Abstract is missing.
- Applying Acceptance Test Driven Development to a Problem Based Learning Academic Real-Time SystemLuiz Felipe Simoes Hoffmann, Luiz Eduardo Guarino de Vasconcelos, Etiene Lamas, Adilson Marques da Cunha, Luiz Alberto Vieira Dias. 3-8 [doi]
- A Chi-Square Methodology Applied in Deviations Control of Project Plan to Support the RIMAM ModelDenis Avila Montini, Danilo Battaglia, Gustavo Ravanhani Matuck, Adilson Marques da Cunha, Luiz Alberto Vieira Dias, Alessandra Avila Montini, Basit Shahzad. 9-14 [doi]
- BPM Model of GQIMP for ISO 9001: 2008 Supported by CASE ToolsDenis Avila Montini, Gustavo Ravanhani Matuck, Adilson Marques da Cunha, Luiz Alberto Vieira Dias, Massimo Jorge Isaac. 15-20 [doi]
- Using Long-Term Prediction for Web Service Network Traffic LoadsDaniel W. Yoas, Greg Simco. 21-26 [doi]
- A Set of Rules for Production of Design Models Compliant with Standards DO-178C and DO-331Andre Sarkis, Luiz Alberto Vieira Dias. 27-32 [doi]
- GALO: A Semantic Method for Software Configuration ManagementJuliano de Almeida Monte-Mor, Adilson Marques da Cunha. 33-39 [doi]
- Adaptive Game AI Architecture with Player ModelingEmanuel Mineda Carneiro, Adilson Marques da Cunha, Luiz Alberto Vieira Dias. 40-45 [doi]
- A Quantitative Evaluation of ERP Systems Quality ModelThamer A. Alrawashdeh, Mohammad I. Muhairat, Sokyna. M. Alqatawneh. 46-49 [doi]
- A Geo-Aware Location Based Taxi Carrying SystemChyi-Ren Dow, Yu-Hong Lee, Shr-Chen Wang, Shiow-Fen Hwang. 53-58 [doi]
- The Design of an Election Protocol in Wireless Cellular NetworksSung-Hoon Park, Su-Chang Yoo, Jae-Yoeb Lee. 59-65 [doi]
- Combining Modern Machine Translation Software with LSI for Cross-Lingual Information ProcessingRoger Bradford, John Pozniak. 65-72 [doi]
- Hardware Solutions for Biofeedback and Game InteractionsChristopher Bischke, Narayan C. Debnath. 73-77 [doi]
- Biofeedback Implementation in a Video Game EnvironmentChristopher Bischke, Narayan C. Debnath. 78-83 [doi]
- Exploring Determinants for Mobile Learning User Acceptance and Use: An Application of UTAUTAaron Bere. 84-90 [doi]
- Workflow Models: Management and Quality of Process in the CloudMario Peralta, Carlos Salgado, Lorena Baigorria, Daniel Riesco, German Montejano, Narayan C. Debnath, Jenny Hu. 91-96 [doi]
- An Investigation of Twitter and Facebook AbandonmentYanru Guo, Dion Hoe-Lian Goh, Nor Aishah Binte Mohamed Rashid, Pyae Pyae Han, Shengbo Sun. 97-102 [doi]
- Knowledge Based Framework: A Case Study on Fast, Reliable, and Secure Web Services in UAVsDouglas Rodrigues, Arthur A. Chaves, Kalinka R. L. J. Castelo Branco, Rajiv Ramdhany, Geoff Coulson. 103-108 [doi]
- Impact of Online Clinical Data Exchange on Patient Time Saving in Healthcare DeliveryAdesanya A. Soyemi, Mohamad A. Saouli, Bhaskar R. Sinha. 109-114 [doi]
- Applying Agile Method on Academic Access and Fraud Control SystemGustavo Ravanhani Matuck, Rodrigo Luiz de Oliveira, Tharcius Augusto Pivetta, Luiz Alberto Vieira Dias, Adilson Marques da Cunha. 115-120 [doi]
- Features Selection in Mammograms Using Fuzzy ApproachR. B. Dubey, Madasu Hanmandlu, Shantaram Vasikarla. 123-128 [doi]
- Specification for Generic Enablers as SoftwareJohn Paul Brogan, Christoph Thuemmler. 129-136 [doi]
- Security Integration in Medical Device Design: Extension of an Automated Bio-Medical Engineering Design MethodologyIyad Al Khatib, Gerardo Pelosi, Giovanni Agosta, Heikki Terio. 137-142 [doi]
- A Probability-Based Approach for Multi-scale Image Feature ExtractionThanh Le, Norbert Schuff. 143-148 [doi]
- Parameters Optimization in Entropic Segmentation Processes for the Analysis of Genetic SequencesPablo Lozada Yanez, Tomás Arredondo, Cristhy Jiménez. 149-154 [doi]
- Rescue System with Vital Sign, Location and Attitude Sensing Together with Traffic Condition, Readiness of Helper Monitoring in Particular for Disabled and Elderly PersonsKohei Arai. 155-160 [doi]
- Experiments for Leveled RFID Localization for Indoor Stationary ObjectsMatthew Chan, Xiaowen Zhang. 163-169 [doi]
- Combining Successive ICI Cancellation to ICI Suppressed Alamouti Coded OFDM for Frequency Asynchronous Distributed Antenna SystemsBong Seok Kim, Jin-hui Lee, Dae-hyeon Jeong, Kwonhue Choi. 170-173 [doi]
- Performance Comparison between Distributed Beamforming and Clustered BeamformingSahar Amini, Dong-jun Na, Kwonhue Choi. 174-179 [doi]
- Towards Trusted Environment in Cloud MonitoringTuomas Kekkonen, Teemu Kanstrén, Kimmo Hätönen. 180-185 [doi]
- A Distributed Trust Evaluation Model for Wireless Mobile Sensor NetworksNatarajan Meghanathan. 186-191 [doi]
- Resilient Multi Sink Networks Using Simplistic Hop Based RoutingSumanth Yenduri, Chabli Boler. 192-195 [doi]
- The Use of Two Authentication Factors to Enhance the Security of Mass Storage DevicesMohamed Hamdy Eldefrawy, Muhammad Khurram Khan, Hassan M. Elkamchouchi. 196-200 [doi]
- Performance Evaluation of Beamforming for Macro Base Stations in a Femto-Cell Assisted Macro-NetworkFahim Gohar Awan, Noor M. Sheikh, A. Kiran. 201-206 [doi]
- Localized QoS Routing Based on Links Blocking ProbabilityFahd M. Al-Dosari. 207-213 [doi]
- Experimental Evaluation of a Multi-paradigm, Message-Oriented Mobile MiddlewareYuri Morais, Glêdson Elias. 214-219 [doi]
- Propagation Analysis of Malware Families in Mobile P2P NetworksMuhammad Adeel, Laurissa Tokarchuk, Muhammad Awais Azam, Sardar Kashif Ashraf Khan, M. A. Khalil. 220-226 [doi]
- Task Synthesis for Control Applications on Multicore PlatformsAneta Vulgarakis, Rizwin Shooja, Aurelien Monot, Jan Carlson, Moris Behnam. 229-234 [doi]
- Model-Based Assistance for Making Time/Fidelity Trade-Offs in Component CompositionsVishal Dwivedi, David Garlan, Jürgen Pfeffer, Bradley R. Schmerl. 235-240 [doi]
- A Decision Process to Migrate Legacy Systems to SOAHelton Emanuel Reis Santana, Glauco de Figueiredo Carneiro. 243-248 [doi]
- LSQ: An approach for Learning Software Development with QualityLeandro Guarino de Vasconcelos, Luiz Eduardo Guarino de Vasconcelos. 249-254 [doi]
- A Comparative Study of Test Coverage-Based Software Reliability Growth ModelsDalal Alrmuny. 255-259 [doi]
- Redefining Usability Heuristics for Transactional Web ApplicationsDaniela Quiñones, Cristian Rusu, Silvana Roncagliolo. 260-265 [doi]
- RockTitan: A 3D Modelling Geological SoftwareKim Nee Goh, Wei Kiat Chung. 266-270 [doi]
- An Information Security Awareness Program to Address Common Security Concerns in IT UnitShadi Al Awawdeh, Abdallah Tubaishat. 273-278 [doi]
- Automatic Verification of Security Policies in Firewalls with Dynamic Rule SequenceAmjad Gawanmeh. 279-284 [doi]
- Evaluation of Security Supporting Mechanisms in Cloud StorageAbdullah A. Albahdal, Fahad Alsolami, Fawaz Alsaadi. 285-292 [doi]
- Problems and Promises of Using the Cloud and BiometricsAbdullah A. Albahdal, Terrance E. Boult. 293-300 [doi]
- Lossless Codebook-Based Digital Watermarking Scheme with AuthenticationGeum-Dal Park, Dea-Su Kim, Kee-Young Yoo. 301-306 [doi]
- Cloud Computing Vulnerability: DDoS as Its Main Security Threat, and Analysis of IDS as a Solution ModelAnteneh Girma, Moses Garuba, Rojini Goel. 307-312 [doi]
- CloudStash: Using Secret-Sharing Scheme to Secure Data, Not Keys, in Multi-cloudsFahad Alsolami, Terrance E. Boult. 315-320 [doi]
- License Plate Detection Method for Real-Time Video of Low-Cost Webcam Based on Hybrid SVM-Heuristic ApproachMohammed S. Khalil, Fajri Kurniawan. 321-326 [doi]
- A Survey of Android Malware Characterisitics and Mitigation TechniquesVanessa N. Cooper, Hossain Shahriar, Hisham M. Haddad. 327-332 [doi]
- The Fragility of AES-GCM Authentication AlgorithmShay Gueron, Vlad Krasnov. 333-337 [doi]
- Speeding up Counter Mode in Software and HardwareShay Gueron, Vlad Krasnov. 338-340 [doi]
- Application of NTRU Cryptographic Algorithm for SCADA SecurityAmritha Puliadi Premnath, Ju-Yeon Jo, Yoohwan Kim. 341-346 [doi]
- Decoupling Identity Resolution from the Maintenance of Identity InformationFumiko Kobayashi, John R. Talburt. 349-354 [doi]
- Probabilistic Matching Compared to Deterministic Matching for Student Enrollment RecordsPei Wang, Daniel Pullen, John R. Talburt, Ningning Wu. 355-359 [doi]
- Visualization of Execution of Programming StatementsSabah Al-Fedaghi, Altaf Alrashed. 363-370 [doi]
- Application of Self-Organizing Maps at Change Detection in Amazon ForestRodrigo Luiz Mendes Mota, Elcio Hideiti Shiguemori, Alexandre Carlos Brandão Ramos. 371-376 [doi]
- A Systematic Study of OpenStreetMap Data Quality AssessmentSukhjit Singh Sehra, Jaiteg Singh, Hardeep Singh Rai. 377-381 [doi]
- Towards the Development of a Framework for Multiple View Interactive EnvironmentsArleson Nunes Silva, Glauco de Figueiredo Carneiro, José Maria N. David. 382-387 [doi]
- A CUDA Based Implementation of Locally-and Feature-Adaptive Diffusion Based Image Denoising AlgorithmAli Pour Yazdanpanah, Ajay K. Mandava, Emma E. Regentova, Venkatesan Muthukumar, George Bebis. 388-393 [doi]
- FPGA Implementation of a Support Vector Machine Based Classification System and Its Potential Application in Smart GridXiaohui Song, Hong Wang, Lingfeng Wang. 397-402 [doi]
- Building Effective Scheduling Algorithms for Sensor NetworksFangyang Shen, Chunlei Liu, Bing Qi, Yanqing Ji, Daniel Caban. 403-406 [doi]
- A Multi-relational Association Mining Algorithm for Screening Suspected Adverse Drug ReactionsYanqing Ji, Fangyang Shen, John Tran. 407-412 [doi]
- A Real-Time Per-Thread IQ-Capping Technique for Simultaneous Multi-threading (SMT) ProcessorsAmin Sahba, Yilin Zhang, Marcus Hays, Wei-Ming Lin. 413-418 [doi]
- CUDA Memory Techniques for Matrix Multiplication on Quadro 4000Tekesha Athil, Richard Christian, Yenumula B. Reddy. 419-425 [doi]
- Cyber Physical System - iCloud Traffic ControlVladimir Hahanov, Eugenia Litvinova, Wajeb Gharibi, Svetlana Chumachenko. 426-429 [doi]
- Quantum Models and Method for Analysis and Testing Computing SystemsVladimir Hahanov, Stanley Hyduke, Wajeb Gharibi, Eugenia Litvinova, Svetlana Chumachenko, Irina V. Hahanova. 430-434 [doi]
- Spatial Up-Conversion Using ADRC Stationary WaveletsStephen Lee Bishop, Suresh Rai. 437-442 [doi]
- The Solution of the Bagley-Torvik Equation by Using Second Kind Chebyshev WaveletAmit Setia, Yucheng Liu, Aghalaya S. Vatsala. 443-446 [doi]
- A Recoverable Visible Digital Image Watermarking Based on the Dyadic Lifting SchemeRyuji Ohura, Teruya Minamoto. 447-452 [doi]
- Verified Computation to a Nonlinear Poisson Equation with Neumann Boundary Condition Derived from the Keller-Segel ModelTeruya Minamoto, Shinichi Habara. 453-458 [doi]
- A Blind Digital Image Watermarking Method Based on the Dyadic Wavelet Transform and Chaos ModelsTeruya Minamoto, Jumpei Yamaguchi. 459-464 [doi]
- Solution of Linear Fractional Fredholm Integro-Differential Equation by Using Second Kind Chebyshev WaveletAmit Setia, Yucheng Liu, Aghalaya S. Vatsala. 465-469 [doi]
- Ontology Population from the Web: An Inductive Logic Programming-Based ApproachRinaldo Lima, Bernard Espinasse, Hilário Oliveira, Fred Freitas. 473-478 [doi]
- iConSMutate: Concolic Testing of Database Applications Using Existing Database States Guided by SQL MutantsTanmoy Sarkar, Samik Basu, Johnny Wong. 479-484 [doi]
- Analytical Study of Global Mobile Market: Forecasting and SubstitutionHarmeet Kaur, Mali Abodallahian. 485-489 [doi]
- Map Building Based on Sensor Fusion for Autonomous VehicleMinsung Kang, Soojung Hur, Won-Kyo Jeong, Yongwan Park. 490-495 [doi]
- Data Center Business Continuity Best PracticeHeather Brotherton, J. Eric Dietz. 496-501 [doi]
- Supervised Semantic Analysis of Product Reviews Using Weighted k-NN ClassifierAnkita Srivastava, M. P. Singh, Prabhat Kumar. 502-507 [doi]
- Reverse Engineering of Legacy Agricultural Phenology Modeling SystemIan Yocum, Hassan Reza, William Kemp, Joseph Rinehart, Brian Dennis. 508-513 [doi]
- The Use of the Blackboard Architecture for a Decision Making System for the Control of Craft with Various Actuator and Movement CapabilitiesJeremy Straub, Hassan Reza. 514-519 [doi]
- Logical Conjunction of Triple-Perpendicular-Directional Translation Residual for Contactless Palmprint PreprocessingLu Leng, Gang Liu, Ming Li, Muhammad Khurram Khan, Ali M. Al-Khouri. 523-528 [doi]
- Using Patch Management Tools to Enhance the Signature Customization for IDS Based on Vulnerability ScannerMohamed Alfateh Badawy, Nawal A. El-Fishawy, Osama Elshakankiry. 529-533 [doi]
- Recognition of Hand-Printed Characters on Mobile DevicesMark Smith. 534-538 [doi]
- Empirically Derived Guidelines for Multimodal Interaction in Knowledge-Based EnvironmentsMutlaq B. Alotaibi, Dimitrios I. Rigas. 539-544 [doi]
- Employee Oriented vs. Work Oriented Cultures and the Moderating Role of Education on Intention to Share KnowledgeHanan A. Al Mehairi, Kevin Binning. 545-551 [doi]
- Information Technology Outsourcing and the Brain Drain: A Preliminary InvestigationSamir N. Hamade. 552-557 [doi]
- "We Want to Hear Your Voice": Power Relations in Participatory DesignYanru Guo, Dion Hoe-Lian Goh. 561-566 [doi]
- Modular Development of Ontologies for Provenance in Detrending Time SeriesLucélia de Souza, Maria Salete Marcon Gomes Vaz, Marcos Sfair Sunye. 567-572 [doi]
- Total Compensation and How it is Used in an Organization's Human Resources StrategyDustin Bessette. 573-574 [doi]
- Performance Comparison of Partical Swarm Optimization Variant ModelsBing Qi, Fangyang Shen. 575-580 [doi]
- E-procurement in Iran Cement Industry Limitations and BenefitsBehnam Bahreman. 581-586 [doi]
- Stability Aware Delaunay RefinementLaxmi Gewali, Bishal Acharya. 587-592 [doi]
- Ubiquitous Computer-Supported Collaborative Learning: A Literature ReviewJaime Díaz, Cristian Rusu. 593-598 [doi]
- Towards Performance and Power Management of Cloud ServersFaruk Bagci. 599-604 [doi]
- Application of Multi Level ATM in Reducing Latency in Clouds for Performance Improvement of Integrated Voice, Video and Data ServicesKoj Sambyo, Chandan Tilak Bhunia. 607 [doi]
- Method of Non Majority Decision Making in Aggressive Packet Combining SchemeSwarnendu Kumar Chakraborty, Rajat Subhra Goswami, Abhinandan Bhunia, Chandan Tilak Bhunia. 608-609 [doi]
- An Economical Cluster Based System for Detecting Data Leakage from BYODIra Woodring, Mostafa M. El-Said. 610-611 [doi]
- Vectorization on ChaCha Stream CipherMartin Goll, Shay Gueron. 612-615 [doi]
- Increasing Lifetime of a Wireless Sensor Network Using Multiple SinksTapan Kumar Jain, Davinder S. Saini, Sunil V. Bhooshan. 616-619 [doi]
- Knowledge Dimension Management: Bridge the Gulf between WAC and MOOCJinyue Peng, Dongxing Jiang, Cong Liu, Yuan Jiang, Xinyu Zhang. 620-621 [doi]
- Interdisciplinarity and Agile Development: A Case Study on Graduate CoursesValdir da Costa Guerra, Eliezer Segeti, Fabiano Hino, Fabio Kfouri, Lineu Fernando Stege Mialare, Luiz Alberto Vieira Dias, Adilson Marques da Cunha. 622-623 [doi]
- The Use of Partial Least Squares Path Modeling in IT Governance DisciplineHumam Elagha. 624-626 [doi]
- Usability Heuristics for Transactional Web SitesFreddy Paz, Freddy Asrael Paz, José Antonio Pow-Sang, Luis Collantes. 627-628 [doi]
- Accounting System on Cloud: A Case StudyMozhdeh Sadighi. 629-632 [doi]
- Analysis of Data Mining Techniques for Software Effort EstimationSumeet Kaur Sehra, Jasneet Kaur, Yadwinder Singh Brar, Navdeep Kaur. 633-638 [doi]
- A Case Study on Pairwise Testing ApplicationCassiano B. A. L. Monteiro, Luiz Alberto Vieira Dias, Adilson Marques da Cunha. 639-640 [doi]
- A System of Simple Sentence Parsing Rules to Produce "Answer Matching" ChatbotsAlan Shaw. 641-642 [doi]
- The Acceptance of Using M-government Services in JordanAhmad Althunibat, Thamer A. Alrawashdeh, Mohammad I. Muhairat. 643-644 [doi]
- Applying Interdisciplinarity and Agile Methods in the Development of an Embedded SystemRenan Cavichi de Freitas, Jefferson Andrade de Oliveira, Fabiano Yukio Alves Hino, Juvenal Silva Neto, Leonardo Miranda Vicente, Adilson Marques da Cunha, Luiz Alberto Vieira Dias. 645-646 [doi]
- Virtual Health ManagementJoseph M. Woodside. 647-648 [doi]
- From Modeling to Deployment of Component-Based Vehicular Distributed Real-Time SystemsAlessio Bucaioni, Saad Mubeen, John Lundbäck, Kurt-Lennart Lundbäck, Jukka Mäki-Turja, Mikael Sjödin. 649-654 [doi]
- Towards Extraction of Interoperable Timing Models from Component-Based Vehicular Distributed Embedded SystemsSaad Mubeen, Jukka Mäki-Turja, Mikael Sjödin. 655-659 [doi]
- Multiscale Product Edge Detection in Different Colour SpacesSihem Charaa, Noureddine Ellouze. 660-664 [doi]