Abstract is missing.
- Using expert systems technology to increase agriculture production and water conservationMostafa Mahmoud, Mahmoud Rafea, Ahmed Rafea. 1-7 [doi]
- Reference architecture for enterprise batch processing of unformationAmit Bahuguna. 8-17 [doi]
- Hybrid differential evolution - Particle Swarm Optimization algorithm for solving global optimization problemsMillie Pant, Radha Thangaraj, Crina Grosan, Ajith Abraham. 18-24 [doi]
- Reinforcement _recurrent fuzzy rule based system based on brain emotional learning structure to predict the complexity dynamic systemMahboobeh Parsapoor, Caro Lucas, Saeid Setayeshi. 25-32 [doi]
- Follow-the-Trial-Fitter: Real-time dressing without undressingNatsuha Araki, Yoichi Muraoka. 33-38 [doi]
- Exploring the applicability of Web Architectural-Inducing Model (WA-IM) for Information Architecture in cultural context: A structural equation modeling approachWan Abdul Rahim Wan Mohd Isa, Nor Laila Md. Noor, Shafie Mehad. 39-44 [doi]
- GGA-AAM: Novel heuristic method of gradient driven Genetic Algorithm for Active Appearance ModelsAbdul Sattar 0003, Renaud Séguier. 45-50 [doi]
- Mobile education: Towards affective bi-modal interaction for adaptivityEfthymios Alepis, Maria Virvou, Katerina Kabassi. 51-56 [doi]
- A backup mechanism with concurrency control for multilevel secure distributed database systemsVeluchandhar Vadivelu, R. V. Jayakumar, M. Muthuvel, K. Balasubramanian, A. Karthi, Karthikesan, G. Ramaiyan, Alagarsamy Deepa, S. Albert Rabara. 57-62 [doi]
- An evaluation of users tips effectiveness for Phishing websites detectionAbdullah Alnajim, Malcolm Munro. 63-68 [doi]
- Mobile agent based real time IP tracebackSandhya Armoogum, Nawaz Mohamudally. 69-74 [doi]
- An authorization model for Web Services within SOAHany F. El Yamany, Miriam A. M. Capretz. 75-80 [doi]
- A fine-grained time-constraint role-based access control using OCLJun-qing Li, Xin-you Li, Sheng-xian Xie, Chen Chen, Hui-Shan Yu, Guang-liang Liu. 81-86 [doi]
- A holographic associative memory recommender systemMatthew Rutledge-Taylor, Andre Vellino, Robert L. West. 87-92 [doi]
- Content-based RSS and broadcast news streams aggregation and retrievalAlberto Messina, Maurizio Montagnuolo. 93-98 [doi]
- Bibliographic element extraction from scanned documents using conditional random fieldsManabu Ohta, Takayuki Yakushi, Atsuhiro Takasu. 99-104 [doi]
- Unsupervised key-phrases extraction from scientific papers using domain and linguistic knowledgeMikalai Krapivin, Maurizio Marchese, Andrei Yadrantsau, Yanchun Liang. 105-112 [doi]
- A Quality-Aware Context-Based Access Control model for ubiquitous applicationsJosé Bringel Filho, Hervé Martin. 113-118 [doi]
- Intelligent vertical handover decision model to improve QoSHasina Attaullah, Faiza Iqbal, Muhammad Younus Javed. 119-124 [doi]
- Term selection patterns for formulating queries: a User study focused on term semanticsAnna Mastora, Maria Monopoli, Sarantos Kapidakis. 125-130 [doi]
- Classification of personal names with application to DBLPMaria Biryukov, Yafang Wang. 131-137 [doi]
- A framework for transient objects in Digital LibrariesTjalve Aarflot, Cathal Gurrin, Dag Johansen. 138-145 [doi]
- A geo-temporal Web gazetteer integrating data from multiple sourcesHugo Manguinhas, Bruno Martins, José Luis Borbinha. 146-153 [doi]
- Performance optimization over channel model for a Low Rate Wireless Personal Area NetworkIndong Yeo, Jonghyune Kim, Sunshin An. 154-159 [doi]
- Peer-to-peer searching mechanisms for location-aware contents with time-dependent importanceKentaro Takahashi, Kaname Harumoto, Shojiro Nishio. 160-165 [doi]
- Ubiquitous computing and androidZohaib Sibte Hassan. 166-171 [doi]
- MiRE: A Minimal Rule Engine for context-aware mobile devicesChangbai Choi, Insuk Park, Soon J. Hyun, Dongman Lee, David Hyun Sim. 172-177 [doi]
- Integrating multimedia repositories into the PROBADO frameworkIna Blumel, Jürgen Diet, Harald Krottmaier. 178-183 [doi]
- RIPPNET: Efficient range indexing in peer-to-peer networksNorvald H. Ryeng, Kjetil Nørvåg. 184-191 [doi]
- Simultaneous multi-DAD (SDAD) in Mobile IPv6Dong-cheol Shin, Sung-Gi Min. 192-197 [doi]
- Ubiquitous desktops with multi-factor authenticationPaul Doyle, Mark Deegan, Ciaran O Driscoll, Michael Gleeson, Brian Gillespie. 198-203 [doi]
- Comparative study on Null Boundary and Periodic Boundary 3-neighborhood Multiple Attractor Cellular Automata for classificationAnirban Kundu, Alok Ranjan Pal, Tanay Sarkar, Moutan Banerjee, Sutirtha Kr. Guha, Debajyoti Mukhopadhyay. 204-209 [doi]
- Implementation of ER diagrams in the framework of a Periodic Table of Generic Visualization methodsBoris P. Leontyev. 210-215 [doi]
- Anomaly detection and visualization using Fisher Discriminant clustering of network entropyMehmet Celenk, Thomas Conley, John Willis, James Graham. 216-220 [doi]
- Automatic selection of visually attractive pages for thumbnail display in document list viewFabrice Matulic. 221-226 [doi]
- A machine vision approach for jacket launching angle measurementTianyang Liu, He Guo, Xiukun Wang, Ajith Abraham, Hongbo Liu. 227-232 [doi]
- Analysis of machine learning techniques for context extractionMichael Granitzer, Mark Kröll, Christin Seifert, Andreas S. Rath, Nicolas Weber, Olivia Dietzel, Stefanie N. Lindstaedt. 233-240 [doi]
- How the ExpLSA approach impacts the document classification tasksNicolas Béchet, Mathieu Roche, Jacques Chauché. 241-246 [doi]
- Data collection system for link analysisBo Yang, Jian Qin. 247-252 [doi]
- Algorithm of the longest commonly consecutive word for Plagiarism detection in text based documentAgung Sediyono, Ku Ruhana Ku-Mahamud. 253-259 [doi]
- A ranking algorithm for user-generated video contents based on social activitiesLisa Wiyartanti, Yo-Sub Han, Laehyun Kim. 260-265 [doi]
- Flexible Question Answering System for mobile devicesDaniel Ortiz Arroyo. 266-271 [doi]
- Grid-based Semantic Integration and dissemination of medical informationAisha Naseer, Lampros K. Stergioulas, Suhel Hammoud, Maozhen Li. 272-278 [doi]
- English sentence retrieval system based on dependency structure and its evaluationYoshihide Kato, Seiji Egawa, Shigeki Matsubara, Yasuyoshi Inagaki. 279-285 [doi]
- DYONIPOS: Proactive support of knowledge workersJosef Makolm, Silke Weiß, Doris Ipsmiller. 286-291 [doi]
- Managing tacit and explicit knowledge in organisational teamsRaija Halonen, Elisa Laukkanen. 292-297 [doi]
- Enhancing interoperability between enterprise planning applications: An architectural frameworkKarim Ishak, Bernard Archimède, Philippe Charbonnaud. 298-303 [doi]
- Reshaping email relationshipsEyas El-Qawasmeh, Václav Snásel, Pit Pichappan. 304-307 [doi]
- A participant testing strategy for service orchestrationsFlavio Corradini, Francesco De Angelis, Andrea Polini, Alberto Polzonetti. 308-313 [doi]
- Modeling vocabularies in the architectural domainKatja Niemann, Martin Wolpers. 314-319 [doi]
- Bug reports retrieval using Self-organizing MapRenata L. M. E. do Rego, Márcio Ribeiro, Emanuella Aleixo, Renata M. C. R. de Souza. 320-325 [doi]
- Approximation algorithm using: Neighbors, history and errors (NHE)Maytham Safar, Nisreen Al-Masri. 326-333 [doi]
- NIDS based on payload word frequencies and anomaly of transitionsSasa Mrdovic, Branislava Perunicic. 334-339 [doi]
- A cross-layer framework for video streaming over wireless ad-hoc networksMohammad Nikoupour, Ali Nikoupour, Mehdi Dehghan. 340-345 [doi]
- Reliable data aggregation protocol for wireless sensor networksTamara Pazynyuk, JiangZhong Li, George S. Oreku. 346-350 [doi]
- Addressing the vulnerability of the 4-way handshake of 802.11iSonghe Zhao, Charles A. Shoniregun, Chris Imafidon. 351-356 [doi]
- A power efficient technique for multi-channel dissemination networksAhmad S. Al-Mogren. 357-362 [doi]
- Chain ontology based: A model for protecting personal information privacyEsraa Omran, Alber Bokma, Shereef Abu Al-Maati. 363-368 [doi]
- Description OntologiesErmelinda Oro, Massimo Ruffolo. 369-374 [doi]
- Query rewriting for lightweight information integrationRodolfo Stecher, Claudia Niederée, Wolfgang Nejdl. 375-380 [doi]
- The role of interoperability in eGovernment applications: An investigation of obstacles and implementation decisionsEfthimios Tambouris, Nikos Loutas, Vassilios Peristeras, Konstantinos A. Tarabanis. 381-386 [doi]
- Legal cognitive decision processing towards a dynamic taxonomyWolfgang Kahlig. 387-392 [doi]
- E-business and strategy management in Digital Information Management methodologies: An adaptive algorithmic approachAlexandra Lipitakis. 393-398 [doi]
- PROMETHEE-based recommender system for multi-sort recommendations in on-line storesArash Niknafs, Nasrollah Moghaddam Charkari, Ali Akbar Niknafs. 399-404 [doi]
- Electronic government paradigmCyril E. Azenabor, Charles A. Shoniregun. 405-410 [doi]
- A framework for culture influence Virtual Learning Environments trustSamson Omosule, Charles A. Shoniregun, David Preston. 411-416 [doi]
- Modeling interactivity in a B2B Web-based CommunityChima Adiele. 417-422 [doi]
- Identification of influence factors in the information technology formation in United Arab EmiratesAbdullah A. Al-Tameem. 423-429 [doi]
- How to assess customer opinions beyond language barriers?Kerstin Denecke. 430-435 [doi]
- Extracting community structure features for hypertext classificationDell Zhang, Robert Mao. 436-441 [doi]
- Hierarchical segmentation of digital mammography by agents competitionAhlem Melouah, Hayet Farida Merouani. 442-447 [doi]
- Visualizing consumption in weighted hierarchiesBenoît Otjacques, Pierre Collin, Fernand Feltz, Monique Noirhomme-Fraiture. 448-455 [doi]
- Collaborative geospatial web services for multi-dimension remote sensing dataChunyang Hu, Yongwang Zhao, Dianfu Ma, Xiaoliang Sun, Jun Shao, Xuan Li. 456-463 [doi]
- A model driven approach to the design and implementing of fault tolerant Service oriented ArchitecturesMohammed Alodib, Behzad Bordbar, Basim Majeed. 464-469 [doi]
- Towards an automatic real-time assessment of online discussions in Computer-Supported Collaborative Learning practicesSanti Caballé, Fatos Xhafa, Ajith Abraham. 470-475 [doi]
- A framework for caching relevant data items for checking integrity constraints of mobile databaseZarina Dzolkhifli, Hamidah Ibrahim, Lilly Suriani Affendey, Praveen Madiraju. 476-482 [doi]
- Efficient distributed information management in smart spacesAlexander Smirnov, Nikolay Shilov, Andrew Krizhanovsky, Antti Lappeteläinen, Ian Oliver, S. Boldyrev. 483-488 [doi]
- A robust cooperation approach for mobile multimedia adhoc networksJacques M. Bahi, Mirna Eskandar, Ahmed Mostefaoui. 489-494 [doi]
- A new sufficient condition for 1-coverage to imply connectivitySeyed Hossein Khasteh, Saeed Bagheri Shouraki, Ali Akbar fKiaei. 495-499 [doi]
- A genetic algorithm for logical topic text segmentationAlin Mihaila, Andreea Diana Mihis, Cristina Mihaila. 500-505 [doi]
- Towards the development of an automatic readability measurements for arabic languageAmani A. Al-Ajlan, Hend S. Al-Khalifa, AbdulMalik S. Al-Salman. 506-511 [doi]
- Testing concept indexing in crosslingual medical text classificationFrancisco M. Carrero, José Carlos Cortizo, José María Gómez. 512-519 [doi]
- Use of text syntactical structures in detection of document duplicatesMohamed Elhadi, Amjad Al-Tobi. 520-525 [doi]
- A new technique for detecting similar documents based on term co-occurrence and conceptual property of the textAzadeh Zamanifar, Behrouz Minaei-Bidgoli, Omid Kashefi. 526-531 [doi]
- Morphological analysis of Bangla words for Universal Networking LanguageMd. Nawab Yousuf Ali, S. M. Abdullah Al-Mamun, Jugal Krishna Das, Abu Mohammad Nurannabi. 532-537 [doi]
- A comparison of collation algorithm for Myanmar languageYuzana, Khin Marlar Tun. 538-543 [doi]
- Sentence compression by structural conversion of parse treeSeiji Egawa, Yoshihide Kato, Shigeki Matsubara. 544-550 [doi]
- Robust recognition of complex entities in text exploiting enterprise data and NLP-techniquesFalk Brauer, Marcus Schramm, Wojciech M. Barczynski, Alexander Löser, Hong Hai Do. 551-558 [doi]
- Time signatures - an implementation of Keystroke and click patterns for practical and secure authenticationMuhammad Sharif, Tariq Faiz, Mudassar Raza. 559-562 [doi]
- Securing information content using new encryption method and SteganographyAbbas Cheddad, Joan Condell, Kevin Curran, Paul McKevitt. 563-568 [doi]
- The importance of biometric sensor continuous secure monitoringAlexandros Papanikolaou, Christos Ilioudis, Christos K. Georgiadis, Elias Pimenidis. 569-574 [doi]
- Integrity assurance of mobile agents through public-key encryption and watermarkingNoor-ul-Qayyum, Farooq Ahmad. 575-580 [doi]
- A NetFlow based internet-worm detecting system in large networkYi-Tung F. Chan, Charles A. Shoniregun, Galyna A. Akmayeva. 581-586 [doi]
- Runtime middleware for the generation of adaptive user interfaces on resource-constrained devicesKarim Yaici, Ahmet M. Kondoz. 587-592 [doi]
- A framework for RESTful object exchange through schematized XML (unRESTricted)Barbara Van De Keer, Dieter Van Rijsselbergen, Erik Mannens, Rik Van de Walle. 593-598 [doi]
- Fine-grained access control in hybrid relational-XML databaseTaketo Sasaki, Takuya Fukushima, Daeil Park, Motomichi Toyama. 599-604 [doi]
- CXQU: A compact XML storage for efficient query and update processingRamez Alkhatib, Marc H. Scholl. 605-612 [doi]
- Enabling smooth integration between HL7 CDA and medical guidelines on the web with an initial focus on women s health in general practiceM. Arguello, J. Des, A. Thompson, H. Paniagua, M. J. Fernandez-Prieto, R. Perez. 613-620 [doi]
- Sieving publishing communities in DBLPChristoph Schommer. 621-625 [doi]
- A fast approximate algorithm for large-scale Latent Semantic IndexingDell Zhang, Zheng Zhu. 626-631 [doi]
- Two pattern classifiers for interval data based on binary regression modelsRenata M. C. R. de Souza, Francisco José de A. Cysneiros, Diego C. F. Queiroz, Roberta A. de A. Fagundes. 632-637 [doi]
- Learning classifiers without negative examples: A reduction approachDell Zhang, Wee Sun Lee. 638-643 [doi]
- Semantic cache schema for query processing in mobile databasesAli-Asghar Safaeei, Mostafa Haghjoo, Sulmaz Abdi. 644-649 [doi]
- Statistical shape based multispectral image retrieval extracting Power Spectrum VectorsPeyman Kabiri, Hamed Shahbazi, Mohsen Soryani. 650-655 [doi]
- A cross-layer quality driven approach in Web service selectionJin Wu, Zhili Sun. 656-661 [doi]
- A storage scheme for multidimensional data alleviating dimension dependencyTeppei Shimada, Tatsuo Tsuji, Ken Higuchi. 662-668 [doi]
- Management of context-aware preferences in multidimensional databasesHoussem Jerbi, Franck Ravat, Olivier Teste, Gilles Zurfluh. 669-675 [doi]
- Visual SBVRPrakash Musham, Sharad Singh, Rashi Bahal, T. V. Prabhakar. 676-683 [doi]
- Adapted relation structure algorithm for Word Sense DisambiguationMyunggwon Hwang, PanKoo Kim. 684-688 [doi]
- Process-oriented method usage for examining the knowledge mining processOlga Zvereva, Vera Morosova. 689-694 [doi]
- Knowledge management practices in higher education institutes: A different approachReza Hoveida, Gholamreza Shams, Ali Hooshmand. 695-702 [doi]
- Performance analysis of an insider threat mitigation modelQutaibah Althebyan, Brajendra Panda. 703-709 [doi]
- Using the augmented vector space model to support the knowledge worker in document filteringAnn Johnston, Francesco Lelli, Stefan Decker. 710-715 [doi]
- Adaptive mean shift-based image segmentation using multiple instance learningIker Gondra, Tao Xu. 716-721 [doi]
- The softphone securityDannan Lin, Charles A. Shoniregun, Galyna A. Akmayeva. 722-726 [doi]
- Real-time detection of sport in MPEG-2 sequences using high-level AV-descriptors and SVMRonald Glasberg, Sebastian Schmiedeke, Huseyin Oguz, Pascal Kelm, Thomas Sikora. 727-732 [doi]
- Identifying bioentity recognition errors of rule-based text-mining systemsFrancisco M. Couto, Tiago Grego, Hugo P. Bastos, Catia Pesquita, Rafael Torres, Pablo Sanchez, Leandro Pascual, Christian Blaschke. 733-738 [doi]
- MAW: A new effective and efficient knowledge Meta-model for Audiovisual WorksAna Iglesias, Guillermo G. Millan, Elisa Pintado, Elena Castro. 739-744 [doi]
- Availability measurement in peer to peer network management systemsOuldooz Baghban Karimi, Saleh Yousefi, Mahmood Fathy, Mojtaba Mazoochi. 745-750 [doi]
- A load balancing replica placement strategy in Data GridQaisar Rasool, Jianzhong Li, George S. Oreku, Shuo Zhang, Donghua Yang. 751-756 [doi]
- Matching multiple elements in grid databases: A practical approachEjaz Ahmed, Nik Bessis, Yong Yue, Muhammad Sarfraz. 757-762 [doi]
- DVM based Dynamic VPN Architecture for Group Working and Orchestrated Distributed ComputingYiran Gao, Chris Phillips, Liwen He. 763-768 [doi]
- Geo-information quality assurance in disaster managementYing Su, Jie Peng, Zhanming Jin. 769-774 [doi]
- Population-variance and explorative power of Harmony Search: An analysisArpan Mukhopadhyay, Anwit Roy, Sourav Das, Swagatam Das, Ajith Abraham. 775-781 [doi]
- Browsing service registries using the Atom Interface: An application in e-GovernmentNikolaos Loutas, Krystian Samp, Jedrzej Gontarczyk, Maria Kopouki Papathanasiou. 782-787 [doi]
- MyLegislative information service: Closing the gap between the citizens and the democracyElena Sánchez-Nielsen, Francisco Chávez-Gutiérrez. 788-793 [doi]
- Introducing the need for a domain model in Public Service Provision (PSP) eGovernment SystemsEfthimios Tambouris. 794-799 [doi]
- Semantic Interoperability Middleware - Cases and applications in Electronic GovernmentAlejandro Sanchez, Adegboyega K. Ojo, Tomasz Janowski, Elsa Estevez. 800-805 [doi]
- Evaluating parliamentary e-participationEuripidis Loukis, Alexandros Xenakis. 806-812 [doi]
- Towards e-Government: The security SOA approach of the University of MurciaDaniel Sánchez-Martínez, C. Inmaculada Marín-López, Antonio F. Gómez-Skarmeta, Tomas Jimenez-Garcia. 813-818 [doi]
- An empirical study of e-Government formulation in Kingdom of Saudi Arabia & United Arab EmiratesAbdullah A. Al-Tameem. 819-826 [doi]
- Privacy in context: Privacy issues in Ubiquitous Computing applicationsCiaran O Driscoll. 827-837 [doi]
- The management of online credit card data using the Payment Card Industry Data Security StandardClive Blackwell. 838-843 [doi]
- Email reply prediction: Unsupervised leaning approachTaiwo Ayodele, Shikun Zhou. 844-849 [doi]
- An analytical framework for country level E-strategy assessmentM. J. Tarokh, Mohsen Pazari. 850-857 [doi]
- Context-aware user model for personalized servicesAekyung Moon, Young-Il Choi, Byung Sun Lee. 858-863 [doi]
- Context-awareness and model driven engineering: Illustration by an E-commerce application scenarioChantal Taconet, Zakia Kazi-Aoul. 864-869 [doi]
- A generic context model with autonomic featuresTudor Cioara, Ionut Anghel, Ioan Salomie, Mihaela Dinsoreanu. 870-875 [doi]
- Mobile Ontology-based Reasoning and Feedback (MORF) Health Monitoring SystemLuke Docksteader, Rachid Benlamri. 876-880 [doi]
- A hierarchical model-based system for discovering atypical behaviorDorothy Ndedi Monekosso. 881-886 [doi]
- Smart heating systems: Optimizing heating systems by kinetic-awarenessVincenzo Pallotta, Pascal Bruegger, Béat Hirsbrunner. 887-892 [doi]
- Context management for response to traffic accident in smart environmentAlexander V. Smirnov, Tatiana Levashova, Nikolay Shilov, Alexey Kashevnik. 893-898 [doi]
- Acceptance, usability and usefulness of WebLab-Deusto from students point of viewJavier García Zubía, Diego López-de-Ipiña, Pablo Orduna, U. Hernandez, I. Angulo, J. Irurzun. 899-904 [doi]
- Design, implementation and use of a remote network lab as an aid to support teaching computer networkMarco Aravena Vivar, Andres Ramos Magna. 905-909 [doi]
- Design and test of Application-Specific Integrated Circuits by use of mobile clientsDanilo Garbi Zutin, Michael E. Auer. 910-913 [doi]
- Reusability in practice for Remote LaboratoriesChristophe Gravier, Jacques Fayolle, Bernard Bayard, Jérémy Lardon, Gaetan Dusser. 914-919 [doi]
- Remote controlled flying robot platformHartmut Haehnel. 920-921 [doi]
- Combating digital document forgery using new secure information hiding algorithm922-924 [doi]
- Preservation metadata - a framework for 3D data based on the Semantic WebJulie Doyle, Herna L. Viktor, Eric Paquet. 925-927 [doi]
- The X.509 certificate qualityAhmad Samer Wazan, Romain Laborde, François Barrère, Abdelmalek Benzekri. 928-930 [doi]
- A data model for versioned XML documents using XQueryLuis Arévalo Rosado, Antonio Polo Márquez, Miryam Salas Sánchez. 931-933 [doi]
- A survey in semantic web technologies-inspired focused crawlersHai Dong, Farookh Khadeer Hussain, Elizabeth Chang. 934-936 [doi]
- An empirical analysis on progress of technology fusionKatsuhiro Suzuki, Junichi Sakata, Jun Hosoya. 937-939 [doi]
- Dynamic detection and administration of materialized views based on the Query Graph ModelAndreas Lübcke, Ingolf Geist, Ronny Bubke. 940-942 [doi]