Abstract is missing.
- Design Simulation of Top ITO Gratings to Improve Light Transmission for Gallium Nitride LEDsXiaomin Jin, Simeon Trieu, Fei Wang, Bei Zhang, Tao Dai, Xiangning Kang, Guoyi Zhang. 1-4 [doi]
- Non-volatile Memory Devices Based on Chalcogenide MaterialsFei Wang, Xiaolong Wu. 5-9 [doi]
- Dedicated Hardware for Ant Colony Optimization Using Distributed MemoryMasaya Yoshikawa, Hidekazu Terai. 10-15 [doi]
- A Novel Approach to Scan Detection on the BackboneYu Zhang, Binxing Fang. 16-21 [doi]
- A Remote Sensing Image Segmentation Method Based on Spectral and Texture Information FusionXing Xie, Mengliang Liu, Leiguang Wang, Qianqin Qin. 22-27 [doi]
- A Novel Biological Recognition Method Based on Cranio-maxillo-facial Feature InformationLiwen Huang, Jing Yang, Xiaolong Wu, Xiaoqian Hu. 28-32 [doi]
- Classification of Quaternary [21s + 4, 3] Optimal Self-orthogonal CodesXuejun Zhao, Ruihu Li, Yingjie Lei. 33-34 [doi]
- Low Power Ambient Energy Harvesting, Conversion, and Storage CircuitsFaruk Yildiz. 35-40 [doi]
- Dynamic Single-Row Routing Technique for Channel AssignmentsShaharuddin Salleh, Nor Haniza Sarmin. 41-46 [doi]
- A Novel Flash Fast-Locking Digital Phase-Locked LoopMahmoud Fawzy Wagdy, Brandon Casey Cabrales. 47-52 [doi]
- A DPA-Resistant Digit-Parallel Modular Multiplier over GF (2m)Jianping Quan, Guoqiang Bai. 53-57 [doi]
- A New Method to Reduce the Side-Channel Leakage Caused by Unbalanced Capacitances of Differential Interconnections in Dual-Rail Logic StylesJianping Quan, Guoqiang Bai. 58-63 [doi]
- Computational Modeling of Cell Survival/Death Using MATLAB SimulatorShruti Jain, Pradeep K. Naik, D. S. Chauhan, Rohit Sharma. 64-68 [doi]
- A Novel EKF-GPS Algorithm for Bridge Deformation Monitoring SystemJing Yang, Yongquan Wang, Min He, Fei Wang, Xiaolong Wu. 79-83 [doi]
- Implementation of Different Function Units Using Flexible and Reconfigurable ArchitectureChao-Jang Hwang, Chih-Tung Lin, Shi-Jinn Horng. 84-89 [doi]
- A High-Performance Architecture of an XML Processor for SIP-Based PresenceFadi El-Hassan, Raymond Peterkin, Mohamed Abou-Gabal, Dan Ionescu. 90-95 [doi]
- Processor Allocation Problem for NoC-Based Chip MultiprocessorsDawid Zydek, Henry Selvaraj. 96-101 [doi]
- A Novel DDFS Based on Trigonometric Approximation with a Scaling BlockFarhad Babak, Parviz Keshavarzi. 102-106 [doi]
- The Two-Level-Turn-Model Fault-Tolerant Routing Scheme in Tori with Convex and Concave FaultsLingfu Xie, Du Xu. 107-113 [doi]
- Generating Rule-Based Executable Process Models for Service OutsourcingJae-Yoon Jung. 114-118 [doi]
- Integrating Amazonic Heterogeneous Hydrometeorological DatabasesGlaucia Braga e Silva, Breno Lisi Romano, Henrique Fernandes de Campos, Ricardo Godoi Vieira, Adilson Marques da Cunha, Luiz Alberto Vieira Dias. 119-124 [doi]
- Lessons Learned from a Survey of Web Applications TestingBen W. Y. Kam, Thomas R. Dean. 125-130 [doi]
- Formalizing the Management Automation with Workflow of Software Development Process Based on the SPEM Activities ViewDaniel Riesco, German Montejano, Narayan C. Debnath, Manuel Pérez Cota. 131-136 [doi]
- Software Projects Finance Support: Preliminary Talks between Software Project Managers and Potential InvestorsRobert Uzal, Narayan C. Debnath, Daniel Riesco, German Montejano. 137-142 [doi]
- An Information Retrieval Model for the Semantic WebFabio Augusto de Santana Silva, Maria del Rosario Girardi, Lucas Rego Drumond. 143-148 [doi]
- A New Algorithm for Frequent Itemset Generation in Non-Binary Search SpaceG. Praveen Kumar, Anirban Sarkar, Narayan C. Debnath. 149-153 [doi]
- A Further Improvement on a Genetic AlgorithmIan Stewart, Wenying Feng, Selim G. Akl. 154-159 [doi]
- Google Scholar s Ranking Algorithm: The Impact of Articles Age (An Empirical Study)Jöran Beel, Bela Gipp. 160-164 [doi]
- A Novel Method Combining ORESTE, Fuzzy Set Theory, and TOPSIS Method for Ranking the Information and Communication Technology Research Centers of IranMehdi Fasanghari, Maryam MohamedPour, Mohammad Amin Mohamedpour. 165-170 [doi]
- Comparison of QOS Fixed and Limited Interleaved Polling with Cyclic Demand Proportionality AlgorithmsSadeta Krijestorac, Jonathan Bagby. 171-176 [doi]
- Improving Job Scheduling in GRID Environments with Use of Simple Machine Learning MethodsDaniel Vladusic, Ales Cernivec, Bostjan Slivnik. 177-182 [doi]
- Tabu Search for Parallel Machine Scheduling with Job SplittingCenk Çelik, Inci Sariçiçek. 183-188 [doi]
- Scheduling Algorithm for On-Demand Bus SystemKota Tsubouchi, Kazuo Hiekata, Hiroyuki Yamato. 189-194 [doi]
- The Explore of the Law Role in Software Requirements EngineeringXinhao Ji. 195-198 [doi]
- Clustering and Metrics Thresholds Based Software Fault Prediction of Unlabeled Program ModulesCagatay Catal, Ugur Sevim, Banu Diri. 199-204 [doi]
- Managing Post-Development Fault RemovalSuzanna Schmeelk, Bill Mills, Robert E. Noonan. 205-210 [doi]
- TransCPN - Software Tool for Transformation of Colored Petri NetsBoleslaw Mikolajczak, Abhishek Singh. 211-216 [doi]
- Two New Algorithms for Software Watermarking by Register Allocation and their Empirical EvaluationHakun Lee, Keiichi Kaneko. 217-222 [doi]
- An Aspect-Based Approach to Checking Design Constraints at Run-TimeYoonsik Cheon, Carmen Avila, Steve Roach, Cuauhtemoc Munoz, Neith Estrada, Valeria Fierro, Jessica Romo. 223-228 [doi]
- Evaluating Test-Driven Development in an Industry-Sponsored Capstone ProjectJohn Huan Vu, Niklas Frojd, Clay Shenkel-Therolf, David S. Janzen. 229-234 [doi]
- Security Vulnerabilities and Mitigation Strategies for Application DevelopmentBrunil Dalila Romero Marino, Hisham M. Haddad. 235-240 [doi]
- An Agent-Oriented Source-Level Debugger on Top of a Monitoring FrameworkZiad Al-Sharif, Clinton Jeffery. 241-247 [doi]
- Component-Based Software Architecture Design for Network Intrusion Detection and Prevention SystemJianchao Han, Mohsen Beheshti, Kazimierz Kowalski, Joel Ortiz, Johnly Tomelden. 248-253 [doi]
- Security Estimation Framework: Design Phase PerspectiveShalini Chandra, Raees Ahmad Khan, Alka Agrawal. 254-259 [doi]
- Software Engineering Challenges in Game DevelopmentChristopher M. Kanode, Hisham M. Haddad. 260-265 [doi]
- A Comparison between Relational and Operational QVT MappingsPavle Guduric, Arno Puder, Rainer Todtenhoefer. 266-271 [doi]
- Early Studies in Acquiring Evidentiary, Reusable Business Process Models for Legal ComplianceTravis D. Breaux, Calvin Powers. 272-277 [doi]
- Citation Analysis: An Approach for Facilitating the Understanding and the Analysis of Regulatory Compliance DocumentsAbdelwahab Hamou-Lhadj, Mohammad Hamdaqa. 278-283 [doi]
- An Eclipse Plugin for the Automated Reverse-Engineering of Software ProgramsPhilippe Dugerdil, David Kony, Javier Belmonte. 284-289 [doi]
- A Method for Service Oriented DesignSedighe Moosavi, Mir Ali Seyyedi, Nasrollah Moghadam. 290-295 [doi]
- Highly-Available Web Service CommunitySattanathan Subramanian. 296-301 [doi]
- Towards a Goal-Based Service Framework for Dynamic Service Discovery and CompositionLuiz Olavo Bonino da Silva Santos, Eduardo Goncalves da Silva, Luís Ferreira Pires, Marten van Sinderen. 302-307 [doi]
- Healthcare Applications Interoperability through Implementation of HL7 Web Service Basic ProfileMaqbool Hussain, Muhammad Afzal, Hafiz Farooq Ahmad, Naeem Khalid, Arshad Ali. 308-313 [doi]
- An Analysis of Business Models of Web 2.0 ApplicationShari S. C. Shang, Ya-Ling Wu, Oliver C. L. Hou. 314-319 [doi]
- A Secure Billing Protocol for Grid ComputingChia-Hui Wei, Yeo-Hao Chin, Chun-Ta Li. 320-325 [doi]
- A Heuristic Model of Network-Based Group Decision Making for E-ServicesWei-Lun Chang, Yi-Ping Lo, Yu-Ting Hong. 326-331 [doi]
- Cross-Organizational Service Evolution ManagementOdorico von Susani, Philippe Dugerdil. 332-337 [doi]
- Obstacle Avoidance for Utility-Based GeocastingFernando J. Maymi, Manuel Rodriguez-Martinez. 338-343 [doi]
- Leveraging Parent Mitigations and Threats for CAPEC-Driven HierarchiesPatrick Henry Engebretson, Joshua J. Pauli. 344-349 [doi]
- A Multi-Signature Scheme Based on Two Difficult Mathematics ProblemsBin Sun, Wang Chuan, Jiang Li, Legand L. Burge III. 350-355 [doi]
- The Design of Boolean Functions by Modified Hill Climbing MethodYuriy I. Izbenko, Vladyslav Kovtun, Alexandr Kuznetsov. 356-361 [doi]
- Construction of Anti-Collusion Codes Based on Cover-Free FamiliesQiaoliang Li, Xiaoming Wang, Yingshu Li, Yi Pan, Pingzhi Fan. 362-365 [doi]
- A Robust Audio Aggregate Zero-Watermark AlgorithmYiqun Xiong, Rangding Wang. 366-370 [doi]
- Attacks on a Block Based SVD Watermarking SchemeHuo-Chong Ling, Swee-Huay Heng, Bok-Min Goi. 371-375 [doi]
- A New Steganography Scheme Based on an Index-Color ImageSe-Min Kim, Zi-Qiang Cheng, Kee-Young Yoo. 376-381 [doi]
- A Peer-to-Peer Federated Authentication SystemMyong H. Kang, Amitabh Khashnobish. 382-387 [doi]
- A Novel Method-Based Software Watermarking SchemeJianqi Zhu, Yanheng Liu, Ke Yin, KeXin Yin. 388-392 [doi]
- Automated Risk and Utility ManagementAndreas Ekelhart, Thomas Neubauer, Stefan Fenz. 393-398 [doi]
- An Authentication System Based on PalmprintMadasu Hanmandlu, H. M. Gupta, Neha Mittal, Shantaram Vasikarla. 399-404 [doi]
- An Anti-Phishing Approach that Uses Training Intervention for Phishing Websites DetectionAbdullah Alnajim, Malcolm Munro. 405-410 [doi]
- Evaluation of Two Privacy-Preserving Protocols for the DNSSergio Castillo-Perez, Joaquín García-Alfaro. 411-416 [doi]
- Efficient Short Signatures from PairingRaylin Tso, Takeshi Okamoto, Eiji Okamoto. 417-422 [doi]
- Security in Wireless Mesh Networks: Challenges and SolutionsPing Yi, Tianhao Tong, Ning Liu, Yue Wu, Jianqing Ma. 423-428 [doi]
- T-PIM: Trusted Password Input Method against Data Stealing MalwareManabu Hirano, Tomohiro Umeda, Takeshi Okuda, Eiji Kawai, Suguru Yamaguchi. 429-434 [doi]
- Federated Authentication Mechanism using Cellular Phone - Collaboration with OpenIDRyu Watanabe, Toshiaki Tanaka. 435-442 [doi]
- Bisimulations in the Boxed Safe Ambients with PasswordHua Jiang, Xinxing Tan. 443-448 [doi]
- A Verifiable Electronic Voting Scheme over the InternetChun-Ta Li, Min-Shiang Hwang, Yan-Chi Lai. 449-454 [doi]
- Practical Power Analysis Attacks to RSA on a Large IP Portfolio SoCGuido Marco Bertoni, Luca Breveglieri, Alessandro Cominola, Filippo Melzani, Ruggero Susella. 455-460 [doi]
- Extending l-Diversity for Better Data AnonymizationHongwei Tian, Weining Zhang. 461-466 [doi]
- Component Based Information Network for Computer SecurityJoel Ortiz, Johnly Tomelden, Mohsen Beheshti, Kazimierz Kowalski, Jianchao Han. 467-469 [doi]
- Message Encryption Scheme Using Cheating TextCh. Rupa, P. S. Avadhani. 470-474 [doi]
- Optimal Network Security Strengthening Using Attack-Defense Game ModelWei Jiang, Binxing Fang, Hongli Zhang, Zhihong Tian, Xin-fang Song. 475-480 [doi]
- Deception Detection Based on SVM for Chinese Text in CMCHu Zhang, Shan-de Wei, Hong-ye Tan, Jia-heng Zheng. 481-486 [doi]
- An Efficient and Reliable Time Variant Three-Entity and Data Authentication of Remote User Using Smart cardC. Koner, C. T. Bhunia, U. Maulik. 487-491 [doi]
- Multi-Layered Defense against Web Application AttacksAbdul Razzaq, Ali Hur, Nasir Haider, Farooq Ahmad. 492-497 [doi]
- An Efficient PRNG Based on the Hybrid between One- and Two-Dimensional Cellular AutomataSang-Ho Shin, Kee-Young Yoo. 498-503 [doi]
- Authenticated Dictionary-Based Attribute Sharing in Federated Identity ManagementDongwan Shin, Rodrigo Lopes, William Claycomb. 504-509 [doi]
- Application of Game Theory for Cross-layer Design in Cognitive Wireless NetworksYenumula B. Reddy, Clifton Bullmaster. 510-515 [doi]
- Reconfigurable Relaying Topology in Cognitive Multihop Wireless Networks with Nonuniform Temporal and Spatial Traffic DistributionBeatriz Lorenzo, Savo Glisic. 516-523 [doi]
- A Distributed Coverage-Aware Sleep Scheduling Algorithm for Wireless Sensor NetworksFangyang Shen, Chunlei Liu, Jun Zhang. 524-527 [doi]
- Radiation Emission EMC Measurement in Real-TimeFahim Gohar Awan, Noor M. Sheikh, Fawad Munir. 528-533 [doi]
- Mitagation against MAI in a Space Time Spreading Software Defined Radio Test BedShinhan Wee, Montse Ros, Peter James Vial. 534-540 [doi]
- Outage Behavior of Multi-Antenna Multi-Relay Non-Regenerative Cooperative NetworksNing Liu, Jianhua Li, Ping Yi, Jianing Li, Yue Wu. 541-545 [doi]
- Evaluation of Energy Consumption and Network Lifetime in Rectangular Ad-hoc Wireless NetworksWei Feng, Hamada Alshaer, Jaafar M. H. Elmirghani. 546-551 [doi]
- Cross-Layer Design Approach for Wireless Networks to Improve the PerformanceNikema Smith, Yenumula B. Reddy, Nandigam Gajendar. 552-557 [doi]
- An Empirical Study for Protecting Passive RFID Systems against CloningMostafa M. El-Said, Ira Woodring. 558-563 [doi]
- Fault-Tolerant Maximal Local-Connectivity on the Bubble-Sort GraphsLun-Min Shih, Jimmy J. M. Tan. 564-569 [doi]
- Implementation of Header Compression in 3GPP LTEDevishree Naidu, Rakhi Tapadiya. 570-574 [doi]
- A Service-Oriented Middleware for Wireless Sensor and Actor NetworksEduardo Cañete, Jaime Chen, Manuel Díaz, Luis Llopis, Bartolomé Rubio. 575-580 [doi]
- An Online Multipath Routing Algorithm for Maximizing Lifetime in Wireless Sensor NetworksMahmood R. Minhas, Sathish Gopalakrishnan, Victor C. M. Leung. 581-586 [doi]
- Micro T-Kernel: A Low Power and Small Footprint RTOS for Networked Tiny DevicesMasato Kamio, Keiichi Nakamura, Shinsuke Kobayashi, Noboru Koshizuka, Ken Sakamura. 587-594 [doi]
- Estimation Method for Total Nitrogen and Fiber Contents in Tealeaves as well as Grow Index of Tealeaves and Tea Estate Monitoring with Network CamerasKohei Arai. 595-600 [doi]
- Supporting Stateless Address Autoconfiguration in IP-Based Wireless Sensor NetworksShafique Ahmad Chaudhry, Cormac J. Sreenan. 601-606 [doi]
- Performance Monitoring in Sensor NetworksPanayota Papantoni-Kazakos, Anthony Burrell. 607-612 [doi]
- CoP4V : Context-Based Protocol for Vehicle s Safety in Highways Using Wireless Sensor NetworksSattanathan Subramanian, Djamel Djenouri, Guttorm Sindre, Ilangko Balasingham. 613-618 [doi]
- A Secure Content-Based Publish/Subscribe MiddlewareAmina Chaabane, Mohamed Jmaiel. 619-622 [doi]
- Derivation and Analysis of Link/Route Maintenance Probability In Multi Hop Mobile Ad Hoc NetworksYong Shou Wu, Do Hyeon Lee, Jae-Il Jung. 623-627 [doi]
- An Election Protocol in Mobile Ad Hoc Distributed SystemsSung-Hoon Park, Tae-Gyu Lee, Hyung-Seok Seo, Seok-Jin Kwon, Jong-Ho Han. 628-633 [doi]
- Virtual Globe on the Android - Remote vs. Local RenderingMarjan Sterk, Mariano Agustin Cecowski Palacio. 634-639 [doi]
- Prevention of Denial of Service Attacks and Performance Enhancement in Mobile Ad hoc NetworksR. Gunasekaran, V. Rhymend Uthariaraj. 640-645 [doi]
- Supporting Video Multicast in Wireless Ad Hoc Networks Using Multiple Paths and Multiple Description CodingOsamah S. Badarneh, Michel Kadoch, Ahmed K. Elhakeem. 646-651 [doi]
- Towards an In-Flight Infrared Peer-to-Peer Media Streaming NetworkThi Vu Phu, Vu Anh Huynh, Timo Rolf Bretscheider. 652-656 [doi]
- Time-Based Cache Management for Video-on-Demand in P2P EnvironmentYi Qi Gui, Gi Taek Kim, Hwang Kyu Choi. 657-662 [doi]
- Performance Evaluation of GP3 - A Grid-Based Spatial Index InfrastructureMarkus Esch, Jean Botev, Hermann Schloss, Ingo Scholtes. 663-670 [doi]
- Using Open Source Tools to Prevent Write-Only CodeSusan Loveland. 671-677 [doi]
- Bridging the Research-Practice Gap in Requirements Engineering through Effective Teaching and Peer LearningAndrew Mile Connor, Jim Buchan, Krassie Petrova. 678-683 [doi]
- Design Patterns Go to Hollywood: Teaching Patterns with MultimediaAdam Dukovich, David S. Janzen. 684-689 [doi]
- The Road We ve Traveled: 12 Years of Undergraduate Software Engineering at the Rochester Institute of TechnologyJ. Fernando Naveda, Michael J. Lutz, James R. Vallino, Thomas Reichlmayr, Stephanie Ludi. 690-695 [doi]
- Supporting Live Student Projects: Lessons Learned from the Small Project Support Center at Radford UniversityJeff Pittges, Joe D. Chase, Tracy L. Lewis. 696-701 [doi]
- Teaching Software Design Using a Case Study on Model TransformationYanxia Jia, Yonglei Tao. 702-706 [doi]
- Using Scaffolding to Improve Written Communication of Software Engineering StudentsGregory W. Hislop, Heidi J. C. Ellis. 707-712 [doi]
- Interface-Based Object-Oriented Design with Mock ObjectsJagadeesh Nandigam, Venkat N. Gudivada, Abdelwahab Hamou-Lhadj, Yonglei Tao. 713-718 [doi]
- The Impact of the Model-Driven Approach to Software Engineering on Software Engineering EducationAbdelwahab Hamou-Lhadj, Abdelouahed Gherbi, Jagadeesh Nandigam. 719-724 [doi]
- Corporate Compliance and its Implications to IT ProfessionalsVenkat N. Gudivada, Jagadeesh Nandigam. 725-729 [doi]
- Deadlock Detection Views of Distributed DatabaseB. M. Monjurul Alom, Frans A. Henskens, Michael Richard Hannaford. 730-737 [doi]
- Using the Multi-Attribute Global Inference of Quality (MAGIQ) Technique for Software TestingJames D. McCaffrey. 738-742 [doi]
- Automated Testing of Environment-Dependent Programs - A Case Study of Modeling the File System for PexSoonho Kong, Nikolai Tillmann, Jonathan de Halleux. 758-762 [doi]
- A Dependence Graph-Based Test Coverage Analysis Technique for Object-Oriented ProgramsE. S. F. Najumudheen, Rajib Mall, Debasis Samanta. 763-768 [doi]
- Declarative Testing: A Paradigm for Testing Software ApplicationsEd Triou, Zafar Abbas, Sravani Kothapalle. 769-773 [doi]
- The Architecture, Design, and Operation of a Virtual Network Hardware Emulation (VNHE) SystemDavid Harding. 774-778 [doi]
- The Design of a System for Testing Database-Centric Software Applications Using Database SurrogatesAdrian Bonar. 779-783 [doi]
- Testing SQL Server Integration Services Runtime Engine Using Model and Mock ObjectsKaarthik Sivashanmugam, Senthil Palanisamy. 790-795 [doi]
- TAO Project: An Intuitive Application UI Test ToolsetMin Li, Jason Wang, Lamar Damata. 796-800 [doi]
- Model-Based Time and Cost Estimation in a Software Testing EnvironmentBruce Benton. 801-806 [doi]
- Detection and Verification of Semantic Interaction In AOSDZaid Altahat, Tzilla Elrad. 807-812 [doi]
- A Framework for Identifying Reusable Software Components Using Formal Concept AnalysisHaitham S. Hamza. 813-818 [doi]
- On the Discovery of Candidate Aspects in Software RequirementsHaitham S. Hamza, Dina Darwish. 819-824 [doi]
- A Modified Linear Scan Register Allocation AlgorithmS. Subha. 825-827 [doi]
- A O(log n) Signature-Based String Matching AlgorithmSamer Nofal. 828-830 [doi]
- A Object Model for Java and Its Architectural SupportYiyu Tan, Chihang Yau, Anthony S. Fong. 831-836 [doi]
- Reconfigurable Processor LSI Based on ALU Array with Limitations of Connections of ALUs for Software RadioMakoto Ozone, Tatsuo Hiramatsu, Katsunori Hirase, Kazuhisa Iizuka. 837-842 [doi]
- An Energy-Efficient Reliability Model for Parallel Disk SystemsFangyang Shen, Xiao Qin, Andres Salazar, Adam Manzanares, Kiranmai Bellam. 843-848 [doi]
- Parallel and Pipeline Processing for Block Cipher Algorithms on a Network-on-ChipYoon Seok Yang, Jun Ho Bahn, Seung Eun Lee, Nader Bagherzadeh. 849-854 [doi]
- Bus-Based and NoC Infrastructure Performance Emulation and ComparisonLing Wang, Jianye Hao, Feixuan Wang. 855-858 [doi]
- A NoC Emulation/Verification FrameworkPeng Liu, Chunchang Xiang, Xiaohang Wang, Bingjie Xia, Yangfan Liu, Weidong Wang, Qingdong Yao. 859-864 [doi]
- Scheduling Techniques for Multi-Core ArchitecturesAkira Hatanaka, Nader Bagherzadeh. 865-870 [doi]
- Fuse-N: Framework for Unified Simulation Environment for Network-on-ChipAshwini Raina, Venkatesan Muthukumar. 871-876 [doi]
- Traffic Aware Scheduling Algorithm for Network on ChipAshwini Raina, Venkatesan Muthukumar. 877-882 [doi]
- Design of a CC-MC-CDMA System for Gigabit DSL (GDSL)Jacques H. van Wyk, Louis P. Linde. 883-888 [doi]
- An Algorithm for Buffer Cache ManagementS. Subha. 889-893 [doi]
- Model-Based Specification of Flexible and Complex Bidding Strategies in Agent-Based Online AuctionsBenjamin J. Ford, Haiping Xu, Christopher K. Bates, Sol M. Shatz. 894-900 [doi]
- Online Payments Using Handwritten Signature VerificationJarrod Trevathan, Alan McCabe, Wayne Read. 901-907 [doi]
- Inference of Online Auction Shills Using Dempster-Shafer TheoryFei Dong, Sol M. Shatz, Haiping Xu. 908-914 [doi]
- A Proactive Approach to Preventing Phishing Attacks Using PsharkRipan Shah, Jarrod Trevathan, Wayne Read, Hossein Ghodosi. 915-921 [doi]
- A Software Tool for Collecting Data from Online AuctionsRodel Balingit, Jarrod Trevathan, Yong-Jin Lee, Wayne Read. 922-927 [doi]
- Analysing Bidding Trends in Online AuctionsRodel Balingit, Jarrod Trevathan, Wayne Read. 928-933 [doi]
- The Behavior and Preferences of Users on Web 2.0 Social Network Sites: An Empirical StudyShwu-Min Horng. 934-939 [doi]
- A Case Study: Open Source Community and the Commercial EnterpriseKevin Gary, Harry Koehnemann, John Blakley, Cheryl Goar, Holly Mann, Al Kagan. 940-945 [doi]
- Research on Components and Measurement of Customer Value in Business to Customer MarketWang Bao, Zhang Ming Li, Jia Wei. 946-951 [doi]
- A Flexible Notification System for Stocks InvestorsJameela Al-Jaroodi, Nader Mohamed. 952-957 [doi]
- Exploring the Critical Success Factors of Mobile Commerce via Qualitative Method- in Case of Insurance IndustryYa-Yueh Shih, Siao-Sian Huang. 958-962 [doi]
- The Science of Computing: Concepts and Current TechnologiesHerbert Schanker, Deborah Sturm, Sarah Zelikovitz. 963-968 [doi]
- Teaching Object-Oriented Programming with GamesLu Yan. 969-974 [doi]
- Learning Outcomes for an Introductory Database ProjectJeff Pittges, Robert H. Phillips, Premchand Uppuluri. 981-986 [doi]
- Internet Information Retrieval for Enabling Student ProjectsNader Mohamed, Jameela Al-Jaroodi, Imad Jawhar. 987-992 [doi]
- A Model for National E-readiness Assessment Based on System ApproachElham Ziaei Pour, Alireza Taghizadeh, Farzad Bazazan, Farid Khoshalhan, Ayoub Mohammadian. 993-998 [doi]
- Virtual Age: Enabling Technologies and TrendsHamid Mahmoodi, Ali A. Jalali. 999-1004 [doi]
- Federated and Shared Use of Sensor Networks through Security MiddlewareChristophe Huygens, Wouter Joosen. 1005-1011 [doi]
- Uniform and Efficient Data Provisioning for SOA-Based Information SystemsRalf Wagner, Bernhard Mitschang. 1012-1017 [doi]
- MINDS: A Middleware Infrastructure for Distributed Services ProvisioningJohnson Iyilade, Klaas Kabini, Matthew O. Adigun. 1018-1023 [doi]
- A Systematic Review of Software Product Lines Applied to Mobile MiddlewareYuri Morais Bezerra, Thais Alves Burity Pereira, Glêdson Elias da Silveira. 1024-1029 [doi]
- TGKAM: Adaptive Middleware Architecture for Secure Group CommunicationRajesh Ingle, G. Sivakumar. 1030-1035 [doi]
- Developing Service Oriented Sensor/Actuator Networks Using a Tailored MiddlewareStephan Sommer, Christian Buckl, Alois Knoll. 1036-1041 [doi]
- The Development of a Multi-Agent Based Middleware for RFID Asset Management System Using the PASSI MethodologyLibe Valentine Massawe, Farhad Aghdasi, Johnson Kinyua. 1042-1048 [doi]
- Mobile Middleware Solution for Automatic Reconfiguration of ApplicationsAlin Florindor Murarasu, Thomas Magedanz. 1049-1055 [doi]
- Classification of Movies and Television Shows Using MotionMark Smith, Ray Hashemi, Leslie Sears. 1056-1060 [doi]
- Design of Context Analysis System on USN EnvironmentCheng Hao Jin, Yongmi Lee, Gyoyong Sohn, Hi-Seok Kim, Keun Ho Ryu. 1061-1066 [doi]
- M3L: Architecture for Multimedia Information RetrievalUmer Rashid, Iftikhar Azim Niaz, Muhammad Afzal Bhatti. 1067-1072 [doi]
- XML Based Implementation of a Bibliographic Database and Recursive QueriesKazem Taghva, Kirankumar Jayakumar. 1073-1078 [doi]
- Towards an Integrated Platform for Improving Hospital Risk ManagementJawed I. A. Siddiqi, Babak Akhgar, Fazilatur Rahman, Sally Atkinson, Alberto Savoldelli, Stefano Arici, Paolo Bertele, Brian James, Mike Pinkerton. 1079-1084 [doi]
- Toward Extending AADL-OSATE Toolset with Color Petri Nets (CPNs)Hassan Reza, Emanuel S. Grant. 1085-1088 [doi]
- A Safety Analysis Method Using Fault Tree Analysis and Petri NetsHassan Reza, Malvika Pimple, Varun Krishna, Jared Hildle. 1089-1094 [doi]
- The Knowledge Building of the Eco-ClassroomXinyu Zhang, Nianlong Luo, Cheng Sun. 1100-1103 [doi]
- The Case Study Activities in a Web-Based EnvironmentHuang Lanying, Hu Zhongya, Cheng Sun. 1104-1107 [doi]
- Translating e-learning Flow-Oriented Activity Sequencing Descriptions into Rule-Based DesignsIván Martínez-Ortiz, José Luis Sierra, Baltasar Fernández-Manjón. 1108-1113 [doi]
- Distance-Learning and Converging Mobile DevicesKenneth E. Hoganson. 1114-1119 [doi]
- Using Learners' Annotations to Produce Feedbacks for Selecting and Editing Learning Contents in e-Learning SystemsAhmad A. Kardan, Fakhroddin Noorbehbahani. 1128-1133 [doi]
- Towards a More Accurate Knowledge Level EstimationSamad Kardan, Ahmad Kardan. 1134-1139 [doi]
- A Proposesd Ontology for Effective Searching of Sharable Content Objects Emphasizing on Learning ObjectivesAhmad Kardan, Shima Zahmatkesh. 1140-1145 [doi]
- Optimized Hybrid Resource Allocation in Wireless Cellular Networks with and without Channel ReassignmentXin Wu, Arunita Jaekel, Ataul Bari, Alioune Ngom. 1146-1151 [doi]
- Multi-slot Channel Allocation for Priority Packet Transmission in the GPRS NetworkJun Zheng, Mengyu Qiao, Emma Regentova. 1152-1157 [doi]
- Optimum Power Allocation for Distributed Antenna Systems with Large-scale Fading-only FeedbackDongho Lim, Kwonhue Choi, Huaping Liu. 1158-1164 [doi]
- DMAP-FR: Integrated Mobility and Service Management with Failure Recovery Support for Mobile IPv6 SystemsWeiping He, Ing-Ray Chen. 1165-1170 [doi]
- A Lookahead Strategy for Movement-Based Location Update in Wireless Cellular NetworksVicente Casares Giner, Pablo García-Escalle. 1171-1177 [doi]
- Performance Analysis of MQAM-OFDM Based WLAN in Presence of Zigbee Interference in AWGN and Rayleigh Fading ChannelMinakshmi Roy, H. S. Jamadagni. 1178-1183 [doi]
- Quality of Experience Measurements for Video Streaming over Wireless NetworksKandaraj Piamrat, César Viho, Jean-Marie Bonnin, Adlen Ksentini. 1184-1189 [doi]
- Analysis of VoIP over HSDPA Performance with Discontinuous Reception CyclesKari Aho, Ilmari Repo, Timo Nihtilä, Tapani Ristaniemi. 1190-1194 [doi]
- On Idle Mode Mobility State Detection in Evolved UTRANJani Puttonen, Niko Kolehmainen, Tero Henttonen, Jorma Kaikkonen. 1195-1200 [doi]
- Promises and Challenges of Ambient Assisted Living SystemsHong Sun, Vincenzo De Florio, Ning Gui, Chris Blondia. 1201-1207 [doi]
- e-Care Barbara Franz, Markus Lehner, Herwig Mayr, Margit Mayr. 1208-1213 [doi]
- Modeling Situation-Aware Ambient Assisted Living Systems for EldercareWerner Kurschl, Stefan Mitsch, Johannes Schönböck. 1214-1219 [doi]
- User-Centered Design and Fast Prototyping of an Ambient Assisted Living System for Elderly PeopleSuzanne Kieffer, Jean-Yves Lionel Lawson, Benoit M. Macq. 1220-1225 [doi]
- Implementation of a Physical Activity Monitoring System for the Elderly People with Built-in Vital Sign and Fall DetectionAnh Dinh, Daniel Teng, Li Chen, Yang Shi, Carl McCrosky, Jenny Basran, Vanina Del Bello-Hass. 1226-1231 [doi]
- Ambient Information Systems for Supporting Ageing in PlaceJuan-Pablo García-Vázquez, Marcela D. Rodríguez, Ángel G. Andrade, Diana Saldaña-Jimenez, Fabian Mercado, Emanuelle Ruelas. 1232-1237 [doi]
- Performance Comparison of Wiener Filter and CLS Filter on 2D SignalsK. Raja Rajeswari, K. Murali Krishna, V. Jagan Naveen, A. Vamsidhar. 1244-1249 [doi]
- A Back End System for Digital Image Library Organization Based on Concept LearningParaskevi S. Lampropoulou, Dionisios N. Sotiropoulos, Aristomenis S. Lampropoulos, George A. Tsihrintzis. 1250-1255 [doi]
- Feature Combination Using Multiple Spectral Cues for Robust Speech Recognition in Mobile CommunicationsDjamel Addou, Sid-Ahmed Selouani, Malika Boudraa, Bachir Boudraa. 1256-1261 [doi]
- Detection of the Parameters of HypernasalityBuket D. Barkana. 1262-1264 [doi]
- The Acoustic Properties of Different Noise SourcesJidong Yang, Buket D. Barkana. 1265-1268 [doi]
- Optimal Transmission Time of Secondary User in an Overlay Cognitive Radio SystemBabak Abbasi Bastami, Ebrahim Saberinia. 1269-1274 [doi]
- Post-processing of Multiview Images: Depth ScalingManbae Kim. 1275-1279 [doi]
- Design of a Logarithmic Domain 2-D Convolver for Low Power Video Processing ApplicationsHau T. Ngo, Vijayan K. Asari. 1280-1285 [doi]
- Side-Match Vector Quantizers Using Neural Network Based Variance Predictor for Image CodingShuangteng Zhang. 1286-1289 [doi]
- Carotid Artery Boundary Extraction Using Segmentation Techniques: A Comparative StudyK. B. Zayanthi, R. S. D. Wahida Banu. 1290-1295 [doi]
- Barcode WatermarkingMohammad Eyadat, Hedley Morris, Imad Muhi El-Ddin. 1296-1300 [doi]
- Fuzzy Edge and Corner Detector for Color ImagesMadasu Hanmandlu, Om Prakash Verma, Pankaj Gangwar, Shantaram Vasikarla. 1301-1306 [doi]
- Medical Image Segmentation Using Improved Mountain Clustering ApproachNishchal K. Verma, Payal Gupta, Pooja Agrawal, Madasu Hanmandlu, Shantaram Vasikarla, Yan Cui. 1307-1312 [doi]
- Optimization of VC-1/H.264/AVS Video Decoders on Embedded ProcessorsGuo-An Jian, Ting-Yu Huang, Jui-Chin Chu, Jiun-In Guo. 1313-1318 [doi]
- Compressing Images Using Fractal Characteristics by Estimating the Nearest NeighborMahdi Jampour, Maryam Ashourzadeh, Mahdi Yaghobi, Issa Rashidfarokhi. 1319-1322 [doi]
- A Study of Color Histogram Based Image RetrievalRishav Chakravarti, Xiannong Meng. 1323-1328 [doi]
- Improving Web Search Using Contextual RetrievalDilip Kumar Limbu, Andrew M. Connor, Russel Pears, Stephen G. MacDonell. 1329-1334 [doi]
- Image Query Service Using Content Management TechniquesDan Beatty, Noé Lopez-Benitez. 1335-1340 [doi]
- Emotion and Motivation: Understanding User Behavior of Web 2.0 ApplicationChen-Ya Wang, Seng-cho Timothy Chou, Hsia-Ching Chang. 1341-1346 [doi]
- 3D VQI: 3D Visual Query InterfaceSubhash Uppalapati, John Femiani, Anshuman Razdan, Kevin Gary. 1347-1354 [doi]
- Exploring Hierarchically Organized Georeferenced Multimedia Annotations in the MobiTOP SystemThi Nhu Quynh Kim, Khasfariyati Razikin, Dion Hoe-Lian Goh, Yin Leng Theng, Quang Minh Nguyen, Ee-Peng Lim, Aixin Sun, Chew-Hung Chang, Kalyani Chatterjea. 1355-1360 [doi]
- An Integrated Framework for Research on Cross-Cultural Information RetrievalIsak Taksa, Jaime Muro Flomenbaum. 1367-1372 [doi]
- PCI: Plants Classification & Identification Classification of Web Pages for Constructing Plants Web DirectoryMadjid Khalilian, Hassan Abolhassani, Ali Alijamaat, Farsad Zamani Boroujeni. 1373-1377 [doi]
- Fixed Broadband Wireless Access for Wide Area Coverage and Last Mile SolutionsLe Ngoc Son, Bao Nguyen Le. 1378-1383 [doi]
- Applying a Composite Process Framework (CPF) in Real Life Software Development ProjectMohammed Al-Maharmeh, Bhuvan Unhelkar. 1384-1389 [doi]
- DASIMA: A Flexible Management Middleware in Multi-Scale ContextsMehdi Kessis, Claudia Roncancio, Alexandre Lefebvre. 1390-1396 [doi]
- Using GQM for Testing Design Patterns in Real-Time and Embedded Systems on a Software Production LineClaudio Goncalves Bernardo, Denis Avila Montini, Danilo Douradinho Fernandes, Daniela America da Silva, Luiz Alberto Vieira Dias, Adilson Marques da Cunha. 1397-1404 [doi]
- Learning from Experience: The Analysis of an Extreme Programming ProcessSara Shahzad. 1405-1410 [doi]
- An Approach for SQL Injection Vulnerability DetectionJunjin Mei. 1411-1414 [doi]
- Using Agile Methods in Software Product Development: A Case StudyJayakanth Srinivasan, Kristina Lundqvist. 1415-1420 [doi]
- Design Patterns Reuse for Real Time Embedded Software DevelopmentGabriel de Souza Pereira Moreira, Denis Avila Montini, Daniela America da Silva, Felipe Rafael Motta Cardoso, Luiz Alberto Vieira Dias, Adilson Marques da Cunha. 1421-1427 [doi]
- Final Inspection for Design Pattern Homologation Using a Real Time Embedded Software in a Production LineGabriel de Souza Pereira Moreira, Denis Avila Montini, Danilo Douradinho Fernandes, Felipe Rafael Motta Cardoso, Luiz Alberto Vieira Dias, Adilson Marques da Cunha. 1428-1435 [doi]
- Using GQM Hypothesis Restriction to Infer Bayesian Network TestingDenis Avila Montini, Felipe Rafael Motta Cardoso, Francisco Supino Marcondes, Paulo Marcelo Tasinaffo, Luiz Alberto Vieira Dias, Adilson Marques da Cunha. 1436-1441 [doi]
- The Mechanism and Performance Comparison of Two Wireless Sensor Network Operating System KernelsJia-liang Wang, Hai Zhao, Peng Li, Zheng Liu, Jie Zhao, Wei Gao. 1442-1446 [doi]
- Systematic and Formal Approach to get a Domain Specific LanguageFrancisco Supino Marcondes, Danilo Douradinho Fernandes, Denis Avila Montini, Paulo Marcelo Tasinaffo, Ítalo Santiago Vega, Luiz Alberto Vieira Dias. 1447-1450 [doi]
- A Desktop Environment for River Hazards MonitoringJoao Augusto de Pessoa, Luiz Alberto Vieira Dias, Adilson Marques da Cunha. 1451-1455 [doi]
- Epileptic Seizures Detection Using Continuous Time Wavelet Based Artificial Neural NetworksBerdakh Abibullaev, Hee Don Seo. 1456-1461 [doi]
- The Role of Enterprise Architecture in Healthcare-ITKamran Ahsan, Hanifa Shah, Paul Kingston. 1462-1467 [doi]
- Prediction of Temperature Distribution and Volume of Lesion During HIFU TherapyMohsen Heydari, Mehran Jahed. 1468-1473 [doi]
- The State of Play in Jordanian E-government ServicesMohammad Hjouj Btoush, Jawed I. A. Siddiqi, Ja far Alqatawna, Babak Akhgar. 1474-1478 [doi]
- A Search Service for Software Components Based on a Semi-Structured Data Representation ModelTalles Brito Viana, Hugo Imperiano Nobrega, Thiago Vinicius Freire de Araujo Ribeiro, Glêdson Elias da Silveira. 1479-1484 [doi]
- The Research on the Environmental Assessment Automation System-C4ISRE Based on C4ISR TheoryYunfeng Ma, Xiaomin Hu, Yonggang Huang, Tong Zhu, Lingling Fu. 1485-1491 [doi]
- The Use of Health Smart Card in Bridging Discontinuity of Care for Pregnant WomanAn-Jim Long, Polun Chang. 1492-1497 [doi]
- Information and Communication Technology in Arab Countries: Problems and SolutionsSamir N. Hamade. 1498-1503 [doi]
- Towards a Context Aware Mobile Community Application PlatformChristian Menkens. 1504-1509 [doi]
- Multidimensional Visualization System for Travel Social NetworksMaria Chiara Caschera, Fernando Ferri, Patrizia Grifoni, Tiziana Guzzo. 1510-1516 [doi]
- A Mobile Application to Support Phatic Communication in the Hybrid SpaceMark Bilandzic, Daniel Filonik, Michael Gross, Andreas Hackel, Herbert Mangesius, Helmut Krcmar. 1517-1521 [doi]
- A Trend Analysis of the Question Answering DomainMohan John Blooma, Alton Yeow-Kuan Chua, Dion Hoe-Lian Goh, Chu Keong Lee. 1522-1527 [doi]
- An Optimization Model for IO Jitter in Device-Level RTOSZheng Liu, Hai Zhao, Peng Li, Jia-liang Wang. 1528-1533 [doi]
- Trust Computing for Social NetworkingYanjun Zuo, Wen-Chen Hu, Timothy O Keefe. 1534-1539 [doi]
- Giving Every Child a Sense of Belonging: Improving Birth Registration in Developing CountriesJohannes Gambo, Savae Latu. 1540-1545 [doi]
- Querying Semistructured Data with Compression in Distributed EnvironmentsB. M. Monjurul Alom, Frans Henskens, Michael Hannaford. 1546-1553 [doi]
- Effects of Social Approval Votes on Search PerformanceGabriella Kazai, Natasa Milic-Frayling. 1554-1559 [doi]
- Planning and Realization of Collaborative AssemblyYongping Hao, Jingyu Wang, Pengfei Zeng, Weiping Shao. 1560-1564 [doi]
- Application of COMERO Data Collecting in Quality Management SystemYanfang Yue, Rui-gang Zhang, Guang Yang, Guang-le Ge. 1567 [doi]
- Using Pi-Calculus to Formalize Grid Workflow Parallel Computing PatternsZhan-jun Li, Yong-zhong Huang, Shao-zhong Guo. 1568-1571 [doi]
- A Methodology for Mobile Network Security Risk ManagementMahdi Seify, Shahriar Bijani. 1572-1573 [doi]
- Security Analysis of One Quantum Digital Signature SchemeZhengjun Cao, Olivier Markowitch. 1574-1576 [doi]
- An Evolution of Hindi Text SteganographyKalavathi Alla, R. Siva Rama Prasad. 1577-1578 [doi]
- Network Security Scheme for Wireless Sensor Networks using Efficient CSMA MAC Layer ProtocolPiyush Kumar Shukla, Sanjay Silakari, Sarita Singh Bhadoriya. 1579-1580 [doi]
- Implementation Comparison of Kerberos Passwords by RC-5 Encryption Type analysis with RC-4 EncryptionPiyush K. Shukla, G. S. Mishra, Prashant G. Girdhar, Pradeep Rusia, Vivek Kapoor. 1581-1582 [doi]
- An Ethical Way of Encrypt Data Transfer in Bluetooth Mobile Using Chaos Based Feedback TechniquePiyush Kumar Shukla, Kamlesh Gupta, Sanjay Silakari, A. S. Saxena. 1583-1584 [doi]
- Research of Direct Spread Spectrum Communication System for Formation Micro-satellitesGuoqiang Wu, Zhaowei Sun, Shunan Wu. 1585-1587 [doi]
- Performance Comparison of BPSK in Rayleigh and AWGN Channel by Monte Carlo Simulation MethodSahil Chaudhary, Vijit Gupta, Vivek Kumar Dwivedi. 1588-1589 [doi]
- The Research of the Component-Based Software EngineeringXinyu Zhang, Li Zheng, Cheng Sun. 1590-1591 [doi]
- Project Management Practitioner Empowerment Program: A Case StudyRose Neena Tom. 1592-1594 [doi]
- Using Domain-Specific Languages to Describe the Development Viewpoint of Software ArchitecturesAmir Reza Yazdanshenas, Ramtin Khosravi. 1595-1596 [doi]
- WERCCS: A Client-side Workflow Enactment Service Using AJAXMahin Jeyachandran, Kevin Gary. 1597-1598 [doi]
- Is Continuous Compliance Assurance Possible?Joseph D Alessandro, Cynthia Tanner, Bonnie Morris, Tim Menzies. 1599 [doi]
- VL-MAC: Virtual Link Based Multi-channel MAC Scheme in WSNJuan Luo, Haibo Luo, Renfa Li. 1600-1601 [doi]
- Hierarchical Intelligent Agent Based Wireless Body Sensor Mesh NetworksSuresh Sankaranarayanan. 1602-1603 [doi]
- A Reliable Multi-hop Hierarchical Routing Protocol in Wireless Sensor Network (WSN)Mohammad Al-Fares, Zhili Sun, Haitham S. Cruickshank. 1604-1605 [doi]
- An Implementation of Central Optical Sensor Measurement/Observation System (COSMOS) with the Integrated FBG Sensor Control DeviceHyun-Kuk Kim, Won-Hyuk Yang, Hyun-Bum Choi, Young-Chon Kim. 1606-1609 [doi]
- A Reinforced Authentication Protocol for Anti-Counterfeiting and Privacy ProtectionKang-Joong Seo, Jun-Cheol Jeon, Kee-Young Yoo. 1610-1611 [doi]
- A Thermal-aware Shortest Hop Routing Algorithm for in vivo Biomedical Sensor NetworksFereidoun Ahourai, Mahmoud Tabandeh, Mehran Jahed, Saber Moradi. 1612-1613 [doi]
- Tutoring Tool for Formulating Database Queries with Complex QuantifiersJalal Kawash. 1614-1615 [doi]
- Insider Threat in Database Systems: Preventing Malicious Users Activities in DatabasesManideep Chagarlamudi, Brajendra Panda, Yi Hu. 1616-1620 [doi]
- Using Service Oriented Architecture in a Generic Virtual Power PlantPeter Bach Andersen, Bjarne Poulsen, Chresten Traeholt, Jacob Østergaard. 1621-1622 [doi]
- The Web-Based B2B Environment with Web ServicesXinyu Zhang, Wei Tang, Cheng Sun. 1623-1624 [doi]
- A Web Service System with Workflow Modeling and SchedulingXinyu Zhang, Nianlong Luo. 1625-1626 [doi]
- Data Access and Semantic Integration Based on OGSA-DQPWenzheng Li, Xiaoxia Hu. 1627-1630 [doi]
- A Methodology to Extract Emotions and add Expressions in Speech SynthesisM. B. Chandak, Rajiv Dharaskar. 1631-1633 [doi]
- Learning Theories in Computer Science EducationJesús Ubaldo Quevedo-Torrero. 1634-1635 [doi]
- Problem on Software Engineering Learning: Domain EngineeringFrancisco Supino Marcondes, Hamilton Jose Brumatto, Eloiza Helena Sonoda, Luiz Carlos Barboza, Jefferson Zannuto. 1636 [doi]
- Extending the Technology Acceptance Model for Internet Banking: A Case Study of IranAlireza Talebpour, Sona Bairamzadeh, Seyed Sabah Vajdi. 1637-1638 [doi]
- A Proposal Framework for Investigating Website Success in the Context of E-banking: An Analytic Network Process (ANP) ApproachMona Salehi, Abbas Keramati, Sina Elli. 1639 [doi]
- Variable Block Size Architecture for ProgramsS. Subha. 1640-1641 [doi]
- Modeling Real-Time Multi-Core Embedded System Using UMLJareer Abdel-Qader, Roger Walker. 1642-1643 [doi]
- Quantum Cryptography: A New Generation of Information Technology Security SystemMehrdad Sharbaf. 1644-1648 [doi]
- Development of Collapse-Sensing Phone for Emergency Positioning SystemDuksung Jang, Seungchan Choi, Taesoon Park. 1649-1652 [doi]
- A Pervasive System for Enabling Older Adults to Cope with Depression by Motivating them to SocializeAlejandro Aguirre, Marcela D. Rodríguez, Ángel G. Andrade. 1653-1654 [doi]
- Unconstrained Arabic Handwritten Word Feature Extraction: A Comparative StudyJawad H. AlKhateeb, Jinchang Ren, Jianmin Jiang, Stanley S. Ipson. 1655-1656 [doi]
- Outlier Detection in Spatial Databases Using Clustering Data MiningAmitava Karmaker, Syed M. Rahman. 1657-1658 [doi]
- Extending the Technology Acceptance Model for E-learning: A Case Study of IranAkram Hadizadeh Moghadam, Sona Bairamzadeh. 1659-1660 [doi]
- Exchange Routing Information between New Neighbor Nodes to Improve AODV PerformanceLe Anh Tuan, Yuan Luo. 1661-1662 [doi]
- A New Data Communication Protocol for Distributed Mobile Databases in Mobile Ad Hoc NetworksAfsaneh Rahbar, Mehran Mohsenzadeh, Amir Masoud Rahmani. 1663-1667 [doi]
- A Hybrid Reconfiguration Algorithm for Fast Continuous Query ProcessingChristopher Kosecki, Joseph S. Gomes. 1668-1669 [doi]
- Modeling of Military Networks Using Group Mobility ModelsAlicia Nicki Washington, Rotimi Iziduh. 1670-1671 [doi]
- Providing Syed M. Rahman, Amitava Karmaker. 1672-1673 [doi]
- Software Testing for Web-Applications Non-Functional RequirementsBreno Lisi Romano, Glaucia Braga e Silva, Henrique Fernandes de Campos, Ricardo Godoi Vieira, Adilson Marques da Cunha, Fabio Fagundes Silveira, Alexandre Carlos Brandao Ramos. 1674-1675 [doi]
- On the Secure Sharing of Legacy DataDouglas Russell, David J. Power, Mark Slaymaker, Ghita Kouadri Mostefaoui, Xiaoqi Ma, Andrew Simpson. 1676-1679 [doi]
- Modeling the Interaction with MoLICClaudia Mena, Cristian Rusu, Silvana Roncagliolo. 1680 [doi]
- Using Best Practices of Software Engineering into a Real Time System DevelopmentRicardo Godoi Vieira, Breno Lisi Romano, Glaucia Braga e Silva, Henrique Fernandes de Campos, Adilson Marques da Cunha. 1681 [doi]
- Applying Domain-Specific Modeling to Mobile Health Monitoring ApplicationsFlorence T. Balagtas-Fernandez, Heinrich Hussmann. 1682-1683 [doi]
- Agile Principles in Academic Education: A Case StudyBernd Bruegge, Maximilian Reiss, Jennifer Schiller. 1684-1686 [doi]
- Weaving Agile Software Development Techniques into a Traditional Computer Science CurriculumPeter E. Maher. 1687-1688 [doi]
- Using a Tool to Generate a Web-Services AdapterCheng Sun, Xiaohua Wu, Xinyu Zhang. 1689-1690 [doi]
- Collaborative Web Search with WikiLinksChris Lüer, Jonathan Cummins. 1691-1692 [doi]
- Evaluating Web 2.0 Services Based on 7C FrameworkMilad Sabouri, Ali A. Jalali. 1693-1694 [doi]
- Improving the Security of Non-PKI Methods for Public Key DistributionChun-Ta Li, Min-Shiang Hwang. 1695-1696 [doi]
- Model Updating of Laboratorial Long-Span Cable-Stayed BridgeOu Yang, Jinping Ou. 1697-1700 [doi]
- Study on the Parameter Vibration of the Large-Span Cable-Stayed BridgesFeng-chen Li, Shi-zhu Tian, Yan-jun Li, Jin Wang. 1701-1704 [doi]
- An Algorithm for Secure Deletion in Flash MemoriesS. Subha. 1705-1706 [doi]
- Modeling of Object Oriented OLAPMadhu Bhan, D. Evangelin Geetha, T. V. Suresh Kumar, K. Rajanikanth. 1707-1708 [doi]
- Reality of a New Control Sampling ModuleWensong Hu, Min Zhu, Zhuo Fang. 1709-1710 [doi]
- Decidability and ConstructivismJesús Ubaldo Quevedo-Torrero. 1711-1714 [doi]
- An Exclusive Cache ModelS. Subha. 1715-1716 [doi]