Abstract is missing.
- Ontology-Based Identification of Research Gaps and Immature Research AreasKristian Beckers, Stefan Eicker, Stephan Faßbender, Maritta Heisel, Holger Schmidt, Widura Schwittek. 1-16 [doi]
- A Context-Aware Mashup Integration Guideline for Enterprise 2.0Gerald Bader, Amin Anjomshoaa, A Min Tjoa. 17-30 [doi]
- Artificial Neural Networks Approach for the Prediction of Thermal Balance of SI Engine Using Ethanol-Gasoline BlendsMostafa Kiani Deh Kiani, Barat Ghobadian, Fathollah Ommi, Gholamhassan Najafi, Talal Yusaf. 31-43 [doi]
- Validation of XML Documents with SWRLJesús Manuel Almendros-Jiménez. 44-57 [doi]
- A Taxonomy of Dirty Time-Oriented DataTheresia Gschwandtner, Johannes Gärtner, Wolfgang Aigner, Silvia Miksch. 58-72 [doi]
- Combining Relational and Semi-structured Databases for an Inquiry ApplicationMarius Ebel, Martin Hulin. 73-84 [doi]
- Hunting for Aardvarks: Can Software Security Be Measured?Martin Gilje Jaatun. 85-92 [doi]
- A Foundation for Requirements Analysis of Privacy Preserving SoftwareKristian Beckers, Maritta Heisel. 93-107 [doi]
- On Complexity Reduction of User Interfaces for Safety-Critical SystemsAndreas Holzinger, Evgenia Popova, Bernhard Peischl, Martina Ziefle. 108-122 [doi]
- Security SLAs - An Idea Whose Time Has Come?Martin Gilje Jaatun, Karin Bernsmed, Astrid Undheim. 123-130 [doi]
- UML Representation of Extended Role-Based Access Control Model with the Use of Usage Control ConceptAneta Poniszewska-Maranda. 131-145 [doi]
- A Formal Equivalence Classes Based Method for Security Policy Conformance CheckingEckehard Hermann, Udo Litschauer, Jürgen Fuß. 146-160 [doi]
- Trust as an Organismic Trait of E-Commerce SystemsTanja Azderska, Borka Jerman-Blazic. 161-175 [doi]
- Making Apps Useable on Multiple Different Mobile Platforms: On Interoperability for Business Application Development on SmartphonesAndreas Holzinger, Peter Treitler, Wolfgang Slany. 176-189 [doi]
- Enhancing Business APPification Using SMS Text Messages: Metrics, Strategies and AlternativesMersini Paschou, Evangelos Sakkopoulos, Efrosini Sourla, Athanasios K. Tsakalidis. 190-202 [doi]
- Near Duplicate Document Detection for Large Information FlowsDaniele Montanari, Piera Laura Puglisi. 203-217 [doi]
- TinyStream SensorsPedro Furtado. 218-232 [doi]
- Distributed Sampling Storage for Statistical Analysis of Massive Sensor DataHiroshi Sato, Hisashi Kurasawa, Takeru Inoue, Motonori Nakamura, Hajime Matsumura, Kei'ichi Koyanagi. 233-243 [doi]
- Integrating Query Context and User Context in an Information Retrieval Model Based on Expanded Language ModelingRachid Aknouche, Ounas Asfari, Fadila Bentayeb, Omar Boussaid. 244-258 [doi]
- Indexing and Search for Fast Music IdentificationGuang-Ho Cha. 259-271 [doi]
- Ontology-Based Retrieval of Experts - The Issue of Efficiency and Scalability within the eXtraSpec SystemElzbieta Bukowska, Monika Kaczmarek, Piotr Stolarski, Witold Abramowicz. 272-286 [doi]
- OrderBased Labeling Scheme for Dynamic XML Query ProcessingBeakal Gizachew Assefa, Belgin Ergenc. 287-301 [doi]
- A 16-Intersection Matrix for the Polygon-Polyline Topological Relation for Geographic Pictorial Query LanguagesAnna Formica, Mauro Mazzei, Elaheh Pourabbas, Maurizio Rafanelli. 302-316 [doi]
- Usage Control in Inter-organisational Collaborative Environments - A Case Study from an Industry PerspectiveÅsmund Ahlmann Nyre, Martin Gilje Jaatun. 317-331 [doi]
- Stock Market Multi-Agent Recommendation System Based on the Elliott Wave PrincipleMonica Tirea, Ioan Tandau, Viorel Negru. 332-346 [doi]
- Similarity of Transactions for Customer SegmentationKe Lu, Tetsuya Furukawa. 347-359 [doi]
- Challenges in Using Linked Data within a Social Web Recommendation Application to Semantically Annotate and Discover VenuesJakub Dzikowski, Monika Kaczmarek, Szymon Lazaruk, Witold Abramowicz. 360-374 [doi]
- Pay-As-You-Go Data Integration Using Functional DependenciesNaser Ayat, Hamideh Afsarmanesh, Reza Akbarinia, Patrick Valduriez. 375-389 [doi]
- Analyzing Recommender System's Performance Fluctuations across UsersCharif Haydar, Azim Roussanaly, Anne Boyer. 390-402 [doi]
- A Secure Distributed Video Surveillance System Based on Portable DevicesPietro Albano, Andrea Bruno, Bruno Carpentieri, Aniello Castiglione, Arcangelo Castiglione, Francesco Palmieri, Raffaele Pizzolante, Ilsun You. 403-415 [doi]
- Network Profiling: Content Analysis of Users Behavior in Digital Communication ChannelClara Maria Colombini, Antonio Colella, Marco Mattiucci, Aniello Castiglione. 416-429 [doi]
- How to Forge a Digital Alibi on Mac OS XAniello Castiglione, Giuseppe Cattaneo, Roberto De Prisco, Alfredo De Santis, Kangbin Yim. 430-444 [doi]
- Security-and-Privacy-Related Issues on IT Systems During DisastersShinsaku Kiyomoto, Kazuhide Fukushima, Yutaka Miyake. 445-459 [doi]
- Semantic Techniques of Image Retrieval - The Example of a Structural Analysis of Coronary ArteriesMiroslaw Trzupek, Marek R. Ogiela. 460-467 [doi]
- Evaluation of Carotid Artery Segmentation with Centerline Detection and Active Contours without Edges AlgorithmTomasz Hachaj, Marek R. Ogiela. 468-478 [doi]
- Automatic Image Annotation Using Semantic Text AnalysisDongjin Choi, PanKoo Kim. 479-487 [doi]
- Routing Algorithm Based on Nash Equilibrium against Malicious Attacks for DTN Congestion ControlChengjun Wang, BaoKang Zhao, Wanrong Yu, Chunqing Wu, Zhenghu Gong. 488-500 [doi]
- Managing Urban Waste Collection through Timed Automata Based Fuzzy Cognitive MapsGiovanni Acampora, Vincenzo Loia, Autilia Vitiello. 501-515 [doi]
- Mobile Malware Threats and Defenses for Homeland SecuritySeung-Hyun Seo, Kangbin Yim, Ilsun You. 516-524 [doi]
- Facial Identity Encryption with Kinoform and Phase-Key Watermarking for Homeland Security AgenciesMuhammad Naveed Iqbal Qureshi, Jin Tae Kim, Sang-Woong Lee. 525-533 [doi]
- Detecting Unusual User Behaviour to Identify Hijacked Internet Auctions AccountsMarek Zachara, Dariusz Palka. 534-546 [doi]
- A Formal Support for Collaborative Data SharingFabio Martinelli, Ilaria Matteucci, Marinella Petrocchi, Luca Wiegand. 547-561 [doi]
- Tool-Supported Risk Modeling and Analysis of Evolving Critical InfrastructuresFredrik Seehusen, Bjørnar Solhaug. 562-577 [doi]
- A Secure Data Encryption Method by Employing a Feedback Encryption Mechanism and Three-Dimensional OperationYi-Li Huang, Fang-Yie Leu, Cheng-Ru Dai. 578-592 [doi]
- Discussion on the Challenges and Opportunities of Cloud ForensicsRainer Poisel, Simon Tjoa. 593-608 [doi]
- Towards a Logical Framework for Reasoning about RiskMatteo Cristani, Erisa Karafili, Luca Viganò. 609-623 [doi]
- A Collaborative Approach to Botnet ProtectionMatija Stevanovic, Kasper Revsbech, Jens Myrup Pedersen, Robin Sharp, Christian Damsgaard Jensen. 624-638 [doi]
- Consensus Building and In-operation Assurance for Service DependabilityYutaka Matsuno, Shuichiro Yamamoto. 639-653 [doi]
- Design and Analysis of a Fragile Watermarking Scheme Based on Block-MappingMunkhbaatar Doyoddorj, Kyung Hyune Rhee. 654-668 [doi]