All Stories

  1. Evaluating Semantic Representation Strategies for Robust Information Retrieval Matching
  2. Evaluating Shallow and Deep Learning Strategies for Legal Text Classification of Clauses in Non-Disclosure Agreements
  3. A Cloud Based IoT Electricity Consumption Monitoring Platform for a Residential Household
  4. Getting Down to Business: Governing the Hybridization of UK Charities
  5. Two novel assays demonstrate persistent daratumumab exposure in a pediatric patient with delayed engraftment following allogeneic hematopoietic stem cell transplantation
  6. Sharing the Spotlight: The Benefits of Having a Celebrity Competitor
  7. Organizational hubris: Its antecedents and consequences for stakeholder relationships
  8. ELITE: Edge Layer IoT Trustless Environment
  9. Replication competent retrovirus testing (RCR) in the National Gene Vector Biorepository: No evidence of RCR in 1,595 post-treatment peripheral blood samples obtained from 60 clinical trials
  10. Performance Analysis of Blockchain-Enabled Security and Privacy Algorithms in Connected and Autonomous Vehicles: A Comprehensive Review
  11. Durable Engraftment and Excellent Overall Survival After CD34-Selected Peripheral Blood Stem Cell Boost in Pediatric Patients With Poor Graft Function Following Allogeneic Stem Cell Transplantation
  12. A Cybersecurity Architecture to Mitigate Shamoon Attacks
  13. Improving Data Glove Accuracy and Usability Using a Neural Network When Measuring Finger Joint Range of Motion
  14. Secure energy aware routing protocol for IEEE 802.15.4 wireless sensor networks
  15. After the pandemic: securing smart cities
  16. Detection of Anonymising Proxies Using Machine Learning
  17. Depletion of high-content CD14+ cells from apheresis products is critical for successful transduction and expansion of CAR T cells during large-scale cGMP manufacturing
  18. Identifying the Use of Anonymising Proxies to Conceal Source IP Addresses
  19. Reliability and Validity of Clinically Accessible Smart Glove Technologies to Measure Joint Range of Motion
  20. Review of Wearable Sensor-Based Health Monitoring Glove Devices for Rheumatoid Arthritis
  21. Pasquini MC, Hu Z-H, Curran K, et al. Real-world evidence of tisagenlecleucel for pediatric acute lymphoblastic leukemia and non-Hodgkin lymphoma. Blood Adv. 2020;4(21):5414-5424.
  22. CD4+ T-cell reconstitution predicts survival outcomes after acute graft-versus-host-disease: a dual-center validation
  23. How to Achieve Compliance with GDPR Article 17 in a Hybrid Cloud Environment
  24. BZKP: Blockchain-based zero-knowledge proof model for enhancing healthcare security in Bahrain IoT smart cities and COVID-19 risk mitigation
  25. Real-world evidence of tisagenlecleucel for pediatric acute lymphoblastic leukemia and non-Hodgkin lymphoma
  26. Early CD4+ T cell reconstitution as predictor of outcomes after allogeneic hematopoietic cell transplantation
  27. A Novel AI-enabled Framework to Diagnose Coronavirus COVID-19 using Smartphone Embedded Sensors: Design Study
  28. Real-World Efficacy of an Infrastructure-Free Geomagnetic Indoor Positioning System
  29. How to Achieve Compliance with GDPR Article 17 in a Hybrid Cloud Environment
  30. Natural images and blood vessel segmentation in retinal images using Echo State Networks
  31. Cyber security and the remote workforce
  32. Mitigating Denial of Service Attacks with Load Balancing
  33. Chatbots for online banking services
  34. Improving compliance with bluetooth device detection
  35. The Application of Sentiment Analysis and Text Analytics to Customer Experience Reviews to Understand What Customers Are Really Saying
  36. Evaluating User Engagement with a Reminiscence App Using Cross-Comparative Analysis of User Event Logs and Qualitative Data
  37. Introduction to Special Issue on Smart Systems Facts, Challenges and Technologies
  38. A Multimodal Smartphone Sensor System for Behaviour Measurement and Health Status Inference
  39. User-trained activity recognition using smartphones and weak supervision
  40. The Television Code: Regulating the Screen to Safeguard the Industry
  41. An investigation into smartphone based weakly supervised activity recognition systems
  42. How Usable Are Usability Tests? Examining the Suitability of Standard Usability Testing Methods for the Assessment of Apps for People Living with Dementia
  43. An IoT Framework for Detecting Movement Within Indoor Environments
  44. Music 2025 – The Music Data Dilemma: Issues Facing the Music Industry in Improving Data Management
  45. Web Services
  46. Economic costs and health-related quality of life associated with individual specific reminiscence: Results from the InspireD Feasibility Study
  47. E-Voting on the Blockchain
  48. Forecasting Short-term Wholesale Prices on the Irish Single Electricity Market
  49. Addressing the Problem of Activity Recognition with Experience Sampling and Weak Learning
  50. Protein Kinase A Signaling Inhibits Iridophore Differentiation in Zebrafish
  51. Using Mobile Technology to Provide Personalized Reminiscence for People Living With Dementia and Their Carers: Appraisal of Outcomes From a Quasi-Experimental Study
  52. ‘There is still so much inside’: The impact of personalised reminiscence, facilitated by a tablet device, on people living with mild to moderate dementia and their family carers
  53. Management of Journalism Transparency: Journalists’ perceptions of organizational leaders’ management of an emerging professional norm
  54. Guest Editorial Special Issue on Sensor Technologies for Connected Cars: Devices, Systems and Modeling
  55. Multilayer Perceptron Neural Network for Detection of Encrypted VPN Network Traffic
  56. Reducing the intrusion of user-trained activity recognition systems
  57. Allogeneic Matched Related Donor Bone Marrow Transplantation for Pediatric Patients With Severe Aplastic Anemia Using “Low-dose” Cyclophosphamide, ATG Plus Fludarabine
  58. Detecting the Use of Anonymous Proxies
  59. Predator-secreted sulfolipids induce defensive responses in C. elegans
  60. A hybrid Passive & Active Approach to Tracking movement within Indoor Environments
  61. Stream a Framework for Detecting Movement Indoors
  62. Mobile Technologies Impact on Economic Development in Sub-Saharan Africa
  63. Using Mobile Technology to Provide Personalized Reminiscence for People Living With Dementia and Their Carers: Appraisal of Outcomes From a Quasi-Experimental Study (Preprint)
  64. An overview of steganography techniques applied to the protection of biometric data
  65. Automatic Prediction of Health Status Using Smartphone-Derived Behavior Profiles
  66. Detection of spine curvature using wireless sensors
  67. Behavioural Usage Analysis of a Reminiscing App for People Living with Dementia and their Carers
  68. Using SVD and DWT Based Steganography to Enhance the Security of Watermarked Fingerprint Images
  69. Abstract CT078: Impact of disease burden and transplant on long-term survival after CD19 CAR therapy in adults with relapsed B-cell acute lymphoblastic leukemia
  70. Predicting short-term wholesale prices on the Irish single electricity market with artificial neural networks
  71. A method for verifying integrity & authenticating digital media
  72. Cyber–physical systems and context-aware sensing and computing
  73. Streaming Audio Using MPEG–7 Audio Spectrum Envelope to Enable Self-similarity within Polyphonic Audio
  74. Blood vessel segmentation in retinal images using echo state networks
  75. SceneMaker: Creative Technology for Digital StoryTelling
  76. Crowdsourced Data Collection of Physical Activity and Health Status: An App Solution
  77. Recent Studies in Tudor and Stuart Drama
  78. The performance cost of preserving data/query privacy using searchable symmetric encryption
  79. Timing of Spontaneous Awakening and Breathing Trial Affects Duration of Mechanical Ventilation
  80. Allogeneic hematopoietic stem cell transplantation for nonmalignant hematologic disorders using chemotherapy-only cytoreductive regimens and T-cell-depleted grafts from human leukocyte antigen–matched or –mismatched donors
  81. Aggregating social media data with temporal and environmental context for recommendation in a mobile tour guide system
  82. An experimental evaluation of echo state network for colour image segmentation
  83. Cloud-based machine learning for the detection of anonymous web proxies
  84. Preserving data privacy with Searchable Symmetric Encryption
  85. Using artificial neural networks to predict short-term wholesale prices on the Irish Single Electricity Market
  86. Welcome note
  87. Location and mobility-aware routing for multimedia streaming in disaster telemedicine
  88. Assessing usability testing for people living with dementia
  89. Circumstantial Shakespeare by Lorna Hutson
  90. Security Issues with Contactless Bank Cards
  91. Securing the internet through the detection of anonymous proxy usage
  92. CAPTURE - Extending the scope of self-localization in Indoor Positioning Systems
  93. Location and Mobility-Aware Routing for Improving Multimedia Streaming Performance in MANETs
  94. A Novel Cue based Picture Word Shape Character Password Creation Scheme
  95. Pattern Matching Techniques for Replacing Missing Sections of Audio Streamed across Wireless Networks
  96. 475. Phase I Clinical Trial of Autologous CD19-Targeted 19-28z CAR T Cells in Adult Patients With Relapsed or Refractory B-ALL
  97. Designing a Compact Wireless Network based Device-free Passive Localisation System for Indoor Environments
  98. Opportunistic Neighbour Prediction Using an Artificial Neural Network
  99. Security evaluation of the OAuth 2.0 framework
  100. Traffic Classification for the Detection of Anonymous Web Proxy Routing
  101. Mobile device security
  102. Recent Advances in Ambient Intelligence and Context-Aware Computing
  103. Drones and Privacy
  104. Glove-Based Technology in Hand Rehabilitation
  105. A Context-Aware Mobility Indoor Positioning System
  106. Cloud Computing and Security in the Future
  107. The detection of empty resist bottles or air in the resist lines of a photolithography coating tool
  108. To wireless fidelity and beyond — CAPTURE, extending indoor positioning systems
  109. A Lightweight Authentication Protocol for Secure Communications between Resource-Limited Devices and Wireless Sensor Networks
  110. CAPTURE — Cooperatively applied positioning techniques utilizing range extensions
  111. Abstract CT102: Efficacy and toxicity management of 19-28z CAR T cell therapy in B cell acute lymphoblastic leukemia
  112. Detection of multi-occupancy using device-free passive localisation
  113. Towards a location and mobility-aware routing protocol for improving multimedia streaming performance in MANETs
  114. Characteristics of a Piezo-Resistive Fabric Stretch Sensor Glove for Home-Monitoring of Rheumatoid Arthritis
  115. 766. Efficacy and Toxicity Management of 19-28z CAR T Cell Therapy in B Cell Acute Lymphoblastic Leukemia
  116. Efficacy and Toxicity Management of 19-28z CAR T Cell Therapy in B Cell Acute Lymphoblastic Leukemia
  117. Allogeneic Hematopoietic Stem Cell Transplantation (HSCT) for Non Malignant Hematologic Disorders (NMHD), Using a Chemotherapy-Only Cytoreductive Regimen and T-Cell Depleted Grafts from Alternative Donors
  118. Busulfan, Melphalan, and Thiotepa Conditioning for Allogeneic Hematopoietic Stem Cell Transplantation (HSCT) of Pediatric Patients with Acute Leukemia and Central Nervous System (CNS) Disease
  119. An Active Low Cost Mesh Networking Indoor Tracking System
  120. Editorial to the Special Section on Ambient Intelligence and Assistive Technologies for Cognitive Impaired People
  121. Social Networking Analysis
  122. Helium Ion Microscopy (HIM) for the imaging of biological samples at sub-nanometer resolution
  123. Detecting Anonymising Proxy Usage on the Internet
  124. Wireless Sensor Networks
  125. A self-similarity approach to repairing large dropouts of streamed music
  126. An active low cost mesh networking indoor tracking system
  127. IoTs (Internet of Things) and DfPL (Device-free Passive Localisation) in a disaster management scenario
  128. A novel approach to digital watermarking, exploiting colour spaces
  129. Novel smart sensor glove for arthritis rehabiliation
  130. Novel smart sensor glove for arthritis rehabiliation
  131. CD19-Targeted T Cells Rapidly Induce Molecular Remissions in Adults with Chemotherapy-Refractory Acute Lymphoblastic Leukemia
  132. Context-aware intelligent recommendation system for tourism
  133. A Survey of Geographical Routing in Wireless Ad-Hoc Networks
  134. Support Vector Machine Classification in a Device-Free Passive Localisation (DfPL) Scenario
  135. Pervasive and Ubiquitous Technology Innovations for Ambient Intelligence Environments
  136. Social Networking and Health
  137. Social Networking in Education
  138. RFID in the production line for work flow improvement
  139. Katharine Eisaman Maus. Being and Having in Shakespeare. Oxford Wells Shakespeare Lectures. Oxford: Oxford University Press, 2013. 142 pp. $45. ISBN: 978–0–19–969800–4.
  140. Legal, Ethical & Social Issues in the case of an Intrusive Remote Monitoring Software
  141. A survey of active and passive indoor localisation systems
  142. Indoor Robot Localisation with Active RFID
  143. Serotonin circuits and anxiety: what can invertebrates teach us?
  144. A new method to determine joint range of movement and stiffness in rheumatoid arthritic patients
  145. Bringing location to IP Addresses withIP Geolocation
  146. The Rise of Gaming on Social Networks
  147. Cloud Computing Technologies
  148. Google+ vs Facebook: The Comparison
  149. Teaching Java Programming using CABLE in a Collaborative Online Environment
  150. Google+ v Facebook: The Comparison
  151. Near Field Communication
  152. Probabilistic indoor human movement modeling to aid first responders
  153. Google+ v Facebook: The Comparison
  154. Guiding robots through wireless location positioning
  155. Innovative Applications of Ambient Intelligence
  156. The Future of Web and Mobile Game Development
  157. A practical network coding and routing scheme based on maximum flow combination
  158. A dynamic threshold approach for skin tone detection in colour images
  159. HABITS: a Bayesian filter approach to indoor tracking and location
  160. MANET Location Prediction Using Machine Learning Algorithms
  161. Man in the Browser Attacks
  162. Using acoustic sensors to discriminate between nasal and mouth breathing
  163. Innovative Applications of Ambient Intelligence
  164. OpenStreetMap
  165. WS-I* compliant web service SOAP message security performance
  166. HTML5 and the Mobile Web
  167. Mobility and delay in greedy geographic routing
  168. Support Vector Machine and Probability Neural Networks in a Device-Free Passive Localization (DFPL) Scenario
  169. Feeling Criminal in <i>Macbeth</i>
  170. Introduction
  171. Treasonous Silence:The Tragedy of Philotasand Legal Epistemology [with illustrations]
  172. Performance Comparison of Enterprise Applications on Mobile Operating Systems
  173. Good Practice for Strong Passwords
  174. A Bayesian Filter Approach to Modelling Human Movement Patterns for First Responders within Indoor Locations
  175. Embed, Track and Authenticate Images Online with SDW-WebCrawler
  176. Implementing the Payment Card Industry (PCI) Data Security Standard (DSS)
  177. Hospitable Justice: Law and Selfhood in Shakespeare’s Sonnets
  178. An evaluation of indoor location determination technologies
  179. MARTIN BUTLER, The Stuart Court Masque and Political Culture.
  180. A wireless approach to device-free localisation (DFL) for indoor environments
  181. Cloud Computing Security
  182. Context-aware support for assistive systems and services
  183. Radio Communication Protocols in a History Aware Device-free Passive (DfP) Localisation
  184. The Core Aspects of Search Engine Optimisation Necessary to Move up the Ranking
  185. The Problems of Jurisdiction on the Internet
  186. The Role of Augmented Reality within Ambient Intelligence
  187. The Role of Twitter in the World of Business
  188. Wearable Rehab Technology for Automatic Measurement of Patients with Arthritis
  189. Ubiquitous Developments in Ambient Computing and Intelligence
  190. History Aware Device-free Passive (DfP) Localisation
  191. Managing Step Changes in Information System Support: Lessons from an Industrial Study
  192. Learning indoor movement habits for predictive control
  193. Cheating in Exams with Technology
  194. Integrating geolocation into electronic finance applications for additional security
  195. Finger movement measurements in arthritic patients using wearable sensor enabled gloves
  196. Gabriel Heaton. Writing and Reading Royal Entertainments: From George Gascoigne to Ben Jonson. Oxford: Oxford University Press, 2010. x + 305 pp. index. illus. bibl. $99. ISBN: 978–0–19–921311–5.
  197. Web 2.0
  198. A Watermarking Based Tamper Detection Solution for RFID Tags
  199. A dynamic threshold approach for skin segmentation in color images
  200. Practical Network Coding Scheme Based on Maximum Flow Combination and Coding Node Identification
  201. Interplay between Foxd3 and Mitf regulates cell fate plasticity in the zebrafish neural crest
  202. 2-Arylureidophenyl-4-(3-oxa-8-azabicyclo[3.2.1]octan-8-yl)triazines as highly potent and selective ATP competitive mTOR inhibitors: Optimization of human microsomal stability
  203. Discovery of 2-ureidophenyltriazines bearing bridged morpholines as potent and selective ATP-competitive mTOR inhibitors
  204. Renaissance non-humanism: plants, animals, machines, matter
  205. A hash-based image encryption algorithm
  206. Digital image steganography: Survey and analysis of current methods
  207. Beyond Rapalog Therapy: Preclinical Pharmacology and Antitumor Activity of WYE-125132, an ATP-Competitive and Specific Inhibitor of mTORC1 and mTORC2
  208. Ambient Interface Design (AID) for the Ergonomically Challenged
  209. An Activity Monitoring Application for Windows Mobile Devices
  210. An Improved Self-embedding Algorithm: Digital Content Protection against Compression Attacks in Digital Watermarking
  211. Analysis of device-free localisation (DFL) techniques for indoor environments
  212. Context-Awareness in Ambient Intelligence
  213. Evaluation of Smoothing Algorithms for a RSSI-Based Device-Free Passive Localisation
  214. A Biologically Inspired Smart Camera for Use in Surveillance Applications
  215. Towards objectifying information hiding
  216. Mobile development environments for electronic finance
  217. Mobile Phone Forensic Analysis
  218. Automating Information Discovery Within the Invisible Web
  219. Design and Synthesis of Novel Diaminoquinazolines with in Vivo Efficacy for β-Catenin/T-Cell Transcriptional Factor 4 Pathway Inhibition
  220. A secure and improved self-embedding algorithm to combat digital document forgery
  221. A skin tone detection algorithm for an adaptive approach to steganography
  222. Incorporation of water-solubilizing groups in pyrazolopyrimidine mTOR inhibitors: Discovery of highly potent and selective analogs with improved human microsomal stability
  223. Morpholine Derivatives Greatly Enhance the Selectivity of Mammalian Target of Rapamycin (mTOR) Inhibitors
  224. Discovery of 4-Morpholino-6-aryl-1H-pyrazolo[3,4-d]pyrimidines as Highly Potent and Selective ATP-Competitive Inhibitors of the Mammalian Target of Rapamycin (mTOR): Optimization of the 6-Aryl Substituent
  225. A new colour space for skin tone detection
  226. Radio Frequency Identification for Educational Gaming using Mobile Devices
  227. Foxd3 controls melanophore specification in the zebrafish neural crest by regulation of Mitf
  228. ATP-Competitive Inhibitors of the Mammalian Target of Rapamycin: Design and Synthesis of Highly Potent and Selective Pyrazolopyrimidines
  229. Biochemical, Cellular, and In vivo Activity of Novel ATP-Competitive and Selective Inhibitors of the Mammalian Target of Rapamycin
  230. Automated measurements of finger movements in arthritic patients using a wearable data hand glove
  231. Letter to the editor
  232. Optimising mobile phone self-location estimates by introducing beacon characteristics to the algorithm
  233. Knowledge Networks
  234. WebOS – moving the operating system to the Web
  235. Computer hacking
  236. Adaptive mobile applications
  237. Cryptography
  238. Designing for the mobile Web
  239. Digital watermarking and steganography
  240. Honeynets
  241. Hybrid Web applications
  242. Improved Blind Watermarking of 3D Objects Based on Partition
  243. Internet protocols
  244. Introduction
  245. Javascript, XML, E4X and AJAX
  246. Mesh networking
  247. Mobile social software
  248. Podcasting, screencasting, blogging and videoblogging
  249. RFID-Enabled Location Determination Within Indoor Environments
  250. Really Simple Syndication (RSS)
  251. Summary
  252. The invisible Web
  253. The long tail
  254. The problem of spam email
  255. Vertical search engines
  256. VoiceXML
  257. Web 2.0
  258. Web intelligence
  259. Web services
  260. What causes delay in the Internet?
  261. Wireless 802.11 security
  262. Wireless sensor networks
  263. Worldwide interoperability for microwave access (WiMAX)
  264. Understanding the Internet
  265. Ambient Communication Experience (ACE)
  266. Ambient Middleware for Context-Awareness (AMiCA)
  267. An infrastructure for developing self-organising services
  268. Combating digital document forgery using new secure information hiding algorithm
  269. Securing information content using new encryption method and Steganography
  270. A computational intelligence method for traversing dynamically constructed networks of knowledge
  271. Pinpointing users with location estimation techniques and Wi-Fi hotspot technology
  272. Image Analysis for Online Dynamic Steganography Detection
  273. A formal logic approach to firewall packet filtering analysis and generation
  274. Artificial intelligence and networking
  275. Skin tone based Steganography in video files exploiting the YCbCr colour space
  276. Enhancing Steganography in Digital Images
  277. Investigating the Human Computer Interaction Problems with Automated Teller Machine (ATM) Navigation Menus
  278. Biometric Inspired Digital Image Steganography
  279. A multilingual mobile university information portal designed to cater for visiting overseas students
  280. Investigating the human computer interaction problems with automated teller machine navigation menus
  281. Disruption Tolerant Networking
  282. Cognitive Radio
  283. Autonomic Vehicles
  284. Digital Watermarking and Steganography
  285. Autonomic supervision of stigmergic self-organisation for distributed information retrieval
  286. A primer on radio frequency identification for libraries
  287. Investigating the problems faced by older adults and people with disabilities in online environments
  288. Identification of Anthranilic Acid Derivatives as a Novel Class of Allosteric Inhibitors of Hepatitis C NS5B Polymerase.
  289. Utilizing Stigmergy in Support of Autonomic Principles
  290. Utilizing Stigmergy in Support of Autonomic Principles
  291. ADDRESSING THE PROBLEMS OF DETECTING FACES WITH NEURAL NETWORKS
  292. Shakespeare and Daniel Revisited: Antony and Cleopatra II. v. 50 4 and The Tragedy of Philotas V. ii. 2013 15
  293. TeleMorph: A Fuzzy Logic Approach to Network-Aware Transmoding in Mobile Intelligent Multimedia Presentation Systems
  294. Taking the information to the public through Library 2.0
  295. Wireless Handheld Devices Become Trusted Network Devices
  296. The Long Tail
  297. Identification of Anthranilic Acid Derivatives as a Novel Class of Allosteric Inhibitors of Hepatitis C NS5B Polymerase
  298. Geographical Mashups
  299. Erotic Policy: King James, Thomas Campion, and the Rhetoric of Anglo-Scottish Marriage
  300. An RFID-enabled middleware architecture for urban gaming
  301. Challenges and research directions in autonomic communications
  302. Autonomic Supervision of Stigmergic Self-Organisation for Distributed Information Retrieval
  303. Bandwidth determined transmoding through fuzzy logic in mobile intelligent multimedia presentation systems
  304. An evaluation of image based steganography methods using visual inspection and automated detection techniques
  305. Introducing a light-weight autonomic network middleware based on stigmergic mechanisms
  306. Demonstrating the Wired Equivalent Privacy (WEP) Weaknesses Inherent in Wi-Fi Networks
  307. An evaluation of image based steganography methods
  308. Expressing emotion in electronic mail
  309. Involving the user Through Library 2.0
  310. Eliminating the Volume of Spam E-Mails Using a Hashcash-Based Solution
  311. Delivering Audio and Video with Rich Site Summary Enclosures
  312. Investigating text input methods for mobile phones
  313. A location-based mobile tourist guide
  314. Knowledge Networks
  315. Discovering Resources in Computational GRID Environments
  316. Resource discovery and management in computational GRID environments
  317. Scheduled RSS feeds for streaming multimedia to the desktop using RSS enclosures
  318. Intelligent information retrieval
  319. Examining the effects of caching, compression and popup filtering on internet surfing
  320. Neural network face detection
  321. Monitoring hacker activity with a Honeynet
  322. Transcoding media for bandwidth constrained mobile devices
  323. Understanding and reducing web delays
  324. Online Gaming
  325. An Investigation into the Use of the Least Significant Bit Substitution Technique in Digital Watermarking
  326. Introducing Song Form Intelligence into Streaming Audio
  327. Investigating Text Input Methods for Mobile Phones
  328. E-Democracy
  329. An Investigation into Factors Associated with Web Page Download Delay
  330. Exposing the Wired Equivalent Privacy Protocol Weaknesses in Wireless Networks
  331. Addressing Spam E-Mail Using Hashcast
  332. The Deployment of Protocol Stack Components Using Web Services
  333. Dynamic Reconfiguration of IP Domain Middleware Stacks to Support Multicast Multimedia Distribution in a Heterogeneous Environment
  334. The Use of Neural Networks in Real-time Face Detection
  335. Evaluation of pixel-based steganography and stegodetection methods
  336. Cyberart
  337. Civil Liberties and Computer Monitoring
  338. Web Intelligence in Information Retrieval
  339. Tips for Achieving High Positioning in the Results Pages of the Major Search Engines
  340. Understanding and Reducing Web Delays
  341. WikiWikiWeb as a Tool for Collaboration
  342. PMXML: An XML Vocabulary Intended for the Exchange of Task Planning and Tracking Information
  343. Mobile MultiModal presentation
  344. Design of a Tourist Driven Bandwidth Determined MultiModal Mobile Presentation System
  345. Introducing IP Domain Flexible Middleware Stacks for Multicast Multimedia Distribution in Heterogeneous Environments
  346. TELEMORPH: BANDWIDTH-DETERMINED MOBILE MULTIMODAL PRESENTATION
  347. Mesh Networking
  348. Identification of Small Molecule Compounds That Selectively Inhibit Varicella-Zoster Virus Replication
  349. The effects of badly behaved routers on Internet congestion
  350. Web Intelligence
  351. A Web-based collaboration teaching environment
  352. A decision support system for telecommunications
  353. A framework for the transmission of streaming media to mobile devices
  354. Adaptive Mobile Applications
  355. A paradigm shift in the distribution of multimedia
  356. Helpmate: A multimedia Web teaching framework
  357. Multiple multicast groups for multimedia on the Internet
  358. Internet Protocols
  359. Optimal multimedia transport on the Internet
  360. Dynamicmultimedia protocol stacks
  361. Cryptography
  362. Legal Developments in Marketing …
  363. Legal Developments in Marketing…
  364. Legal Developments in Marketing …
  365. Exclusive Dealing and Public Policy
  366. Social Networking
  367. Hackers, Hacking, and Eavesdropping
  368. Hacking and Eavesdropping
  369. Security Issues in Cloud Computing
  370. Recent Developments in Simplified Sign-On
  371. Autonomous Querying for Knowledge Networks
  372. Autonomic Computing
  373. Cryptography
  374. Cyber Terrorism Attacks
  375. Dynamically Adaptable Web Services Based on the Simple Object Access Protocol
  376. Electronic Surveillance and Civil Rights
  377. Multimedia for Mobile Devices
  378. Security Issues with Wi-Fi Networks
  379. The Semantic Web
  380. Web Services
  381. A location based wireless tourist guide
  382. Addressing WiFi Security Concerns
  383. Fighting the Problem of Unsolicited E-Mail Using a Hashcash Proof-of-Work Approach
  384. Prevalent Factors Involved in Delays Associated with Page Downloads
  385. Scheduled RSS feeds for streaming multimedia to the desktop using RSS enclosures
  386. Towards Pervasive Supervision for Autonomic Systems
  387. Automated broadcast media monitoring using the google API
  388. A middleware architecture for streaming media over IP networks to mobile devices
  389. Cyber Terrorism Attacks
  390. Hacking and Eavesdropping
  391. HTML5
  392. Hackers, Hacking, and Eavesdropping
  393. Social Networking
  394. Multimedia for Mobile Devices
  395. Multimedia for Mobile Devices
  396. Web Services
  397. Autonomic Computing
  398. Security Issues with Wi-Fi Networks
  399. The Semantic Web
  400. Addressing WiFi Security Concerns
  401. Multimedia for Mobile Devices
  402. Cryptography
  403. Mobile App Stores
  404. Cloud Computing Security
  405. Software Piracy
  406. Cloud Computing
  407. The Internet of Things
  408. Social Networking in Education
  409. Location-Based Social Networks
  410. Really Simple Syndication (RSS)
  411. OpenStreetMap
  412. The World of Podcasting, Screencasting, Blogging, and Videoblogging
  413. SPIT
  414. Glove-Based Technology in Hand Rehabilitation
  415. Social Networking
  416. Recent Developments in Simplified Sign-On
  417. Electronic Surveillance and Civil Rights
  418. The Role of Twitter in the World of Business
  419. The Role of Augmented Reality within Ambient Intelligence
  420. The Problems of Jurisdiction on the Internet
  421. The Core Aspects of Search Engine Optimisation Necessary to Move up the Ranking
  422. Internet Censorship in China
  423. Context Awareness in Mobile Devices
  424. The Rise of the Tablet
  425. Mobile Phone Forensic Analysis
  426. Context-Awareness in Ambient Intelligence
  427. Ambient Interface Design (AID) for the Ergonomically Challenged
  428. An Activity Monitoring Application for Windows Mobile Devices
  429. Proactive Context-Aware Middleware
  430. RFID-Enabled Location Determination within Indoor Environments
  431. Exposing the Wired Equivalent Privacy Protocol Weaknesses in Wireless Networks
  432. Cheating in Exams with Technology
  433. Knowledge-Based Reasoning Through Stigmergic Linking
  434. Developing Team Work in IT Education to Foster Student Engagement
  435. Common Problems Faced When Developing Applications for Mobile Devices
  436. A Literacy and Numeracy E-Learning Mobile Application for Pre-Schoolers
  437. A Literacy and Numeracy E-Learning Mobile Application for Pre-Schoolers
  438. Dynamically Adaptable Web Services Based on the Simple Object Access Protocol
  439. Fighting the Problem of Unsolicited E-Mail Using a Hashcash Proof-of-Work Approach
  440. Prevalent Factors Involved in Delays Associated with Page Downloads
  441. Exposing the Wired Equivalent Privacy Protocol Weaknesses in Wireless Networks
  442. The Challenges of Data Cleansing with Data Warehouses
  443. Ambient Communication Experience (ACE), Information Interaction in Design Space
  444. A Camera-Based System for Determining Hand Range of Movement Measurements in Rheumatoid Arthritis
  445. Using Leap Motion and Gamification to Facilitate and Encourage Rehabilitation for Hand Injuries:
  446. Introducing song form intelligence into streaming audio
  447. Web intelligence in information retrieval
  448. Adaptive Mobile Applications
  449. The use of dynamically reconfigurable protocol stacks for streaming multimedia to mobile devices
  450. Reliable remote isochronous applications over the Internet