Abstract is missing.
- Economic-based resource management for dynamic computational grids: Extension to substitutable CPU resourcesKhalid Abdelkader, Jan Broeckhove, Kurt Vanmechelen. 1-6 [doi]
- Efficient implementation of data mining: Improve customer's behaviourAbdullah S. Al-Mudimigh, Farrukh Saleem, Zahid Ullah. 7-10 [doi]
- Identity federation based on agent technology for secure large scale data storage and processing over volunteer gridsMaher Khemakhem, Abdelfettah Belghith. 11-14 [doi]
- Network monitoring and management approach for expressive-based SLA of grid computing applicationsLynda Zitoune, Amel Hamdi, Véronique Vèque, Hugues Mounier. 15-20 [doi]
- Towards a fairer benefit distribution in grid environmentsRosy Aoun, Maurice Gagnaire. 21-26 [doi]
- WSRF services for learning classifiers from Data GridMoez Ben Haj Hmida, Yahya Slimani. 27-32 [doi]
- Data integration system: Toward a prototypeLahcen Gounbark, Laila Benhlima, Dalila Chiadmi. 33-36 [doi]
- Integration of biological data : The familial hypercholesterolemiaZohra Bakkoury, Assia Rharbi, Abdelkader Bétari. 37-40 [doi]
- Metadata driven integration model for large scale data integrationBassem Barkallah, Samir Moalla. 41-46 [doi]
- On modelling adaptive service-oriented business processesNasreddine Aoumeur, Kamel Barkaoui, Gunter Saake. 47-52 [doi]
- A dynamic equilibrium view of caching systemsFernando Díaz del Río, José Luis Sevillano, Daniel Cascado Caballero, Jose Maria Rodríguez Corral. 53-54 [doi]
- A new energy-aware approach for packets flow signatureHakim Khali, Ahcene Farah, Abdelaziz Araar. 55-56 [doi]
- A study in the P2P data integration processAhmed Moujane, Dalila Chiadmi, Laila Benhlima, Faouzia Wadjinny. 57-58 [doi]
- Data processing application based on plug-ins architecture and XML for handling analytical dataBadraddine Aghoutane, Nouredine Chenfour, Rachid Benslimane, Mohammed Meknassi. 59-60 [doi]
- FINDS - Integrative servicesCaslav Bozic. 61-62 [doi]
- Illuminated solar cell physical parameters extraction using mathematicaS. Yadir, Safae Aazou, N. Maouhoub, K. Rais, M. Benhmida, El Mahdi Assaid. 63-64 [doi]
- 2wards QoS-capable ODP computational interfacesOussama Mohamed Reda, Bouabid El Ouahidi, Daniel Bourget. 65-66 [doi]
- Using ontology for implementing enterprise resource planning systemsEduard Babkin, Ekaterina Potapova. 67-68 [doi]
- A New gene selection approach based on Minimum Redundancy-Maximum Relevance (MRMR) and Genetic Algorithm (GA)Ali El Akadi, Aouatif Amine, Abdeljalil El Ouardighi, Driss Aboutajdine. 69-75 [doi]
- An ant-based algorithm for clusteringAkil Elkamel, Mariem Gzara, Salma Jamoussi, Hanêne Ben-Abdallah. 76-82 [doi]
- Back-forth sorting algorithm analysis and applications perspectiveSweetesh Singh, Tarun Tiwari, Rupesh Srivastava, Suneeta Agarwal. 83-87 [doi]
- Filtering algorithms for sequencing constraints: Application in physical mappingHamza Zidoum. 88-95 [doi]
- Hubs identification in amino acids interaction networksOmar Gaci, Stefan Balev. 96-102 [doi]
- A real-time wireless sensor network for wheelchair navigationJosé Luis Sevillano, Daniel Cascado Caballero, Daniel Cagigas, Saturnino Vicente, Carlos D. Lujan Martinez, Fernando Díaz del Río. 103-108 [doi]
- A two-level dynamic chrono-scheduling algorithmFernando Díaz del Río, José Luis Sevillano, Saturnino Vicente, Daniel Cagigas, Manuel Ramon López-Torres. 109-116 [doi]
- BOIN: A novel Bufferless Optical Interconnection Network for high performance computerXingyun Qi, Wei Yang, Yongran Chen, Qiang Dou, Quanyou Feng, Wenhua Dou. 117-123 [doi]
- Design and implementation of a Blog-based Interactive Patirntcare SystemChung-Ming Huang, Hao-Hsiang Ku. 124-131 [doi]
- Embedded Linux in a partitioned architecture for aerospace applicationsJoão Craveiro, José Rufino, Carlos Almeida, Rui Covelo, Pedro Venda. 132-138 [doi]
- A new discrete particle swarm model for the frequency assignment problemLamia Benameur, Jihane Alami Chentoufi, Abdelhakim Ameur El Imrani. 139-144 [doi]
- Modeling resource prices in computational commodity marketsRamadan Arfa, Jan Broeckhove. 145-152 [doi]
- The analysis of Tabu Machine parameters applied to discrete optimization problemsEduard Babkin, Margarita Karpunina. 153-160 [doi]
- A synchronization schema in activity diagrams via zero-safe-netsSabine Boufenara, Faiza Belala, Chafia Bouanaka. 161-167 [doi]
- Bit-level locking for concurrency controlJad F. Abbass, Ramzi A. Haraty. 168-173 [doi]
- Document classification efficiency of phrase-based techniquesNagesh Kapalavayi, S. N. Jayaram Murthy, Gongzhu Hu. 174-178 [doi]
- Evolutionary neural network prediction for cumulative failure modelingMohamed Benaddy, Mohamed Wakrim, Sultan Aljahdali. 179-184 [doi]
- Integrating natural language oriented models with feature modelMaria Carmen Leonardi, María Virginia Mauco, Laura Felice, German Montejano, Daniel Riesco, Narayan C. Debnath. 185-190 [doi]
- Towards mosques management information systemHazem El-Gendy, Ahmed Samir, Mahmoud Gebriel, Narayan C. Debnath, Nabil El-Kadhi. 191-198 [doi]
- Possibilistic ordination-based analysis of an imperfect databaseAnas Dahabiah, John Puentes, Basel Solaiman. 199-204 [doi]
- Supervised learning and automatic recognition of asphalt pavement deteriorationsYounes Guellouma, Hadda Cherroun, Attia Nehar, Djelloul Ziadi. 205-210 [doi]
- Supervised multivariate discretization in mixed data with Random ForestsAbdelaziz Berrado, George C. Runger. 211-217 [doi]
- Survey of information visualization techniques for exploitation in KDDHela Ltifi, Mounir Ben Ayed, Adel M. Alimi, Sophie Lepreux. 218-225 [doi]
- A GIS system for tourism managementBalqies Sadoun, Omar Al-Bayari. 226-232 [doi]
- Applications of GIS and remote sensing techniques to land use managementBalqies Sadoun, Samih Al-Rawashdeh. 233-237 [doi]
- Particle filters for accurate localization of communicant vehicles using GPS and vision systemsGeorges Challita, Stéphane Mousset, Fawzi Nashashibi, Abdelaziz Bensrhair. 238-242 [doi]
- Toward environment indicators to evaluate WLAN-based indoor positioning systemOumaya Baala, You Zheng, Alexandre Caminada. 243-250 [doi]
- A new counter disassociation mechanism (CDM) for 802.11b/g wireless local area networksTarik Guelzim, Mohammad S. Obaidat. 251-259 [doi]
- On the effect of spatial to compressed domains transformation in LSB-based image steganographySaeed Sarreshtedari, Mohsen Ghotbi, Shahrokh Ghaemmaghami. 260-264 [doi]
- Performance Analysis of Segmentation Approach for Cursive Handwriting on Benchmark DatabaseAmjad Rehman, Dzulkifli Mohamad, Fajri Kurniawan, Mohammad Ilays. 265-270 [doi]
- Privacy protection issues in social networking sitesAi Ho, Abdou Maiga, Esma Aïmeur. 271-278 [doi]
- Usable security management with host identity protocolKristiina Karvonen, Miika Komu, Andrei Gurtov. 279-286 [doi]
- A physics simulation engine for modeling autonomous motion through reverse engineering of sodaconstructorZhiyao Joseph Yang, Gongzhu Hu. 287-292 [doi]
- Software reliability prediction using multi-objective genetic algorithmSultan H. Aljahdali, Mohammed E. El-Telbany. 293-300 [doi]
- Stuttering removal-developing mealy and moore style implementations of an interactive componentWalter Dosch, Annette Stümpel, Nontasak Janchum, Pornsiri Muenchaisri. 301-308 [doi]
- An extension of the Workflow Process Definition Language to validate time restrictions in SUBFLOW Activities and XOR SPLIT AttributesNarayan C. Debnath, Daniel Riesco, Gabriel Vilallonga, Robert Uzal, Daniel Welch, German Montejano, Sergio Gallina. 309-316 [doi]
- Formal development of universal protocol implementations conformance statement proformaHazem El-Gendy. 317-321 [doi]
- A service broker and business model for saas applicationsBrian Moore, Qusay H. Mahmoud. 322-329 [doi]
- An efficient 802.11 medium access control method and its simulation analysisP. Venkata Krishna, Mohammad S. Obaidat, Sudip Misra, Vankadara Saritha. 330-335 [doi]
- Simulating Peer-to-Peer networksSanjay Kumar Dhurandher, Sudip Misra, Mohammad S. Obaidat, Inderpreet Singh, Raghu Agarwal, Bhuvnesh Bhambhani. 336-341 [doi]
- Visual Network Simulator (VNS): A GUI to QoS simulation for the ns-2 simulatorEduardo M. D. Marques, Ricardo A. S. A. Plácido, Paulo Nazareno Maia Sampaio. 342-349 [doi]
- A high-speed and decentralized arbiter design for NoCYun-Lung Lee, Jer Min Jou, Yen-Yu Chen. 350-353 [doi]
- A YAPI system level optimized parallel model of a H.264/AVC video encoderHajer Krichene Zrida, Mohamed Abid, Ahmed C. Ammari, Abderrazek Jemai. 354-361 [doi]
- Elementary transformation analysis for Array-OLOuassila Labbani, Paul Feautrier, Eric Lenormand, Michel Barreteau. 362-367 [doi]
- Study and integration of a parametric neighbouring interconnection network in a massively parallel architecture on FPGAMouna Baklouti, Mohamed Abid, Philippe Marquet, Jean-Luc Dekeyser. 368-373 [doi]
- Using out-of-core techniques to produce exact solutions to the maximum clique problem on extremely large graphsGary L. Rogers, Andy D. Perkins, Charles A. Phillips, John D. Eblen, Faisal N. Abu-Khzam, Michael A. Langston. 374-381 [doi]
- A distributed attack simulation for quantitative security evaluation using SimEventsGolriz Khazan, Mohammad Abdollahi Azgomi. 382-385 [doi]
- Building a responsibility model using modal logic - towards Accountability, Aapability and Commitment conceptsChristophe Feltus, Michaël Petit. 386-391 [doi]
- Fast asymmetric cryptosystem based on Boolean product of matricesYeghisabet Alaverdyan, Gevorg Margarov. 392-395 [doi]
- Improving security and capacity for Arabic text steganography using 'Kashida' extensionsFahd Al-Haidari, Adnan Gutub, Khalid Al-Kahsah, Jameel Hamodi. 396-399 [doi]
- Triple-A: Secure RGB image steganography based on randomizationAdnan Gutub, Ayed Al-Qahtani, Abdulaziz Tabakh. 400-403 [doi]
- A model driven framework for multiview service oriented system developmentAdil Kenzi, Bouchra El Asri, Mahmoud Nassar, Abdelaziz Kriouile. 404-411 [doi]
- Code generation in VUML profile: A model driven approachMahmoud Nassar, Adil Anwar, Sophie Ebersold, B. Elasri, Bernard Coulette, Abdelaziz Kriouile. 412-419 [doi]
- Organizational behavior & software product line engineering: An empirical studyFaheem Ahmed, Salah Bouktif, Luiz Fernando Capretz. 420-427 [doi]
- Quantity of resource properties expression and runtime assurance for embedded systemsLaure Gonnord, Jean-Philippe Babau. 428-435 [doi]
- Towards ontology-based approach for maintaining web applicationSidi Mohamed Benslimane, Mimoun Malki, Djelloul Bouchiha. 436-443 [doi]
- Curvelet-based feature extraction with B-LDA for face recognitionMohamed El Aroussi, Sanaa Ghouzali, Mohammed El Hassouni, Mohammed Rziza, Driss Aboutajdine. 444-448 [doi]
- Face recognition based on facial feature trainingSouhail Smaoui, Mohamed Hammami. 449-455 [doi]
- Nonlinear cost optimization scheme for feature segmentation in second trimester fetal imagesB. Priestly Shan, Muthusamy Madheswaran. 456-463 [doi]
- WAY-LOOK4: A CBIR system based on class signature of the images' color and texture featuresSamia G. Omar, Mohamed A. Ismail, Sahar M. Ghanem. 464-471 [doi]
- A quality of service scheduling technique for optical LANsPanagiotis G. Sarigiannidis, Sophia G. Petridou, Georgios I. Papadimitriou, Andreas S. Pomportsis, Mohammad S. Obaidat. 472-477 [doi]
- Adaptive learning solution for congestion avoidance in wireless sensor networksSudip Misra, Vivek Tiwari, Mohammad S. Obaidat. 478-484 [doi]
- An adaptive learning-like solution of random early detection for congestion avoidance in computer networksSudip Misra, B. John Oommen, Sreekeerthy Yanamandra, Mohammad S. Obaidat. 485-491 [doi]
- Ant colony optimization-based congestion control in Ad-hoc wireless sensor networksSanjay Kumar Dhurandher, Sudip Misra, Harsh Mittal, Anubhav Agarwal, Isaac Woungang. 492-497 [doi]
- Traffic analysis for GSM networksMohammed Boulmalf, Jawad Abrache, Tarik Aouam, Hamid Harroud. 498-503 [doi]
- A framework for translating a high level security policy into low level security mechanismsAhmed A. Hassan, Waleed M. Bahgat. 504-511 [doi]
- Application-specific dynamic policy rules (ASDPR) for J2MEAhmed Alsum, Ayman Abdel-Hamid, Mostafa Abdel-Aziem. 512-516 [doi]
- Attacks and improvement of "security enhancement for a dynamic id-based remote user authentication scheme"Omar Cheikhrouhou, Manel Boujelben, Anis Koubaa, Mohamed Abid. 517-522 [doi]
- Defending against rogue base station attacks using wavelet based fingerprintingAlaaedine Chouchane, Slim Rekhis, Noureddine Boudriga. 523-530 [doi]
- Friendly home automation system using cell phone and J2ME with feedback instant voice messagesMahmoud Shaker Nasr, Fahtha H. A. Salem Azwai. 531-538 [doi]
- A new spatial decomposition scheme for image content-based watermarkingKhalil Aboutammam, Ahmed Tamtaoui, Driss Aboutajdine, M. Ait Kbir. 539-542 [doi]
- An intelligent surfer model combining web contents and links based on simultaneous multiple-term queryBouchra Frikh, Ahmad Said Djanfar, Brahim Ouhbi. 543-545 [doi]
- An object-oriented modeling framework for petri nets and related modelsHamid Mohammad Gholizadeh, Mohammad Abdollahi Azgomi. 546-549 [doi]
- CogMAX- A cognitive radio approach for WiMAX systemsMohamed Khedr, Hazem Shatila. 550-554 [doi]
- Locating friends and family using mobile phones with global positioning system (GPS)Gaith B. Al-Suwaidi, Mohamed Jamal Zemerly. 555-558 [doi]
- On the analysis of propagation channel based on sub band approachRachid Saadane, Mohamed Wahbi, Aawatif Hayar, Moulay Ahmed Faqihi, Mohamed El Aroussi, Driss Aboutajdine. 559-562 [doi]
- Optical iris localization approachOum El Kheir Abra, Esmail Ahouzi, Nawfel Azami, Fakhita Regragui. 563-566 [doi]
- Remote sensing signatures extraction for hydrological resources management applicationsIvan E. Villalon-Turrubiates. 567-570 [doi]
- A novel fuzzy approach to improve near neighborhood allocation algorithm in DDBReza Basseda, Maseud Rahgozar. 571-578 [doi]
- An efficient algorithm for web recommendation systemsRana Forsati, Mohammad Reza Meybodi, Afsaneh Rahbar. 579-586 [doi]
- DSMS scheduling regarding complex QoS metricsMohammad Ghalambor Dezfuli, Ali-Asghar Safaei, Mohammad Abdollahi Azgomi. 587-594 [doi]
- Query processing in the WASSIT mediation frameworkFaouzia Wadjinny, Lahcen Gounbark, Laila Benhlima, Dalila Chiadmi, Ahmed Moujane. 595-602 [doi]
- A comparison of VoIP performance on IPv6 and IPv4 networksRoman Yasinovskyy, Alexander L. Wijesinha, Ramesh K. Karne, Gholam H. Khaksari. 603-609 [doi]
- Performance evaluation of auctions WLAN for RoboCup multi-robot cooperationMayez A. Al-Mouhamed, Umair F. Siddiq. 610-615 [doi]
- Performance evaluation of power save protocols using carrier sensing in multihop ad hoc networksAbdelfettah Belghith, Wafa Akkari. 616-623 [doi]
- SER performance of capacity-aware MIMO beamforming scheme in OFDM-SDMA systemsAhmed Iyanda Sulyman, Mostafa Hefnawi. 624-628 [doi]
- Higher-order statistical steganalysis of random LSB steganographySaeed Reza Khosravirad, Taraneh Eghlidos, Shahrokh Ghaemmaghami. 629-632 [doi]
- Intrusion-tolerant framework for heterogeneous Wireless Sensor NetworksMaha Sliti, Mohamed Hamdi, Noureddine Boudriga. 633-636 [doi]
- RB-WAC: New approach for access control in workflowsHanan El Bakkali, Hamid Hatim. 637-640 [doi]
- Two factor authentication using mobile phonesFadi A. Aloul, Syed Zahidi, Wassim El-Hajj. 641-644 [doi]
- A framework for estimation of complexity in agent oriented methodologiesReza Basseda, Fattaneh Taghiyareh, Tannaz Alinaghi, Camellia Ghoroghi, Azin Moallem. 645-652 [doi]
- A metamodel of WSDL Web services using SAWSDL semantic annotationsNaima Erchidi Elyacoubi, Fatima-Zahra Belouadha, Ounsa Roudies. 653-659 [doi]
- A new model for solution of complex distributed constrained problemsSami Al-Maqtari, Habib Abdulrab, Eduard Babkin. 660-667 [doi]
- Comparison of Garbage Collector prototypes for C++ applicationsHamid Mcheick, Aymen Sioud. 668-674 [doi]
- First step of security model for separation of concernsHamid Mcheick, Eric Dallaire, Hafedh Mili. 675-681 [doi]
- WapMetrics: A tool for computing UML design metrics forWeb applicationsEmad Ghosheh, Sue Black. 682-689 [doi]
- A Swarm Intelligence-based P2P file sharing protocol using Bee AlgorithmSanjay Kumar Dhurandher, Shubham Singhal, Saurabh Aggarwal, Puneet Pruthi, Sudip Misra, Isaac Woungang. 690-696 [doi]
- Cyclic routing: Generalizing look-ahead in peer-to-peer networksDmitry G. Korzun, Boris Nechaev, Andrei Gurtov. 697-704 [doi]
- Impact of L1 entire locking and L2 way locking on the performance, power consumption, and predictability of multicore real-time systemsAbu Asaduzzaman, Imad Mahgoub, Fadi N. Sibai. 705-711 [doi]
- Optimization of network clustering and hierarchy through simulated annealingTahani Hussain, Sami J. Habib. 712-716 [doi]
- Exploiting a clustering mechanism for power saving in ad hoc networks: Performance evaluationImen Jemili, Abdelfettah Belghith, Mohamed Mosbah. 717-724 [doi]
- Performance and analysis of modified voting algorithm for planted motif searchMostafa M. Abbas, Hazem M. Bahig. 725-731 [doi]
- Protein structure prediction in the 3D HP modelFatima Kanj, Nashat Mansour, Hassan Khachfe, Faisal N. Abu-Khzam. 732-736 [doi]
- Simulation of a DNA denaturation processTomas R. Ines, Francisco J. Cisneros, Ángel Goñi Moreno, Juan Castellanos. 737-742 [doi]
- SSPT: Secondary Structure Prediction TriangleJavid Taheri, Albert Y. Zomaya. 743-749 [doi]
- End-to-end mobility solution for vertical handoff between heterogeneous wireless networksIyad Alkhayat, Anup Kumar, Salim Hariri. 750-755 [doi]
- Highlighting the effects of joint MAC layer misbehavior and virtual link attack in wireless ad hoc networksSoufiene Djahel, Farid Naït-Abdesselam, Faraz Ahsan. 756-763 [doi]
- Performance evaluation of IEEE 802.11 multi-interface based wireless distribution system (MI-WDS)Rafaa Tahar, Abdelfettah Belghith, Rafik Braham. 764-770 [doi]
- Performance of resource allocation schemes in adaptively modulated TDMA networkAmiotosh Ghosh, Ahmed K. Elhakeem. 771-778 [doi]
- Application for visualization of arab manuscriptsOmar El Bannay, Rachid Benslimane, Noureddine Rais, Noureddine El Makhfi. 779-782 [doi]
- Consider of fault propagation in architecture-based software reliability analysisFan Zhang, Xingshe Zhou, Yunwei Dong, Junwen Chen. 783-786 [doi]
- Detection of plagiarism in database schemas using structural fingerprintsSamer M. Abd El-Wahed, Ahmed Elfatatry, Mohamed S. Abougabal. 787-790 [doi]
- OSGi services design process using model driven architectureJulio Cano, Natividad Martínez Madrid, Ralf Seepold. 791-794 [doi]
- Towards process patterns for a component retrieval system integrating the user profileHassania Ouchetto, Ounsa Roudies, Mounia Fredj. 795-799 [doi]
- A complete and accurate analytical model for 802.11e EDCA under saturation conditionsNada Chendeb Taher, Yacine Ghamri-Doudane, Bachar El Hassan. 800-807 [doi]
- Determining product-form steady-state solutions of Generalized Stochastic Petri Nets by the analysis of the reversed processSimonetta Balsamo, Andrea Marin. 808-815 [doi]
- Lifetime optimization for Wireless Sensor NetworksOuadoudi Zytoune, Youssef Fakhri, Driss Aboutajdine. 816-820 [doi]
- Predictive modeling in food mycology using adaptive neuro-fuzzy systemsMahdi Amina, Vassilis Kodogiannis, Andrzej Tarczynski. 821-828 [doi]
- Towards a cooperative model with variable scaleMhamed Itmi, Srinivasan S. Ramaswamy, Waled Alshabi. 829-836 [doi]
- A performance study of web server based on Hardware-assisted Virtual MachineZhiyuan Shao, Hai Jin, De Zhang. 837-840 [doi]
- Hardware acceleration prospects and challenges for high performance computingGregory B. Newby. 841-844 [doi]
- Hardware algorithm for variable precision multiplication on FPGANadjia Anane, Mohamed Anane, Hamid Bessalah, Mohamed Issad, Khadidja Messaoudi. 845-848 [doi]
- Highly parallel image processing on the STI CellHashir K. Kidwa, Fadi N. Sibai, Tamer F. Rabie. 849-852 [doi]
- Reconfigurable architecture for elementary functions evaluationMohamed Anane, Nadjia Anane, Hamid Bessalah, Mohamed Issad. 853-856 [doi]
- Fast segmentation method for defects detection in radiographic images of weldsAbdelhak Mahmoudi, Fakhita Regragui. 857-860 [doi]
- An ameliorated methodology to design normalized relationsAjeet A. Chikkamannur, Shivanand M. Handigund. 861-864 [doi]
- Applying topic segmentation algorithms on arabic languageFouzi Harrag, Aboubekeur Hamdi-Cherif, AbdulMalik S. Al-Salman. 865-868 [doi]
- Information system for freight traceability management in a multimodal transportation contextSabri Bendriss, A. Benabdelhafid, J. Boukachour. 869-873 [doi]
- Security risk analysis based on probability of system failure, attacks and vulnerabilitiesGhassan Kbar. 874-879 [doi]
- Spatial organization of DNA: from the physical data to the 3D modelMouna Essabbah, Samir Otmane, Malik Mallem, Joan Hérisson. 880-883 [doi]
- The extension of Buckley-Feuring solutions for non-polynomial fuzzy partial differential equationsDavid Gálvez, José Luis Pino. 884-887 [doi]
- Neuro-fuzzy system in web client-side cachingWaleed Ali, Siti Mariyam Shamsuddin. 888-895 [doi]
- Partitioning strategy for LUT-based applications using genetic algorithmsRiyadh A. K. Mehdi, Hakim Khali. 896-899 [doi]
- Spike-based control monitoring and analysis with Address Event RepresentationAngel Jiménez-Fernandez, Alejandro Linares-Barranco, Rafael Paz-Vicente, Gabriel Jiménez-Moreno, Raphael Berner. 900-906 [doi]
- Synthetic retina for AER systems developmentRafael Paz-Vicente, Alejandro Linares-Barranco, Angel Jiménez-Fernandez, Gabriel Jiménez-Moreno, Antonio Abad Civit Balcells. 907-912 [doi]
- Adaptive Fast Inter Mode Decision Algorithm Using Dynamic Threshold Technique for H.264/AVC P SlicesYoungsub Jo, Soonjong Jin, Jongmin You, Jechang Jeong. 913-918 [doi]
- An SVC-MDC video coding scheme using the multi-core parallel programming paradigm for P2P video streamingChung-Ming Huang, Chung-Wei Lin, Chia-Ching Yang, Chung-Heng Chang, Hao-Hsiang Ku. 919-926 [doi]
- Chirplet representation for audio signals based on model order selection criteriaPejman Mowlaee, Hamid Saber, Arash Amid. 927-934 [doi]
- Performance evaluation for transform domain model-based single-channel speech separationPejman Mowlaee, Abolghasem Sayadiyan. 935-942 [doi]
- A novel method for two way audio video communicationSachin P. Kamat, Tushar R. Behera. 943-946 [doi]
- A taboo-based search algorithm to enhance multicast routing under multiple additive constraintsAbdelfettah Belghith, Adel Ben Mnaouer, Naouel Ben Ali. 947-954 [doi]
- TCP computational energy cost within wireless Mobile Ad Hoc NetworkAlaa Seddik-Ghaleb, Yacine Ghamri-Doudane, Sidi-Mohammed Senouci. 955-962 [doi]
- Dividing PKI in strongest availability zonesSudip Misra, Sumit Goswami, Gyan Prakash Pathak, Nirav Shah, Isaac Woungang. 963-969 [doi]
- Path loss analysis based on UWB channel measurementsRachid Saadane, Mohamed Wahbi, Aawatif Hayar, Driss Aboutajdine. 970-974 [doi]
- A game theory based risk and impact analysis method for Intrusion Defense SystemsYi Luo, Ferenc Szidarovszky, Youssif B. Al-Nashif, Salim Hariri. 975-982 [doi]
- A new distributed algorithm for virtual backbone in Wireless Sensor Networks with different transmission rangesHassan Raei, Mohammad Ali Fathi, Ahmad Akhlaghi, Baharak Ahmadipoor. 983-988 [doi]
- FPGA-driven pseudorandom number generators aimed at accelerating Monte Carlo methodsTarek Ould Bachir, Jean-Jules Brault. 989-996 [doi]
- Improvement of MPEG-21 right expression languageMourad Rafi, Mohsine Eleuldj, Zouhair Guennoun. 997-1004 [doi]
- Accelerated discovery through integration of Kepler with data turbine for ecosystem researchYaser Jararweh, Arjun Hary, Youssif B. Al-Nashif, Salim Hariri, Ali Akoglu, Darrel Jenerette. 1005-1012 [doi]
- Reduced complexity enhancement of steganalysis of LSB-matching image steganographyHossein Malekmohamadi, Shahrokh Ghaemmaghami. 1013-1017 [doi]
- Strategies for wound image understandingAugustin Prodan, Remus Câmpean, Cornelia Revnic, Rodica Prodan. 1018-1024 [doi]
- Watermarking of colour images in the DCT domain using Y channelAhmed Al-Gindy, Hussain Al-Ahmad, Rami Qahwaji, Ayman Tawfik. 1025-1028 [doi]