All Stories

  1. A Cloud Based IoT Electricity Consumption Monitoring Platform for a Residential Household
  2. Getting Down to Business: Governing the Hybridization of UK Charities
  3. Two novel assays demonstrate persistent daratumumab exposure in a pediatric patient with delayed engraftment following allogeneic hematopoietic stem cell transplantation
  4. Sharing the Spotlight: The Benefits of Having a Celebrity Competitor
  5. Organizational hubris: Its antecedents and consequences for stakeholder relationships
  6. ELITE: Edge Layer IoT Trustless Environment
  7. Replication competent retrovirus testing (RCR) in the National Gene Vector Biorepository: No evidence of RCR in 1,595 post-treatment peripheral blood samples obtained from 60 clinical trials
  8. Performance Analysis of Blockchain-Enabled Security and Privacy Algorithms in Connected and Autonomous Vehicles: A Comprehensive Review
  9. Durable Engraftment and Excellent Overall Survival After CD34-Selected Peripheral Blood Stem Cell Boost in Pediatric Patients With Poor Graft Function Following Allogeneic Stem Cell Transplantation
  10. A Cybersecurity Architecture to Mitigate Shamoon Attacks
  11. Improving Data Glove Accuracy and Usability Using a Neural Network When Measuring Finger Joint Range of Motion
  12. Secure energy aware routing protocol for IEEE 802.15.4 wireless sensor networks
  13. After the pandemic: securing smart cities
  14. Detection of Anonymising Proxies Using Machine Learning
  15. Depletion of high-content CD14+ cells from apheresis products is critical for successful transduction and expansion of CAR T cells during large-scale cGMP manufacturing
  16. Identifying the Use of Anonymising Proxies to Conceal Source IP Addresses
  17. Reliability and Validity of Clinically Accessible Smart Glove Technologies to Measure Joint Range of Motion
  18. Review of Wearable Sensor-Based Health Monitoring Glove Devices for Rheumatoid Arthritis
  19. Pasquini MC, Hu Z-H, Curran K, et al. Real-world evidence of tisagenlecleucel for pediatric acute lymphoblastic leukemia and non-Hodgkin lymphoma. Blood Adv. 2020;4(21):5414-5424.
  20. CD4+ T-cell reconstitution predicts survival outcomes after acute graft-versus-host-disease: a dual-center validation
  21. How to Achieve Compliance with GDPR Article 17 in a Hybrid Cloud Environment
  22. BZKP: Blockchain-based zero-knowledge proof model for enhancing healthcare security in Bahrain IoT smart cities and COVID-19 risk mitigation
  23. Real-world evidence of tisagenlecleucel for pediatric acute lymphoblastic leukemia and non-Hodgkin lymphoma
  24. Early CD4+ T cell reconstitution as predictor of outcomes after allogeneic hematopoietic cell transplantation
  25. A Novel AI-enabled Framework to Diagnose Coronavirus COVID-19 using Smartphone Embedded Sensors: Design Study
  26. Real-World Efficacy of an Infrastructure-Free Geomagnetic Indoor Positioning System
  27. How to Achieve Compliance with GDPR Article 17 in a Hybrid Cloud Environment
  28. Natural images and blood vessel segmentation in retinal images using Echo State Networks
  29. Cyber security and the remote workforce
  30. Mitigating Denial of Service Attacks with Load Balancing
  31. Chatbots for online banking services
  32. Improving compliance with bluetooth device detection
  33. The Application of Sentiment Analysis and Text Analytics to Customer Experience Reviews to Understand What Customers Are Really Saying
  34. Evaluating User Engagement with a Reminiscence App Using Cross-Comparative Analysis of User Event Logs and Qualitative Data
  35. Introduction to Special Issue on Smart Systems Facts, Challenges and Technologies
  36. A Multimodal Smartphone Sensor System for Behaviour Measurement and Health Status Inference
  37. User-trained activity recognition using smartphones and weak supervision
  38. The Television Code: Regulating the Screen to Safeguard the Industry
  39. An investigation into smartphone based weakly supervised activity recognition systems
  40. How Usable Are Usability Tests? Examining the Suitability of Standard Usability Testing Methods for the Assessment of Apps for People Living with Dementia
  41. An IoT Framework for Detecting Movement Within Indoor Environments
  42. Music 2025 – The Music Data Dilemma: Issues Facing the Music Industry in Improving Data Management
  43. Web Services
  44. Economic costs and health-related quality of life associated with individual specific reminiscence: Results from the InspireD Feasibility Study
  45. E-Voting on the Blockchain
  46. Forecasting Short-term Wholesale Prices on the Irish Single Electricity Market
  47. Addressing the Problem of Activity Recognition with Experience Sampling and Weak Learning
  48. Protein Kinase A Signaling Inhibits Iridophore Differentiation in Zebrafish
  49. Using Mobile Technology to Provide Personalized Reminiscence for People Living With Dementia and Their Carers: Appraisal of Outcomes From a Quasi-Experimental Study
  50. ‘There is still so much inside’: The impact of personalised reminiscence, facilitated by a tablet device, on people living with mild to moderate dementia and their family carers
  51. Management of Journalism Transparency: Journalists’ perceptions of organizational leaders’ management of an emerging professional norm
  52. Guest Editorial Special Issue on Sensor Technologies for Connected Cars: Devices, Systems and Modeling
  53. Multilayer Perceptron Neural Network for Detection of Encrypted VPN Network Traffic
  54. Reducing the intrusion of user-trained activity recognition systems
  55. Allogeneic Matched Related Donor Bone Marrow Transplantation for Pediatric Patients With Severe Aplastic Anemia Using “Low-dose” Cyclophosphamide, ATG Plus Fludarabine
  56. Detecting the Use of Anonymous Proxies
  57. Predator-secreted sulfolipids induce defensive responses in C. elegans
  58. A hybrid Passive & Active Approach to Tracking movement within Indoor Environments
  59. Stream a Framework for Detecting Movement Indoors
  60. Mobile Technologies Impact on Economic Development in Sub-Saharan Africa
  61. Using Mobile Technology to Provide Personalized Reminiscence for People Living With Dementia and Their Carers: Appraisal of Outcomes From a Quasi-Experimental Study (Preprint)
  62. An overview of steganography techniques applied to the protection of biometric data
  63. Automatic Prediction of Health Status Using Smartphone-Derived Behavior Profiles
  64. Detection of spine curvature using wireless sensors
  65. Behavioural Usage Analysis of a Reminiscing App for People Living with Dementia and their Carers
  66. Using SVD and DWT Based Steganography to Enhance the Security of Watermarked Fingerprint Images
  67. Abstract CT078: Impact of disease burden and transplant on long-term survival after CD19 CAR therapy in adults with relapsed B-cell acute lymphoblastic leukemia
  68. Predicting short-term wholesale prices on the Irish single electricity market with artificial neural networks
  69. A method for verifying integrity & authenticating digital media
  70. Cyber–physical systems and context-aware sensing and computing
  71. Streaming Audio Using MPEG–7 Audio Spectrum Envelope to Enable Self-similarity within Polyphonic Audio
  72. Blood vessel segmentation in retinal images using echo state networks
  73. SceneMaker: Creative Technology for Digital StoryTelling
  74. Crowdsourced Data Collection of Physical Activity and Health Status: An App Solution
  75. Recent Studies in Tudor and Stuart Drama
  76. The performance cost of preserving data/query privacy using searchable symmetric encryption
  77. Timing of Spontaneous Awakening and Breathing Trial Affects Duration of Mechanical Ventilation
  78. Allogeneic hematopoietic stem cell transplantation for nonmalignant hematologic disorders using chemotherapy-only cytoreductive regimens and T-cell-depleted grafts from human leukocyte antigen–matched or –mismatched donors
  79. Aggregating social media data with temporal and environmental context for recommendation in a mobile tour guide system
  80. An experimental evaluation of echo state network for colour image segmentation
  81. Cloud-based machine learning for the detection of anonymous web proxies
  82. Preserving data privacy with Searchable Symmetric Encryption
  83. Using artificial neural networks to predict short-term wholesale prices on the Irish Single Electricity Market
  84. Welcome note
  85. Location and mobility-aware routing for multimedia streaming in disaster telemedicine
  86. Assessing usability testing for people living with dementia
  87. Circumstantial Shakespeare by Lorna Hutson
  88. Security Issues with Contactless Bank Cards
  89. Securing the internet through the detection of anonymous proxy usage
  90. CAPTURE - Extending the scope of self-localization in Indoor Positioning Systems
  91. Location and Mobility-Aware Routing for Improving Multimedia Streaming Performance in MANETs
  92. A Novel Cue based Picture Word Shape Character Password Creation Scheme
  93. Pattern Matching Techniques for Replacing Missing Sections of Audio Streamed across Wireless Networks
  94. 475. Phase I Clinical Trial of Autologous CD19-Targeted 19-28z CAR T Cells in Adult Patients With Relapsed or Refractory B-ALL
  95. Designing a Compact Wireless Network based Device-free Passive Localisation System for Indoor Environments
  96. Opportunistic Neighbour Prediction Using an Artificial Neural Network
  97. Security evaluation of the OAuth 2.0 framework
  98. Traffic Classification for the Detection of Anonymous Web Proxy Routing
  99. Mobile device security
  100. Recent Advances in Ambient Intelligence and Context-Aware Computing
  101. Drones and Privacy
  102. Glove-Based Technology in Hand Rehabilitation
  103. A Context-Aware Mobility Indoor Positioning System
  104. Cloud Computing and Security in the Future
  105. The detection of empty resist bottles or air in the resist lines of a photolithography coating tool
  106. To wireless fidelity and beyond — CAPTURE, extending indoor positioning systems
  107. A Lightweight Authentication Protocol for Secure Communications between Resource-Limited Devices and Wireless Sensor Networks
  108. CAPTURE — Cooperatively applied positioning techniques utilizing range extensions
  109. Abstract CT102: Efficacy and toxicity management of 19-28z CAR T cell therapy in B cell acute lymphoblastic leukemia
  110. Detection of multi-occupancy using device-free passive localisation
  111. Towards a location and mobility-aware routing protocol for improving multimedia streaming performance in MANETs
  112. Characteristics of a Piezo-Resistive Fabric Stretch Sensor Glove for Home-Monitoring of Rheumatoid Arthritis
  113. 766. Efficacy and Toxicity Management of 19-28z CAR T Cell Therapy in B Cell Acute Lymphoblastic Leukemia
  114. Efficacy and Toxicity Management of 19-28z CAR T Cell Therapy in B Cell Acute Lymphoblastic Leukemia
  115. Allogeneic Hematopoietic Stem Cell Transplantation (HSCT) for Non Malignant Hematologic Disorders (NMHD), Using a Chemotherapy-Only Cytoreductive Regimen and T-Cell Depleted Grafts from Alternative Donors
  116. Busulfan, Melphalan, and Thiotepa Conditioning for Allogeneic Hematopoietic Stem Cell Transplantation (HSCT) of Pediatric Patients with Acute Leukemia and Central Nervous System (CNS) Disease
  117. An Active Low Cost Mesh Networking Indoor Tracking System
  118. Editorial to the Special Section on Ambient Intelligence and Assistive Technologies for Cognitive Impaired People
  119. Social Networking Analysis
  120. Helium Ion Microscopy (HIM) for the imaging of biological samples at sub-nanometer resolution
  121. Detecting Anonymising Proxy Usage on the Internet
  122. Wireless Sensor Networks
  123. A self-similarity approach to repairing large dropouts of streamed music
  124. An active low cost mesh networking indoor tracking system
  125. IoTs (Internet of Things) and DfPL (Device-free Passive Localisation) in a disaster management scenario
  126. A novel approach to digital watermarking, exploiting colour spaces
  127. Novel smart sensor glove for arthritis rehabiliation
  128. Novel smart sensor glove for arthritis rehabiliation
  129. CD19-Targeted T Cells Rapidly Induce Molecular Remissions in Adults with Chemotherapy-Refractory Acute Lymphoblastic Leukemia
  130. Context-aware intelligent recommendation system for tourism
  131. A Survey of Geographical Routing in Wireless Ad-Hoc Networks
  132. Support Vector Machine Classification in a Device-Free Passive Localisation (DfPL) Scenario
  133. Pervasive and Ubiquitous Technology Innovations for Ambient Intelligence Environments
  134. Social Networking and Health
  135. Social Networking in Education
  136. RFID in the production line for work flow improvement
  137. Katharine Eisaman Maus. Being and Having in Shakespeare. Oxford Wells Shakespeare Lectures. Oxford: Oxford University Press, 2013. 142 pp. $45. ISBN: 978–0–19–969800–4.
  138. Legal, Ethical & Social Issues in the case of an Intrusive Remote Monitoring Software
  139. A survey of active and passive indoor localisation systems
  140. Indoor Robot Localisation with Active RFID
  141. Serotonin circuits and anxiety: what can invertebrates teach us?
  142. A new method to determine joint range of movement and stiffness in rheumatoid arthritic patients
  143. Bringing location to IP Addresses withIP Geolocation
  144. The Rise of Gaming on Social Networks
  145. Cloud Computing Technologies
  146. Google+ vs Facebook: The Comparison
  147. Teaching Java Programming using CABLE in a Collaborative Online Environment
  148. Google+ v Facebook: The Comparison
  149. Near Field Communication
  150. Probabilistic indoor human movement modeling to aid first responders
  151. Google+ v Facebook: The Comparison
  152. Guiding robots through wireless location positioning
  153. Innovative Applications of Ambient Intelligence
  154. The Future of Web and Mobile Game Development
  155. A practical network coding and routing scheme based on maximum flow combination
  156. A dynamic threshold approach for skin tone detection in colour images
  157. HABITS: a Bayesian filter approach to indoor tracking and location
  158. MANET Location Prediction Using Machine Learning Algorithms
  159. Man in the Browser Attacks
  160. Using acoustic sensors to discriminate between nasal and mouth breathing
  161. Innovative Applications of Ambient Intelligence
  162. OpenStreetMap
  163. WS-I* compliant web service SOAP message security performance
  164. HTML5 and the Mobile Web
  165. Mobility and delay in greedy geographic routing
  166. Support Vector Machine and Probability Neural Networks in a Device-Free Passive Localization (DFPL) Scenario
  167. Feeling Criminal in <i>Macbeth</i>
  168. Introduction
  169. Treasonous Silence:The Tragedy of Philotasand Legal Epistemology [with illustrations]
  170. Performance Comparison of Enterprise Applications on Mobile Operating Systems
  171. Good Practice for Strong Passwords
  172. A Bayesian Filter Approach to Modelling Human Movement Patterns for First Responders within Indoor Locations
  173. Embed, Track and Authenticate Images Online with SDW-WebCrawler
  174. Implementing the Payment Card Industry (PCI) Data Security Standard (DSS)
  175. Hospitable Justice: Law and Selfhood in Shakespeare’s Sonnets
  176. An evaluation of indoor location determination technologies
  177. MARTIN BUTLER, The Stuart Court Masque and Political Culture.
  178. A wireless approach to device-free localisation (DFL) for indoor environments
  179. Cloud Computing Security
  180. Context-aware support for assistive systems and services
  181. Radio Communication Protocols in a History Aware Device-free Passive (DfP) Localisation
  182. The Core Aspects of Search Engine Optimisation Necessary to Move up the Ranking
  183. The Problems of Jurisdiction on the Internet
  184. The Role of Augmented Reality within Ambient Intelligence
  185. The Role of Twitter in the World of Business
  186. Wearable Rehab Technology for Automatic Measurement of Patients with Arthritis
  187. Ubiquitous Developments in Ambient Computing and Intelligence
  188. History Aware Device-free Passive (DfP) Localisation
  189. Managing Step Changes in Information System Support: Lessons from an Industrial Study
  190. Learning indoor movement habits for predictive control
  191. Cheating in Exams with Technology
  192. Integrating geolocation into electronic finance applications for additional security
  193. Finger movement measurements in arthritic patients using wearable sensor enabled gloves
  194. Gabriel Heaton. Writing and Reading Royal Entertainments: From George Gascoigne to Ben Jonson. Oxford: Oxford University Press, 2010. x + 305 pp. index. illus. bibl. $99. ISBN: 978–0–19–921311–5.
  195. Web 2.0
  196. A Watermarking Based Tamper Detection Solution for RFID Tags
  197. A dynamic threshold approach for skin segmentation in color images
  198. Practical Network Coding Scheme Based on Maximum Flow Combination and Coding Node Identification
  199. Interplay between Foxd3 and Mitf regulates cell fate plasticity in the zebrafish neural crest
  200. 2-Arylureidophenyl-4-(3-oxa-8-azabicyclo[3.2.1]octan-8-yl)triazines as highly potent and selective ATP competitive mTOR inhibitors: Optimization of human microsomal stability
  201. Discovery of 2-ureidophenyltriazines bearing bridged morpholines as potent and selective ATP-competitive mTOR inhibitors
  202. Renaissance non-humanism: plants, animals, machines, matter
  203. A hash-based image encryption algorithm
  204. Digital image steganography: Survey and analysis of current methods
  205. Beyond Rapalog Therapy: Preclinical Pharmacology and Antitumor Activity of WYE-125132, an ATP-Competitive and Specific Inhibitor of mTORC1 and mTORC2
  206. Ambient Interface Design (AID) for the Ergonomically Challenged
  207. An Activity Monitoring Application for Windows Mobile Devices
  208. An Improved Self-embedding Algorithm: Digital Content Protection against Compression Attacks in Digital Watermarking
  209. Analysis of device-free localisation (DFL) techniques for indoor environments
  210. Context-Awareness in Ambient Intelligence
  211. Evaluation of Smoothing Algorithms for a RSSI-Based Device-Free Passive Localisation
  212. A Biologically Inspired Smart Camera for Use in Surveillance Applications
  213. Towards objectifying information hiding
  214. Mobile development environments for electronic finance
  215. Mobile Phone Forensic Analysis
  216. Automating Information Discovery Within the Invisible Web
  217. Design and Synthesis of Novel Diaminoquinazolines with in Vivo Efficacy for β-Catenin/T-Cell Transcriptional Factor 4 Pathway Inhibition
  218. A secure and improved self-embedding algorithm to combat digital document forgery
  219. A skin tone detection algorithm for an adaptive approach to steganography
  220. Incorporation of water-solubilizing groups in pyrazolopyrimidine mTOR inhibitors: Discovery of highly potent and selective analogs with improved human microsomal stability
  221. Morpholine Derivatives Greatly Enhance the Selectivity of Mammalian Target of Rapamycin (mTOR) Inhibitors
  222. Discovery of 4-Morpholino-6-aryl-1H-pyrazolo[3,4-d]pyrimidines as Highly Potent and Selective ATP-Competitive Inhibitors of the Mammalian Target of Rapamycin (mTOR): Optimization of the 6-Aryl Substituent
  223. A new colour space for skin tone detection
  224. Radio Frequency Identification for Educational Gaming using Mobile Devices
  225. Foxd3 controls melanophore specification in the zebrafish neural crest by regulation of Mitf
  226. ATP-Competitive Inhibitors of the Mammalian Target of Rapamycin: Design and Synthesis of Highly Potent and Selective Pyrazolopyrimidines
  227. Biochemical, Cellular, and In vivo Activity of Novel ATP-Competitive and Selective Inhibitors of the Mammalian Target of Rapamycin
  228. Automated measurements of finger movements in arthritic patients using a wearable data hand glove
  229. Letter to the editor
  230. Optimising mobile phone self-location estimates by introducing beacon characteristics to the algorithm
  231. Knowledge Networks
  232. WebOS – moving the operating system to the Web
  233. Computer hacking
  234. Adaptive mobile applications
  235. Cryptography
  236. Designing for the mobile Web
  237. Digital watermarking and steganography
  238. Honeynets
  239. Hybrid Web applications
  240. Improved Blind Watermarking of 3D Objects Based on Partition
  241. Internet protocols
  242. Introduction
  243. Javascript, XML, E4X and AJAX
  244. Mesh networking
  245. Mobile social software
  246. Podcasting, screencasting, blogging and videoblogging
  247. RFID-Enabled Location Determination Within Indoor Environments
  248. Really Simple Syndication (RSS)
  249. Summary
  250. The invisible Web
  251. The long tail
  252. The problem of spam email
  253. Vertical search engines
  254. VoiceXML
  255. Web 2.0
  256. Web intelligence
  257. Web services
  258. What causes delay in the Internet?
  259. Wireless 802.11 security
  260. Wireless sensor networks
  261. Worldwide interoperability for microwave access (WiMAX)
  262. Understanding the Internet
  263. Ambient Communication Experience (ACE)
  264. Ambient Middleware for Context-Awareness (AMiCA)
  265. An infrastructure for developing self-organising services
  266. Combating digital document forgery using new secure information hiding algorithm
  267. Securing information content using new encryption method and Steganography
  268. A computational intelligence method for traversing dynamically constructed networks of knowledge
  269. Pinpointing users with location estimation techniques and Wi-Fi hotspot technology
  270. Image Analysis for Online Dynamic Steganography Detection
  271. A formal logic approach to firewall packet filtering analysis and generation
  272. Artificial intelligence and networking
  273. Skin tone based Steganography in video files exploiting the YCbCr colour space
  274. Enhancing Steganography in Digital Images
  275. Investigating the Human Computer Interaction Problems with Automated Teller Machine (ATM) Navigation Menus
  276. Biometric Inspired Digital Image Steganography
  277. A multilingual mobile university information portal designed to cater for visiting overseas students
  278. Investigating the human computer interaction problems with automated teller machine navigation menus
  279. Disruption Tolerant Networking
  280. Cognitive Radio
  281. Autonomic Vehicles
  282. Digital Watermarking and Steganography
  283. Autonomic supervision of stigmergic self-organisation for distributed information retrieval
  284. A primer on radio frequency identification for libraries
  285. Investigating the problems faced by older adults and people with disabilities in online environments
  286. Identification of Anthranilic Acid Derivatives as a Novel Class of Allosteric Inhibitors of Hepatitis C NS5B Polymerase.
  287. Utilizing Stigmergy in Support of Autonomic Principles
  288. Utilizing Stigmergy in Support of Autonomic Principles
  289. ADDRESSING THE PROBLEMS OF DETECTING FACES WITH NEURAL NETWORKS
  290. Shakespeare and Daniel Revisited: Antony and Cleopatra II. v. 50 4 and The Tragedy of Philotas V. ii. 2013 15
  291. TeleMorph: A Fuzzy Logic Approach to Network-Aware Transmoding in Mobile Intelligent Multimedia Presentation Systems
  292. Taking the information to the public through Library 2.0
  293. Wireless Handheld Devices Become Trusted Network Devices
  294. The Long Tail
  295. Identification of Anthranilic Acid Derivatives as a Novel Class of Allosteric Inhibitors of Hepatitis C NS5B Polymerase
  296. Geographical Mashups
  297. Erotic Policy: King James, Thomas Campion, and the Rhetoric of Anglo-Scottish Marriage
  298. An RFID-enabled middleware architecture for urban gaming
  299. Challenges and research directions in autonomic communications
  300. Autonomic Supervision of Stigmergic Self-Organisation for Distributed Information Retrieval
  301. Bandwidth determined transmoding through fuzzy logic in mobile intelligent multimedia presentation systems
  302. An evaluation of image based steganography methods using visual inspection and automated detection techniques
  303. Introducing a light-weight autonomic network middleware based on stigmergic mechanisms
  304. Demonstrating the Wired Equivalent Privacy (WEP) Weaknesses Inherent in Wi-Fi Networks
  305. An evaluation of image based steganography methods
  306. Expressing emotion in electronic mail
  307. Involving the user Through Library 2.0
  308. Eliminating the Volume of Spam E-Mails Using a Hashcash-Based Solution
  309. Delivering Audio and Video with Rich Site Summary Enclosures
  310. Investigating text input methods for mobile phones
  311. A location-based mobile tourist guide
  312. Knowledge Networks
  313. Discovering Resources in Computational GRID Environments
  314. Resource discovery and management in computational GRID environments
  315. Scheduled RSS feeds for streaming multimedia to the desktop using RSS enclosures
  316. Intelligent information retrieval
  317. Examining the effects of caching, compression and popup filtering on internet surfing
  318. Neural network face detection
  319. Monitoring hacker activity with a Honeynet
  320. Transcoding media for bandwidth constrained mobile devices
  321. Understanding and reducing web delays
  322. Online Gaming
  323. An Investigation into the Use of the Least Significant Bit Substitution Technique in Digital Watermarking
  324. Introducing Song Form Intelligence into Streaming Audio
  325. Investigating Text Input Methods for Mobile Phones
  326. E-Democracy
  327. An Investigation into Factors Associated with Web Page Download Delay
  328. Exposing the Wired Equivalent Privacy Protocol Weaknesses in Wireless Networks
  329. Addressing Spam E-Mail Using Hashcast
  330. The Deployment of Protocol Stack Components Using Web Services
  331. Dynamic Reconfiguration of IP Domain Middleware Stacks to Support Multicast Multimedia Distribution in a Heterogeneous Environment
  332. The Use of Neural Networks in Real-time Face Detection
  333. Evaluation of pixel-based steganography and stegodetection methods
  334. Cyberart
  335. Civil Liberties and Computer Monitoring
  336. Web Intelligence in Information Retrieval
  337. Tips for Achieving High Positioning in the Results Pages of the Major Search Engines
  338. Understanding and Reducing Web Delays
  339. WikiWikiWeb as a Tool for Collaboration
  340. PMXML: An XML Vocabulary Intended for the Exchange of Task Planning and Tracking Information
  341. Mobile MultiModal presentation
  342. Design of a Tourist Driven Bandwidth Determined MultiModal Mobile Presentation System
  343. Introducing IP Domain Flexible Middleware Stacks for Multicast Multimedia Distribution in Heterogeneous Environments
  344. TELEMORPH: BANDWIDTH-DETERMINED MOBILE MULTIMODAL PRESENTATION
  345. Mesh Networking
  346. Identification of Small Molecule Compounds That Selectively Inhibit Varicella-Zoster Virus Replication
  347. The effects of badly behaved routers on Internet congestion
  348. Web Intelligence
  349. A Web-based collaboration teaching environment
  350. A decision support system for telecommunications
  351. A framework for the transmission of streaming media to mobile devices
  352. Adaptive Mobile Applications
  353. A paradigm shift in the distribution of multimedia
  354. Helpmate: A multimedia Web teaching framework
  355. Multiple multicast groups for multimedia on the Internet
  356. Internet Protocols
  357. Optimal multimedia transport on the Internet
  358. Dynamicmultimedia protocol stacks
  359. Cryptography
  360. Legal Developments in Marketing …
  361. Legal Developments in Marketing…
  362. Legal Developments in Marketing …
  363. Exclusive Dealing and Public Policy
  364. Social Networking
  365. Hackers, Hacking, and Eavesdropping
  366. Hacking and Eavesdropping
  367. Security Issues in Cloud Computing
  368. Recent Developments in Simplified Sign-On
  369. Autonomous Querying for Knowledge Networks
  370. Autonomic Computing
  371. Cryptography
  372. Cyber Terrorism Attacks
  373. Dynamically Adaptable Web Services Based on the Simple Object Access Protocol
  374. Electronic Surveillance and Civil Rights
  375. Multimedia for Mobile Devices
  376. Security Issues with Wi-Fi Networks
  377. The Semantic Web
  378. Web Services
  379. A location based wireless tourist guide
  380. Addressing WiFi Security Concerns
  381. Fighting the Problem of Unsolicited E-Mail Using a Hashcash Proof-of-Work Approach
  382. Prevalent Factors Involved in Delays Associated with Page Downloads
  383. Scheduled RSS feeds for streaming multimedia to the desktop using RSS enclosures
  384. Towards Pervasive Supervision for Autonomic Systems
  385. Automated broadcast media monitoring using the google API
  386. A middleware architecture for streaming media over IP networks to mobile devices
  387. Cyber Terrorism Attacks
  388. Hacking and Eavesdropping
  389. HTML5
  390. Hackers, Hacking, and Eavesdropping
  391. Social Networking
  392. Multimedia for Mobile Devices
  393. Multimedia for Mobile Devices
  394. Web Services
  395. Autonomic Computing
  396. Security Issues with Wi-Fi Networks
  397. The Semantic Web
  398. Addressing WiFi Security Concerns
  399. Multimedia for Mobile Devices
  400. Cryptography
  401. Mobile App Stores
  402. Cloud Computing Security
  403. Software Piracy
  404. Cloud Computing
  405. The Internet of Things
  406. Social Networking in Education
  407. Location-Based Social Networks
  408. Really Simple Syndication (RSS)
  409. OpenStreetMap
  410. The World of Podcasting, Screencasting, Blogging, and Videoblogging
  411. SPIT
  412. Glove-Based Technology in Hand Rehabilitation
  413. Social Networking
  414. Recent Developments in Simplified Sign-On
  415. Electronic Surveillance and Civil Rights
  416. The Role of Twitter in the World of Business
  417. The Role of Augmented Reality within Ambient Intelligence
  418. The Problems of Jurisdiction on the Internet
  419. The Core Aspects of Search Engine Optimisation Necessary to Move up the Ranking
  420. Internet Censorship in China
  421. Context Awareness in Mobile Devices
  422. The Rise of the Tablet
  423. Mobile Phone Forensic Analysis
  424. Context-Awareness in Ambient Intelligence
  425. Ambient Interface Design (AID) for the Ergonomically Challenged
  426. An Activity Monitoring Application for Windows Mobile Devices
  427. Proactive Context-Aware Middleware
  428. RFID-Enabled Location Determination within Indoor Environments
  429. Exposing the Wired Equivalent Privacy Protocol Weaknesses in Wireless Networks
  430. Cheating in Exams with Technology
  431. Knowledge-Based Reasoning Through Stigmergic Linking
  432. Developing Team Work in IT Education to Foster Student Engagement
  433. Common Problems Faced When Developing Applications for Mobile Devices
  434. A Literacy and Numeracy E-Learning Mobile Application for Pre-Schoolers
  435. A Literacy and Numeracy E-Learning Mobile Application for Pre-Schoolers
  436. Dynamically Adaptable Web Services Based on the Simple Object Access Protocol
  437. Fighting the Problem of Unsolicited E-Mail Using a Hashcash Proof-of-Work Approach
  438. Prevalent Factors Involved in Delays Associated with Page Downloads
  439. Exposing the Wired Equivalent Privacy Protocol Weaknesses in Wireless Networks
  440. The Challenges of Data Cleansing with Data Warehouses
  441. Ambient Communication Experience (ACE), Information Interaction in Design Space
  442. A Camera-Based System for Determining Hand Range of Movement Measurements in Rheumatoid Arthritis
  443. Using Leap Motion and Gamification to Facilitate and Encourage Rehabilitation for Hand Injuries:
  444. Introducing song form intelligence into streaming audio
  445. Web intelligence in information retrieval
  446. Adaptive Mobile Applications
  447. The use of dynamically reconfigurable protocol stacks for streaming multimedia to mobile devices
  448. Reliable remote isochronous applications over the Internet