Abstract is missing.
- Fuzzy Based Threat Analysis in Total Hospital Information SystemNurzaini Mohamad Zain, Ganthan Narayana Samy, Rabiah Ahmad, Zuraini Ismail, Azizah Abdul Manaf. 1-14 [doi]
- An ID-Based Anonymous Signcryption Scheme for Multiple Receivers Secure in the Standard ModelBo Zhang, Qiuliang Xu. 15-27 [doi]
- A Supervised Locality Preserving Projections Based Local Matching Algorithm for Face RecognitionYingqi Lu, Cheng Lu, Miao Qi, Shuyan Wang. 28-37 [doi]
- Information Systems Security Criticality and Assurance EvaluationMoussa Ouedraogo, Haralambos Mouratidis, Eric Dubois, Djamel Khadraoui. 38-54 [doi]
- Security Analysis of Two-Factor User Authentication in Wireless Sensor Networks Muhammad Khurram Khan, Khaled Alghathbar. 55-60 [doi]
- Directed Graph Pattern Synthesis in LSB Technique on Video SteganographyDebnath Bhattacharyya, Arup Kumar Bhaumik, Minkyu Choi, Tai-Hoon Kim. 61-69 [doi]
- Feature Level Fusion of Face and Palmprint Biometrics by Isomorphic Graph-Based Improved K-Medoids PartitioningDakshina Ranjan Kisku, Phalguni Gupta, Jamuna Kanta Sing. 70-81 [doi]
- Post-quantum Cryptography: Code-Based SignaturesPierre-Louis Cayrel, Mohammed Meziani. 82-99 [doi]
- Security Analysis of the Proposed Practical Security Mechanisms for High Speed Data Transfer ProtocolDanilo Valeros Bernardo, Doan B. Hoang. 100-114 [doi]
- A Fuzzy-Based Dynamic Provision Approach for Virtualized Network Intrusion Detection SystemsBo Li, Jianxin Li, Tianyu Wo, Xudong Wu, Junaid Arshad, Wantao Liu. 115-128 [doi]
- An Active Intrusion Detection System for LAN Specific AttacksNeminath Hubballi, S. Roopa, Ritesh Ratti, Ferdous Ahmed Barbhuiya, Santosh Biswas, Arijit Sur, Sukumar Nandi, Vivek Ramachandran. 129-142 [doi]
- Analysis on the Improved SVD-Based Watermarking SchemeHuo-Chong Ling, Raphael C.-W. Phan, Swee-Huay Heng. 143-149 [doi]
- Applications of Adaptive Belief Propagation Decoding for Long Reed-Solomon CodesZhian Zheng, Dang Hai Pham, Tomohisa Wada. 150-158 [doi]
- Dynamic Routing for Mitigating the Energy Hole Based on Heuristic Mobile Sink in Wireless Sensor NetworksSeong-Yong Choi, Jin-Su Kim, Seung-Jin Han, Jun Hyeog Choi, Kee-Wook Rim, Jung-Hyun Lee. 159-174 [doi]
- Grammar Encoding in DNA-Like Secret Sharing InfrastructureMarek R. Ogiela, Urszula Ogiela. 175-182 [doi]
- HATS: High Accuracy Timestamping System Based on NetFPGAZhiqiang Zhou, Lin Cong, Guohan Lu, Beixing Deng, Xing Li. 183-195 [doi]
- A Roadside Unit Placement Scheme for Vehicular Telematics NetworksJunghoon Lee, Cheolmin Kim. 196-202 [doi]
- Concurrent Covert Communication ChannelsMd Amiruzzaman, Hassan Peyravi, Mohammad Abdullah-Al-Wadud, Yoojin Chung. 203-213 [doi]
- Energy Efficiency of Collaborative Communication with Imperfect Frequency Synchronization in Wireless Sensor NetworksHusnain Naqvi, Stevan M. Berber, Zoran A. Salcic. 214-227 [doi]
- High Performance MAC Architecture for 3GPP ModemSejin Park, Yong Kim, Inchul Song, Kichul Han, Jookwang Kim, KyungHo Kim. 228-238 [doi]
- Modified Structures of Viterbi Alogrithm for Forced-State Method in Concatenated Coding System of ISDB-TZhian Zheng, Yoshitomo Kaneda, Dang Hai Pham, Tomohisa Wada. 239-249 [doi]
- A New Cross-Layer Unstructured P2P File Sharing Protocol over Mobile Ad Hoc NetworkNadir Shah, Depei Qian. 250-263 [doi]
- A Model for Interference on Links in Inter-working Multi-hop Wireless NetworksOladayo Salami, Antoine B. Bagula, H. Anthony Chan. 264-278 [doi]
- An Optimum ICA Based Multiuser Data Separation for Short Message ServiceMahdi Khosravy, Mohammad Reza Alsharif, Katsumi Yamashita. 279-286 [doi]
- Multiple Asynchronous Requests on a Client-Based Mashup PageEunjung Lee, Kyong-Jin Seo. 287-299 [doi]
- Using an Integrated Ontology Database to Categorize Web PagesRujiang Bai, Xiaoyue Wang, Junhua Liao. 300-309 [doi]
- Topic Detection by Topic Model Induced Distance Using Biased InitiationYonghui Wu, Yuxin Ding, Xiaolong Wang, Jun Xu. 310-323 [doi]
- Mining Significant Least Association Rules Using Fast SLP-Growth AlgorithmZailani Abdullah, Tutut Herawan, Mustafa Mat Deris. 324-336 [doi]
- Maximized Posteriori Attributes Selection from Facial Salient Landmarks for Face RecognitionPhalguni Gupta, Dakshina Ranjan Kisku, Jamuna Kanta Sing, Massimo Tistarelli. 337-344 [doi]
- Agent Based Approach to Regression TestingPraveen Ranjan Srivastava, Tai-Hoon Kim. 345-355 [doi]
- A Numerical Study on B&B Algorithms for Solving Sum-Of-Ratios ProblemLianbo Gao, Jianming Shi. 356-362 [doi]
- Development of a Digital Textbook Standard Format Based on XMLMihye Kim, Kwan-Hee Yoo, Chan Park, Jae Soo Yoo. 363-377 [doi]
- A Pattern-Based Representation Approach for Online DiscoursesHao Xu. 378-384 [doi]
- A Fault Tolerant Architecture for Transportation Information Services of E-GovernmentWoonsuk Suh, Boo Mann Choung, Eunseok Lee. 385-396 [doi]
- Design and Implementation of Binary Tree Based Proactive Routing Protocols for Large MANETSPavan Kumar Pandey, G. P. Biswas. 397-408 [doi]
- Extract Semantic Information from WordNet to Improve Text Classification PerformanceRujiang Bai, Xiaoyue Wang, Junhua Liao. 409-420 [doi]
- Managing Ubiquitous Scientific Knowledge on Semantic WebHao Xu. 421-430 [doi]
- A Semantic Pattern Approach to Managing Scientific PublicationsHao Xu. 431-434 [doi]
- A Bootstrap Software Reliability Assessment Method to Squeeze Out Remaining FaultsMitsuhiro Kimura, Takaji Fujiwara. 435-446 [doi]
- Markov Chain Monte Carlo Random TestingBo Zhou, Hiroyuki Okamura, Tadashi Dohi. 447-456 [doi]
- An Integrated Approach to Detect Fault-Prone Modules Using Complexity and Text Feature MetricsOsamu Mizuno, Hideaki Hata. 457-468 [doi]
- An Effective Video Steganography Method for Biometric IdentificationYingqi Lu, Cheng Lu, Miao Qi. 469-479 [doi]
- A Video Coding Technique Using Octagonal Motion Search and BTC-PF Method for Fast ReconstructionBibhas Chandra Dhara, Sanjoy Kumar Saha, Bhabatosh Chanda. 480-490 [doi]
- Rough Set Approach in Ultrasound Biomicroscopy Glaucoma AnalysisSoumya Banerjee, Hameed Al-Qaheri, El-Sayed A. El-Dahshan, Aboul Ella Hassanien. 491-498 [doi]
- Video Copy Detection: Sequence Matching Using Hypothesis TestDebabrata Dutta, Sanjoy Kumar Saha, Bhabatosh Chanda. 499-508 [doi]
- An XML-Based Digital Textbook and Its Educational EffectivenessMihye Kim, Kwan-Hee Yoo, Chan Park, Jae Soo Yoo, Hoseung Byun, Wanyoung Cho, Jeeheon Ryu, Namgyun Kim. 509-523 [doi]
- SIMACT: A 3D Open Source Smart Home Simulator for Activity RecognitionKevin Bouchard, Amir Ajroud, Bruno Bouchard, Abdenour Bouzouane. 524-533 [doi]
- Design of an Efficient Message Collecting Scheme for the Slot-Based Wireless Mesh NetworkJunghoon Lee, Gyung-Leen Park. 534-543 [doi]
- A Novel Approach Based on Fault Tolerance and Recursive Segmentation to Query by HummingXiaohong Yang, Qingcai Chen, Xiaolong Wang. 544-557 [doi]
- Chinese Prosody Generation Based on C-ToBI Representation for Text-To-SpeechByeongchang Kim. 558-571 [doi]
- CAS4UA: A Context-Aware Service System Based on Workflow Model for Ubiquitous AgricultureYongyun Cho, Hyun Yoe, Haeng-Kon Kim. 572-585 [doi]
- A Power Control Scheme for an Energy-Efficient MAC ProtocolHo Chul Lee, Jeong-hwan Hwang, Meong-hun Lee, Haeng-Kon Kim, Hyun Yoe. 586-596 [doi]
- Towards the Designing of a Robust Intrusion Detection System through an Optimized Advancement of Neural NetworksIftikhar Ahmad, Azween B. Abdullah, Abdullah Sharaf Alghamdi. 597-602 [doi]