Abstract is missing.
- Image Reconstruction based on Block-based Compressive SensingHanxu You, Jie Zhu. 3-7 [doi]
- An Integration of Software Engineering Methods and Semantic Technologies for Drafting and Modeling Statutes and Legal RulesMartin Stabauer, Gerald Quirchmayr, Johann Höller. 9-15 [doi]
- Schema Mapping Using Hybrid Ripple-Down RulesSarawat Anam, Yang Sok Kim, Byeong Ho Kang, Qing Liu. 17-26 [doi]
- A Novel Method for Decentralised Peer-to-Peer Software License Validation Using Cryptocurrency Blockchain TechnologyJeff Herbert, Alan Litchfield. 27-35 [doi]
- Visualising Moving Clusters using Cluster Flow DiagramsJason Thompson, Torab Torabi. 37-45 [doi]
- A Machine Learning approach to Generic Entity Resolution in support of Cyber Situation AwarenessChristopher Moir, Jonathan Dean. 47-58 [doi]
- A New Extension of Kernel Principal Component Analysis for Finger Vein AuthenticationSepehr Damavandinejadmonfared, Vijay Varadharajan. 59-63 [doi]
- Dynamic Topic Detection Model by Fusing Sentiment PolarityXi Ding, Lan-Shan Zhang, Ye Tian, Xiangyang Gong, Wendong Wang. 65-71 [doi]
- A Macro-Level Model for Investigating the E ect of Directional Bias on Network CoverageGraeme Smith, Jeff W. Sanders, Qin Li. 73-81 [doi]
- An Evaluation of POS Tagging for Tweets Using HMM ModellingParma Nand, Rivindu Perera. 83-89 [doi]
- Component Modeling for SCADA Network MappingAyodeji J. Akande, Colin Fidge, Ernest Foo. 91-100 [doi]
- An Enhanced Model for Network Flow Based Botnet DetectionUdaya Wijesinghe, Udaya Kiran Tupakula, Vijay Varadharajan. 101-110 [doi]
- Lego© Mindstorms: Merely a Toy or a Powerful Pedagogical Tool for Learning Computer Programming?Jacqui Chetty. 111-118 [doi]
- Hourglass SystemsYuki Osada, Mark Reynolds, Tim French. 119-123 [doi]