. Nanotechnology Development and Sub-Technologies Effect