1 | -- | 7 | Mira Kajko-Mattsson, Anna Hauzenberger, Ralf Fredriksson. Eliciting Theory about a Retirement Process |
8 | -- | 12 | Bruce Johnson. A Bioinformatics-Inspired Adaptation to Ukkonen's Edit Distance Calculating Algorithm and Its Applicability Towards Distributed Data Mining |
13 | -- | 19 | Prabhu Shankar Kaliappan, Hartmut König. Designing and Verifying Communication Protocols Using Model Driven Architecture and Spin Model Checker |
20 | -- | 25 | Chong-Wei Xu. A New Communication Framework for Networked Mobile Games |
26 | -- | 32 | Jong Hyun Park, Ji-Hoon Kang. Storing and Searching Metadata for Digital Broadcasting on Set-Top Box Environments |
38 | -- | 43 | Yongzhong Lu, Danping Yan, Songlin Nie, Chun Wang. Development of an Improved GUI Automation Test System Based on Event-Flow Graph |
44 | -- | 52 | Shouxin Wang, Li Zhang, Na Ma, Shuai Wang. An Evaluation Approach of Subjective Trust Based on Cloud Model |
53 | -- | 59 | Wenchen Wu, Yanni Han, Deyi Li. Motif-based Classification in Journal Citation Networks |
60 | -- | 67 | Zhiwen Wang, Qin Xia, Ke Lu. Two-Tier GCT Based Approach for Attack Detection |
68 | -- | 75 | Xi Wang, Huaikou Miao, Liang Guo. Towards Automatic Transformation from UML Model to FSM Model for Web Applications |
76 | -- | 82 | Nan Li, Chunhe Xia, Yi Yang, Haiquan Wang. An Algorithm for Generation of Attack Signatures Based on Sequences Alignment |
83 | -- | 87 | Peng Liu, Bosheng Zhou. Workflow Mining of More Perspectives of Workflow |
88 | -- | 91 | Yanqing Wang, Bo Zheng, Hujie Huang. Complying with Coding Standards or Retaining Programming Style: A Quality Outlook at Source Code Level |