Abstract is missing.
- The Human Face of MobileHajar Mousannif, Ismail Khalil. 1-20 [doi]
- Agent-Based Methods for Simulation of Epidemics with a Low Number of Infected PersonsFlorian Miksch, Philipp Pichler, Kurt Junshean Espinosa, Niki Popper. 21-28 [doi]
- Cellular Automata Model of Urbanization in Camiguin, PhilippinesMaria Isabel Beltran, Guido David. 29-35 [doi]
- A Flexible Agent-Based Framework for Infectious Disease ModelingFlorian Miksch, Christoph Urach, Patrick Einzinger, Günther Zauner. 36-45 [doi]
- Transformation of Digital Ecosystems: The Case of Digital PaymentsStefan Henningsson, Jonas Hedman. 46-55 [doi]
- Do Personality Traits Work as Moderator on the Intention to Purchase Mobile Applications Work? - A Pilot StudyCharnsak Srisawatsakul, Gerald Quirchmayr, Borworn Papasratorn. 56-65 [doi]
- Intelligent Method for Dipstick Urinalysis Using Smartphone CameraR. V. Hari Ginardi, Ahmad Saikhu, Riyanarto Sarno, Dwi Sunaryono, Ali Sofyan Kholimi, Ratna Nur Tiara Shanty. 66-77 [doi]
- Empirical and Computational Issues of Microclimate SimulationAida Maleki, Kristina Kiesel, Milena Vuckovic, Ardeshir Mahdavi. 78-85 [doi]
- A Distributed Generic Data Structure for Urban Level Building Data MonitoringStefan Glawischnig, Harald Hofstätter, Ardeshir Mahdavi. 86-95 [doi]
- Toward a Data-Driven Performance-Guided Urban Decision-Support EnvironmentNeda Ghiassi, Stefan Glawischnig, Ulrich Pont, Ardeshir Mahdavi. 96-107 [doi]
- Knowledge Management: Organization Culture in Healthcare IndonesiaDana Indra Sensuse, Yudho Giri Sucahyo, Siti Rohajawati, Haya Rizqi, Pinkie Anggia. 108-118 [doi]
- Semantic Versioning of In-Process Scientific DocumentImran Asif, M. Shuaib Karim. 119-128 [doi]
- Towards Semantic Mashup Tools for Big Data AnalysisHendrik, Amin Anjomshoaa, A Min Tjoa. 129-138 [doi]
- Acceptance and Use of Information System: E-Learning Based on Cloud Computing in VietnamThanh D. Nguyen, Dung T. Nguyen, Thi H. Cao. 139-149 [doi]
- Requirements Identification for Migrating eGovernment Applications to the CloudEvangelos Gongolidis, Christos Kalloniatis, Evangelia Kavakli. 150-158 [doi]
- A GPU-Based Enhanced Genetic Algorithm for Power-Aware Task Scheduling Problem in HPC CloudNguyen Quang-Hung, Le Thanh Tan, Chiem Thach Phat, Nam Thoai. 159-169 [doi]
- Ball Distance Estimation and Tracking System of Humanoid Soccer RobotWidodo Budiharto, Bayu Kanigoro, Viska Noviantri. 170-178 [doi]
- Image Clustering Using Multi-visual FeaturesBilih Priyogi, Nungki Selviandro, Zainal A. Hasibuan, Mubarik Ahmad. 179-189 [doi]
- A Robust Visual Object Tracking Approach on a Mobile DeviceAbdulmalik Danlami Mohammed, Tim Morris. 190-198 [doi]
- Self-generating Programs - Cascade of the BlocksJosef Kufner, Radek Marík. 199-212 [doi]
- State Machine Abstraction LayerJosef Kufner, Radek Marík. 213-227 [doi]
- Concern Based SaaS Application Architectural DesignAldo Suwandi, Inggriani Liem, Saiful Akbar. 228-237 [doi]
- Hybridization of Haar Wavelet Decomposition and Computational Intelligent Algorithms for the Estimation of Climate Change BehaviorHaruna Chiroma, Sameem Abdul Kareem, Adamu I. Abubakar, Eka Novita Sari, Tutut Herawan, Abdulsalam Ya'u Gital. 238-247 [doi]
- An Improved Ant Colony Matching by Using Discrete Curve EvolutionYounes Saadi, Eka Novita Sari, Tutut Herawan. 248-256 [doi]
- A Novel Approach to Gasoline Price Forecasting Based on Karhunen-Loève Transform and Network for Vector Quantization with Voronoid PolyhedralHaruna Chiroma, Sameem Abdul Kareem, Adamu I. Abubakar, Eka Novita Sari, Tutut Herawan. 257-266 [doi]
- Enhancing the Use of Digital Model with Team-Based Learning Approach in Science TeachingBens Pardamean, Teddy Suparyanto, Suyanta, Eryadi Masli, Jerome Donovan. 267-276 [doi]
- Improving Reusability of OER - Educational Patterns for Content SharingPeter Baumgartner. 277-285 [doi]
- Online Learning for Two Novel Latent Topic ModelsAli Shojaee Bakhtiari, Nizar Bouguila. 286-295 [doi]
- An Infinite Mixture Model of Generalized Inverted Dirichlet Distributions for High-Dimensional Positive Data ModelingNizar Bouguila, Mohamed Al Mashrgy. 296-305 [doi]
- On If-Then Multi Soft Sets-Based Decision MakingR. B. Fajriya Hakim, Eka Novita Sari, Tutut Herawan. 306-315 [doi]
- Predicting Size of Forest Fire Using Hybrid ModelGuruh Fajar Shidik, Khabib Mustofa. 316-327 [doi]
- Understanding eParticipation Services in Indonesian Local GovernmentFathul Wahid, Øystein Sæbø. 328-337 [doi]
- Document Tracking Technology to Support Indonesian Local E-GovernmentsWikan Sunindyo, Bayu Hendradjaya, G. A. Putri Saptawati, Tricya E. Widagdo. 338-347 [doi]
- Modern Framework for Distributed Healthcare Data Analytics Based on HadoopP. Vignesh Raja, E. Sivasankar. 348-355 [doi]
- A Bioinformatics Workflow for Genetic Association Studies of Traits in Indonesian RiceJames W. Baurley, Bens Pardamean, Anzaludin S. Perbangsa, Dwinita Utami, Habib Rijzaani, Dani Satyawan. 356-364 [doi]
- Fuzzy Logic Weight Estimation in Biometric-Enabled Co-authentication SystemsVan Nhan Nguyen, Vuong Quoc Nguyen, Minh Ngoc Binh Nguyen, Tran Khanh Dang. 365-374 [doi]
- A Real-Time Intrusion Detection and Protection System at System Call Level under the Assistance of a GridFang-Yie Leu, Yi-Ting Hsiao, Kangbin Yim, Ilsun You. 375-385 [doi]
- A Hybrid System for Reducing Memory and Time Overhead of Intrusion Detection SystemZhi-guo Chen, Sung-Ryul Kim. 386-395 [doi]
- LDFGB Algorithm for Anomaly Intrusion DetectionShang-nan Yin, Zhi-guo Chen, Sung-Ryul Kim. 396-404 [doi]
- Assets Dependencies Model in Information Security Risk ManagementJakub Breier, Frank Schindler. 405-412 [doi]
- Creation of Assurance Case Using Collaboration DiagramTakuya Saruwatari, Shuichiro Yamamoto. 413-418 [doi]
- Using Model Driven Security Approaches in Web Application DevelopmentChristoph Hochreiner, Zhendong Ma, Peter Kieseberg, Sebastian Schrittwieser, Edgar Weippl. 419-431 [doi]
- An Evaluation of Argument Patterns Based on Data FlowShuichiro Yamamoto. 432-437 [doi]
- A Design of Web Log Integration Framework Using NoSQLHuijin Jeong, Junho Choi, Chang Choi, Ilsun You, PanKoo Kim. 438-445 [doi]
- Motivation-Based Risk Analysis Process for IT SystemsAgata Niescieruk, Bogdan Ksiezopolski. 446-455 [doi]
- Formalizing Information Flow Control in a Model-Driven ApproachKurt Stenzel, Kuzman Katkalov, Marian Borek, Wolfgang Reif. 456-461 [doi]
- Security Assessment of Computer Networks Based on Attack Graphs and Security EventsIgor Kotenko, Elena Doynikova. 462-471 [doi]
- A Pipeline Optimization Model for QKD Post-processing SystemJianyi Zhou, Bo Liu, BaoKang Zhao, Bo Liu. 472-481 [doi]
- Aggregation of Network Protocol Data Near Its SourceMarcel Fourné, Kevin Stegemann, Dominique Petersen, Norbert Pohlmann. 482-491 [doi]
- The Mediating Role of Social Competition Identity Management Strategy in the Predictive Relationship between Susceptibility to Social Influence, Internet Privacy Concern, and Online Political EfficacyJuneman Abraham, Murty Magda Pane. 492-499 [doi]
- Formal Security Analysis and Performance Evaluation of the Linkable Anonymous Access ProtocolRima Addas, Ning Zhang. 500-510 [doi]
- On Safety of Pseudonym-Based Location Data in the Context of Constraint Satisfation ProblemsTomoya Tanjo, Kazuhiro Minami, Ken Mano, Hiroshi Maruyama. 511-520 [doi]
- Advanced Techniques for Computer Sharing and Management of Strategic DataMarek R. Ogiela, Lidia Ogiela, Urszula Ogiela. 521-525 [doi]
- On the Modelling of the Computer Security Impact on the Reputation SystemsBogdan Ksiezopolski, Adam Wierzbicki, Damian Rusinek. 526-531 [doi]
- Efficient Variant of Rainbow without Triangular Matrix RepresentationTakanori Yasuda, Tsuyoshi Takagi, Kouichi Sakurai. 532-541 [doi]
- Efficient Lattice HIBE in the Standard Model with Shorter Public ParametersKunwar Singh, C. Pandu Rangan, A. K. Banerjee. 542-553 [doi]
- Security Analysis of Public Key Encryptions Based on Conjugacy Search ProblemAkihiro Yamamura. 554-563 [doi]
- Cryptanalysis of Unidirectional Proxy Re-Encryption SchemeKunwar Singh, C. Pandu Rangan, A. K. Banerjee. 564-575 [doi]
- An Algorithm to Analyze Non-injective S-BoxesLeandro Marin, Ludo Tolhuizen. 576-585 [doi]
- Attribute-Based Fine-Grained Access Control with User RevocationJun Ye, Wujun Zhang, Shu-Lin Wu, Yuan-Yuan Gao, Jia-Tao Qiu. 586-595 [doi]
- A Full Privacy-Preserving Scheme for Location-Based ServicesFei Shao, Rong Cheng, Fangguo Zhang. 596-601 [doi]
- Implementation of Efficient Operations over GF(232) Using Graphics Processing UnitsSatoshi Tanaka, Takanori Yasuda, Kouichi Sakurai. 602-611 [doi]
- M-SRS: Secure and Trustworthy Mobile Service Review System Based on Mobile CloudletTao Jiang, Xiaofeng Chen 0001, Jin Li, Jianfeng Ma. 612-621 [doi]
- High-Quality Reversible Data Hiding Approach Based on Evaluating Multiple Prediction MethodsCheng-Hsing Yang, Kuan-Liang Liu, Chun-Hao Chang, Yi-Jhong Jhang. 622-632 [doi]
- Steganalysis to Data Hiding of VQ Watermarking Upon Grouping StrategyYa-Ting Chang, Min-Hao Wu, Shiuh-Jeng Wang. 633-642 [doi]
- Experimental Evaluation of an Algorithm for the Detection of Tampered JPEG ImagesGiuseppe Cattaneo, Gianluca Roscigno, Umberto Ferraro Petrillo. 643-652 [doi]
- A Semantic-Based Malware Detection System Design Based on ChannelsPeige Ren, Xiaofeng Wang, Chunqing Wu, BaoKang Zhao, Hao Sun. 653-662 [doi]
- An Efficient Semantic-Based Organization and Similarity Search Method for Internet Data ResourcesPeige Ren, Xiaofeng Wang, Hao Sun, BaoKang Zhao, Chunqing Wu. 663-673 [doi]
- Efficient DVFS to Prevent Hard Faults for Many-Core ArchitecturesZhiquan Lai, BaoKang Zhao, Jinshu Su. 674-679 [doi]
- Improving Availability through Energy-Saving Optimization in LEO Satellite NetworksZhu Tang, Chunqing Wu, Zhenqian Feng, BaoKang Zhao, Wanrong Yu. 680-689 [doi]
- An Effective Cloud-Based Active Defense System against Malicious CodesZhenyu Zhang, Wujun Zhang, Jianfeng Wang, Xiaofeng Chen. 690-695 [doi]