Abstract is missing.
- A Multi-Layer Approach for Failure Detection in a Manufacturing System Based on Automation AgentsWilfried Lepuschitz, Václav Jirkovský, Petr Kadera, Pavel Vrba. 1-6 [doi]
- A novel violent videos classification scheme based on the bag of audio words features [Document Suppressed in IEEE Xplore]Lei Li. 7-13 [doi]
- Region of Interest Localization of Cardiac Structure from Cine MRI ImagesMarwa M. A. Hadhoud, Mohamed I. Eladawy, Ahmed Farag Seddik. 14-17 [doi]
- A Context Space Model for Detecting Anomalous Behaviour in Video SurveillanceArnold Wiliem, Vamsi Krishna Madasu, Wageeh W. Boles, Prasad K. D. V. Yarlagadda. 18-24 [doi]
- Image Recovery by Recursive Spline Smoothing and Application to Recognition of Compound StructuresAlexandre Ivánovich Grebénnikov. 25-29 [doi]
- Wavelet Based Region Duplication Forgery DetectionYang Wang, Kaitlyn Gurule, Jacqueline Wise, Jun Zheng. 30-35 [doi]
- Rank Level Integration of Face Based BiometricsAmioy Kumar, Madasu Hanmandlu, Shantaram Vasikarla. 36-41 [doi]
- Probability-based Imputation Method for Fuzzy Cluster Analysis of Gene Expression Microarray DataThanh Le, Tom Altman, Katheleen J. Gardiner. 42-47 [doi]
- Castalia Network Animator (CNA): A Visualization Tool for Castalia Wireless Sensor Network SimulatorAdib Rastegarnia, Vahid Solouk. 48-53 [doi]
- An Efficient Geo-aware Peer-to-Peer Resource Discovery and Sharing Scheme in Vehicular Ad-hoc NetworksYu-Hong Lee, Chyi-Ren Dow, Lu-Hui Huang, Ya-Chen Lin, Shiow-Fen Hwang, Wei-Bin Lee. 54-59 [doi]
- A Unicast MANET Routing Protocol to Simultaneously Minimize the Stability-Hop Count Tradeoff and End-to-End DelayNatarajan Meghanathan. 60-64 [doi]
- MASID: Multi-Agent System for Intrusion Detection in MANETLeila Mechtri, Fatiha Djemili Tolba, Salim Ghanemi. 65-70 [doi]
- Determining Coverage Area Using Voronoi Diagram Based on Local Information for Wireless Mesh NetworksGo Hasegawa, Shoichi Takemori, Yoshiaki Taniguchi, Hirotaka Nakano. 71-76 [doi]
- Spectrum Detection in Cognitive Networks by Minimizing Hidden Terminal ProblemYenumula B. Reddy. 77-82 [doi]
- Finding Time and Buffer Preserving Routes in Gaussian Intermittent NetworksOmar Y. Tahboub, Javed I. Khan. 83-88 [doi]
- An Open-Source Sandbox for Increasing the Accessibility of Functional Programming to the Bioinformatics and Scientific CommunitiesMatt Fenwick, Colbert Sesanker, Martin R. Schiller, Heidi J. C. Ellis, Michael L. Hinman, Jay Vyas, Michael R. Gryk. 89-94 [doi]
- Planarization of Geographic Cluster-based Overlay Graphs in Realistic Wireless NetworksEmi Mathews. 95-101 [doi]
- Towards Transparent Anonymity for User-controlled Servers Supporting Collaborative ScenariosMohamed Bourimi, Marcel Heupel, Benedikt Westermann, Dogan Kesdogan, Marc Planagumà, Rafael Giménez, Fatih Karatas, Philipp Schwarte. 102-108 [doi]
- Recognising the Activities of Low Entropy Mobile People Using Wireless Proximity DataMuhammad Awais Azam, Jonathan Loo, Aboubaker Lasebae, Sardar Kashif Ashraf Khan, Waleed Ejaz. 109-114 [doi]
- A Large Scale Evolutionary Analysis of the Internet Autonomous System NetworkCraig Stewart, Javed I. Khan. 115-120 [doi]
- An Efficient Approach for Finding Near Duplicate Web Pages Using Minimum Weight Overlapping MethodShine N. Das, Midhun Mathew, Pramod K. Vijayaraghavan. 121-126 [doi]
- Novel Cloud Service for Improving World Universities RankingShu-Ming Hsieh, Ssu-An Lo, Chiun-Chieh Hsu, Wei-Chao Lin. 127-131 [doi]
- Tree-based Search Algorithm for Web Service Composition in SaaSChing-Seh Wu, Ibrahim Khoury. 132-138 [doi]
- Aspect Algebra: The Operational Semantics for Aspect Oriented SoftwareAnirban Sarkar, Narayan C. Debnath. 139-144 [doi]
- Semantic Web: A Topic Specific SearchKishan Dharavath, Sri Khetwat Saritha. 145-148 [doi]
- MEBPCM: A Method for Evaluating Business Process Conceptual Models. A Study CaseNarayan C. Debnath, Carlos Salgado, Mario Peralta, Mario Beron, Daniel Riesco, German Montejano. 149-154 [doi]
- A Mobile Data Analysis Framework for Environmental Health Decision SupportWan D. Bae, Shayma Alkobaisi, Sada Narayanappa, Cheng C. Liu. 155-161 [doi]
- A Design of Mutual Exclusion Protocol in Cellular Wireless NetworksSung-Hoon Park, Seoun-Hyung Lee. 162-167 [doi]
- Using Two-tier Bitwise Interest Oriented QRP Data Structure for High Clustering through Interest Similarity in SWB P2P SystemsTong-Ming Lim, Yong Liang Choong, Angela Lee Siew Hoong. 168-174 [doi]
- The Use of Knowledge Management Systems to Support Knowledge Creation and Sharing Activities among Employees - A Survey Based Study of IT Shared Services CompanyAngela Lee Siew Hoong, Tong-Ming Lim. 175-181 [doi]
- A Constraint-Driven Business Object Model for Service-Based Business ProcessesFarhana H. Zulkernine, Piergiorgio Bertoli, Marco Pistore, Andreas Friesen, Jens Lemcke, Bernhard Thimmel, Otfried von Geisau. 182-188 [doi]
- Automated Security Analysis of Dynamic Web Applications through Symbolic Code ExecutionGiovanni Agosta, Alessandro Barenghi, Antonio Parata, Gerardo Pelosi. 189-194 [doi]
- New Hashing-Based Multiple String Pattern Matching AlgorithmsChouvalit Khancome, Veera Boonjing. 195-200 [doi]
- Searching for the Optimal Proof Schedule in a Proof-Carrying Survivability Paradigm - A Dynamic, Interactive ApproachYanjun Zuo, John Babin. 201-208 [doi]
- An Empirical Study on the Impact of an Idle Limit in Distributed SystemsKarl Smith, Jeffrey M. Galloway, Susan V. Vrbsky. 209-213 [doi]
- HyBuM: Hybrid Energy Efficient Architecture for Mobile Storage SystemsMais Nijim, Young Lee, Kiranmai Bellam. 214-220 [doi]
- Piezoelectric Converter for Wind Energy HarvestingTaufik Taufik, Jameson Thornton, Dale Dolan. 221-224 [doi]
- Harmonics and Dynamic Response of a Virtual Air Gap Variable ReactorDale Dolan, Peter W. Lehn. 225-231 [doi]
- An Empirical Study of Power Aware Load Balancing in Local Cloud ArchitecturesJeffrey M. Galloway, Karl Smith, Jeffrey Carver. 232-236 [doi]
- API Backward Compatibility Testing Using VSTSJames Gagnon, Corey Weathers, Marty Wiedmeyer, Phani Koppineedi, Raghavender Anegouni, Steve Schon, Xin Bai. 237-241 [doi]
- Using Test Cases to Size Systems: A Case StudyAdam Schwartz. 242-246 [doi]
- Using Reverse-Engineered Test-Based Models to Generate More Tests: Where is the Sense in That?Teemu Kanstrén, Éric Piel, Hans-Gerhard Gross. 247-252 [doi]
- A Hybrid System for Analyzing Very Large GraphsJames D. McCaffrey. 253-257 [doi]
- Software Testing with Budget ConstraintsSoumen Maity. 258-262 [doi]
- A Comparative Evaluation of Unit Testing Techniques on a Mobile PlatformSelin Benli, Anthony Habash, Andy Herrmann, Tyler Loftis, Devon Simmonds. 263-268 [doi]
- Applying Test-First and Parallel Processing Techniques to ERP Data ConversionTalukdar S. Asgar, Mohammed Akour, Tariq M. King. 269-274 [doi]
- The Application of the Component-based Product Line in the Data Processing DomainXinyu Zhang, Rui Wang. 275-280 [doi]
- Generator Flow: An XML Configurable Design Pattern Used in NoGAPPer Karlström, Wenbiao Zhou. 281-286 [doi]
- Protecting Intellectual Property by Certified Component Quality DescriptionsHenning Groenda. 287-292 [doi]
- Loan System in Brazilian Financial Institution - A SOA ApplicationClaudio Gonçalves Bernardo. 293-298 [doi]
- System Development for Violence Mapping in a Social Network in Real TimeClaudio Gonçalves Bernardo, William Bragagnollo Montini, Fernanda Naomi Yamato, Gerson Pereira Domingues, Felipe D'Oliveira. 299-305 [doi]
- An MDA-Based Approach for WS Composition Using UML ScenariosAyoub Sabraoui, Abdeslam Ennouaary, Ismaïl Khriss, Mohammed El Koutbi. 306-313 [doi]
- Challenges Faced While Simultaneously Implementing CMMI and Scrum: A Case Study in the Tax Preparation Software IndustryJames R. Miller, Hisham M. Haddad. 314-318 [doi]
- Incorporation of Aspects of Systems Security and Software Security in Senior Capstone ProjectsNatarajan Meghanathan, Hyunju Kim, Loretta A. Moore. 319-324 [doi]
- Developing a Smart Grids System as a PBL with Agile Method on Computer Engineering CoursesCaio Henrique Coutinho, Johnny Cardoso Marques, Sarasuaty Megume Hayashi Yelisetty, Samoel Mirachi, Alexandre Lima Possebon Ribeiro, Marcelo Amaral da Silva, Adilson Marques da Cunha, Luiz Alberto Vieira Dias. 325-330 [doi]
- Developing Rapidly Expandable Data-driven Software Systems Based on Multitier Architecture: Examination of the Development of Modules for Content Management Systems Used to Construct Web Portals and Virtual CommunitiesJumie Yuventi, José Cortés. 331-334 [doi]
- Strategic Analysis Towards Deriving Competitive Advantage with the Use of FOSS: The Case of a South African UniversityKehinde Dehinbo, Pieter Pretorius, Johnson Dehinbo. 335-342 [doi]
- Facilitating Agile Software Development with Lean Architecture in the DCI ParadigmTomohiro Hayata, Jianchao Han, Mohsen Beheshti. 343-348 [doi]
- A Tool for Teaching RiskSantosh Rajendran, Kevin Gary, Harry Koehnemann. 349-354 [doi]
- Perceived PrivacySabah Al-Fedaghi. 355-360 [doi]
- Data Outsourcing in Cloud Environments: A Privacy Preserving ApproachTummalapalli J. V. R. K. M. K. Sayi, R. K. N. Sai Krishna, Ravi Mukkamala, Pallav K. Baruah. 361-366 [doi]
- Connect with Your Friends and Share Private Information SafelyArijit Ukil. 367-372 [doi]
- Location Privacy for Vehicle-to-Grid Interaction through Battery ManagementMark Stegelmann, Dogan Kesdogan. 373-378 [doi]
- CIDS: A Framework for Intrusion Detection in Cloud SystemsHisham A. Kholidy, Fabrizio Baiardi. 379-385 [doi]
- Security Analysis Concerning the Random Numbers of Threshold Ring SignaturesKaibin Huang, Raylin Tso. 386-391 [doi]
- Data Hiding Techniques in Steganography Using Fibonacci and Catalan NumbersNikolaos Aroukatos, Kostas Manes, Stelios Zimeras, Fotis Georgiakodis. 392-396 [doi]
- CIDD: A Cloud Intrusion Detection Dataset for Cloud Computing and Masquerade AttacksHisham A. Kholidy, Fabrizio Baiardi. 397-402 [doi]
- When the Software Goes Beyond its Requirements - A Software Security PerspectiveJing-Chiou Liou. 403-408 [doi]
- Design and Implementation of an Open Network and Host-Based Intrusion Detection Testbed with an Emphasis on Accuracy and RepeatabilityMichael J. Shevenell, Robert F. Erbacher. 409-416 [doi]
- Distributed Sensor Objects for Intrusion Detection SystemsRobert F. Erbacher, Steve E. Hutchinson. 417-424 [doi]
- A Reversible Secret Sharing Scheme Based on GF(2^8)Dong-hyun Kim, Gil-Je Lee, Min Ho Park, Kee-Young Yoo. 425-430 [doi]
- Using Model-Based Development as Software Low-Level Requirements to Achieve Airborne Software CertificationJohnny Cardoso Marques, Sarasuaty Megume Hayashi Yelisetty, Luiz Alberto Vieira Dias, Adilson Marques da Cunha. 431-436 [doi]
- Modeling Security Aspects in Distributed Real-Time Component-Based Embedded SystemsMehrdad Saadatmand, Thomas Leveque. 437-444 [doi]
- A Computational Teaching Approach through the Use of a Narrative Technique and a Comic StripMario Masayuki Takeda, Francisco Supino Marcondes, Ítalo Santiago Vega, Elizabete Briani Macedo Gara, Luciano Gaspar. 445-451 [doi]
- A Formal Control Model for Risks Management within Software ProjectsFelipe Rafael Motta Cardoso, Paulo Marcelo Tasinaffo, Denis Avila Montini, Danilo Douradinho Fernandes, Adilson Marques da Cunha, Luiz Alberto Vieira Dias. 452-457 [doi]
- Multilevel Graph Partitioning Scheme to Solve Traveling Salesman ProblemRana Atif Ali Khan, Muhammad Umair Khan, Muneeb Iqbal. 458-463 [doi]
- Implementation of a Wavelength Division Multiplexing and Bidirectional Optic Fiber Link iLabDoreen Orishaba, Raymond Besiga, Arthur Tumusiime Asiimwe, Sandy Stevens Tickodri-Togboa, Paul Isaac Musasizi, Cosmas Mwikirize. 464-465 [doi]
- Behavior Modeling of Programmable Metallization Cell Using Verilog-ADarshan A. Dimplu, Fei Wang. 466-471 [doi]
- A Novel SAR Fast-Locking Digital PLL: SPICE Modeling and SimulationsMahmoud Fawzy Wagdy, Robin Sur. 472-477 [doi]
- Design and Simulation of Multiple-Input Single-Output DC-DC ConverterTaufik Taufik, Taffy Wong, Owen Jong, Dale Dolan. 478-483 [doi]
- Design of a FPGA-based Timing Sharing Architecture for Sound Rendering ApplicationsTan Yiyu, Yasushi Inoguchi, Yukinori Sato, Yukio Iwaya, Hiroshi Matsuoka, Makoto Otani, Takao Tsuchiya. 484-489 [doi]
- A High Performance Agent-Based System for Reporting Suspected Adverse Drug ReactionsYanqing Ji, Fangyang Shen, John Tran. 490-495 [doi]
- Performance-Sensitivity-based Workload Tailoring for Effective Design ExplorationJie Luo, Yilin Zhang, Saarvaani Vadlamani, Byeong Kil Lee. 496-501 [doi]
- iBATD: A New Routing Metric for Multi-radio Wireless Mesh NetworksBing Qi, Fangyang Shen, Syed Raza. 502-507 [doi]
- A Performance Based QoS Aware Resource Brokering Framework for the GridB. Asvija, K. Kalaiselvan, M. Ateet, R. Sridharan, S. R. Krishnamurthy. 508-515 [doi]
- A Hardware-Software Integrated Design for a High-Performance Java ProcessorAnthony S. Fong, Chihang Yau, Yijun Liu. 516-521 [doi]
- An IT-based System to Facilitate Architectural DesignKamyar Ardekani, Amirreza Ardekani. 522-527 [doi]
- Virtual Machine and Bytecode for Optimization on Heterogeneous SystemsKerry A. Seitz, Mark C. Lewis. 528-533 [doi]
- Loopback Virtual Channel Router Architecture for Network on ChipJaya Suseela, Venkatesan Muthukumar. 534-539 [doi]
- Simulating Online Consumer Satisfaction Using Fuzzy Cognitive MappingF. Tabatabayi, Babak Akhgar, S. M. R. Nasserzadeh, Simeon J. Yates. 540-547 [doi]
- XML Querying Using Data Logic Structures and PrimitivesJesús Ubaldo Quevedo-Torrero, Geno Erickson. 548-553 [doi]
- Watermarking XML Structures Using Multi-valued DependenciesJesús Ubaldo Quevedo-Torrero, Geno Erickson. 554-559 [doi]
- Predicting Future Climate Using Algae SedimentationJasdeep Natt, Ray R. Hashemi, Azita Bahrami, Mahmood Bahar, Nicholas Tyler, Jay Hodgson. 560-565 [doi]
- A Secure Software Architecture for Mobile ComputingHassan Reza, Narayana Mazumder. 566-571 [doi]
- Context-Based Testing of COTs Using Petri NetsHassan Reza, Liang Cheng. 572-577 [doi]
- Brain Imaging for Diagnosis of Schizophrenia: Challenges, Successes and a Research Road MapJack O. Shelton, Hamid R. Arabnia. 578-583 [doi]
- Successful Forecasting for Knowledge Discovery by Statistical MethodsYas A. Alsultanny. 584-588 [doi]
- The Building of a Large Government Digital LibraryKazem Taghva. 589-593 [doi]
- Student Perceptions of Learning Management Systems in a University Environment: Yahoo Groups vs BlackboardSamir N. Hamade. 594-599 [doi]
- A Comprehensive Undergraduate Application Security ProjectPremchand Uppuluri, Jeff Pittges. 600-607 [doi]
- Useful Compiler Directives for Teaching ProgrammingJohn T. Minor, Laxmi Gewali. 608-611 [doi]
- The Design and Implementation of an Antivirus Software Advising SystemEugene Chamorro, Jianchao Han, Mohsen Beheshti. 612-617 [doi]
- Data Hiding Method Based on Dyadic Wavelet Transformation Improving Invisibility of Secret Images on Circulation Images by Means of Run-Length Coding with Permutation Matrix Based on Random NumberKohei Arai. 618-622 [doi]
- A Non-blind Digital Image Watermarking Method Based on the Dual-tree Complex Discrete Wavelet Transform and Interval ArithmeticTeruya Minamoto, Ryuji Ohura. 623-628 [doi]
- A New Variable-Band Filter Design Method for the Discrete Wavelet TransformZhong Zhang, Hiroshi Toda, Takashi Imamura, Tetsuo Miyake. 629-634 [doi]
- Efficient Securing of Iris Image Template by Using Grayscale Level Incremented/Decremented MethodMaqsood Mahmud, Muhammad Waqar, Abdulrahman Abdulkarim Mirza, Abdul Hanan Bin Abdullah. 635-639 [doi]
- Visualization of Digital Audio Watermarking Based on the Dyadic Wavelet TransformTeruya Minamoto, Yuji Ogata, Masahiro Sawai. 640-645 [doi]
- Human Body Parts Tracking Using Torso Tracking: Applications to Activity RecognitionAras Dargazany, Mircea Nicolescu. 646-651 [doi]
- Who-Works-With-Whom (WWWW): Web-based Directed Work Relationship Network for Maximizing Organizational Efficiency in EnterprisesXinyu Zhang, Xiangyu Zhang, Yuhao Luo. 652-655 [doi]
- Gait Recognition Method Based on Wavelet Transformation and its Evaluation with Chinese Academy of Sciences (CASIA) Gait Database as a Human Gait Recognition DatasetKohei Arai, Rosa Andrie. 656-661 [doi]
- Usability Heuristics for Touchscreen-based Mobile DevicesRodolfo Inostroza, Cristian Rusu, Silvana Roncagliolo, Cristhy Jiménez, Virginia Rusu. 662-667 [doi]
- Extraction of Local Features for Tri-Phone Based Bangla ASRMohammed Rokibul Alam Kotwal, Tasneem Halim, Md. Mehedi Hassan Almaji, Imtiaz Hossain, Mohammad Nurul Huda. 668-673 [doi]
- An Active Cinema Experience: A Study on User Expectation and Perceived Gratifications of a Real-time Animated Film SystemYun-Ke Chang, Mark Chavez, Miguel A. Morales Arroyo, Jaime Jimenez-Guzman. 674-679 [doi]
- Wireless Sensors Network in the Efficient Management of Greenhouse CropsAlejandra Jiménez, Santiago Jiménez, Pablo Lozada Yanez, Cristhy Jiménez. 680-685 [doi]
- Development of Dynamic Vocalization Customer Service Software for Multiple Languages for Telephone EnvironmentS. Kami Makki, Charles Williams. 686-689 [doi]
- Defining Virtual Worlds Usability HeuristicsRoberto Muñoz-Soto, Virgínia Chalegre. 690-695 [doi]
- Developing a Touchscreen-based Domotic Tool for Users with Motor DisabilitiesJuan Pablo Cofré, Gabriel Moraga, Cristian Rusu, Ivan Mercado, Rodolfo Inostroza, Cristhy Jiménez. 696-701 [doi]
- Health Intelligence Model for Evaluation of Social Media OutcomesJoseph M. Woodside. 702-706 [doi]
- User-centric Trust-based RecommendationSimon Meyffret, Lionel Médini, Frédérique Laforest. 707-713 [doi]
- Do Videowikis on the Web Support Better (Constructivist) Learning in the Basics of Information Systems Science?Pekka Makkonen. 714-719 [doi]
- A Survey and Typology of Human Computation GamesEi Pa Pa Pe-Than, Dion Hoe-Lian Goh, Chei Sian Lee. 720-725 [doi]
- Sharing in Social News Websites: Examining the Influence of News Attributes and News SharersLong Ma, Chei Sian Lee, Dion Hoe-Lian Goh. 726-731 [doi]
- Performance Evaluation of a Countering Method to Social Bookmarking Pollution Based on Degree of Bookmark SimilarityHiroyuki Hisamatsu, Takahiro Hatanaka. 732-737 [doi]
- Scalable Link Prediction in Social Networks Based on Local Graph CharacteristicsAlexis Papadimitriou, Panagiotis Symeonidis, Yannis Manolopoulos. 738-743 [doi]
- Cultural Impact on e-service Use in Saudi Arabia: Results from Focus GroupsMajid Aldraehim, Sylvia L. Edwards, Jason Watson. 744-750 [doi]
- Development and Implementation of a Chat Bot in a Social NetworkSalto Martinez Rodrigo, Jacques García Fausto Abraham. 751-755 [doi]
- An Empirical Study on Forecasting Using Decomposed Arrival Data of an Enterprise Computing SystemLinh Bao Ngo, Amy W. Apon, Doug Hoffman. 756-763 [doi]
- An Investigation Into Feature Selection for Oncological Survival PredictionDmitry Strunkin, Brian Mac Namee, John D. Kelleher. 764-768 [doi]
- Quantum Blind Computation with Teleportation-based ComputationNai-Hui Chia, Chia-Hung Chien, Wei-Ho Chung, Sy-Yen Kuo. 769-774 [doi]
- Semantic Information Modeling for Emerging Applications in Smart GridQunzhi Zhou, Sreedhar Natarajan, Yogesh Simmhan, Viktor K. Prasanna. 775-782 [doi]
- An Architecture for Mining and Visualization of U.S. Higher Educational DataLinh Bao Ngo, Vijay Dantuluri, Michael J. Stealey, Stanley C. Ahalt, Amy W. Apon. 783-789 [doi]
- Business Escalation Management: A Case Study - Resolution of a Business Relationship DeterrentK. S. Pradeepkumar, Rose Neena Tom. 790-795 [doi]
- Fostering the User Interface Acceptance in Customer Relationship Management: A Multimedia-aided ApproachMutlaq B. Alotaibi, Dimitrios I. Rigas. 796-801 [doi]
- Selection of Suitable Evaluation Function Based on Win/Draw Parameter in OthelloBasit Shahzad, Lolowah R. Alssum, Yousef Al-Ohali. 802-806 [doi]
- Network Management System for Quantum Key DistributionPiya Techateerawat. 807-808 [doi]
- A Scheduling Algorithm for Downloading Data from RSU Using Multicast TechniqueSana Sahebgharani, Mohammad Shahverdy. 809-814 [doi]
- Software Security: The Dangerous AfterthoughtCurtis Steward, Luay A. Wahsheh, Aftab Ahmad, Jonathan M. Graham, Cheryl V. Hinds, Aurelia T. Williams, Sandra L. DeLoatch. 815-818 [doi]
- Exploring Model-Based DesignDevon Simmonds, Mark Lanter, Lyle Scott III, Ashley Young, Selin Benli, Andy Herrmann. 819-820 [doi]
- Speeding Up Big-Numbers SquaringShay Gueron, Vlad Krasnov. 821-823 [doi]
- Speeding Up SHA-1, SHA-256 and SHA-512 on the 2nd Generation Intel® Core ProcessorsShay Gueron. 824-826 [doi]
- Retargetable Netlists Generation and Structural Synthesis Based on a Meta Hardware Description Language: Melasy+Sho Nishida, Katsumi Wasaki. 827-830 [doi]
- Knowledge Services and Knowledge Building in E-learningXinyu Zhang, Yuhao Luo, Zhaohui Liang. 831-832 [doi]
- The Exploration of the E-Learning Standard Test SystemXinyu Zhang, Qian Wang, Yiqian Lu. 833-834 [doi]
- Rule-based Management of Large Unorganized Data SetsDaniel Beatty, Noé Lopez-Benitez. 835-838 [doi]
- Acoustic Signature Based Intelligent Health Monitoring of Air Compressors with Selected FeaturesNishchal K. Verma, Tarun Maini, Al Salour. 839-845 [doi]
- An Activity Pattern Based Wireless Intrusion Detection SystemNur Al Hasan Haldar, Muhammad Abulaish, Syed Asim Pasha. 846-847 [doi]
- An Exploratory Study of the Users' Behavior on Social Network SitesShwu-Min Horng. 848-849 [doi]
- Using Chatbots to Teach Socially Intelligent Computing Principles in Introductory Computer Science CoursesAlan Shaw. 850-851 [doi]
- Can You See Me Now? Design SEO-friendly Classroom Blogs for Reaching Valuable PublicXuesong Zhang. 852-853 [doi]
- Evaluating Students Online Discussion Performance by Using Social Network AnalysisPeng He. 854-855 [doi]
- Social Engine Web Store: Create Your Web Store and Publish It on Your Social NetworkThiago Catoto Dias, André Luiz de Souza Fatala, Arnaldo de Moraes Pereira. 856-859 [doi]
- Using Social Networks to Improve the Performance of a Service DeskJoel Mana Gonçalves, Rejane Pereira da Silva Gonçalves. 860 [doi]
- Proposed Model for Social and Collaborative Social Network of Positive Reinforcement: Positive Reinforcement Online Social Network: PRSNHabib M. Fardoun, Daniyal M. Alghazzawi, Sebastián Romero López, J. A. G. Lazarro. 861-864 [doi]
- How Can Social Networks Help Us Measure Trust Online?Wei-Lun Chang, Arleen N. Diaz. 865-866 [doi]
- Automatic Coverage Evaluation for a Medical Expert SystemAhmad Eyadat, Izzat Alsmadi. 867-872 [doi]
- Annotating Resources in Sequence Diagrams for Testing Web SecurityWeifeng Xu, Lin Deng, Qing Zheng. 873-874 [doi]
- Serious Video Games: Games for Education and HealthVasudevan Janarthanan. 875-878 [doi]
- Innovations in Art and Production: Sound, Modeling and AnimationVasudevan Janarthanan. 879-882 [doi]
- Link Encryption to Counteract with Rouge Social Network CrawlersSri Khetwat Saritha, Kishan Dharavath. 883-884 [doi]
- A Survey of Requirement Engineering Interactions in Telecommunication SystemsAhmad B. Alnafoosi. 885 [doi]
- Excessive Use of the Internet and Gender: The Case for University Students in JordanYousef Ahmed Eyadat. 886-891 [doi]
- ROI Detection Using Spatial Kernel Based Filter for Steam Generator Tube Inspection in Eddy Current Nondestructive EvaluationJaejoon Kim, Lalita Udpa. 892 [doi]
- Relationship between State Machine and Dynamic Behavior: Coherence among Events and MessagesJosé Gonçalves Batista da Luz, Michèle Puretachi de Barros. 893 [doi]
- Community Environmental Monitoring Mode Based on Wireless Sensor NetworkChunming Li, Shuanning Zheng, Xiaodan Su, Qing Li, Quanyi Qiu. 894 [doi]
- Utilization of Urban Form Information for Extracting Commuting Travel Carbon Emission on Urban Road NetworkQuanyi Qiu, Yang Zhao, Lei Chen, Yuan Quan. 895 [doi]
- Packet Reversed Packet Combining Scheme: A Thorough AnalysisChandan Tilak Bhunia, Abhinandan Bhunia. 896 [doi]
- Biological Cells as Storage DevicesRalph DeFrangesco. 897-898 [doi]