Abstract is missing.
- Noise Injection for Search Privacy ProtectionShaozhi Ye, Shyhtsun Felix Wu, Raju Pandey, Hao Chen. 1-8 [doi]
- Performance Modelling and Analysis of Integrated WLANs and Internet-Access Mesh NetworksGeyong Min, Yulei Wu, Laurence Tianruo Yang. 1-8 [doi]
- Edge Anonymity in Social Network GraphsLijie Zhang, Weining Zhang. 1-8 [doi]
- On the Design of a Suitable Hardware Platform for Protocol Stack Processing in LTE TerminalsSebastian Hessel, David Szczesny, Shadi Traboulsi, Attila Bilgic, Josef Hausner. 1-8 [doi]
- A Region-Based Allocation Approach for Page-Based Scratch-Pad Memory in Embedded SystemsSheng-Wei Huang, Yung-Chang Chiu, Zhong-Ho Chen, Ce-Kuen Shieh, Alvin Wen-Yu Su, Tyng-Yeu Liang. 9-16 [doi]
- Privacy-Preserving Bayesian Network for Horizontally Partitioned DataSaeed Samet, Ali Miri. 9-16 [doi]
- Guanxi in the Chinese WebValerie King, Louis Yu, Yan Zhuang. 9-17 [doi]
- A Trade-Off Approach to Optimal Resource Allocation Algorithm with Cache Technology in Ubiquitous Computing EnvironmentMianxiong Dong, Long Zheng, Kaoru Ota, Song Guo, Minyi Guo, Li Li. 9-15 [doi]
- Self-Tuning the Parameter of Adaptive Non-linear Sampling Method for Flow StatisticsChengchen Hu, Bin Liu. 16-21 [doi]
- Privacy-Preserving Multi-agent Constraint SatisfactionThomas Léauté, Boi Faltings. 17-25 [doi]
- Better Than Optimal: Fast Identification of Custom Instruction CandidatesJoseph Reddington, Gregory Gutin, Adrian Johnstone, Elizabeth Scott, Anders Yeo. 17-24 [doi]
- Anomaly Detection in Dynamic Social Systems Using Weak EstimatorsJustin Zhan, B. John Oommen, Johanna Crisostomo. 18-25 [doi]
- A Cognitive Approach to Achieve Fair Uplink and Downlink Utilities in Wireless NetworksChiapin Wang, Kueihsiang Liang. 22-28 [doi]
- Fast Inter Mode Decision Algorithm Based on the MB Activity for MPEG-2 to H.264/AVC TranscodingXingang Liu, Wei Zhu, Kook-yeol Yoo. 25-30 [doi]
- FaceCloak: An Architecture for User Privacy on Social Networking SitesWanying Luo, Qi Xie, Urs Hengartner. 26-33 [doi]
- Structure of Neighborhoods in a Large Social NetworkAlina Stoica, Christophe Prieur. 26-33 [doi]
- A Weighted-Dissimilarity-Based Anomaly Detection Method for Mobile Wireless NetworksIhn-Han Bae, Stephan Olariu. 29-34 [doi]
- Dynamic Reconfigurable Shaders with Load Balancing for Embedded Graphics ProcessingYi-Chi Chen, Hui-Chin Yang, Chung-Ping Chung, Wei-Ting Wang. 31-36 [doi]
- Adapting Privacy-Preserving Computation to the Service Provider ModelFlorian Kerschbaum. 34-41 [doi]
- Deriving Expertise Profiles from TagsAdriana Budura, Daniela Bourges-Waldegg, James Riordan. 34-41 [doi]
- A Novel Resource Management Scheme for Integrated Multiple Traffic Heterogeneous SystemsCheng Zhu, Qing-An Zeng, Dharma P. Agrawal. 35-39 [doi]
- Real Time Multiple Object Tracking Using Tracking MatrixFei Hao, Zhenjiang Miao, Ping Guo, Zhan Xu. 37-41 [doi]
- A Safe RSS Approach for Securely Sharing Mobile SVG Biomedical Images for Web 2.0Sabah Mohammed, Lyle F. Chamarette, Jinan Fiaidhi, Sylvia L. Osborn. 40-47 [doi]
- Visible and IR Data Fusion Technique Using the Contourlet TransformSoad Ibrahim, Michael Wirth. 42-47 [doi]
- Anonymity, Privacy, Onymity, and Identity: A Modal Logic ApproachYasuyuki Tsukada, Ken Mano, Hideki Sakurada, Yoshinobu Kawabe. 42-51 [doi]
- Probabilistic Generative Models of the Social Annotation ProcessSaid Kashoob, James Caverlee, Elham Khabiri. 42-49 [doi]
- Scalable APRIORI-Based Frequent Pattern DiscoverySean Chester, Ian Sandler, Alex Thomo. 48-55 [doi]
- Rotation Scheduling and Voltage Assignment to Minimize Energy for SoCMeikang Qiu, Laurence Tianruo Yang, Edwin Hsing-Mean Sha. 48-55 [doi]
- Detecting Communities from Bipartite Networks Based on Bipartite ModularitiesTsuyoshi Murata. 50-57 [doi]
- Privacy-Enhanced Event SchedulingBenjamin Kellermann, Rainer Böhme. 52-59 [doi]
- Event-Driven Approach for Logic-Based Complex Event ProcessingDarko Anicic, Paul Fodor, Roland Stühmer, Nenad Stojanovic. 56-63 [doi]
- Grouping-Based Dynamic Power Management for Multi-threaded Programs in Chip-MultiprocessorsMu-Kai Huang, J. Morris Chang, Wei-Mei Chen. 56-63 [doi]
- Visually and Acoustically Exploring the High-Dimensional Space of MusicLukas Bossard, Michael Kuhn 0002, Roger Wattenhofer. 58-65 [doi]
- Privacy Management, the Law & Business Strategies: A Case for Privacy Driven DesignMary-Anne Williams. 60-67 [doi]
- K-Stage Pipelined Bloom Filter for Packet ClassificationMahmood Ahmadi, Stephan Wong. 64-70 [doi]
- Incremental Discovery of Sequential Patterns Using a Backward Mining ApproachMing-Yen Lin, Sue-Chen Hsueh, Chih-Chen Chan. 64-70 [doi]
- A Semantic Imitation Model of Social Tag ChoicesWai-Tat Fu, Thomas George Kannampallil, Ruogu Kang. 66-73 [doi]
- t-Plausibility: Semantic Preserving Text SanitizationWei Jiang, Mummoorthy Murugesan, Chris Clifton, Luo Si. 68-75 [doi]
- Data Distribution Methods for Communication Localization in Multi-clusters with Heterogeneous NetworkShih-Chang Chen, Ching-Hsien Hsu, Chun-Te Chiu. 71-78 [doi]
- A Two-Stage Bootloader to Support Multi-application Deployment and Switching in Wireless Sensor NetworksAlan Marchiori, Qi Han. 71-78 [doi]
- A Visual Interface for Social Information FilteringJohn O Donovan, Brynjar Gretarsson, Svetlin Bostandjiev, Tobias Höllerer, Barry Smyth. 74-81 [doi]
- Policy-Based Malicious Peer Detection in Ad Hoc NetworksWenjia Li, Anupam Joshi, Tim Finin. 76-82 [doi]
- An Analytical Model of Communication Networks in Multi-cluster Systems in the Presence of Non-uniform TrafficHojjat Sharifi, Mohammad Kazem Akbari, Bahman Javadi. 79-86 [doi]
- Residual Time Aware Forwarding for Randomly Duty-Cycled Wireless Sensor NetworksLong Cheng, Canfeng Chen, Jian Ma, Lei Shu, Hongyang Chen, Laurence Tianruo Yang. 79-86 [doi]
- Equilibria and Efficiency Loss in Games on NetworksJoshua R. Davis, Zachary Goldman, Jacob Hilty, Elizabeth Koch, David Liben-Nowell, Alexa Sharp, Tom Wexler, Emma Zhou. 82-89 [doi]
- Success Likelihood of Ongoing Attacks for Intrusion Detection and Response SystemsWael Kanoun, Nora Cuppens-Boulahia, Frédéric Cuppens, Samuel Dubus, Antony Martin. 83-91 [doi]
- Balanced and Efficient Data Placement and Replication Strategy for Distributed Backup Storage SystemsK. Renuga, S. S. Tan, Y. Q. Zhu, T. C. Low, Y. H. Wang. 87-94 [doi]
- The More Relay Nodes, the More Energy Efficient?Ying Zhu, Qi Han. 87-92 [doi]
- Ranking Comments on the Social WebChiao-Fang Hsu, Elham Khabiri, James Caverlee. 90-97 [doi]
- Tuning Evidence-Based Trust ModelsEugen Staab, Thomas Engel. 92-99 [doi]
- MALADY: A Machine Learning-Based Autonomous Decision-Making System for Sensor NetworksSudha Krishnamurthy, Geethapriya Thamilarasu, Christian Bauckhage. 93-100 [doi]
- Improvement on Scheduling Dependent Tasks for Grid ApplicationsElaine Cristina Machtans, Liria Matsumoto Sato, Airton Deppman. 95-102 [doi]
- Structure of Heterogeneous NetworksRumi Ghosh, Kristina Lerman. 98-105 [doi]
- Trust Is in the Eye of the BeholderDimitri do B. DeFigueiredo, Earl T. Barr, Shyhtsun Felix Wu. 100-108 [doi]
- Design of an RFID Air Protocol Filtering TechniqueHyun-Sung Park, Jong-Deok Kim. 101-108 [doi]
- Fault-Tolerance Scheduling by Using Rough Set Based Multi-checkpointing on Economic GridsAsgarali Bouyer, Abdul Hanan Abdullah, Hasan Ebrahimpour, Firouz Nasrollahi. 103-109 [doi]
- Online User Activities Discovery Based on Time Dependent DataDan Hong, Vincent Yun Shen. 106-113 [doi]
- A Trust-Based Multiagent SystemRichard Seymour, Gilbert L. Peterson. 109-116 [doi]
- Completely Distributed Low Duty Cycle Communication for Long-Living Sensor NetworksMarcin Brzozowski, Hendrik Salomon, Peter Langendoerfer. 109-116 [doi]
- A Volunteer-Computing-Based Grid Environment for Connect6 ApplicationsI-Chen Wu, Chingping Chen, Ping-Hung Lin, Guo-Chan Huang, Lung-Ping Chen, Der-Johng Sun, Yi-Chih Chan, Hsin-Yun Tsou. 110-117 [doi]
- Socio-semantic Dynamics in a Blog NetworkJean-Philippe Cointet, Camille Roth. 114-121 [doi]
- Towards Automating Social Engineering Using Social Networking SitesMarkus Huber, Stewart Kowalski, Marcus Nohlberg, Simon Tjoa. 117-124 [doi]
- Implementation of Rate Control in Distributed Wireless Multicast by Neural Network PredictionNaixue Xiong, Laurence Tianruo Yang, Yuanyuan Zeng, Chao Ma, Jong Hyuk Park. 117-124 [doi]
- Integration of Mobile Agents Technology and Globus for Assisted Design and Automated Development of Grid ServicesRocco Aversa, Beniamino Di Martino, Salvatore Venticinque. 118-125 [doi]
- The Formation of Task-Oriented Groups: Exploring Combat Activities in Online GamesYun Huang, Mengxiao Zhu, Jing Wang, Nishith Pathak, Cuihua Shen, Brian Keegan, Dmitri Williams, Noshir S. Contractor. 122-127 [doi]
- Social Inference Risk Modeling in Mobile and Social ApplicationsSara Motahari, Sotirios G. Ziavras, Mor Naaman, Mohamed Ismail, Quentin Jones. 125-132 [doi]
- Adaptive and Intelligent Route Learning for Mobile Assets Using Geo-tracking and Context ProfilesDineshbalu Balakrishnan, Amiya Nayak, Pulak Dhar. 125-132 [doi]
- Improvement of Directed Diffusion Protocol Based on Data AggregationHui Chen, Yufeng Shi, Ye Wang, Laurence Tianruo Yang, Naixue Xiong. 126-131 [doi]
- Incremental SVM Model for Spam Detection on Dynamic Email Social NetworksChi-Yao Tseng, Ming-Syan Chen. 128-135 [doi]
- An Energy Efficient Routing Protocol in Wireless Sensor NetworksKyung Tae Kim, Byung Jun Lee, Jae Hyun Choi, Bo Yle Jung, Hee Yong Youn. 132-139 [doi]
- Anonymity Properties of Stored or Transmitted Data Taken from Bluetooth ScansDavid Evans, Robert H. Warren. 133-138 [doi]
- Control-Channel-Reuse-Based Multiple-Channel MAC (CRM-MAC) for Ad Hoc NetworksDivya Sardana, Qing-An Zeng. 133-139 [doi]
- Evaluating the Impact of Attacks in Collaborative Tagging EnvironmentsMaryam Ramezani, Jeff J. Sandvig, Thomas Schimoler, Jonathan Gemmell, Bamshad Mobasher, Robin D. Burke. 136-143 [doi]
- Privacy Requirements in Vehicular Communication SystemsFlorian Schaub, Zhendong Ma, Frank Kargl. 139-145 [doi]
- Location-Based Adaptive Mobile Learning Research Framework and TopicsQing Tan, Kinshuk, Yen-Hung Kuo, Yu-Lin Jeng, Po-Han Wu, Yueh-Min Huang, Tzu-Chien Liu, Maiga Chang. 140-147 [doi]
- Analysing BitTorrent s Seeding StrategiesXinuo Chen, Stephen A. Jarvis. 140-149 [doi]
- Community Computing: Comparisons between Rural and Urban Societies Using Mobile Phone DataNathan Eagle, Yves-Alexandre de Montjoye, LuÃs M. A. Bettencourt. 144-150 [doi]
- A Framework to Balance Privacy and Data Usability Using Data DegradationHarold van Heerde, Maarten M. Fokkinga, Nicolas Anciaux. 146-153 [doi]
- Stable Bayesian Parameter Estimation for Biological Dynamical SystemsAlberto Giovanni Busetto, Joachim M. Buhmann. 148-157 [doi]
- A Middleware for Controlling the Execution of Composite ServicesXinfeng Ye, Yi Chen. 150-157 [doi]
- Social Synchrony: Predicting Mimicry of User Actions in Online Social MediaMunmun De Choudhury, Hari Sundaram, Ajita John, Dorée Duncan Seligmann. 151-158 [doi]
- A Lattice-Based Privacy Aware Access Control ModelKambiz Ghazinour, Maryam Majedi, Ken Barker. 154-159 [doi]
- On Performance Enhancement of Circuit Simulation Using Multithreaded TechniquesRuey-Kuen Perng, Tien-hsiung Weng, Kuan-Ching Li. 158-165 [doi]
- 2T-DHT: A Two Tier DHT for Implementing Publish/SubscribeMayank Pandey, Syed Mushtaq Ahmed, Banshi Dhar Chaudhary. 158-165 [doi]
- Representing Small Group EvolutionWhitman Richards, Nicholas C. Wormald. 159-165 [doi]
- Modelling of Pseudonymity under Probabilistic Linkability AttacksMartin Neubauer. 160-167 [doi]
- Private Buddy Search: Enabling Private Spatial Queries in Social NetworksAli Khoshgozaran, Cyrus Shahabi. 166-173 [doi]
- A Software Architecture-Based Framework Supporting Suggestion of Medical Surveillance Level from Classification of Electronic Patient RecordsJuliana T. Pollettini, Flávia P. Nicolas, Sylvia G. Panico, Julio C. Daneluzzi, Renato Tinós, José Augusto Baranauskas, Alessandra Alaniz Macedo. 166-173 [doi]
- mBrace: Action-Based Performance Monitoring of Multi-tier Web ApplicationsAndrej van der Zee, Alexandre Courbot, Tatsuo Nakajima. 166-173 [doi]
- Privacy-Preserving Integrity-Assured Data Aggregation in Sensor NetworksGelareh Taban, Virgil D. Gligor. 168-175 [doi]
- Robust Translational Motion of Single-Row SPCE by the Parallel BinocularGwo-Long Lin. 174-179 [doi]
- Multi-level Cellular Automata & Social DynamicsJan J. Koenderink, Whitman Richards. 174-180 [doi]
- Reducing Code Size by Graph Coloring Register Allocation and Assignment Algorithm for Mixed-Width ISA ProcessorJyh-Shian Wang, I-Wei Wu, Yu-Sheng Chen, Jean Jyh-Jiun Shann, Wei-Chung Hsu. 174-181 [doi]
- User-centric Privacy Framework: Integrating Legal, Technological and Human Aspects into User-Adapting SystemsVictor Manuel GarcÃa-Barrios. 176-181 [doi]
- Mining Frequent Patterns with Gaps and One-Off ConditionYongming Huang, Xindong Wu, Xuegang Hu, Fei Xie, Jun Gao, Gong-Qing Wu. 180-186 [doi]
- Extended Social Tags: Identity Tags Meet Social NetworksSonia Lajmi, Johann Stan, Hakim Hacid, Elöd Egyed-Zsigmond, Pierre Maret. 181-187 [doi]
- Optimization of Component Connections for an Embedded Component SystemTakuya Azumi, Hiroaki Takada, Hiroshi Oyama. 182-188 [doi]
- An Empirical Study on Privacy and Secure Multi-party Computation Using ExponentiationI-Cheng Wang, Chih-Hao Shen, Kung Chen, Tsan-sheng Hsu, Churn-Jung Liau, Da-Wei Wang. 182-188 [doi]
- An Evolutionary Approach for Multi-objective 3D Differentiated Sensor Network DeploymentChih-Wei Kang, Jian-Hung Chen. 187-193 [doi]
- Size Matters: Variation in Personal Network Size, Personality and Effect on Information TransmissionYu-En Lu, Sam Roberts, Pietro Liò, Robin Dunbar, Jon Crowcroft. 188-193 [doi]
- Improving Hybrid Flash-Disk Storage by Incorporating Sequential Pattern Mining into Fully-Associative Sector TranslationUn-Keun Yoon, Han-joon Kim. 189-196 [doi]
- A Hybrid Enforcement Model for Group-centric Secure Information SharingRam Krishnan, Ravi S. Sandhu. 189-194 [doi]
- Solving 0/1 Knapsack Problem for Light Communication SLA-Based Workflow Mapping Using CUDADang Minh Quan, Laurence Tianruo Yang. 194-200 [doi]
- TagRec: Leveraging Tagging Wisdom for RecommendationTom Chao Zhou, Hao Ma, Irwin King, Michael R. Lyu. 194-199 [doi]
- A Framework for Enforcing Constrained RBAC PoliciesJason Crampton, Hemanth Khambhammettu. 195-200 [doi]
- Distributed Agents Network for Ubiquitous Monitoring and Services ExploitationRocco Aversa, Beniamino Di Martino, Salvatore Venticinque. 197-204 [doi]
- Development and Validation of an Agent-Based Simulation Model of Juvenile DelinquencyTibor Bosse, Charlotte Gerritsen, Michel C. A. Klein, Frank M. Weerman. 200-207 [doi]
- Guarantee-Based Access ControlMohammed Hussain, David B. Skillicorn. 201-206 [doi]
- A Coarse-Grain Parallel Genetic Algorithm for Flexible Job-Shop Scheduling with Lot StreamingFantahun M. Defersha, Mingyuan Chen. 201-208 [doi]
- Extended Dempster-Shafer Theory in Context Reasoning for Ubiquitous Computing EnvironmentsDaqiang Zhang, Jiannong Cao, Jingyu Zhou, Minyi Guo. 205-212 [doi]
- Integrity Verification of Outsourced XML DatabasesRuilin Liu, Hui Wang. 207-212 [doi]
- Using Hierarchical Bayesian Models to Learn about ReputationPhilip Hendrix, Ya akov Gal, Avi Pfeffer. 208-214 [doi]
- Parallel Computation of Nash Equilibria in N-Player GamesJonathan Widger, Daniel Grosu. 209-215 [doi]
- GUPSS: A Gateway-Based Ubiquitous Platform for Smart SpaceTomomi Kawashima, Jianhua Ma, Runhe Huang, Bernady O. Apduhan. 213-220 [doi]
- Goal-Oriented Software Security Engineering: The Electronic Smart Card Case StudyRiham Hassan, Mohamed Eltoweissy, Shawn A. Bohner, Sherif El-Kassas. 213-218 [doi]
- Web Science 2.0: Identifying Trends through Semantic Social Network AnalysisPeter A. Gloor, Jonas Krauss, Stefan Nann, Kai Fischbach, Detlef Schoder. 215-222 [doi]
- An Efficient Dynamic Load Balancing Scheme for Multi-agent System Reflecting Agent WorkloadYong-Hee Kim, Seungwok Han, Chang Hun Lyu, Hee Yong Youn. 216-223 [doi]
- A Unified Approach to Intra-domain SecurityCraig A. Shue, Andrew J. Kalafut, Minaxi Gupta. 219-224 [doi]
- Leveraging Computation Sharing and Parallel Processing in Location-Based ServicesJonathan Cazalas, Kien A. Hua. 221-228 [doi]
- Social Awareness Concepts to Support Social ComputingAndry Rakotonirainy, Seng Wai Loke, Patricia Obst. 223-228 [doi]
- Efficient Broadcast on Area of Interest in Voronoi OverlaysMichele Albano, Ranieri Baraglia, Matteo Mordacchini, Laura Ricci. 224-231 [doi]
- A Low-Cost Green IT Design and Application of VHSP Based on Virtualization TechnologyChih-Hung Chang. 225-230 [doi]
- A Recommendation Framework towards Personalized Services in Intelligent MuseumShandan Zhou, Xingshe Zhou, Zhiwen Yu, Kaibo Wang, Haipeng Wang, Hongbo Ni. 229-236 [doi]
- An Agent-Based Approach to Modeling and Analysis of Safety Culture in Air TrafficAlexei Sharpanskykh, Sybert H. Stroeve. 229-236 [doi]
- Improving Host Profiling with Bidirectional FlowsPavel MinarÃk, Jan Vykopal, Vojtech Krmicek. 231-237 [doi]
- Hardware Supported Multicast in 2-D Mesh InfiniBand NetworksJiazheng Zhou, Shen-En Liu, Yeh-Ching Chung. 232-239 [doi]
- Finding the Needle: Suppression of False Alarms in Large Intrusion Detection Data SetsJames J. Treinen, Ramakrishna Thurimella. 237-244 [doi]
- Clustering Signature in Complex Social NetworksUeli Peter, Tomas Hruz. 237-244 [doi]
- Nearby-Friend Discovery Protocol for Multiple UsersShashwat Raizada, Goutam Paul, Vineet Pandey. 238-243 [doi]
- Energy Consumption of Residential and Professional SwitchesHelmut Hlavacs, Georges Da Costa, Jean-Marc Pierson. 240-246 [doi]
- The Insider Threat Security Architecture: A Framework for an Integrated, Inseparable, and Uninterrupted Self-Protection MechanismGhassan Jabbour, Daniel A. Menascé. 244-251 [doi]
- Self-Adaptation of Fault Tolerance Requirements Using ContractsAndré Luiz B. Rodrigues, Leila N. Bezerra, Alexandre Sztajnberg, Orlando Loques. 245-253 [doi]
- Inferring the Maximum Likelihood Hierarchy in Social NetworksArun S. Maiya, Tanya Y. Berger-Wolf. 245-250 [doi]
- A Comparative Study of Blocking Storage Methods for Sparse Matrices on Multicore ArchitecturesVasileios Karakasis, Georgios I. Goumas, Nectarios Koziris. 247-256 [doi]
- Is the Crowd s Wisdom Biased? A Quantitative Analysis of Three Online CommunitiesVassilis Kostakos. 251-255 [doi]
- Reputation-Based Ontology Alignment for Autonomy and Interoperability in Distributed Access ControlDaniel Trivellato, Fred Spiessens, Nicola Zannone, Sandro Etalle. 252-258 [doi]
- Architectural Support for Automated Software Attack Detection, Recovery, and PreventionJesse Sathre, Alex Baumgarten, Joseph Zambreno. 254-261 [doi]
- Social Learning Applications in Resource Constrained NetworksAli Saidi, Mahesh V. Tripunitara, Mojdeh Mohtashemi. 256-262 [doi]
- MCD: Mesh Closure Detection for Localized Load Balancing in Scientific ApplicationsChonglei Mei, Ruipeng Li, Hai Jiang, Jeff Jenness. 257-264 [doi]
- How to overcome the Trusted Node Model in Quantum CryptographyPeter Schartner, Stefan Rass. 259-262 [doi]
- Swift Mode Changes in Memory Constrained Real-Time SystemsMike Holenderski, Reinder J. Bril, Johan J. Lukkien. 262-269 [doi]
- The Influence of Personalities Upon the Dynamics of Trust and ReputationMark Hoogendoorn, S. Waqar Jaffry. 263-270 [doi]
- Analysis of a Location-Based Social NetworkNan Li, Guanling Chen. 263-270 [doi]
- Robust Optimization on Across-Chain Inventory Control of Cluster Supply ChainsJizi Li, Naixue Xiong, Chunling Liu, Linfu Sun, Ming Cao, Shaohua Wan. 265-270 [doi]
- WCET Analysis of the mC/OS-II Real-Time KernelMingsong Lv, Nan Guan, Yi Zhang, Rui Chen, Qingxu Deng, Ge Yu, Wang Yi. 270-276 [doi]
- VFT: An Ontology-Based Tool for Visualization and Formalization of Web Service CompositionChao Ma, Yanxiang He, Naixue Xiong, Laurence Tianruo Yang. 271-276 [doi]
- Modeling User Perception of Interaction Opportunities for Effective TeamworkEce Kamar, Ya akov Gal, Barbara J. Grosz. 271-277 [doi]
- Large Online Social Footprints-An Emerging ThreatDanesh Irani, Steve Webb, Kang Li, Calton Pu. 271-276 [doi]
- A Case Study of Individual Trust Development in Computer Mediated Collaboration TeamsXusen Cheng, Linda A. Macaulay, Alex Zarifis. 277-282 [doi]
- Real Time Rectification for Stereo CorrespondenceKhurram Jawed, John Morris, Tariq Khan, Georgy L. Gimel farb. 277-284 [doi]
- Parameter Identifiability and Optimal Experimental DesignElias August. 277-284 [doi]
- Finding Cohesive Subgroups and Relevant Members in the Nokia Friend View Mobile Social NetworkAlvin Chin. 278-283 [doi]
- On the Feasibility of Remote Attestation for Web ServicesJohn Lyle, Andrew Martin. 283-288 [doi]
- Capturing On-Line Social Network Link Dynamics Using Event-Driven SamplingDan Corlette, Frank M. Shipman III. 284-291 [doi]
- Coordinated Runtime Adaptations in Cooperative Open Real-Time SystemsLuÃs Nogueira, LuÃs Miguel Pinho, Jorge Coelho. 285-294 [doi]
- High Performance Printing: Increasing Personalized Documents Rendering through PPML Jobs Profiling and SchedulingThiago Nunes, Mateus Raeder, Mariana Luderitz Kolberg, Luiz Gustavo Fernandes, Alexis Cabeda, Fabio Giannetti. 285-291 [doi]
- Verifying the Interplay of Authorization Policies and Workflow in Service-Oriented ArchitecturesMichele Barletta, Silvio Ranise, Luca Viganò. 289-296 [doi]
- A P2P Hierarchical Metascheduler to Obtain QoS in a Grid Economy ServicesMaycon Leone Maciel Peixoto, Marcos José Santana, Regina Helena Carlucci Santana. 292-297 [doi]
- How Did You Get to Know That? A Traceable Word-of-Mouth AlgorithmManuel Cebrián, Enrique FrÃas-MartÃnez, Heath Hohwald, Rubén Lara, Nuria Oliver. 292-297 [doi]
- Avoiding Delay Jitter in Cyber-Physical Systems Using One Way Delay Variations ModelHuthaifa Al-Omari, Francis G. Wolff, Christos A. Papachristou, David R. McIntyre. 295-302 [doi]
- ProActive Caching: Generating Caching Heuristics for Business Process EnvironmentsMathias Kohler, Achim D. Brucker, Andreas Schaad. 297-304 [doi]
- An Architecture for Integrating Databases with Replication Support Based on the OGSA-DAI MiddlewareMathias Santos de Brito, Fernando Kakugawa, Liria Matsumoto Sato, Pedro Correa, Luciano Ogiboski, Rogerio Leis. 298-305 [doi]
- A Second-Order Markov Random Walk Approach for Collaborative FilteringSu Chen, Tiejian Luo, Tingshao Zhu. 298-303 [doi]
- Performance Analysis of an HMM-Based Gesture Recognition Using a Wristwatch DeviceRoman Amstutz, Oliver Amft, Brian French, Asim Smailagic, Daniel P. Siewiorek, Gerhard Tröster. 303-309 [doi]
- Towards Demarcation and Modeling of Small Sub-Communities/Groups in P2P Social NetworksGeorg Groh, Verena Rappel. 304-311 [doi]
- Combining Attribute-Based and Access SystemsBehzad Malek, Ali Miri. 305-312 [doi]
- Performance Comparison of Four-Socket Server Architecture on HPC WorkloadHenry Kasim, Verdi March, Simon See. 306-311 [doi]
- Design and Implementation of WLAN-Based Automatic Vehicle IdentificationHyun-Sung Park, Seung-Chur Yang, Doo-Hwan Oh, Jong-Deok Kim. 310-317 [doi]
- XML with Recursive QueryingKamal Taha, Ramez Elmasri. 312-317 [doi]
- Extracting Multi-facet Community Structure from Bipartite NetworksKenta Suzuki, Ken Wakita. 312-319 [doi]
- Analysis of the GMPLS Control Plane SecurityAyonote Clement, Pavol Zavarsky, Dale Lindskog. 313-318 [doi]
- A Tree-Structured Intelligence Entity Pool and Its Sharing among Ubiquitous ObjectsRunhe Huang, Jianhua Ma, Qun Jin. 318-325 [doi]
- An Efficient High-Dimensional Indexing Scheme Using a Clustering Technique for Content-Based RetrievalHyunjo Lee, Hyeong-Il Kim, Jae-Woo Chang. 318-323 [doi]
- Diversity in Network Attacker Motivation: A Literature ReviewMark Rounds, Norman Pendegraft. 319-323 [doi]
- The Use of Online Videos in the 2008 U.S. Congressional ElectionsEni Mustafaraj, Panagiotis Takis Metaxas, Catherine Grevet. 320-325 [doi]
- Emergency Privacy MeasuresHendrik J. G. Oberholzer, Martin S. Olivier. 324-329 [doi]
- IMBT-A Binary Tree for Efficient Support Counting of Incremental Data MiningChia-Han Yang, Don-Lin Yang. 324-329 [doi]
- A Lightweight Architecture for Secure Two-Party Mobile PaymentYunpu Zhu, Jacqueline E. Rice. 326-333 [doi]
- The Social Behaviors of Experts in Massive Multiplayer Online Role-Playing GamesDavid Huffaker, Jing (Annie) Wang, Jeffrey William Treem, Muhammad Aurangzeb Ahmad, Lindsay Fullerton, Dmitri Williams, Marshall Scott Poole, Noshir S. Contractor. 326-331 [doi]
- Designing Privacy for Scalable Electronic Healthcare LinkageAnthony Stell, Richard O. Sinnott, Oluwafemi Ajayi, Jipu Jiang. 330-336 [doi]
- Optimization of Distributed SPARQL Queries Using Edmonds Algorithm and Prim s AlgorithmBen P. Vandervalk, E. Luke McCarthy, Mark D. Wilkinson. 330-337 [doi]
- First Steps to Netviz Nirvana: Evaluating Social Network Analysis with NodeXLElizabeth M. Bonsignore, Cody Dunne, Dana Rotman, Marc Smith, Tony Capone, Derek L. Hansen, Ben Shneiderman. 332-339 [doi]
- Comparison of Bank Change Mechanisms for Banked Reduced Encoding ArchitecturesJe-Hyung Lee, Soo-Mook Moon, Hyung-Kyu Choi. 334-341 [doi]
- Routing Policy Conflict Detection without Violating ISP s PrivacyNing Hu, Peidong Zhu, Huayang Cao, Kan Chen. 337-342 [doi]
- An Effective Data Gathering Scheme in Heterogeneous Energy Wireless Sensor NetworksYingchi Mao, Zhen Liu, Lili Zhang, Xiaofang Li. 338-343 [doi]
- Mining for Gold Farmers: Automatic Detection of Deviant Players in MMOGsMuhammad Aurangzeb Ahmad, Brian Keegan, Jaideep Srivastava, Dmitri Williams, Noshir S. Contractor. 340-345 [doi]
- Optimizing Embedded Virtual MachinesJoel Koshy, Raju Pandey, Ingwar Wirjawan. 342-351 [doi]
- Practical Values for PrivacyBenjamin Wasser, Justin Zhan. 343-346 [doi]
- CA-MAC: Context Adaptive MAC Protocol for Wireless Sensor NetworksKyung Tae Kim, Won Jun Choi, Myung Jin Whang, Hee Yong Youn. 344-349 [doi]
- Surfing a Web of Trust: Reputation and Reciprocity on CouchSurfing.comDebra Lauterbach, Hung Truong, Tanuj Shah, Lada A. Adamic. 346-353 [doi]
- Phishpin: An Identity-Based Anti-phishing ApproachHicham Tout, William Hafner. 347-352 [doi]
- Spiral Grid Routing for Load Balance in Wireless Sensor NetworksChiu-Kuo Liang, Chih-Shiuan Li. 350-355 [doi]
- Support of Paged Register Files for Improving Context Switching on Embedded ProcessorsChung-Wen Huang, Kun-Yuan Hsieh, Jia-Jhe Li, Jenq Kuen Lee. 352-357 [doi]
- Security Implications of Virtualization: A Literature StudyAndré van Cleeff, Wolter Pieters, Roel Wieringa. 353-358 [doi]
- Virtually There: Exploring Proximity and Homophily in a Virtual WorldYun Huang, Cuihua Shen, Dmitri Williams, Noshir S. Contractor. 354-359 [doi]
- SVM Based Hybrid Moment Features for Natural Scene CategorizationV. Devendran, Hemalatha Thiagarajan, Amitabh Wahi. 356-361 [doi]
- Dynamic Scratch-Pad Memory Management with Data Pipelining for Embedded SystemsYanqin Yang, Meng Wang, Zili Shao, Minyi Guo. 358-365 [doi]
- ViDPSec Visual Device Pairing Security ProtocolDimitris Zisiadis, Spyros Kopsidas, Leandros Tassiulas. 359-364 [doi]
- The Altruistic SearcherBarry Smyth, Maurice Coyle, Peter Briggs. 360-367 [doi]
- A Fast Backlight Module Luminance Inspection MethodWu-Ja Lin, Chih-Wei Ho. 362-367 [doi]
- Lightweight IDS Based on Features Selection and IDS Classification SchemeSafaa Zaman, Fakhri Karray. 365-370 [doi]
- Evaluating the Performance of a Chaos Genetic Algorithm for Solving the Network on Chip Mapping ProblemFahime Moein-darbari, Ahmad Khademzadeh, Golnar Gharooni-fard. 366-373 [doi]
- SOM-Based Hedge Ratio Estimation with Hierarchical Cluster ResamplingYu-Chia Hsu, An-Pin Chen. 368-373 [doi]
- On the Design of Collective ApplicationsJon Dron, Terry Anderson. 368-374 [doi]
- A Study of the Methods for Improving Internet Usage Policy ComplianceMandeep Saran, Pavol Zavarsky. 371-378 [doi]
- Development of Integrated Retrieval Methods for OpenAPIs and Mash-Up Capable ServicesSeung-Jun Cha, Kyu-Chul Lee. 374-381 [doi]
- Reducing Leakage Power of JPEG Image on Asymmetric SRAMYu-Hsun Lin, Xuan-Yi Lin, Yeh-Ching Chung. 374-381 [doi]
- Inferring Unobservable Inter-community Links in Large Social NetworksHeath Hohwald, Manuel Cebrián, Arturo Canales, Rubén Lara, Nuria Oliver. 375-380 [doi]
- Process-Oriented Approach for Validating Asset Value for Evaluating Information Security RiskShi-Cho Cha, Li-Ting Liu, Bo-Chen Yu. 379-385 [doi]
- Social Relationship Identification: An Example of Social QueryChristopher P. Diehl, Jaime Montemayor, Michael Pekala. 381-388 [doi]
- Study on 3D Annotation in Virtual Space for CollaborationEun-Joo Sin, Yoon-Chul Choy, Soon-Bum Lim. 382-387 [doi]
- On the Design of Flexible Real-Time Schedulers for Embedded SystemsHugo Marcondes, Rafael Luiz Cancian, Marcelo R. Stemmer, Antônio Augusto Fröhlich. 382-387 [doi]
- An Efficient Framework for IT Controls of Bill 198 (Canada Sarbanes-Oxley) Compliance by Aligning COBIT 4.1, ITIL v3 and ISO/IEC 27002Zhitao Huang, Pavol Zavarsky, Ron Ruhl. 386-391 [doi]
- Minesweeper for Sensor Networks-Making Event Detection in Sensor Networks DependableKarima B. Hein, Reinhold Weiss. 388-393 [doi]
- Delayed Interrupt Processing Technique for Reducing Latency of Timer Interrupt in Embedded LinuxMaobing Dai, Yutaka Ishikawa. 388-393 [doi]
- metaViz: Visualizing Computationally Identified Metaphors in Political BlogsEric P. S. Baumer, Jordan Sinclair, David Hubin, Bill Tomlinson. 389-394 [doi]
- Ceremonies Formal Analysis in PKI s ContextJean Everson Martina, Túlio Cicero Salvaro de Souza, Ricardo Felipe Custódio. 392-398 [doi]
- An Evaluating Model for Anti-virus Ability Based on AHPMing Liu, Lansheng Han, Mengsong Zou, Qiwen Liu. 394-398 [doi]
- Practical Implementation of a Middleware and Software Component Architecture Supporting Reconfigurability of Real-Time Embedded SystemsMariusz Pelc, Richard Anthony, Paul Ward, James Hawthorne. 394-401 [doi]
- Implementing Social Norms Using PoliciesRobert Kremer. 395-400 [doi]
- Analysis of 2-State, 3-Neighborhood Cellular Automata Rules for Cryptographic Pseudorandom Number GenerationSang-Ho Shin, Kee-Young Yoo. 399-404 [doi]
- Activity and Artifact Views of a Secure Software Development ProcessMuhammad Umair Ahmed Khan, Mohammad Zulkernine. 399-404 [doi]
- Usable Privacy Controls for BlogsMichael Hart, Claude Castille, Rob Johnson, Amanda Stent. 401-408 [doi]
- Blocked-Z Test for Reducing Rasterization, Z Test and Shading WorkloadsChung-Ping Chung, Hong-Wei Chen, Hui-Chin Yang. 402-407 [doi]
- An AHP-Based Framework for Quality and Security EvaluationValentina Casola, Anna Rita Fasolino, Nicola Mazzocca, Porfirio Tramontana. 405-411 [doi]
- A New Security Mechanism to Perform Traffic Anonymity with Dummy Traffic SynthesisWazen M. Shbair, Ahmed R. Bashandy, Samir I. Shaheen. 405-411 [doi]
- A Hierarchical Primitive Lists Structure for Tile-Based RenderingChih-Chieh Hsiao, Chung-Ping Chung, Hui-Chin Yang. 408-413 [doi]
- Feedback Loops of Attention in Peer ProductionFang Wu, Dennis M. Wilkinson, Bernardo A. Huberman. 409-415 [doi]
- Implementation and Evaluation of Modular Neural Networks in a Multiple Processor System on Chip to Classify Electric DisturbanceDanniel C. Lopes, Rafael M. Magalhães, Jorge Dantas de Melo, Adrião Duarte Dória Neto. 412-417 [doi]
- Assurance Process for Large Open Source Code BasesClaudio Agostino Ardagna, Massimo Banzi, Ernesto Damiani, Fulvio Frati. 412-417 [doi]
- Methods for Precise False-Overlap Detection in Tile-Based RenderingHsiu-ching Hsieh, Chih-Chieh Hsiao, Hui-Chin Yang, Chung-Ping Chung, Jean Jyh-Jiun Shann. 414-419 [doi]
- New Media Use in Context: Environmental Cues and Online Self-Disclosure via WeblogsMichael Stefanone, Chyng-Yang Jang, Nathan Claes. 416-422 [doi]
- Code Obfuscation Using Pseudo-random Number GeneratorsJohn Aycock, Juan M. Gutiérrez Cárdenas, Daniel Medeiro Nunes de Castro. 418-423 [doi]
- A New Hierarchical Network Coordinate Algorithm Based on Community StructureZilong Ye, Yabing Liu, Siguang Chen. 418-423 [doi]
- H-Buffer: An Efficient History-Based and Overflow Sharing Transparent Fragment Storage MethodChung-Ping Chung, Tung-Lin Lu, Hui-Chin Yang. 420-425 [doi]
- Churn Prediction in MMORPGs: A Social Influence Based ApproachJaya Kawale, Aditya Pal, Jaideep Srivastava. 423-428 [doi]
- Power Efficient Large Matrices Multiplication by Load Scheduling on Multi-core and GPU Platform with CUDADa Qi Ren, Reiji Suda. 424-429 [doi]
- Misuse Cases + Assets + Security GoalsTakao Okubo, Kenji Taguchi, Nobukazu Yoshioka. 424-429 [doi]
- HyperCircle: An Efficient Broadcast Protocol for Super-Peer P2P NetworksFeiyu Lin, Christopher Henricsson, Syed Muhammad Abbas, Kurt Sandkuhl. 426-433 [doi]
- SpamClean: Towards Spam-Free Tagging SystemsEnnan Zhai, Huiping Sun, Sihan Qing, Zhong Chen. 429-435 [doi]
- Specification of Fair Data Practice Principles Using Privacy Policy LanguagesGirma Nigusse, Bart De Decker, Vincent Naessens. 430-437 [doi]
- A Design Methodology for Self-Management in Distributed EnvironmentsAhmad Al-Shishtawy, Vladimir Vlassov, Per Brand, Seif Haridi. 430-436 [doi]
- Caching-Based Multipath Routing ProtocolVineet Joshi, Xuefu Zhu, Qing-An Zeng. 434-439 [doi]
- Social Authentication Protocol for Mobile PhonesBijan Soleymani, Muthucumaru Maheswaran. 436-441 [doi]
- Computer Simulation of the Anisotropy of Fluorescence in Ring Molecular Systems: Influence of Disorder and EllipticityPavel Herman, David Zapletal, Ivan BarvÃk. 437-442 [doi]
- Limiting Private Data Exposure in Online Transactions: A User-Based Online Privacy Assurance ModelAlaa Aref El Masri, João Pedro Sousa. 438-443 [doi]
- A Coordinating Multiple Channel Assignment Scheme and AP Deployment in Wireless NetworksFang-Yie Leu, Yao-Tian Huang, Pei-Xun Leu. 440-445 [doi]
- Modeling Ethno-religious Conflicts as Prisoner s Dilemma Game in GraphsLingzhi Luo, Nilanjan Chakraborty, Katia P. Sycara. 442-449 [doi]
- Flattened Conservative Parallel Simulator for DEVS and CELL-DEVSShafagh Jafer, Gabriel Andrés Wainer. 443-448 [doi]
- A Privacy Framework for Personal Self-Improving Smart SpacesNicolas Liampotis, Ioanna Roussaki, Elizabeth Papadopoulou, Yussuf Abu-Shaaban, M. Howard Williams, Nicholas K. Taylor, Sarah McBurney, Kajetan Dolinar. 444-449 [doi]
- Analysis of Vehicular Roaming through Multiple WLAN APs in Container TerminalHyun-Sung Park, Seung Ho Han, Jong-Deok Kim. 446-451 [doi]
- Supply Chain Design Model Based on Multi-supply HubsJizi Li, Naixue Xiong, Linfu Sun, Aping Yuan, Jingyi Chen, Ming Cao. 449-454 [doi]
- Whither the Experts? Social Affordances and the Cultivation of Experts in Community Q&A SystemsHoward T. Welser, Eric Gleave, Vladimir Barash, Marc Smith, Jessica Meckes. 450-455 [doi]
- Knowledge Acquisition and Insider Threat Prediction in Relational Database SystemsQussai Yaseen, Brajendra Panda. 450-455 [doi]
- Processing Approximate Moving Range Queries in Mobile Sensor EnvironmentsAntoniya Petkova, Kien A. Hua, Alexander J. Aved. 452-457 [doi]
- The Power of Grassroots Influentials: The Optimal Heterophily between Sender and ReceiverHikaru Yamamoto, Naohiro Matsumura. 456-462 [doi]
- Managing Risk of IT Security Outsourcing in the Decision-Making StageSamuel Oladapo, Pavol Zavarsky, Ron Ruhl, Dale Lindskog, Andy Igonor. 456-461 [doi]
- Service-Oriented Adaptation in Ubiquitous Computing EnvironmentsKurt Geihs, Roland Reichle, Michael Wagner, Mohammad Ullah Khan. 458-463 [doi]
- Risk Perceptions of Information Security: A Measurement StudyFariborz Farahmand, Melissa Dark, Sydney Liles, Brandon Sorge. 462-469 [doi]
- A Model of Tacit Knowledge and ActionYa akov Gal, Rajesh Kasturirangan, Avi Pfeffer, Whitman Richards. 463-468 [doi]
- Rehoming Decision Algorithm: Design and Empirical EvaluationAmine Dhraief, Nicolas Montavont. 464-469 [doi]
- iKnow Where You AreKalyan Subbu, Ning Xu, Ram Dantu. 469-474 [doi]
- Managing Risks on Critical IT Systems in Public Service OrganizationsYeni Yuqin Li Helgesson. 470-475 [doi]
- Black Bridge: A Scatternet Formation Algorithm for Solving a New Emerging ProblemYanqin Yang, Minyi Guo, Feilong Tang, Gongwei Zhang. 470-475 [doi]
- Incorporating Participant Reputation in Community-Driven Question Answering SystemsLiangjie Hong, Zaihan Yang, Brian D. Davison. 475-480 [doi]
- Choosing Service Directory Nodes in Proposed Service Discovery Model for Mobile Ad Hoc NetworksShengrong Bu, Peter Liu. 476-480 [doi]
- Effects of Individual and Organization Based Beliefs and the Moderating Role of Work Experience on Insiders Good Security BehaviorsBurcu Bulgurcu, Hasan Cavusoglu, Izak Benbasat. 476-481 [doi]
- Expertise Modeling and Recommendation in Online Question and Answer ForumsSuratna Budalakoti, David DeAngelis, K. Suzanne Barber. 481-488 [doi]
- Accumulating a Personalised Ubiquitous Learning Platform for Enhancing the Third Level Educational ExperienceOlapeju Latifat Ayoola, Eleni Mangina Phelan. 481-486 [doi]
- A Dynamic Trust Evaluation Model on C2C MarketplacesYun Yang, Juhua Chen. 482-485 [doi]
- Threat Modeling for CSRF AttacksXiaoli Lin, Pavol Zavarsky, Ron Ruhl, Dale Lindskog. 486-491 [doi]
- MAW: A Reliable Lightweight Multi-hop Wireless Sensor Network Routing ProtocolKunjan Patel, Lim Jong Chern, Chris J. Bleakley, Wim Vanderbauwhede. 487-493 [doi]
- Quantifying Utility and Trustworthiness for Advice Shared on Online Social MediaSai T. Moturu, Jian Yang, Huan Liu. 489-494 [doi]
- A Novel Approach to DRM SystemsFranco Frattolillo, Federica Landolfi, Fiammetta Marulli. 492-497 [doi]
- A Hierarchical Authentication Scheme for the Different Radio Ranges Sensor NetworksAng Gao, Wei Wei, Zhixiao Wang, Yan Wenyao. 494-501 [doi]
- A Language of Life: Characterizing People Using Cell Phone TracksAlexy Khrabrov, George Cybenko. 495-501 [doi]
- Worm Path Identification Using Visualization SystemSeiji Shibaguchi, Yuki Nakayama, Ken-ichi Okada. 498-503 [doi]
- Are You a Safe Driver?Lonnie Langle, Ram Dantu. 502-507 [doi]
- On the Synergy of Conflict and Collective Creativity in Open Innovation Socio-technical EcologiesLevent Yilmaz. 502-508 [doi]
- A Simulation of Various Variable Hacker PopulationsNorman Pendegraft, Mark Rounds. 504-510 [doi]
- Performance Improvement for Flash Memories Using Loop OptimizationJoon-Young Paik, Eun-Sun Cho, Tae-Sun Chung. 508-513 [doi]
- Investigating User Experience of Online Communities: The Influence of Community TypeVivian Hsueh-hua Chen, Henry Been-Lirn Duh. 509-514 [doi]
- Efficient and Adapted Component-Based Strategies for Embedded Software Device Drivers DevelopmentJuan Navas, Jean-Philippe Babau. 514-519 [doi]
- Enabling Video-Blogging without Relying on External Service-ProvidersJustus Bross, Janosch Oppermann, Christoph Meinel. 515-522 [doi]
- The Software and Hardware Integration Linker for Reconfigurable Embedded SystemJih-Ching Chiu, Ta-Li Yeh, Mun-Kit Leong. 520-525 [doi]
- Improving Interobserver Reliability by Artificial Intelligence Techniques in Behavioural ResearchArjen van Alphen, Tibor Bosse, Catholijn M. Jonker, Francien Koeman. 523-529 [doi]
- Codesign of Embedded Systems with Process/Module Level Real-Time DeadlinesGul N. Khan, Anika Awwal. 526-531 [doi]
- Health Insurance Reform in an Experimental Market: Human Subjects, Agents Combined to Study Complex Regulatory Reform ProposalsStephen J. Rassenti, Carl A. Johnston. 530-537 [doi]
- Pricing the American Option Using Reconfigurable HardwareChris Wynnyk, Malik Magdon-Ismail. 532-536 [doi]
- QoS-Aware Power Management for Energy Harvesting Wireless Sensor Network Utilizing Reinforcement LearningRoy Chaoming Hsu, Cheng-Ting Liu, Kuan-Chieh Wang, Wei-Ming Lee. 537-542 [doi]
- Social Interaction History: A Framework for Supporting Exploration of Social Information SpacesIndratmo, Julita Vassileva. 538-545 [doi]
- Prospector: Multiscale Energy Measurement of Networked Embedded Systems with Wideband Power SignalsKenji R. Yamamoto, Paul G. Flikkema. 543-549 [doi]
- Social Network Analysis and Geotemporal Reasoning in a Web 3.0 WorldJans Aasman. 546-548 [doi]
- Emergence of Social Norms in Complex NetworksYu Zhang, Jason Leezer. 549-555 [doi]
- Self-Organized Data-Energy-Aware Clustering and Routing for Wireless Sensor NetworksEhssan Sakhaee, Naoki Wakamiya, Masayuki Murata. 550-557 [doi]
- Local Semi-linear Regression for River Runoff ForecastingFan Min, Xindong Wu. 556-561 [doi]
- A New Energy-Balanced Data Aggregation Scheme in Wireless Sensor NetworksRabindra Bista, Yong-Ki Kim, Young-Ho Choi, Jae-Woo Chang. 558-563 [doi]
- Centrality and Power among Website Users: A Social Network Analysis ApplicationG. Michael McGrath. 562-567 [doi]
- Dispatch of Mobile Resources in Wireless Sensor NetworksTzung-Shi Chen, Hua-Wen Tsai, Chih-Wei Wei. 564-569 [doi]
- Introducing Electronic Child Records: Balancing Personal Interests, System Perfomance, and Social ValuesGuido van Heck, Itamar Sharon, Paulus Kampert, Jan van den Berg. 568-575 [doi]
- A Time & Energy Efficient Topology Discovery and Scheduling Protocol for Wireless Sensor NetworksAbdulaziz Barnawi, Roshdy H. M. Hafez. 570-578 [doi]
- Towards an Introduction to Collaborative FilteringJia Zhou, Tiejian Luo. 576-581 [doi]
- Precision Time Synchronization Using IEEE 1588 for Wireless Sensor NetworksHyuntae Cho, Jeonsu Jung, Bongrae Cho, Youngwoo Jin, Seung Woo Lee, Yunju Baek. 579-586 [doi]
- Collaborative Mining in Multiple Social Networks Data for Criminal Group DiscoveryAmin Milani Fard, Martin Ester. 582-587 [doi]
- Localization of Shipping Containers in Ports and Terminals Using Wireless Sensor NetworksStefano Abbate, Marco Avvenuti, Paolo Corsini, Alessio Vecchio. 587-592 [doi]
- Web Page Classification Using Social TagsSadegh Aliakbary, Hassan Abolhassani, Hossein Rahmani, Behrooz Nobakht. 588-593 [doi]
- A Failure Adapted, Load-Balanced Distributed Routing for Wireless Ad Hoc Sensor NetworksShahram Nourizadeh, Yeqiong Song, Jean-Pierre Thomesse. 593-596 [doi]
- Davis Social Links or: How I Learned to Stop Worrying and Love the NetMatt Spear, Xiaoming Lu, Shyhtsun Felix Wu. 594-601 [doi]
- Evaluation of an Adaptive PI Rate Controller for Congestion Control in Wireless Ad-Hoc/Sensor NetworksChung-Horng Lung, Oliver W. W. Yang. 597-602 [doi]
- A Stigmergy Approach for Open Source Software Developer Community SimulationXiaohui Cui, Justin Beaver, Jim N. Treadwell, Thomas E. Potok, Laura Pullum. 602-606 [doi]
- Visualization of the Constrained Coverage of Mobile Sensor Networks Based on GMLChang-Wu Lee, Sung Won Kim, Heon-Jong Lee, Youn-Hee Han, Doo-Soon Park, Young-Sik Jeong. 603-608 [doi]
- Personality in Social Group DynamicsRui Prada, Samuel Mascarenhas, Maria Augusta Silveira Netto Nunes. 607-612 [doi]
- A Resource Management System for Fault Tolerance in Grid ComputingHwaMin Lee, Doo-Soon Park, Min Hong, Sang-Soo Yeo, SooKyun Kim, Sunghoon Kim. 609-614 [doi]
- Lending Behavior and Community Structure in an Online Peer-to-Peer Economic NetworkKatherine Krumme, Sergio Herrero-Lopez. 613-618 [doi]
- A Distributed Reservation Protocol for Collision-Free Three-Hop Mobility Support in WiMedia MACJin-Woo Kim, Kyeong Hur, Kwang-il Hwang, Doo Seop Eom. 615-620 [doi]
- Temporal Issue Trend Identifications in BlogsIl-Chul Moon, Young-Min Kim, Hyun-Jong Lee, Alice H. Oh. 619-626 [doi]
- Distributed Tag Access with Collision-Avoidance among Mobile RFID ReadersKwang-il Hwang, Sang-Soo Yeo, Jong Hyuk Park. 621-626 [doi]
- Gaming On and Off the Social Graph: The Social Structure of Facebook GamesBen Kirman, Shaun Lawson, Conor Linehan. 627-632 [doi]
- Reprogrammable Module-Linker for Energy-Efficient Wireless Sensor NetworksSeung-Ku Kim, Jae-Ho Lee, Kwang-il Hwang, Kyeong Hur, Doo Seop Eom. 627-632 [doi]
- The Socio-cultural Factors Influencing Online Female Consumers in Saudi ArabiaKhulood Rambo, Kecheng Liu, Keiichi Nakata. 633-638 [doi]
- Robust ID-Based Remote Mutual Authentication with Key Agreement Scheme for Mobile Devices on ECCEun-Jun Yoon, Kee-Young Yoo. 633-640 [doi]
- Experience Search: Accessing the Emergent Knowledge from Annotated Blog PostingsTae-Gil Noh, Yong-Jin Han, Jeong Woo Son, Hyun-Je Song, Hee-Geun Yoon, Jae-An Lee, Sang-Do Lee, Kye-Sung Kim, Young-Hwa Lee, Seong-Bae Park, Se-Young Park, Sang-Jo Lee. 639-644 [doi]
- Modeling and Analysis of Trust Management for Cognitive Mission-Driven Group Communication Systems in Mobile Ad Hoc NetworksJin-Hee Cho, Ananthram Swami, Ing-Ray Chen. 641-650 [doi]
- Adaptive Tourism Modeling and Socialization SystemBruno Coelho, Constantino Martins, Ana Almeida. 645-652 [doi]
- Design and Validation of PATRICIA for the Mitigation of Network Flooding AttacksLan Wang, Qishi Wu, Yaoqing Liu. 651-658 [doi]
- Open Editing Algorithm: A Collaborative News Promotion Algorithm Based on Users Voting HistoryJoonseong Ko, Kanghak Kim, Ohyeon Kweon, Jongwook Kim, Young-rin Kim, Steve SangKi Han. 653-658 [doi]
- Data Deletion with Time-Aware Adversary ModelMarek Klonowski, Michal Przykucki, Tomasz Struminski. 659-664 [doi]
- Designing Social Computing Using Traditions of Symbolism, Personalization, and Gift CultureYin He, Thecla Schiphorst. 659-666 [doi]
- Obfuscation Mechanism in Conjunction with Tamper-Proof ModuleKazuhide Fukushima, Shinsaku Kiyomoto, Toshiaki Tanaka. 665-670 [doi]
- Social Ability in Online Groups: Representing the Quality of Interactions in Social Computing EnvironmentsSean P. Goggins, James M. Laffey, Krista Galyen. 667-674 [doi]
- TBDRM: A TPM-Based Secure DRM ArchitectureAimin Yu, Dengguo Feng, Ren Liu. 671-677 [doi]
- A Study of Information Diffusion over a Realistic Social Network ModelAndrea Apolloni, Karthik Channakeshava, Lisa Durbeck, Maleq Khan, Chris Kuhlman, Bryan Lewis, Samarth Swarup. 675-682 [doi]
- A Novel Server-Based Application Execution ArchitectureChao Chen, Ke Wang, Shuren Liao, Qiuyan Zhang, Yiqi Dai. 678-683 [doi]
- Modeling Human, Social, Cultural or Behavioral Events for Real World Applications: Results and Implications from the State Stability ProjectAnne Russell, Mark Clark. 683-690 [doi]
- Multidimensional Dynamic Trust Management for Federated ServicesLatifa Boursas, Wolfgang Hommel. 684-689 [doi]
- Security Protocol Testing Using Attack TreesAnderson Nunes Paiva Morais, Eliane Martins, Ana R. Cavalli, Willy Jimenez. 690-697 [doi]
- System Theoretic Formalization of Social Group Processes and Optimal Evidence-Indicator DiscoveryPayam Saisan, Anne Russell, Mark Clark, Stephen J. Krotosky. 691-696 [doi]
- Co-located Many-Player Gaming on Large High-Resolution DisplaysDavid Machaj, Christopher Andrews, Chris North. 697-704 [doi]
- Optimal LFSR-Coding Test Data Compression Based on Test Cube DividingMaoxiang Yi, Huaguo Liang, Kaihua Zhan, Cuiyun Jiang. 698-702 [doi]
- Quasi-classical Semantics and Tableau Calculus of Description Logics for Paraconsistent Reasoning in the Semantic WebHui Hou, Jinzhao Wu. 703-708 [doi]
- Analyzing Enterprise Social Media NetworksMarc Smith, Derek L. Hansen, Eric Gleave. 705-710 [doi]
- Concurrency Control Strategy to Reduce Frequent Rollbacks in Mobile EnvironmentsSalman Abdul Moiz, Lakshmi Rajamani. 709-714 [doi]
- Mining and Analyzing Multirelational Social NetworksVictor Stroele, Jonice Oliveira, Geraldo Zimbrao, Jano Moreira de Souza. 711-716 [doi]
- An Efficient Privacy Preserving Keyword Search Scheme in Cloud ComputingQin Liu, Guojun Wang, Jie Wu. 715-720 [doi]
- Development of a Meeting Browser towards Supporting Public InvolvementShun Shiramatsu, Tadachika Ozono, Toramatsu Shintani, Kazunori Komatani, Tetsuya Ogata, Toru Takahashi, Hiroshi G. Okuno. 717-722 [doi]
- A Direct Anonymous Attestation Protocol Based on Hierarchical Group SignatureRong-wei Yu, Li-na Wang, Xiao-yan Ma, Bo Kuang. 721-726 [doi]
- A Survey of Human Computation SystemsMan-Ching Yuen, Ling-Jyh Chen, Irwin King. 723-728 [doi]
- A Multi-party Contract Signing Protocol and Its Implementation via Trusted ComputingZhenyu Wang, Jianhua Huang, Yu Wang, Xiangdong Li, Xuetao Sun, Ruimin Wang. 727-731 [doi]
- Tag Sense Disambiguation for Clarifying the Vocabulary of Social TagsKangpyo Lee, Hyunwoo Kim, Hyopil Shin, Hyoung-Joo Kim. 729-734 [doi]
- An Anonymous Property-Based Attestation Protocol from Bilinear MapsYu Qin, Dengguo Feng, Zhen Xu. 732-738 [doi]
- Predicting Interests of People on Online Social NetworksApoorv Agarwal, Owen Rambow, Nandini Bhardwaj. 735-740 [doi]
- Bio-chaotic Stream Cipher-Based Iris Image EncryptionAbdullah Sharaf Alghamdi, Hanif Ullah, Maqsood Mahmud, Muhammad Khurram Khan. 739-744 [doi]
- Will Networking Nerds Pay for Stuff That Matters? The Relationship between Social Networks and Subscriptions in Virtual CommunitiesMelanie Bernier, Dale Ganley. 741-746 [doi]
- Trust-Based Countermeasures for Securing OLSR ProtocolAsmaa Adnane, Christophe Bidan, Rafael Timóteo de Sousa Júnior. 745-752 [doi]
- Names of Our LivesBenjamin M. Gross. 747-752 [doi]
- Fault Tolerance in MANETs Using a Task-to-Resource Reallocation FrameworkAdrian P. Lauf, William H. Robinson. 753-758 [doi]
- Using Qtag to Extract Dominant Public Opinion in Very Large-Scale ConversationSung Eob Lee, Taeksoo Chun, Steve SangKi Han. 753-758 [doi]
- Study on Collective Memory in the BlogosphereYoung-Sik Kim, Kibeom Lee, Steve SangKi Han. 759-764 [doi]
- An Effective RM-Based Scheduling Algorithm for Fault-Tolerant Real-Time SystemsWanfu Ding, Ruifeng Guo. 759-764 [doi]
- RepCom: Towards Reputation Composition over Peer-to-Peer CommunitiesGang Yin, Dian-xi Shi, Huaimin Wang, Min Guo. 765-771 [doi]
- Personal Management of Social Networks DataMauro San MartÃn, Claudio Gutierrez. 765-770 [doi]
- The Effect of Trust and Perceived Risk on Consumers Online Purchase IntentionDauw-Song Zhu, Gwendolyn Sneed O Neal, Zui-Chih Lee, Yen-Hsun Chen. 771-776 [doi]
- HASS: Highly Available, Scalable and Secure Distributed Data Storage SystemsZhiqian Xu, Hai Jiang. 772-780 [doi]
- Ego-centric Network Sampling in Viral Marketing ApplicationsHuaiyu (Harry) Ma, Steven Gustafson, Abha Moitra, David B. Bracewell. 777-782 [doi]
- Reliable Identities Using Off-the-Shelf Hardware Security in MANETsNicolai Kuntze, Andreas Fuchs, Carsten Rudolph. 781-786 [doi]
- Integration of User Experiences to Advancement of B2B-Software-on-Demand SystemsEva-Maria Schwartz. 783-786 [doi]
- Application of New A Priori Algorithm MDNC to Exchange Traded FundChiung-Fen Huang, Wen-Chih Tsai, An-Pin Chen. 787-794 [doi]
- Distributed Node Selection for Threshold Key Management with Intrusion Detection in Mobile Ad Hoc NetworksFei Richard Yu, Helen Tang, Fei Wang, Victor C. M. Leung. 787-794 [doi]
- Enhancing Airline Customer Relationship Management Data by Inferring Ties between PassengersMichael Farrugia, Aaron J. Quigley. 795-800 [doi]
- HACK: A Health-Based Access Control Mechanism for Dynamic Enterprise EnvironmentsChenjia Wang, Kevin P. Monaghan, Weisong Shi. 795-801 [doi]
- The Benefits of Synchronized Genuine Smiles in Face-to-Face Service EncountersKyunghee Kim, Micah Eckhardt, Nandi Bugg, Rosalind W. Picard. 801-808 [doi]
- Misbehavior Detection Using Implicit Trust Relations in the AODV Routing ProtocolMohamed Ali Ayachi, Christophe Bidan, Tarek Abbes, Adel Bouhoula. 802-808 [doi]
- DAAODV: A Secure Ad Hoc Routing Protocol Based on Direct Anonymous AttestationWenchao Huang, Yan Xiong, Depin Chen. 809-816 [doi]
- A Proposal of Discovering User Interest by Support Vector Machine and Decision Tree on Document ClassificationLoc Nguyen. 809-814 [doi]
- Analyzing Multi-source Social Data for Extracting and Mining Social NetworksI-Hsien Ting, Hui-Ju Wu, Pei-Shan Chang. 815-820 [doi]
- A GEP-Based Anomaly Detection Scheme in Wireless Sensor NetworksHongLei Gao, Guolong Chen, Wenzhong Guo. 817-822 [doi]
- A Study of Co-relational Personalities of the Social Network in OrganizationWei-Lun Chang, Sian-Ting Lin. 821-825 [doi]
- L-UCON: Towards Layered Access Control with UCONHao Hu, Hao Li, Dengguo Feng. 823-829 [doi]
- Information Retrieval in Wikis Using an OntologyCarlos Miguel Tobar, Alessandro Santos Germer, Juan Manuel Adán Coello, Ricardo LuÃs de Freitas. 826-831 [doi]
- Hardware Containers for Software Components: A Trusted Platform for COTS-Based SystemsEugen Leontie, Gedare Bloom, Bhagirath Narahari, Rahul Simha, Joseph Zambreno. 830-836 [doi]
- The Effect of Network Position and Relationship Quality on Organizational Performance-The ABW FamilyTing-Lin Lee, Chih-Wei Lin. 832-836 [doi]
- A Software Based Approach for Trusted Agent Execution on Malicious HostSarosh Hashmi, John Brooke. 837-846 [doi]
- Concepts, Technology, and Assessment of the Social Music Game Sync-in-Team Marc Leman, Michiel Demey, Micheline Lesaffre, Leon Van Noorden, Dirk Moelants. 837-842 [doi]
- Toward a Real-Time Automated Measure of Empathy and DominanceGiovanna Varni, Antonio Camurri, Paolo Coletta, Gualtiero Volpe. 843-848 [doi]
- A Smart Card Power Analysis SimulatorCéline Thuillet, Philippe Andouard, Olivier Ly. 847-852 [doi]
- Reinforcement Learning of Listener Response for Mood Classification of AudioJack Stockholm, Philippe Pasquier. 849-853 [doi]
- TSGen: A UML Activity Diagram-Based Test Scenario Generation ToolChang-ai Sun, Baobao Zhang, Jin Li. 853-858 [doi]
- Dynamic Social Interaction in a Collective Mobile Music PerformanceKoray Tahiroglu. 854-859 [doi]
- Lightweight Hardware Return Address and Stack Frame Tracking to Prevent Function Return Address AttackWen-Fu Kao, Shyhtsun Felix Wu. 859-866 [doi]
- NetBeat and Net4Tet-Networked Performance Instruments for Electroacoustic Music StudentsArne Eigenfeldt. 860-861 [doi]
- Sharing Application Sessions for Peer-to-Peer LearningOscar Ardaiz-Villanueva, Luis Manuel DÃaz de Cerio, Jose Andres Del Campo, Rubén Mondéjar. 862-867 [doi]
- RBAC-Based Secure Interoperation Using Constraint Logic ProgrammingJinwei Hu, Ruixuan Li, Zhengding Lu. 867-872 [doi]
- Web2.0 Tools to Support the Instructional Method Thinking Actively in a Creative Environment Oscar Ardaiz-Villanueva, Xabier Nicuesa Chacón, Oscar Brene Artazcoz, MarÃa Luisa Sanz de Acedo Lizarraga, MarÃa Teresa Sanz de Acedo Baquedano. 868-873 [doi]
- Key Predistribution Schemes Using Block Designs in Wireless Sensor NetworksSushmita Ruj, Jennifer Seberry, Bimal K. Roy. 873-878 [doi]
- Approach for Name Ambiguity Problem Using a Multiple-Layer ClusteringWenrong Jiang, Anbao Wang, Cuihong Wu, Jian Chen, Jihong Yan. 874-878 [doi]
- Let s Meet: Integrating Social and Learning WorldsMelody Siadaty, Dragan Gasevic, Marek Hatala. 879-884 [doi]
- HWSN6: Hospital Wireless Sensor Networks Based on 6LoWPAN Technology: Mobility and Fault Tolerance ManagementAntonio J. Jara, Miguel A. Zamora, Antonio Fernandez Gómez-Skarmetaa. 879-884 [doi]
- Autonomous Management and Control of Sensor Network-Based ApplicationsAntonio G. Ruzzelli, Conor Muldoon, Anthony Schoofs, Tiziana Campana, Gregory M. P. O Hare, Richard Tynan. 885-890 [doi]
- A Decision Support System for Institutional Research Management in Higher Education: Data Mining to Determine Research Focus, Intensity and SynergyKobus Ehlers, Malan Joubert, Johann Kinghorn, Arnold van Zyl. 885-890 [doi]
- Intelligent Middleware for Adaptive Sensing of Tennis Coaching SessionsRichard Tynan, Anthony Schoofs, Conor Muldoon, Gregory M. P. O Hare, Ciarán O. Conaire, Philip Kelly, Noel E. O Connor. 891-896 [doi]
- Online Presence in Adaptive Learning on the Social Semantic WebJelena Jovanovic, Dragan Gasevic, Milan Stankovic, Zoran Jeremic, Melody Siadaty. 891-896 [doi]
- Design of a Platform of Popular Science Education Based on Social ComputingWang Fang, Mo Qian. 897-902 [doi]
- Petri Net Based Reconfigurable Wireless Sensor Networks for Intelligent Monitoring SystemsChung-Hsien Kuo, Jia-Wun Siao. 897-902 [doi]
- Architecture Synthesis Methodology for Run-Time Reconfigurable SystemsPil Woo Chun, Lev Kirischian. 903-908 [doi]
- Spurring Design Thinking through Educational WebloggingJustus Bross, Ahmet Emre Acar, Patrick Schilf, Christoph Meinel. 903-908 [doi]
- Run-Time Component Relocation in Partially-Reconfigurable FPGAsVictor Dumitriu, Dennis Marcantonio, Lev Kirischian. 909-914 [doi]
- Designing to Attract Participation in a Niche Community for Women in Science & EngineeringZina Sahib, Julita Vassileva. 909-914 [doi]
- SCI: Towards a Social Collaborative Integrated Development EnvironmentHani Bani-Salameh, Clinton Jeffery, Jafar Al-Gharaibeh. 915-920 [doi]
- Efficient Translation of Algorithmic Kernels on Large-Scale Multi-coresAmit Pande, Joseph Zambreno. 915-920 [doi]
- An Empirical Study of Research Collaboration Using Social Network AnalysisYu-Ling Luo, Chia-Hao Hsu. 921-926 [doi]
- Multi-objective Placement of Reconfigurable Hardware Tasks in Real-Time SystemChun-Hsien Lu, Hsiao-Win Liao, Pao-Ann Hsiung. 921-925 [doi]
- From Reconfigurable Architectures to Self-Adaptive Autonomic SystemsMarco D. Santambrogio. 926-931 [doi]
- Ambulation: A Tool for Monitoring Mobility Patterns over Time Using Mobile PhonesJason Ryder, Brent Longstaff, Sasank Reddy, Deborah Estrin. 927-931 [doi]
- A Fast H.264 Spatial Downscaling Transcoder for Wireless CommunicationMin Li, Naixue Xiong, Chao Ma. 932-936 [doi]
- The Impact of Human Mobility on Spatial Disease DynamicsVitaly Belik, Theo Geisel, Dirk Brockmann. 932-935 [doi]
- Scaling Behaviors in the Communication Network between CitiesGautier Krings, Francesco Calabrese, Carlo Ratti, Vincent D. Blondel. 936-939 [doi]
- Link-Aware Geographic Routing in Wireless Sensor NetworksHeng Chen, Depei Qian, Weiguo Wu, Weiwei Fang. 937-942 [doi]
- The Importance of Data Collection for Modelling Contact NetworksEiko Yoneki. 940-943 [doi]
- A Congestion Control Framework for Handling Video Surveillance Traffics on WSNMoufida Maimour, CongDuc Pham, Doan B. Hoang. 943-948 [doi]
- Investigating Bimodal Clustering in Human MobilityJames P. Bagrow, Tal Koren. 944-947 [doi]
- Mining Mobility Behavior from Trajectory DataFosca Giannotti, Mirco Nanni, Dino Pedreschi, Chiara Renso, Roberto Trasarti. 948-951 [doi]
- Research on an Improved Genetic Algorithm Which Can Improve the Node Positioning Optimized Solution of Wireless Sensor NetworksBing Jiang, Wei Zhang, Pan Zhang. 949-954 [doi]
- Decentralized Detection of Group Formations from Wearable Acceleration SensorsMartin Wirz, Daniel Roggen, Gerhard Tröster. 952-959 [doi]
- A Self-Similarity Frame Traffic Model Based on the Frame Components in 802.11 NetworksLin Xiang, Xiaohu Ge, Ke Zhang, Chuang Liu. 955-960 [doi]
- Touch Me Wear: Getting Physical with Social NetworksAaron Beach, Baishakhi Ray, Leah Buechley. 960-965 [doi]
- Cross-Layer Optimized Data Gathering in Wireless Multimedia Sensor NetworksLei Shu, Manfred Hauswirth, Lei Wang, Yan Zhang, Jong Hyuk Park. 961-966 [doi]
- Sensor-Based Feedback Systems in Organizational ComputingTaemie Kim, Daniel Olguin Olguin, Benjamin N. Waber, Alex Pentland. 966-969 [doi]
- Prediction and Key Computer Programming of Mechanical Properties of Hot Rolled Plate Based on BP Neural NetworkQinghua Zou, Li Chen, Naixue Xiong, Shengzhong Zou, Chuanbing Wang. 967-971 [doi]
- All Friends Are Not Created Equal: An Interaction Intensity Based Approach to Privacy in Online Social NetworksLerone Banks, Shyhtsun Felix Wu. 970-974 [doi]
- Efficient UDD Architecture for Underwater Wireless Acoustic Sensor NetworkSeung-Joo Lee, Jung-Il Namgung, Soo-Hyun Park. 972-977 [doi]
- Privacy in Online Social Networking at WorkplaceYang Wang 0005, Alfred Kobsa. 975-978 [doi]
- An Underwater Communication Modem Using TMS320C6416 DSKTae-Hee Won, Jun-Ho Jeon, Sung-Joon Park. 978-981 [doi]
- Towards Enabling Web 2.0 Content Sharing beyond Walled GardensSan-Tsai Sun, Kirstie Hawkey, Konstantin Beznosov. 979-984 [doi]
- Neighbor Nodes Aware MAC Scheduling Scheme in Underwater Acoustic Sensor NetworksNam-Yeol Yun, Hui-Jin Cho, Soo-Hyun Park. 982-987 [doi]
- Visible Flows: Contextual Integrity and the Design of Privacy Mechanisms on Social Network SitesHeather Richter Lipford, Gordon Hull, Celine Latulipe, Andrew Besmer, Jason Watson. 985-989 [doi]
- Design of OFDM System for High Speed Underwater CommunicationJeong-woo Han, Se-Young Kim, Ki-Man Kim, Seung-Yong Chun, Kwon Son. 988-992 [doi]
- Examining the Shifting Nature of Privacy, Identities, and Impression Management with Web 2.0Kirstie Hawkey. 990-995 [doi]
- An Improved Chinese Segmentation Algorithm Based on New Dictionary ConstructionYan Niu, Lala Li. 993-996 [doi]
- Trust Inference in Complex Trust-Oriented Social NetworksGuanfeng Liu, Yan Wang 0002, Mehmet A. Orgun. 996-1001 [doi]
- Network Bandwidth Allocation Based on QoS in iSCSI OSD Storage SystemYong Su. 997-1001 [doi]
- Security and Trust through Electronic Social Network-Based InteractionsPatrik Bichsel, Samuel Müller, Franz-Stefan Preiss, Dieter Sommer, Mario Verdicchio. 1002-1007 [doi]
- Wireless ECG Monitoring System Based on OMAPJing Liang, Yinqin Wu. 1002-1006 [doi]
- Routing in 802.11-Based Wireless Mesh NetworksZimian Hao, Xiong Wei, Naixue Xiong, Yuhan He. 1007-1012 [doi]
- Witness-Based Collusion and Trust-Aware SocietiesAmirali Salehi-Abari, Tony White. 1008-1014 [doi]
- An Improved SPECK Algorithm with Bit Plane Lifting and the Optimal Single Value PredictionXubing Zhang, Yong Zhu, Jianhong Fu. 1013-1018 [doi]
- Enabling Privacy as a Fundamental Construct for Social NetworksE. Michael Maximilien, Tyrone Grandison, Kun Liu, Tony Sun, Dwayne Richardson, Sherry Guo. 1015-1020 [doi]
- A Research on the Self-Applicable Network Virtual Storage Data Distribution ArithmeticXiong Wei, Xianbin Xu, Naixue Xiong, Ruhan He. 1019-1023 [doi]
- Automated Murmurs: The Social Mobile Tourist ApplicationJill Freyne, Adam J. Brennan, Barry Smyth, Daragh Byrne, Alan F. Smeaton, Gareth J. F. Jones. 1021-1026 [doi]
- Mobile Agent-Based Data Gathering for Web Image RetrievalRuhan He, Yong Zhu, Naixue Xiong, Wei Zhan, Yanjun Zhao. 1024-1029 [doi]
- The Circles of Latitude: Adoption and Usage of Location Tracking in Online Social NetworkingXinru Page, Alfred Kobsa. 1027-1030 [doi]
- A Videoconference System on the Campus Networks Based on H.323 ProtocolYean Yin, WenBing Lu, Ke Zhang. 1030-1033 [doi]
- Quantifying Reciprocity in Social NetworksHuiqi Zhang, Ram Dantu, João W. Cangussu. 1031-1035 [doi]
- Edge Detection Based on Fast Adaptive Mean Shift AlgorithmYong Zhu, Ruhan He, Naixue Xiong, Pu Shi, Zhiguang Zhang. 1034-1039 [doi]
- Solutions to Security and Privacy Issues in Mobile Social NetworkingAaron Beach, Mike Gartrell, Richard Han. 1036-1042 [doi]
- Implementation of Unlimited IntegerWeiguang Kong, Yong Zhu, Yuan Wang. 1040-1043 [doi]
- Where Information Searches for You: The Visible Past Ubiquitous Knowledge Environment for Digital HumanitiesSorin Adam Matei, Eric A. Wernert, Travis Faas. 1043-1047 [doi]
- Ride Comfort Simulation Based on the Vibration Characteristics of the Two-Mass System of Vehicle Body and WheelsH. X. Yang, F. M. Chen. 1044-1049 [doi]
- Has Anyone Seen My Goose? Social Network Services in Developing RegionsNarseo Vallina-Rodriguez, Pan Hui, Jon Crowcroft. 1048-1053 [doi]
- An Analysis and Hierarchical Decomposition for HAMsXiaoqin Du, Qinghua Li, Jianjun Han. 1050-1054 [doi]
- Information Technology Capabilities for Digital Social NetworksCamille Grange, Izak Benbasat. 1054-1059 [doi]
- Computer Calculation and Plotting on Dynamical Phase Diagrams of Carbon SteelQinghua Zou, Li Chen, Naixue Xiong, Shengzhong Zou, Chuanbing Wang. 1055-1064 [doi]
- Social Tagging in Query Expansion: A New Way for Personalized Web SearchClaudio Biancalana, Alessandro Micarelli. 1060-1065 [doi]
- A Survey on Fault-Tolerance in Distributed Network SystemsNaixue Xiong, Yan Yang, Ming Cao, Jing He, Lei Shu. 1065-1070 [doi]
- Time Critical Content Delivery Using Predictable Patterns in Mobile Social NetworksFawad Nazir, Jianhua Ma, Aruna Seneviratne. 1066-1073 [doi]
- A Hybrid Computational Approach for the Prediction of Small Non-coding RNAs from Genome SequencesNing Yu, Kyu Hong Cho, Qiang Cheng, Rafael A. Tesorero. 1071-1076 [doi]
- Information Flow and Search in Unstructured Keyword Based Social NetworksAnkush Garg, Prantik Bhattacharyya, Charles U. Martel, Shyhtsun Felix Wu. 1074-1081 [doi]
- A New Computational Tool for the Post Session Analysis of the Prepulse Inhibition Test in Neural ScienceHongbo Zhou, Hong-Ju Yang, Haiyun Xu, Qiang Cheng. 1077-1080 [doi]
- WiFi-Based Telemedicine System: Signal Accuracy and SecurityHuyu Qu, Jie Cheng, Qiang Cheng, Le Yi Wang. 1081-1085 [doi]
- Ubiquitous Monitoring and Human Behaviour in Intelligent Pervasive SpacesStuart Moran, Keiichi Nakata. 1082-1087 [doi]
- Fast Fusion of Medical Images Based on Bayesian Risk Minimization and Pixon MapHongbo Zhou, Qiang Cheng, Mehdi Zargham. 1086-1091 [doi]
- The Geolocation of Web Logs from Textual CluesClayton Fink, Christine D. Piatko, James Mayfield, Danielle Chou, Tim Finin, Justin Martineau. 1088-1092 [doi]
- Using Discovery and Monitoring Services to Support Context-Aware Remote Assisted Living ApplicationsAndré Luiz B. Rodrigues, Izabela C. Gomes, Leila N. Bezerra, Alexandre Sztajnberg, Sérgio T. Carvalho, Alessandro Copetti, Orlando Loques. 1092-1097 [doi]
- Identifying Connectors and Communities: Understanding Their Impacts on the Performance of a DTN Publish/Subscribe SystemMooi Choo Chuah, Alexandra Coman. 1093-1098 [doi]
- Using Converging Technology to Bring Social Networking to CommerceColin Pattinson. 1099-1102 [doi]
- Real World Routing Using Virtual World InformationPan Hui, Nishanth R. Sastry. 1103-1108 [doi]
- Socially Enhanced Network Address TranslationAlexis Malozemoff, Muthucumaru Maheswaran. 1109-1114 [doi]
- Diverse Routing: Exploiting Social Behavior for Routing in Delay-Tolerant NetworksTong Zhou, Romit Roy Choudhury, Krishnendu Chakrabarty. 1115-1122 [doi]
- A Network-Aware Distributed Membership Protocol for Collaborative DefenseDavid Zage, Carl Livadas, Eve M. Schooler. 1123-1130 [doi]
- Role of Game Models in Social NetworksYenumula B. Reddy. 1131-1136 [doi]
- Social Networks XSS WormsMohammad Reza Faghani, Hossein Saidi. 1137-1141 [doi]
- Delivery Rate and Routing Overhead Analysis with Salvage in Collaborative On-Line Game PlayingMiao Wang, Xiling Luo. 1142-1147 [doi]
- Social Area Networks: Data Networking of the People, by the People, for the PeopleNadav Aharony, David P. Reed, Andrew Lippman. 1148-1155 [doi]
- Satisficing the Masses: Applying Game Theory to Large-Scale, Democratic Decision ProblemsKshanti A. Greene, Joe Michael Kniss, George F. Luger, Carl R. Stern. 1156-1162 [doi]
- Constructing a Virtual World as a Research Tool: Lessons Learned from the First Iteration in the Development of GreenlandTravis L. Ross. 1163-1168 [doi]
- Application and Evaluation of Analytic GamingRoderick M. Riensche, Louis M. Martucci, Jean C. Scholtz, Mark A. Whiting. 1169-1173 [doi]
- Avatars in Analytical GamingAndrew J. Cowell, Amanda K. Cowell. 1174-1179 [doi]
- ASC: A Proposed Architecture for Computing a Social Capital Gaming MetricColleen L. Phillips, K. Brock Stitts, Norman D. Geddes. 1180-1187 [doi]
- Validation of Sociocultural Models and Meta-Models via Serious GamesK. Brock Stitts, Colleen L. Phillips, Norman D. Geddes. 1188-1193 [doi]
- Gaming to Predict Human Responses to Mass Casualty Events: An Approach for Quick Look Tools for Pandemic InfluenzaRobert T. Brigantic, George A. Muller, Aimee E. Taylor, Anthony F. Papatyi. 1194-1198 [doi]
- Inferring Player Rating from Performance Data in Massively Multiplayer Online Role-Playing Games (MMORPGs)Kyong Jin Shim, Muhammad Aurangzeb Ahmad, Nishith Pathak, Jaideep Srivastava. 1199-1204 [doi]
- Mathematical Modeling of Social GamesKam Tong Chan, Irwin King, Man-Ching Yuen. 1205-1210 [doi]