|
|
|
Comparison between PKI (RSA-AES) and AEAD (AES-EAX PSK) Cryptography Systems for Use in SMS-Based Secure Transmission |
|
|
1 | (12) |
|
|
|
Authentication and Authorization in Web Services |
|
|
13 | (11) |
|
|
|
|
Integrating Access Control Mechanism with EXEL Labeling Scheme for XML Document Updating |
|
|
24 | (13) |
|
|
|
|
|
An Access Control Model for Supporting XML Document Updating |
|
|
37 | (10) |
|
|
|
|
|
|
A Secure Proxy Blind Signature Scheme Using ECC |
|
|
47 | (6) |
|
|
|
|
Accelerated Particle Swarm Optimization and Support Vector Machine for Business Optimization and Applications |
|
|
53 | (14) |
|
|
|
|
|
|
A Study on the Reliability of Data Transmission of an over the Top Network Protocol on SMS versus UDP/GPRS (Fragmented) |
|
|
67 | (15) |
|
|
|
|
QuickFlood: An Efficient Search Algorithm for Unstructured Peer-to-Peer Networks |
|
|
82 | (11) |
|
|
|
|
Improved-XY: A High Performance Wormhole-Switched Routing Algorithm for Irregular 2-D Mesh NoC |
|
|
93 | (12) |
|
|
|
|
XRD Metadata to Make Digital Identity Less Visible and Foster Trusted Collaborations across Networked Computing Ecosystems |
|
|
105 | (15) |
|
|
|
An Overview of Performance Comparison of Different TCP Variants in IP and MPLS Networks |
|
|
120 | (8) |
|
|
|
|
Routing in Mobile Ad-Hoc Networks as a Reinforcement Learning Task |
|
|
128 | (8) |
|
|
|
|
|
Identifying Usability Issues in Personal Calendar Tools |
|
|
136 | (11) |
|
|
Adaptive Query Processing for Semantic Interoperable Information Systems |
|
|
147 | (17) |
|
|
|
|
Statistical Character-Based Syntax Similarity Measurement for Detecting Biomedical Syntax Variations through Named Entity Recognition |
|
|
164 | (15) |
|
|
|
|
Correction of Invalid XML Documents with Respect to Single Type Tree Grammars |
|
|
179 | (16) |
|
|
|
Identification of Scholarly Papers and Authors |
|
|
195 | (8) |
|
|
|
|
A Social Network Model for Academic Collaboration |
|
|
203 | (9) |
|
|
Performance Evaluation of Preference Evaluation Techniques |
|
|
212 | (12) |
|
|
|
|
|
|
Collective Action Theory Meets the Blogosphere: A New Methodology |
|
|
224 | (16) |
|
|
|
|
|
|
Evaluating K-Best Site Query on Spatial Objects |
|
|
240 | (11) |
|
|
|
Performance of Annotation-Based Image Retrieval |
|
|
251 | (18) |
|
|
|
|
Multimedia Streams Retrieval in Distributed Systems Using Learning Automata |
|
|
269 | (11) |
|
|
|
Real-Time Detection of Parked Vehicles from Multiple Image Streams |
|
|
280 | (12) |
|
|
|
E Learning and E Government |
|
|
|
An Adaptive Framework for Personalized E-Learning |
|
|
292 | (15) |
|
|
|
Gov 2.0 and Beyond: Using Social Media for Transparency, Participation and Collaboration |
|
|
307 | (12) |
|
|
|
|
MATAWS: A Multimodal Approach for Automatic WS Semantic Annotation |
|
|
319 | (15) |
|
|
|
|
|
Meshing Semantic Web and Web2.0 Technologies to Construct Profiles: Case Study of Academia Europea Members |
|
|
334 | (11) |
|
|
|
Towards Ontology-Based Collaboration Framework Based on Messaging System |
|
|
345 | (12) |
|
|
A QoS and Consumer Personality Considered Services Discovery |
|
|
357 | (7) |
|
|
|
|
User Centric Homogeneity-Based Clustering Approach for Intelligence Computation |
|
|
364 | (9) |
|
|
|
|
|
|
Mining Temporal Association Rules with Incremental Standing for Segment Progressive Filter |
|
|
373 | (10) |
|
|
|
|
|
Multi-way Association Clustering Analysis on Adaptive Real-Time Multicast Data |
|
|
383 | (12) |
|
|
|
|
|
Multi Level Mining of Warehouse Schema |
|
|
395 | (14) |
|
|
|
On Inserting Bulk Data for Linear Hash Files |
|
|
409 | (14) |
|
|
|
|
|
Cloud Data Storage with Group Collaboration Supports |
|
|
423 | (9) |
|
|
A Negotiation Mechanism That Facilitates the Price-Timeslot-QoS Negotiation for Establishing SLAs of Cloud Service Reservation |
|
|
432 | (15) |
|
|
Author Index |
|
447 | |