Abstract is missing.
- Mining Time Pattern Association Rules in Temporal DatabaseNguyen Dinh Thuan. 7-11 [doi]
- Domain-Based Intelligent Tutoring SystemDawod Kseibat, Ali Mansour, Osei Adjei. 13-17 [doi]
- I Know What You Did This Summer - Users Behavior on InternetZeeshan-ul-hassan Usmani, Fawzi Abdulkhaliq Alghamdi, Amina Tariq, Talal Naveed Puri. 19-24 [doi]
- Relative Ranking - A Biased RatingZeeshan-ul-hassan Usmani, Fawzi Abdulkhaliq Alghamdi, Amina Tariq, Talal Naveed Puri. 25-29 [doi]
- Resource Redundancy - A Staffing Factor using SFIAC. Nuangjamnong, Stanislaw P. Maj, D. Veal. 31-35 [doi]
- Integrating Text Mining and Genetic Algorithm for Subject SelectionY. C. Phung, Somnuk Phon-Amnuaisuk, R. Komiya. 37-41 [doi]
- Search for equilibrium state flightJaroslav Tupy, Ivan Zelinka. 49-54 [doi]
- Evaluating acceptance of OSS-ERP based on user perceptionsSalvador Bueno, M. Dolores Gallego. 55-60 [doi]
- Enhanced Progressive Vector Data Transmission For Mobile Geographic Information Systems (MGIS)Ahmed Abdel Hamid, Mahmoud Ahmed, Yehia Helmy. 61-66 [doi]
- Mining Inter-transaction Data Dependencies for Database Intrusion DetectionYi Hu, Brajendra Panda. 67-72 [doi]
- Energy-Security Adaptation Scheme of Block Cipher Mode of OperationsAmit K. Beeputh, M. Razvi Doomun, Padaruth Dookee. 73-78 [doi]
- Treating measurement uncertainty in complete conformity control systemZsolt Tibor Kosztyán, T. Csizmadia, Cs. Hegedüs, Z. Kovács. 79-84 [doi]
- Software Process Improvement Models Implementation in MalaysiaShukor Sanim Bin Mohd Fauzi, Nuraminah R., M. Hairul Nizam M. Nasir. 85-90 [doi]
- Neural Network and Social Network to enhance the customer loyalty processCarlos André Reis Pinheiro, Markus Helfert. 91-96 [doi]
- Using B-trees to Implement Water: a Portable, High Performance, High-Level LanguageAubrey Jaffer, Mike Plusch, Robert Nilsson. 97-100 [doi]
- Voice Based Self Help System: User Experience Vs AccuracySunil Kumar Kopparapu. 101-105 [doi]
- Arabic Character Recognition Using Gabor FiltersHamdi A. Al-Jamimi, Sabri A. Mahmoud. 113-118 [doi]
- Entropy, Autocorrelation and Fourier analysis of HIV-1 GenomeSushil Chandra, Ahsan Zaigam Rizvi. 119-121 [doi]
- Contextual Data Rule Generation For Autonomous Vehicle ControlKevin McCarty, Milos Manic, Sergiu-Dan Stan. 123-128 [doi]
- A New Perspective in Scientific Software DevelopmentAtif Farid Mohammad. 129-134 [doi]
- Supply Chain Requirements Engineering: A Simulated Reality CheckAtif Farid Mohammad, Dustin E. R. Freeman. 135-140 [doi]
- A Path from a Legacy System to GUI SystemAtif Farid Mohammad. 141-146 [doi]
- Features Based Approach to Identify the P2P File SharingJian-Bo Chen. 147-151 [doi]
- Evaluating the Performance of 3D Face Reconstruction AlgorithmsAndreas Lanitis, Georgios Stylianou. 153-158 [doi]
- Multi Dimensional and Flexible Model for DatabasesMorteza Sargolzaei Javan, Farahnaz Mohanna, Sepide Aghajani. 159-164 [doi]
- Secondary Emotions Deduction from ContextKuderna-Iulian Benta, Marcel Cremene, Nicoleta Ramona Giba, Ulises Xolocotzin Eligio, Anca Rarau. 165-170 [doi]
- Empowering Traditional Mentoring Matching Mechanism Selection Using Agent-Based SystemAhmad Sofian Shminan, Iskandar Sarkawi, Mohd Kamal Othman, Mardhiah Hayati Rahim. 171-178 [doi]
- A Method of Evaluating Authentication MechanismsLiang Xia, Yongjian Yang, Yong Wang. 179-184 [doi]
- ASTRA: An Awareness Connectivity Platform for Designing Pervasive Awareness ApplicationsIoannis Calemis, Achilles Kameas, Christos Goumopoulos, Erik Berg. 185-190 [doi]
- Extending OWL-S to nested services: an application to optimum wireless network planningAlessandra Esposito, Luciano Tarricone, Laura Vallone. 191-195 [doi]
- A Multi-Agent Role-Based System for Business IntelligenceTamer F. Mabrouk, Mohamed M. El-Sherbiny, Shawkat K. Guirguis, Ayman Y. Shawky. 203-208 [doi]
- LERUS: A User Interface Specification LanguageFernando Alonso, José L. Fuertes, Ángel Lucas González, Loïc Martínez. 209-214 [doi]
- Mitral Valve Models Reconstructor: a Python based GUI software in a HPC environment for patient-specific FEM structural analysisA. Arnoldi, A. Invernizzi, Raffaele Ponzini, E. Votta, Enrico G. Caiani, Alberto Redaelli. 215-219 [doi]
- An Intelligible Representation Method For Software Reusable ComponentsS. S. V. N. Sharma, P. Shirisha. 221-225 [doi]
- Creating Personally Identifiable HoneytokensJonathan White. 227-232 [doi]
- The role of user experience on FOSS acceptanceM. Dolores Gallego, Salvador Bueno. 233-236 [doi]
- Using Spectral Fractal Dimension in Image ClassificationJózsef Berke. 237-241 [doi]
- A Novel Method to Compute English Verbs Metaphor Making Potential in SUMOZili Chen, Jonathan J. Webster, Ian C. Chow. 243-247 [doi]
- A Numerical Construction Algorithm of Nash and Stackelberg Solution for Two-person Non-zero Sum Linear Positional Differential GamesAnatolii F. Kleimenov, Sergei I. Osipov, Dmitry R. Kuvshinov. 249-254 [doi]
- Computer Simulation of Differential Digital HolographyKresimir Nenadic, Marina Pesut, Franjo Jovic, Ninoslav Slavek. 255-258 [doi]
- Evaluation of Case Based Reasoning for Clinical Decision Support Systems applied to Acute Meningitis DiagnoseCecilia Maurente, Ernesto Ocampo Edye, Silvia Herrera Delgado, Daniel Rodriguez-García. 259-264 [doi]
- Information Systems via Epistemic StatesAlexei Y. Muravitsky. 265-271 [doi]
- Practical Application of Performance Models to Predict the Productivity of ProjectsCarla Ilane Moreira Bezerra, Ciro Carneiro Coelho, Carlo Giovano S. Pires, Adriano Bessa Albuquerque. 273-277 [doi]
- An Approach to Evaluate and Improve the Organizational Processes Assets: the First Experience of UseAdriano Bessa Albuquerque, Ana Regina Rocha. 279-284 [doi]
- A Multiple Criteria Approach to Analysis and Resolution of the Causes of Problems on Software OrganizationsFrancisca Márcia G. S. Gonçalves, Adriano Bessa Albuquerque, Daniele de Oliveira Farias, Plácido Rogério Pinheiro. 285-290 [doi]
- A Secure Software Development Supported by Knowledge ManagementFrancisco José Barreto Nunes, Adriano Bessa Albuquerque. 291-296 [doi]
- Mobile Application for Healthcare System - Location BasedSarin Kizhakkepurayil, Oh Jeon-Yeoul, Young Lee. 297-302 [doi]
- A General Framework for Testing Web-Based ApplicationsSaeid Abrishami, Mohsen Kahani. 303-306 [doi]
- Integrated Reverse Engineering Process ModelGhulam Rasool, Ilka Philippow. 307-311 [doi]
- Achieving Consistency and Reusability in Presentation Layer Design using Formal Methods and Design PatternsFaheem Sohail, Farooq Zubairi, Nabeel Sabir, Nazir Ahmad Zafar. 313-318 [doi]
- Visualization of Large Software Projects by using Advanced TechniquesJuan García, Roberto Therón, Francisco Garcia. 325-330 [doi]
- A multi level priority clustering GA based approach for solving heterogeneous Vehicle Routing Problem (PCGVRP)M. Mehdi S. Haghighi, M. Hadi Zahedi, Mehdi Ghazizadeh. 331-335 [doi]
- BWN - A Software Platform for Developing Bengali WordNetFarhana Faruqe, Mumit Khan. 337-342 [doi]
- Robust Learning Algorithm for Networks of Neuro-Fuzzy UnitsYevgeniy Bodyanskiy, Sergiy Popov, Mykola Titov. 343-346 [doi]
- An Experience of Use of an Approach to Construct Measurement Repositories in Software OrganizationsSolange Alcåntara Araújo, Adriano Bessa Albuquerque, Arnaldo Dias Belchior, Nabor Chagas Mendonça. 347-352 [doi]
- A Visualization-based Intelligent Decision Support System Conceptual ModelHawaf Abdalhakim, Mohamed Abdelfattah. 353-358 [doi]
- Analysis of selected component technologies efficiency for parallel and distributed seismic wave field modelingA. Kowal, A. Piórkowski, Tomasz Danek, A. Pieta. 359-362 [doi]
- Modified Locally Linear Embedding based on Neighborhood RadiusYaohui Bai. 363-367 [doi]
- A Digital Forensics PrimerGavin Wylie Manes. 369-372 [doi]
- Semantic Enrichment: The First Phase of Relational Database MigrationM. Abdelsalam Maatuk, M. Akhtar Ali, B. Nick Rossiter. 373-378 [doi]
- The Impact of the Prototype Selection on a Multicriteria Decision Aid Classification AlgorithmAmaury T. Brasil Filho, Plácido Rogério Pinheiro, André L. V. Coelho. 379-382 [doi]
- Information Handling in Security Solution DecisionsMd. Abdul Based. 383-388 [doi]
- Identifying Connected Classes for Software Reuse and MaintenanceYoung Lee, Jeong Yang, Kai H. Chang. 389-393 [doi]
- Usability Design Recommendations: A First AdvanceMarianella Aveledo, Agustín De la Rosa, Ana M. Moreno. 395-400 [doi]
- The Status Quo of 3G Application in ChinaNaipeng Ding, Cui Wang, Guangming Jia. 401-406 [doi]
- A new approach for critical resources allocationFacundo E. Cancelo, Pablo Cababie, Daniela López De Luise, Gabriel Barrera. 407-411 [doi]
- Numerical-Analytic Model of Multi-Class, Multi-Server Queue with Nonpreemptive PrioritiesMindaugas Snipas, Eimutis Valakevicius. 413-415 [doi]
- Project Prioritization as a Key Element in IT Strategic Demand ManagementIgor Aguilar Alonso, José Carrillo Verdún, Edmundo Tovar Caro. 417-422 [doi]
- Greylisting method analysis in real SMTP server environment - Case-studyTomas Sochor. 423-427 [doi]
- Using Formal Methods in Component Based Software DevelopmentSajad Shirali-Shahreza, Mohammad Shirali-Shahreza. 429-432 [doi]
- Costs and Benefits in Knowledge Management in Czech EnterprisesPetra Maresová, M. Hedvicakova. 433-437 [doi]
- Ontology-based representation of activity spheres in ubiquitous computing spacesLambrini Seremeti, Achilles Kameas. 439-443 [doi]
- Image Decomposition on the basis of an Inverse Pyramid with 3-layer Neural NetworksValeriy Cherkashyn, Roumen Kountchev, Dong-Chen He. 445-450 [doi]
- Testing Grammars For Top-Down ParsersA. M. Paracha, Frantisek Franek. 451-456 [doi]
- Accessing Web Based Multimedia Contents for the Visually Challenged: Combined Tree Structure and XML MetadataVictoria Christy Sathya Rajasekar, Young Lee, Barbara Schreur. 457-462 [doi]
- M-Business and Organizational behaviorOlaf Thiele. 463-466 [doi]
- A Policy-based Framework for QoS Management in Service Oriented EnvironmentsElarbi Badidi, Mohamed Adel Serhani, Larbi Esmahi. 467-472 [doi]
- An Attacks Ontology for computer and networks attackF. Abdoli, N. Meibody, R. Bazoubandi. 473-476 [doi]
- Information Quality and AccessibilityOwen Foley, Markus Helfert. 477-481 [doi]
- Engineering Autonomous Trust-Management Requirements for Software Agents: Requirements and ConceptsSven Kaffille, Guido Wirtz. 483-489 [doi]
- Evaluation of Semantic Actions in Predictive Non-Recursive ParsingJosé L. Fuertes, Aurora Pérez. 491-496 [doi]
- Pair Hidden Markov Model for Named Entity MatchingPeter Nabende, Jörg Tiedemann, John Nerbonne. 497-502 [doi]
- Escaping Death - Geometrical Recommendations for High Value TargetsZeeshan-ul-hassan Usmani, Eyosias Yoseph Imana, Daniel Kirk. 503-508 [doi]
- Sentiment Mining Using Ensemble Classification ModelsMatthew Whitehead, Larry Yaeger. 509-514 [doi]
- Shapely Functions and Data Structure Preserving ComputationsThomas Nitsche 0001. 519-525 [doi]
- IraqComm and FlexTrans: A Speech Translation System and Flexible FrameworkMichael W. Frandsen, Susanne Riehemann, Kristin Precoda. 527-532 [doi]
- Development of Ubiquitous Median Strip Total System in the RoadByung-wan Jo, Jung-hoon Park, Kwang-won Yoon, Heoun Kim, Ji-Sun Choi. 533-537 [doi]
- An LOD Control Interface for an OpenGL-based Softbody Simulation FrameworkMiao Song, Peter Grogono. 539-543 [doi]
- Laboratory performance test of overload vehicles regu-lation system on Ubiquitous roadByung-wan Jo, Kwang-won Yoon, Seok-won Kang, Jung-hoon Park, Heoun Kim. 545-550 [doi]
- Design of bridge health monitoring system on Wireless Sensor NetworkByung-wan Jo, Heoun Kim, Jung-hoon Park, Kwang-won Yoon, Seok-won Kang, Seong-hee Han. 551-554 [doi]
- Totally Sender- And File-Order Recovery Technique For Reliable Multicasting Solutions Using HeartbeatChin Teck Min, Tong-Ming Lim. 555-559 [doi]
- Anonymity Leakage Reduction in Network LatencyLongy O. Anyanwu, Jared Keengwe, Gladys A. Arome. 561-565 [doi]
- Enterprise 2.0 Collaboration for Collective Knowledge and Intelligence ApplicationsR. William Maule, Shelley P. Gallup. 567-572 [doi]
- Knowledge Engineering Experimentation Management System for CollaborationR. William Maule, Shelley P. Gallup, Jack J. Jensen. 573-578 [doi]
- Building Information Modeling and Interoperability with Environmental Simulation SystemsPaola C. Ferrari, Neander F. Silva, Ecilamar M. Lima. 579-583 [doi]