Abstract is missing.
- A Context-Aware Paratransit SystemChyi-Ren Dow, Zhenhe Ye, Po-Yu Lai. 3-7 [doi]
- Mobile Agent-Based Service MigrationYanjun Zuo, Jigang Liu. 8-13 [doi]
- A Prototype Spatio-temporal Database Built on Top of Relational DatabaseYun Tian, Yanqing Ji, Jesse Scholer. 14-19 [doi]
- Bitmap-Based On-line Analytical Processing of Time Interval DataPhilipp Meisen, Diane Keng, Tobias Meisen, Marco Recchioni, Sabina Jeschke. 20-26 [doi]
- Accuracy Improvement for Spatial Composition-Based End-to-End Network MeasurementGo Hasegawa, Yusuke Iijima, Masayuki Murata. 27-32 [doi]
- Financial Measuring of Incremental Deliveries in Software Projects - Finding a Model That Can Answer: How Much is Worth to Split a Project into Iterations?Sandro Magalhaes Manteiga, Andre Gomes Lamas Otero, Adilson Marques da Cunha, Luiz Alberto Vieira Dias. 33-37 [doi]
- An Empirical Study on Performance Measures for Online AdvertisingBen McInroy, Wenying Feng, Yuanyi Pan. 38-43 [doi]
- A Fault Tolerant Election Protocol in Asynchronous Distributed Systems with Fail-Stop ModelSung-Hoon Park, Sang-Gwon Lee, Su-Chang Yu. 44-48 [doi]
- An Analysis on the Factors Related to the Adoption of KS ToolsAngela Siew-Hoong Lee, Tong-Ming Lim, Lip-Sam Thi. 49-54 [doi]
- Storage Optimization for Non Interactive Dining Cryptographers (NIDC)Pablo Garcia, Jeroen van de Graaf, German Montejano, Daniel Riesco, Narayan C. Debnath, Silvia Bast. 55-60 [doi]
- Investigate SPRON Convergence Time Using Aggressive Chord and Aggressive AP-ChordChin Teck Min, Tong-Ming Lim. 61-66 [doi]
- Applying Scrum in an Interdisciplinary Project Using Big Data, Internet of Things, and Credit CardsRene Esteves Maria, Luiz Antonio Rodrigues Junior, Luiz Eduardo Guarino de Vasconcelos, Adriano Fonseca Mancilha Pinto, Paulo Takachi Tsoucamoto, Henrique Nunweiler Angelim Silva, Airton Lastori, Adilson Marques da Cunha, Luiz Alberto Vieira Dias. 67-72 [doi]
- Particle Swarm Optimization for the Minimization of Power Losses in Distribution NetworksJoseph B. Abugri, Marc Karam. 73-78 [doi]
- On the Generation of Full-Fledged Code from UML Profiles and ALF for Complex SystemsFederico Ciccozzi, Antonio Cicchetti, Mikael Sjödin. 81-88 [doi]
- SMARTCore: Boosting Model-Driven Engineering of Embedded Systems for MulticoreFederico Ciccozzi, Diarmuid Corcoran, Tiberiu Seceleanu, Deflef Scholle. 89-94 [doi]
- IFA2S - In-flight Awareness Augmentation SystemsAndré Luiz Pierre Mattei, Adilson Marques da Cunha, Luiz Alberto Vieira Dias, Pedro Carlos da Silva Euphrasio, Onofre Trindade Júnior, Cláudio Toledo 0001. 95-100 [doi]
- Nanosatellite Event Simulator Development Using Scrum Agile Method and Safety-Critical Application Development EnvironmentAndré Luiz Pierre Mattei, Adilson Marques da Cunha, Luiz Alberto Vieira Dias, Eloi Fonseca, Osamu Saotome, Paulo Takachi, Gildárcio Sousa Gonçalves, Thoris Angelo Pivetta, Victor da Silva Montalvão, Cassio Kendi, Felipe Lopes de Freitas, Manasseis Alves Ferreira, Mateus Andrade Almeida, Gabriel Goncalves de Oliveira Rodrigues. 101-106 [doi]
- Internet of Things and the Credit Card Market: How Companies Can Deal with the Exponential Increase of Transactions with Connected Devices and Can Also be Efficient to Prevent FraudsGuilherme Augusto Ferreira, Gildárcio Sousa Gonçalves, Andre Gomes Lamas Otero, Glaydson Luiz Bertoze Lima, Paulo Takachi Tsoucamoto, Paulo Cesar Louzada Villaca, Lineu Fernando Stege Mialaret, Adilson Marques da Cunha, Luiz Alberto Vieira Dias. 107-111 [doi]
- A Fuzzy Decision Support Approach for Model-Based Tradeoff Analysis of Non-functional RequirementsMehrdad Saadatmand, Sahar Tahvili. 112-121 [doi]
- Cluster Analysis and Artificial Neural Networks: A Case Study in Credit Card Fraud DetectionEmanuel Mineda Carneiro, Luiz Alberto Vieira Dias, Adilson Marques da Cunha, Lineu Fernando Stege Mialaret. 122-126 [doi]
- On Bias Corrected Estimators of the Two Parameter Gamma DistributionAshok K. Singh, Anita Singh, Dennis J. Murphy. 127-132 [doi]
- Implementation Vulnerability Associated with OAuth 2.0 - A Case Study on DropboxBruce Wu, Tung Nguyen, Mohammad Husain. 135-138 [doi]
- A Generic Framework for EEG-Based Biometric AuthenticationAditya Sundararajan, Alexander Pons, Arif I. Sarwat. 139-144 [doi]
- Vectorization of Poly1305 Message Authentication CodeMartin Goll, Shay Gueron. 145-150 [doi]
- Using Unrestricted Mobile Sensors to Infer Tapped and Traced User InputsTrang Nguyen. 151-156 [doi]
- Safeguarding Web Surfing with URL BlacklistingTara Baniya, Dipesh Gautam, Yoohwan Kim. 157-162 [doi]
- Data Warehousing Based Computer Forensics Investigation FrameworkWaleed Halboob, Ramlan Mahmod, Muhammad Abulaish, Haider Abbas, Kashif Saleem. 163-168 [doi]
- A Lightweight Key Freshness Scheme for Wireless Sensor NetworksAtaUllah Ghafoor, Muhammad Sher, Muhammad Imran 0001, Kashif Saleem. 169-173 [doi]
- LPSSE: Lightweight Phrase Search with Symmetric Searchable Encryption in Cloud StorageMingChu Li, Wei Jia, Cheng Guo, Weifeng Sun, Xing Tan 0002. 174-178 [doi]
- Access Control Model Based on Trust and Risk Evaluation in IDMaaSFei Liu, Jing Wang, Hongtao Bai, Huiping Sun. 179-184 [doi]
- Secure Layered Architecture for Session Initiation Protocol Based on SIPSSO: Formally Proved by ScytherUbaid Ur Rehman, Abdul Ghafoor Abbasi. 185-190 [doi]
- Privacy-Preserving Mechanism for Monitoring Sensitive DataRafael Tome de Souza, Sérgio Donizetti Zorzo. 191-196 [doi]
- A Novel Approach to Detect Tampered Wireless Network ApplicationsVictor Clincy, Hossain Shahriar. 197-199 [doi]
- Security and Design Challenges in Cyber-Physical SystemsYenumula B. Reddy. 200-205 [doi]
- Analysis of Security Vulnerabilities of Cloud Computing Environment Service Models and Its Main CharacteristicsAnteneh Girma, Moses Garuba, Jiang Li 0009. 206-211 [doi]
- Analysis of DDoS Attacks and an Introduction of a Hybrid Statistical Model to Detect DDoS Attacks on Cloud Computing EnvironmentAnteneh Girma, Moses Garuba, Jiang Li 0009, Chunmei Liu. 212-217 [doi]
- Taxonomy of Delegation ModelAmir Ali, Umme Habiba, Muhammad Awais Shibli. 218-223 [doi]
- Network Intrusion Detection Using Diversity-Based Centroid MechanismMuhammad Shafique Gondal, Arif Jamal Malik, Farrukh Aslam Khan. 224-228 [doi]
- Relationship between Lucas Sequences and Gaussian Integers in CryptosystemsAleksey Koval. 229-233 [doi]
- Analysis of the Scalability and Stability of an ACO Based Routing Protocol for Wireless Sensor NetworksKashif Saleem, Abdelouahid Derhab, Mehmet A. Orgun, Jalal Al-Muhtadi. 234-239 [doi]
- Use of Centrality Metrics to Determine Connected Dominating Sets for Real-World Network GraphsNatarajan Meghanathan. 243-248 [doi]
- SCUMG: Secure Code Update for Multicast Group in Wireless Sensor NetworksM. B. Nirmala, A. S. Manjunath. 249-254 [doi]
- Evaluating the Effect of 3D World Integration within a Social Software EnvironmentHani Bani-Salameh, Clinton Jeffery. 255-260 [doi]
- Comparison of Multi-user Timing Offset Resilient Uplink OFDMA Schemes with Optimal Power ControlJin-hui Lee, Dong-jun Na, Kwonhue Choi. 261-266 [doi]
- Towards Scalability in Systems with Write Operations in Relational DatabasesLeonardo Jose Gomes da Silva, Leandro Guarino de Vasconcelos, Glauco da Silva, Luiz Eduardo Guarino de Vasconcelos. 267-272 [doi]
- Design of Low-Cost On-board Auto-tracking Antenna for Small UASSai Ram Ganti, Yoohwan Kim. 273-279 [doi]
- A Minimum Channel Switch Routing Protocol for Cognitive Radio Ad Hoc NetworksNatarajan Meghanathan, Mesafint Fanuel. 280-285 [doi]
- Low Cost Unmanned Aerial Vehicle Monitoring Using Smart Phone TechnologyPaul Wong, Duong Nguyen, Ahmed Abukmail, Richard Brown, Robert Ryan, Mary Pagnutti. 286-291 [doi]
- Framework for Secure Code Updates for Wireless Sensor NodesM. B. Nirmala, A. S. Manjunath. 292-295 [doi]
- Cluster Based Routing in NDNGaurav Verma, Arun Nandewal, K. Chandrasekaran. 296-301 [doi]
- Implementing Packet Transfer in Wireless Networks Using PyGameYenumula B. Reddy, Anthony Cherry. 302-306 [doi]
- Intrusion Detection System against Sink Hole Attack in Wireless Sensor Networks with Mobile SinkMohamed Guerroumi, Abdelouahid Derhab, Kashif Saleem. 307-313 [doi]
- Automatic Detection of Early Esophageal Cancer from Endoscope Image Using Fractal Dimension and Discrete Wavelet TransformJumpei Yamaguchi, Akihiko Yoneyama, Teruya Minamoto. 317-322 [doi]
- Image Quality Assessment for Measuring the Degradation by Using the Dual-Tree Complex Discrete Wavelet TransformHajime Omura, Teruya Minamoto. 323-328 [doi]
- No-Reference Image Blur Assessment in the DWT Domain and Blurred Image ClassificationAkihiko Yoneyama, Teruya Minamoto. 329-334 [doi]
- Image Compression with Average Interpolating Lifting Scheme on Triangular LatticeKensuke Fujinoki. 335-340 [doi]
- Convolution and Correlation Theorems for Wigner-Ville Distribution Associated with Linear Canonical TransformMawardi Bahri, Ryuichi Ashino. 341-346 [doi]
- Fractional Hilbert Transforms of Biorthogonal WaveletsAkira Morimoto, Ryuichi Ashino, Kazuma Ikebe, Motoi Tatsumi, Takeshi Mandai. 347-352 [doi]
- Reproducible Triangular Solvers for High-Performance ComputingRoman Iakymchuk, David Defour, Sylvain Collange, Stef Graillat. 353-358 [doi]
- An Approach to Business Process Recovery from Source CodeLuiz A. Pacini Rabelo, Antônio Francisco do Prado, Wanderley Lopes de Souza, Luís Ferreira Pires. 361-366 [doi]
- Fuzzy Time Constraint Propagation Mechanism for Workflow NetsJoslaine Cristina Jeske de Freitas, Stéphane Julia. 367-372 [doi]
- A Study of Test Techniques for Integration with Domain Driven DesignEloisa Cristina Silva Santos, Delano Medeiros Beder, Rosângela Aparecida Dellosso Penteado. 373-378 [doi]
- Adaptable Design for Root Cause Analysis of a Model-Based Software Testing ProcessMikko Nieminen, Tomi Räty. 379-384 [doi]
- Investigating the Link between User Stories and Documentation Debt on Software ProjectsHenrique Frota Soares, Nicolli S. R. Alves, Thiago Souto Mendes, Manoel G. Mendonça, Rodrigo O. Spínola. 385-390 [doi]
- Visual Approach for Change Impact Analysis: A Controlled ExperimentFernanda Madeiral Delfim, Lilian P. Scatalon, Jorge Marques Prates, Rogério Eduardo Garcia. 391-396 [doi]
- Identifying Similarity of Software in Apache Ecosystem - An Exploratory StudyLuisa Hernandez, Heitor Costa. 397-402 [doi]
- A System Based on Ontology and Case-Based Reasoning to Support Distributed TeamsRodrigo G. C. Rocha, Ryan R. Azevedo, Dimas Cassimiro, Renan Leandro, Diogo Espinhara, Eduardo de A. Tavares, Amanda Oliveira, Gabriel Franca, Cleyton M. O. Rodrigues, Silvio Meira 0001. 403-408 [doi]
- A Software Framework for Identifying the Law of Demeter ViolationsRoberto Pepato Mellado, Gabriel de Souza Pereira Moreira, Adilson Marques da Cunha, Luiz Alberto Vieira Dias. 409-414 [doi]
- A Fuzzy Logic Model for Predicting the Development Schedule of Software ProjectsCuauhtémoc López Martín, Arturo Chavoya, Maria Elena Meda-Campaña. 415-420 [doi]
- MuAsmetaL: An Experimental Mutation System for AsmetaLOsama Alkrarha, Jameleddine Hassine. 421-426 [doi]
- Criteria and Guidelines to Improve Software Maintainability in Software Product LinesGustavo Vale, Ramon Abílio, André Pimenta Freire, Heitor Costa. 427-432 [doi]
- Detecting Code Smells in Software Product Lines - An Exploratory StudyRamon Abílio, Juliana Padilha, Eduardo Figueiredo 0001, Heitor Costa. 433-438 [doi]
- Making GUI Testing Practical: Bridging the GapsPekka Aho, Matias Suarez, Atif M. Memon, Teemu Kanstrén. 439-444 [doi]
- Towards a Framework for Gamification Design on Crowdsourcing Systems: The G.A.M.E. ApproachJailson Brito, Vaninha Vieira, Adolfo Duran. 445-450 [doi]
- Using Developers Contributions on Software Vocabularies to Identify ExpertsKatyusco de F. Santos, Dalton Dario Serey Guerrero, Jorge C. A. de Figueiredo. 451-456 [doi]
- Light VN: A Light-Weight Testbed for Network and Security ExperimentsQuamar Niyaz, Weiqing Sun, Rao Xu, Mansoor Alam. 459-464 [doi]
- High-Performance Biomedical Association Mining with MapReduceYanqing Ji, Yun Tian, Fangyang Shen, John Tran. 465-470 [doi]
- Integrated Design Patterns for Control System Analysis and SynthesisWilliam Babikian, Zechariah Gajadhar, Anjali Dhobale, Michael Rubenacker, Shouling He. 471-472 [doi]
- Evaluation of Online Power-Down AlgorithmsJames Andro-Vasko, Wolfgang Bein, Dara Nyknahad, Hiro Ito. 473-478 [doi]
- Optimizing Border Patrol Operations Using Unmanned Aerial VehiclesDoina Bein, Wolfgang Bein, Ashish Karki, Bharat B. Madan. 479-484 [doi]
- Smart Grid Security RisksJeffrey Anu, Rajeev Agrawal, Cameron Seay, Sambit Bhattacharya. 485-489 [doi]
- Controlling the Distributed Energy Resources Using Smart Grid CommunicationsMd. Masud Rana, Li Li. 490-495 [doi]
- Distributed Generation Monitoring of Smart Grid Using Accuracy Dependent Kalman Filter with Communication SystemsMd. Masud Rana, Li Li. 496-500 [doi]
- Kalman Filter Based Microgrid State Estimation Using the Internet of Things Communication NetworkMd. Masud Rana, Li Li. 501-505 [doi]
- Joint Write-Once-Memory and Error-Control CodesXudong Ma. 506-512 [doi]
- Critical Success Factors for Location-Based Services in Saudi ArabiaSoumayah F. Alghannam, Mona I. Alawadh, Dalal A. Alwedaah, Mutlaq B. Alotaibi. 515-521 [doi]
- Vector Cryptography System: An Approach for the Analysis of Linear Arithmetic SpacesFausto Abraham Jacques Garcia, Sandra Luz Canchola-Magdaleno. 522-527 [doi]
- GLIESE - A Framework for Experimental Game DevelopmentFederico Amendola, Martin-Fernandez, Liliana Favre. 528-533 [doi]
- A Method for Recommending Computer-Security Training for Software Developers: Leveraging the Power of Static Analysis Techniques and Vulnerability RepositoriesMuhammad Nadeem, Edward B. Allen, Byron J. Williams. 534-539 [doi]
- Training through Simulation for Digital BattlefieldCristian Barria, Cristian Rusu, Claudio Cubillos, Jaime Díaz. 540-545 [doi]
- Heuristic Evaluation as a Complement to Usability Testing: A Case Study in Web DomainFreddy Paz, Freddy Asrael Paz, Daniela Villanueva, José Antonio Pow-Sang. 546-551 [doi]
- A Multiple View Interactive Environment to Support MATLAB and GNU/Octave Program ComprehensionIvan M. Lessa, Glauco de Figueiredo Carneiro, Miguel P. Monteiro 0001, Fernando Brito e Abreu. 552-557 [doi]
- The Role of mHealth Applications in Societal and Social Challenges of the FutureMaa Isakovic, Jaka Cijan, Urban Sedlar, Mojca Volk, Janez Beter. 561-566 [doi]
- Opportunities and Challenges of Internet-Based Health Interventions in the Future InternetAi Keow Lim, Christoph Thuemmler. 567-573 [doi]
- Healthcare Privacy: How Secure Are the VOIP/Video-Conferencing Tools for PHI Data?Sweta Gurung, Yoohwan Kim. 574-579 [doi]
- Future Internet in Surgical Operating TheatreAhmed Elsherbiny Hasan, Armin Schneider, Alois Paulin, Christoph Thuemmler. 580-585 [doi]
- Automatic Fall Detection Using Mobile DevicesMelissa Katherine Mulcahy, Stan Kurkovsky. 586-588 [doi]
- Cloud Computing: Digital Forensic SolutionsEmi Morioka, Mehrdad Sepehri Sharbaf. 589-594 [doi]
- Exploring Timing Model Extractions at EAST-ADL Design-Level Using Model TransformationsAlessio Bucaioni, Saad Mubeen, Antonio Cicchetti, Mikael Sjödin. 595-600 [doi]
- Enabling Real-Time Context-Aware Collaboration through 5G and Mobile Edge ComputingSwaroop Nunna, Apostolos Kousaridas, Mohamed Ibrahim, Markus Dillinger, Christoph Thuemmler, Hubertus Feussner, Armin Schneider. 601-605 [doi]
- PERSEC - Middleware for Multiple Encryption in Web ServicesAllan Delon Barbosa Araujo, Paulo Caetano da Silva. 609-614 [doi]
- Dataless Data Mining: Association Rules-Based Distributed Privacy-Preserving Data MiningVikas G. Ashok, Karthik Navuluri, A. Alhafdhi, Ravi Mukkamala. 615-620 [doi]
- Intelligent Mobile Application for Traffic MonitoringMark Smith. 621-625 [doi]
- Collecting and Mining Big Data for Electric Vehicle Systems Using Battery Modeling DataChung-Hong Lee, Chih-Hung Wu. 626-631 [doi]
- A Technology-Business-Environment Model for Effective Internet Entrepreneurship EducationSonya Zhang. 632-637 [doi]
- Linear optimization with fuzzy objective function and constraintsIbraheem Alolyan. 638-639 [doi]
- Parental Awareness and Mediation of Children's Internet Use in KuwaitSamir N. Hamade. 640-645 [doi]
- Low Birth Weight Prediction Based on Maternal and Fetal CharacteristicsMali Abdollahian, Nadeera Gnan Tilshan Gunaratne. 646-650 [doi]
- Using the Web 1T 5-Gram Database for Attribute Selection in Formal Concept Analysis to Correct Overstemmed ClustersGuymon R. Hall, Kazem Taghva. 651-654 [doi]
- Automated Extraction Information System from HUDs Images Using ANNLuiz Eduardo Guarino de Vasconcelos, Andre Yoshimi Kusumoto, Nelson Paiva Oliveira Leite, Cristina Moniz Araujo Lopes. 657-661 [doi]
- Change Detection in Satellite Images Using Self-Organizing MapsMichael D. L. Santos, Elcio H. Shiguemori, Rodrigo Luiz Mendes Mota, Alexandre C. B. Ramos. 662-667 [doi]
- Improved Histogram-Shifting-Imitated Reversible Data Hiding SchemePyung-Han Kim, Dae-Soo Kim, Kee-Young Yoo. 668-673 [doi]
- An Obstacle Classification Method Using Multi-feature Comparison Based on 2D LIDAR DatabaseMoohyun Lee, Soojung Hur, Yongwan Park. 674-679 [doi]
- An Experiment of Mutual Interference between Automotive LIDAR ScannersGunzung Kim, Jeongsook Eom, Yongwan Park. 680-685 [doi]
- LIVEIA: A Light-Based Immersive Visualization Environment for Imaginative ActualizationLiane Gabora. 686-691 [doi]
- GPU Based Sound Simulation and VisualizationTorbjorn Loken, Sergiu M. Dascalu, Frederick C. Harris Jr.. 692-697 [doi]
- Qubits or Symbolic Substitutions for General-Purpose Quantum Computing?C. H. Wu. 698-702 [doi]
- A Boltzmann Machine Implementation for the D-WaveJohn E. Dorband. 703-707 [doi]
- Constructing 2D Shapes by Inward DentingLaxmi P. Gewali, Pratik Hada. 708-713 [doi]
- Deadlocks in Different Operating SystemsHelidon Karcanaj, Edra Bumci, Igli Tafa, Julian Fejzaj. 717-718 [doi]
- Facebook Privacy Management SimplifiedShih-Wei Fang, Dananjaya Rajamanthri, Mohammad Husain. 719-720 [doi]
- Interest Flooding Attack Countermeasures Assessment on Content Centric NetworkingMatteo Virgilio, Guido Marchetto, Riccardo Sisto. 721-724 [doi]
- Android vs iOS Security: A Comparative StudyIbtisam Mohamed, Dhiren Patel. 725-730 [doi]
- Information Security Culture Critical Success FactorsMohammed Alnatheer. 731-735 [doi]
- Strategy as a Prerequisite of Enterprise Web 2.0 ImplementationFayez Hussain Alqahtani, Ayed Said Alwadain. 736-739 [doi]
- A Model of the Factors Influencing Enterprise Architecture Evolution in OrganisationsAyed Said Alwadain, Fayez Hussain Alqahtani. 740-743 [doi]
- E-commerce Concerns - Latin American Factors in Transactional WebsitesJaime Díaz Arancibia, Cristian Rusu, Cristian Barria, César Collazos O.. 744-745 [doi]
- A Conceptual Model for Customer Lock-in Effect in Electronic BusinessMozhdeh Sadighi, Mohammad Mahdi Ghobadi, Seyyed Hossein Hasanpour Matikolaee. 746-750 [doi]
- Adopting Collaborative Workflow Pattern: Lesson LearnedAntonio Capodieci, Giuseppe Del Fiore, Luca Mainetti. 751-755 [doi]
- Implementations of File Locking Mechanisms, Linux and WindowsNevila Xoxa, Aldiger Mehilli, Igli Tafa, Julian Fejzaj. 756-757 [doi]
- The Simulation of Round Robin and Priority Scheduling AlgorithmAlban Karapici, Enri Feka, Igli Tafa, Alban Allkoçi. 758 [doi]
- Evaluation of Accomplishment of DO-178C Objectives by CMMI-DEV 1.3Alan Ferreiros, Luiz Alberto Vieira Dias. 759-760 [doi]
- A Case Study Using Testing Technique for Software as a Service (SaaS)Alexandre Chaves da Silva, Lucas Roberto Correa, Luiz Alberto Vieira Dias, Adilson Marques da Cunha. 761-762 [doi]
- An Attempt to Find Information for Multi-dimensional Data SetsYong Shi, Sunpil Kim. 763-764 [doi]
- Using Hadoop on the Mainframe: A Big Solution for the Challenges of Big DataCameron Seay, Rajeev Agrawal, Anirudh Kadadi, Yannick Barel. 765-769 [doi]
- Using Personas to Support the Goals in User StoriesPankaj Kamthan. 770 [doi]
- Risk Management Lifecycle Implementation Services in SOAErasmo Leite Monteiro, Paulo Caetano da Silva. 771 [doi]
- Experiment Report on the Implementation of Agile TestingDanielle Amaral Menendez, Elisa S. Menendez, Thiers Garretti Ramos Sousa, Paulo Caetano da Silva. 772-773 [doi]
- Project Management Using the Scrum Agile Method: A Case Study within a Small EnterpriseBreno Lisi Romano, Alan Delgado da Silva. 774-776 [doi]
- Deploying Integrated Environment for Software Testing ToolsBreno Lisi Romano, Ricardo Bragagnolle de Souza, Adilson Marques da Cunha. 777-779 [doi]
- Deadlock-Freeness Scenarios Detection in Web Service CompositionLígia Maria Soares Passos, Stéphane Julia. 780-783 [doi]
- Hardware Development: Agile and Co-DesignGlaydson Luiz Bertoze Lima, Guilherme Augusto Ferreira, Osamu Saotome, Adilson Marques da Cunha, Luiz Alberto Vieira Dias. 784-787 [doi]
- Modeling Recursive Search Algorithms by Means of Hierarchical Colored Petri Nets and CPN ToolsClarimundo Machado Moraes Junior, Rita Maria da Silva Julia, Stéphane Julia. 788-791 [doi]
- A Parallel GPU Implementation of the Timber Wolf Placement AlgorithmAhmad Al Kawam, Haidar M. Harmanani. 792-795 [doi]
- Applying the Method of Diverse Redundancy in Cloud Based Systems for Increasing ReliabilitySeilkhan Boranbayev, Sanzhar Altayev, Askar Boranbayev. 796-799 [doi]
- Applying Data Mining Techniques to Intrusion DetectionJonathon Ng, Deepti Joshi, Shankar M. Banik. 800-801 [doi]
- Implementation of Security Systems for Prevention of Loss of Information at Organizations of Higher EducationAskar Boranbayev, Mikhail Mazhitov, Zhanat Kakhanov. 802-804 [doi]