Abstract is missing.
- Comparison of System Dynamics and BPM for Software Process SimulationJan Kozuszník, Svatopluk Stolfa, David Jezek, Stepán Kuchár. 1-15 [doi]
- Knowledge Based Approach to Software Development Process ModelingJan Kozuszník, Svatopluk Stolfa. 16-28 [doi]
- Capturing Supermarket Shopper Behavior Using SmartBasketUfuk Celikkan, Gizem Somun, Ulas Kutuk, Irem Gamzeli, Elif Dicle Cinar, Irem Atici. 44-53 [doi]
- An Approach for Securing and Validating Business Processes Based on a Defined Enterprise Security Ontology CriteriaAhmed A. Hussein, Ahmed Ghoneim, Reiner R. Dumke. 54-66 [doi]
- A Dynamic Reconfigurable-Based Approach for Connectivity Mismatches of Web ServicesSamir Elmougy, Ahmed Ghoneim. 67-81 [doi]
- Reducing Alphabet Using Genetic AlgorithmsJan Platos, Pavel Krömer. 82-92 [doi]
- On the Quality of Service Optimization for WiMAX Networks Using Multi-hop Relay StationsChutima Prommak, Chitapong Wechtaisong. 93-106 [doi]
- An Application of Game Theory for the Selection of Traffic Routing Method in Interconnected NGNAleksandra Kostic-Ljubisavljevic, Vesna Radonjic, Snezana Mladenovic, Vladanka S. Acimovic-Raspopovic. 107-122 [doi]
- Unpredictable Random Number Generator Based on Hardware Performance CountersAlin Suciu, Sebastian Banescu, Kinga Marton. 123-137 [doi]
- 3-D versus 2-D Animation in Multimedia Application: Is the Extra Effort Worth It?Riaza Mohd Rias, Halimah Badioze Zaman. 147-154 [doi]
- Multi-path Construction for Bypassing Holes in Wireless Sensor NetworksSheng-Tzong Cheng, Jiashing Shih. 155-166 [doi]
- On the Usability of Vehicle-to-Roadside Communications Using IEEE 802.11b/g Unplanned Wireless NetworksMartin Milata, Michal Krumnikl, Pavel Moravec 0001. 167-177 [doi]
- A Comparative Study of Aspect-Oriented and Object-Oriented Implementations: Pervasive System Use CaseAbdelkrim Benamar, Noureddine Belkhatir, Fethi Tarik Bendimerad. 178-192 [doi]
- Review of Power Quality Disturbances Classification Using Variable Size Detector (V-Detector)Kamarulazhar Daud, Noraliza Hamzah, Saiful Zaimy Yahaya, Mohd Affandi Shafie, Harapajan Singh Nagindar Singh. 193-198 [doi]
- Classifying Sleep Disturbance Using Sleep Stage 2 and Wavelet-Based FeaturesSang-Hong Lee, Joon S. Lim. 199-206 [doi]
- Automated Text Summarization: Sentence Refinement ApproachShaidah Jusoh, Abdulsalam M. Masoud, Hejab M. Alfawareh. 207-218 [doi]
- Software-Defined Radio for Versatile Low-Power Wireless Sensor SystemsSándor Szilvási, Benjámin Babják, Ákos Lédeczi, Péter Völgyesi. 219-232 [doi]
- Implementing Independent Component Analysis in General-Purpose GPU ArchitecturesJacquelyne Forgette, Renata Wachowiak-Smolíkova, Mark P. Wachowiak. 233-243 [doi]
- Two-Dimensional Signal Adaptive Processing for Airborne RadarSamira Dib, Mourad Barkat, Jean-Marie Nicolas 0002, Morad Grimes. 244-257 [doi]
- Towards Improving the Functioning of CloudSim SimulatorGhalem Belalem, Said Limam. 258-267 [doi]
- Towards New Data Access Control Technique Based on Multi Agent System Architecture for Cloud ComputingAmir Mohamed Talib, Rodziah Binti Atan, Rusli Abdullah, Masrah Azrifah Azmi Murad. 268-279 [doi]
- Environment Sound Recognition for Digital Audio Forensics Using Linear Predictive Coding FeaturesMubarak Obaid AlQahtani, Abdulaziz S. Al mazyad. 301-309 [doi]
- Improving Code-Based Steganography with Linear Error-Block CodesRabiî Dariti, El Mamoun Souidi. 310-321 [doi]
- Vibration of Composite Plate - Mathematical Modelling and Experimental Verification by ESPIDavid Seidl, Pavol Kostial, Zora Jancíková, Sona Rusnáková. 322-328 [doi]
- Analysis of M-QAM Data Communication System Using 3D Eye DiagramMohamed Al Wohaishi, Radek Martinek, Jan Zidek. 337-348 [doi]
- Mobile Phone Positioning in GSM Networks Based on Information Retrieval Methods and Data StructuresTomás Novosad, Jan Martinovic, Peter Scherer, Václav Snásel, Roman Sebesta, Petr Klement. 349-363 [doi]
- The Framework of e-Forensics in the Republic of CroatiaVladimir Remenar, Dragan Perakovic, Goran Zovak. 364-372 [doi]
- Knowledge Based Data Cleaning for Data Warehouse QualityLouardi Bradji, Mahmoud Boufaïda. 373-384 [doi]
- Using Uppaal for Verification of Priority Assignment in Real-Time DatabasesMartin Kot. 385-399 [doi]
- User Modeling to Build Mobile Advertising AlgorithmMohammed Abdel Razek, Claude Frasson. 400-410 [doi]
- Use of Multi-level State Diagrams for Robot Cooperation in an Indoor EnvironmentBogdan D. Czejdo, Sambit Bhattacharya, Mikolaj Baszun. 411-425 [doi]
- VANET Security Framework for Safety Applications Using Trusted HardwareAsif Ali Wagan, Bilal Munir Mughal, Halabi Hasbullah. 426-439 [doi]
- Technology Resources and E-Commerce Impact on Business PerformanceMuhammad Jehangir, P. D. D. Dominic, Alan Giffin Downe, Naseebullah. 440-447 [doi]
- A Mitigation Approach to the Privacy and Malware Threats of Social Network ServicesSeyed Hossein Mohtasebi, Ali Dehghantanha. 448-459 [doi]
- Cooperative Multiagents Detection and Beamforming with Spherical Array SensorsBelkacem Benadda, Fethi Tarik Bendimerad. 460-469 [doi]
- New Method: Mapping of 802.11e into MPLS Domains, Conception and ExperimentationJawad Oubaha, Adel Echchaachoui, Ali Ouacha, Mohammed Elkoutbi. 470-483 [doi]
- Reusability Assessment of Task Knowledge Patterns through MetricsCheah Wai Shiang, Edwin Mit. 484-496 [doi]
- Personal Recognition Using Multi-angles Gait SequencesConnie Tee, Michael Goh Kah Ong, Andrew Beng Jin Teoh. 497-508 [doi]
- Performance Comparison of Direction-of-Arrival Estimation Algorithms for Towed Array Sonar SystemHamza Qayyum, Muhammad Ashraf. 509-517 [doi]
- Platform for Dynamic Adaptation of Learning Content for Pervasive Learning EnvironmentsAmal Elhamdaoui, Mounia Abik, Rachida Ajhoun. 518-529 [doi]
- A General Description of a New Character Recognition Process Based on OntologyHacene Belhadef, Aicha Eutamene, Mohamed-Khireddine Kholadi. 538-546 [doi]