Abstract is missing.
- Reducing Power Consumption and Improving Quality of Service in Cloud Computing EnvironmentsYuki Awano, Shin-ichi Kuribayashi. 1-6 [doi]
- Multitenancy - Security Risks and CountermeasuresWayne J. Brown, Vince Anderson, Qing Tan. 7-13 [doi]
- The Cloud Computing Applications in Information Resource Dynamic AllocationHui Ma, Yue Qiu. 14-17 [doi]
- Cloud Computing: Architecture for Efficient Provision of ServicesNawsher Khan, Ahmad Noraziah, Tutut Herawan, Elrasheed I. Ismail, Zakira Inayat. 18-23 [doi]
- Single Transition Constraint for XML Update ValidationNorfaradilla Wahid, Eric Pardede. 24-31 [doi]
- Integration of Data Warehouse and Unstructured Business DocumentsAhmad Abdullah Alqarni, Eric Pardede. 32-37 [doi]
- Indexing Moving Objects in Indoor Cellular SpaceSultan Alamri, David Taniar, Maytham Safar. 38-44 [doi]
- Database Research: Are We at a Crossroad? Reflection on NoSQLMaria Indrawan-Santiago. 45-51 [doi]
- Experimental Evaluation of Anonymous Protocols under the JXTA MiddlewarJoan Arnedo-Moreno, Noemi Perez-Gilabert, Marc Domingo-Prieto. 52-57 [doi]
- Trustworthy Group Formation Algorithm Based on Decentralized Trust Management in Distributed SystemsAilixier Aikebaier, Tomoya Enokido, Makoto Takizawa. 58-65 [doi]
- Dynamic Reconfiguration of Chord Ring Based on Physical Network and Finger Table InformationYuta Shimano, Fumiaki Sato. 66-73 [doi]
- A Chunk Scheduling Based on Chunk Diffusion Ratio on P2P Live StreamingYoshiki Sakata, Kazuyuki Takayama, Rei Endo, Hiroshi Shigeno. 74-81 [doi]
- Estimating the Number of Lanes on Rapid Road Map Survey System Using GPS Trajectories as Collective IntelligenceNobuyoshi Sato, Tsuyoshi Takayama, Yoshitoshi Murata. 82-88 [doi]
- Local Area Network Reactivation in Never Die Network for a Large Scale DisasterNoriki Uchida, Kazuo Takahata, Yoshitaka Shibata, Norio Shiratori. 89-96 [doi]
- Performance Evaluation of DYMO Protocol in Different VANET ScenariosEvjola Spaho, Makoto Ikeda, Leonard Barolli, Fatos Xhafa, Aleksander Biberaj, Makoto Takizawa. 97-103 [doi]
- Integrating Information Systems Business Rules into a Design ModelMohammed Bonais, J. Wenny Rahayu, Eric Pardede. 104-111 [doi]
- The Extended Transmission Power Consumption Model for Communication-Based ApplicationsTomoya Enokido, Makoto Takizawa. 112-119 [doi]
- Evaluation of an Energy-Aware Selection Algorithm for Computation and Storage-Based ApplicationsTakuro Inoue, Ailixier Aikebaier, Tomoya Enokido, Makoto Takizawa. 120-127 [doi]
- RAIDv: Extensible RAID1 Based on VotingMinoru Uehara. 128-133 [doi]
- A Comparative Study of a MANET Testbed Performance in Indoor and Outdoor Stairs EnvironmentMasahiro Hiyama, Elis Kulla, Makoto Ikeda, Leonard Barolli, Muhammad Younas. 134-140 [doi]
- Simulation Performance of a MANET Using Static Source and Destination Considering AODV Routing ProtocolElis Kulla, Makoto Ikeda, Leonard Barolli, Muhammad Younas, Kazunori Uchida, Makoto Takizawa. 141-147 [doi]
- An Implementation of Visualization System for Visualizing Network Topology and Packet Flow in Mobile Ad Hoc NetworksAkio Koyama, Shohei Sato, Leonard Barolli, Makoto Takizawa. 148-155 [doi]
- TCP Congestion Control in MANETs for Multiple Traffic Considering Proactive and Reactive Routing ProtocolsMakoto Ikeda, Elis Kulla, Masahiro Hiyama, Leonard Barolli, Muhammad Younas, Makoto Takizawa. 156-163 [doi]
- Design and Evaluation of Multimedia Quorum-Based Synchronization ProtocolsTadateru Ohkawara, Ailixier Aikebaier, Tomoya Enokido, Makoto Takizawa. 164-171 [doi]
- Geological Visualisation with Augmented RealityDylan Mathiesen, Trina S. Myers, Ian M. Atkinson, Jarrod Trevathan. 172-179 [doi]
- Extending Service Coverage Using FGS-Aware Blind RepetitionJuyoung Park, Jaemyoun Lee, Junbeom Hur, Kyungtae Kang. 180-186 [doi]
- Evaluation of a Seamless Surveillance Video Monitoring System Used by High-Speed Network and High-Resolution Omni-directional CamerasTakuma Kon, Noriki Uchida, Koji Hashimoto, Yoshitaka Shibata. 187-193 [doi]
- A Boundary Node Detection Based Solution for Minimizing the Effects of Nodes Distribution over Key Exchange in Group Based WSNRabia Latif, Asad Raza. 194-199 [doi]
- Energy-Efficient Data Gathering Using Traffic Reduction Based on Change in Data Characteristics in Wireless Sensor NetworksShinya Kondo, Akimitsu Kanzaki, Takahiro Hara, Shojiro Nishio. 200-207 [doi]
- A Fuzzy-Based Simulation System for Controlling Sensor Speed in Wireless Sensor NetworksQi Wang, Leonard Barolli, Elis Kulla, Arjan Durresi, Aleksander Biberaj, Makoto Takizawa. 208-213 [doi]
- Node Placement in WMNs and Visualization of Evolutionary Computation Process Using WMN-GA SystemTetsuya Oda, Admir Barolli, Evjola Spaho, Leonard Barolli, Fatos Xhafa, Jiro Iwashige. 214-220 [doi]
- Mobile Social Game Design from the Perspective of Persuasive TechnologyToshihiko Yamakami. 221-225 [doi]
- Transition Analysis of Mobile Social Games from Feature-Phone to Smart-PhoneToshihiko Yamakami. 226-230 [doi]
- Feedback Capacity of Random NetworksMaytham Safar, Khaled Mahdi, Ghufran Al-Shiridah. 231-238 [doi]
- Finding Hidden Nodes by Checking for Missing Nodes against Past Social NetworksAlan Chia-Lung Chen, Mohamad Elzohbi, Ahmad Elhajj, Kostas F. Xylogiannopoulos, Panagiotis Karampelas, Mick J. Ridley, Reda Alhajj. 239-246 [doi]
- TCADS: Trustworthy, Context-Related Anomaly Detection for SmartphonesIngo Bente, Bastian Hellmann, Joerg Vieweg, Josef von Helden, Gabi Dreo. 247-254 [doi]
- Vulnerability Analysis of Relay Set Selection Algorithms for the Simplified Multicast Forwarding (SMF) Protocol for Mobile Ad Hoc NetworksJiazi Yi, Thomas H. Clausen. 255-260 [doi]
- A Proposal of Security Advisory System at the Time of the Installation of Applications on Android OSTakayuki Matsudo, Eiichiro Kodama, Jiahong Wang, Toyoo Takata. 261-267 [doi]
- Theoretical Suggestion of Policy-Based Wide Area Network Management System (wDACS System Part-I)Kazuya Odagiri, Shogo Shimizu, Naohiro Ishii, Makoto Takizawa. 268-275 [doi]
- The QoS-Aware Order Prediction Scheduling (QOPS) Scheme for Video Streaming Using the Multi-path Datagram Congestion Control Protocol (MP-DCCP)Chung-Ming Huang, Yih-Chung Chen, Shih Yang Lin. 276-283 [doi]
- Application Layer Traffic Engineering for Multipoint Communication SystemYumi Nakayama, Katsuhiko Kaji, Nobuo Kawaguchi. 284-289 [doi]
- Proposal and Evaluation of Ant-Based Routing with Autonomous Zoning for Convergence ImprovementNaomi Kuze, Naoki Wakamiya, Masayuki Murata. 290-297 [doi]
- A Mechanism of Trailing the Footprint for the Previously Visited Web Pages to Ease a Meta-Knowledge-Based SearchKeizo Sato, Yoshitaka Adachi, Makoto Nakashima, Tetsuro Ito. 298-305 [doi]
- Building an Information System for Reality Mining Based on Communication TracesMatthias Steinbauer, Gabriele Kotsis. 306-310 [doi]
- Riskr: A Low-Technological Web2.0 Disaster Service to Monitor and Share InformationJess Farber, Trina S. Myers, Jarrod Trevathan, Ian M. Atkinson, Trevor Andersen. 311-318 [doi]
- Community Site for Music Therapists Based on the Session Records of Music TherapyNaoko Kosugi, Mayu Kondo. 319-325 [doi]
- An Interface for Simulating Node Placement in Wireless Mesh NetworksFatos Xhafa, Albert Bravo, Admir Barolli, Makoto Takizawa. 326-333 [doi]
- Effects of Directional Receiving for MAC-Level Broadcasting on Wireless Ad Hoc NetworksTetsuya Shigeyasu, Hiroshi Matsuno. 334-340 [doi]
- Performance Evaluation of WSNs Considering MAC and Routing Protocols Using Goodput and Delay MetricsTao Yang, Elis Kulla, Tetsuya Oda, Leonard Barolli, Muhammad Younas, Makoto Takizawa. 341-348 [doi]
- Dynamic Superframe Selection Scheme for High-Speed Wireless NetworksSuhaimi Bin Abd Latif, M. A. Rashid. 349-356 [doi]
- Building and Evaluating a Mobile Application for an Academic LibraryStan Kurkovsky, Wittawat Meesangnil. 357-363 [doi]
- A Handling Management System for Freight with the Ambient Calculus and UHF RFID TagsToru Kato, Masahiro Higuchi. 364-371 [doi]
- General Pattern Discovery for Social Game on FacebookMartin M. Weng, Guangyu Piao, Neil Y. Yen, Timothy K. Shih. 372-375 [doi]
- On Remote Attestation for Google Chrome OSIngo Bente, Bastian Hellmann, Thomas Rossow, Joerg Vieweg, Josef von Helden. 376-383 [doi]
- Robust Biometrics-Based Remote User Authentication Scheme Using Smart CardsToan-Thinh Truong, Minh-Triet Tran, Anh Duc Duong. 384-391 [doi]
- Trust Management of Social Networks in Health CarePawat Chomphoosang, Arjan Durresi, Mimoza Durresi, Leonard Barolli. 392-396 [doi]
- Ordered Delivery of Messages in Group Communication ProtocolsDilawaer Duolikun, Ailixier Aikebaier, Tomoya Enokido, Makoto Takizawa. 397-401 [doi]
- Trustworthiness of Peers in P2P Overlay NetworksAilixier Aikebaier, Tomoya Enokido, Makoto Takizawa. 402-407 [doi]
- An Approach Mining Cyclic Association Rules in E-CommerceDinh Thuan Nguyen, Gia Toan Nguyen, Lam Vu Tuan Nguyen. 408-411 [doi]
- Online Slicing Analysis in Adverse Drug Reaction Data WarehouseXiuzhen Feng, Xiaohong He, Bianling Feng. 412-416 [doi]
- Cyber-Physical Systems as an Enabler for Next Generation ApplicationsJaipal Singh, Omar Hussain. 417-422 [doi]
- PID Controller for Temperature Control with Multiple Actuators in Cyber-Physical Home SystemWai Wai Shein, Yasuo Tan, Azman Osman Lim. 423-428 [doi]
- Detecting and Mitigating HX-DoS Attacks against Cloud Web ServicesAshley Chonka, Jemal Abawajy. 429-434 [doi]
- jxSensor: A Sensor Network Integration Layer for JXTAMarc Domingo-Prieto, Joan Arnedo-Moreno, Xavi Vilajosana-Guillen. 435-440 [doi]
- Empirical Study of Decision Trees and Ensemble Classifiers for Monitoring of Diabetes Patients in Pervasive HealthcareAndrei Kelarev, Andrew Stranieri, John Yearwood, Herbert F. Jelinek. 441-446 [doi]
- Establishing Context for Software Agents in Pervasive Healthcare SystemsCedric Perrot, Gavin Finnie, Iain Morrison. 447-452 [doi]
- A Scheduling Scheme for Improving Error Resilience on Media Data BroadcastingYusuke Gotoh, Hideo Taniguchi. 453-458 [doi]
- Novel Control Method for Preventing Missed Deadlines in Periodic SchedulingYuuki Furukawa, Toshihiro Yamauchi, Hideo Taniguchi. 459-464 [doi]
- TeleCaS: Division Based Broadcasting System Considering Sequential PlaybackAkihiro Kimura, Yusuke Gotoh, Hideo Taniguchi. 465-470 [doi]
- Video Data Reception Methods Considering Playing Position on Hybrid Broadcasting EnvironmentsTomoki Yoshihisa, Shojiro Nishio. 471-476 [doi]
- A Novel Server System to Support Different Types of Communication Services for ApplicationsJ. Elton, P. W. H. Chung. 477-482 [doi]
- Crowdsourcing in Heterogeneous Networked Environments - Opportunities and ChallengesAxel Korthaus, Wei Dai. 483-488 [doi]
- Intelligent Cargo Tracking System Based on the Internet of ThingsLixin Zhou, Catherine Xiaocui Lou. 489-493 [doi]
- An Integration Technology for Socially Aware Mobile Applications in Heterogeneous Networking EnvironmentsXiaomin Zhu, Donghua Chen, Wei Dai, Runtong Zhang. 494-499 [doi]
- Integration of Mobile-Devices-Based Personal Analytics into Enterprise Organizational Transformation ScenariosSerguei Dobrinevski. 500-505 [doi]
- HetNet Framework for Supply Chain ManagementPaul Moynihan, Wei Dai. 506-511 [doi]
- Developing an Integrated Supply Chain System for Small Businesses in Australia: A Service-Oriented PHOENIX SolutionYongqiang Li, Wei Dai, Anona Armstrong, Andrew Clarke, Miaoli Du. 512-517 [doi]
- Robust Supply Chain Services System through Optimization Modeling for EnterprisesCatherine Xiaocui Lou, Wei Dai. 518-523 [doi]
- A Preliminary Evaluation for Effectiveness of Media Switching FunctionKaoru Sugita, Masao Yokota. 524-527 [doi]
- A Method for User-Location Estimation for Intuitive Input System on Very Large Display SpaceAkira Sakuraba, Tomoyuki Ishida, Yoshitaka Shibata. 528-533 [doi]
- Digital 3D Ukiyoe Using the Effect of Motion ParallaxTetsuro Ogi, Yoshisuke Tateyama, Hao Lu, Erika Ikeda. 534-539 [doi]
- Approaches to Display of Ultra-resolution Video Streaming by Multi-transmission on Tiled Display EnvironmentYasuo Ebara. 540-545 [doi]
- A Universal Multimedia Contents on a Tiled Display EquipmentKaoru Sugita, Masao Yokota. 546-549 [doi]
- A Unified Large Scale Disaster Information Presentation System Using Ultra GIS Based Tiled Display EnvironmentTomoyuki Ishida, Akira Sakuraba, Noriki Uchida, Koji Hashimoto, Yoshitaka Shibata. 550-555 [doi]
- An Algorithm to Estimate Propagation Parameters Based on 2-Ray ModelKazunori Uchida, Masafumi Takematsu, Junichi Honda. 556-561 [doi]
- Numerical and Experimental Study on Confinement of Microwave in Dielectric and Metallic Post Array WaveguideHiroshi Maeda, Huili Chen, Kazuya Tomiura, Takuya Shinohara. 562-566 [doi]
- An Algorithm for Analysis of Reflected and Diffracted Fields from a Polyhedron Type of Target above a Plane-GroundJunichi Honda, Takuya Otsuyama. 567-571 [doi]
- A Study on the Reading Characteristics of Colored 2-Dimensional CodeToshihiko Wakahara, Damri Samretwit, Noriyasu Yamamoto. 572-576 [doi]
- Application of RFID Technology for In-House Drug Management SystemMalabika Parida, Huan-Chi Yang, Shiang-Wen Jheng, Chung-Jen Kuo. 577-581 [doi]
- A Location-Based Personal Task Management Application for Indoor and Outdoor EnvironmentsChi-Yi Lin, Ming-Tze Hung, Wei-Hsun Huang. 582-587 [doi]
- Posture Recognition with G-Sensors on Smart PhonesHui-Huang Hsu, Kang-Chun Tsai, Zixue Cheng, Tongjun Huang. 588-591 [doi]
- Physiological Angry Emotion Detection Using Support Vector RegressionChuan-Yu Chang, Yu-Mon Lin, Jun-Ying Zheng. 592-596 [doi]
- A Multicast Routing Protocol for Wireless Mesh Networks Considering Network LoadKiyotaka Oe, Akio Koyama. 597-602 [doi]
- On Automatic Flying Distance Measurement on Ski Jumper's Motion Monitoring SystemNobuyoshi Sato, Tsuyoshi Takayama, Yoshitoshi Murata. 603-609 [doi]
- Design of Management System for Arrayed Returnable ContainersRei Itsuki. 610-614 [doi]
- Storage Deduplication by Virtual Large-Scale DisksRitu Endo, Junichi Kumamimi, Minoru Uehara. 615-620 [doi]
- The Evaluations of Desktop as a Service in an Educational CloudShinichiro Kibe, Teruaki Koyama, Minoru Uehara. 621-626 [doi]
- Proposal for Cloud Search Engine as a ServiceTakamasa Miyano, Minoru Uehara. 627-632 [doi]
- Evaluation of a Web-Based Programming EnvironmentHideaki Yanagisawa. 633-638 [doi]
- Long Term Management of Web Cache for Web ArchiveRyunosuke Ozawa, Minoru Uehara. 639-644 [doi]
- Meta Index Model Based Matchmaking for Human Resource Management: An Approach for Similarity Comparing between Employee and Job Position Using Meta Index ModelKeonsoo Lee, Seungmin Rho. 645-649 [doi]
- A Study on the Design of Digital Narrowband Communication System for Next Generation Group CommunicationYang-Sun Lee, Ze-Guang Jin, Jae-Myeong Choi, Sang-Soo Yeo. 650-653 [doi]
- Mobile Cloud Computing for Biometric ApplicationsMilos Stojmenovic. 654-659 [doi]
- Mobile Crowd Computing with Work StealingNiroshinie Fernando, Seng Wai Loke, Wenny Rahayu. 660-665 [doi]
- Trust Based Sensor Network Clustering with Load Balance FactorsMucheol Kim, Sang Oh Park. 666-669 [doi]
- A Neural Network Model Using Extended Feature-Based Neuron: NNDFFSeokhwan Yang, Mokdong Chung. 670-674 [doi]
- Improved Differential Fault Analysis on Block Cipher SEED-128Yuseop Lee, Jongsung Kim, Seokhie Hong, Changhoon Lee. 675-680 [doi]
- Automated Security Level Conversion on Security Documents in Different DomainsJae-Myeong Choi, Sang-Soo Yeo. 681-684 [doi]
- Providing High Availability for Distributed Stream Processing Application with Replica PlacementRong He, Zhongzhi Luan, Yuanqiang Huang, Zhendong Cheng, Depei Qian, Gang Guan. 685-690 [doi]
- Context-Based Hybrid Semantic Matching Framework for E-mentoring SystemMye M. Sohn, Young Min Kwon, Hyun Jung Lee. 691-696 [doi]
- Construction of Tag-Based Dynamic Data Catalog (TaDDCat) Using OntologyHyun Jung Lee, Mye M. Sohn. 697-702 [doi]
- Ambient Widget: An Ambient Information System Using Gesture-Based InteractionsSeongil Lee, Kyohyun Song, Jihwan Kim, Jiho Choi. 703-708 [doi]
- Efficient Statistical Computing on Multicore and MultiGPU SystemsYulong Ou, Bo Li 0005, Hailong Yang, Zhongzhi Luan, Depei Qian. 709-714 [doi]
- Routing Algorithm Based on Ant Colony Optimization for DTN Congestion ControlChengjun Wang, BaoKang Zhao, Wei Peng, Chunqing Wu, Zhenghu Gong. 715-720 [doi]
- CLIP: A Distributed Emulation Platform for Research on Information ReconciliationDingjie Zou, BaoKang Zhao, Chunqing Wu, Bo Liu, Wanrong Yu, Xiangchun Ma, Hongxin Zou. 721-726 [doi]
- Following Routing: An Active Congestion Control Approach for Delay-Tolerant NetworksChengjun Wang, BaoKang Zhao, Wei Peng, Chunqing Wu, Zhenghu Gong. 727-732 [doi]
- A Ubiquitous Smart Learning Platform for the 21st Smart Learners in an Advanced Science and Engineering EducationJong-Suk Ruth Lee, Young Jin Jung, Sun Rae Park, Junglok Yu, Du-Seok Jin, Kum Won Cho. 733-738 [doi]
- Automatic Evaluation of Document Classification Using N-Gram StatisticsDongjin Choi, Byeong-Kyu Ko, Eunji Lee, Myunggwon Hwang, PanKoo Kim. 739-742 [doi]
- Mobile Image Retrieval Using Integration of Geo-sensing and Visual DescriptorDong-Seok Yang, Yong-Hwan Lee. 743-748 [doi]
- Efficient Image Retrieval Using Advanced Clustering SURFYong-Hwan Lee, Hyochang Ahn, Sang-Burm Rhee. 749-753 [doi]
- An Improved Security Approach Based on Kerberos for M2M Open IPTV SystemInshil Doh, Kijoon Chae, Jiyoung Lim, Min Young Chung. 754-759 [doi]
- Access to an Automated Security System Using Gesture-Based PasswordsSeongil Lee, Kyohyun Song, Jiho Choi. 760-765 [doi]
- Anomaly Teletraffic Intrusion Detection Systems on Hadoop-Based Platforms: A Survey of Some Problems and SolutionsHae-Duck Joshua Jeong, WooSeok Hyun, Jiyoung Lim, Ilsun You. 766-770 [doi]
- An Intelligent Data De-duplication Based Backup SystemGuofeng Zhu, Xingjun Zhang, Longxiang Wang, Yueguang Zhu, Xiaoshe Dong. 771-776 [doi]
- A Method for Resisting Averaging Attacks on Digital Watermarks and Use of This Method with Digital WatermarksHiroki Nishikawa, Shingo Kuse, Keiichi Iwamura, Isao Echizen. 777-781 [doi]
- Cooperative Secure Integration Process for Secure System DevelopmentYoshiro Wataguchi, Takao Okubo, Yukie Unno, Nobuyuki Kanaya. 782-786 [doi]
- Securing the Cloud, Dispelling Fears: Ways to Combat Climate ChangeDanilo Valeros Bernardo. 787-793 [doi]
- Access Control Methods Suitable for Stream Contents Delivery Cloud Services by Using Hash-Chain Based Key Derivation SchemesYuji Suga. 794-798 [doi]
- Word Salad CAPTCHA - Application and Evaluation of Synthesized SentencesYoshifumi Kamoshida, Hiroaki Kikuchi. 799-804 [doi]
- A Fuzzy-Based Reliability System for JXTA-Overlay P2P Platform Considering Actual Behaviour and Amount of Data Exchanged between PeersKouhei Umezaki, Evjola Spaho, Leonard Barolli, Fatos Xhafa, Muhammad Younas, Jiro Iwashige. 805-810 [doi]
- Biologically Inspired Hardware: Status and Perspectives (Invited Talk)Salvatore Vitabile. 811-814 [doi]
- Design of Development as a Service in the CloudKatsuyoshi Matsumoto, Shinichiro Kibe, Minoru Uehara, Hideki Mori. 815-819 [doi]
- Castle of Chips: A New Chip Stacking Structure with Wireless Inductive Coupling for Large Scale 3-D Multicore SystemsHideharu Amano. 820-825 [doi]
- Extension of Memory Controller Equipped with MuCCRA-3-DP: Dynamically Reconfigurable Processor ArrayToru Katagiri, Kazuei Hironaka, Hideharu Amano. 826-831 [doi]
- A Uniform Partitioning Method for Mono-Instruction Set Computer (MISC)Hiroyuki Ito, Minoru Watanabe. 832-837 [doi]
- Proposed Sensor Network for Living Environments Using Cloud ComputingYuichiro Takabe, Katsuyoshi Matsumoto, Motoi Yamagiwa, Minoru Uehara. 838-843 [doi]
- A Study on Constructing an Energy Saving Cloud System Powered by Photovoltaic GenerationMotoi Yamagiwa, Minoru Uehara. 844-848 [doi]
- Storage-Side Computing for Data Management in Private and Public CloudsTatsunori Takahashi, Hidenao Tanaka, Shinichiro Kibe, Minoru Uehara. 849-854 [doi]
- Evaluating the Usefulness of Online ReviewsJun Iio. 855-860 [doi]
- User Acceptance of Mobile Business Intelligence ServicesTobias Brockmann, Stefan Stieglitz, Johannes Kmieciak, Stephan Diederich. 861-866 [doi]
- How to Encourage Intermediary on Social MediaYui Takizawa, Kazutaka Tsuji, Tatsuhiro Yonekura. 867-872 [doi]
- Investigating Trends in Social TV Services Based on User Participating ExperimentsNarichika Hamaguchi, Hiroshi Fujisawa, Masaru Miyazaki, Ritsu Yonekura, Satoshi Nishimura. 873-878 [doi]
- A Personal Branding for University Students by Practical Use of Social MediaYoshihiro Kawano, Yuka Obu, Yorinori Kishimoto, Takashi Yamaguchi, Eiji Nunohiro, Tatsuhiro Yonekura. 879-884 [doi]
- Web-Based Tool for Programming Interactive Animations in Terms of State-Transition DiagramsNaoto Takama, Michitoshi Niibori, Shusuke Okamoto, Masaru Kamada, Tatsuhiro Yonekura. 885-888 [doi]
- An Authoring Tool for Flash Games in ActionScript3.0Michitoshi Niibori, Yutaro Arisawa, Shusuke Okamoto, Masaru Kamada, Tatsuhiro Yonekura. 889-892 [doi]
- Authoring Tool for Flash 3D Animations in Terms of State-Transition DiagramsMakoto Rokujo, Michitoshi Niibori, Shusuke Okamoto, Masaru Kamada, Tatsuhiro Yonekura. 893-897 [doi]