Abstract is missing.
- Comparison between PKI (RSA-AES) and AEAD (AES-EAX PSK) Cryptography Systems for Use in SMS-Based Secure TransmissionsHao Wang, William Emmanuel Yu. 1-12 [doi]
- Authentication and Authorization in Web ServicesKhalil Challita, Hikmat Farhat, Joseph Zalaket. 13-23 [doi]
- Integrating Access Control Mechanism with EXEL Labeling Scheme for XML Document UpdatingMeghdad Mirabi, Hamidah Ibrahim, Ali Mamat, Nur Izura Udzir. 24-36 [doi]
- An Access Control Model for Supporting XML Document UpdatingMeghdad Mirabi, Hamidah Ibrahim, Leila Fathi, Nur Izura Udzir, Ali Mamat. 37-46 [doi]
- A Secure Proxy Blind Signature Scheme Using ECCDaniyal M. Alghazzawi, Trigui Mohamed Salim, Syed Hamid Hasan. 47-52 [doi]
- Accelerated Particle Swarm Optimization and Support Vector Machine for Business Optimization and ApplicationsXin-She Yang, Suash Deb, Simon Fong. 53-66 [doi]
- A Study on the Reliability of Data Transmission of an over the Top Network Protocol on SMS versus UDP/ GPRS (Fragmented)Alyssa Marie Dykimching, Jan Aaron Angelo Lee, William Emmanuel Yu. 67-81 [doi]
- QuickFlood: An Efficient Search Algorithm for Unstructured Peer-to-Peer NetworksHassan Barjini, Mohamed Othman, Hamidah Ibrahim. 82-92 [doi]
- Improved-XY: A High Performance Wormhole-Switched Routing Algorithm for Irregular 2-D Mesh NoCLadan Momeni, Arshin Rezazadeh, Davood Abednejad. 93-104 [doi]
- Routing in Mobile Ad-hoc Networks as a Reinforcement Learning TaskSaloua Chettibi, Salim Chikhi. 128-135 [doi]
- Identifying Usability Issues in Personal Calendar ToolsDezhi Wu. 136-146 [doi]
- Adaptive Query Processing for Semantic Interoperable Information SystemsBenharzallah Saber, Kazar Okba, Guy Caplat. 147-163 [doi]
- Statistical Character-Based Syntax Similarity Measurement for Detecting Biomedical Syntax Variations through Named Entity RecognitionHossein Tohidi, Hamidah Ibrahim, Masrah Azrifan Azmi. 164-178 [doi]
- Correction of Invalid XML Documents with Respect to Single Type Tree GrammarsMartin Svoboda, Irena Mlýnková. 179-194 [doi]
- Identification of Scholarly Papers and AuthorsKensuke Baba, Masao Mori, Eisuke Ito. 195-202 [doi]
- A Social Network Model for Academic CollaborationSreedhar Bhukya. 203-211 [doi]
- Performance Evaluation of Preference Evaluation TechniquesAlwan A. Ali, Hamidah Ibrahim, Tan Chik Yip, Fatimah Sidi, Nur Izura Udzir. 212-223 [doi]
- Collective Action Theory Meets the Blogosphere: A New MethodologyNitin Agarwal, Merlyna Lim, Rolf T. Wigand. 224-239 [doi]
- Evaluating K-Best Site Query on Spatial ObjectsYuan-Ko Huang, Lien-Fa Lin. 240-250 [doi]
- Performance of Annotation-Based Image RetrievalPhani Kidambi, Mary Fendley, Sundaram Narayanan. 251-268 [doi]
- Real-Time Detection of Parked Vehicles from Multiple Image StreamsKok-Leong Ong, Vincent C. S. Lee. 280-291 [doi]
- An Adaptive Framework for Personalized E-LearningRonnie Cheung, Hassan B. Kazemian. 292-306 [doi]
- Gov 2.0 and Beyond: Using Social Media for Transparency, Participation and CollaborationDianne Lux Wigand. 307-318 [doi]
- MATAWS: A Multimodal Approach for Automatic WS Semantic AnnotationCihan Aksoy, Vincent Labatut, Chantal Cherifi, Jean François Santucci. 319-333 [doi]
- Towards Ontology-Based Collaboration Framework Based on Messaging SystemGridaphat Sriharee. 345-356 [doi]
- A QoS and Consumer Personality Considered Services DiscoveryXiuqin Ma, Norrozila Sulaiman, Hongwu Qin. 357-363 [doi]
- User Centric Homogeneity-Based Clustering Approach for Intelligence ComputationYun Wei Zhao, Chi-Hung Chi, Chen Ding. 364-372 [doi]
- Multi-way Association Clustering Analysis on Adaptive Real-Time Multicast DataSheneela Naz, Sohail Asghar, Simon Fong, Amir Qayyum. 383-394 [doi]
- Multi Level Mining of Warehouse SchemaMuhammad Usman, Russel Pears. 395-408 [doi]
- On Inserting Bulk Data for Linear Hash FilesSatoshi Narata, Takao Miura. 409-422 [doi]
- A Negotiation Mechanism that Facilitates the Price-Timeslot-QoS Negotiation for Establishing SLAs of Cloud Service ReservationSeokho Son, Kwang Mong Sim. 432-446 [doi]