Abstract is missing.
- Eco Models of Distributed SystemsDilawaer Duolikun, Ryo Watanabe, Makoto Takizawa. 3-22 [doi]
- Estimating the Assessment Difficulty of CVSS Environmental Metrics: An ExperimentLuca Allodi, Silvio Biagioni, Bruno Crispo, Katsiaryna Labunets, Fabio Massacci, Wagner Santos. 23-39 [doi]
- Fast Top-Q and Top-K Query AnsweringClaus Dabringer, Johann Eder. 43-63 [doi]
- Low-Latency Radix-4 Multiplication Algorithm over Finite FieldsKee-Won Kim, Hyun-Ho Lee, Seung-Hoon Kim. 64-72 [doi]
- An Iterative Algorithm for Computing Shortest Paths Through Line Segments in 3DLe Hong Trang, Quynh Chi Truong, Tran Khanh Dang. 73-84 [doi]
- On Transformation-Based Spatial Access Methods with Monotone NormsH. K. Dai. 85-100 [doi]
- Query Answering System as a Tool in Incomplete Distributed Information System Optimization ProcessAgnieszka Dardzinska, Katarzyna Ignatiuk, Malgorzata Zdrodowska. 101-109 [doi]
- Using a Genetic Algorithm in a Process of Optimizing the Deployment of Radio StationsBarbora Tesarová, Andrea Vokalova. 110-118 [doi]
- IFIN+: A Parallel Incremental Frequent Itemsets Mining in Shared-Memory EnvironmentPhuong Huynh Van Quoc, Josef Küng, Markus Jäger, Tran Khanh Dang. 121-138 [doi]
- Parallel Algorithm of Local Support Vector Regression for Large DatasetsLe-Diem Bui, Minh Thu Tran Nguyen, Yong-Gi Kim, Thanh-Nghi Do. 139-153 [doi]
- On Semi-supervised Learning with Sparse Data Handling for Educational Data ClassificationVo Thi Ngoc Chau, Nguyen Hua Phung. 154-167 [doi]
- Logistic Regression Methods in Selected Medical Information SystemsAnna Kasperczuk, Agnieszka Dardzinska. 168-177 [doi]
- Mapping Requirements Specifications into a Formalized Blockchain-Enabled Authentication Protocol for Secured Personal Identity AssuranceBenjamin Leiding, Alex Norta. 181-196 [doi]
- Gait Recognition with Multi-region Size Convolutional Neural Network for Authentication with Wearable SensorsKhac-Tuan Nguyen, Thanh-Luong Vo-Tran, Dat-Thanh Dinh, Minh-Triet Tran. 197-212 [doi]
- Agile Software Engineering Methodology for Information Systems' Integration ProjectsKuldar Taveter, Alex Norta. 215-230 [doi]
- Effectiveness of Object Oriented Inheritance Metrics in Software ReusabilityMuhammad Ilyas, Josef Küng, Phuong Huynh Van Quoc. 231-239 [doi]
- Security Analysis of Administrative Role-Based Access Control Policies with Contextual InformationKhai Kim Quoc Dinh, Tuan Duc Tran, Anh Truong. 243-261 [doi]
- Metamorphic Malware Detection by PE Analysis with the Longest Common SequenceVu-Thanh Nguyen, Toan Tan Nguyen, Hieu Phan Trung, Thao Do Duy, Ke Hoang Van, Tuan Dinh Le. 262-272 [doi]
- A Steganography Technique for Images Based on Wavelet TransformAyidh Alharbi, M. Tahar Kechadi. 273-281 [doi]
- Activity Recognition from Inertial Sensors with Convolutional Neural NetworksQuang-Do Ha, Minh-Triet Tran. 285-298 [doi]
- Accuracy Improvement for Glucose Measurement in Handheld Devices by Using Neural NetworksHieu Trung Huynh, Ho Dac Quan, Yonggwan Won. 299-308 [doi]
- Towards a Domain Specific Framework for Wearable Applications in Internet of ThingsLong-Phuoc Ton, Lam-Son Lê, Hoang-Anh Pham. 309-324 [doi]
- Development and Implementation of a Web Application for the Management of Data Recorded by a Carbon Monoxide SensorDeisy Dayana Zambrano Soto, Octavio José Salcedo Parra, Diana Stella García Miranda. 325-331 [doi]
- Privacy-Aware Data Analysis Middleware for Data-Driven EHR SystemsThien An Nguyen, Nhien-An Le-Khac, M. Tahar Kechadi. 335-350 [doi]
- An Exact Consensus-Based Network Intrusion Detection SystemMichel Toulouse, Quang Tran Minh, Thao Nguyen. 351-367 [doi]
- Binary Tree Based Deterministic Positive Selection Approach to Network SecurityPiotr Honko. 368-380 [doi]
- Application of Rough Sets to Negative Selection AlgorithmsAndrzej Chmielewski. 381-394 [doi]
- Focusing on Precision- and Trust-Propagation in Knowledge Processing SystemsMarkus Jäger, Jussi Nikander, Stefan Nadschläger, Phuong Huynh Van Quoc, Josef Küng. 395-406 [doi]
- MITIS - An Insider Threats Mitigation Framework for Information SystemsAhmad Ali, Mansoor Ahmed, Muhammad Ilyas, Josef Küng. 407-415 [doi]
- Integrating Knowledge-Based Reasoning Algorithms and Collaborative Filtering into E-Learning Material Recommendation SystemPhung Do, Kha Nguyen, Vu-Thanh Nguyen, Tran Nam Dung, Tuan Dinh Le. 419-432 [doi]
- A Semantic-Based Recommendation Approach for Cold-Start ProblemHuynh Thanh-Tai, Nguyen Thai-Nghe. 433-443 [doi]
- Identifying Key Player Using Sum of Influence Probabilities in a Social NetworkNgo Thanh Hung, Huynh Thanh Viet. 444-452 [doi]
- Key Success Factors in Introducing National e-Identification SystemsValentyna Tsap, Ingrid Pappel, Dirk Draheim. 455-471 [doi]
- The Digital Archiving Process in Estonia - Assessment and Future PerspectivesIngrid Pappel, Karin Oolu, Koit Saarevet, Mihkel Lauk, Dirk Draheim. 472-481 [doi]
- Is There a Need for a New Generation of Congestion Control Algorithms in Point-to-Point Networks?Andrés Felipe Hernández Leon, Octavio José Salcedo Parra, Danilo Alfonso López Sarmiento. 482-489 [doi]