default search action
9th ITNG 2012: Las Vegas, Nevada, USA
- Shahram Latifi:
Ninth International Conference on Information Technology: New Generations, ITNG 2012, Las Vegas, Nevada, USA, 16-18 April, 2012. IEEE Computer Society 2012, ISBN 978-0-7695-4654-4 - Wilfried Lepuschitz, Václav Jirkovský, Petr Kadera, Pavel Vrba:
A Multi-Layer Approach for Failure Detection in a Manufacturing System Based on Automation Agents. 1-6 - (Withdrawn) A novel violent videos classification scheme based on the bag of audio words features [Document Suppressed in IEEE Xplore]. 7-13
- Marwa M. A. Hadhoud, Mohamed I. Eladawy, Ahmed Farag Seddik:
Region of Interest Localization of Cardiac Structure from Cine MRI Images. 14-17 - Arnold Wiliem, Vamsi Krishna Madasu, Wageeh W. Boles, Prasad K. D. V. Yarlagadda:
A Context Space Model for Detecting Anomalous Behaviour in Video Surveillance. 18-24 - Alexandre Ivánovich Grebénnikov:
Image Recovery by Recursive Spline Smoothing and Application to Recognition of Compound Structures. 25-29 - Yang Wang, Kaitlyn Gurule, Jacqueline Wise, Jun Zheng:
Wavelet Based Region Duplication Forgery Detection. 30-35 - Amioy Kumar, Madasu Hanmandlu, Shantaram Vasikarla:
Rank Level Integration of Face Based Biometrics. 36-41 - Thanh Le, Tom Altman, Katheleen J. Gardiner:
Probability-based Imputation Method for Fuzzy Cluster Analysis of Gene Expression Microarray Data. 42-47 - Adib Rastegarnia, Vahid Solouk:
Castalia Network Animator (CNA): A Visualization Tool for Castalia Wireless Sensor Network Simulator. 48-53 - Yu-Hong Lee, Chyi-Ren Dow, Lu-Hui Huang, Ya-Chen Lin, Shiow-Fen Hwang, Wei-Bin Lee:
An Efficient Geo-aware Peer-to-Peer Resource Discovery and Sharing Scheme in Vehicular Ad-hoc Networks. 54-59 - Natarajan Meghanathan:
A Unicast MANET Routing Protocol to Simultaneously Minimize the Stability-Hop Count Tradeoff and End-to-End Delay. 60-64 - Leila Mechtri, Fatiha Djemili Tolba, Salim Ghanemi:
MASID: Multi-Agent System for Intrusion Detection in MANET. 65-70 - Go Hasegawa, Shoichi Takemori, Yoshiaki Taniguchi, Hirotaka Nakano:
Determining Coverage Area Using Voronoi Diagram Based on Local Information for Wireless Mesh Networks. 71-76 - Yenumula B. Reddy:
Spectrum Detection in Cognitive Networks by Minimizing Hidden Terminal Problem. 77-82 - Omar Y. Tahboub, Javed I. Khan:
Finding Time and Buffer Preserving Routes in Gaussian Intermittent Networks. 83-88 - Matt Fenwick, Colbert Sesanker, Martin R. Schiller, Heidi J. C. Ellis, Michael L. Hinman, Jay Vyas, Michael R. Gryk:
An Open-Source Sandbox for Increasing the Accessibility of Functional Programming to the Bioinformatics and Scientific Communities. 89-94 - Emi Mathews:
Planarization of Geographic Cluster-based Overlay Graphs in Realistic Wireless Networks. 95-101 - Mohamed Bourimi, Marcel Heupel, Benedikt Westermann, Dogan Kesdogan, Marc Planagumà, Rafael Giménez, Fatih Karatas, Philipp Schwarte:
Towards Transparent Anonymity for User-controlled Servers Supporting Collaborative Scenarios. 102-108 - Muhammad Awais Azam, Jonathan Loo, Aboubaker Lasebae, Sardar Kashif Ashraf Khan, Waleed Ejaz:
Recognising the Activities of Low Entropy Mobile People Using Wireless Proximity Data. 109-114 - Craig Stewart, Javed I. Khan:
A Large Scale Evolutionary Analysis of the Internet Autonomous System Network. 115-120 - Shine N. Das, Midhun Mathew, Pramod K. Vijayaraghavan:
An Efficient Approach for Finding Near Duplicate Web Pages Using Minimum Weight Overlapping Method. 121-126 - Shu-Ming Hsieh, Ssu-An Lo, Chiun-Chieh Hsu, Wei-Chao Lin:
Novel Cloud Service for Improving World Universities Ranking. 127-131 - Ching-Seh Wu, Ibrahim Khoury:
Tree-based Search Algorithm for Web Service Composition in SaaS. 132-138 - Anirban Sarkar, Narayan C. Debnath:
Aspect Algebra: The Operational Semantics for Aspect Oriented Software. 139-144 - Kishan Dharavath, Sri Khetwat Saritha:
Semantic Web: A Topic Specific Search. 145-148 - Narayan C. Debnath, Carlos Salgado, Mario Peralta, Mario Beron, Daniel Riesco, German Montejano:
MEBPCM: A Method for Evaluating Business Process Conceptual Models. A Study Case. 149-154 - Wan D. Bae, Shayma Alkobaisi, Sada Narayanappa, Cheng C. Liu:
A Mobile Data Analysis Framework for Environmental Health Decision Support. 155-161 - Sung-Hoon Park, Seoun-Hyung Lee:
A Design of Mutual Exclusion Protocol in Cellular Wireless Networks. 162-167 - Tong Ming Lim, Yong Liang Choong, Angela Siew-Hoong Lee:
Using Two-tier Bitwise Interest Oriented QRP Data Structure for High Clustering through Interest Similarity in SWB P2P Systems. 168-174 - Angela Siew-Hoong Lee, Tong Ming Lim:
The Use of Knowledge Management Systems to Support Knowledge Creation and Sharing Activities among Employees - A Survey Based Study of IT Shared Services Company. 175-181 - Farhana H. Zulkernine, Piergiorgio Bertoli, Marco Pistore, Andreas Friesen, Jens Lemcke, Bernhard Thimmel, Otfried von Geisau:
A Constraint-Driven Business Object Model for Service-Based Business Processes. 182-188 - Giovanni Agosta, Alessandro Barenghi, Antonio Parata, Gerardo Pelosi:
Automated Security Analysis of Dynamic Web Applications through Symbolic Code Execution. 189-194 - Chouvalit Khancome, Veera Boonjing:
New Hashing-Based Multiple String Pattern Matching Algorithms. 195-200 - Yanjun Zuo, John Babin:
Searching for the Optimal Proof Schedule in a Proof-Carrying Survivability Paradigm - A Dynamic, Interactive Approach. 201-208 - Karl Smith, Jeffrey M. Galloway, Susan V. Vrbsky:
An Empirical Study on the Impact of an Idle Limit in Distributed Systems. 209-213 - Mais Nijim, Young Lee, Kiranmai Bellam:
HyBuM: Hybrid Energy Efficient Architecture for Mobile Storage Systems. 214-220 - Taufik Taufik, Jameson Thornton, Dale Dolan:
Piezoelectric Converter for Wind Energy Harvesting. 221-224 - Dale Dolan, Peter W. Lehn:
Harmonics and Dynamic Response of a Virtual Air Gap Variable Reactor. 225-231 - Jeffrey M. Galloway, Karl Smith, Jeffrey C. Carver:
An Empirical Study of Power Aware Load Balancing in Local Cloud Architectures. 232-236 - James Gagnon, Corey Weathers, Marty Wiedmeyer, Phani Koppineedi, Raghavender Anegouni, Steve Schon, Xin Bai:
API Backward Compatibility Testing Using VSTS. 237-241 - Adam Schwartz:
Using Test Cases to Size Systems: A Case Study. 242-246 - Teemu Kanstrén, Éric Piel, Hans-Gerhard Gross:
Using Reverse-Engineered Test-Based Models to Generate More Tests: Where is the Sense in That? 247-252 - James D. McCaffrey:
A Hybrid System for Analyzing Very Large Graphs. 253-257 - Soumen Maity:
Software Testing with Budget Constraints. 258-262 - Selin Benli, Anthony Habash, Andy Herrmann, Tyler Loftis, Devon Simmonds:
A Comparative Evaluation of Unit Testing Techniques on a Mobile Platform. 263-268 - Talukdar S. Asgar, Mohammed Akour, Tariq M. King:
Applying Test-First and Parallel Processing Techniques to ERP Data Conversion. 269-274 - Xinyu Zhang, Rui Wang:
The Application of the Component-based Product Line in the Data Processing Domain. 275-280 - Per Karlström, Wenbiao Zhou:
Generator Flow: An XML Configurable Design Pattern Used in NoGAP. 281-286 - Henning Groenda:
Protecting Intellectual Property by Certified Component Quality Descriptions. 287-292 - Claudio Gonçalves Bernardo:
Loan System in Brazilian Financial Institution - A SOA Application. 293-298 - Claudio Gonçalves Bernardo, William Bragagnollo Montini, Fernanda Naomi Yamato, Gerson Pereira Domingues, Felipe D'Oliveira:
System Development for Violence Mapping in a Social Network in Real Time. 299-305 - Ayoub Sabraoui, Abdeslam Ennouaary, Ismaïl Khriss, Mohammed El Koutbi:
An MDA-Based Approach for WS Composition Using UML Scenarios. 306-313 - James R. Miller, Hisham M. Haddad:
Challenges Faced While Simultaneously Implementing CMMI and Scrum: A Case Study in the Tax Preparation Software Industry. 314-318 - Natarajan Meghanathan, Hyunju Kim, Loretta A. Moore:
Incorporation of Aspects of Systems Security and Software Security in Senior Capstone Projects. 319-324 - Caio Henrique Coutinho, Johnny Cardoso Marques, Sarasuaty Megume Hayashi Yelisetty, Samoel Mirachi, Alexandre Lima Possebon Ribeiro, Marcelo Amaral da Silva, Adilson Marques da Cunha, Luiz Alberto Vieira Dias:
Developing a Smart Grids System as a PBL with Agile Method on Computer Engineering Courses. 325-330 - Jumie Yuventi, José Cortés:
Developing Rapidly Expandable Data-driven Software Systems Based on Multitier Architecture: Examination of the Development of Modules for Content Management Systems Used to Construct Web Portals and Virtual Communities. 331-334 - Kehinde Dehinbo, Pieter Pretorius, Johnson Dehinbo:
Strategic Analysis Towards Deriving Competitive Advantage with the Use of FOSS: The Case of a South African University. 335-342 - Tomohiro Hayata, Jianchao Han, Mohsen Beheshti:
Facilitating Agile Software Development with Lean Architecture in the DCI Paradigm. 343-348 - Santosh Rajendran, Kevin Gary, Harry Koehnemann:
A Tool for Teaching Risk. 349-354 - Sabah Al-Fedaghi:
Perceived Privacy. 355-360 - Tummalapalli J. V. R. K. M. K. Sayi, R. K. N. Sai Krishna, Ravi Mukkamala, Pallav K. Baruah:
Data Outsourcing in Cloud Environments: A Privacy Preserving Approach. 361-366 - Arijit Ukil:
Connect with Your Friends and Share Private Information Safely. 367-372 - Mark Stegelmann, Dogan Kesdogan:
Location Privacy for Vehicle-to-Grid Interaction through Battery Management. 373-378 - Hisham A. Kholidy, Fabrizio Baiardi:
CIDS: A Framework for Intrusion Detection in Cloud Systems. 379-385 - Kaibin Huang, Raylin Tso:
Security Analysis Concerning the Random Numbers of Threshold Ring Signatures. 386-391 - Nikolaos Aroukatos, Kostas Manes, Stelios Zimeras, Fotis Georgiakodis:
Data Hiding Techniques in Steganography Using Fibonacci and Catalan Numbers. 392-396 - Hisham A. Kholidy, Fabrizio Baiardi:
CIDD: A Cloud Intrusion Detection Dataset for Cloud Computing and Masquerade Attacks. 397-402 - Jing-Chiou Liou:
When the Software Goes Beyond its Requirements - A Software Security Perspective. 403-408 - Michael J. Shevenell, Robert F. Erbacher:
Design and Implementation of an Open Network and Host-Based Intrusion Detection Testbed with an Emphasis on Accuracy and Repeatability. 409-416 - Robert F. Erbacher, Steve E. Hutchinson:
Distributed Sensor Objects for Intrusion Detection Systems. 417-424 - Dong-Hyun Kim, Gil-Je Lee, Min-Ho Park, Kee-Young Yoo:
A Reversible Secret Sharing Scheme Based on GF(2^8). 425-430 - Johnny Cardoso Marques, Sarasuaty Megume Hayashi Yelisetty, Luiz Alberto Vieira Dias, Adilson Marques da Cunha:
Using Model-Based Development as Software Low-Level Requirements to Achieve Airborne Software Certification. 431-436 - Mehrdad Saadatmand, Thomas Leveque:
Modeling Security Aspects in Distributed Real-Time Component-Based Embedded Systems. 437-444 - Mario Masayuki Takeda, Francisco Supino Marcondes, Ítalo Santiago Vega, Elizabete Briani Macedo Gara, Luciano Gaspar:
A Computational Teaching Approach through the Use of a Narrative Technique and a Comic Strip. 445-451 - Felipe Rafael Motta Cardoso, Paulo Marcelo Tasinaffo, Denis Ávila Montini, Danilo Douradinho Fernandes, Adilson Marques da Cunha, Luiz Alberto Vieira Dias:
A Formal Control Model for Risks Management within Software Projects. 452-457 - Rana Atif Ali Khan, Muhammad Umair Khan, Muneeb Iqbal:
Multilevel Graph Partitioning Scheme to Solve Traveling Salesman Problem. 458-463 - Doreen Orishaba, Raymond Besiga, Arthur Tumusiime Asiimwe, Sandy Stevens Tickodri-Togboa, Paul Isaac Musasizi, Cosmas Mwikirize:
Implementation of a Wavelength Division Multiplexing and Bidirectional Optic Fiber Link iLab. 464-465 - Darshan A. Dimplu, Fei Wang:
Behavior Modeling of Programmable Metallization Cell Using Verilog-A. 466-471 - Mahmoud Fawzy Wagdy, Robin Sur:
A Novel SAR Fast-Locking Digital PLL: SPICE Modeling and Simulations. 472-477 - Taufik Taufik, Taffy Wong, Owen Jong, Dale Dolan:
Design and Simulation of Multiple-Input Single-Output DC-DC Converter. 478-483 - Tan Yiyu, Yasushi Inoguchi, Yukinori Sato, Yukio Iwaya, Hiroshi Matsuoka, Makoto Otani, Takao Tsuchiya:
Design of a FPGA-based Timing Sharing Architecture for Sound Rendering Applications. 484-489 - Yanqing Ji, Fangyang Shen, John Tran:
A High Performance Agent-Based System for Reporting Suspected Adverse Drug Reactions. 490-495 - Jie Luo, Yilin Zhang, Saarvaani Vadlamani, Byeong Kil Lee:
Performance-Sensitivity-based Workload Tailoring for Effective Design Exploration. 496-501 - Bing Qi, Fangyang Shen, Syed Raza:
iBATD: A New Routing Metric for Multi-radio Wireless Mesh Networks. 502-507 - B. Asvija, K. Kalaiselvan, M. Ateet, R. Sridharan, S. R. Krishnamurthy:
A Performance Based QoS Aware Resource Brokering Framework for the Grid. 508-515 - Anthony S. Fong, Chihang Yau, Yijun Liu:
A Hardware-Software Integrated Design for a High-Performance Java Processor. 516-521 - Kamyar Ardekani, Amirreza Ardekani:
An IT-based System to Facilitate Architectural Design. 522-527 - Kerry A. Seitz, Mark C. Lewis:
Virtual Machine and Bytecode for Optimization on Heterogeneous Systems. 528-533 - Jaya Suseela, Venkatesan Muthukumar:
Loopback Virtual Channel Router Architecture for Network on Chip. 534-539 - F. Tabatabayi, Babak Akhgar, S. M. R. Nasserzadeh, Simeon J. Yates:
Simulating Online Consumer Satisfaction Using Fuzzy Cognitive Mapping. 540-547 - Jesús Ubaldo Quevedo-Torrero, Geno Erickson:
XML Querying Using Data Logic Structures and Primitives. 548-553 - Jesús Ubaldo Quevedo-Torrero, Geno Erickson:
Watermarking XML Structures Using Multi-valued Dependencies. 554-559 - Jasdeep Natt, Ray R. Hashemi, Azita Bahrami, Mahmood Bahar, Nicholas Tyler, Jay Hodgson:
Predicting Future Climate Using Algae Sedimentation. 560-565 - Hassan Reza, Narayana Mazumder:
A Secure Software Architecture for Mobile Computing. 566-571 - Hassan Reza, Liang Cheng:
Context-Based Testing of COTs Using Petri Nets. 572-577 - Jack O. Shelton, Hamid R. Arabnia:
Brain Imaging for Diagnosis of Schizophrenia: Challenges, Successes and a Research Road Map. 578-583 - Yas Abbas Alsultanny:
Successful Forecasting for Knowledge Discovery by Statistical Methods. 584-588 - Kazem Taghva:
The Building of a Large Government Digital Library. 589-593 - Samir N. Hamade:
Student Perceptions of Learning Management Systems in a University Environment: Yahoo Groups vs Blackboard. 594-599 - Premchand Uppuluri, Jeff Pittges:
A Comprehensive Undergraduate Application Security Project. 600-607 - John T. Minor, Laxmi P. Gewali:
Useful Compiler Directives for Teaching Programming. 608-611 - Eugene Chamorro, Jianchao Han, Mohsen Beheshti:
The Design and Implementation of an Antivirus Software Advising System. 612-617 - Kohei Arai:
Data Hiding Method Based on Dyadic Wavelet Transformation Improving Invisibility of Secret Images on Circulation Images by Means of Run-Length Coding with Permutation Matrix Based on Random Number. 618-622 - Teruya Minamoto, Ryuji Ohura:
A Non-blind Digital Image Watermarking Method Based on the Dual-tree Complex Discrete Wavelet Transform and Interval Arithmetic. 623-628 - Zhong Zhang, Hiroshi Toda, Takashi Imamura, Tetsuo Miyake:
A New Variable-Band Filter Design Method for the Discrete Wavelet Transform. 629-634 - Maqsood Mahmud, Muhammad Waqar, Abdulrahman Abdulkarim Mirza, Abdul Hanan Bin Abdullah:
Efficient Securing of Iris Image Template by Using Grayscale Level Incremented/Decremented Method. 635-639 - Teruya Minamoto, Yuji Ogata, Masahiro Sawai:
Visualization of Digital Audio Watermarking Based on the Dyadic Wavelet Transform. 640-645 - Aras Dargazany, Mircea Nicolescu:
Human Body Parts Tracking Using Torso Tracking: Applications to Activity Recognition. 646-651 - Xinyu Zhang, Xiangyu Zhang, Yuhao Luo:
Who-Works-With-Whom (WWWW): Web-based Directed Work Relationship Network for Maximizing Organizational Efficiency in Enterprises. 652-655 - Kohei Arai, Rosa Andrie:
Gait Recognition Method Based on Wavelet Transformation and its Evaluation with Chinese Academy of Sciences (CASIA) Gait Database as a Human Gait Recognition Dataset. 656-661 - Rodolfo Inostroza, Cristian Rusu, Silvana Roncagliolo, Cristhy Jiménez, Virginica Rusu:
Usability Heuristics for Touchscreen-based Mobile Devices. 662-667 - Mohammed Rokibul Alam Kotwal, Tasneem Halim, Md. Mehedi Hassan Almaji, Imtiaz Hossain, Mohammad Nurul Huda:
Extraction of Local Features for Tri-Phone Based Bangla ASR. 668-673 - Yun-Ke Chang, Mark J. Chavez, Miguel A. Morales Arroyo, Jaime Jimenez-Guzman:
An Active Cinema Experience: A Study on User Expectation and Perceived Gratifications of a Real-time Animated Film System. 674-679 - Alejandra Jiménez, Santiago Jiménez, Pablo Lozada Yanez, Cristhy Jiménez:
Wireless Sensors Network in the Efficient Management of Greenhouse Crops. 680-685 - S. Kami Makki, Charles Williams:
Development of Dynamic Vocalization Customer Service Software for Multiple Languages for Telephone Environment. 686-689 - Roberto Muñoz-Soto, Virgínia Chalegre:
Defining Virtual Worlds Usability Heuristics. 690-695 - Juan Pablo Cofré, Gabriel Moraga, Cristian Rusu, Ivan Mercado, Rodolfo Inostroza, Cristhy Jiménez:
Developing a Touchscreen-based Domotic Tool for Users with Motor Disabilities. 696-701 - Joseph M. Woodside:
Health Intelligence Model for Evaluation of Social Media Outcomes. 702-706 - Simon Meyffret, Lionel Médini, Frédérique Laforest:
User-centric Trust-based Recommendation. 707-713 - Pekka Makkonen:
Do Videowikis on the Web Support Better (Constructivist) Learning in the Basics of Information Systems Science? 714-719 - Ei Pa Pa Pe-Than, Dion Hoe-Lian Goh, Chei Sian Lee:
A Survey and Typology of Human Computation Games. 720-725 - Long Ma, Chei Sian Lee, Dion Hoe-Lian Goh:
Sharing in Social News Websites: Examining the Influence of News Attributes and News Sharers. 726-731 - Hiroyuki Hisamatsu, Takahiro Hatanaka:
Performance Evaluation of a Countering Method to Social Bookmarking Pollution Based on Degree of Bookmark Similarity. 732-737 - Alexis Papadimitriou, Panagiotis Symeonidis, Yannis Manolopoulos:
Scalable Link Prediction in Social Networks Based on Local Graph Characteristics. 738-743 - Majid Aldraehim, Sylvia L. Edwards, Jason Watson:
Cultural Impact on e-service Use in Saudi Arabia: Results from Focus Groups. 744-750 - Salto Martinez Rodrigo, Jacques García Fausto Abraham:
Development and Implementation of a Chat Bot in a Social Network. 751-755 - Linh Bao Ngo, Amy W. Apon, Doug Hoffman:
An Empirical Study on Forecasting Using Decomposed Arrival Data of an Enterprise Computing System. 756-763 - Dmitry Strunkin, Brian Mac Namee, John D. Kelleher:
An Investigation Into Feature Selection for Oncological Survival Prediction. 764-768 - Nai-Hui Chia, Chia-Hung Chien, Wei-Ho Chung, Sy-Yen Kuo:
Quantum Blind Computation with Teleportation-based Computation. 769-774 - Qunzhi Zhou, Sreedhar Natarajan, Yogesh Simmhan, Viktor K. Prasanna:
Semantic Information Modeling for Emerging Applications in Smart Grid. 775-782 - Linh Bao Ngo, Vijay Dantuluri, Michael J. Stealey, Stanley C. Ahalt, Amy W. Apon:
An Architecture for Mining and Visualization of U.S. Higher Educational Data. 783-789 - K. S. Pradeepkumar, Rose Neena Tom:
Business Escalation Management: A Case Study - Resolution of a Business Relationship Deterrent. 790-795 - Mutlaq B. Alotaibi, Dimitrios I. Rigas:
Fostering the User Interface Acceptance in Customer Relationship Management: A Multimedia-aided Approach. 796-801 - Basit Shahzad, Lolowah R. Alssum, Yousef Al-Ohali:
Selection of Suitable Evaluation Function Based on Win/Draw Parameter in Othello. 802-806 - Piya Techateerawat:
Network Management System for Quantum Key Distribution. 807-808 - Sana Sahebgharani, Mohammad Shahverdy:
A Scheduling Algorithm for Downloading Data from RSU Using Multicast Technique. 809-814 - Curtis Steward, Luay A. Wahsheh, Aftab Ahmad, Jonathan M. Graham, Cheryl V. Hinds, Aurelia T. Williams, Sandra J. DeLoatch:
Software Security: The Dangerous Afterthought. 815-818 - Devon Simmonds, Mark Lanter, Lyle Scott III, Ashley Young, Selin Benli, Andy Herrmann:
Exploring Model-Based Design. 819-820 - Shay Gueron, Vlad Krasnov:
Speeding Up Big-Numbers Squaring. 821-823 - Shay Gueron:
Speeding Up SHA-1, SHA-256 and SHA-512 on the 2nd Generation Intel® Core™ Processors. 824-826 - Sho Nishida, Katsumi Wasaki:
Retargetable Netlists Generation and Structural Synthesis Based on a Meta Hardware Description Language: Melasy+. 827-830 - Xinyu Zhang, Yuhao Luo, Zhaohui Liang:
Knowledge Services and Knowledge Building in E-learning. 831-832 - Xinyu Zhang, Qian Wang, Yiqian Lu:
The Exploration of the E-Learning Standard Test System. 833-834 - Daniel Beatty, Noé Lopez-Benitez:
Rule-based Management of Large Unorganized Data Sets. 835-838 - Nishchal K. Verma, Tarun Maini, Al Salour:
Acoustic Signature Based Intelligent Health Monitoring of Air Compressors with Selected Features. 839-845 - Nur Al Hasan Haldar, Muhammad Abulaish, Syed Asim Pasha:
An Activity Pattern Based Wireless Intrusion Detection System. 846-847 - Shwu-Min Horng:
An Exploratory Study of the Users' Behavior on Social Network Sites. 848-849 - Alan Shaw:
Using Chatbots to Teach Socially Intelligent Computing Principles in Introductory Computer Science Courses. 850-851 - Xuesong Zhang:
Can You See Me Now? Design SEO-friendly Classroom Blogs for Reaching Valuable Public. 852-853 - Peng He:
Evaluating Students Online Discussion Performance by Using Social Network Analysis. 854-855 - Thiago Catoto Dias, André Luiz de Souza Fatala, Arnaldo de Moraes Pereira:
Social Engine Web Store: Create Your Web Store and Publish It on Your Social Network. 856-859 - Joel Mana Gonçalves, Rejane Pereira da Silva Gonçalves:
Using Social Networks to Improve the Performance of a Service Desk. 860 - Habib M. Fardoun, Daniyal M. Alghazzawi, Sebastián Romero López, J. A. G. Lazarro:
Proposed Model for Social and Collaborative Social Network of Positive Reinforcement: Positive Reinforcement Online Social Network: PRSN. 861-864 - Wei-Lun Chang, Arleen N. Diaz:
How Can Social Networks Help Us Measure Trust Online? 865-866 - Ahmad Eyadat, Izzat Alsmadi:
Automatic Coverage Evaluation for a Medical Expert System. 867-872 - Weifeng Xu, Lin Deng, Qing Zheng:
Annotating Resources in Sequence Diagrams for Testing Web Security. 873-874 - Vasudevan Janarthanan:
Serious Video Games: Games for Education and Health. 875-878 - Vasudevan Janarthanan:
Innovations in Art and Production: Sound, Modeling and Animation. 879-882 - Sri Khetwat Saritha, Kishan Dharavath:
Link Encryption to Counteract with Rouge Social Network Crawlers. 883-884 - Ahmad B. Alnafoosi:
A Survey of Requirement Engineering Interactions in Telecommunication Systems. 885 - Yousef Ahmed Eyadat:
Excessive Use of the Internet and Gender: The Case for University Students in Jordan. 886-891 - Jaejoon Kim, Lalita Udpa:
ROI Detection Using Spatial Kernel Based Filter for Steam Generator Tube Inspection in Eddy Current Nondestructive Evaluation. 892 - José Gonçalves Batista da Luz, Michèle Puretachi de Barros:
Relationship between State Machine and Dynamic Behavior: Coherence among Events and Messages. 893 - Chunming Li, Shuanning Zheng, Xiaodan Su, Qing Li, Quanyi Qiu:
Community Environmental Monitoring Mode Based on Wireless Sensor Network. 894 - Quanyi Qiu, Yang Zhao, Lei Chen, Yuan Quan:
Utilization of Urban Form Information for Extracting Commuting Travel Carbon Emission on Urban Road Network. 895 - Chandan Tilak Bhunia, Abhinandan Bhunia:
Packet Reversed Packet Combining Scheme: A Thorough Analysis. 896 - Ralph DeFrangesco:
Biological Cells as Storage Devices. 897-898
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.