Volume 3 (2010)
Issue 1, March 2010
Pages | Title | Author(s) | Papers |
182 - 189 | An Autonomic Ontology-Based Multiagent System for Intrusion Detection in Computing Environments DOI: 10.20533/iji.1742.4712.2010.0019 |
Ryan Ribeiro de Azevedo, Eric Rommel Galvão Dantas, Fred Freitas, Cleyton Rodrigues, Marcelo J. Siqueira C. de Almeida, Wendell Campos Veras, Rubean Santosyi | |
190 - 196 | Integration of Spatial User-Item Relations into Recommender Systems DOI: 10.20533/iji.1742.4712.2010.0020 |
Carsten Stiller, Fred Roß, Christoph Ament | |
197 - 206 | Towards Context-Sensitive Domain of Islamic Knowledge Ontology Extraction DOI: 10.20533/iji.1742.4712.2010.0021 |
Saidah Saad, Naomie Salim, Hakim Zainal | |
207 - 216 | Web-based Architecture for Mobile Learning DOI: 10.20533/iji.1742.4712.2010.0022 |
Mohammed Alzaabi, Jawad Berri, Mohamed Jamal Zemerly | |
217 - 226 | A Review of Designing and Implementing an Embedded System Using Client Server and Web Technology for Monitoring and Controlling of Physical Parameters DOI: 10.20533/iji.1742.4712.2010.0023 |
Siddhartha Baruah, Anjana Kakoty Mahanta, Kanak Ch Sarma | |
227 - 233 | Grid Resource Discovery Based on Centralized and Hierarchical Architectures DOI: 10.20533/iji.1742.4712.2010.0024 |
Deniz Cokuslu, Abdelkader Hameurlain, Kayhan Erciyes |
Issue 2, June 2010
Pages | Title | Author(s) | Papers |
234 - 239 | A Flexible and Secure Web Service Architectural Model Based on PKI and Agent Technology DOI: 10.20533/iji.1742.4712.2010.0025 |
Maher Khemakhem, Wiem Rekik, Jacques Fayolle | |
240 - 248 | Privacy and Recovery in Composite Web Service Transactions DOI: 10.20533/iji.1742.4712.2010.0026 |
Rattikorn Hewett, Phongphun Kijsanayothin | |
249 - 258 | Examining Knowledge Capture for the B2B Domain DOI: 10.20533/iji.1742.4712.2010.0027 |
Moses Niwe, Janis Stirna | |
259 - 269 | An IEEE 802.21-based Approach to Integrate Unidirectional Wireless Technologies into QoS-constrained DOI: 10.20533/iji.1742.4712.2010.0028 |
Mathias Kretschmer, Gheorghita Ghinea | |
270 - 277 | A Biologically-Inspired Type-2 Fuzzy Set Based Algorithm for Detecting Misbehaving Nodes in Ad-Hoc DOI: 10.20533/iji.1742.4712.2010.0029 |
Andrea Visconti, Hooman Tahayori | |
278 - 284 | The German Wireless LAN Security Survey 2009-How Security Measures are used in Companies and DOI: 10.20533/iji.1742.4712.2010.0030 |
D. Fischer, B. Markscheffel |
Issue 3, September 2010
Pages | Title | Author(s) | Papers |
285 - 295 | Multi-Agent Systems in a Computational Environment of Education: A Chatterbot Case Study DOI: 10.20533/iji.1742.4712.2010.0031 |
André F. M. Batista, Maria G. B. Marietto, Gislene C. O. Barbosa, Robson S. França, Emerson A. Noronha | |
296 - 305 | A New Algorithm for Controlling a Buffer with Time-Varying Arrival Rate DOI: 10.20533/iji.1742.4712.2010.0032 |
Rasha Fares, Mike Woodward | |
306 - 313 | ProVerif Analysis of the ZRTP Protocol DOI: 10.20533/iji.1742.4712.2010.0033 |
Riccardo Bresciani, Andrew Butterfield | |
314 - 325 | Machine Learning Approach to Identifying the Dataset Threshold for the Performance Estimators in DOI: 10.20533/iji.1742.4712.2010.0034 |
Zanifa Omary, Fredrick Mtenzi | |
326 - 337 | Formal Verification of Payment protocol using AVISPA DOI: 10.20533/iji.1742.4712.2010.0035 |
A.R. Rizwana Shaikh, Satish Devane | |
338 - 344 | Translucent Implementation of IPv6 Addressing Scheme in Communication Networks DOI: 10.20533/iji.1742.4712.2010.0036 |
M. Raza Parwez, M. Ehsan ul Haq, M. Sajid Javaid, Kabeer Ahmed |
Issue 4, December 2010
Pages | Title | Author(s) | Papers |
345 - 349 | Machine Learning Email Prediction System (MLEPS) DOI: 10.20533/iji.1742.4712.2010.0037 |
Taiwo Ayodele, Shikun Zhou, Rinat Khusainov | |
350 - 359 | Intelligent Traffic System: Road Networks with Time-Weighted Graphs DOI: 10.20533/iji.1742.4712.2010.0038 |
Hatem F. Halaoui | |
360 - 368 | This is My Body: The Uses and Effects of the Avatar in the Virtual World DOI: 10.20533/iji.1742.4712.2010.0039 |
Marc Conrad, Jo Neale, Alec Charles | |
369 - 381 | Turning Immigrants to Citizens: Merits of the pedagogical shift in 3D Virtual Learning Environments DOI: 10.20533/iji.1742.4712.2010.0040 |
Noha Saleeb, Georgios Dafoulas | |
382 - 391 | A Discussion on Social Software: Concept, Building Blocks and Challenges DOI: 10.20533/iji.1742.4712.2010.0041 |
Roberto Pereira, M. Cecilia C. Baranauskas, Sergio R. P. da Silva | |
392 - 400 | Single-trial Classification of Viewed Characters using Single-channel EEG Waveforms DOI: 10.20533/iji.1742.4712.2010.0042 |
Minoru Nakayama, Hiroshi Abe | |
401 - 403 | Solutions and Challenges for the Development of a Mobile Social Network DOI: 10.20533/iji.1742.4712.2010.0043 |
Claudia Becker, Peter Rothenpieler, Stefan Fischer | |
404 - 413 | Enhancing Privacy in Mobile Collaborative Applications by Enabling End-User Tailoring of The Distributed Architecture DOI: 10.20533/iji.1742.4712.2010.0044 |
Mohamed Bourimi, Bernd Ueberschär, Marcel Heupel, Dogan Kesdogan, Thomas Barth | |
414 - 421 | Re-conceptualizing Information Systems Models: An Experience from ERP Systems Environment DOI: 10.20533/iji.1742.4712.2010.0045 |
Ahed Abugabah, Louis Sanzogni | |
422 - 428 | Coupled Solution of Boltzmann Transport Equation, Maxwell’s and Navier Stokes equations DOI: 10.20533/iji.1742.4712.2010.0046 |
Rajveer S Yaduvanshi, Harish Parthasarathy |