Abstract is missing.
- Integrating Retail and e-Commerce Using Web Analytics and Intelligent SensorsAnthony C. Boucouvalas, Constantine J. Aivalis, Kleanthis Gatziolis. 3-35 [doi]
- High Level Policies in SDNLibor Polcák, Leo Caldarola, Amine Choukir, Davide Cuda, Marco Dondero, Domenico Ficara, Barbora Franková, Martin Holkovic, Roberto Muccifora, Antonio Trifilo. 39-57 [doi]
- What a Difference a Year Makes: Long Term Evaluation of TLS Cipher Suite CompatibilityStefan Prinz, Silvie Schmidt, Manuel Koschuch, Alexander Glaser, Taro Fruhwirth, Matthias Hudler. 58-78 [doi]
- ARM: Architecture for Recruitment MatchmakingBruno Coelho, Fernando Costa, Gil M. Gonçalves. 81-99 [doi]
- Understanding Local mGovernment Applications: A Business Model Approach to the Case of BrusselsNils Walravens. 100-123 [doi]
- Understanding the Use of Location Sharing Services on Social Networking Platforms in ChinaShang Gao, Xuemei Zhang. 124-136 [doi]
- Large Scale Evaluation of an Adaptive E-Advertising User ModelAlaa A. Qaffas, Alexandra I. Cristea. 137-157 [doi]
- How Do the Multiple Tunable Receivers Per Node Affect the Efficiency of a WDM LAN? A Performance Analytical StudyPeristera A. Baziana. 161-176 [doi]
- A Scalable Honeynet Architecture for Industrial Control SystemsAlexandru Vlad Serbanescu, Sebastian Obermeier, Der-Yeuan Yu. 179-200 [doi]
- Evaluating Op-Code Frequency Histograms in Malware and Third-Party Mobile ApplicationsGerardo Canfora, Francesco Mercaldo, Corrado Aaron Visaggio. 201-222 [doi]
- Automated Verification of e-Cash ProtocolsJannik Dreier, Ali Kassem 0001, Pascal Lafourcade 0001. 223-244 [doi]
- Theoretical Foundation for Code Obfuscation Security: A Kolmogorov Complexity ApproachRabih Mohsen, Alexandre Miranda Pinto. 245-269 [doi]
- The Entity Labeling Pattern for Modeling Operating Systems Access ControlPeter Amthor. 270-292 [doi]
- Execution Path Classification for Vulnerability Analysis and DetectionGeorge Stergiopoulos, Panagiotis Katsaros, Dimitris Gritzalis. 293-317 [doi]
- A Privacy-Sensitive Collaborative Approach to Business Process DevelopmentHassaan Irshad, Basit Shafiq, Jaideep Vaidya, Muhammad Ahmed Bashir, Hafiz Salman Asif, Sameera Ghayyur, Shafay Shamail, Nabil R. Adam. 318-342 [doi]
- Using OWL Reasoning for Evaluating XACML PoliciesFabio Marfia, Mario Arrigoni Neri, Filippo Pellegrini, Marco Colombetti. 343-363 [doi]
- Partial Key Exposure Attacks on RSA with Exponent BlindingStelvio Cimato, Silvia Mella, Ruggero Susella. 364-385 [doi]
- A Generalized Authentication Scheme for Mobile Phones Using Gait SignalsHuan Nguyen, Huy H. Nguyen, Thang Hoang, Deokjai Choi, Thuc Dinh Nguyen. 386-407 [doi]
- Signal Modelling for the Digital Reconstruction of Gramophone NoiseChristoph F. Stallmann, Andries P. Engelbrecht. 411-432 [doi]
- Beat Analysis of Dimensionality Reduced Perspective Streams from Electrocardiogram Signal DataAvi Bleiweiss. 433-453 [doi]
- Traffic Signs Detection Using Tracking with PredictionPavel Yakimov. 454-467 [doi]
- A Passive Acoustic Technique to Enhance Lung Diseases DiagnosticFatma Ayari, Ali T. Alouani, Mekki Ksouri. 468-489 [doi]
- Vessel Segmentation for Noisy CT Data with Quality Measure Based on Single-Point Contrast-to-Noise RatioArtem Nikonorov, A. Kolsanov, Maksim Petrov, Yuriy Yuzifovich, E. Prilepin, S. Chaplygin, P. Zelter, K. Bychenkov. 490-507 [doi]
- Scheduling Strategies to Improve Reliability and Fairness for Priority Based Smart Rural Contention Based Applications Over Low-Cost Wireless Mesh Backbone NetworksSajid M. Sheikh, Riaan Wolhuter, Herman A. Engelbrecht. 511-532 [doi]