Abstract is missing.
- Risk management in dynamic role based access control systemsJi Ma, Kamel Adi, Luigi Logrippo, Serge Mankovski. 1-8 [doi]
- Latent semantic indexing and large dataset: Study of term-weighting schemesA. N. K. Zaman, Charles Grant Brown. 1-4 [doi]
- Behavior mining of female students by analyzing log filesRozita Jamili Oskouei. 5-10 [doi]
- Preserving object-relational databases for the next generationsHerna L. Viktor, Bo Wang, Eric Paquet, Julie Doyle. 11-18 [doi]
- Clustering approaches for data with missing values: Comparison and evaluationLudmila Himmelspach, Stefan Conrad. 19-28 [doi]
- Real-time business intelligence system architecture with stream miningYang Hang, Simon Fong. 29-34 [doi]
- Data mining and automatic OLAP schema generationMuhammad Usman, Sohail Asghar, Simon Fong. 35-43 [doi]
- Clustering medical data to predict the likelihood of diseasesRazan Paul, Abu Sayed Md. Latiful Hoque. 44-49 [doi]
- Topic detection in noisy data sourcesKerstin Denecke, Marko Brosowski. 50-55 [doi]
- System architecture for data acquisition, extraction and analysis for experiments with weblabsMarcelo Queiroz Leite, Leandro Halle Najm, Pedro Luiz Pizzigatti Correa, Ayrton Vollet Neto, Vera Lucia Imperatriz Fonseca. 56-62 [doi]
- Mining irregular association rules based on action & non-action type dataRazan Paul, Abu Sayed Md. Latiful Hoque. 63-68 [doi]
- Plastic color mismatch causes identification using OLAP and data miningFarid Bourennani, Ghaus M. Rizvi, Daniel Ross. 69-74 [doi]
- High-order functions and their ordering relationsKevin H. Xu, Jingsong Zhang, Shelby Gao. 75-80 [doi]
- Finding symmetric association rules to support medical qualitative researchRazan Paul, Abu Sayed Md. Latiful Hoque. 81-86 [doi]
- Requirements analysis for a traceability system for management wood supply chain on Amazon ForestDaniel Lins da Silva, Pedro Luiz Pizzigatti Correa, Leandro Halle Najm. 87-94 [doi]
- Clustering search results of non-text user generated contentPan Juasiripukdee, Lisa Wiyartanti, Laehyun Kim. 95-100 [doi]
- Augmenting the visual presentation of Web search resultsAnwar Alhenshiri, Stephen Brooks, Carolyn R. Watters, Michael A. Shepherd. 101-107 [doi]
- Conceptual File Management: Revising the structure of classification-based information retrievalAli Sajedi Badashian, Hamidreza Afzali, Morteza Ashurzad Delcheh, Mehregan Mahdavi, Mahdi Alipour. 108-113 [doi]
- A novel similarity evaluating model based on RFCA and ICSChongyang Shi, Zhendong Niu. 114-119 [doi]
- Using Chinese part-of-speech patterns for sentiment phrase identification and opinion extraction in user generated reviewsTing-Chun Peng, Chia-Chun Shih. 120-127 [doi]
- Quantitative measurements of cognitive processing involved with gaze fixationsQuoc Hao Mach, Mathew D. Hunter, Ratvinder Singh Grewal. 128-131 [doi]
- Query-relevant document representation for text clusteringMasoud Makrehchi. 132-138 [doi]
- Flatten hierarchies for large-scale hierarchical text categorizationXiaolin Wang, Bao-Liang Lu. 139-144 [doi]
- A feedback-based method for adaptive ROI protection in H.264/AVCYanchun Zhong, Heng Li, Jialei Bi. 145-151 [doi]
- Facial feature extraction using hybrid genetic-simplex optimization in multi-objective Active Appearance ModelAbdul Sattar 0003, Renaud Séguier. 152-158 [doi]
- Design and development of Digital Movie Guide service for approaching Community Coordinated MultimediaJiehan Zhou, Jaakko Moisanen, Mika Rautiainen, Mika Ylianttila. 159-162 [doi]
- Logo detection and recognition in video streamSyed Yasser Arafat, Syed Afaq Husain, Iftikhar Azim Niaz, Muhammad Saleem. 163-168 [doi]
- Best rank-r tensor selection using Genetic Algorithm for better noise reduction and compression of Hyperspectral imagesA. Karami, M. Yazdi, A. Zolghadre Asli. 169-173 [doi]
- An efficient filtering technique for super-graph query processingMohamed Saber, Mostafa M. Aref, Tarek F. Gharib. 174-181 [doi]
- A novel eigenspace-based method for human action recognitionAbdunnaser Diaf, Rachid Benlamri, Boubakeur Boufama, Riadh Ksantini. 182-187 [doi]
- A new combined KSVM and KFD model for classification and recognitionRiadh Ksantini, Boubakeur Boufama, Imran Shafiq Ahmad, Naimul Mefraz Khan. 188-193 [doi]
- Query reformulation strategies in an interdisciplinary digital library: The case of nanoscience and technologyAli Shiri. 200-206 [doi]
- Deal with multiplicity and diversity of relevance factors in XML retrievalKamal Bal, Omar Nouali. 207-212 [doi]
- A modulo-based labeling scheme for dynamically ordered XML treesRaed Al-Shaikh, Ghalib Hashim, AbdulRahman BinHuraib, Salahadin Mohammed. 213-221 [doi]
- Complementarity of process-oriented and ontology-based context managers to identify situationsAmel Bouzeghoub, Chantal Taconet, Amina Jarraya, Ngoc-Kien Do, Denis Conan. 222-229 [doi]
- Using contract and ontology for privacy protection in Service-Oriented ArchitectureDiego Garcia, Miriam A. M. Capretz, Maria Beatriz Felgar de Toledo. 230-235 [doi]
- Probabilistic modal logic as a foundation for knowledge managementNasser Noroozi. 236-241 [doi]
- Measuring taxonomic consistency of ontologies using lexical semantic relatednessZhao Lu, Zoltán Miklós, Songmei Cai, Junzhong Gu. 242-247 [doi]
- Context-relevant criteria for starting knowledge management initiativesChing-Cha Hsieh, Chia-Hui Lo, Y. H. Hung. 248-253 [doi]
- Ontology-based classification of unstructured informationStefan Burger, Bernd Stieger. 254-259 [doi]
- Maintaining integrity constraints in relational to OWL transformationsMing Fang, Weiling Li, Rajshekhar Sunderraman. 260-265 [doi]
- Social network collaborative filtering framework and online trust factors: A case study on FacebookWei Chen, Simon Fong. 266-273 [doi]
- An efficient projected database method for mining sequential association rulesYi-Chun Chen, Guanling Lee. 274-278 [doi]
- An approach in web content mining for clustering web pagesR. Etemadi, Nasrollah Moghadam Charkari. 279-284 [doi]
- Measuring the credibility of Arabic text content in TwitterRasha M. BinSultan Al-Eidan, Hend S. Al-Khalifa, AbdulMalik S. Al-Salman. 285-291 [doi]
- Exploiting Wikipedia in query understanding systemsRichard Khoury. 292-297 [doi]
- Digital solutions for inference rules in decision-supporting systemsErika Matsak, Peeter Lorents. 298-302 [doi]
- An enterprise business intelligence maturity model (EBIMM): Conceptual frameworkMin-Hooi Chuah. 303-308 [doi]
- A technique to overcome the problem of small size database for automatic speaker recognitionMansour Alsulaiman, Awais Mahmood, Muhammad Ghulam, Mohamed Ajami Bencherif, Yousef Ajami Alotaibi. 303-308 [doi]
- Visualizing e-Government portal and its performance in WEBVSHo Si Meng, Simon Fong. 315-320 [doi]
- Pricing-model for marketing of FERP workflow as productEvan Asfoura, Naoum Jamous, Gamal Kassem, Reiner R. Dumke. 321-325 [doi]
- 3D-ADAL: A three-dimensional distributed range-free localization algorithm for wireless sensor networks based on unmanned aerial vehiclesE. Guerrero, J. Alvarez, L. Rivero. 332-338 [doi]
- DACS: A dynamic approximative caching scheme for Wireless Sensor NetworksNils Hoeller, Christoph Reinke, Jana Neumann, Sven Groppe, Florian Frischat, Volker Linnemann. 339-346 [doi]
- A load balancing scheme for latency optimization in Grid networksOsama Abu-Rahmeh, P. Johnson. 347-352 [doi]
- A vision for Wireless Sensor Networks: Hybrid architecture, model framework and service based systemsMuhammad Sohaib Aslam, Susan Rea, Dirk Pesch. 353-358 [doi]
- 2L-RBACG: A new framework for resource access control in grid environmentsHakimeh Alemi Baktash, Mohammadbagher Karimi, Mohammad Reza Meybodi, Asgarali Bouyer. 359-366 [doi]
- A requirements taxonomy and rating model for secure and usable B2C/C2C e-commerce websitesUlises Ibarra Hernandez, Miguel Vargas Martin, Francisco Álvarez Rodríguez, Ricardo Mendoza González, Fabio A. Garcia Toribio. 367-372 [doi]
- Adaptive workflow management to ensure transactional service compositionKatharina Hahn. 373-378 [doi]
- A suppliers perspective on e-commerce: Suppliers responses to consumers perspectives on e-commerce adoption in developing countries - A Saudi Arabian empirical studyFahad Abdulaziz Aleid, Simon Rogerson, N. Ben Fairweather. 379-383 [doi]
- On index merging for semantic web dataLubomir Stanchev. 384-391 [doi]
- Characterizing Web pages based on the query likelihoods of neighboring pagesKoya Tamura, Kenji Hatano, Hiroshi Yadohisa. 392-397 [doi]
- A robust biometric watermark-based authentication schemeT. Hoang Ngan Le, Kim Hung Nguyen, Hoai Bac Le. 398-403 [doi]
- Fibonacci sequence and EWMA for intrusion forecasting systemElvis Pontes, Wagner L. Zucchi. 404-411 [doi]
- Penetration test: A case study on remote command execution security holeS. Mohammad, Soulmaz Pourdavar. 412-416 [doi]
- Detecting incompleteness in access control policies using data classification schemesRiaz Ahmed Shaikh, Kamel Adi, Luigi Logrippo, Serge Mankovski. 417-422 [doi]
- Formal model for analysis of context dependencies in ubiquitous systemsRaheel Ali Baloch, Noël Crespi. 431-436 [doi]
- Dynamic reconfigurable screen keyboard generation method using probe key testSeokhoon Ko, Seman Oh. 437-441 [doi]
- Dynamic user-centric mobile context modelYu-Ling Chang, Eduardo Barrenechea, Paulo Alencar. 442-447 [doi]
- Using aspect oriented software architecture for enterprise systems developmentPawan Kumar Verma, Deepak Dahiya, Pooja Jain. 448-453 [doi]
- Towards a framework for Collective IntelligenceJawad Berri. 454-459 [doi]
- A new efficient blended e-learning model and framework for K12 and higher education: Design and implementation success factorsSalah Al-Sharhan, Ahmed Al-Hunaiyyan, Hanaa Al-sharah. 465-471 [doi]
- Securing AJAX-enriched mobile environment for exchanging SVG-based learning materialsJinan Fiaidhi, Sabah Mohammed, David A. J. Thomas, Lyle F. Chamarette. 472-477 [doi]
- Designing a collaborative educational system: A competitive approach to e-learningAli Sajedi Badashian, Asghar Dehghani Firouzabadi, Morteza Ashurzad Delcheh, Hamidreza Afzali, Mehregan Mahdavi. 478-483 [doi]
- Simulation integration for healthcare education, training and assessmentRachel H. Ellaway, Jeremy R. Cooperstock, Bruce Spencer. 484-489 [doi]
- OpenLabyrinth: An abstract pathway-based serious game engine for professional educationRachel H. Ellaway. 490-495 [doi]
- Context-based specification of Web service policies using WSPLHamdi Yahyaoui, Mohammed Almulla. 496-501 [doi]
- Environment sound recognition using zero crossing features and MPEG-7Mubarak Obaid AlQahtani, Muhammad Ghulam, Yousef Ajami Alotaibi. 502-506 [doi]
- Towards a generic technique for analysing interactions between aspects at requirement phaseAmel Boubendir, Allaoua Chaoui. 507-512 [doi]
- Text data compression ratio as a text attribute for a language-independent text art extraction methodTetsuya Suzuki, Kazuyuki Hayashi. 513-518 [doi]
- Patient Data Management System - Periodic Model using GSMAnup B. Goutham, B. S. Manjunath Iyer, R. Rajiv. 519-524 [doi]
- Hybrid DWT-SVD audio watermarkingAli Al-Haj, Christina Twal, Ahmad A. Mohammad. 525-529 [doi]
- Towards decentralized grid agent models for continuous resource discovery of interoperable grid Virtual OrganisationsStelios Sotiriadis, Nik Bessis, Ye Huang, Paul Sant, Carsten Maple. 530-535 [doi]
- Customizing interactive patient s diagnosis user interfaceEjaz Ahmed, Nik Bessis, Yong Yue. 536-539 [doi]
- Collaboration of heterogenous metaheuristic agentsMehmet Emin Aydin. 540-545 [doi]
- A new particle swarm optimization algorithm for dynamic image clusteringSalima Ouadfel, Mohamed Batouche, Abdelmalik Taleb-Ahmed. 546-551 [doi]
- Co-authoring an Adaptive Educational HypermediaSaid Talhi, Salima Ouadfel, Amel Behaz, Mahieddine Djoudi. 552-557 [doi]