Abstract is missing.
- Detecting Mobile Application Malicious Behaviors Based on Data Flow of Source CodeChia-Mei Chen, Je-Ming Lin, Gu Hsin Lai. 1-6 [doi]
- An Approach of Quality of Service Assurance for Enterprise Cloud Computing (QoSAECC)William Cheng-Chung Chu, Chao-Tung Yang, Chih-Wei Lu, Chih-Hung Chang, Nien-Lin Hsueh, Tse-Chuan Hsu, Stephen Hung. 7-13 [doi]
- A Reference Architecture for High-Availability Automatic Failover between PaaS Cloud ProvidersIvor D. Addo, Sheikh Iqbal Ahamed, William Cheng-Chung Chu. 14-21 [doi]
- Unified Security and Safety Risk Assessment - A Case Study on Nuclear Power PlantYean-Ru Chen, Sao-Jie Chen, Pao-Ann Hsiung, I-Hsin Chou. 22-28 [doi]
- A Framework for Questionnaire-Based Healthcare Application DevelopmentGeng-Hao Wu, Nien-Lin Hsueh, Chih-Hung Chang. 29-35 [doi]
- Integrated Modeling and Analysis of Attribute Based Access Control Policies and Workflows in HealthcareSandeep Lakkaraju, Dianxiang Xu. 36-43 [doi]
- Software Safety Standards: Evolution and Lessons LearnedShou-Yu Lee, W. Eric Wong, Ruizhi Gao. 44-50 [doi]
- A Video Conferencing System Based on WebRTC for SeniorsChuan-Yen Chiang, Yen-Lin Chen, Pei-Shiun Tsai, Shyan-Ming Yuan. 51-56 [doi]
- The Study of Application and Evaluation with NoSQL Databases in Cloud ComputingTse-Chuan Hsu, Dong-Meau Chang, Hsin-Jan Lee. 57-62 [doi]
- Security Management of Authentication System Based on Dynamic Biometric FeaturesYao-Hong Tsai, Hsiao-Ping Huang, Hui Rong Wu. 63-68 [doi]
- Reversible Data Hiding Method Based on Exclusive-Or with Two Host ImagesChyuan-Huei Thomas Yang, Yen Ting Hsu, Chien-Cheng Wu, Jun-Wei Chang. 69-74 [doi]
- Improving Software Maintenance for Pattern-Based Software Development: A Comment Refactoring ApproachJhe-Jyun Guo, Nien-Lin Hsueh, Wen-Tin Lee, Shi-Chuen Hwang. 75-79 [doi]
- An Interactive Software Used in Conferences or Classes Based on the Service Oriented ArchitectureLiang Wang, Li Yao. 80-83 [doi]