Abstract is missing.
- Modelling swarm-intelligent systems for medical applicationsJolanta Mizera-Pietraszko. 1-5 [doi]
- Code style analytics for the automatic setting of formatting rules in IDEs: A solution to the Tabs vs. Spaces DebateEric Torunski, M. Omair Shafiq, Anthony Whitehead. 6-14 [doi]
- Analysis of criminal behaviors for suspect vehicle detectionUbon Thongsatapornwatana, Woraphon Lilakiatsakun, Akkarach Kawbunjun, Tossapon Boongoen. 15-20 [doi]
- Shortest path deliveries using density-based clusteringLixin Fu. 21-26 [doi]
- Classification of computer viruses from binary code using ensemble classifier and recursive feature eliminationPrasit Usaphapanus, Krerk Piromsopa. 27-31 [doi]
- Factor analysis of investment trust products by using monthly reports and news articlesNobuaki Onishi, Qiang Ma. 32-37 [doi]
- Analyzing patterns of numerously occurring heart diseases using association rule miningK. M. Mehedi Hasan Sonet, Md. Mustafizur Rahman, Pritom Mazumder, Abid Reza, Rashedur M. Rahman. 38-45 [doi]
- Prediction of importance of figures in scholarly papersYui Kita, Jun Rekimoto. 46-53 [doi]
- Fast plagiarism detection based on simple document similarityKensuke Baba. 54-58 [doi]
- CRF-based bibliography extraction from reference strings using a small amount of training dataDaiki Namikoshi, Manabu Ohta, Atsuhiro Takasu, Jun Adachi. 59-64 [doi]
- Stock prices fluctuation analysis of food companies after the Great East-Japan Earthquake: Application of random matrix theoryKenji Yamaguchi, Yukari Shirota. 65-69 [doi]
- An improved algorithm for transmission in heterogeneous cellular networksYao-Liang Chung. 70-74 [doi]
- A collaborative filtering method for interactive platformsYan Zhou, Taketoshi Ushiama. 75-80 [doi]
- A migration-oriented partial adaptation architecture for IoT-empowered city platform as a serviceToshihiko Yamakami. 81-85 [doi]
- National survey of Japanese universities on computing education: Analysis of non-IT departments and coursesTetsuro Kakeshita. 86-91 [doi]
- National servey of Japanese universities on computing education: Analysis of IT education for high school teacher license on ITKazuhiro Sumi, Tetsuro Kakeshita. 92-97 [doi]
- Compliance evaluation of information privacy protection in e-government systems in Anglophone West Africa using ISO/IEC 29100: 2011Amarachi Chinwendu Nwaeze, Pavol Zavarsky, Ron Ruhl. 98-102 [doi]
- National survey of Japanese universities on computing education: Analysis of educational computer systemMika Ohtsuki, Tetsuro Kakeshita, Mitsuhiro Takasaki. 103-108 [doi]
- National survey of Japanese universities on computing education: Analysis of informatics in general educationNaoko Takahashi, Tetsuro Kakeshita. 109-114 [doi]
- A HTTP botnet detection system based on ranking mechanismYuan-Chin Lee, Chuan-Mu Tseng, Tzong-Jye Liu. 115-120 [doi]
- Analysis and compliance evaluation of cookies-setting websites with privacy protection lawsAdeyemi Aladeokin, Pavol Zavarsky, Neelam Memon. 121-126 [doi]
- Privacy-preserved conference key distribution protocolChien-Lung Hsu, Tzu-Wei Lin, Huang-Chia Lu, Tzu-Hsien Chuang, Yu-Han Chen. 127-132 [doi]
- A dynamic identity end-to-end authentication key exchange protocol for IoT environmentsChien-Lung Hsu, Tzu-Hsien Chuang, Yu-Han Chen, Tzu-Wei Lin, Huang-Chia Lu. 133-138 [doi]
- Cryptanalysis of an authentication scheme for multi-gateway wireless sensor networksTaeui Song, Jaewook Jung, Dongwoo Kang, Hyoungshick Kim, Dongho Won. 139-143 [doi]
- Improving the trust of end users in enterprise SOA using combinatorial group testing methodsSiba Mishra, Chiranjeev Kumar. 144-149 [doi]
- Minimum node weight spanning trees searching algorithm for broadcast transmission in sensor networksZbigniew Lipinski. 150-154 [doi]
- Transparent mobility or devices on the Internet using OpenFlowGabriel A. de Oliveira, Peron R. de Sousa, Antonio A. de A. Rocha, Pedro B. Velloso. 155-160 [doi]
- On cleaning and organizing context logs for mobile user profilingMing-Yi Zheng, Hung-Yuan Chen, Huan Chen 0002, Yao-Chung Fan. 161-164 [doi]
- SCTP-based service migration for VOD serviceChin-Shiuh Shieh, Hao-Xiang Gu, Jhih-Ying Yan, Mong-Fong Horng. 165-168 [doi]
- Recommender system for Thai food cooking on smartphoneHathairat Ketmaneechairat, Chutima Kongketwanich, Thitinun Naijit. 169-178 [doi]
- Exploring NLP web APIs for building Arabic systemsSharefah A. Al-Ghamdi, Joharah Khabti, Hend S. Al-Khalifa. 175-178 [doi]
- Syntactic role identification of mathematical expressionsXing Wang, Jason Lin, Ryan Vrecenar, Jyh-Charn Liu. 179-184 [doi]
- Analysing the influence of semantic knowledge in natural language generationCristina Barros, Elena Lloret. 185-190 [doi]
- Two-level dynamic index pruningJan Friedrich, Christoph Lindemann, Michael Petrifke. 191-196 [doi]
- Mobile search engine for medicine information on smartphoneHathairat Ketmaneechairat, Kittithud Jongsiriworachot, Chanatip Thangtoon. 197-201 [doi]
- Toward plagiarism detection using citation networksSidik Soleman, Atsushi Fujii. 202-208 [doi]
- Spell corrector to social media datasets in message filtering systemsZar Zar Wint, Theo Ducros, Masayoshi Aritsugi. 209-215 [doi]
- Item recommending by item co-purchasing network and user preferenceSunantha Sodsee, Maytiyanin Komkhao. 216-221 [doi]
- Mining affordance-based substitution rules: A dynamic taxonomy approachRupal Sethi, B. Shekar. 222-227 [doi]
- DIO: Efficient interactive outlier analysis over dynamic datasetsChihiro Sakazume, Hiroyuki Kitagawa, Toshiyuki Amagasa. 228-235 [doi]
- Mining and ranking of generalized multi-dimensional frequent subgraphsAndre Petermann, Giovanni Micale, Giacomo Bergami, Alfredo Pulvirenti, Erhard Rahm. 236-245 [doi]
- Urban park area feasibility analysis using fuzzy aggregation of multi-spatial criteria and multi-expert weightsArif Wicaksono, Sunya Sarapirome. 246-251 [doi]
- Can you trust the user?: Collaborative trust estimation model for recommendationsDaichi Minami, Taketoshi Ushiama. 252-256 [doi]
- Rumor verifications on Facebook: Click speech of likes, comments and sharesAlton Y. K. Chua, Snehasish Banerjee. 257-262 [doi]
- Message content in the life of rumors: Comparing three rumor typesAlton Y. K. Chua, Rajiv Aricat, Dion Goh. 263-268 [doi]
- Scientific visualizer in personal information managementGrzegorz Osinski, Veslava Osinska, Brian Camacho. 269-272 [doi]
- Measuring uncertainty to identify missing customer information relevant to the design processAnna Marti Bigorra. 273-279 [doi]
- Mining and visualization of interpersonal interaction networksSeung Jin Lim. 280-285 [doi]
- Measurement and analysis of citizens requests to government for non-emergency servicesRami Ibrahim, M. Omair Shafiq. 286-291 [doi]
- DREAM: Dynamic data relation extraction using adaptive multi-agent systemsElhadi Belghache, Jean-Pierre Georgé, Marie Pierre Gleizes. 292-297 [doi]
- Prototyping a recommendation system for Ukiyo-e using hybrid recommendation algorithmPritish Patil, Jiayun Wang, Yuya Aratani, Kyoji Kawagoe. 298-303 [doi]
- Toward positioning IoT-empowered service engineering in city platform as a serviceToshihiko Yamakami. 304-308 [doi]
- Tweets of Thailand: A tweet retrieval system for domestic tourism in ThailandRangsipan Marukatat, Nutthapon Chinchaipong, Sirapop Prechalertpririya. 309-312 [doi]
- Identification of opinion leader on rumor spreading in online social network Twitter using edge weighting and centrality measure weightingFatia Kusuma Dewi, Satrio Baskoro Yudhoatmojo, Indra Budi. 313-318 [doi]
- Improvement of complete malaria cell image segmentationMonlica Wattana, Tipwalee Boonsri. 319-323 [doi]
- Offline touched cursive script segmentation based on pixel intensity analysis: Character segmentation based on pixel intensity analysisAmjad Rehman. 324-327 [doi]
- A content-constrained spatial (CCS) model for layout analysis of mathematical expressionsXing Wang, Jyh-Charn Liu. 334-339 [doi]
- Analysis based on Japanese accented English characteristics categories for objective evaluationHajime Tsubaki. 382-333 [doi]