Abstract is missing.
- The Future of Intelligent Ubiquitous Computing SystemsYoung-Im Cho. 1-3 [doi]
- Who Is Responsible for Security and Privacy in the Cloud?Dipankar Dasgupta. 4 [doi]
- The Optimizing Web: Leveraging Agent Technology for SustainabilityAditya Ghose. 5-8 [doi]
- Scalable Detection of Cyber AttacksMassimiliano Albanese, Sushil Jajodia, Andrea Pugliese, V. S. Subrahmanian. 9-18 [doi]
- An Effective Research of EmotionDong Hwa Kim, Khalid Saeed, Cha Geun Jung. 19-21 [doi]
- Regularization of Large Scale Total Least Squares ProblemsHeinrich Voss, Jörg Lampe. 22-37 [doi]
- Reliability Estimation of Delay Tolerant QoS Mobile Agent System in MANETChandreyee Chowdhury, Sarmistha Neogy. 38-47 [doi]
- Network Event Correlation and Semantic Reasoning for Federated Networks Protection SystemMichal Choras, Rafal Kozik. 48-54 [doi]
- VAMI - A Novel Architecture for Vehicular Ambient Intelligent SystemAnupam Saha, Rituparna Chaki. 55-64 [doi]
- A Cost Efficient Multicast Routing and Wavelength Assignment in WDM Mesh NetworkSubhendu Barat, Ashok Kumar Pradhan, Tanmay De. 65-73 [doi]
- Combination of Decision Support System (DSS) for Remote Healthcare Monitoring Using a Multi-agent ApproachMohamed Achraf Dhouib, Lamine Bougueroua, Katarzyna Wegrzyn-Wolska. 74-84 [doi]
- MABHIDS: A New Mobile Agent Based Black Hole Intrusion Detection SystemDebdutta Barman Roy, Rituparna Chaki. 85-94 [doi]
- Agent Based Approach for Radio Resource Optimization for Cellular NetworksRakesh Kumar Mishra, Suparna Saha, Sankhayan Choudhury, Nabendu Chaki. 95-104 [doi]
- Influence of Database Quality on the Results of Keystroke Dynamics AlgorithmsPiotr Panasiuk, Khalid Saeed. 105-112 [doi]
- A New Algorithm for Speech and Gender Recognition on the Basis of Voiced Parts of SpeechJakub Karwan, Khalid Saeed. 113-120 [doi]
- Fast Feature Extractors for Palmprint BiometricsMichal Choras, Rafal Kozik. 121-127 [doi]
- Handwritten Signature Recognition with Adaptive Selection of Behavioral FeaturesRafal Doroz, Piotr Porwik. 128-136 [doi]
- Robust Algorithm for Fingerprint Identification with a Simple Image DescriptorKamil Surmacz, Khalid Saeed. 137-144 [doi]
- A Method for Unsupervised Detection of the Boundary of Coarticulated Units from Isolated Speech Using Recurrence PlotArijit Sinharay, Syed Mohd Bilal, Tanushyam Chattopadhyay. 145-151 [doi]
- Czech Text Segmentation Using Voting Experts and Its Comparison with Menzerath-Altmann lawTomás Kocyan, Jan Martinovic, Jiri Dvorský, Václav Snásel. 152-160 [doi]
- On Creation of Reference Image for Quantitative Evaluation of Image Thresholding MethodSoharab Hossain Shaikh, Asis Kumar Maiti, Nabendu Chaki. 161-169 [doi]
- Medical Aid for Automatic Detection of MalariaPramit Ghosh, Debotosh Bhattacharjee, Mita Nasipuri, Dipak Kumar Basu. 170-178 [doi]
- Measuring Leanness and Agility Status of Iranian Food Industries Supply Chains Using Data Envelopment AnalysisPouyeh Rezazadeh. 179-191 [doi]
- KPIs from Web Agents for Policies' Impact Analysis and Products' Brand AssessmentAntonio Candiello, Agostino Cortesi. 192-201 [doi]
- Stochastic Local Search Approaches in Solving the Nurse Scheduling ProblemSudip Kundu, Sriyankar Acharyya. 202-211 [doi]
- GA Based Denoising of Impulses (GADI)Jyotsna Kumar Mandal, Somnath Mukhopadhyay. 212-220 [doi]
- Handling Write Lock Assignment in Cloud Computing EnvironmentSangeeta Sen, Rituparna Chaki. 221-230 [doi]
- The Design of Active Feedback Controllers for the Generalized Projective Synchronization of Hyperchaotic Qi and Hyperchaotic Lorenz SystemsSundarapandian Vaidyanathan, Sarasu Pakiriswamy. 231-238 [doi]
- Parallel Hybrid SOM Learning on High Dimensional Sparse DataLukás Vojácek, Jan Martinovic, Jiri Dvorský, Katerina Slaninová, Ivo Vondrák. 239-246 [doi]
- Operational Algebra for a Graph Based Semantic Web Data ModelAbhijit Sanyal, Sankhayan Choudhury. 247-256 [doi]
- A Survey on the Semi-Structured Data ModelsSupriya Chakraborty, Nabendu Chaki. 257-266 [doi]
- Observation-Based Fine Grained Access Control for XML DocumentsRaju Halder, Agostino Cortesi. 267-276 [doi]
- Controlled Access over Documents for Concepts Having Multiple Parents in a Digital Library OntologySubhasis Dasgupta, Aditya Bagchi. 277-285 [doi]
- Secret Image Sharing with Embedded Session KeyPrabir Kumar Naskar, Hari Narayan Khan, Ujjal Roy, Ayan Chaudhuri, Atal Chaudhuri. 286-294 [doi]
- Command and Block Profiles for Legitimate Users of a Computer NetworkAnna Bartkowiak. 295-304 [doi]
- Songs Authentication through Embedding a Self Generated Secure Hidden Signal (SAHS)Uttam Kr. Mondal, Jyotsna Kumar Mandal. 305-313 [doi]
- Secure Money Transaction in NFC Enabled Mobile Wallet Using Session Based Alternative Cryptographic TechniquesRiti Chowdhury, Debashis De. 314-323 [doi]