All Stories

  1. An Efficient Hash-Based Assessment and Recovery Algorithm for Distributed Healthcare Systems
  2. An Effective Hash-Based Assessment and Recovery Algorithm for Healthcare Systems
  3. A Parallelized Database Damage Assessment Approach after Cyberattack for Healthcare Systems
  4. A User-Centric Mechanism for Sequentially Releasing Graph Datasets under Blowfish Privacy
  5. Information reconciliation through an agent-controlled graph model
  6. Toward information preservation in healthcare systems
  7. Indexing Arabic texts using association rule data mining
  8. Associating learning technology to sustain the environment through green mobile applications
  9. A Survey of the Knapsack Problem
  10. Axes-Based Encryption Key
  11. Scrambled prime key encryption
  12. Recovery of business intelligence systems: Towards guaranteed continuity of patient centric healthcare systems through a matrix-based recovery approach
  13. Software process models: a review and analysis
  14. Metaheuristic Algorithm for State-Based Software Testing
  15. Salivary biomarkers for the diagnosis and monitoring of neurological diseases
  16. (k, l)-Clustering for Transactional Data Streams Anonymization
  17. Genetic Algorithm Analysis using the Graph Coloring Method for Solving the University Timetable Problem
  18. A Recommended Replacement Algorithm for the Scalable Asynchronous Cache Consistency Scheme
  19. Effectiveness of Pre-Surgery Video in Reducing Anxiety in Daystay Surgical Patients
  20. Design and in-situ evaluation of a mixed-initiative approach to information organization
  21. Transaction Dependency Based Approach for Database Damage Assessment Using a Matrix
  22. A Systematic Review of Anonymous Communication Systems
  23. Designing for Advanced Personalization in Personal Task Management
  24. Regression Test Cases Prioritization Using Clustering and Code Change Relevance
  25. Information warfare: a lightweight matrix-based approach for database recovery
  26. How personal task management differs across individuals
  27. Innovative Mobile E-Healthcare Systems: A New Rule-Based Cache Replacement Strategy Using Least Profit Values
  28. Information Warfare: Fighting Back Through the Matrix
  29. A collaborative-based approach for avoiding traffic analysis and assuring data integrity in anonymous systems
  30. A comparative study of mobile database transaction models
  31. Data damage assessment and recovery algorithm from malicious attacks in healthcare data sharing systems
  32. Semantics-based approach for detecting flaws, conflicts and redundancies in XACML policies
  33. The NetCamo Data Communication System
  34. Anonymizing multimedia documents
  35. Improving the Efficiency of Transparent Antenna Using Gold Nano Layer Deposition
  36. An Enhanced k-Means Clustering Algorithm for Pattern Discovery in Healthcare Data
  37. Tracking and Repairing Damaged Healthcare Databases Using the Matrix
  38. Opportunistic medium access in multi-session networks based on cooperative ARQ
  39. The TOR data communication system
  40. Assuring consistency in mixed models
  41. A matrix-based damage assessment and recovery algorithm
  42. The TOR data communication system: A survey
  43. MOP
  44. Relational Database Design Patterns
  45. Role-Based Access Control modeling and validation
  46. Rift Valley Fever
  47. de-linkability
  48. Modeling and Validating the Clinical Information Systems Policy Using Alloy
  49. Rule-Based Data Mining Cache Replacement Strategy
  50. UPP+: A Flexible User Privacy Policy for Social Networking Services
  51. Novel compact UWB antenna with reconfigurable dual-band notches using pin diode switches actuated without λg/4 DC bias lines
  52. A Novel Compact Ultra-Wideband Dual-Notch Microstrip Antenna
  53. A Simple Relativity Theory of Everything
  54. A Simple Theory of the Universe
  55. MI: An Information Support System for Decision Makers
  56. Candelabra shaped microstrip antenna for ultra-wideband applications
  57. A Comparative Study of Software Engineering Process Models for Middle East Airlines
  58. Smart container loading
  59. Directed Graph Representation and Traversal in Relational Databases
  60. Novel compact semi annular polygons ultra-wideband microstrip antenna
  61. An Enhanced Quorum Selection Algorithm
  62. URINARY FUNCTION AND ENURESIS
  63. Bit-level locking for concurrency control
  64. Bind but Dynamic Technique
  65. Security Issues in Distributed Transaction Processing Systems
  66. An auto-indexing method for Arabic text
  67. An Improved Quorum Selection Algorithm
  68. Multigrid solvers in reconfigurable hardware
  69. Reconfigurable Hardware Implementation of the Successive Overrelaxation Method
  70. Special track on Database Theory, Technology, and Applications
  71. Kernelized Database Systems Security
  72. Security Issues in Distributed Transaction Processing Systems
  73. Frequency Domain Face Recognition
  74. BIRP: Bank intra routing protocol
  75. CASRA+: A Colloquial Arabic Speech Recognition Application
  76. SDDSR: Sequence Driven Dynamic Source Routing for Ad Hoc Networks
  77. A Comparative Study of Elgamal Based Digital Signature Algorithms
  78. Improving the Secure Socket Layer Protocol by modifying its Authentication function
  79. Towards a Temporal Multilevel Secure Database (TMSDB)
  80. A Comparative Study of RSA Based Digital Signature Algorithms
  81. Dyspnea and Confusion (Pulmonary Embolism)
  82. Editorial message
  83. Abjad Hawwaz: An Offline Arabic Handwriting Recognition System
  84. Abjad Hawwaz: An Offline Arabic Handwriting Recognition System
  85. Editorial message
  86. ElGamal Public-Key cryptosystem in multiplicative groups of quotient rings of polynomials over finite fields
  87. Kernelized Database Systems Security
  88. Security Issues in Distributed Transaction Processing Systems
  89. Editorial message
  90. Session details: Database technology
  91. Database technology
  92. Database technology
  93. Regression Testing of Database Applications
  94. Database and digital library technologies
  95. Iterative querying in web-based database applications
  96. Database and digital library technologies
  97. Iterative querying in web-based database applications
  98. Causes of Poverty Questionnaire
  99. Regression testing of database applications
  100. The Universality of Physics
  101. Database technology (track introduction only)
  102. Distributed query optimization using PERF joins
  103. Software metrics for small database applications
  104. C2 secure database management systems---a comparative study
  105. Amphotericin B
  106. Developments in flexible working practices in the Republic of Ireland
  107. Secure transaction management and query processing in multilevel secure database systems
  108. EXPERIMENTAL PYELONEPHRITIS
  109. Attacking ElGamal based cryptographic algorithms using pollard's rho algorithm
  110. TREX: A temporal reference extractor for arabic texts
  111. A neuro-heuristic approach for segmenting handwritten Arabic text
  112. ADD: Arabic duplicate detector - a duplicate detection data cleansing tool
  113. Neuro-classification for handwritten Arabic text
  114. Regression Test Selection for Database Applications
  115. Regression Test Selection for Database Applications
  116. Regression Test Selection for Database Applications
  117. Kernelized Database Systems Security
  118. Kernelized Database Systems Security
  119. Security Issues in Distributed Transaction Processing Systems