Abstract is missing.
- Mining Top-k Frequent/Regular Patterns Based on User-Given Trade-Off between Frequency and RegularityKomate Amphawan, Philippe Lenca. 1-12 [doi]
- Cross-Media Analysis for Communication during Natural DisastersGerhard Backfried, Johannes Göllner, Gerald Quirchmayr, Karin Rainer, Gert Kienast, Georg Thallinger, Christian Schmidt, Mark Pfeiffer, Christian Meurers, Andreas Peer. 13-22 [doi]
- An Intelligent Cloud Cache Replacement SchemeThepparit Banditwattanawong, Putchong Uthayopas. 23-34 [doi]
- Exploring Video Steganography for Hiding Images Based on Similar Lifting Wavelet CoefficientsKornkanok Churin, Jitdumrong Preechasuk, Chantana Chantrapornchai. 35-46 [doi]
- Rotor Time Constant Identification Approaches Based on Back-Propagation Neural Network for Indirect Vector Controlled Induction MachineMoulay Rachid Douiri, Mohamed Cherkaoui. 47-57 [doi]
- Improving Multi-Floor Facility Layout Problems Using Systematic Layout Planning and SimulationSeyedeh Sabereh Hosseini, Seyed Ali Mirzapour, Kuan Yew Wong. 58-69 [doi]
- Icon Placement Regularization for Jammed Profiles: Applications to Web-Registered Personnel MiningHiroyuki Kamiya, Ryota Yokote, Yasuo Matsuyama. 70-79 [doi]
- A Paradigm Approach to Generate Trust Index Using 3C3G Framework for B2C E-Commerce WebsitesBaljeet Kaur, Sushila Madan. 80-92 [doi]
- A Review of Security Risks in the Mobile Telecommunication Packet Core NetworkVarin Khera, Chun Che Fung, Sivadon Chaisiri. 93-103 [doi]
- Efficient Code Obfuscation for AndroidAleksandrina Kovacheva. 104-119 [doi]
- Identifying Factors Influencing Hybrid Self-regulated and Collaborative Learning: Toward an End-User Training FrameworkSirikorn Krompho, Nalinpat Porrawatpreyakorn. 120-130 [doi]
- Effect of Training Sample on Reconstructing 3D Face Shapes from Feature PointsAshraf Y. A. Maghari, Ibrahim Venkat, Iman Yi Liao, Bahari Belaton. 131-140 [doi]
- Use of Multi-agent Based Platform for Providing Document-Centric Interoperability in the Realm of E-governmentMuhammad Faran Majeed, Vatcharaporn Esichaikul, Mah e No. 141-149 [doi]
- Analysis of Optimization Techniques to Improve User Response Time of Web Applications and Their Implementation for MOODLEPriyanka Manchanda. 150-161 [doi]
- Event-Driven Implementation of Layer-7 Load BalancerTakayuki Sasajima, Shin-ya Nishizaki. 162-172 [doi]
- RFID Privacy and Security Risks: Italian Case StudyMaria Concetta De Vivo, Alberto Polzonetti, Pietro Tapanelli. 173-183 [doi]
- Evaluating and Benchmarking the Interactions between a Humanoid Robot and a Virtual Human for a Real-World Social TaskS. M. Mizanoor Rahman. 184-197 [doi]
- Assessing the Differential Effect of Web Usability Dimensions on Perceived Usefulness of a B2C E-Commerce WebsiteGeetanjali Sahi, Sushila Madan. 198-211 [doi]
- Modified Deformable Parts Model for Side Profile Facial Feature DetectionPisal Setthawong, Vajirasak Vanijja. 212-220 [doi]
- Design of Disease Management System for Chronic Heart Failure: A Case Study from Advanced Heart Failure Clinic at King Chulalongkorn Memorial HospitalChaiyawut Sookpalng, Vajirasak Vanijja. 221-231 [doi]
- Effect of Codec Bit Rate and Packet Loss on Thai Speech Recognition over IPTuul Triyason, Prasert Kanthamanon. 232-241 [doi]
- A Comparative Study of VoIP Quality Measurement from G.711 and G.729 Using PESQ and Thai SpeechKiattisak Yochanang, Therdpong Daengsi, Tuul Triyason, Pongpisit Wuttidittachotti. 242-255 [doi]
- A New Multi-sensor Track Association Approach Based on Intuitionistic Fuzzy ClusteringLingling Zhao, Xianglei Dong, Peijun Ma, Xiaohong Su, Chunmei Shi. 256-266 [doi]