Abstract is missing.
- KeynoteAjay K. Gupta. [doi]
- MuMMI: Multiple Metrics Modeling InfrastructureXingfu Wu, Charles W. Lively, Valerie E. Taylor, Hung-Ching Chang, Chun-Yi Su, Kirk W. Cameron, Shirley Moore, Daniel Terpstra, Vincent M. Weaver. [doi]
- An Undirected Graph Traversal Based Grouping Prediction Method for Data De-duplicationLongxiang Wang, Xingjun Zhang, Guofeng Zhu, Yueguang Zhu, Xiaoshe Dong. 3-8 [doi]
- An Algorithm of Developed Imperialist Competition for Suitable Human Resource LayoutEsmaeil Laleh, Shahriar Lotfi, Ayaz Isazadeh, Yousef Masodi. 11-16 [doi]
- File Transfer Scheduling Optimization Using Artificial Immune SystemMilad Dastan Zand, Mohammad Kalantari, Shahram Golzari. 17-22 [doi]
- Improve the Intelligent Consortium Agent for SMEs in the Plastic MarketRaid Mohsen Alhazmi, Sungchul Hong. 23-28 [doi]
- Modeling Stock Analysts' Decision Making: An Intelligent Decision Support SystemHarry Zhou. 29-34 [doi]
- Veracity and Convincingness: Sources of Plausibility for Decision Making and Situation ManagementPeeter Lorents, Erika Matsak. 35-42 [doi]
- Winner-Take-All Memetic Differential Evolution for Genetic Interaction: Parameter IdentificationShinq-Jen Wu, Cheng-Tao Wu. 43-48 [doi]
- e-Learning Content Authentication Using Bipartite MatchingJahangir Dewan, Morshed Chowdhury, Lynn Margaret Batten. 51-55 [doi]
- Cloud Resource Provisioning and Bursting ApproachesArwa S. Fadel, Ayman G. Fayoumi. 59-64 [doi]
- A Content Aggregation Using Aspect Oriented ProgrammingGyubaek Kim. 67-70 [doi]
- Preserving the Global Consistency of Dynamic ReconfigurationMohammad Charaf Eddin, Zoubir Mammeri. 71-76 [doi]
- An Ensemble Approach for Cyber Attack Detection System: A Generic FrameworkShailendra Singh, Sanjay Silakari. 79-84 [doi]
- An LBP Based Key Management for Secure Wireless Body Area Network (WBAN)Abdulaziz Alsadhan, Naveed Khan. 85-88 [doi]
- Enhancing Protection Techniques of E-Banking Security Services Using Open Source Cryptographic AlgorithmsAdel Khelifi, Maher Aburrous, Manar Abu Talib, P. V. S. Shastry. 89-95 [doi]
- Fully Distributed Certificate Authority Based on Polynomial over Elliptic Curve for MANETAhmad Alomari. 96-100 [doi]
- On Effectiveness of Hopping-Based Spread Spectrum Techniques for Network Forensic TracebackWei Yu, Xinwen Fu, Erik Blasch, Khanh D. Pham, Dan Shen, Genshe Chen, Chao Lu. 101-106 [doi]
- Security Concerns of Identity Authentication and Context Privacy Preservation in uHealthcare SystemSeonmin Lee, Hyun-Sung Kim, Sung-Woon Lee. 107-112 [doi]
- A Comparison of Some Predictive Models for Modeling Abortion Rate in RussiaSergey Soshnikov, Carl Lee, Vasiliy Vlassov, Maria Gaidar, Sergey Vladimirov. 115-120 [doi]
- A Fusion Approach for Facial Expression Using Local Binary Pattern and a Pseudo 3D Face ModelHuiquan Zhang, Osamu Yoshie. 121-126 [doi]
- Active Learning for Speech Emotion Recognition Using Conditional Random FieldsZiping Zhao, Xirong Ma. 127-131 [doi]
- Dynamic Seed Analysis in a Social Network for Maximizing Efficiency of Data CollectionChanghyun Byun, Hyeoncheol Lee, Jongsung You, Yanggon Kim. 132-136 [doi]
- Integrating Activity Theory and Semiotics as Knowledge Elicitation TechniqueNevien Moawad, Kecheng Liu, Mohammed El-Helly. 137-142 [doi]
- A Method to Assess a Fuzzy-Based Mechanism to Improve Military Decision SupportE. Allison Newcomb, Robert J. Hammell II. 143-148 [doi]
- HBase System-Based Distributed Framework for Searching Large Graph DatabasesYijun Bei, Zhen Lin, Chen Zhao, Xiaojun Zhu. 151-156 [doi]
- Agent Based Adaptive Cooperative Models and Mechanisms of Multiple Autonomous Cyber-Physical SystemsKailong Zhang, Jiwei Li, Arnaud de La Fortelle, Xingshe Zhou. 159-164 [doi]
- An Optimized Solution for Cross-Domain System Bus Transaction ProcessingWen Su, Jing Wang, Huandong Wang, Ling Wang. 165-170 [doi]
- Distance Measurement with a General 3D Camera by Using a Modified Phase Only Correlation MethodLifeng Zhang, Yujie Li, Huimin Lu, Seiichi Serikawa. 173-178 [doi]
- An Approach to Automating the Integration of the Access Control Policies for Web ServicesMohammed Alodib. 181-187 [doi]
- WFE-Enabled Web Page Transformation: Generating Real-Time Collaborative Editing Systems from Existing Web PagesTadachika Ozono, Shun Shiramatsu, Toramatsu Shintani. 188-193 [doi]
- Critical Analysis and Comparative Study of Security for Networked RFID SystemsBiplob R. Ray, Morshed U. Chowdhury, Jemal Abawajy. 197-202 [doi]
- User Authentication for Hiererchical Wireless Sensor NetworksMinsu Park, Hyun-Sung Kim, Sung-Woon Lee. 203-208 [doi]
- The Effect of Combining Different Feature Selection Methods on Arabic Text ClassificationAbdulMohsen Al-Thubaity, Norah Abanumay, Sara Al-Jerayyed, Aljoharah Alrukban, Zarah Mannaa. 211-216 [doi]
- A Multiway Model for Predicting Earthquake Ground MotionYang Bai, Jale Tezcan, Qiang Cheng, Jie Cheng. 219-224 [doi]
- A Reduced Order Memetic Algorithm for Constraint Optimization in Radiation Therapy Treatment PlanningGeorgios Kalantzis, Aditya Apte, Richard Radke, Aandrew Jackson. 225-230 [doi]
- GA Support System to Optimize the Sequence of Multi-level and Multi-tool Operations in CNC MachinesJaber E. A. Qudeiri, Fayiz Y. Abu Khadra, Abdulrahman Al-Ahmari. 231-236 [doi]
- Improving Virtual Machine Reliability with Driver Fault IsolationHao Zheng, Xiaoshe Dong, Endong Wang, Baoke Chen, Nan Wu, Xingjun Zhang. 239-244 [doi]
- A Checkpoint/Restart Scheme for CUDA Applications with Complex Memory HierarchyYulu Zhang, Xinyuan Guo, Hai Jiang, Kuan-Ching Li. 247-252 [doi]
- A Compile-Time Cost Model for Automatic OpenMP Decoupled Software Pipelining ParallelizationXiaoxian Liu, Rongcai Zhao, Lin Han. 253-260 [doi]
- Backtrack-Based Failure Recovery in Distributed Stream ProcessingQiming Chen, Meichun Hsu, Malú Castellanos. 261-266 [doi]
- Code Generation for Accurate Array Redistribution on Automatic Distributed-Memory ParallelizationRui Ding, Rongcai Zhao, Liguo Fu. 267-274 [doi]
- Deadlock-Free Routing Algorithms for 6D Mesh/iBT Interconnection NetworksRui Feng, Peng Zhang, Yuefan Deng. 275-282 [doi]
- Hardware Accelerated Cognitively Enhanced Complex Event Processing ArchitectureTanvir Atahary, Tarek M. Taha, Scott Douglass. 283-288 [doi]
- Parallel Implementation of Exact Matrix Computation Using Multiple P-adic ArithmeticXinkai Li, Chao Lu, Jon A. Sjogren. 296-302 [doi]
- Performance Characteristics of Hybrid MPI/OpenMP Scientific Applications on a Large-Scale Multithreaded BlueGene/Q SupercomputerXingfu Wu, Valerie E. Taylor. 303-309 [doi]
- Total System Cost Analysis of Master-Slave Multi-super-Hypercube DX-tree ArchitectureHamid Abachi. 310-314 [doi]
- A Consistent Approach for Prioritizing System Quality AttributesMohammad Dabbagh, Sai Peck Lee. 317-322 [doi]
- Adapting CRM Systems for Mobile Platforms: An MDA PerspectiveFederico Amendola, Liliana Favre. 323-328 [doi]
- Evaluating Programming Performance with Keystroke Characteristics: An Empirical ExperimentHuafu Liu, Dapeng Liu, Shaochun Xu. 329-335 [doi]
- Extracting Business Rules Using a Partitioned Forward Slicing ApproachAnupama Surendran, Philip Samuel. 336-341 [doi]
- Introducing Agents in Multi-agent System with Superposition RefinementZhuang Li, Huaikou Miao. 342-347 [doi]
- Guided Requirements Clarification for Automatic FormalizationXi Wang, Shaoying Liu. 348-355 [doi]
- Using UML Profile and OCL to Impose Regulatory Requirements on Safety-Critical SystemChung-Ling Ling, Wuwei Shen, Dionysios Kountanis. 356-361 [doi]
- A Quantitative Model-Based Selection of Web Service ReconfigurationHonghao Gao, Huaikou Miao. 365-371 [doi]
- P2PTV Traffic Localization by Deep Packet InspectionHiep Hoang-Van, Takumi Miyoshi, Olivier Fourmaux. 375-380 [doi]
- A Study of Data Management in Hybrid Cloud ConfigurationShigeaki Tanimoto, Yorihiro Sakurada, Yosiaki Seki, Motoi Iwashita, Shinsuke Matsui, Hiroyuki Sato, Atsushi Kanai. 381-386 [doi]
- Community-Driven and Ontology-Based Biological Knowledge Management: A Hybrid Approach to Harnessing Collective IntelligenceMichiaki Iwazume, Ken Kaneiwa. 387-393 [doi]
- Consideration of Billing Management Method for Cloud Computing ServicesMotoi Iwashita, Shigeaki Tanimoto. 394-399 [doi]
- Mobile-Carrier Choice Behavior Analysis Around Smart Phone MarketAkiya Inoue, Motoi Iwashita, Takeshi Kurosawa, Ken Nishimatsu. 400-405 [doi]
- A Bookmark Recommender System Based on Social Bookmarking Services and Wikipedia CategoriesTakumi Yoshida, Ushio Inoue. 409-413 [doi]
- Analysis of Pauses Toward Transmitting Traditional SkillsTeruhisa Hochin, Hiroki Nomiya. 414-419 [doi]
- Development and Study of Support Applications for Autistic ChildrenIppei Torii, Kaoruko Ohtani, Takahito Niwa, Naohiro Ishii. 420-425 [doi]
- Estimation of Objective Scores of Answer Statements Posted at Q&A SitesYuya Yokoyama, Teruhisa Hochin, Hiroki Nomiya. 426-431 [doi]
- Extension for Explicit Specification of Semantic GeneralizationTeruhisa Hochin. 432-437 [doi]
- Grouping Methods for Generating Friendship Based on Network PropertiesRyumaru Kato, Atsuko Mutoh, Nobuhiro Inuzuka. 438-443 [doi]
- Impressive Scene Detection from Lifelog Videos by Unsupervised Facial Expression RecognitionHiroki Nomiya, Atsushi Morikuni, Teruhisa Hochin. 444-449 [doi]
- Vector Operations in Neural Networks ComputationsNaohiro Ishii, Toshinori Deguchi, Masashi Kawaguchi, Hiroshi Sasaki. 450-456 [doi]
- A Polynomial-Time Algorithm for Checking the Equivalence for Real-Time Deterministic Restricted One-Counter Transducers Which Accept by Final StateMitsuo Wakatsuki, Etsuji Tomita, Tetsuro Nishino. 459-465 [doi]
- A System-Design Outline of the Distributed-Shogi-System Akara 2010Kunihito Hoki, Tomoyuki Kaneko, Daisaku Yokoyama, Takuya Obata, Hiroshi Yamashita, Yoshimasa Tsuruoka, Takeshi Ito. 466-471 [doi]
- Brain-Inspired Motion Programming for Hobby-Use Humanoid RobotsMamoru Kubota, Tadashi Yamazaki, Tetsuro Nishino. 472-477 [doi]
- Comprehending Color Images for Color Barrier-Free Via Factor Analysis TechniqueChieko Kato. 478-483 [doi]
- Optimality and Complexity for Drawing Problems of Tree-Structured DiagramsKensei Tsuchida, Tadaaki Kirishima, Yasunori Shiono, Futoshi Sugimoto, Chieko Kato, Takeo Yaku. 484-489 [doi]
- The Number of Cells in Regions Shifted on 2D Images Represented by Raster Data with Heterogeneous PartsKoichi Anada, Shinji Koka, Akihito Kubota, Yuki Shindo, Takeo Yaku. 490-495 [doi]
- A Case Study of Cloud-Enabled Software Development PBLNaoki Fukuyasu, Sachio Saiki, Hiroshi Igaki, Shinsuke Matsumoto, Shinji Kusumoto. 499-504 [doi]
- A Dynamic Birthmark from Analyzing Operand Stack Runtime Behavior to Detect Copied SoftwareKazumasa Fukuda, Haruaki Tamada. 505-510 [doi]
- A Feature Model of Framework ApplicationsIzuru Kume, Masahide Nakamura, Naoya Nitta, Etsuya Shibayama. 511-516 [doi]
- An Instruction Folding Method to Prevent Reverse Engineering in Java PlatformTetsuya Ohdo, Haruaki Tamada, Yuichiro Kanzaki, Akito Monden. 517-522 [doi]
- Implementing Materialized View of Large-Scale Power Consumption Log Using MapReduceYuki Ise, Shintaro Yamamoto, Shinsuke Matsumoto, Sachio Saiki, Masahide Nakamura. 523-528 [doi]
- Implementing Personalized Energy Visualization Service in Home Network SystemYuichi Watanabe, Masahide Nakamura, Shinsuke Matsumoto. 529-534 [doi]
- An Authentication Method with Spatiotemporal Interval and Partial MatchingMasateru Tsunoda, Kyohei Fushida, Yasutaka Kamei, Masahide Nakamura, Kohei Mitsui, Keita Goto, Ken-ichi Matsumoto. 535-542 [doi]
- Using Co-change Histories to Improve Bug Localization PerformanceChakkrit Tantithamthavorn, Akinori Ihara, Ken-ichi Matsumoto. 543-548 [doi]
- Visualizing Software Metrics with Service-Oriented Mining Software Repository for Reviewing Personal ProcessYasutaka Sakamoto, Shinsuke Matsumoto, Sachio Saiki, Masahide Nakamura. 549-554 [doi]
- A Comparative Study on Clustering AlgorithmsCheng-hsien Lee, Chun-Hua Hung, Shie-Jue Lee. 557-562 [doi]
- A Fast Genetic SLAM Approach for Mobile RobotsChih-Hung Wu, Yi-Han Chen, Yao-Yu Lee, Chiung-Hui Tsai. 563-568 [doi]
- k-NN Based Neuro-fuzzy System for Time Series PredictionChia-Ching Wei, Thao-Tsen Chen, Shie-Jue Lee. 569-574 [doi]
- Recursive SVD-Based Least Squares Algorithm with Forgetting Factors for Neuro-fuzzy ModelingChen-Sen Ouyang, Naijing Kang, Po-Jen Cheng. 575-580 [doi]
- A Robust Feature-Based Image Watermarking SchemeChih-Chin Lai, Chi-Feng Chan, Chen-Sen Ouyang, Hui-Fen Chiang. 581-585 [doi]
- Heartbeat Recognition from ECG Signals Using Hidden Markov Model with Adaptive FeaturesShing-Tai Pan, Yi-Heng Wu, Yi-Lan Kung, Hung-Chin chen. 586-591 [doi]
- Parallelism of Evolutionary Design of Image Filters for Evolvable Hardware Using GPUChih-Hung Wu, Chin-Yuan Chiang, Yi-Han Chen. 592-597 [doi]
- Cross Depth Image Filter-Based Natural Image MattingYujie Li, Huimin Lu, Lifeng Zhang, Seiichi Serikawa. 601-604 [doi]
- Intelligent Control of Ultrasonic Motor Using PSO Type Neural NetworkShenglin Mu, Kanya Tanaka, Shota Nakashima, Alrijadjis. 605-610 [doi]
- Multiframe Medical Images Enhancement on Dual Tree Complex Wavelet Transform DomainHuimin Lu, Yujie Li, Shota Nakashima, Shiyuan Yang, Lifeng Zhang. 611-614 [doi]
- Proposal of Flexible Touch Panel SensorKohei Miyata, Shiyuan Yang, Seiichi Serikawa, Shota Nakashima. 615-620 [doi]
- Proposal of System for Monitoring Environment Using SmartphoneYuhki Kitazono, Naoya Mizota, Shota Nakashima. 621-626 [doi]
- Long-Term Behavioural Change Detection through Pervasive SensingJohn Kemp, Elena I. Gaura, Ramona Rednic, James Brusey. 629-634 [doi]
- Fielded Autonomous Posture Classification Systems: Design and Realistic EvaluationRamona Rednic, Elena I. Gaura, John Kemp, James Brusey. 635-640 [doi]
- Water Distribution System Monitoring and Decision Support Using a Wireless Sensor NetworkMichael Allen, Ami Preis, Mudasser Iqbal, Andrew Whittle. 641-646 [doi]
- RvGIST: A Holistic Road Feature for Real-Time Road-Scene UnderstandingYuan Sun, Hongbo Lu, Zhimin Zhang. 649-655 [doi]
- A Study on Comparison on the Technical Factors of Korea and China Shopping Mall WebsiteDonghwoon Kwon, Jun Cui, Young-Jik Kwon, Chang-Hai Jin. 659-662 [doi]
- A Fast Synchronization Mechanism for Collaborative Web Applications Based on HTML5Shin-Ya Katayama, Takushi Goda, Shun Shiramatsu, Tadachika Ozono, Toramatsu Shintani. 663-668 [doi]
- On a Synchronizing Module for Extended Web Displaying System Based on Multiple Tablet DevicesShota Imai, Hiroyuki Sano, Shun Shiramatsu, Tadachika Ozono, Toramatsu Shintani. 669-674 [doi]
- Service Value Broker Patterns: An Empirical CollectionYucong Duan, Ajay Kattepur, Hui Zhou, Ying Chang, Mengxing Huang, Wencai Du. 675-682 [doi]
- System Architecture and Feature Design for Engineering a Web-Based Travel Advisor System: FanOnTourAmir Maddah, Manolya Kavakli. 683-688 [doi]