Abstract is missing.
- Developing Casual Learning Games Using the Apache Pivot IIA CapabilitiesJinan Fiaidhi, Michael D. Rioux, Sabah Mohammed, Tai-Hoon Kim. 1-10 [doi]
- Remote Robotic Laboratory Experiment Platform Based on Tele-programmingChadi Fouad Riman, Eric Monacelli, Imad Mougharbel, Ali El Hajj. 11-22 [doi]
- Understanding Simple Stories through Concepts Extraction and Multimedia ElementsMasoud Udi Mwinyi, Sahar Ahmad Ismail, Jihad M. Alja'am, Ali Jaoua. 23-32 [doi]
- Extended UML for the Development of Context-Aware ApplicationsMohamed Salah Benselim, Hassina Seridi-Bouchelaghem. 33-43 [doi]
- Semantic Aware Implication and Satisfiability for Conjunctive Queries in Semantic CachingMuhammad Azeem Abbas, Muhammad Abdul Qadir, Munir Ahmad, Tariq Ali. 44-54 [doi]
- A Hierarchical Routing Protocols for Self-organizing NetworksHoon Kwon, Ho-Young Kwak, Sang Joon Lee, Sung-Joon Lee. 55-62 [doi]
- A Practical Method for Evaluating the Reliability of Telecommunication NetworkMohamed Larbi Rebaiaia, Daoud Ait-Kadi, Denis Page. 63-77 [doi]
- Combining Classifiers for Spam DetectionFatiha Barigou, Naouel Barigou, Baghdad Atmani. 78-89 [doi]
- Exploring a New Small-World Network for Real-World ApplicationsHidefumi Sawai. 90-101 [doi]
- Fast Algorithm for Deep Packet InspectionSalam Barbary, Hikmat Farhat, Khalil Challita. 102-111 [doi]
- 1+N Orthogonal Encoding with Multiple Failure Tolerance (1+N OEMFT)José-Alejandro Niño-Mora, Yezid Donoso. 112-125 [doi]
- The BASRAH System: A Method for Spoken Broadcast News Story ClusteringZainab A. Khalaf Aleqili. 126-134 [doi]
- Unsupervised Clustering Approach for Network Anomaly DetectionIwan Syarif, Adam Prügel-Bennett, Gary Wills. 135-145 [doi]
- BNITE: Bayesian Networks-Based Intelligent Traffic Engineering for Energy-Aware NGNAbul Bashar. 146-160 [doi]
- Advance Planning and Reservation in a Grid SystemRusydi Umar, Arun Agarwal, C. Raghavendra Rao. 161-173 [doi]
- A Memoryless Trust Computing Mechanism for Cloud ComputingMohamed Firdhous, Osman Ghazali, Suhaidi Hassan. 174-185 [doi]
- Cost-Aware Performance Modeling of Multi-tier Web Applications in the CloudIssam Al-Azzoni, Derrick Kondo. 186-196 [doi]
- Cyber Security: Vulnerabilities and Solutions for Telemedicine over Cloud ArchitecturesShaftab Ahmed, Azween Abdullah, M. Yasin Akhtar Raja. 197-207 [doi]
- High-Level Abstraction Layers for Development and Deployment of Cloud ServicesBinh Minh Nguyen, Viet D. Tran, Ladislav Hluchý. 208-219 [doi]
- TPC-H Benchmark Analytics Scenarios and Performances on Hadoop Data CloudsRim Moussa. 220-234 [doi]
- An Incremental Correction Algorithm for XML Documents and Single Type Tree GrammarsMartin Svoboda, Irena Mlýnková. 235-249 [doi]
- Distributed RFID Shopping SystemAmine Karmouche, Yassine Salih Alj. 250-258 [doi]
- Efficient Detection of XML Integrity Constraints ViolationMichal Svirec, Irena Mlýnková. 259-273 [doi]
- Encoding Spectral Parameters Using Cache CodebookDriss Guerchi, Siwar Rekik. 274-280 [doi]
- Incrementally Optimized Decision Tree for Mining Imperfect Data StreamsHang Yang, Simon Fong. 281-296 [doi]
- Knowledge Representation Using LSA and DRT Rules for Semantic Search of DocumentsSofiane Allioua, Zizette Boufaïda. 297-306 [doi]
- Leaker Identification in Multicast CommunicationEmad Eldin Mohamed, Driss Guerchi. 307-315 [doi]
- Ratio-Based Gradual Aggregation of DataNadeem Iftikhar. 316-329 [doi]
- An Adaptive Arbitration Algorithm for Fair Bandwidth Allocation, Low Latency and Maximum CPU UtilizationM. Nishat Akhtar, Othman Sidek. 330-343 [doi]
- Aggressive and Intelligent Self-Defensive Network - Towards a New Generation of Semi-autonomous NetworksAli Elouafiq, Ayoub Khobalatte, Wassim Benhallam. 344-354 [doi]
- A 2-Dimensional Cellular Automata Pseudorandom Number Generator with Non-linear Neighborhood RelationshipSang-Ho Shin, Dae-Soo Kim, Kee-Young Yoo. 355-368 [doi]
- FURG Smart Games: A Proposal for an Environment to Game Development with Software Reuse and Artificial IntelligenceCarlos Alberto B. C. W. Madsen, Giancarlo Lucca, Guilherme B. Daniel, Diana F. Adamatti. 369-381 [doi]
- Scalable Content-Based Classification and Retrieval Framework for Dynamic Commercial Image DatabasesSerkan Kiranyaz, Turker Ince, Moncef Gabbouj. 382-398 [doi]
- A Requirement Aware Method to Reduce Complexity in Selecting and Composing Functional-Block-Based Protocol GraphsDaniel Günther, Nathan Kerr, Paul Müller. 399-407 [doi]
- Modeling and Analyzing MAC Frame Aggregation Techniques in 802.11n Using Bi-dimensional Markovian ModelNazeeruddin Mohammad, Shahabuddin Muhammad. 408-419 [doi]
- Towards a Successful Mobile Map Service: An Empirical Examination of Technology Acceptance ModelEunil Park, Ki Joon Kim, Dallae Jin, Angel Pasqual del Pobil. 420-428 [doi]
- VND-CS: A Variable Neighborhood Descent Algorithm for Core Selection Problem in Multicast Routing ProtocolYoussef Baddi, Mohamed Dafir Ech-Cherif El Kettani. 429-443 [doi]
- An Efficient Algorithm for Enumerating Minimal PathSets in Communication NetworksMohamed Larbi Rebaiaia, Daoud Ait-Kadi. 444-458 [doi]
- An Efficient Emergency Message Dissemination Protocol in a Vehicular Ad Hoc NetworkZouina Doukha, Samira Moussaoui, Noureddine Haouari, Mohamed E. A. Delhoum. 459-469 [doi]
- An Energy Saving Data Dissemination Protocol for Wireless Sensor NetworksDalila Iabbassen, Samira Moussaoui. 470-482 [doi]
- An Ω-Based Leader Election Algorithm for Mobile Ad Hoc NetworksLeila Melit, Nadjib Badache. 483-490 [doi]
- Cartography Gathering Driven by the OLSR ProtocolMohamed Belhassen, Abdelfettah Belghith. 491-505 [doi]
- Distributed Self-organized Trust Management for Mobile Ad Hoc NetworksMehran Misaghi, Eduardo da Silva, Luiz Carlos Pessoa Albini. 506-518 [doi]
- Distributed Sensor Relay System for Near Real Time Observation, Control and Data Management on a Scientific Research ShipFeng (Barry) Tao, Jon Campbell, Gwyn Griffiths. 519-535 [doi]
- Energy Efficiency Mechanisms Using Mobile Node in Wireless Sensor NetworksTeddy Mantoro, Media A. Ayu, Haroon Shoukat Ali, Wendi Usino, Mohammed M. Kadhum. 536-550 [doi]
- Hovering Information Based VANET ApplicationsMuhammad Shoaib, Wang-Cheol Song. 551-564 [doi]
- Improving the Lifetime of Wireless Sensor Networks Based on Routing Power FactorsAbdullah Said Alkalbani, Teddy Mantoro, Abu Osman Md. Tap. 565-576 [doi]
- Redirect Link Failure Protocol Based on Dynamic Source Routing for MANETNaseer Ali Husieen, Osman Ghazali, Suhaidi Hassan, Mohammed M. Kadhum. 577-591 [doi]
- Resource-Aware Distributed Clustering of Drifting Sensor Data StreamsMarwan Hassani, Thomas Seidl. 592-607 [doi]
- Robust Wireless Sensor Networks with Compressed Sensing TheoryMohammadreza Balouchestani, Kaamran Raahemifar, Sridhar Krishnan. 608-619 [doi]
- RTIC: Reputation and Trust Evaluation Based on Fuzzy LogIC System for Secure Routing in Mobile Ad Hoc NetworksAbdesselem Beghriche, Azeddine Bilami. 620-634 [doi]
- Sink Mobile for Efficient Data Dissemination in Wireless Sensor NetworksMohamed Guerroumi, Nadjib Badache, Samira Moussaoui. 635-645 [doi]