


default search action
9th ITNG 2012: Las Vegas, Nevada, USA
- Shahram Latifi:

Ninth International Conference on Information Technology: New Generations, ITNG 2012, Las Vegas, Nevada, USA, 16-18 April, 2012. IEEE Computer Society 2012, ISBN 978-0-7695-4654-4 - Wilfried Lepuschitz, Václav Jirkovský, Petr Kadera, Pavel Vrba:

A Multi-Layer Approach for Failure Detection in a Manufacturing System Based on Automation Agents. 1-6 - (Withdrawn) A novel violent videos classification scheme based on the bag of audio words features [Document Suppressed in IEEE Xplore]. 7-13

- Marwa M. A. Hadhoud

, Mohamed I. Eladawy, Ahmed Farag Seddik:
Region of Interest Localization of Cardiac Structure from Cine MRI Images. 14-17 - Arnold Wiliem

, Vamsi Krishna Madasu
, Wageeh W. Boles
, Prasad K. D. V. Yarlagadda
:
A Context Space Model for Detecting Anomalous Behaviour in Video Surveillance. 18-24 - Alexandre Ivánovich Grebénnikov:

Image Recovery by Recursive Spline Smoothing and Application to Recognition of Compound Structures. 25-29 - Yang Wang, Kaitlyn Gurule, Jacqueline Wise, Jun Zheng

:
Wavelet Based Region Duplication Forgery Detection. 30-35 - Amioy Kumar, Madasu Hanmandlu, Shantaram Vasikarla:

Rank Level Integration of Face Based Biometrics. 36-41 - Thanh Le, Tom Altman, Katheleen J. Gardiner:

Probability-based Imputation Method for Fuzzy Cluster Analysis of Gene Expression Microarray Data. 42-47 - Adib Rastegarnia, Vahid Solouk

:
Castalia Network Animator (CNA): A Visualization Tool for Castalia Wireless Sensor Network Simulator. 48-53 - Yu-Hong Lee, Chyi-Ren Dow, Lu-Hui Huang, Ya-Chen Lin, Shiow-Fen Hwang, Wei-Bin Lee:

An Efficient Geo-aware Peer-to-Peer Resource Discovery and Sharing Scheme in Vehicular Ad-hoc Networks. 54-59 - Natarajan Meghanathan

:
A Unicast MANET Routing Protocol to Simultaneously Minimize the Stability-Hop Count Tradeoff and End-to-End Delay. 60-64 - Leila Mechtri, Fatiha Djemili Tolba, Salim Ghanemi:

MASID: Multi-Agent System for Intrusion Detection in MANET. 65-70 - Go Hasegawa

, Shoichi Takemori, Yoshiaki Taniguchi
, Hirotaka Nakano:
Determining Coverage Area Using Voronoi Diagram Based on Local Information for Wireless Mesh Networks. 71-76 - Yenumula B. Reddy

:
Spectrum Detection in Cognitive Networks by Minimizing Hidden Terminal Problem. 77-82 - Omar Y. Tahboub, Javed I. Khan:

Finding Time and Buffer Preserving Routes in Gaussian Intermittent Networks. 83-88 - Matt Fenwick, Colbert Sesanker, Martin R. Schiller

, Heidi J. C. Ellis, Michael L. Hinman, Jay Vyas, Michael R. Gryk:
An Open-Source Sandbox for Increasing the Accessibility of Functional Programming to the Bioinformatics and Scientific Communities. 89-94 - Emi Mathews:

Planarization of Geographic Cluster-based Overlay Graphs in Realistic Wireless Networks. 95-101 - Mohamed Bourimi

, Marcel Heupel, Benedikt Westermann, Dogan Kesdogan, Marc Planagumà, Rafael Giménez, Fatih Karatas, Philipp Schwarte:
Towards Transparent Anonymity for User-controlled Servers Supporting Collaborative Scenarios. 102-108 - Muhammad Awais Azam

, Jonathan Loo
, Aboubaker Lasebae, Sardar Kashif Ashraf Khan, Waleed Ejaz
:
Recognising the Activities of Low Entropy Mobile People Using Wireless Proximity Data. 109-114 - Craig Stewart, Javed I. Khan:

A Large Scale Evolutionary Analysis of the Internet Autonomous System Network. 115-120 - Shine N. Das, Midhun Mathew, Pramod K. Vijayaraghavan:

An Efficient Approach for Finding Near Duplicate Web Pages Using Minimum Weight Overlapping Method. 121-126 - Shu-Ming Hsieh, Ssu-An Lo, Chiun-Chieh Hsu, Wei-Chao Lin:

Novel Cloud Service for Improving World Universities Ranking. 127-131 - Ching-Seh Wu, Ibrahim Khoury:

Tree-based Search Algorithm for Web Service Composition in SaaS. 132-138 - Anirban Sarkar, Narayan C. Debnath:

Aspect Algebra: The Operational Semantics for Aspect Oriented Software. 139-144 - Kishan Dharavath

, Sri Khetwat Saritha
:
Semantic Web: A Topic Specific Search. 145-148 - Narayan C. Debnath, Carlos Salgado, Mario Peralta, Mario Beron, Daniel Riesco, German Montejano:

MEBPCM: A Method for Evaluating Business Process Conceptual Models. A Study Case. 149-154 - Wan D. Bae, Shayma Alkobaisi

, Sada Narayanappa, Cheng C. Liu:
A Mobile Data Analysis Framework for Environmental Health Decision Support. 155-161 - Sung-Hoon Park, Seoun-Hyung Lee:

A Design of Mutual Exclusion Protocol in Cellular Wireless Networks. 162-167 - Tong Ming Lim, Yong Liang Choong, Angela Siew-Hoong Lee:

Using Two-tier Bitwise Interest Oriented QRP Data Structure for High Clustering through Interest Similarity in SWB P2P Systems. 168-174 - Angela Siew-Hoong Lee, Tong Ming Lim:

The Use of Knowledge Management Systems to Support Knowledge Creation and Sharing Activities among Employees - A Survey Based Study of IT Shared Services Company. 175-181 - Farhana H. Zulkernine, Piergiorgio Bertoli, Marco Pistore

, Andreas Friesen, Jens Lemcke, Bernhard Thimmel, Otfried von Geisau:
A Constraint-Driven Business Object Model for Service-Based Business Processes. 182-188 - Giovanni Agosta

, Alessandro Barenghi
, Antonio Parata, Gerardo Pelosi
:
Automated Security Analysis of Dynamic Web Applications through Symbolic Code Execution. 189-194 - Chouvalit Khancome, Veera Boonjing:

New Hashing-Based Multiple String Pattern Matching Algorithms. 195-200 - Yanjun Zuo, John Babin:

Searching for the Optimal Proof Schedule in a Proof-Carrying Survivability Paradigm - A Dynamic, Interactive Approach. 201-208 - Karl Smith, Jeffrey M. Galloway, Susan V. Vrbsky:

An Empirical Study on the Impact of an Idle Limit in Distributed Systems. 209-213 - Mais Nijim, Young Lee, Kiranmai Bellam:

HyBuM: Hybrid Energy Efficient Architecture for Mobile Storage Systems. 214-220 - Taufik Taufik

, Jameson Thornton, Dale Dolan:
Piezoelectric Converter for Wind Energy Harvesting. 221-224 - Dale Dolan, Peter W. Lehn:

Harmonics and Dynamic Response of a Virtual Air Gap Variable Reactor. 225-231 - Jeffrey M. Galloway, Karl Smith, Jeffrey C. Carver:

An Empirical Study of Power Aware Load Balancing in Local Cloud Architectures. 232-236 - James Gagnon, Corey Weathers, Marty Wiedmeyer, Phani Koppineedi, Raghavender Anegouni, Steve Schon, Xin Bai:

API Backward Compatibility Testing Using VSTS. 237-241 - Adam Schwartz:

Using Test Cases to Size Systems: A Case Study. 242-246 - Teemu Kanstrén, Éric Piel, Hans-Gerhard Gross:

Using Reverse-Engineered Test-Based Models to Generate More Tests: Where is the Sense in That? 247-252 - James D. McCaffrey:

A Hybrid System for Analyzing Very Large Graphs. 253-257 - Soumen Maity:

Software Testing with Budget Constraints. 258-262 - Selin Benli, Anthony Habash, Andy Herrmann, Tyler Loftis, Devon Simmonds:

A Comparative Evaluation of Unit Testing Techniques on a Mobile Platform. 263-268 - Talukdar S. Asgar, Mohammed Akour

, Tariq M. King:
Applying Test-First and Parallel Processing Techniques to ERP Data Conversion. 269-274 - Xinyu Zhang, Rui Wang:

The Application of the Component-based Product Line in the Data Processing Domain. 275-280 - Per Karlström, Wenbiao Zhou:

Generator Flow: An XML Configurable Design Pattern Used in NoGAP. 281-286 - Henning Groenda:

Protecting Intellectual Property by Certified Component Quality Descriptions. 287-292 - Claudio Gonçalves Bernardo:

Loan System in Brazilian Financial Institution - A SOA Application. 293-298 - Claudio Gonçalves Bernardo, William Bragagnollo Montini, Fernanda Naomi Yamato, Gerson Pereira Domingues, Felipe D'Oliveira:

System Development for Violence Mapping in a Social Network in Real Time. 299-305 - Ayoub Sabraoui, Abdeslam Ennouaary, Ismaïl Khriss, Mohammed El Koutbi:

An MDA-Based Approach for WS Composition Using UML Scenarios. 306-313 - James R. Miller, Hisham M. Haddad:

Challenges Faced While Simultaneously Implementing CMMI and Scrum: A Case Study in the Tax Preparation Software Industry. 314-318 - Natarajan Meghanathan

, Hyunju Kim, Loretta A. Moore:
Incorporation of Aspects of Systems Security and Software Security in Senior Capstone Projects. 319-324 - Caio Henrique Coutinho, Johnny Cardoso Marques, Sarasuaty Megume Hayashi Yelisetty, Samoel Mirachi, Alexandre Lima Possebon Ribeiro, Marcelo Amaral da Silva, Adilson Marques da Cunha, Luiz Alberto Vieira Dias:

Developing a Smart Grids System as a PBL with Agile Method on Computer Engineering Courses. 325-330 - Jumie Yuventi, José Cortés:

Developing Rapidly Expandable Data-driven Software Systems Based on Multitier Architecture: Examination of the Development of Modules for Content Management Systems Used to Construct Web Portals and Virtual Communities. 331-334 - Kehinde Dehinbo, Pieter Pretorius, Johnson Dehinbo:

Strategic Analysis Towards Deriving Competitive Advantage with the Use of FOSS: The Case of a South African University. 335-342 - Tomohiro Hayata, Jianchao Han, Mohsen Beheshti:

Facilitating Agile Software Development with Lean Architecture in the DCI Paradigm. 343-348 - Santosh Rajendran, Kevin Gary, Harry Koehnemann:

A Tool for Teaching Risk. 349-354 - Sabah Al-Fedaghi

:
Perceived Privacy. 355-360 - Tummalapalli J. V. R. K. M. K. Sayi, R. K. N. Sai Krishna, Ravi Mukkamala, Pallav K. Baruah:

Data Outsourcing in Cloud Environments: A Privacy Preserving Approach. 361-366 - Arijit Ukil

:
Connect with Your Friends and Share Private Information Safely. 367-372 - Mark Stegelmann, Dogan Kesdogan:

Location Privacy for Vehicle-to-Grid Interaction through Battery Management. 373-378 - Hisham A. Kholidy, Fabrizio Baiardi

:
CIDS: A Framework for Intrusion Detection in Cloud Systems. 379-385 - Kaibin Huang, Raylin Tso:

Security Analysis Concerning the Random Numbers of Threshold Ring Signatures. 386-391 - Nikolaos Aroukatos, Kostas Manes, Stelios Zimeras, Fotis Georgiakodis:

Data Hiding Techniques in Steganography Using Fibonacci and Catalan Numbers. 392-396 - Hisham A. Kholidy, Fabrizio Baiardi

:
CIDD: A Cloud Intrusion Detection Dataset for Cloud Computing and Masquerade Attacks. 397-402 - Jing-Chiou Liou:

When the Software Goes Beyond its Requirements - A Software Security Perspective. 403-408 - Michael J. Shevenell, Robert F. Erbacher:

Design and Implementation of an Open Network and Host-Based Intrusion Detection Testbed with an Emphasis on Accuracy and Repeatability. 409-416 - Robert F. Erbacher, Steve E. Hutchinson:

Distributed Sensor Objects for Intrusion Detection Systems. 417-424 - Dong-Hyun Kim, Gil-Je Lee, Min-Ho Park, Kee-Young Yoo:

A Reversible Secret Sharing Scheme Based on GF(2^8). 425-430 - Johnny Cardoso Marques, Sarasuaty Megume Hayashi Yelisetty, Luiz Alberto Vieira Dias, Adilson Marques da Cunha:

Using Model-Based Development as Software Low-Level Requirements to Achieve Airborne Software Certification. 431-436 - Mehrdad Saadatmand

, Thomas Leveque:
Modeling Security Aspects in Distributed Real-Time Component-Based Embedded Systems. 437-444 - Mario Masayuki Takeda, Francisco Supino Marcondes

, Ítalo Santiago Vega, Elizabete Briani Macedo Gara, Luciano Gaspar:
A Computational Teaching Approach through the Use of a Narrative Technique and a Comic Strip. 445-451 - Felipe Rafael Motta Cardoso, Paulo Marcelo Tasinaffo

, Denis Ávila Montini, Danilo Douradinho Fernandes
, Adilson Marques da Cunha, Luiz Alberto Vieira Dias:
A Formal Control Model for Risks Management within Software Projects. 452-457 - Rana Atif Ali Khan

, Muhammad Umair Khan, Muneeb Iqbal:
Multilevel Graph Partitioning Scheme to Solve Traveling Salesman Problem. 458-463 - Doreen Orishaba, Raymond Besiga, Arthur Tumusiime Asiimwe, Sandy Stevens Tickodri-Togboa, Paul Isaac Musasizi, Cosmas Mwikirize

:
Implementation of a Wavelength Division Multiplexing and Bidirectional Optic Fiber Link iLab. 464-465 - Darshan A. Dimplu, Fei Wang:

Behavior Modeling of Programmable Metallization Cell Using Verilog-A. 466-471 - Mahmoud Fawzy Wagdy, Robin Sur:

A Novel SAR Fast-Locking Digital PLL: SPICE Modeling and Simulations. 472-477 - Taufik Taufik

, Taffy Wong, Owen Jong, Dale Dolan:
Design and Simulation of Multiple-Input Single-Output DC-DC Converter. 478-483 - Tan Yiyu, Yasushi Inoguchi, Yukinori Sato

, Yukio Iwaya, Hiroshi Matsuoka, Makoto Otani, Takao Tsuchiya:
Design of a FPGA-based Timing Sharing Architecture for Sound Rendering Applications. 484-489 - Yanqing Ji, Fangyang Shen, John Tran:

A High Performance Agent-Based System for Reporting Suspected Adverse Drug Reactions. 490-495 - Jie Luo, Yilin Zhang, Saarvaani Vadlamani, Byeong Kil Lee:

Performance-Sensitivity-based Workload Tailoring for Effective Design Exploration. 496-501 - Bing Qi, Fangyang Shen, Syed Raza:

iBATD: A New Routing Metric for Multi-radio Wireless Mesh Networks. 502-507 - B. Asvija, K. Kalaiselvan, M. Ateet, R. Sridharan, S. R. Krishnamurthy:

A Performance Based QoS Aware Resource Brokering Framework for the Grid. 508-515 - Anthony S. Fong, Chihang Yau, Yijun Liu:

A Hardware-Software Integrated Design for a High-Performance Java Processor. 516-521 - Kamyar Ardekani, Amirreza Ardekani

:
An IT-based System to Facilitate Architectural Design. 522-527 - Kerry A. Seitz

, Mark C. Lewis:
Virtual Machine and Bytecode for Optimization on Heterogeneous Systems. 528-533 - Jaya Suseela, Venkatesan Muthukumar:

Loopback Virtual Channel Router Architecture for Network on Chip. 534-539 - F. Tabatabayi, Babak Akhgar, S. M. R. Nasserzadeh, Simeon J. Yates

:
Simulating Online Consumer Satisfaction Using Fuzzy Cognitive Mapping. 540-547 - Jesús Ubaldo Quevedo-Torrero, Geno Erickson:

XML Querying Using Data Logic Structures and Primitives. 548-553 - Jesús Ubaldo Quevedo-Torrero, Geno Erickson:

Watermarking XML Structures Using Multi-valued Dependencies. 554-559 - Jasdeep Natt, Ray R. Hashemi, Azita Bahrami, Mahmood Bahar, Nicholas Tyler, Jay Hodgson:

Predicting Future Climate Using Algae Sedimentation. 560-565 - Hassan Reza, Narayana Mazumder:

A Secure Software Architecture for Mobile Computing. 566-571 - Hassan Reza, Liang Cheng:

Context-Based Testing of COTs Using Petri Nets. 572-577 - Jack O. Shelton, Hamid R. Arabnia:

Brain Imaging for Diagnosis of Schizophrenia: Challenges, Successes and a Research Road Map. 578-583 - Yas Abbas Alsultanny

:
Successful Forecasting for Knowledge Discovery by Statistical Methods. 584-588 - Kazem Taghva

:
The Building of a Large Government Digital Library. 589-593 - Samir N. Hamade:

Student Perceptions of Learning Management Systems in a University Environment: Yahoo Groups vs Blackboard. 594-599 - Premchand Uppuluri, Jeff Pittges:

A Comprehensive Undergraduate Application Security Project. 600-607 - John T. Minor, Laxmi P. Gewali:

Useful Compiler Directives for Teaching Programming. 608-611 - Eugene Chamorro, Jianchao Han, Mohsen Beheshti:

The Design and Implementation of an Antivirus Software Advising System. 612-617 - Kohei Arai:

Data Hiding Method Based on Dyadic Wavelet Transformation Improving Invisibility of Secret Images on Circulation Images by Means of Run-Length Coding with Permutation Matrix Based on Random Number. 618-622 - Teruya Minamoto

, Ryuji Ohura:
A Non-blind Digital Image Watermarking Method Based on the Dual-tree Complex Discrete Wavelet Transform and Interval Arithmetic. 623-628 - Zhong Zhang, Hiroshi Toda, Takashi Imamura, Tetsuo Miyake:

A New Variable-Band Filter Design Method for the Discrete Wavelet Transform. 629-634 - Maqsood Mahmud

, Muhammad Waqar, Abdulrahman Abdulkarim Mirza, Abdul Hanan Bin Abdullah:
Efficient Securing of Iris Image Template by Using Grayscale Level Incremented/Decremented Method. 635-639 - Teruya Minamoto

, Yuji Ogata, Masahiro Sawai:
Visualization of Digital Audio Watermarking Based on the Dyadic Wavelet Transform. 640-645 - Aras Dargazany, Mircea Nicolescu:

Human Body Parts Tracking Using Torso Tracking: Applications to Activity Recognition. 646-651 - Xinyu Zhang, Xiangyu Zhang, Yuhao Luo:

Who-Works-With-Whom (WWWW): Web-based Directed Work Relationship Network for Maximizing Organizational Efficiency in Enterprises. 652-655 - Kohei Arai, Rosa Andrie

:
Gait Recognition Method Based on Wavelet Transformation and its Evaluation with Chinese Academy of Sciences (CASIA) Gait Database as a Human Gait Recognition Dataset. 656-661 - Rodolfo Inostroza, Cristian Rusu, Silvana Roncagliolo, Cristhy Jiménez

, Virginica Rusu:
Usability Heuristics for Touchscreen-based Mobile Devices. 662-667 - Mohammed Rokibul Alam Kotwal, Tasneem Halim, Md. Mehedi Hassan Almaji, Imtiaz Hossain, Mohammad Nurul Huda:

Extraction of Local Features for Tri-Phone Based Bangla ASR. 668-673 - Yun-Ke Chang, Mark J. Chavez, Miguel A. Morales Arroyo, Jaime Jimenez-Guzman:

An Active Cinema Experience: A Study on User Expectation and Perceived Gratifications of a Real-time Animated Film System. 674-679 - Alejandra Jiménez, Santiago Jiménez, Pablo Lozada Yanez, Cristhy Jiménez

:
Wireless Sensors Network in the Efficient Management of Greenhouse Crops. 680-685 - S. Kami Makki, Charles Williams:

Development of Dynamic Vocalization Customer Service Software for Multiple Languages for Telephone Environment. 686-689 - Roberto Muñoz-Soto

, Virgínia Chalegre:
Defining Virtual Worlds Usability Heuristics. 690-695 - Juan Pablo Cofré, Gabriel Moraga, Cristian Rusu, Ivan Mercado, Rodolfo Inostroza, Cristhy Jiménez

:
Developing a Touchscreen-based Domotic Tool for Users with Motor Disabilities. 696-701 - Joseph M. Woodside:

Health Intelligence Model for Evaluation of Social Media Outcomes. 702-706 - Simon Meyffret, Lionel Médini, Frédérique Laforest:

User-centric Trust-based Recommendation. 707-713 - Pekka Makkonen:

Do Videowikis on the Web Support Better (Constructivist) Learning in the Basics of Information Systems Science? 714-719 - Ei Pa Pa Pe-Than, Dion Hoe-Lian Goh, Chei Sian Lee:

A Survey and Typology of Human Computation Games. 720-725 - Long Ma, Chei Sian Lee, Dion Hoe-Lian Goh:

Sharing in Social News Websites: Examining the Influence of News Attributes and News Sharers. 726-731 - Hiroyuki Hisamatsu, Takahiro Hatanaka:

Performance Evaluation of a Countering Method to Social Bookmarking Pollution Based on Degree of Bookmark Similarity. 732-737 - Alexis Papadimitriou, Panagiotis Symeonidis

, Yannis Manolopoulos:
Scalable Link Prediction in Social Networks Based on Local Graph Characteristics. 738-743 - Majid Aldraehim, Sylvia L. Edwards, Jason Watson

:
Cultural Impact on e-service Use in Saudi Arabia: Results from Focus Groups. 744-750 - Salto Martinez Rodrigo, Jacques García Fausto Abraham:

Development and Implementation of a Chat Bot in a Social Network. 751-755 - Linh Bao Ngo, Amy W. Apon, Doug Hoffman:

An Empirical Study on Forecasting Using Decomposed Arrival Data of an Enterprise Computing System. 756-763 - Dmitry Strunkin, Brian Mac Namee

, John D. Kelleher
:
An Investigation Into Feature Selection for Oncological Survival Prediction. 764-768 - Nai-Hui Chia, Chia-Hung Chien, Wei-Ho Chung

, Sy-Yen Kuo
:
Quantum Blind Computation with Teleportation-based Computation. 769-774 - Qunzhi Zhou, Sreedhar Natarajan, Yogesh Simmhan

, Viktor K. Prasanna:
Semantic Information Modeling for Emerging Applications in Smart Grid. 775-782 - Linh Bao Ngo, Vijay Dantuluri, Michael J. Stealey

, Stanley C. Ahalt, Amy W. Apon:
An Architecture for Mining and Visualization of U.S. Higher Educational Data. 783-789 - K. S. Pradeepkumar, Rose Neena Tom:

Business Escalation Management: A Case Study - Resolution of a Business Relationship Deterrent. 790-795 - Mutlaq B. Alotaibi

, Dimitrios I. Rigas:
Fostering the User Interface Acceptance in Customer Relationship Management: A Multimedia-aided Approach. 796-801 - Basit Shahzad

, Lolowah R. Alssum, Yousef Al-Ohali:
Selection of Suitable Evaluation Function Based on Win/Draw Parameter in Othello. 802-806 - Piya Techateerawat:

Network Management System for Quantum Key Distribution. 807-808 - Sana Sahebgharani, Mohammad Shahverdy:

A Scheduling Algorithm for Downloading Data from RSU Using Multicast Technique. 809-814 - Curtis Steward, Luay A. Wahsheh, Aftab Ahmad, Jonathan M. Graham, Cheryl V. Hinds, Aurelia T. Williams, Sandra J. DeLoatch:

Software Security: The Dangerous Afterthought. 815-818 - Devon Simmonds, Mark Lanter, Lyle Scott III, Ashley Young, Selin Benli, Andy Herrmann:

Exploring Model-Based Design. 819-820 - Shay Gueron

, Vlad Krasnov:
Speeding Up Big-Numbers Squaring. 821-823 - Shay Gueron

:
Speeding Up SHA-1, SHA-256 and SHA-512 on the 2nd Generation Intel® Core™ Processors. 824-826 - Sho Nishida, Katsumi Wasaki

:
Retargetable Netlists Generation and Structural Synthesis Based on a Meta Hardware Description Language: Melasy+. 827-830 - Xinyu Zhang, Yuhao Luo, Zhaohui Liang:

Knowledge Services and Knowledge Building in E-learning. 831-832 - Xinyu Zhang, Qian Wang, Yiqian Lu:

The Exploration of the E-Learning Standard Test System. 833-834 - Daniel Beatty, Noé Lopez-Benitez:

Rule-based Management of Large Unorganized Data Sets. 835-838 - Nishchal K. Verma, Tarun Maini, Al Salour:

Acoustic Signature Based Intelligent Health Monitoring of Air Compressors with Selected Features. 839-845 - Nur Al Hasan Haldar

, Muhammad Abulaish
, Syed Asim Pasha:
An Activity Pattern Based Wireless Intrusion Detection System. 846-847 - Shwu-Min Horng

:
An Exploratory Study of the Users' Behavior on Social Network Sites. 848-849 - Alan Shaw:

Using Chatbots to Teach Socially Intelligent Computing Principles in Introductory Computer Science Courses. 850-851 - Xuesong Zhang:

Can You See Me Now? Design SEO-friendly Classroom Blogs for Reaching Valuable Public. 852-853 - Peng He:

Evaluating Students Online Discussion Performance by Using Social Network Analysis. 854-855 - Thiago Catoto Dias, André Luiz de Souza Fatala, Arnaldo de Moraes Pereira:

Social Engine Web Store: Create Your Web Store and Publish It on Your Social Network. 856-859 - Joel Mana Gonçalves, Rejane Pereira da Silva Gonçalves:

Using Social Networks to Improve the Performance of a Service Desk. 860 - Habib M. Fardoun, Daniyal M. Alghazzawi, Sebastián Romero López

, J. A. G. Lazarro:
Proposed Model for Social and Collaborative Social Network of Positive Reinforcement: Positive Reinforcement Online Social Network: PRSN. 861-864 - Wei-Lun Chang

, Arleen N. Diaz:
How Can Social Networks Help Us Measure Trust Online? 865-866 - Ahmad Eyadat, Izzat Alsmadi

:
Automatic Coverage Evaluation for a Medical Expert System. 867-872 - Weifeng Xu, Lin Deng

, Qing Zheng:
Annotating Resources in Sequence Diagrams for Testing Web Security. 873-874 - Vasudevan Janarthanan:

Serious Video Games: Games for Education and Health. 875-878 - Vasudevan Janarthanan:

Innovations in Art and Production: Sound, Modeling and Animation. 879-882 - Sri Khetwat Saritha

, Kishan Dharavath
:
Link Encryption to Counteract with Rouge Social Network Crawlers. 883-884 - Ahmad B. Alnafoosi:

A Survey of Requirement Engineering Interactions in Telecommunication Systems. 885 - Yousef Ahmed Eyadat:

Excessive Use of the Internet and Gender: The Case for University Students in Jordan. 886-891 - Jaejoon Kim, Lalita Udpa:

ROI Detection Using Spatial Kernel Based Filter for Steam Generator Tube Inspection in Eddy Current Nondestructive Evaluation. 892 - José Gonçalves Batista da Luz, Michèle Puretachi de Barros:

Relationship between State Machine and Dynamic Behavior: Coherence among Events and Messages. 893 - Chunming Li, Shuanning Zheng, Xiaodan Su, Qing Li, Quanyi Qiu:

Community Environmental Monitoring Mode Based on Wireless Sensor Network. 894 - Quanyi Qiu, Yang Zhao, Lei Chen, Yuan Quan:

Utilization of Urban Form Information for Extracting Commuting Travel Carbon Emission on Urban Road Network. 895 - Chandan Tilak Bhunia, Abhinandan Bhunia:

Packet Reversed Packet Combining Scheme: A Thorough Analysis. 896 - Ralph DeFrangesco:

Biological Cells as Storage Devices. 897-898

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.


Google
Google Scholar
Semantic Scholar
Internet Archive Scholar
CiteSeerX
ORCID














