Abstract is missing.
- A Tree-Based Web Service Indication Scheme for Service Tracking in Vehicular Ad-Hoc NetworksChyi-Ren Dow, Chih-Yu Chueh, Yu-Hong Lee, Shiow-Fen Hwang. 3-7 [doi]
- Reducing the Impact of Massive Multiplayer Online Games on the Internet Using SCTPDavid Burgos-Amador, Jesus Martinez Cruz, Sergio Recio-Perez. 8-13 [doi]
- SIP: A Simple Tool for Inspecting and Evaluating WSDL SpecificationsMario Beron, German Montejano, Daniel Riesco, Pedro Rangel Henriques, Narayan C. Debnath. 14-19 [doi]
- Blind Certificates for Secure Electronic VotingVíctor Mateu, Francesc Sebé, Magda Valls. 20-26 [doi]
- Considering Interdependent Protection Goals in Domain-Specific Contexts: The di.me Case StudyFatih Karatas, Marcel Heupel, Mohamed Bourimi, Dogan Kesdogan, Sophie Wrobel. 27-32 [doi]
- Non-blocking Atomic Commitment Algorithm in Asynchronous Distributed Systems with Unreliable Failure DetectorsSung-Hoon Park, Jea-Yep Lee, Su-Chang Yu. 33-38 [doi]
- Web Portal Usability Tests for the Nevada Climate Change PortalIvan Gibbs, Sergiu M. Dascalu, Frederick C. Harris Jr.. 39-45 [doi]
- Semi-automated Analysis Software for a Novel Biochemistry AssayJoseph M. Vesco, Frederick C. Harris Jr., Sergiu M. Dascalu, Del R. Jackson, Josh E. Baker. 46-52 [doi]
- Attack Scenario Prediction MethodologySeraj Fayyad, Christoph Meinel. 53-59 [doi]
- A Comparative Evaluation of Web Services Description ApproachesHajar Omrana, Ibrahim El Bitar, Fatima-Zahra Belouadha, Ounsa Roudies. 60-64 [doi]
- Modeling a Facilities Management and Information System by UMLLeo Espinoza, Heldy Espinoza, Wenying Feng. 65-70 [doi]
- A Web-Enabled Approach for Generating Data ProcessorsJigarkumar Patel, Sohei Okamoto, Sergiu M. Dascalu, Frederick C. Harris Jr.. 71-76 [doi]
- A Boundary Value Analysis Tool - Design and DescriptionNarayan C. Debnath, Adam Kruger, Melinda Alexander. 77-82 [doi]
- GajaNindu: A Distributed System Management Framework with User-Defined Management LogicSumedha Kodithuwakku, Lakmal Padmakumara, Ishara Premadasa, Shameera Rathnayaka, Vishaka Nanayakkara, Srinath Perera. 83-88 [doi]
- Mining Auto-generated Test Inputs for Test OracleWeifeng Xu, Hanlin Wang, Tao Ding. 89-94 [doi]
- One-Semester CS Capstone: A 40-60 Teaching ApproachHisham M. Haddad. 97-102 [doi]
- Applying Interdisciplinarity and Agile Methods in the Development of a Smart Grids SystemMarcelo Paiva Ramos, Gustavo Ravanhani Matuck, Ciro Fernandes Matrigrani, Samoel Mirachi, Eliezer Segeti, Marco Leite, Adilson Marques da Cunha, Luiz Alberto Vieira Dias. 103-110 [doi]
- Gender Classification with Human Gait Based on Skeleton ModelKohei Arai, Rosa Andrie. 113-118 [doi]
- Experimental Evaluation of Usability HeuristicsFreddy Paz, Daniela Villanueva, Cristian Rusu, Silvana Roncagliolo, José Antonio Pow-Sang. 119-126 [doi]
- Evaluating the Usability of Interactive Digital Television ApplicationsAndré S. Solano, César A. Collazos, Cristian Rusu, Luis Merchán. 127-132 [doi]
- Using a Wireless Sensors Network in the Sustainable Management of African Palm Oil Solid WasteMauro Jiménez, Alejandra Jiménez, Pablo Lozada Yanez, Santiago Jiménez, Cristhy Jiménez Granizo. 133-137 [doi]
- Assessing the Usability of University Websites in Saudi Arabia: A Heuristic Evaluation ApproachMutlaq B. Alotaibi. 138-142 [doi]
- A Comparison of Usability Testing Methods for an E-Commerce Website: A Case Study on a Malaysia Online Gift ShopKim Nee Goh, Yoke Yie Chen, F. W. Lai, Stephanie Cristal Daud, Ashok Sivaji, Shi-Tzuaan Soo. 143-150 [doi]
- Two Problems of Wavelet Packet TransformMakoto Kobayashi, Kazushi Nakano. 153-159 [doi]
- Parallelization of discrete stochastic arithmetic on multicore architecturesFabienne Jézéquel, Jean Luc Lamotte, Olena Chubach. 160-166 [doi]
- Digital Image Watermarking for Authentication Based on the Dyadic Wavelet Transform and Interval ArithmeticRyuji Ohura, Teruya Minamoto. 167-172 [doi]
- Some Remarks on the Optimal Error Estimates for the Finite Element Method on the L-Shaped DomainTakehiko Kinoshita, Mitsuhiro T. Nakao. 173-178 [doi]
- A Sinc Method for an Eigenvalue Problem of a Differential Operator with Periodic Coefficients and Its Comparison with Hill's MethodKenichiro Tanaka. 179-185 [doi]
- On the Performance of Apache Hadoop in a Tiny Private IaaS CloudGabriel Loewen, Michael Galloway, Susan V. Vrbsky. 189-195 [doi]
- Advanced Instruction Folding for an Object-oriented ProcessorAnthony S. Fong, C. H. Yau, Yijun Liu. 196-199 [doi]
- Hardware Multi-processor Design for Highly-Demanding ApplicationsLech Józwiak, Yahya Jan. 200-205 [doi]
- Workload Based Optimization Model for Parallel Disk SystemsFangyang Shen, Bing Qi. 206-209 [doi]
- An Area-Time Efficient Architecture for 16 x 16 Decimal MultiplicationsMing Zhu, Yingtao Jiang. 210-216 [doi]
- A Novel Flash Fast-Locking Digital PLL: Verilog-AMS Modeling and SimulationsMahmoud Fawzy Wagdy, Sandesh Maraliga Jayaram. 217-222 [doi]
- Exploiting UML Semantic Variation Points to Generate Explicit Component Interconnections in Complex SystemsFederico Ciccozzi, Antonio Cicchetti, Mikael Sjödin. 225-232 [doi]
- Automated Generation of Use Case Diagrams from Problem Frames Using Formal Concept AnalysisAmina A. Imam, Haitham S. Hamza, Riham Abdel-Moneim. 233-240 [doi]
- Parser Combinators: A Practical Application for Generating Parsers for NMR DataMatt Fenwick, Gerard Weatherby, Heidi J. C. Ellis, Michael R. Gryk. 241-246 [doi]
- A Model-Driven Approach to the Automated Creation of ADF ApplicationsMohammed Alodib. 247-253 [doi]
- Range Analyzer: An Automatic Tool for Arithmetic Overflow Detection in Model-Based DevelopmentRenato Matuzaki Honda, Luiz Alberto Vieira Dias. 254-259 [doi]
- On Combining Model-Based Analysis and TestingMehrdad Saadatmand, Mikael Sjödin. 260-266 [doi]
- Rule-Based Generation of Mobile User InterfacesAndreas Schuler, Barbara Franz. 267-272 [doi]
- CARD-RM: A Reference Model for Airborne SoftwareJohnny Cardoso Marques, Sarasuaty Megume Hayashi Yelisetty, Adilson Marques da Cunha, Luiz Alberto Vieira Dias. 273-279 [doi]
- Alternative Representation of AspectsSabah Al-Fedaghi. 280-285 [doi]
- Computer Science and Interdisciplinarity: A Case Study on an Undergraduate ProgramAdriana da Silva Jacinto, Tatiana Martins Almeri, Etiene Lamas, Luiz Alberto Vieira Dias, Adilson Marques da Cunha. 289-293 [doi]
- Learner Satisfaction of E-Learning in Workplace: Case of Oil Company in Middle EastMuhammed Al-Qahtani, Mansour Al-Qahtani, Hatim Al-Misehal. 294-298 [doi]
- Utilizing Technology in Education Environment: A Case StudyBasit Shahzad, Esam Alwagait. 299-302 [doi]
- Integration of Root Cause Analysis into a Model-Based Testing Process of a Mobile Switching ServerMikko Nieminen, Tomi Räty, Risto Teittinen. 305-309 [doi]
- Random Cluster Sampling on X-Machines Test CasesYasir Imtiaz Khan, Sadia Kausar. 310-316 [doi]
- Encoding Test Requirements as Constraints for Test Suite MinimizationJosé Campos, Rui Abreu. 317-322 [doi]
- The Test Path Generation from State-Based Polymorphic Interaction Graph for Object-Oriented SoftwareChing-Seh Wu, Chi-Hsin Huang, Yen-Ting Lee. 323-330 [doi]
- Validation of Model-Based Testing in Hardware in the Loop PlatformJanne Keränen, Tomi Räty. 331-336 [doi]
- SynConSMutate: Concolic Testing of Database Applications via Synthetic Data Guided by SQL MutantsTanmoy Sarkar, Samik Basu, Johnny Wong. 337-342 [doi]
- Towards Test Focus Selection for Integration Testing Using Method Level Software MetricsShadi Banitaan, Mamdouh Alenezi, Kendall E. Nygard, Kenneth Magel. 343-348 [doi]
- Applying Testing to Enhance Software Product QualityEtiene Lamas, Luiz Alberto Vieira Dias, Adilson Marques da Cunha. 349-356 [doi]
- Runtime Monitors to Detect and Prevent Union Query Based SQL Injection AttacksRamya Dharam, Sajjan G. Shiva. 357-362 [doi]
- Test Case Generation for Modified Code Using a Variant of Particle Swarm Optimization (PSO) AlgorithmShailesh Tiwari, K. K. Mishra, A. K. Misra. 363-368 [doi]
- Automated Test Data Generation for Coupling Based Integration Testing of Object Oriented Programs Using Evolutionary ApproachesShaukat Ali Khan, Aamer Nadeem. 369-374 [doi]
- Hybrid Usability Methodology: Integrating Heuristic Evaluation with Laboratory Testing across the Software Development LifecycleAshok Sivaji, Mohamed Redzuan Abdullah, Alan G. Downe, Wan Fatimah Wan Ahmad. 375-383 [doi]
- Improving the Efficiency and Effectiveness of Penetration Test AutomationKevin P. Haubris, Joshua J. Pauli. 387-391 [doi]
- Reversible Image Hiding Scheme for High Quality Based on Histogram ShiftingDae-Soo Kim, Gil-Je Lee, Kee-Young Yoo. 392-397 [doi]
- Investigation of Static and Dynamic Android Anti-virus StrategiesYan Ma, Mehrdad Sepehri Sharbaf. 398-403 [doi]
- WLAN Location Privacy: A Client Server Based ArchitectureMuhammad Junaid Khan, Haider Abbas. 404-410 [doi]
- Security Concerns in Cloud ComputingIssa M. Khalil, Abdallah Khreishah, Salah Bouktif, Azeem Ahmad. 411-416 [doi]
- White Box AES Using Intel's New AES InstructionsShay Gueron. 417-421 [doi]
- Look into My Eyes: A Survey of Biometric SecurityAlexander Eng, Luay A. Wahsheh. 422-427 [doi]
- Characteristics of Social Network FatigueThara Ravindran, Alton Yeow-Kuan Chua, Dion Hoe-Lian Goh. 431-438 [doi]
- Perception and Use of Social Networking Sites among Undergraduate Students in KuwaitSamir N. Hamade. 439-444 [doi]
- User Participation in Social Networks: The Case of Balatarin, an Online Persian-Language Social Bookmarking SystemAsreen Rostami. 445-449 [doi]
- The Role of Affect on the Acceptance of Web 2.0 as Organizational Knowledge Sharing SystemsAngela Lee Siew Hoong, Tong-Ming Lim, Rasimah Aripin. 450-455 [doi]
- Applying the Software-to-Data Paradigm in Next Generation E-Health Hybrid CloudsChristoph Thuemmler, Julius Müller, Stefan Covaci, Thomas Magedanz, Stefano De Panfilis, Thomas Jell, A. Schneider, Anastasius Gavras. 459-463 [doi]
- Localized QoS Routing with End-to-End Delay GuaranteesFahd M. Aldosari, Fahad Alradady. 464-472 [doi]
- Subjective Evaluation of Latency and Packet Loss in a Cloud-Based GameVictor Clincy, Brandon Wilgor. 473-476 [doi]
- Path-Finding Algorithm for Ground Multiple Sensor Nodes Detection of Quad-rotor-typed UAVHanshang Li, Ling Wang, Shuo Pang, Massood Towhidnejad. 477-482 [doi]
- Flow Control Mechanism for Wireless Network-on-ChipLing Wang, Zhen Wang, Yingtao Jiang. 483-488 [doi]
- New Approach towards Generation of Automatic Variable Key to Achieve Perfect SecurityRajat Subhra Goswami, Swarnendu Kumar Chakraborty, Abhinandan Bhunia, Chandan Tilak Bhunia. 489-491 [doi]
- A Benchmarking Algorithm to Determine Maximum Stability Data Gathering Trees for Wireless Mobile Sensor NetworksNatarajan Meghanathan, Philip Mumford. 492-497 [doi]
- Multilaterally Secure Communication Anonymity in Decentralized Social NetworkingPhilipp Schwarte, Mohamed Bourimi, Marcel Heupel, Dogan Kesdogan, Rafael Giménez, Sophie Wrobel, Simon Thiel. 498-504 [doi]
- Wireless Broadband Measurement in CaliforniaYoungJoon Byun, Sathya Narayanan, Stephanie Mott, Ken Biba, Jason Schwenkler, Robert Osborn, Michael Morris. 505-509 [doi]
- A Sampling Diagnostics Model for Neural System Training OptimizationDenis Avila Montini, Gustavo Ravanhani Matuck, Adilson Marques da Cunha, Luiz Alberto Vieira Dias, Alexandre Lima Possebon Ribeiro, Alessandra Avila Montini. 510-517 [doi]
- Energy efficient information assured routing based on hybrid optimization algorithm for WSNsKashif Saleem, Norsheila Fisal. 518-524 [doi]
- Modeling Cognitive Radio Networks for Efficient Data Transfer Using Cloud LinkYenumula B. Reddy, Stephen Ellis. 525-530 [doi]
- Supporting of Mobility by Cooperation Nodes in the Wireless Sensor Network RoutingMiresmaeil Mirnabibaboli, Mher Markosyan, Hassa Hejr. 531-537 [doi]
- Breast Cancer Segmentation Using Bacterial Foraging AlgorithmR. B. Dubey, Sujata Bhatia, Madasu Hanmandlu, Shantaram Vasikarla. 541-545 [doi]
- Parent Selection via Reinforcement Learning in Mesh-Based P2P Video StreamingMuge Fesci-Sayit, Yagiz Kaymak, Kemal Deniz Teket, Cihat Cetinkaya, Sercan Demirci, Geylani Kardas. 546-551 [doi]
- A Study on the Bootstrapping Architectures for Scalable Private Reappearing Overlay NetworkChin Teck Min, Tong-Ming Lim, Mauthe Andreas. 552-557 [doi]
- PARNT: A Statistic based Approach to Extract Non-Taxonomic Relationships of Ontologies from TextIvo Serra, Rosario Girardi, Paulo Novais. 561-566 [doi]
- The Impact of Body Mass Index on Low Birth WeightMali Abdollahian. 567-572 [doi]
- Similarity Search Problem Research on Multi-dimensional Data SetsYong Shi, Brian Graham. 573-577 [doi]
- Capability Analysis for Modulus of Elasticity and Modulus of RuptureMali Abdollahian. 578-583 [doi]
- Zinc-Protoporphyrin Metabolite Level Affected by Work Environment StressesRay R. Hashemi, Mahmood Bahar, Azita Bahrami, Nicholas Tyler, Matthew Antonelli. 584-589 [doi]
- Supply Chain Technology Acceptance, Adoption, and Possible Challenges: A Case Study of Service Organizations of Saudi ArabiaHabib Ullah Khan, Shafiq Ahmad, Mali Abdollahian. 590-595 [doi]
- Coupling Recursive Hyperspheric Classification with Linear Discriminant Analysis for Improved ResultsSalyer B. Reed, Tyson R. C. Reed, Sergiu M. Dascalu. 596-601 [doi]
- Forecasting Wet Land Rice Production for Food SecurityMali Abdollahian, L. Lasmini. 602-607 [doi]
- User-Defined Inverted Index in Boolean, Rule-Based Entity Resolution SystemsYinle Zhou, John R. Talburt, Eric D. Nelson. 608-612 [doi]
- Analysing the Problem and Main Approaches for Ontology PopulationCarla Gomes de Faria, Rosario Girardi, Paulo Novais. 613-618 [doi]
- A Case Study on the Construction of Application OntologiesLuis Eduardo Santos, Rosario Girardi, Paulo Novais. 619-624 [doi]
- Rule-Based Source Level Patching of Buffer Overflow VulnerabilitiesHossain Shahriar, Hisham M. Haddad. 627-632 [doi]
- Detecting Cross-Site Scripting Vulnerability Using Concolic TestingMichelle Ruse, Samik Basu. 633-638 [doi]
- Software Safety and Security for Programmable Logic ControllersCsilla Farkas, Sidney Valentine. 639 [doi]
- Drop-In Control Flow Hijacking Prevention through Dynamic Library InterceptionAlessandro Barenghi, Gerardo Pelosi, Fabio Pozzi. 640-647 [doi]
- Setting Up of a Cloud Cyber Infrastructure Using Xen HypervisorMichael Terrell, Natarajan Meghanathan. 648-652 [doi]
- Platform for Verification of Electromagnetic Analysis Attacks against Cryptographic CircuitsMasaya Yoshikawa, Toshiya Asai. 653-658 [doi]
- A Systematic Mapping Study on Architectural AnalysisCagatay Catal, Muratcan Atalay. 661-664 [doi]
- A User-centric Approach towards Understanding the Influences of Social Tags Choices for Academic PapersKhasfariyati Razikin, Dion Hoe-Lian Goh, Chei Sian Lee. 665-670 [doi]
- Real-time, High-resolution Diagnosis for Osteoarthritis in the Rat Using Common-Path Fourier-Domain Optical Coherence TomographySang Hun Park, Dong-Ho Shin, Bang Young Kim, Myoung Young Lee, Heung Ki Baik, Dong Heon Lee, Jeong-Hwan Seo, Chul-Gyu Song. 671-673 [doi]
- An Empirical Evaluation of Refactoring Crosscutting Concerns into Aspects Using Software MetricsJoyce M. S. França, Caio Augusto R. Dos Santos, Kenia S. De Oliveira, Michel dos Santos Soares. 674-679 [doi]
- Extensions of SysML for Modeling an Aspect Oriented Software Architecture with Multiple ViewsKenia S. De Oliveira, Joyce M. S. França, Michel S. Soares. 680-685 [doi]
- Node Filtering and Face Routing for Sensor NetworkLaxmi Gewali, Umang Amatya. 686-691 [doi]
- An IEEE 802.21 MIH Functionality Assisted Proxy Mobile IPv6 for Reducing Handover Latency and Signaling CostPyung Soo Kim, Mun-Suck Jang, Eung Hyuk Lee. 692-695 [doi]
- A Two-Hashing Table Multiple String Pattern Matching AlgorithmChouvalit Khancome, Veera Boonjing, Pisit Chanvarasuth. 696-701 [doi]
- Empowering Knowledge Sharing Behaviours through Means Oriented vs. Goal Oriented Cultures: The Impact of Organizational Culture on Knowledge SharingHanan A. Al Mehairi. 702-705 [doi]
- Evaluation of Multiscale Entropy based HRV for Ectopic BeatsButta Singha, Gurmej Singh. 706-711 [doi]
- Delineation of ECG Wave Components Using K-Nearest Neighbor (KNN) Algorithm: ECG Wave Delineation Using KNNIndu Saini, Dilbag Singh, Arun Khosla. 712-717 [doi]
- A Meta-algorithm for Planning Optimization in a software Production LineDenis Avila Montini, Paulo Marcelo Tasinaffo, Luiz Alberto Vieira Dias, Alvaro Augusto Neto, Adilson Marques da Cunha, Alessandra Avila Montini. 721-726 [doi]
- Public-Key Based Efficient Key Distribution in BluetoothSaif Rahman, Yiruo He, Huapeng Wu. 727-728 [doi]
- Two New Modified Schemes of Aggressive Packet Combining Schemes in Achieving Better ThroughputSwarnendu Kumar Chakraborty, Rajat Subhra Goswami, Abhinandan Bhunia, Chandan Tilak Bhunia. 729-730 [doi]
- Software Effort Estimation Using Artificial Neural Networks: A Survey of the Current PracticesHaitham S. Hamza, Amr Kamel, Khaled Mohamed Shams. 731-733 [doi]
- A Comparative Research between SCRUM and RUP Using Real Time Embedded Software DevelopmentStrauss Cunha Carvalho, Felipe Rafael Motta Cardoso, Adilson Marques da Cunha, Luiz Paulo Zanetti. 734-735 [doi]
- Interdisciplinarity in Computer Science: A Case Study on Graduate CoursesAdriana da Silva Jacinto, Etiene Lamas, Luiz Alberto Vieira Dias, Adilson Marques da Cunha, Tatiana Martins Almeri. 736-737 [doi]
- An Ophthalmologist's Tool for Predicting Deterioration in Patients with Accommodative EsotropiaSusan P. Imberman, Sarah Zelikovitz, Irene Ludwig. 738-742 [doi]
- 3D Visualization of Space Distribution of Electrical Characteristics in Compound Structures Reconstructed by General Ray MethodAlexandre Ivánovich Grebennikov. 743-744 [doi]
- A Two-Step Approach for Mining Service CooperationLing-Yao Huang, Wei-Lun Chang. 745-746 [doi]
- Teaching Students to Design and Implement Social Networks Using MVC as a Capstone ExperienceAlan Shaw. 747-748 [doi]
- Analysis of Classical and Quantum Resources for the Quantum Linear Systems AlgorithmJon Inouye. 749-753 [doi]
- Optimizing the Cost of Software Quality - A Path to Delivery ExcellenceB. John Osteen, Suresh Ramanan, Karthik Jeganathan. 754-756 [doi]
- Investigating Benefits and Limitations of E-Procurement in B2B Automakers Companies in IranBehnam Bahreman. 757-758 [doi]
- An Approach to Heterogeneous Database MigrationQian Wang, Chun Yu, Naijia Liu. 759-760 [doi]
- On the Finite Element Method with Riesz Bases and Its Applications to Some Partial Differential EquationsNaohiro Fukuda, Tamotu Kinoshita, Takayuki Kubo. 761-766 [doi]
- Examining the Relationship between IT Governance Domains, Maturity, Mechanisms, and Performance: An Empirical Study toward a Conceptual FrameworkHamdi Alagha. 767-772 [doi]
- A Model on Dynamic Threshold Multi-Secret Sharing Scheme using Pell's Equation with Jacobi SymbolM. Kondala Rao, K. V. S. S. R. S. S. Sarma, P. S. Avadhani. 773-776 [doi]
- Linear Programming with Fuzzy Objective FunctionIbraheem Alolyan. 777-778 [doi]
- Text-to-Onto Miner: A Concept Driven and Interval Controlled Ontology BuilderVicky M.-H. Lim, Tong-Ming Lim, Wong Siew Fan. 779-780 [doi]
- Online Teaching and Learning Strategies for Programming-intensive CoursesVenkat N. Gudivada, Rajeev Agrawal, Chunbo Chu. 781-782 [doi]