Abstract is missing.
- Social media guidelines for maritime transport crises situations in the EU areaIrmeli Makitalo, Janne Tuominen, Riina Timonen, Ilkka Tikanmaki. 1-6 [doi]
- Modeling communicational and informational content in Facebook with context specific methodsJohannes Schick, Martin Kuboschek, Wolfram-Manfred Lippe. 7-12 [doi]
- The usage of social media in crisis communicationAntti Miettinen, Jani Nousiainen, Jyri Rajamäki, Juha Knuuttila. 13-18 [doi]
- Grammatical inference for the construction of opening booksWojciech Wieczorek, Arkadiusz Nowakowski. 19-22 [doi]
- A study on facility maintenance information composition and sophisticated technology utilization measuresTae-Hak Kim, Seong-Jin Kim. 23-26 [doi]
- Automated color image arrangement method for multiple-peak imageYusuke Kawakami, Tetsuo Hattori, Yoshiro Imai, Yo Horikawa, Haruna Matsushita, R. P. C. Janaka Rajapakse. 27-30 [doi]
- How a real-time video solution can affect to the level of preparedness in situation centersJussi Simola, Jyri Rajamäki. 31-36 [doi]
- eGuardSami Savolainen, Marika Ridell, Marko Lehtonen, Paresh Rathod. 37-42 [doi]
- Fun Academic Cloud ComputingShoug Alfadhli, Asmaa Alsumait. 43-48 [doi]
- Social testing: A framework to support adoption of continuous delivery by small medium enterprisesJonathan Dunne, David Malone, Jason Flood. 49-54 [doi]
- Building adaptive user interface using cloud computingNikos Dimokas, Kostas Kalogirou, Pavlos Spanidis, Evangelos Bekiaris. 55-60 [doi]
- Leveraging Complex Event Processing for supporting small and medium-sized e-commerce enterprisesChristopher Ruff, Florian Maier, Tobias Muller, Holger Kett. 61-66 [doi]
- Extracting product unit attributes from product offers by using an ontologyAndrea Horch, Holger Kett, Anette Weisbecker. 67-71 [doi]
- A study on the integrated construction cost management method with reflection of the characteristics of public construction works in South KoreaSeong-Jin Kim, Tae-Hak Kim. 72-75 [doi]
- Service integration in the Internet of ThingsKaiyu Wan, Vangalur S. Alagar. 76-82 [doi]
- The cascading knowledge discovery in databases process in the information system developmentMarcin Mironczuk. 83-89 [doi]
- Mechanism of critical and resilient digital services for design theoryRauno Pirinen, Jyri Rajamäki. 90-95 [doi]
- A framework for smoking cessation in the Kingdom Of Saudi Arabia using smart mobile phone technologies (Smoke Mind)Abdullah H. Alsharif, Nada Y. Philip. 96-102 [doi]
- Automatic acceptance testing of the web application security with ITU-T X.805 frameworkParesh Rathod, Viljami Julkunen, Tero Kaisti, Janne Nissila. 103-108 [doi]
- The Secure Urgent Situation Propagation System using the Mobile Security SolutionGeonlyang Kim, Yong-Sung Jeon, Jeong-Nyeo Kim. 109-114 [doi]
- Analysis and solutions to publicize GonuKihyun Kim, Taeson Yoon. 115-123 [doi]
- An algorithm of calligraphy beautification based on improved velocity and width modelShuting Hou. 124-127 [doi]
- Building trust between citizens and their governmentsJyri Rajamäki, Juha Knuuttila, Harri Ruoslahti, Pasi Patama, Jouni Viitanen. 128-133 [doi]
- Implementation of back-stepping integral controller for a gesture driven quad-copter with human detection and auto follow featureRamamoorthy Luxman, Xiao Liu. 134-138 [doi]
- Random number visualization using the TRNGKihyun Kim. 139-142 [doi]
- A verification mechanism for cloud brokerage systemJohannes Harungguan Sianipar, Christoph Meinel. 143-148 [doi]
- Combination of histogram of oriented gradients and hierarchical centroid for sketch-based image retrievalNorah M. Asiri, Nourah AlHumaidi, Nourah AlOsaim. 149-152 [doi]
- An online training for the EU Common Information Sharing EnvironmentAnne Huotari, Ilkka Tikanmaki. 153-156 [doi]
- The real time picture sharing in the cloud serviceMikko Taponen, Mari Liiri-Forsberg, Ilkka Tikanmaki. 157-162 [doi]
- Performance analysis of security attacks and improvements of routing protocols in MANETKuldeep Singh, Amanat Boparai, Vrinda Handa, Sudesh Rani. 163-169 [doi]
- A social robotics children diabetes management and educational system for Saudi Arabia: System architectureMohammad AlOtaibi, Islam Choudhury. 170-174 [doi]
- Internet addiction: A structured literature review and future research directionsSulaiman Al Sheibani. 175-181 [doi]
- TB±tree: Index structure for Information Retrieval SystemsMabruk Fekihal, Ibrahim Jaluta, Dinesh Kumar Saini. 182-186 [doi]
- Scenario work in international development projectLaura Tarkkanen, Mari Aro. 187-191 [doi]
- Using scenarios to showcase how RPAS can be implemented in border surveillanceLaura Tarkkanen, Mari Aro. 192-197 [doi]
- Enhancing situation awareness through real-time videoRiku Leppanen. 198-203 [doi]
- Use of Remotely Piloted Aircraft Systems in Arctic and comparable extreme environments in civil security scenariosKaci Bourdache, Tina El-Nemr. 204-208 [doi]
- Towards a new possibilistic collaborative filtering approachManel Slokom, Raouia Ayachi. 209-216 [doi]