Abstract is missing.
- Biometric Privacy Protection: Guidelines and TechnologiesRuggero Donida Labati, Vincenzo Piuri, Fabio Scotti. 3-19 [doi]
- Face Recognition in Uncontrolled Environments, Experiments in an AirportCristina Conde, Isaac Martín de Diego, Enrique Cabello. 20-32 [doi]
- Paradigms of Distributed Software Systems: Services, Processes and Self-organizationWinfried Lamersdorf. 33-40 [doi]
- A Wildfire Prediction Based on Fuzzy Inference System for Wireless Sensor NetworksVirginia G. Gasull, D. F. Larios, Julio Barbancho, Carlos León 0001, Mohammad S. Obaidat. 43-59 [doi]
- Evaluating Super Node Selection and Load Balancing in P2P VoIP Networks Using Stochastic Graph TransformationAjab Khan, Reiko Heckel. 60-73 [doi]
- Shared Security: How Wireless Sensor Networks Can Benefit from Threshold CryptographyManuel Koschuch, Matthias Hudler, Michael Krüger, Peter Lory, Jürgen Wenzl. 74-81 [doi]
- Selection of Information-Intensive Services: A Multi-criteria Decision ModelTobias Mettler, Markus Eurich. 85-99 [doi]
- Territorial Safety NetworksMartin Steinhauser, Andreas C. Sonnenbichler, Andreas Geyer-Schulz. 100-114 [doi]
- Killer Applications for Fiber to the Home Networks: Market Potential, Time Horizons and User GroupsTom Evens, Elke Boudry, Pieter Verdegem, Lieven De Marez, Erik Vanhauwaert, Koen Casier, Jan Van Ooteghem, Sofie Verbrugge. 115-128 [doi]
- To Bid or Not To Bid? Investigating Retail-Brand Keyword Performance in Sponsored Search AdvertisingTobias Blask, Burkhardt Funk, Reinhard Schulte. 129-140 [doi]
- Client-Oriented Preferences Model for QoS Aggregation in Service-Based ApplicationsNabil Fakhfakh, Frédéric Pourraz, Hervé Verjus, Patrice Moreaux. 141-155 [doi]
- An Answer to "Who Needs a Stylus?" on Handwriting Recognition on Mobile DevicesAndreas Holzinger, Gig Searle, Bernhard Peischl, Matjaz Debevc. 156-167 [doi]
- Application of Metamorphic Testing to a Case Study in Web Services CompositionsCarmen Castro-Cabrera, Inmaculada Medina-Bulo. 168-181 [doi]
- Time Stretching of UWB Radio Signals Using a Photonic Analogue-to-Digital Converter System Based on Wavelength Division MultiplexingTiago Alves, Adolfo V. T. Cartaxo. 185-199 [doi]
- Spam Filtering through Anomaly DetectionIgor Santos, Carlos Laorden, Xabier Ugarte-Pedrero, Borja Sanz, Pablo García Bringas. 203-216 [doi]
- On the Feasibility of Malware Attacks in Smartphone PlatformsAlexios Mylonas, Stelios Dritsas, Bill Tsoumas, Dimitris Gritzalis. 217-232 [doi]
- Revocation and Tracing Based on Ternary Tree: Towards Optimal Broadcast Encryption SchemeKazuhide Fukushima, Shinsaku Kiyomoto, Yutaka Miyake, Kouichi Sakurai. 233-248 [doi]
- Accelerating Reduction for Enabling Fast Multiplication over Large Binary FieldsSaptarsi Das, Ranjani Narayan, Soumitra Kumar Nandy. 249-263 [doi]
- A Related-Key Attack against Multiple Encryption Based on Fixed PointsAsli Bay, Atefeh Mashatan, Serge Vaudenay. 264-280 [doi]
- Byte Slicing Grøstl: Improved Intel AES-NI and Vector-Permute Implementations of the SHA-3 Finalist GrøstlKazumaro Aoki, Krystian Matusiewicz, Günther Roland, Yu Sasaki, Martin Schläffer. 281-295 [doi]
- Attack Interference: A Path to Defending Security ProtocolsMaria-Camilla Fiazza, Michele Peroli, Luca Viganò 0001. 296-314 [doi]
- A Framework for Dynamic Optimization of Security and PerformancesAntonio Vincenzo Taddeo, Luis Germán García Morales, Alberto Ferrante. 315-329 [doi]
- Broadcast Authentication in a Low Speed Controller Area NetworkBogdan Groza, Pal-Stefan Murvay. 330-344 [doi]
- Efficiently Managing Multimedia Hierarchical Data with the WINDSURF LibraryIlaria Bartolini, Marco Patella, Guido Stromei. 347-361 [doi]
- A Method of Real-Time Non-uniform Speech StretchingAdam Kupryjanow, Andrzej Czyzewski. 362-373 [doi]
- Decoding of LDPC-Based 2D-Barcodes Using a 2D-Hidden-Markov-ModelWolfgang Proß, Franz Quint, Marius Otesteanu. 374-387 [doi]
- A Comparative Evaluation of Gaussian Multiscale Aggregation for Hand BiometricsAlberto de Santos Sierra, Carmen Sánchez Ávila, Javier Guerra Casanova, Gonzalo Bailador del Pozo. 388-399 [doi]
- Touching Character Segmentation Method of Archaic Lanna ScriptSakkayaphop Pravesjit, Arit Thammano. 400-408 [doi]
- Small and Large Vocabulary Speech Recognition of MP3 Data under Real-Word Conditions: Experimental StudyPetr Pollák, Michal Borsky. 409-419 [doi]
- Weight Based Fast Mode Decision for H.264/AVC Video Coding StandardAmrita Ganguly, Anil Mahanta. 420-431 [doi]
- Investigation and Improved Configuration Settings for H.264 CGS/MGS Quality Scalable CodingShih-Hsuan Yang, Wei-Lune Tang. 432-445 [doi]
- Downlink Multiuser MIMO-OFDM SystemsSebastian Aust, Andreas Ahrens, Francisco Cano-Broncano, César Benavente-Peces. 449-463 [doi]
- Experience in Deploying a Wireless Sensor Network in a VineyardJosé Antonio Gay-Fernández, Iñigo Cuiñas. 464-476 [doi]
- Experimental Detection and Synchronisation Validation for a TR-UWB System Based on the Time Delayed Sampling and Correletion SchemeJorge A. Pardiñas-Mir, Muriel Muller, Roger Lamberti, Claude Gimenes. 477-491 [doi]
- Link Adaptation in Ad Hoc Networks Based on Interference MinimizationFredrick Mzee Awuor, Karim Djouani, Kimutai Kimeli, Dorothy A. Rambim. 492-502 [doi]
- Unidirectional Traffic Flow to Protect Wireless Sensor Networks against Byzantine AttacksBjörn Stelte. 503-518 [doi]
- Successive Interference Cancellation for Multi-user MIMO-OFDM Ad-Hoc Networks: A Performance-Complexity TradeoffNikolaos I. Miridakis, Dimitrios D. Vergados. 519-533 [doi]