Content of Issue 1
DOI: 10.3217/jucs-018-01
|
Outcomes of International Research Projects on Technology Applied to Education |
F.J. García-Peñalvo, R. Colomo-Palacios, M.D. Lytras |
1 |
Exploiting Semantics for Constructing and Comparing Occupational and Educational-driven Qualifications: the TIPTOE Project |
V. Gatteschi, F. Lamberti, C. Demartini, R. van Wezel, S. Bettiol |
5 |
CC-LO: Embedding Interactivity, Challenge and Empowerment into Collaborative Learning Sessions |
S. Caballe, D. Ganan, I. Dunwell, A. Pierri, T. Daradoumis |
25 |
Educational Innovation with Learning Networks: Tools and Developments |
P.B. Sloep, A.J. Berlanga, W. Greller, S. Stoyanov, M. van der Klink, S. Retalis, J. Hensgens |
44 |
Accessible Lifelong Learning at Higher Education: Outcomes and Lessons Learned at two Different Pilot Sites in the EU4ALL Project |
J.G. Boticario, A. Rodriguez-Ascaso, O.C. Santos, E. Raffenne, L. Montandon, D. Roldán, F. Buendía |
62 |
PLAYER - a European Project and a Game to Foster Entrepreneurship Education for Young People |
B. Fonseca, Â. Pereira, R. Sanders, V. Barracho, U. Lapajne, M. Rus, M. Rahe, A. Mostert, T. Klein, V. Bojovic, S. Bošnjak, L. Morgado, Z. Bošnjak, J. Carvalho, I. Duarte, A. Casaramona, A. Soraci, H. Paredes, P. Martins, R. Gonçalves, P. Neves, R. Rodrigues Nunes, J. Lima, J. Varajão |
86 |
Clustering Projects for eLearning Interoperability |
M. Alier, E. Mayol, M.J. Casañ, J. Piguillem, J.W. Merriman, M.Á. Conde, F.J. García-Peñalvo, W. Tebben, C. Severance |
106 |
OER Development and Promotion. Outcomes of an International Research Projecton the OpenCourseWare Model |
E. Tovar, N. Piedra, J. Chicaiza, J. Lopez, O. Martinez-Bonastre |
123 |
Content of Issue 2
DOI: 10.3217/jucs-018-02
|
Managing Editor's Column |
C. Gütl |
142 |
Supporting End-User Development through a New Composition Model: An Empirical Study |
D. Lizcano, F. Alonso, J. Soriano, G. López |
143 |
Generic Temporal and Fuzzy Ontological Framework (GTFOF) for Developing Temporal-Fuzzy Database Model for Managing Patient's Data |
N. Mahmood, S.M.A. Burney, K. Ahsan |
177 |
MaF: An Ontology Matching Framework |
J. Martinez-Gil, I. Navas-Delgado, J.F. Aldana-Montes |
194 |
Performance Evaluation of Recent Windows Operating Systems |
G. Martinovic, J. Balen, B. Cukic |
218 |
Reconfigurable VBSME Architecture Using RBSAD |
J. Olivares |
264 |
RESTifying a Legacy Semantic Search System: Experience and Lessons Learned |
G. Vega-Gorgojo, E. Gómez-Sánchez, M.L. Bote-Lorenzo, J.I. Asensio-Pérez |
286 |
Content of Issue 3
DOI: 10.3217/jucs-018-03
|
Rethinking Education in the Knowledge Society |
L. Cantoni, I. Rega |
312 |
Computer Generated Voice-Over in a Medical E-Learning Application: The Impact on Factual Learning Outcome |
S. Minder, M. Notari, F. Schmitz, R. Hofer, U. Woermann |
314 |
Co-Designing Collaborative Smart Classroom Curriculum for Secondary School Science |
M. Tissenbaum, M. Lui, J.D. Slotta |
327 |
Boys are like Girls: Insights in the Gender Digital Divide in Higher Education in Switzerland and Europe |
L. Botturi, C. Bramani, S. McCusker |
353 |
University Students and Social Media: Reflections from an Empirical Research |
P. Ferri, A. Pozzali |
377 |
Pedagogical Design of an eTandem Chinese-French Writing Course |
J. Wang, C. Berger, N. Szilas |
393 |
Measuring Primary Schools Teachers' Perception of ICT through Self-Efficacy: A Case Study |
I. Rega, F. Fanni |
410 |
AT-HOME 2.0 - An Educational Framework for Home-based Healthcare |
I. van Zyl, R. de la Harpe |
429 |
Content of Issue 4
DOI: 10.3217/jucs-018-04
|
Advances on Social Network Applications |
J.J. Jung, P. Kazienko |
454 |
Fuzziness and Overlapping Communities in Large-Scale Networks |
Q. Wang, E. Fleury |
457 |
Uncovering the Social Dynamics of Online Elections |
J.B. Lee, G. Cabunducan, F.G.C. Cabarle, R. Castillo, J.A. Malinao |
487 |
The Unification and Assessment of Multi-Objective Clustering Results of Categorical Datasets with H-Confidence Metric |
O.C. Sert, K. Dursun, T. Özyer, J. Jida, R. Alhajj |
507 |
Social Network Based Reputation Computation and Document Classification |
J.Y. Lee, Y. Duan, J.C. Oh, W. Du, H. Blair, L. Wang, X. Jin |
532 |
Understanding Microblog Users for Social Recommendation Based on Social Networks Analysis |
I.-H. Ting, P.S. Chang, S.-L. Wang |
554 |
Key Person Analysis in Social Communities within the Blogosphere |
A. Zygmunt, P. Bródka, P. Kazienko, J. Koźlak |
577 |
Content of Issue 5
DOI: 10.3217/jucs-018-05
|
Managing Editor's Column |
C. Gütl |
598 |
Decision Strategies for a P2P Computing System |
G. Chmaj, K. Walkowiak |
599 |
Improving the Extraction of Text in PDFs by Simulating the Human Reading Order |
I. Hasan, J. Parapar, Á. Barreiro |
623 |
Wikipedia-Based Semantic Interpreter Using Approximate Top-k Processing and Its Application |
J.W. Kim, A. Kashyap, S. Bhamidipati |
650 |
Modeling and Performance Evaluation of a Contract-based Electronic Signature Process |
A. Nait-Sidi-Moh, M. Bakhouya, W. Ait-Cheik-Bihi, J. Gaber |
676 |
Applying a Modular Framework to Develop Mobile Applications and Services |
M. Vazquez-Briseno, P. Vincent, J.I. Nieto-Hipolito, J. de Dios Sanchez-Lopez |
704 |
Content of Issue 6
DOI: 10.3217/jucs-018-06
|
Security in Information Systems: New Challenges and Opportunities |
D.G. Rosado, L.E. Sánchez, E. Fernández-Medina, J. Jürjens |
728 |
Success Rate of Remote Code Execution Attacks - Expert Assessments and Observations |
H. Holm, T. Sommestad, U. Franke, M. Ekstedt |
732 |
Combating Mobile Spam through Botnet Detection using Artificial Immune Systems |
I. Vural, H.S. Venter |
750 |
Qos-Security Metrics Based on ITIL and COBIT Standard for Measurement Web Services |
P. Charuenporn, S. Intakosum |
775 |
A Systematic Review of Information Security Governance Frameworks in the Cloud Computing Environment |
O. Rebollo, D. Mellado, E. Fernández-Medina |
798 |
Syntactic and Semantic Extensions to Secure Tropos to Support Security Risk Management |
R. Matulevičius, H. Mouratidis, N. Mayer, E. Dubois, P. Heymans |
816 |
A Framework for the Comparison of Best Practice Recommendations and Legal Requirements for South African Banks |
C.-L. Botha, E. Kritzinger, M. Loock |
845 |
Countermeasures to Prevent Misbehaviour in VANETs |
J. Molina-Gil, P. Caballero-Gil, C. Caballero-Gil |
857 |
Adaptive Group Key Management Protocol for Wireless Communications |
S. Gharout, A. Bouabdallah, Y. Challal, M. Achemlal |
874 |
Content of Issue 7
DOI: 10.3217/jucs-018-07
|
Adaptive Methodologies and Designs for Network-on-Chip based Systems |
N. Nedjah, L. de Macedo Mourelle |
899 |
Mapping and Scheduling in Heterogeneous NoC through Population-Based Incremental Learning |
F. Bolanos, J.E. Aedo, F. Rivera, N. Bagherzadeh |
901 |
ACO-based Algorithms for Search and Optimization of Routes in NoC Platform |
L. Silva Junior, N. Nedjah, L. de Macedo Mourelle |
917 |
Designing Robust Routing Algorithms and Mapping Cores in Networks-on-Chip: A Multi-objective Evolutionary-based Approach |
M. Palesi, R. Tornero, J.M. Orduñna, V. Catania, D. Panno |
937 |
Content of Issue 8
DOI: 10.3217/jucs-018-08
|
Understanding Online Social Networking Services |
J.J. Jung, P. Kazienko |
970 |
Discovering Consumer Insight from Twitter via Sentiment Analysis |
W. Chamlertwat, P. Bhattarakosol, T. Rungkasiri, C. Haruechaiyasak |
973 |
Establishing Knowledge Networks via Analysis of Research Abstracts |
M.G. Suryanarayanan, D.S. Sam, S. Selvaraju |
993 |
Beating Social Pulse: Understanding Information Propagation via Online Social Tagging Systems |
X.H. Pham, J.J. Jung, D. Hwang |
1022 |
Automatic Tag Attachment Scheme based on Text Clustering for Efficient File Search in Unstructured Peer-to-Peer File Sharing Systems |
T.T. Qin, S. Fujita |
1032 |
Modeling, Mining and Analysis of Multi-Relational Scientific Social Network |
V. Ströele, G. Zimbrão, J.M. Souza |
1048 |
Content of Issue 9
DOI: 10.3217/jucs-018-09
|
Internet of Things |
D. Zhang, H. Ning, K. Xu, F. Lin, L. Yang |
1069 |
A Metropolitan Taxi Mobility Model from Real GPS Traces |
H. Huang, D. Zhang, Y. Zhu, M. Li, M.-Y. Wu |
1072 |
Context-based Ontology Matching: Concept and Application Cases |
F. Lin, K. Sandkuhl, S. Xu |
1093 |
Directed Path Based Authentication Scheme for the Internet of Things |
H. Ning, H. Liu, Q. Liu, G. Ji |
1112 |
Goal-Driven Process Navigation for Individualized Learning Activities in Ubiquitous Networking and IoT Environments |
J. Chen, Q. Jin, R. Huang |
1132 |
Localized Processing and Analysis of Accelerometer Data in Detecting Traffic Events and Driver Behaviour |
B. Predic, D. Stojanovic |
1152 |
Low Complexity H.264/AVC Intraframe Coding for Wireless Multimedia Sensor Network |
X. Liu, J. Liu, K.-Y. Yoo, H. Cho |
1177 |
Network Planning for WiMAX-R Networks |
Q. Liu, M. Chen, J. Zhang, B. Shen, Z. Chu |
1194 |
Security-enhanced Search Engine Design in Internet of Things |
X. Qian, X. Che |
1218 |
Content of Issue 10
DOI: 10.3217/jucs-018-10
|
Managing Editor's Column |
C. Gütl |
1236 |
The Method of Logistic Optimization in E-commerce |
R. Bucki, P. Suchanek |
1238 |
Web-based Environment for Learning Discrete Event Simulation |
M. Despotović-Zrakić, D. Barać, Z. Bogdanović, B. Jovanić, B. Radenković |
1259 |
Automating the Analysis of Problem-solving Activities in Learning Environments: the Co-Lab Case Study |
R. Duque, L. Bollen, A. Anjewierden, C. Bravo |
1279 |
Usability Evaluation Methods for a Scientific Internet Information Portal |
J. Hellmers, J. Thomaschewski, E.-M. Holt, T. Wriedt |
1308 |
Product Presentation Strategy for Online Customers |
M. Jovic, D. Milutinovic, A. Kos, S. Tomazic |
1323 |
A General Qualitative Spatio-Temporal Model Based on Intervals |
E. Martínez-Martín, M.T. Escrig, A.P. del Pobil |
1343 |
BDI Agent Architecture for Multi-Strategy Selection in Automated Negotiation |
C. Mukun, M.Y. Kiang |
1379 |
Content of Issue 11
DOI: 10.3217/jucs-018-11
|
Some Reflections about Service Oriented Architectures, Cloud Computing Applications, Services and Interoperability |
F.J. García-Peñalvo, M. Alier Forment, M.D. Lytras |
1405 |
A Simple Model Based on Web Services to Exchange Context Information between Web Browsers and Web Applications |
J. Pascual Espada, O. Sanjuán Martínez, B.C. Pelayo G-Bustelo, J.M. Cueva Lovelle, P. Ordóñez de Pablos |
1410 |
The Wookie Widget Server: a Case Study of Piecemeal Integration of Tools and Services |
D. Griffiths, M. Johnson, K. Popat, P. Sharples, S. Wilson |
1432 |
Orchestration of E-Learning Services for Automatic Evaluation of Programming Exercises |
R. Queirós, J.P. Leal |
1454 |
Docs4Learning: Getting Google Docs to work within the LMS with IMS BLTI |
M. Alier Forment, M.J. Casany, E. Mayol, J. Piguillem, N. Galanis, F.J. García-Peñalvo, M.Á. Conde |
1483 |
Design Choices Underlying the Software as a Service (SaaS) Business Model from the User Perspective: Exploring the Fourth Wave of Outsourcing |
A. Joha, M. Janssen |
1501 |
Utilization-level and Serviceability of a Social Name-card Portal for QoS in a Cloud Social Networking Service |
Y.B. Kim |
1523 |
Human and Intellectual Capital Management in the Cloud: Software Vendor Perspective |
R. Colomo-Palacios, E. Fernandes, M. Sabbagh, A. de Amescua Seco |
1544 |
Interoperability Framework for Multimodal Biometry: Open Source in Action |
M. Milovanović, M. Minović, S. Dušan |
1558 |
Towards a Practical Solution for Data Grounding in a Semantic Web Services Environment |
M. García Rodríguez, J.M. Alvarez Rodríguez, D. Berrueta Muñoz, L. Polo Paredes, J.E. Labra Gayo, P. Ordóñez de Pablos |
1576 |
Content of Issue 12
DOI: 10.3217/jucs-018-12
|
An Overview of Current Information Systems Security Challenges and Innovations |
D. Mellado, D.G. Rosado |
1598 |
Aligning Security and Privacy to Support the Development of Secure Information Systems |
H. Mouratidis, C. Kalloniatis, S. Islam, M.-P. Huget, S. Gritzalis |
1608 |
Information Security Service Culture - Information Security for End-users |
R. Rastogi, R. von Solms |
1628 |
A Novel Identity-based Network Architecture for Next Generation Internet |
P. Martinez-Julia, A.F. Gómez-Skarmeta |
1643 |
Analysing the Security Risks of Cloud Adoption Using the SeCA Model: A Case Study |
T. Baars, M. Spruit |
1662 |
Risk-Driven Security Metrics in Agile Software Development - An Industrial Pilot Study |
R.M. Savola, C. Frühwirth, A. Pietikäinen |
1679 |
HC+: Towards a Framework for Improving Processes in Health Organizations by Means of Security and Data Quality Management |
I. Caballero, L.E. Sánchez, A. Freitas, E. Fernández-Medina |
1703 |
The Modelling of a Digital Forensic Readiness Approach for Wireless Local Area Networks |
S. Ngobeni, H. Venter, I. Burke |
1721 |
New Results of Related-key Attacks on All Py-Family of Stream Ciphers |
L. Ding, J. Guan, W.-l. Sun |
1741 |
Content of Issue 13
DOI: 10.3217/jucs-018-13
|
Recent Advances in Bio-Inspired Computing: Theory and Applications |
A.K. Nagar, T. Robinson |
1757 |
A Variant of Distributed P Systems for Real Time Cross Layer Optimization |
S. Elias, V. Gokul, K. Krithivasan, M. Gheorghe, G. Zhang |
1760 |
P Systems with Shuffle Operation and Catalytic-Like Rules |
Y. Niu, J. Xu, K. Subramanian, R. Abdullah |
1782 |
Array P System with Shuffle on Trajectories |
A.P. Venkatesan, D. Thomas, T. Robinson, A.K. Nagar |
1802 |
A Novel Membrane Algorithm Based on Particle Swarm Optimization for Solving Broadcasting Problems |
G. Zhang, F. Zhou, X. Huang, J. Cheng, M. Gheorghe, F. Ipate, R. Lefticaru |
1821 |
Solving Economic Dispatch Problems with Valve-point Effects using Particle Swarm Optimization |
K. Deep, J.C. Bansal |
1842 |
Two Local Search Strategies for Differential Evolution |
M. Ali, M. Pant, A.K. Nagar, C.W. Ahn |
1853 |
Real-time Implementation of a Class of Optimised Multirate Quadrature Mirror Filter Bank Using Genetic Algorithms |
G. Singh Baicher |
1871 |
Assessing Alpha Band Event-related Synchronisation/Desynchronisation Using a Bio-Inspired Computational Model |
B. Sen Bhattacharya, D. Coyle, L.P. Maguire |
1888 |
Content of Issue 14
DOI: 10.3217/jucs-018-14
|
Managing Editor's Column |
C. Gütl |
1905 |
A Hybrid Metaheuristic Strategy for Covering with Wireless Devices |
A.L. Bajuelos, S. Canales, G. Hernández, M. Martins |
1906 |
An Exploratory Study of Game-based M-learning for Software Project Management |
A.Y. Chua, R.S. Balkunje |
1933 |
Behavioral and Temporal Pattern Detection within Financial Data with Hidden Information |
D. Drusinsky |
1950 |
Multilevel Steganography: Improving Hidden Communication in Networks |
W. Frączek, W. Mazurczyk, K. Szczypiorski |
1967 |
Optimized On-Chip-Pipelining for Memory-Intensive Computations on Multi-Core Processors with Explicit Memory Hierarchy |
J. Keller, C.W. Kessler, R. Hultén |
1987 |
Controlled Pure Grammar Systems |
A. Meduna, P. Zemek |
2024 |
Software Cost Modelling and Estimation Using Artificial Neural Networks Enhanced by Input Sensitivity Analysis |
E. Papatheocharous, A.S. Andreou |
2041 |
Modeling the Value of End-to-End Multipath Protocols |
H. Suomi, K. Kilkki, H. Hämmäinen |
2071 |
Content of Issue 15
DOI: 10.3217/jucs-018-15
|
Technology for Learning across Physical and Virtual Spaces |
C. Delgado Kloos, D. Hernández-Leo, J.I. Asensio-Pérez |
2093 |
Design-Oriented Pedagogy for Technology-Enhanced Learning to Cross Over the Borders between Formal and Informal Environments |
H. Vartiainen, A. Liljeström, J. Enkenberg |
2097 |
A Review of Mobile Location-based Games for Learning across Physical and Virtual Spaces |
N. Avouris, N. Yiannoutsou |
2120 |
ARLearn: Augmented Reality Meets Augmented Virtuality |
S. Ternier, R. Klemke, M. Kalz, P. van Ulzen, M. Specht |
2143 |
SOS: Orchestrating Collaborative Activities across Digital and Physical Spaces Using Wearable Signaling Devices |
D. Hernández-Leo, R. Nieves, E. Arroyo, A. Rosales, J. Melero, J. Blat |
2165 |
Architecture for Collaborative Learning Activities in Hybrid Learning Environments |
M.B. Ibáñez, D. Maroto, J.J. García Rueda, D. Leony, C. Delgado Kloos |
2187 |
Content of Issue 16
DOI: 10.3217/jucs-018-16
|
Managing Editor's Column |
C. Gütl |
2203 |
Constructor-based Logics |
D. Găină, K. Futatsugi, K. Ogata |
2204 |
Enriching Ontology Concepts Based on Texts from WWW and Corpus |
T.F. Gharib, N. Badr, S. Haridy, A. Abraham |
2234 |
The Educational Affordances of Widgets and Application Stores |
D. Griffiths, M.W. Johnson, K. Popat, P. Sharples, S. Wilson |
2252 |
Digital Learning Resources in Higher Education: Designing for Large-scale Use |
R.J. Hartog, A.J. Beulens, J. Tramper |
2274 |
Weaving Scholarly Legacy Data into Web of Data |
A. Latif, M.T. Afzal, H. Maurer |
2301 |
Learning to Classify Neutral Examples from Positive and Negative Opinions |
M.-T. Martín-Valdivia, A. Montejo-Ráez, A. Ureña-López, M.R. Saleh |
2319 |
A Review of Constructivist Learning Methods with Supporting Tooling in ICT Higher Education: Defining Different Types of Scaffolding |
J. Melero, D. Hernández-Leo, J. Blat |
2334 |
Content of Issue 17
DOI: 10.3217/jucs-018-17
|
Conceptual Modelling of Services |
H. Ma, K.-D. Schewe, B. Thalheim, Q. Wang |
2361 |
Towards Model-Driven Engineering Support for Service Evolution |
J.M. Vara, V. Andrikopoulos, M.P. Papazoglou, E. Marcos |
2364 |
Behavior Alignment and Control Flow Verification of Process and Service Choreographies |
J. Roa, P. Villarreal, O. Chiotti |
2383 |
A Metadirectory of Web Components for Mashup Composition |
J.I. Fernández-Villamor, C.Á. Iglesias, M. Garijo |
2407 |
A Formal Approach for Risk Assessment in RBAC Systems |
J. Ma |
2432 |
A Conceptual Model for IT Service Systems |
A. Dahanayake, B. Thalheim |
2452 |
Service-Oriented Development of Web Information Systems |
V. de Castro, J.M. Vara, E. Marcos |
2474 |
A Conceptual Ontology-based Resource Meta-Model towards Business-driven Information System Implementation |
H. Cai, B. Xu, F. Bu |
2493 |
Content of Issue 18
DOI: 10.3217/jucs-018-18
|
Trends in Immersive Education Research |
C. Delgado Kloos, C. Gütl, F. Kappe |
2514 |
A Proposal to Create Learning Environments in Virtual Worlds Integrating Advanced Educative Resources |
D. Griol, J.M. Molina, A.S. de Miguel, Z. Callejas |
2516 |
The ShanghAI Lectures: A Global Education Project on Artificial Intelligence |
N. Labhart, B.S. Hasler, A. Zbinden, A. Schmeil |
2542 |
Creating Test Questions for 3D Collaborative Virtual Worlds: the WorldOfQuestions Authoring Environment |
M.B. Ibáñez, J.J. Garcia Rueda, D. Morillo, C. Delgado Kloos |
2556 |
MareMonstrum: a Contribution to Empirical Research about How the Use of MUVEs May Improve Students' Motivation |
P. Sancho, J. Torrente, B. Fernández-Manjón |
2576 |
Content of Issue 19
DOI: 10.3217/jucs-018-19
|
Distributed Development of Information System |
A. Mishra, J. Münch, D. Mishra |
2599 |
Obtaining Requirements for Designing a Tool to Support Distributed Development |
J.L. Hernández, A. Vizcaíno, I. Caballero, G. Aranda |
2602 |
Division of Effort, Productivity, Quality, and Relationships in FLOSS Virtual Teams: Evidence from the FreeBSD Project |
G.M. Giaglis, D. Spinellis |
2625 |
A Study of the Impact of Global Software Development in Packaged Software Release Planning |
R. Colomo-Palacios, P. Soto-Acosta, F.J. García-Peñalvo, Á. García-Crespo |
2646 |
Metamodeling the Structure and Interaction Behavior of Cooperative Component-based User Interfaces |
L. Iribarne, N. Padilla, J. Criado, C. Vicente-Chicote |
2669 |
An Integrated Approach of Software Development and Test Processes to Distributed Teams |
G.C. Lapasini Leal, A.P. Chaves, E.H.M. Huzita, M.E. Delamaro |
2686 |
Knowledge Management Initiatives in Offshore Software Development: Vendors' Perspectives |
A. Mathrani, D. Parsons, S. Mathrani |
2706 |
A Global Software Inspection Process for Distributed Software Development |
D. Mishra, A. Mishra |
2731 |
Content of Issue 20
DOI: 10.3217/jucs-018-20
|
Managing Editor's Column |
C. Gütl |
2747 |
The Forum for Negative Results (FNR) Guest Editorial |
L. Prechelt |
2748 |
Computational Analysis of Medieval Manuscripts: A New Tool for Analysis and Mapping of Medieval Documents to Modern Orthography |
M. Ahmad, S. Gruner, M.T. Afzal |
2750 |
Distributed Load Balancing Algorithms for Heterogeneous Players in Asynchronous Networks |
L.F. Bittencourt, F.K. Miyazawa, A.L. Vignatti |
2771 |
Crossing the Undecidability Border with Extensions of Propositional Neighborhood Logic over Natural Numbers |
D. Della Monica, V. Goranko, A. Montanari, G. Sciavicco |
2798 |
Non-Marker based Mobile Augmented Reality and its Applications using Object Recognition |
D. Kim, D. Hwang |
2832 |
Points-to Analysis: A Fine-Grained Evaluation |
J. Lundberg, W. Lowe |
2851 |
The Contrapositive of Countable Choice for Inhabited Sets of Naturals |
I. Petrakis |
2879 |
Ontology-based Approach to Competence Profile Management |
V. Tarasov |
2893 |
Engineering Security into Distributed Systems: A Survey of Methodologies |
A.V. Uzunov, E.B. Fernandez, K. Falkner |
2920 |
|