Abstract is missing.
- Flexible Organization Structure-Based Access Control Model and ApplicationMinghui Jing, Hongming Cai, Fenglin Bu. 1-8 [doi]
- Applying Scrum Framework in the IT Service Support DomainMohamed Shalaby, Sherif El-Kassas. 9-15 [doi]
- Global-Time-Offsets Based Checkpoint Selection for Dynamic Verification of Fixed-Time Constraints in Grid WorkflowsHongda Wang, Wei Song, Jianchun Xing, Qiliang Yang. 16-23 [doi]
- On Trust Management for Multimedia P2P Applications in Autonomic NetworkingNaima Iltaf, Abdul Ghafoor, Mukhtar Hussain. 24-28 [doi]
- An Executional Framework for BPMN Using OrcNihita Goel, R. K. Shyamasundar. 29-36 [doi]
- Impact of Embedded Software in IT on Economic PerformanceKure Chel Lee. 37-40 [doi]
- The Impacts of Information Technology Enabled Services on Service Innovations: A Case Study in a Publishing CompanyYao-Chin Lin, Ping-heng Tsai, Nhu Hang Ha. 41-47 [doi]
- Analysis of the File System and Block IO Scheduler for SSD in Performance and Energy ConsumptionSun Hui, Zeng Rui, Cheng Jin, Liu Lei, Wu Fei, Xie Chang Sheng. 48-55 [doi]
- A Study on the Influential Factors for Continual Usage of Mobile English Learning ApplicationsSeongwon Park, Taisiya Kim, Bong Gyou Lee. 56-61 [doi]
- A Distributed Mobile Database ArchitectureAnne Marie Amja, Abdel Obaid, Normand Séguin. 62-69 [doi]
- RescueMe: An Indoor Mobile Augmented-Reality Evacuation System by Personalized PedometryJunho Ahn, Richard Han. 70-77 [doi]
- Testing of Web Services: Tools and ExperimentsTien-Dung Cao, Richard Castanet, Patrick Félix, Gerardo Morales. 78-85 [doi]
- FSM4WSR: A Formal Model for Verifiable Web Service RuntimeZhuqing Li, Dianfu Ma, Yongwang Zhao, Jing Li, Qing Yang. 86-93 [doi]
- Fast Development Platforms and Methods for Cloud ApplicationsShigeru Hosono, JiaFu He, Xuemei Liu, Lin Li, He Huang, Shuichi Yoshino. 94-101 [doi]
- A Mechanism Generating Semi-Structured RDF Metadata from Web DocumentsHsiang-Yuan Hsueh, Chun-Nan Chen, Kun-Fu Huang. 102-109 [doi]
- A Strong User Authentication Framework for Cloud ComputingAmlan Jyoti Choudhury, Pardeep Kumar, Mangal Sain, Hyotaek Lim, Hoon Jae Lee. 110-115 [doi]
- A Cloud Architecture Using Smart NodesBalwinder Sodhi, T. V. Prabhakar. 116-123 [doi]
- A Hybrid Approach to Placement of Tenants for Service-Based Multi-tenant SaaS ApplicationEnfeng Yang, Yong Zhang, Lei Wu, Yulong Liu, Shijun Liu. 124-130 [doi]
- Exploiting Dynamic Distributed Load Balance by Neighbor-Matching on P2P GridsPo-Jung Huang, You-Fu Yu, Kuan-Chou Lai, Ching-Hsien Hsu, Kuan-Ching Li. 131-138 [doi]
- Towards Data Isolation & Collaboration in Storage CloudQingni Shen, Xin Yang, Xi Yu, Pengfei Sun, Yahui Yang, Zhonghai Wu. 139-146 [doi]
- Research on Adaptive QoS-Aware Resource Reservation Management in Cloud Service EnvironmentsXiaoying Wang, Yuanyuan Xue, Lihua Fan, Rui Wang, Zhihui Du. 147-152 [doi]
- Exchanging Data Agreements in the DaaS ModelHong Linh Truong, Schahram Dustdar, Joachim Götze, Tino Fleuren, Paul Müller, Salah-Eddine Tbahriti, Michael Mrissa, Chirine Ghedira. 153-160 [doi]
- Domain Concept Extraction Model Based on FolksonomyWeisen Pan, Shizhan Chen, Zhiyong Feng. 161-165 [doi]
- Enabling the Benefits of Cloud Computing in a Military ContextKlaus Zaerens. 166-173 [doi]
- On Analyzing and Developing Data Contracts in Cloud-Based Data MarketplacesHong Linh Truong, G. R. Gangadharan, Marco Comerio, Schahram Dustdar, Flavio De Paoli. 174-181 [doi]
- Hybrid Genetic Algorithm for Cloud Computing ApplicationsKai Zhu, Huaguang Song, Lijing Liu, Jinzhu Gao, Guojian Cheng. 182-187 [doi]
- A Three-Step Service Experience Approach with Feedback for Service ProviderZhi Yang, Budan Wu, Nan Yu, Gang Yu, Junliang Chen. 188-194 [doi]
- R2A: Realtime Resolution Adapter for Asymmetric Computer Screen RecordingShin-Hung Chang, Kuei-Hsiung Chang, Wei-Ting Chen. 195-202 [doi]
- Enhancing QoS and Energy Efficiency of Realtime Network Application on Smartphone Using Cloud ComputingIm Young Jung, Insoon Jo, Youngjin Yu, Hyeonsang Eom, Heon Young Yeom. 203-207 [doi]
- Model of Variable Granularity Service Composition Based on Event StreamPengfei Fan, Fenglin Bu, Hongming Cai. 208-214 [doi]
- Formal Analysis of OWL-S Process Model by FDRPing Gong, Jianmin Jiang, Shi Zhang. 215-222 [doi]
- Adaptable Discovery and Ranking of Context-Dependent ServicesNaseem Ibrahim, Mubarak Mohammad, Vangalur S. Alagar. 223-230 [doi]
- Adaptive Failure Detection via Heartbeat under HadoopHao Zhu, Haopeng Chen. 231-238 [doi]
- A Content Aggregation Scheme through an Ontological CategorizationGyubaek Kim. 239-242 [doi]
- Measuring and Analyzing CPU Overhead of Virtualization SystemGuan Tong, Hai Jin, Xia Xie, Wenzhi Cao, Pingpeng Yuan. 243-250 [doi]
- Mismatch Detection of Asynchronous Web Services with Timed ConstraintsGuangquan Zhang, Huijuan Shi, Mei Rong. 251-258 [doi]
- A Formal Specification-Based Testing Approach to Accurate Web Service SelectionWeikai Miao, Shaoying Liu. 259-266 [doi]
- User-centric and QoS-Based Service SessionHouda Alaoui Soulimani, Philippe Coude, Noëmie Simoni. 267-274 [doi]
- Generating Quantitative Test Cases for Probabilistic Timed Web Service CompositionHonghao Gao, Ying Li. 275-283 [doi]
- A Tabu Search Approach for Dynamic Service Substitution in SOA ApplicationsCan Zhang, Hao-Peng Chen, Jinbo Du. 284-289 [doi]
- Generating Scenarios from Web Service ChoreographyKe Zhang Ke, Zongyan Qiu, Hongli Yang. 290-297 [doi]
- A Distributed Cache Based Reliable Service Execution and Recovery Approach in MANETsXi Zhou, Yifan Ge, Xuxu Chen, Yinan Jing, Weiwei Sun. 298-305 [doi]
- Context-Aware Service Overlay Network: Concept and Case StudySeung-Ik Lee, Jong-Hwa Yi, Shin-Gak Kang. 310-315 [doi]
- ROB/CN: An Efficient Reliable 1-Hop Broadcast Using CSMA/CN in Mobile Ad Hoc NetworksSeungjin Park, Seong-Moo Yoo. 316-320 [doi]
- Analyses of a Novel IPTV Framework for Cable TV OperatorsXiaodong Yang. 321-326 [doi]
- Interoperable Telepresence Services: Beyond HD-Videoconferences and Towards TelepresenceWook Hyun, Shin-Gak Kang. 327-329 [doi]
- STEP-a: An Algorithmic Approach towards Trust Based Security in Pervasive Computing EnvironmentNaima Iltaf, Abdul Ghafoor, Mukhtar Hussain. 330-336 [doi]
- An Intelligent System for Wheelchair Users Using Data Mining and Sensor Networking TechnologiesYing-Hong Wu, Cheng Chi Wang, Tzung-Shi Chen, Chih-Yu Li. 337-344 [doi]
- MSOA: Mobility-Aware Service Oriented ArchitectureMohamed Adel Serhani, Abdelghani Benharref. 345-352 [doi]
- A Sampling-Based Data Filtering Scheme for Reducing Energy Consumption in Wireless Sensor NetworksSeung-Tae Hong, Byeong-Seok Oh, Jae-Woo Chang. 353-359 [doi]
- Design and Analysis of a MST-Based Topology Control Scheme with PSO for Wireless Sensor NetworksWenzhong Guo, Jong Hyuk Park, Laurence Tianruo Yang, Athanasios V. Vasilakos, Naixue Xiong, Guolong Chen. 360-367 [doi]
- An Analytical Model for Interactive VANET ServicesTai Chi Wang, Shih Yu Chang. 368-372 [doi]
- ADSR: Angle-Based Multi-hop Routing Strategy for Mobile Wireless Sensor NetworksKwangcheol Shin, Kyungjun Kim, Soontae Kim. 373-376 [doi]
- Coverage Enhancing Algorithms in Directional Sensor Networks with Rotatable SensorsChiu-Kuo Liang, Chih-Hung Tsai, Ting-Hao Chu. 377-383 [doi]
- An Energy-Efficient Dynamic Duty-Cycle and Dynamic Schedule Assignment Scheme for WSNsHsin-Hung Cho, Jian-Ming Chang, Chi-Yuan Chen, Shin-Yun Huang, Han-Chieh Chao, Jiann-Liang Chen. 384-388 [doi]
- Bigraphical Model of Context-Aware in Ubiquitous Computing EnvironmentsDe-Zhen Xu, Dong Xu, Zhou Lei. 389-394 [doi]
- 64 Channel Digital Hearing Aid Emdedded FirmwareSoon-Suck Jarng, Mano Samuel, Je-Hyung Lee. 395-401 [doi]
- A Study on the Human Identification Technique for Privacy Protection in Intelligent Video Surveillance SystemMin-Gu Kim, Hae-Min Moon, Chulho Won, Yongwha Chung, Sung Bum Pan. 402-405 [doi]
- Refined Algorithm for Prime Number Generation in Embedded Security SystemsYoung-Sik Kim, Sujan Raj Shrestha, Ji-Woong Jang. 406-409 [doi]
- Monte Carlo Localization of Underwater Robot Using Internal and External InformationNak Yong Ko, Tae Gyun Kim, Sung Woo Noh. 410-415 [doi]
- Elastic High Performance Applications - A Composition FrameworkTran Vu Pham, Hong Linh Truong, Schahram Dustdar. 416-423 [doi]
- Unifiable Preference Expressions for Pervasive Service CompositionChun-Feng Liao, Hsueh-Hung Cheng, Li-Chen Fu. 424-431 [doi]
- A Design and Implementation of u-Service FrameworkJung-Sik Sung, JongMoo Sohn, Young-Sik Chung. 432-435 [doi]
- A Real-Time Electroencephalogram (EEG) Based Individual Identification Interface for Mobile Security in Ubiquitous EnvironmentBin Hu, Quanying Liu, Qinglin Zhao, YanBing Qi, Hong Peng. 436-441 [doi]
- Message Dependency-Based Adaptation of ServicesJianmin Jiang, Shi Zhang, Ping Gong, Zhong Hong. 442-449 [doi]
- Bringing Socialized Semantics into Web Services Based on User-centric Collaborative Tagging and Usage ExperienceUddam Chukmol, Aïcha-Nabila Benharkat, Youssef Amghar. 450-455 [doi]
- An Approach to Modeling and Analyzing Security Requirements of Service CompositionGuisheng Fan, Huiqun Yu, Liqiong Chen, Dongmei Liu. 456-463 [doi]
- A Survey of Service Identification StrategiesSimin Cai, Yan Liu, Xiaoping Wang. 464-470 [doi]
- Enabling Interoperability across Heterogeneous Semantic Web Services with OWL-S Based MediationLe Duy Ngan, Yuzhang Feng, Seungmin Rho, Rajaraman Kanagasabai. 471-476 [doi]
- Automatic Service Composition via Model CheckingYuzhang Feng, Anitha Veeramani, Rajaraman Kanagasabai, Seungmin Rho. 477-482 [doi]
- A Plan-Based Service Composition for Work Process Agent in Ubiquitous ComputingSeheon Song, Minkoo Kim. 483-487 [doi]
- BDI Agent-Based Mobile Assistant Service on Android Using JAMHyo-Eun Eom, Seheon Song, Minkoo Kim. 488-492 [doi]
- Integrating Business Processes and Business RulesYujing Zhao, Dianfu Ma, Yongwang Zhao, Zhuqing Li. 493-497 [doi]
- A Framework for Context-Aware P2P ServiceChangKyu Lee, SungHei Kim, Shingak Kang. 498-502 [doi]
- A Solution for Grouping Vietnamese Synonym Feature Words in Product ReviewsHuyen-Trang Pham, Tien-Thanh Vu, Mai-Vu Tran, Quang-Thuy Ha. 503-508 [doi]