Abstract is missing.
- Development and Evaluation of a Large-Scale Agent-Based System for Information Literacy Education - Improving the Automatic Collection of Learning Results through Template MatchingKeiichi Tanaka, Katsumi Wasaki. 1-6 [doi]
- Using a Collaborative Programming Methodology to Incorporate Social Computing Projects into Introductory Computer Science CoursesAlan Shaw. 7-11 [doi]
- VectorForce: A Video Game ProjectMark Chapman, David A. Turner, Arturo I. Concepcion, Aldo Lewis. 12-17 [doi]
- An Approach to XML Tag RecommendationSutheetutt Vacharaskunee, Sarun Intakosum. 18-23 [doi]
- A Location-based Mobile Advertisement Publishing System for VendorsChyi-Ren Dow, Yu-Hong Lee, Jeremy Liao, Hao-Wei Yang, Wei-Luen Koo. 24-29 [doi]
- A Greedy Approach to Text Steganography Using Properties of SentencesSuvamoy Changder, Narayan C. Debnath, Debidas Ghosh. 30-35 [doi]
- Predicting the Reliability of Software Systems Using Fuzzy LogicSultan Aljahdali, Alaa F. Sheta. 36-40 [doi]
- Evolutionary Prediction for Cumulative Failure Modeling: A Comparative StudyMohamed Benaddy, Sultan Aljahdali, Mohamed Wakrim. 41-47 [doi]
- A Police Force Facing an e-Transparency ProjectNarayan C. Debnath, Robert Uzal, German Montejano, Daniel Riesco. 48-53 [doi]
- Algorithmic Design and Implementation of an Automated Testing ToolJason R. Meek, Narayan C. Debnath, Ilhyun Lee, Haesun K. Lee. 54-59 [doi]
- EnduRan: A Web Application for Managing Racing EventsJigarkumar Patel, Sergiu M. Dascalu. 60-65 [doi]
- Putting Search in Context: Using Dynamically-Weighted Information Fusion to Improve Search ResultsNicole Anderson. 66-71 [doi]
- Interactive Visualization and Analysis of Hurricane DataAndrew Cordar, Ahmed Abukmail. 72-77 [doi]
- Non Bandwidth-intrusive Video Streaming over TCPHiroyuki Hisamatsu, Go Hasegawa, Masayuki Murata. 78-83 [doi]
- Schema-Based XML-to-SQL Query Translation Using Interval EncodingMustafa Atay, Artem Chebotko. 84-89 [doi]
- On the Ranking Strategy in Adword AuctionsPatrick Maillé, Bruno Tuffin. 90-93 [doi]
- Seamless Proactive Vertical Handover AlgorithmTabinda Salam, Muhammad Ali, Mah-Rukh Fida. 94-99 [doi]
- PHY-MAC Cross Layer Issues for QoS Provisioning in Wireless Ad Hoc NetworksHussein ElAttar, Hussein Abdelaty, Salwa H. Elramly, Mohamed A. Aboul-Dahab. 100-105 [doi]
- AdaptiveScan: The Fast Layer-2 Handoff for WLANMahnsuk Yoon, Keuchul Cho, Jilong Li, Jeongbae Yun, Minyoung Yoo, Youngil Kim, Qin Shu, Jangkyu Yun, Kijun Han. 106-111 [doi]
- An Adaptive Power-Aware Multi-hop Routing Algorithm for Wireless Sensor NetworksErwing Ricardo Sanchez, Laura M. Murillo, Bartolomeo Montrucchio, Maurizio Rebaudengo. 112-116 [doi]
- Location Estimation of Wireless Nodes with Preservation of Neighbor Relations in MANETKei Itoh, Hiroaki Higaki. 117-124 [doi]
- Forwarding on Froggers Networks: Principle of Data Flow EquilibriumOmar Y. Tahboub, Javed I. Khan. 125-130 [doi]
- Authoritative Intelligent Perfect Parallel Parking Based on Fuzzy Logic Controller for Car-Type Mobile RobotSasan Mohammadi, Mostafa Tavassoli, Abolfazl Rajabi. 135-138 [doi]
- A Privacy-Respecting Indoor Localization Approach for Identifying Shopper Paths by Using End-Users Mobile DevicesMohamed Bourimi, Gunnar Mau, Sascha Steinmann, Dominik Klein, Steffen Templin, Dogan Kesdogan, Hanna Schramm-Klein. 139-144 [doi]
- Grid Computing Usability Heuristics in PracticeSilvana Roncagliolo, Virginia Rusu, Cristian Rusu, Gonzalo Tapia, Danae Hayvar, Dorian Gorgan. 145-150 [doi]
- A Survey of Human-Computer Interaction into the Computer Science Curricula in IberoamericaCésar A. Collazos, Toni Granollers, Cristian Rusu. 151-156 [doi]
- OpenBioSafetyLab: A Virtual World Based Biosafety Training Application for Medical StudentsArturo Nakasone, Siyu Tang, Mika Shigematsu, Berthold Heinecke, Shuji Fujimoto, Helmut Prendinger. 157-162 [doi]
- WeSketch: A 3D Real Time Collaborative Virtual Environment that Improves the GUI Sketching TaskHamilton A. Hernández, Helmuth Trefftz. 163-168 [doi]
- A Virtualization Approach to Auto-Scaling ProblemTheera Thepparat, Amnart Harnprasarnkit, Douanghatai Thippayawong, Veera Boonjing, Pisit Chanvarasuth. 169-173 [doi]
- Applying Genetic Programming for Estimating Software Development Effort of Short-scale ProjectsArturo Chavoya, Cuauhtémoc López Martín, M. E. Meda-Campa. 174-179 [doi]
- A Sophisticated RFID Application on Multi-Factor AuthenticationJing-Chiou Liou, Gregory Egan, Jay K. Patel, Sujith Bhashyam. 180-185 [doi]
- The Exploration of the Component s Trustworthiness Measurement Method in the Data Processing DomainXinyu Zhang, Haiyan Wu, Yiqian Lu. 186-190 [doi]
- Spectrum-Based Fault Localization in Regression TestingShailesh Tiwari, K. K. Mishra, Anoj Kumar, A. K. Misra. 191-195 [doi]
- A Systemic Methodology for Software Architecture Analysis and DesignPlamen Petrov, Ugo Buy. 196-200 [doi]
- A Domain Analysis Method for Evolvable Software Product Line ArchitecturesHaitham S. Hamza, Dina Darwish. 201-205 [doi]
- An Event-Driven Interactive Model of Information Resource ManagementJianchao Han, Hosung Kim, Mohsen Beheshti, Kazimierz Kowalski. 206-211 [doi]
- Software Project Scheduling Using a Multi-Agent SystemNathan Nikotan, Jianchao Han, Mohsen Beheshti. 212-213 [doi]
- Bayesian Estimation of the Normal Mean from Censored SamplesAhmed Khago, Ashok K. Singh, Laxmi Gewali. 214-220 [doi]
- CleanJava: A Formal Notation for Functional Program VerificationYoonsik Cheon, Cesar Yeep, Melisa Vela. 221-226 [doi]
- Instituting Software Metrics in Small Organizations: A Practical ApproachHisham M. Haddad, Donald Eric Meredith. 227-232 [doi]
- A Digital Ecosystem-based Framework for Math-based Search SystemMohammed Q. Shatnawi, Qusai Q. Abuein. 233-238 [doi]
- Reducing the Gap between Academia and Industry: The Case for Agile Methods in ThailandWajee Chookittikul, Janet L. Kourik, Peter E. Maher. 239-244 [doi]
- 8 Reasons Why You Should Use Mobile Platforms in Your CS CoursesJonathan Engelsma, Hans Dulimarta. 245-250 [doi]
- The Case for Teaching Legacy Systems ModernizationAndrew J. McAllister. 251-256 [doi]
- Open and Accessible PresentationsErik Wilde. 257-262 [doi]
- IT Module Based Test Automation FrameworkXin Bai, Marco Sadeghi. 263-267 [doi]
- Automated Java GUI Modeling for Model-Based Testing PurposesPekka Aho, Nadja Menz, Tomi Räty, Ina Schieferdecker. 268-273 [doi]
- Effectively Testing for a Software Product Line with OTM3 Organizational Testing Management Maturity ModelEtiene Lamas, Luiz Alberto Vieira Dias, Adilson Marques da Cunha. 274-279 [doi]
- Testing a High Performance, Random Access Priority Queue: A Case StudyJames D. McCaffrey, Adrian Bonar. 280-285 [doi]
- Goal-Oriented Test Case Selection and Prioritization for Product Line Feature ModelsAlireza Ensan, Ebrahim Bagheri, Mohsen Asadi, Dragan Gasevic, Yevgen Biletskiy. 291-298 [doi]
- Scenario Driven TestingKaarthik Sivashanmugam, Da Lin, Senthil Palanisamy. 299-303 [doi]
- Conformance Testing in Service-Oriented Interconnection Technologies in NoTAJanne Keranen, Tomi Räty, Petri Jurmu, Matti Maki, Olli-Pekka Puolitaival. 304-309 [doi]
- Next Generation Cross Technology Test Data Solution for M&ASagar Khandelwal, Kannan Subramanian, Rohit Garg. 310-314 [doi]
- Security of Wireless Sensor NetworksDaniel E. Burgner, Luay A. Wahsheh. 315-320 [doi]
- Enforcing Reactive Noninterference with Reachability AnalysisCong Sun, Liyong Tang, Zhong Chen. 321-326 [doi]
- OTP-Based Two-Factor Authentication Using Mobile PhonesMohamed Hamdy Eldefrawy, Khaled Alghathbar, Muhammad Khurram Khan. 327-331 [doi]
- Secure Image Steganography Based on Randomized Sequence of Cipher BitsY. V. Subba Rao, S. S. Brahmananda Rao, N. Rukma Rekha. 332-335 [doi]
- Application Lockbox for Mobile Device SecurityJim Luo, Myong H. Kang. 336-341 [doi]
- A Secure e-Voting ArchitectureAdesina Simon Sodiya, S. A. Onashoga, D. I. Adelani. 342-347 [doi]
- Fuzzy-based Methods for Privacy-Preserving Data MiningR. Mukkamala, V. G. Ashok. 348-353 [doi]
- SHA-512/256Shay Gueron, Simon Johnson, Jesse Walker. 354-358 [doi]
- Differential and Correlation Power Analysis Attacks on HMAC-WhirlpoolFan Zhang, Zhijie Jerry Shi. 359-365 [doi]
- Enhanced Key Life in Online Authentication Systems Using Virtual PasswordN. Rukma Rekha, Y. V. Subba Rao, K. V. S. S. R. S. S. Sarma. 366-369 [doi]
- Experimental Research on DFA-Based MLML IDS Security EvaluationHongbin Wang, Zhiyi Fang, Simon Fong, Yain-Whar Si, Liyang Liu. 370-375 [doi]
- Modified Protocols for Internet Key Exchange (IKE) Using Public Encryption and Signature KeysV. Nagalakshmi, I. Ramesh Babu, P. S. Avadhani. 376-381 [doi]
- Quick Verification of RSA SignaturesShay Gueron. 382-386 [doi]
- Region-Based Security Architecture for DTNMah-Rukh Fida, Muhammad Ali, Awais Adnan, Ameer Shakayb Arsalaan. 387-392 [doi]
- A New Heuristic Approach to Safeguarding Online Digital DataMohammad Eyadat, Soren Larsen. 393-396 [doi]
- A Confidential Electronic Result Transfer Using a Hybrid XML Security SchemeS. A. Onashoga, A. S. Sodiya. 397-402 [doi]
- CookieMonster: Automated Session Hijacking Archival and AnalysisJoshua J. Pauli, Patrick Henry Engebretson, Michael J. Ham, MarcCharles J. Zautke. 403-407 [doi]
- Threshold Cryptosystem Using Pell s EquationK. V. S. S. R. S. S. Sarma, G. Santhosh Krishna Kumar, P. S. Avadhani. 413-416 [doi]
- Eye Based HCI with Moving Keyboard for Reducing Fatigue EffectsKohei Arai, Ronny Mardiyanto. 417-422 [doi]
- Eye-based HCI with Full Specification of Mouse and Keyboard Using Pupil Knowledge in the Gaze EstimationKohei Arai, Ronny Mardiyanto. 423-428 [doi]
- A Heuristic Evaluation Experiment to Validate the New Set of Usability HeuristicsLlúcia Masip, Toni Granollers, Marta Oliva. 429-434 [doi]
- iDriver - Human Machine Interface for Autonomous CarsArturo Reuschenbach, Miao Wang, Tinosch Ganjineh, Daniel Göhring. 435-440 [doi]
- Comparative Study on Blink Detection and Gaze Estimation Methods for HCI, in Particular, Gabor Filter Utilized Blink Detection MethodKohei Arai, Ronny Mardiyanto. 441-446 [doi]
- Multilingual Highlighting CAPTCHASajad Shirali-Shahreza, Mohammad Shirali-Shahreza. 447-452 [doi]
- Usability in E-government SitesCristhy Jiménez Granizo, Pablo Lozada Yanez, Danilo Pastor Ramirez, Patricia Cordovez Machado. 453-458 [doi]
- Study on the Visualization Elements of Web Information Services: Focused on Researcher Network and Graphic ChartHanmin Jung, Mikyoung Lee, Pyung Kim, Do Wan Kim. 459-463 [doi]
- Rotoscopy-Handwriting Prototype: Using Computer Animation Technique to Assist the Teaching of Handwriting for Children with DyspraxiaMuhammad Fakri Othman, Wendy Keay-Bright. 464-469 [doi]
- Phone Segmentation for Japanese Triphthong Using Neural NetworksManoj Banik, Md. Modasser Hossain, Aloke Kumar Saha, Foyzul Hassan, Mohammed Rokibul Alam Kotwal, Mohammad Nurul Huda. 470-475 [doi]
- Pitch-Range Based Feature Extraction for Audio Surveillance SystemsBurak Uzkent, Buket D. Barkana. 476-480 [doi]
- Bit Error Rate Locked Loops Using Log-likelihood DecodersEric Rives, Laurie Joiner. 481-484 [doi]
- Online Learning Neural Network Control of Buck-Boost ConverterW. M. Utomo, A. Bakar, M. Ahmad, T. Taufik, R. Heriansyah. 485-489 [doi]
- Face Image Retrieval Using Genetic Algorithm and Bags of PixelsMohammad Ali Azimi Kashani, Mohammadreza Ramezanpour Fini. 490-493 [doi]
- Evaluation of Three Methods for MRI Brain Tumor SegmentationR. B. Dubey, Madasu Hanmandlu, Shantaram Vasikarla. 494-499 [doi]
- Information Management and Tracking of Drugs in Supply Chains within the Pharmaceutical IndustryRolf T. Wigand, Dinah M. Mande, Jerry D. Wood. 500-507 [doi]
- Speeding-up Fractal Color Image Compression Using Moments Features Based on Symmetry PredictorLoay E. George, Eman A. Al-Hilo. 508-513 [doi]
- Using Cross-cultural Features in Web Design PatternsCésar A. Collazos, Rosa Gil. 514-519 [doi]
- Iris Recognition Using Segmental Euclidean DistancesFarrukh Sayeed, Madasu Hanmandlu, A. Q. Ansari, Shantaram Vasikarla. 520-525 [doi]
- Electric Field Driven Magnetic Cellular Automata for Image ProcessingKameshwar Yadavalli, Alexander Khitun. 526-529 [doi]
- Color Segmentation Using Improved Mountain Clustering Technique Version-2Pooja Agrawal, Nishchal K. Verma, Saurabh Agrawal, Shantaram Vasikarla. 536-542 [doi]
- Fuzzy Information Extraction on OCR TextRay Pereda, Kazem Taghva. 543-546 [doi]
- Employing Frequent Pattern Mining for Finding Correlations between Tables in Relational DatabasesAli Rahmani, Mohamad Nagi, Mohammad Rifaie, Keivan Kianmehr, Mick J. Ridley, Reda Alhajj, Jon G. Rokne. 547-552 [doi]
- Pattern and Phonetic Based Street Name Misspelling CorrectionCihan Varol, John R. Talburt. 553-558 [doi]
- Securing IP-Multimedia Subsystem (IMS) against Anomalous Message Exploits by Using Machine Learning AlgorithmsM. Zubair Rafique, Zeeshan Shafi Khan, Muhammad Khurram Khan, Khaled Alghathbar. 559-563 [doi]
- A Relevancy Classification System for Web Search Results in Mobile DevicesMark S. Smith, Ray R. Hashemi. 564-567 [doi]
- A Model-Based Testing Using Scenarios and Constraints-based Modular Petri NetsHassan Reza, Scott D. Kerlin. 568-573 [doi]
- Flow Decomposition in Complex SystemsDavid Luper, Caner Kazanci, John R. Schramski, Hamid R. Arabnia. 574-579 [doi]
- Identification of Core, Semi-Core and Redundant Attributes of a DatasetRay R. Hashemi, Azita Bahrami, Mark S. Smith, Simon Young. 580-584 [doi]
- Relation Characterization Using Ontological ConceptsMuhammad Abulaish. 585-590 [doi]
- Quadripartite Graph-based Clustering of QuestionsMohan John Blooma, Alton Yeow-Kuan Chua, Dion Hoe-Lian Goh. 591-596 [doi]
- Multivariate Performance Analysis Methods - A Comparison StudyShafiq Ahmad, Mali Abdollahian, Babak Abbasi. 597-602 [doi]
- Performance Analysis in Non-normal Linear Profiles Using Gamma DistributionSeyedeh Zahra Hosseinifard, Babak Abbasi, Mali Abdollahian. 603-607 [doi]
- Testing Relational Database Using SQLLintHassan Reza, Kris Zarns. 608-613 [doi]
- Two-Step Sentence Extraction for Summarization of Meeting MinutesJae-Kul Lee, Hyun-Je Song, Seong-Bae Park. 614-619 [doi]
- An Online Digital Filters and Sound Effects Laboratory Utilizing NI SPEEDY 33 and LabVIEW DSP ModuleMichael Kyesswa, Amru Mbajja, Arthur Tumusiime Asiimwe, Cosmas Mwikirize, Paul Isaac Musasizi, Sandy Stevens Tickodri-Togboa, Andrew Katumba, Julius Butime. 620-625 [doi]
- Instructional Support for Teachers and Guided Feedback for Students in an Adaptive eLearning EnvironmentNadine Marcus, Dror Ben-Naim, Michael Bain. 626-631 [doi]
- An Adaptive and Personalized Ubiquitous Learning Middleware Support for Handicapped LearnersOlutayo Boyinbode, Antoine B. Bagula. 632-637 [doi]
- Parallel Matching Algorithms of Publish/Subscribe SystemJianfeng Qian, Jianwei Yin, Jinxiang Dong. 638-643 [doi]
- An Energy-Efficient Image Search Algorithm for Hybrid Delivery Model of Image Sensor NetworksQurban A. Memon, Hend Alqamzi. 644-648 [doi]
- Opportunistic Reclustering: An Approach to Improve the Network PerformanceSami J. Habib, Paulvanna Nayaki Marimuthu. 649-654 [doi]
- Nerve: A Lightweight Middleware for Quality-of-service Networked RoboticsJesus Martinez Cruz, Adrián Romero-Garces, Juan Pedro Bandera Rubio, Antonio Bandera Rubio. 655-660 [doi]
- M3DDVC: Multi-source Multicasting Using Multi-cores with Delay and Delay Variation Constraints on Overlay NetworksShankar M. Banik, Zachary C. Aardahl. 661-666 [doi]
- Designing Case Studies for the Voice Interactive ClassroomVíctor Manuel Álvarez García, María del Puerto Paule Ruíz, Moises Riestra Gonzalez, Juan Ramón Pérez Pérez. 667-672 [doi]
- Sensor Middleware to Support Diverse Data QualitiesPedro Javier del Cid, Nelson Matthys, Christophe Huygens, Sam Michiels, Wouter Joosen, Danny Hughes. 673-676 [doi]
- Enhance Resilience and QoS Awareness in Message Oriented Middleware for Mission Critical ApplicationsJinfu Wang, John Bigham, Jiayi Wu. 677-682 [doi]
- Efficient Scheduling Algorithms for MpSoC SystemsBisrat Tafesse, Ashwini Raina, Jaya Suseela, Venkatesan Muthukumar. 683-688 [doi]
- Design of a FPGA-Based Parallel Architecture for BLAST Algorithm with Multi-hits DetectionXinyu Guo, Hong Wang, Vijay Devabhaktuni. 689-694 [doi]
- Collabra: A Xen Hypervisor Based Collaborative Intrusion Detection SystemSaketh Bharadwaja, Weiqing Sun, Mohammed Niamat, Fangyang Shen. 695-700 [doi]
- Propagation Models for Multi-hop Wireless Networks in Ns-2 SimulatorBing Qi, Fangyang Shen. 701-706 [doi]
- Hybrid-way Cache for Mobile ProcessorsLakshmi Deepika Bobbala, Byeong Kil Lee. 707-712 [doi]
- An Adaptive Middleware Framework for Optimal Scheduling on Large Scale Compute ClustersArzu Gosney, John H. Miller, Ian Gorton, Christopher S. Oehmen. 713-718 [doi]
- Virtualization Technology and its Impact on Computer Hardware ArchitectureAmir Ali Semnanian, Jeffrey Pham, Burkhard Englert, Xiaolong Wu. 719-724 [doi]
- Modeling the Communications in the Multi-threaded System for Concurrent Wavelet Transform to Compress the ImageKamrul Hasan Talukder, Koichi Harada. 725-730 [doi]
- Modeling and Analyzing Real-Time Embedded Software for a Data Collection SystemSynara Rosa Gomes dos Santos, Melis Mendes Silva, Juliana Cristina Ribeiro da Silva, Luiz Alberto Vieira Dias, Adilson Marques da Cunha. 731-736 [doi]
- Recovering Use Case Diagrams from Object Oriented Code: An MDA-based ApproachClaudia Pereira, Liliana Martinez, Liliana Favre. 737-742 [doi]
- A High Level Approach for Generating Model s Graphical EditorsSuzy Temate, Laurent Broto, Alain Tchana, Daniel Hagimont. 743-749 [doi]
- Mapping the WRSPM Model to Model-Driven Architecture ModelsFábio Levy Siqueira, Paulo Sérgio Muniz Silva. 750-753 [doi]
- Early Availability Requirements Modeling Using Use Case MapsJameleddine Hassine. 754-759 [doi]
- A New Approach to Determine Number of Loop Iterations for WCET AnalysisSaeed Parsa, Mehdi Sakhaei-nia. 760-765 [doi]
- Applying MDA Approach to Create Graphical User InterfacesJuliano de Almeida Monte-Mor, Elton Oliveira Ferreira, Henrique Fernandes de Campos, Adilson Marques da Cunha, Luiz Alberto Vieira Dias. 766-771 [doi]
- Digital Control of Parallel-Connected DC-DC ConvertersTaufik Taufik, Daniel Forbes, Dale Dolan, Ratna Ika Putri. 772-776 [doi]
- A Novel Flash Fast-Locking Digital PLL: VHDL-AMS and Matlab/Simulink Modeling and SimulationsMahmoud Fawzy Wagdy, Anurag Nannaka, Rajeev K. N. Channegowda. 777-784 [doi]
- CMOS 1.6 GHz Bandwidth 12 Bit Time Interleaved Pipelined ADCSaiyu Ren, Ray Siferd. 785-790 [doi]
- Simulated Annealing Based Hierarchical Q-Routing: A Dynamic Routing ProtocolAntonio Mira Lopez, Douglas R. Heisterkamp. 791-796 [doi]
- Development of Analysis Rules for Bangla Part of Speech for Universal Networking LanguageManoj Banik, Md. Rashiduzzaman Rasel, Aloke Kumar Saha, Foyzul Hassan, Mohammed Firoz Mridha, Mohammad Nurul Huda. 797-802 [doi]
- Self-Stabilization in Hierarchically Structured Energy MarketsJörg Lässig, Benjamin Satzger, Oliver Kramer. 803-809 [doi]
- Priority Encoding Scheme for Solving Permutation and Constraint Problems with Genetic Algorithms and Simulated AnnealingRonald J. Nowling, Holger Mauch. 810-815 [doi]
- Artificial Intelligence Design in a Multiplayer Online Role Playing GameChristopher A. Ballinger, David A. Turner, Arturo I. Concepcion. 816-821 [doi]
- Using Fuzzy theory to Explore the Appropriateness of Customer-Oriented E-Service CooperationWei-Lun Chang, Yu Jyun Lin. 828-832 [doi]
- Investigating the Influence of the Landscape Preference of Blogs, User Satisfactory and Behavioral IntentionYi-Wen Liao, Yi-Shun Wang, Tzung-I Tang, Yi-Wen Tian. 833-838 [doi]
- Patent Service Self-Organizing MapsAviv Segev, Jussi Kantola. 839-844 [doi]
- An Analysis of Customer Contribution in a BankShari S. C. Shang, Ya-Ling Wu. 845-850 [doi]
- A System Dynamics Approach for Modeling Service RecoveryYen-Hao Hsieh. 851-858 [doi]
- EasyWheel - A Mobile Social Navigation and Support System for Wheelchair UsersChristian Menkens, Julian Sussmann, Miriam Al-Ali, Emanuel Breitsameter, Jelena Frtunik, Tobias Nendel, Tobias Schneiderbauer. 859-866 [doi]
- No Cue, No Clue? Understanding Information Interaction in Social Bookmarking ServicesHsia-Ching Chang, Chen-Ya Wang. 867-872 [doi]
- SPLASH: Perspectives on Mobile Socializing, Playing and Content SharingKhasfariyati Razikin, Keng Tiong Tan, Dion Hoe-Lian Goh, Alton Yeow-Kuan Chua, Chei Sian Lee. 873-878 [doi]
- Transmediated Magic: Sociality in Wizard RockJennifer Terrell. 879-883 [doi]
- Dynamic Item Recommendation by Topic Modeling for Social NetworksSang-Su Lee, Tagyoung Chung, Dennis McLeod. 884-889 [doi]
- The Impact of Mobile Phones on the Life of Farmers in LebanonSamir N. Hamade. 890-895 [doi]
- Swarming on Symbolic Structures: Guiding Self-Organizing Search with Domain KnowledgeH. Van Dyke Parunak. 896-901 [doi]
- Patterns of Self-Organizing Agile Security for Resilient Network Situational Awareness and SensemakingRick Dove. 902-908 [doi]
- The Story Behind Network DefenseKari J. Lippert, Robert A. Seger. 909-913 [doi]
- System-Aware Cyber SecurityRick A. Jones, Barry M. Horowitz. 914-917 [doi]
- Ant-Based Cyber SecurityJereme N. Haack, Glenn A. Fink, Wendy M. Maiden, A. David McKinnon, Steven J. Templeton, Errin W. Fulp. 918-926 [doi]
- Formal Methods for Modeling Socio-technical Innovation between AdversariesRussell Cameron Thomas. 927-936 [doi]
- Situational Awareness as a Measure of Performance in Cyber Security Collaborative WorkAshish Malviya, Glenn A. Fink, Landon Sego, Barbara Endicott-Popovsky. 937-942 [doi]
- Alternative Security MetricsJennifer L. Bayuk. 943-946 [doi]
- Can a Theory that Integrates the Natural Systems Sciences Help Systems Engineering of Defense against Security Threats?Len Troncale. 947-952 [doi]
- A Case for Multi-service Overlay Multicast Networks Based on Auction MechanismMohammad Hossein Rezvani, Morteza Analoui. 953-958 [doi]
- Peer-to-Peer Enterprise Data Backup over a Ren CloudJaved I. Khan, Omar Y. Tahboub. 959-964 [doi]
- Wireless Embedded Control System for Atomically Precise ManufacturingYasser Khan, John Randall. 965-969 [doi]
- Detour Admitting Short PathsLaxmi Gewali, Reshma Koganti. 970-975 [doi]
- Sublinear Space Real-Time Turing Machines Cannot CountStefan D. Bruda. 976-978 [doi]
- A Stable Election Protocol Based on an Unreliable Failure Detector in Distributed SystemsSung-Hoon Park. 979-984 [doi]
- Use of Multi Threaded Asynchronous DNA Sequence Pattern Searching Tool to Identifying Zinc-Finger-Nuclease Binding Sites on the Human GenomeKris Erodula, Christian Bach, Hassan Bajwa. 985-991 [doi]
- Towards a Unified Trust Model for M-commerce SystemsWafaa Saber Hamed, Haitham S. Hamza, Imane Aly Saroit. 992-997 [doi]
- Embedded Database Management PerformanceVenkata N. Ramarekha Patchigolla, John A. Springer, Kyle Lutes. 998-1001 [doi]
- Efficient System-Level Remote Checkpointing Technique for BLCRJason Cornwell, Angkul Kongmunvattana. 1002-1007 [doi]
- Reversible Function Synthesis of Large Reversible Functions with No Ancillary Bits Using Covering Set PartitionsMaher Hawash, Marek A. Perkowski, Steve Bleiler, John Caughman, Amjad Hawash. 1008-1013 [doi]
- Iterative Development of an Application to Support Nuclear Magnetic Resonance Data Analysis of ProteinsHeidi J. C. Ellis, Ronald J. Nowling, Jay Vyas, Timothy O. Martyn, Michael R. Gryk. 1014-1020 [doi]
- A Fuzzy Expert System to Diagnose Diseases with Neurological Signs in Domestic AnimalMahdi Jampour, Mohsen Jampour, Maryam Ashourzadeh, Mahdi Yaghoobi. 1021-1024 [doi]
- Architectures for Dependable Software SystemsVasudevan Janarthanan, Abdelouahed Gherbi. 1025-1030 [doi]
- Quantum Division Circuit Based on Restoring Division AlgorithmAlireza Khosropour, Hossein Aghababa, Behjat Forouzandeh. 1037-1040 [doi]
- Embedded Network Firewall on FPGARaouf Ajami, Anh Dinh. 1041-1043 [doi]
- Toward a Tailored Modeling of Non-Functional Requirements for Telecommunication SystemsMehrdad Saadatmand, Antonio Cicchetti, Diarmuid Corcoran, Mikael Sjödin. 1044-1045 [doi]
- Problem Based Learning a Practical Approach for Software Engineering Interdisciplinary TeachingMelis Mendes Silva, Synara Rosa Gomes dos Santos, Juliana Cristina Ribeiro da Silva, Luiz Alberto Vieira Dias, Adilson Marques da Cunha. 1046-1047 [doi]
- Organizing Extracted Data: Using Topic MapsKishan Dharavath, Sri Khetwat Saritha. 1048-1049 [doi]
- Remote Data Visualization through WebSocketsAndrew Wessels, Mike Purvis, Jahrain Jackson, Syed (Shawon) Rahman. 1050-1051 [doi]
- A Feasibility Study on the Adoption of e-Learning for Middle School Teachers Continuing Education in ChinaLi Zhang. 1052-1053 [doi]
- Enhancement of Discrete Wavelet Transform (DWT) for Image Transmission over InternetKamrul Hasan Talukder, Koichi Harada. 1054-1055 [doi]
- A Decision Support System for Hypertext-Based Teaching and Learning SystemsFausto A. Jacques, Luis R. Corral, Gerardo Rodriguez. 1056-1057 [doi]
- Co-existence of Cloud and Grid: A Case Study in Service Oriented Grid GARUDAVineeth Simon Arackal, B. Arunachalam, Payal Saluja, B. B. Prahlada Rao. 1058-1059 [doi]
- Agile Practices in a Small-Scale, Time-Intensive Web Development ProjectXuesong (Sonya) Zhang, Bradely Dorn. 1060-1061 [doi]
- Online Database for Kolkata Transport SystemAnirban Ghosh, Navarun Gupta. 1062-1063 [doi]
- A Context-Source Abstraction Layer for Context-aware MiddlewareWeijie Chu, Weiping Li, Tong Mo, Zhonghai Wu. 1064-1065 [doi]
- Usability of Web Interfaces on Mobile DevicesAndrew Wessels, Mike Purvis, Syed (Shawon) Rahman. 1066-1067 [doi]
- Access Specifiers Model for Data Security in Object Oriented DatabasesMansaf Alam. 1068-1069 [doi]
- Geo-Encryption - A New Direction to Secure Traditional SSL VPNSuresh V. Limkar, Rakesh Kumar Jha, Shilpa Pimpalkar, Santosh Darade. 1070-1071 [doi]
- An Implementation of AODV Testbed with Multi-metricsJangkyu Yun, Byung-hwa Lee, Young-mi Baek, Junhyung Kim, Jihun Han, Seungyong Oh, Seonhwan Hwang, Kijun Han. 1072-1073 [doi]
- On the Impact of Network Parameters on the Efficiency of Spectrum Allocation in Cognitive Radio NetworksAbdelbaset S. Hamza. 1074-1075 [doi]
- Requirements Development Life Cycle with Respect to Geographically Distributed Stakeholders: The V ModelAzeem Ahmad, Magnus Goransson, Sushma Joseph Kolla, Aamir Shahzad, Qummer ul Arfeen, Zaki Arshad. 1076-1077 [doi]
- Building SCAAT-Industry Relationships via Disaster Recovery PlanningWajee Chookittikul, Kiattisak Kittitarworanon, Maytinee Sri-in, Aungsuda Ab-aim. 1078-1079 [doi]
- Channel Estimation and Symbol Detection in AWGN Channel for New Structure of CDMA SignalsSahar Naserzadeh, Mehrdad Jalali. 1080-1081 [doi]
- The Exploration of the Core Asset Library in the Software Product LineXinyu Zhang, Li Zheng, Yiqian Lu. 1082-1083 [doi]
- Domain and Keyword Specific Data Extraction from Invisible Web DatabasesSri Khetwat Saritha, Kishan Dharavath. 1084-1085 [doi]
- Transforming of Construction Contract Administration: Data Warehouse ModelingHeap Yih Chong, Rosli Mohamad Zin. 1086-1087 [doi]
- Whither Mobile Social Application Prototypes? Implications for Development and ResearchThara Ravindran, Alton Yeow-Kuan Chua, Dion Hoe-Lian Goh. 1088-1089 [doi]
- Content Based Color Image Classification using SVMSaurabh Agrawal, Nishchal K. Verma, Prateek Tamrakar, Pradip Sircar. 1090-1094 [doi]
- Application of Neuro-Statistic Model on a Time Series DataSatyendraNath Mandal, J. Pal Choudhury, Debasis Mazumdar, Dilip De, S. R. Bhadra Chaudhury. 1095-1096 [doi]
- Using the Eye Tracking Technique to Evaluate Non-Linear NarrativesCarina S. González-González, Victor Socas Guerra. 1097-1098 [doi]
- Attracting K12 Students with Standardized Outreach ActivitiesJesús Ubaldo Quevedo-Torrero. 1099-1100 [doi]
- Some Investigations for Solving Constrained Optimization Problems using Adiabatic Quantum ComputationAshish Mani, Chellapilla Patvardhan. 1101-1102 [doi]