1. Enhancing Service Federation Trustworthiness through Online Testing
2. Are Our Online "Friends" Really Friends?
3. Rural Outsourcing: Delivering ITO and BPO Services from Remote Domestic Locations
4. Using Process Mining to Bridge the Gap between BI and BPM
5. Are Password Requirements too Difficult?
6. Turning on the Lights for Wireless Communications
7. The iPlant Collaborative: Cyberinfrastructure to Feed the World
8. Defending against Buffer-Overflow Vulnerabilities
9. Human Ear Recognition
10. Securing the Internet of Things
11. OpenFlow: The Next Generation of the Network?
12. Using Data Mining to Help Design Sustainable Products
13. Biomedical Visual Computing: Case Studies and Challenges
14. Motivation, Awareness, and Perceptions of Computational Science
15. XML Management for Bioinformatics Applications
16. Climate Change Modeling: Computational Opportunities and Challenges
17. Improving Face Recognition Performance Using RBPCA MaxLike and Information Fusion
18. Video-Based Distance Traffic Analysis: Application to Vehicle Tracking and Counting
19. Buying a House, Then and Now
20. Mentoring and Making a Difference: What Can One Person Do?
21. NaturaSketch: Modeling from Images and Natural Sketches
22. Photosketcher: Interactive Sketch-Based Image Synthesis
23. 3D Rotations
24. The Third Wave in Computer Graphics and Interactive Techniques
25. Computer Graphics: From Desktop to Mobile and Web
26. How the Ocean Personality Model Affects the Perception of Crowds
27. Enabling Web Services to Consume and Produce Large Datasets
28. Changing the World
29. Public Sector Clouds Beginning to Blossom: Efficiency, New Culture Trumping Security Fears
30. A Framework for Integrating, Exploring, and Searching Location-Based Web Data
31. Toward Lossless Video Transport
32. Securing Database as a Service: Issues and Compromises
33. Operations with Degraded Security
34. Cloud Computing: A Records and Information Management Perspective
35. Small Is Beautiful, Big Is Inevitable
36. Detecting Fraud on Websites
37. Understanding Cloud Computing Vulnerabilities
38. Verification, Validation, and Evaluation in Information Security Risk Management
39. Monitoring Cloud Computing by Layer, Part 1
40. Securing E-passports with Elliptic Curves
41. Model-Based Testing
42. Access Control in JavaScript
43. Requirements Analysis: The Next Generation
No comments:
Post a Comment