Abstract is missing.
- Analysis of social learning network for wiki in moodle E-LearningAndi Besse Firdausiah Mansur, Norazah Yusof, Mohd Shahizan Othman. 1-4 [doi]
- A study of ICT literacy in Arts and Science studentsKelvin C. K. Wong, William Kwok-Wai Cheung. 5-7 [doi]
- Yet another dimension of organizational culture: Implications from mobile social games in JapanToshihiko Yamakami. 8-12 [doi]
- A three-dimensional view model of international standardization using techno-sociological analysisToshihiko Yamakami. 13-18 [doi]
- Conversion of urdu nastaliq to roman urdu using OCRFaiza Iqbal, Aisha Latif, Nazia Kanwal, Tayyaba Altaf. 19-22 [doi]
- Optimized WSN for ECG monitoring in ubiquitous healthcare systemGohel Bakul, Dhananjay Singh, Daeyeoul Kim. 23-26 [doi]
- Performance of generalized statistical smoothing to inverse halftoning due to human vision systemYohei Saika, Ken Okamoto. 27-30 [doi]
- Exploring the cultural travel image by content analysis: The case of Tamsui districtY. R. Li, W. C. Tsai, L.-H. Wang, M. T. Wu. 31-34 [doi]
- Designing digital signage for better wayfinding performance: New visitors' navigating campus of universitySungyeon Kim, Eunil Park, Sean Hong, Yoonhee Cho, Angel P. Del Pobil. 35-40 [doi]
- System design and implementation of social interactive robot NancyShuzhi Sam Ge, Chun Fui Liew, Yanan Li. 41-46 [doi]
- Extending the unified theory of acceptance and use of technology (UTAUT) modelJayantha Rajapakse. 47-52 [doi]
- Persuasion for social dilemma: An application to motivate sustainable behavior using social effectsHiroaki Kimura, Tatsuo Nakajima. 53-58 [doi]
- Transmission scheme of important monitoring data in wireless bulky sensor networksJungmuk Kang, Yanli Qian, Jookyoung Kim, Joonki Min, Youngmi Kwon. 59-62 [doi]
- Federated network resource information management on Future InternetDongkyun Kim, Joo-Beom Kim, Gi Sung Yoo, Min-Ki Noh, Won-Hyeak Lee. 63-66 [doi]
- IT strategic alignment maturity and IT governanceS. Hosseinbeig, D. Karimzadgan-Moghadam, D. Vahdat, R. Askari Moghadam. 67-72 [doi]
- A fast algorithm for decoding algebraic geometry codes with the displacement rankXiaohui Fu, Lin You. 73-76 [doi]
- Statistical mechanical iterative method for inverse halftoning using multiple halftone imagesYohei Saika, Toshizumi Aoki. 77-82 [doi]
- Control method of multiple services for CMP based on continuation modelHideaki Moriyama, Toshihiro Yamauchi, Hideo Taniguchi. 83-89 [doi]
- Weighted graph model based sentence clustering and ranking for document summarizationShuzhi Sam Ge, Zhengchen Zhang, Hongsheng He. 90-95 [doi]
- Digital talking book contents of beading handicraft design diagram for visually impaired personsMakoto J. Hirayama. 96-101 [doi]
- Automation of test case generation from textual use casesMingyue Jiang, Zuohua Ding. 102-107 [doi]
- The analysis of the Chinese scholars' cognition of different academic review methodsYaqi Liu. 108-111 [doi]
- Fast ensemble empirical mode decomposition for speech-like signal analysis using shaped noise additionChingShun Lin, Jyng Siang Wang, Zong Chao Cheng. 112-117 [doi]
- Performance evaluation of intelligent prediction models on the popularity of motion picturesChang-Joo Yun. 118-123 [doi]
- Exploring the evolutional roadmapping of technological trajectory: Case study of ShimanoY. R. Li, L.-H. Wang. 124-128 [doi]
- A multi-tiered model approach for monitoring and control of data center entrance and exit scenariosS. Janosepah, N. Modiri, Mohammad V. Malakooti, A. Pahlavan Tafti. 129-135 [doi]
- Recognizing the formation of trend: A standard deviation approachK. H. Sim. 136-141 [doi]
- Implementation of terminal location tracking service for saving energy based on the smart TVKwihoon Kim, Ohyung Kwon, Chunghyun Ahn, JunKyun Choi. 142-145 [doi]
- Dispatching of container trucks using genetic algorithmH. R. Choi, B. K. Park, J. W. Lee, C. H. Park. 146-151 [doi]
- A robust implement of Tabu search based video object trackingZhenbo Jiang, Shangbo Zhou, Jialing Yao. 152-157 [doi]
- Understanding organizational information security usage from the risky decision-making perspectivesArthur Jung-Ting Chang. 158-164 [doi]
- Spatial hyperlink for making places for dwellingShen-Guan Shih, Wan-Ying Lai, Ming-Chang Wu, Shi-Yen Wu. 165-168 [doi]
- A study on the selection of operating parameters to monitor steam turbine generator in a Korea Standard Type Nuclear Power PlantI. K. Choi, J. A. Kim, J. H. Woo, S. H. Byun, K. H. Yang. 169-172 [doi]
- The development of primary air control algorithm in 500MW class coal-fired power plantGeon-Pyo Lim, Jong-Ahn Kim, In Kyu Choi, Kwang-Myung Yu, Heung-Ho Lee. 173-176 [doi]
- High-speed packet transmission mechanism using source switching label informationHyun Jong Kim, Jae Chan Shim, Hwa-Suk Kim, Kee-Seong Cho, Seong Gon Choi. 177-180 [doi]
- Focusing on the importance and the role of requirement engineeringMina Attarha, Nasser Modiri. 181-184 [doi]
- Does length matter? A study examining how length of stylus pen helps effective electronic documentationEunil Park, Ki Joon Kim, Angel P. Del Pobil. 185-188 [doi]
- Design of remote control system for data protection and backup in mobile devicesInwhee Joe, Yoonsang Lee. 189-193 [doi]
- A comparative study on packet by network design in in-shipMi-Jin Kim, Jong-Wook Jang. 194-199 [doi]
- System architecture for work load management of postal delivery operationJeong-Hyun Park, Jong-heung Park. 200-204 [doi]
- Are the factors affecting the quality of IS projects identical in large corporations and manufacturing SMEs?Soongoo Hong, Jong-Weon Kim, Narang Kim. 205-209 [doi]