Information and Data Management |
A New Approach for Fingerprint Matching Using Logic Synthesis / Fatih Basçiftçi ; Celal Karaca |
Extracting Fuzzy Rules to Classify Motor Imagery Based on a Neural Network with Weighted Fuzzy Membership Functions / Sang-Hong Lee ; Joon S. Lim ; Dong-Kun Shin |
Distributed Data-Mining in the LISp-Miner System Using Techila Grid / Milan Simunek ; Teppo Tammisto |
Non-negative Matrix Factorization on GPU / Jan Platoš ; Petr Gajdoš ; Pavel Krömer ; Václav Snášsel |
Chatbot Enhanced Algorithms: A Case Study on Implementation in Bahasa Malaysia Human Language / Abbas Saliimi Lokman ; Jasni Mohamad Zain |
Handwritten Digits Recognition Based on Swarm Optimization Methods / Salima Nebti ; Abdellah Boukerram |
A Framework of Dashboard System for Higher Education Using Graph-Based Visualization Technique / Wan Maseri Binti Wan Mohd ; Abdullah Embong ; Jasni Mohd Zain |
An Efficient Indexing and Compressing Scheme for XML Query Processing / I-En Liao ; Wen-Chiao Hsu ; Yu-Lin Chen |
Development of a New Compression Scheme / Eyas El-Qawasmeh ; Ahmed Mansour ; Mohammad Al-Towiq |
Compression of Layered Documents / Bruno Carpentieri |
Classifier Hypothesis Generation Using Visual Analysis Methods / Christin Seifert ; Vedran Sabol ; Michael Granitzer |
Exploiting Punctuations along with Sliding Windows to Optimize Stream Data Manager / Lokesh Tiwari ; Hamid Shahnasser |
A Framework for In-House Prediction Markets / Miguel Velacso ; Nenad Jukic |
Road Region Extraction Based on Motion Information and Seeded Region Growing for Foreground Detection / Hongwu Qin ; Xiuqin Ma ; Tao Hai |
Process Mining Approach to Promote Business Intelligence in Iranian Detectives' Police / Mehdi Ghazanfari ; Mohammad Fathian ; Mostafa Jafari ; Saeed Rouhani |
Copyright Protection of Relational Database Systems / Ali Al-Haj ; Ashraf Odeh ; Shadi Masadeh |
Resolving Semantic Interoperability Challenges in XML Schema Matching / Chiw Yi Lee ; Hamidah Ibrahim ; Mohamed Othman ; Razali Yaakob |
Some Results in Bipolar-Valued Fuzzy BCK/BCI-Algebras / A. Borumand Saeid ; M. Kuchaki Rafsanjani |
Security |
The Effect of Attentiveness on Information Security / Adeeb M. Alhomoud |
A Secured Mobile Payment Model for Developing Markets / Bossi Masamila ; Fredrick Mtenzi ; Jafari Said ; Rose Tinabo |
Security Mapping to Enhance Matching Fine-Grained Security Policies / Monia Ben Brahim ; Maher Ben Jemaa ; Mohamed Jmaiel |
Implementation and Evaluation of Fast Parallel Packet Filters on a Cell Processor / Yoshiyuki Yamashita ; Masato Tsuru |
On the Algebraic Expression of the AES S-Box Like S-Boxes / M. Tolga Sakalli ; Bora Aslan ; Ercan Bulus ; Andac Sahin Mesut ; Fatma Büyüksaraçoglu ; Osman Karaahmetoglu |
Student's Polls for Teaching Quality Evaluation as an Electronic Voting System / Marcin Kucharczyk |
An Improved Estimation of the RSA Quantum Breaking Success Rate / Piotr Zawadzki |
Mining Bluetooth Attacks in Smart Phones / Seyed Morteza Babamir ; Reyhane Nowrouzi ; Hadi Naseri |
Users' Acceptance of Secure Biometrics Authentication System: Reliability and Validate of an Extended UTAUT Model / Fahad AL-Harby ; Rami Qahwaji ; Mumtaz Kamala |
Two Dimensional Labelled Security Model with Partially Trusted Subjects and Its Enforcement Using SELinux DTE Mechanism / Jaroslav Janácek |
A Roaming-Based Anonymous Authentication Scheme in Multi-domains Vehicular Networks / Chih-Hung Wang ; Po-Chin Lee |
Human Authentication Using FingerIris Algorithm Based on Statistical Approach / Ahmed B. Elmadani |
Aerial Threat Perception Architecture Using Data Mining / M. Anwar-ul-Hag ; Asad Waqar Malik ; Shoab A. Khan |
Payload Encoding for Secure Extraction Process in Multiple Frequency Domain Steganography / Raoof Smko ; Abdelsalam Almarimi ; K. Negrat |
An Implementation of Digital Image Watermarking Based on Particle Swarm Optimization / Hai Tao ; Ahmed N. Abd Alla ; Qin Hongwu |
Genetic Cryptanalysis / Abdelwadood Mesleh ; Bilal Zahran ; Anwar Al-Abadi ; Samer Hamed ; Nawal Al-Zabin ; Heba Bargouthi ; Iman Maharmeh |
Multiple Layer Reversible Images Watermarking Using Enhancement of Difference Expansion Techniques / Shahidan M. Abdullah ; Azizah A. Manaf |
Modeling and Analysis of Reconfigurable Systems Using Flexible Nets / Laid Kahloul ; Allaoua Chaoui ; Karim Djouani |
Using Privilege Chain for Access Control and Trustiness of Resources in Cloud Computing / Jong P. Yoon ; Z. Chen |
Social Networks |
Modeling of Trust to Provide Users Assisted Secure Actions in Online Communities / Lenuta Alboaie ; Mircea-F. Vaida |
A Collaborative Social Decision Model for Digital Content Credibility Improvement / Yuan-Chu Hwang |
Improving Similarity-Based Methods for Information Propagation on Social Networks / Francesco Buccafurri ; Gianluca Lax |
Approaches to Privacy Protection in Location-Based Services / Anna Rohunen ; Jouni Markkula |
Social Media as Means for Company Communication and Service Design / Elina Annanperä |
A Problem-Centered Collaborative Tutoring System for Teachers Lifelong Learning: Knowledge Sharing to Solve Practical Professional Problems / Thierry Condamines |
Bridging the Gap between Web 2.0 Technologies and Social Computing Principles / Giorgos Kormaris ; Marco Spruit |
Ontology |
Using Similarity Values for Ontology Matching in the Grid / Axel Tenschert |
Rapid Creation and Deployment of Communities of Interest Using the CMap Ontology Editor and the KAoS Policy Services Framework / Andrzej Uszok ; Jeffrey M. Bradshaw ; Tom Eskridge ; James Hanna |
Incorporating Semantics into an Intelligent Clothes Search System Using Ontology / Ching-I Cheng ; Damon Shing-Min Liu ; Li-Ting Chen |
SPPODL: Semantic Peer Profile Based on Ontology and Description Logic / Younes Djaghloul ; Zizette Boufaida |
Ontology Based Tracking and Propagation of Provenance Metadata / Miroslav Vacura ; Vojtech Svátek |
Real Time Biometric Solutions for Networked Society |
A Real-Time In-Air Signature Biometric Technique Using a Mobile Device Embedding an Accelerometer / J. Guerra Casanova ; C. Sánchez Ãvila ; A. de Santos Sierra ; G. Bailador del Pozo ; V. Jara Vera |
On-Demand Biometric Authentication of Computer Users Using Brain Waves / Isao Nakanishi ; Chisei Miyamoto |
Encrypting Fingerprint Minutiae Templates by Random Quantization / Bian Yang ; Davrondzhon Gafurov ; Christoph Busch ; Patrick Bours |
Web Applications |
Method for Countering Social Bookmarking Pollution using User Similarities / Takahiro Hatanaka ; Hiroyuki Hisamatsu |
A Human Readable Platform Independent Domain Specific Language for WSDL / Balazs Simon ; Balazs Goldschmidt |
A Human Readable Platform Independent Domain Specific Language for BPEL / Karoly Kondorosi |
Impact of the Multimedia Traffic Sources in a Network Node Using FIFO scheduler / Tatiana Annoni Pazeto ; Renato Moraes Silva ; Shusaburo Motoyama |
Assessing the LCC Websites Quality / Saleh Alwahaishi ; Václav Snášel |
Expediency Heuristic in University Conference Webpage / Roslina Mohd Sidek ; Noraziah Ahmad ; Mohamad Fadel Jamil Klaib ; Mohd Helmy Abd Wahab |
Author Index |
Information and Data Management |
A New Approach for Fingerprint Matching Using Logic Synthesis / Fatih Basçiftçi ; Celal Karaca |
Extracting Fuzzy Rules to Classify Motor Imagery Based on a Neural Network with Weighted Fuzzy Membership Functions / Sang-Hong Lee ; Joon S. Lim ; Dong-Kun Shin |