Abstract is missing.
- Service Discovery Protocols for VANET Based Emergency Preparedness Class of Applications: A Necessity Public Safety and SecurityRichard Werner Nelem Pazzi, Kaouther Abrougui, Cristiano De Rezende, Azzedine Boukerche. 1-7 [doi]
- High-End Analytics and Data Mining for Sustainable Competitive AdvantageAlok N. Choudhary, Ramanathan Narayanan, Kunpeng Zhang. 8-15 [doi]
- Resource Allocation for Energy Efficient Large-Scale Distributed SystemsYoung Choon Lee, Albert Y. Zomaya. 16-19 [doi]
- Social Cognitive Theory in IS Research - Literature Review, Criticism, and Research AgendaKévin D. Carillo. 20-31 [doi]
- Knowledge Intensive Business Processes: A Process-Technology Fit PerspectiveUday Kulkarni, Minu Ipe. 32-43 [doi]
- A Web Service Similarity Refinement Framework Using Automata ComparisonLu Chen, Randy Chow. 44-55 [doi]
- A System for Analyzing Advance Bot BehaviorJooHyung Oh, Chaetae Im, HyunCheol Jeong. 56-63 [doi]
- Two Approaches to Handling Proactivity in Pervasive SystemsElizabeth Papadopoulou, Yussuf Abu-Shaaban, Sarah Gallacher, Nick K. Taylor, M. Howard Williams. 64-75 [doi]
- A Spatio-Temporal Role-Based Access Control Model for Wireless LAN Security Policy ManagementPadmalochan Bera, Soumya Kanti Ghosh, Pallab Dasgupta. 76-88 [doi]
- Proposing Candidate Views for MaterializationT. V. Vijay Kumar, Mohammad Haider, Santosh Kumar. 89-98 [doi]
- A Fuzzy Reasoning Framework for Resolving Spatial Queries through Service Driven Integration of Heterogeneous Geospatial InformationIndira Mukherjee, S. K. Ghosh. 99-110 [doi]
- Dynamic Web Service Composition Based on Operation Flow SemanticsDemian Antony D'Mello, V. S. Ananthanarayana. 111-122 [doi]
- Distributed Scheduling of a Network of Adjustable Range Sensors for Coverage ProblemsAkshaye Dhawan, Aung Aung, Sushil K. Prasad. 123-132 [doi]
- ECC Based SigncryptionAtanu Basu, Indranil Sengupta. 133-144 [doi]
- Model-Based Software Reliability PredictionG. Sri Krishna, Rajib Mall. 145-155 [doi]
- Real-Time Power-Aware Routing Protocol for Wireless Sensor NetworkOmar Al-Jarrah, Ayad Salhieh, Aziz Qaroush. 156-166 [doi]
- Document Clustering with Semantic Features and Fuzzy AssociationSun Park, Dong Un An, ByungRea Cha, Chul-Won Kim. 167-175 [doi]
- Supporting Video Streaming over WiMAX Networks by Enhanced FMIPv6-Based HandoverPhuong-Quyen Huynh, Pat Jangyodsuk, Melody Moh. 176-186 [doi]
- Two Risk-Aware Resource Brokering Strategies in Grid Computing: Broker-Driven vs. User-Driven MethodsJunseok Hwang, Jihyoun Park, Jörn Altmann. 187-197 [doi]
- A Socio-Technical Perspective on Computer Mediated Communication: Comparison of Government and Non Government Sectors in IndiaPayal Mehra. 198-209 [doi]
- Can You Judge a Man by His Friends? - Enhancing Spammer Detection on the Twitter Microblogging Platform Using Friends and FollowersTeng-Sheng Moh, Alexander J. Murmann. 210-220 [doi]
- Encouraging Cooperation in Ad-Hoc Mobile-Phone Mesh Networks for Rural ConnectivityKavitha Ranganathan, Vikramaditya Shekhar. 221-231 [doi]
- Fuzzontology: Resolving Information Mining Ambiguity in Economic Intelligent ProcessOlufade F. W. Onifade, Odile Thiery, Adenike O. Osofisan, Gérald Duffing. 232-243 [doi]
- Personalizing Web Recommendations Using Web Usage Mining and Web Semantics with Time AttributeTeng-Sheng Moh, Neha Sushil Saxena. 244-254 [doi]
- Towards Analyzing Data Security Risks in Cloud Computing EnvironmentsAmit Sangroya, Saurabh Kumar, Jaideep Dhok, Vasudeva Varma. 255-265 [doi]
- Time-Sequential Emotion Diagnosis Based on the Eye Movement of the User in Support of Web-Based e-LearningKiyoshi Nosu, Takeshi Koike, Ayuko Shigeta. 266-274 [doi]
- Critical Success Factors in Managing Virtual TeamsGanesh Vaidyanathan, Carmen Debrot. 275-281 [doi]
- 3D Reconstruction and Camera Pose from Video Sequence Using Multi-dimensional DescentVarin Chouvatut, Suthep Madarasmi, Mihran Tuceryan. 282-292 [doi]
- Adapting Content Presentation for Mobile Web BrowsingBoonlit Adipat, Dongsong Zhang, Lina Zhou. 293-303 [doi]
- Application of Decision Tree Technique to Analyze Construction Project DataVijaya S. Desai, Sharad Joshi. 304-313 [doi]
- Effects of Initial Search Bound on the Performance of Self-adaptive Evolutionary Computation MethodsAnjan Kumar Swain. 314-324 [doi]
- A Computational Study of Margining Portfolios of Options by Two ApproachesEdward G. Coffman Jr., Dmytro Matsypura, Vadim G. Timkovsky. 325-332 [doi]
- Improved Substitution-Diffusion Based Image Cipher Using Chaotic Standard MapAnil Kumar, M. K. Ghose. 333-338 [doi]
- Linear Multivariable System Reduction Using Particle Swarm Optimization and A Comparative Study Using Relative Integral Square ErrorGirish Parmar, Mahendra K. Pandey, Vijay Kumar. 339-347 [doi]
- An Anomaly Based Approach for Intrusion Detection by Authorized Users in Database SystemsBharat Gupta, Deepak Arora, Vishal Jha. 348-356 [doi]
- Towards a Knowledge Management Portal for a Local CommunityMarcelo López, Gustavo A. Isaza, Luis Joyanes. 357-362 [doi]
- Fusion of Speech and Face by Enhanced Modular Neural NetworkRahul Kala, Harsh Vazirani, Anupam Shukla, Ritu Tiwari. 363-372 [doi]
- Mining Rare Events Data by Sampling and Boosting: A Case StudyS. Tom Au, Meei-Ling Ivy Chin, Guangqin Ma. 373-379 [doi]
- Model-Based Regression Test Case PrioritizationChhabi Rani Panigrahi, Rajib Mall. 380-385 [doi]
- Software Process Improvement through Experience Management: An Empirical Analysis of Critical Success FactorsNeeraj Sharma, Kawaljeet Singh, D. P. Goyal. 386-391 [doi]
- A Comparative Feature Selection Approach for the Prediction of Healthcare CoveragePrerna Sethi, Mohit Jain. 392-403 [doi]
- A Grid-Based Scalable Classifier for High Dimensional DatasetsSheetal Saini, Sumeet Dua. 404-415 [doi]