On-line Collaborative Learning for In-service Teacher Education
Author(s): Ana Cristina B. Salomão
Volume: 3
Issue: 4
Year: 2011




Optimization of Spectrum Management Issues for Cognitive Radio (Invited Paper)
Author(s): G. Singh
Volume: 3
Issue: 4
Year: 2011




BlogBrain Ops: Proposal for a Semi-automatic Social Web Mining and Cyberinfluence Decision-support Tool for Info Ops Teams
Author(s): Maged N. Kamel Boulos
Volume: 3
Issue: 4
Year: 2011




Design and Development of a Component-Based System for Virtual Patients in the Virtual World of Second Life®
Author(s): Maria Toro-Troconis | Ashwin Kamat | Martyn R Partridge
Volume: 3
Issue: 4
Year: 2011




Web 2.0 Support for Activity Led Learning in Computer Science
Author(s): Rahat Iqbal | Lisa Payne | Anne James | Peter Every | Michael Odetayo
Volume: 3
Issue: 4
Year: 2011




Framework for Key Management Scheme in Heterogeneous Wireless Sensor Networks
Author(s): Kamal Kumar | A. K. Verma | R. B. Patel
Volume: 3
Issue: 4
Year: 2011




Reconfigurable Multimedia Environment
Author(s): Patrick Holroyd | Phil Watten | Paul Newbury
Volume: 3
Issue: 4
Year: 2011




A Serious Game for Training Health Care Providers in Interprofessional Care of Critically-Ill and Chronic Care Patients
Author(s): Bill Kapralos | Corrine Johnston | Ken Finney | Adam Dubrowski
Volume: 3
Issue: 4
Year: 2011




Integrating Positional and Slotted Knowledge on the Semantic Web
Author(s): Harold Boley
Volume: 2
Issue: 4
Year: 2010




iTAG: Automatically Annotating Textual Resources with Human Intentions
Author(s): Mark Kröll | Christian Körner | Markus Strohmaier
Volume: 2
Issue: 4
Year: 2010




A Two-stage Information Filtering Based on Rough Decision Rule and Pattern Mining
Author(s): Xujuan Zhou | Yuefeng Li | Peter Bruza | Yue Xu | Raymond Lau
Volume: 2
Issue: 4
Year: 2010




Measurement of Trust Transitivity in Trustworthy Networks
Author(s): Yixiang Chen | Tian-Ming Bu | Min Zhang | Hong Zhu
Volume: 2
Issue: 4
Year: 2010




A Trust Model for Multiagent Recommendations
Author(s): Fabiana Lorenzi | Gabriel Baldo | Rafael Costa | Mara Abel | Ana Bazzan | Francesco Ricci
Volume: 2
Issue: 4
Year: 2010




Elevating Prediction Accuracy n Trust-aware Collaborative Filtering Recommenders through T-index Metric and TopTrustee Lists
Author(s): Soude Fazili | Alireza Zarghami | Nima Dokoohaki | Mihhail Matskin
Volume: 2
Issue: 4
Year: 2010




A Survey on the Relationship between Trust and Interest Similarity in Online Social Networks
Author(s): Touhid Bhuiyan
Volume: 2
Issue: 4
Year: 2010




Constraint-Based Recommendation for Software Project Effort Estimation
Author(s): Bernhard Peischl | Markus Zanker | Mihai Nica | Wolfgang Schmid
Volume: 2
Issue: 4
Year: 2010




A Hybrid Recommender System Guided by Semantic User Profiles for Search in the E-learning Domain
Author(s): Leyla Zhuhadar | Olfa Nasraoui
Volume: 2
Issue: 4
Year: 2010




Recommender Systems for Web Intelligence
Author(s): Yue Xu | Yuefeng Li | Audun Jøsang
Volume: 2
Issue: 4
Year: 2010




Guest Editorial
Author(s): Mohammad Al-Rousan | Wei Li | Ahmed Al-Dubai
Volume: 2
Issue: 3
Year: 2010




Introducing the New Associate Editor-in-Chief
Author(s): Sabah Mohammed
Volume: 2
Issue: 3
Year: 2010




A Survey of Text Summarization Extractive Techniques
Author(s): Vishal Gupta | Gurpreet Singh Lehal
Volume: 2
Issue: 3
Year: 2010




Towards Intelligent Ontology Alignment Systems for Question Answering: Challenges and Roadblocks
Author(s): Maria Vargas-Vera | Miklos Nagy
Volume: 2
Issue: 3
Year: 2010




Appliance Controlling Using IPAC
Author(s): Sandeep Kumar | Saiful Islam | Archana Gupta | Himanshu Bhardwaj
Volume: 2
Issue: 3
Year: 2010




A New Approach in Requirements Elicitation Analysis
Author(s): William J. Tastle | Amjad Abdullat | Mark J. Wierman
Volume: 2
Issue: 3
Year: 2010




Requirements Engineering in Agile Software Development
Author(s): Andrea De Lucia | Abdallah Qusef
Volume: 2
Issue: 3
Year: 2010




Drivers of E-Government and E-Business in Jordan
Author(s): Rand A. Obeidat | Emad A. Abu-Shanab
Volume: 2
Issue: 3
Year: 2010




Development of a Recommender System based on Extending Contexts of Content and Personal History
Author(s): Katsuaki Tanaka | Koichi Hori | Masato Yamamoto
Volume: 2
Issue: 3
Year: 2010




Reuse and Remix: Content Recomposition System based on Automatic Draft Generation
Author(s): Kosuke Numa | Katsuaki Tanaka | Mina Akaishi | Koichi Hori
Volume: 2
Issue: 3
Year: 2010




Commercial Activities through Mobile Phone Distributed Processing Integrated With Mobile Agents
Author(s): Meisam Hejazinia | Mohammadreza Razzazi
Volume: 2
Issue: 3
Year: 2010




On-line Retrieval and Management System based on Wireless Communications for Schools
Author(s): Adnan A. Tala’a
Volume: 2
Issue: 3
Year: 2010




Pattern and spoiled pattern detection through an information retrieval approach
Author(s): Nadia Bouassida | Hanêne Ben-Abdallah
Volume: 2
Issue: 3
Year: 2010




A Novel Class-Based Data Fusion Technique for Information Retrieval
Author(s): Muath Alzghool | Diana Inkpen
Volume: 2
Issue: 3
Year: 2010




Discovery of Popular Structural Properties in a Website for Personalization and Adaptation
Author(s): Haider Ramadhan Al-Lawati | Ahmed Al-Hosni | Abdullah Al-Hamadani | Mohammad Al-Badawi
Volume: 3
Issue: 3
Year: 2011




Linking Objects and their Stories: An API For Exploring Cultural Heritage Using Formal Concept Analysis
Author(s): Peter Eklund | Tim Wray | Jon Ducrou
Volume: 3
Issue: 3
Year: 2011




AERIA: Extending SKOS for the Practical, yet Well-founded, Representation and Integration of Web Schemas in the Large
Author(s): Matteo Palmonari
Volume: 3
Issue: 3
Year: 2011




Collective Intelligence Systems: Classification and Modeling
Author(s): Ioanna Lykourentzou | Dimitrios J. Vergados | Epaminondas Kapetanios | Vassili Loumos
Volume: 3
Issue: 3
Year: 2011




Queries Routing In Super-Peer-Based System: Simulation and Evaluation
Author(s): Anis Ismal | Mohamed Quafafou | Gilles Nachouki | Mohammad Hajjar
Volume: 3
Issue: 3
Year: 2011




A Digital Ecosystem for Co-Creating Business with People
Author(s): Kimmo Karhu | Andrea Botero | Sami Vihavainen | Tingan Tang | Matti Hämäläinen
Volume: 3
Issue: 3
Year: 2011




A Set Theory Analysis of Ecological Dependence amid an Agent Infrastructure in Beer’s Viable System Model through Viable Computer Systems
Author(s): Ruth Thompson | Andrew Laws | Denis Reilly | Azzelarabe Taleb-Bendiab | David Llewellyn-Jones
Volume: 3
Issue: 3
Year: 2011




A System for Centralizing Online Reputation
Author(s): Morad Benyoucef | Hui Li | Gregor v. Bochmann
Volume: 3
Issue: 3
Year: 2011




Evolving Polynomials of the Inputs for Decision Tree Building
Author(s): Chris J. Hinde | Anoud I. Bani-Hani | Thomas W. Jackson | Yen P. Cheung
Volume: 4
Issue: 2
Year: 2012




The Developing Economies’ Banks Branches Operational Strategy in the Era of E-Banking: The Case of Jordan
Author(s): Yazan Khalid Abed-Allah Migdadi
Volume: 4
Issue: 2
Year: 2012




Aggregated Search in XML Documents
Author(s): Fatma Zohra Bessai-Mechmache | Zaia Alimazighi
Volume: 4
Issue: 2
Year: 2012




Context-oriented Software Development
Author(s): Basel Magableh | Stephen Barrett
Volume: 4
Issue: 2
Year: 2012




ConTest: A GUI-Based Tool to Manage Internet-Scale Experiments over PlanetLab
Author(s): Basheer Al-Duwairi | Mohammad Marei | Malek Ireksossi | Belal Rehani
Volume: 4
Issue: 2
Year: 2012




Adaptive Backoff Algorithm for Wireless Internet
Author(s): Muneer O. Bani Yassein | Saher S. Manaseer | Ahmad A. Momani
Volume: 4
Issue: 2
Year: 2012




Semantic Approach for the Spatial Adaptation of Multimedia Documents
Author(s): Azze-Eddine Maredj | Nourredine Tonkin
Volume: 4
Issue: 2
Year: 2012




Adaptive FEC Technique for Multimedia Applications Over the Internet
Author(s): Mohammad AL-Rousan | Ahamd Nawasrah
Volume: 4
Issue: 2
Year: 2012




Vision-based Presentation Modeling of Web Applications: A Reverse Engineering Approach
Author(s): Natheer Khasawneh | Oduy Samarah | Safwan Al-Omari | Stefan Conrad
Volume: 4
Issue: 2
Year: 2012




MALURLS: A Lightweight Malicious Website Classification Based on URL Features
Author(s): Monther Aldwairi | Rami Alsalman
Volume: 4
Issue: 2
Year: 2012




The Boundaries of Natural Language Processing Techniques in Extracting Knowledge from Emails
Author(s): Thomas W. Jackson | Sara Tedmori | Chris J. Hinde | Anoud I. Bani-Hani
Volume: 4
Issue: 2
Year: 2012




An Architecture for Integrated Online Analytical Mining
Author(s): Muhammad Usman | Sohail Asghar
Volume: 3
Issue: 2
Year: 2011




The Six Technical Gaps between Intelligent Applications and Real-Time Data Mining: A Critical Review
Author(s): Simon Fong | Hang Yang
Volume: 3
Issue: 2
Year: 2011




Protecting Data from the Cyber Theft – a Virulent Disease
Author(s): S. N. Panda | Vikram Mangla
Volume: 2
Issue: 2
Year: 2010




Web Based Hindi to Punjabi Machine Translation System
Author(s): Vishal Goyal | Gurpreet Singh Lehal
Volume: 2
Issue: 2
Year: 2010




Multistage Interconnection Networks: A transition from Electronic to Optical
Author(s): Rinkle Rani Aggarwal | Lakhwinder Kaur | Himanshu Aggarwal
Volume: 2
Issue: 2
Year: 2010




Webinar – Education through Digital Collaboration
Author(s): Anuradha Verma | Anoop Singh
Volume: 2
Issue: 2
Year: 2010




SDR and Error Correction using Convolution Encoding with Viterbi Decoding
Author(s): Shriram K. Vasudevan, | Siva Janakiraman, | Subashri Vasudevan
Volume: 2
Issue: 2
Year: 2010




Recovery Based Architecture to Protect Hids Log Files using Time Stamps
Author(s): Surinder Singh Khurana | Divya Bansal | Sanjeev Sofat
Volume: 2
Issue: 2
Year: 2010




Broadband Integrated Services over Proposed Open CPE Architecture
Author(s): Kushal Roy
Volume: 2
Issue: 2
Year: 2010




Copyright Protection of Gray Scale Images by Watermarking Technique using (N,N) Secret Sharing Scheme
Author(s): Sushma Yalamanchili | M. Kameswara Rao
Volume: 2
Issue: 2
Year: 2010




Investigation of Blackhole Attack on AODV in MANET
Author(s): Anu Bala | Raj Kumari | Jagpreet Singh
Volume: 2
Issue: 2
Year: 2010




Distance and Frequency based Route Stability Estimation in Mobile Adhoc Networks
Author(s): Ajay Koul | R. B. Patel | V. K. Bhat
Volume: 2
Issue: 2
Year: 2010




Bee-Inspired Routing Protocols for Mobile Ad HOC Network (MANET)
Author(s): Deepika Chaudhary
Volume: 2
Issue: 2
Year: 2010




Performance of Dominating and Adaptive Partial Dominating Sets in AODV Routing protocol for MANETs
Author(s): A. Nagaraju, | S. Ramachandram, | B. Eswar
Volume: 2
Issue: 2
Year: 2010




Improving Graph-based Approaches for Personalized Tag Recommendation
Author(s): Maryam Ramezani
Volume: 3
Issue: 2
Year: 2011




Allocation Schemes, Architectures, and Policies for Collaborative Port Scanning Attacks
Author(s): Yu Zhang | Bharat Bhargava
Volume: 3
Issue: 2
Year: 2011




Development of Online Counseling System and Usability Evaluation
Author(s): Chieko Kato | Yasunori Shiono | Takaaki Goto | Kensei Tsuchida
Volume: 3
Issue: 2
Year: 2011




Trend Following Algorithms for Technical Trading in Stock Market
Author(s): Simon Fong | Jackie Tai | Yain Whar Si
Volume: 3
Issue: 2
Year: 2011




Evaluation of Semantic Web Services: Before and After Applying in Telecommunication
Author(s): Aakif Nazeer Khan | Sohail Asghar | Simon Fong
Volume: 3
Issue: 2
Year: 2011




Framework of integrated Semantic Web Services and Ontology Development for Telecommunication Industry
Author(s): Aakif Nazeer Khan | Sohail Asghar | Simon Fong
Volume: 3
Issue: 2
Year: 2011




Data Mining for Resource Planning and QoS Supports in GSM Networks
Author(s): Simon Fong
Volume: 3
Issue: 2
Year: 2011




Privacy Based Information Brokering for Cooperative Distributed e-Health Systems
Author(s): AbdulMutalib Masaud-Wahaishi | Hamada Ghenniwa
Volume: 1
Issue: 2
Year: 2009




eHealth Interoperability with Web-based Medical Terminology Services - A Study of Service Requirements and Maturity
Author(s): Neil Barrett | Jens H. Weber-Jahnke
Volume: 1
Issue: 2
Year: 2009




Securely Streaming SVG Web-Based Electronic Healthcare Records involving Android Mobile Clients
Author(s): Sabah Mohammed | Jinan Fiaidhi | Osama Mohammed
Volume: 1
Issue: 2
Year: 2009




Toward Web-based Careflow Management Systems
Author(s): Keith Miller | Wendy MacCaull
Volume: 1
Issue: 2
Year: 2009




An eBusiness-based Framework for eHealth Interoperability
Author(s): Craig E. Kuziemsky | Jens H. Weber-Jahnke
Volume: 1
Issue: 2
Year: 2009




An Agent-based Knowledge Management Framework for Electronic Health Record Interoperability
Author(s): Fang Cao | Norm Archer | Skip Poehlman
Volume: 1
Issue: 2
Year: 2009




Event-Driven Data Integration for Personal Health Monitoring
Author(s): Alain Mouttham | Liam Peyton | Ben Eze | Abdulmotaleb El Saddik
Volume: 1
Issue: 2
Year: 2009




Towards E-Health Interoperability: Challenges, Perspectives and Solutions
Author(s): Craig E. Kuziemsky | Norm Archer | Liam Peyton
Volume: 1
Issue: 2
Year: 2009




Guest Editorial
Author(s): Seiji Yamada | Takashi Onoda | Yasufumi Takama
Volume: 4
Issue: 1
Year: 2012




Internationally Distributed Living Labs and Digital Ecosystems for Fostering Local Innovations in Everyday Life
Author(s): Tingan Tang | Zhenyu Wu | Kimmo Karhu | Matti Hämäläinen | Yang Ji
Volume: 4
Issue: 1
Year: 2012




Monitoring Propagations in the Blogosphere for Viral Marketing
Author(s): Meichieh Chen | Neil Rubens | Fumihiko Anma | Toshio Okamoto
Volume: 4
Issue: 1
Year: 2012




Similar Document Search and Recommendation
Author(s): Vidhya Govindaraju | Krishnan Ramanathan
Volume: 4
Issue: 1
Year: 2012




Framework of Competitor Analysis by Monitoring Information on the Web
Author(s): Simon Fong
Volume: 4
Issue: 1
Year: 2012




Distance-Based Scheme for Vertical Handoff in Heterogeneous Wireless Networks
Author(s): Wail Mardini | Musab Q. Al-Ghadi | Ismail M. Ababneh
Volume: 4
Issue: 1
Year: 2012




Measuring Emotions from Online News and Evaluating Public Models from Netizens’ Comments: A Text Mining Approach
Author(s): Simon Fong
Volume: 4
Issue: 1
Year: 2012




Careful Seeding Method based on Independent Components Analysis for k-means Clustering
Author(s): Takashi Onoda | Miho Sakai | Seiji Yamada
Volume: 4
Issue: 1
Year: 2012




Graph-cut based Constrained Clustering by Grouping Relational Labels
Author(s): Masayuki Okabe | Seiji Yamada
Volume: 4
Issue: 1
Year: 2012




Which is the best?: Re-ranking Answers Merged from Multiple Web Sources
Author(s): Hyo-Jung Oh | Pum-Mo Ryu | Hyunki Kim
Volume: 4
Issue: 1
Year: 2012




Balancing the Trade-Offs Between Diversity and Precision for Web Image Search Using Concept-Based Query Expansion
Author(s): Enamul Hoque | Orland Hoeber | Minglun Gong
Volume: 4
Issue: 1
Year: 2012




Computational Approach to Prediction of Attitude Change Through eWOM Messages Involving Subjective Rank Expressions
Author(s): Kazunori Fujimoto
Volume: 4
Issue: 1
Year: 2012




Co-Authorship Networks Visualization System for Supporting Survey of Researchers’ Future Activities
Author(s): Takeshi Kurosawa | Yasufumi Takama
Volume: 4
Issue: 1
Year: 2012




Web Ontology Language Design and Related Tools: A Survey
Author(s): Farheen Siddiqui | M. Afshar Alam
Volume: 3
Issue: 1
Year: 2011




Knowledge Building in User-Generated Online Virtual Realities
Author(s): Johannes Moskaliuk | Joachim Kimmerle | Ulrike Cress | Friedrich W. Hesse
Volume: 3
Issue: 1
Year: 2011




CTGaming: A Problem-Oriented Registry for Clinical TeleGaming Rehabilitation and Intervention
Author(s): Daniel Lockery | James F. Peters | Carl Taswell
Volume: 3
Issue: 1
Year: 2011




An Interactive Tool for Human Active Learning in Constrained Clustering
Author(s): Masayuki Okabe | Seiji Yamada
Volume: 3
Issue: 1
Year: 2011




Detecting a Multi-Level Content Similarity from Microblogs based on Community Structures and Named Entities
Author(s): Swit Phuvipadawat | Tsuyoshi Murata
Volume: 3
Issue: 1
Year: 2011




Investigating User Behavior in Document Similarity Judgment for Interactive Clustering-based Search Engines
Author(s): Minghuang Chen | Seiji Yamada | Yasufumi Takama
Volume: 3
Issue: 1
Year: 2011




Intelligent Web Interactions
Author(s): Tsuyoshi Murata | Seiji Yamada
Volume: 3
Issue: 1
Year: 2011




Medium-term Client-Perceived Performance Prediction
Author(s): Niko Thio | Shanika Karunasekera
Volume: 2
Issue: 1
Year: 2010




e-Text Watermarking: Utilizing 'Kashida' Extensions in Arabic Language Electronic Writing
Author(s): Adnan Abdul-Aziz Gutub | Fahd Al-Haidari | Khalid M. Al-Kahsah | Jamil Hamodi
Volume: 2
Issue: 1
Year: 2010




Integrating Ontologies into Multi-Agent Systems Engineering (MaSE) for University Teaching Environment
Author(s): Prashant M. Dolia
Volume: 2
Issue: 1
Year: 2010




Implementation of Web Ontology and Semantic Application for Electronic Journal Citation System
Author(s): Riri Fitri Sari | Nuriana Ayuningtyas
Volume: 2
Issue: 1
Year: 2010




The Function of Intrinsic and Extrinsic Motivation in Educational Virtual Games and Simulations (Rising Scholar Paper)
Author(s): George D. Konetes
Volume: 2
Issue: 1
Year: 2010




Connexions: a Social and Successful Anomaly among Learning Object Repositories
Author(s): Xavier Ochoa
Volume: 2
Issue: 1
Year: 2010




A 2-tiers p2p Architecture to Navigate the Learning Objects Sea
Author(s): Andrea Clematis | Paola Forcheri | Alfonso Quarati
Volume: 2
Issue: 1
Year: 2010




Wiki and Threaded Discussion for Online Collaborative Activities: Students’ Perceptions and Use
Author(s): Andri Ioannou | Anthony R. Artino, Jr.
Volume: 1
Issue: 1
Year: 2009




On-line Education, More Than One-way Education?
Author(s): Martin Stigmar | Peter Karlsudd
Volume: 1
Issue: 1
Year: 2009




Radio Frequency Identification for Educational Gaming using Mobile Devices
Author(s): Kevin Curran | Martin Porter
Volume: 1
Issue: 1
Year: 2009




An Ontology Enhancement Framework to Accommodate Imprecise Concepts and Relations
Author(s): Muhammad Abulaish
Volume: 1
Issue: 1
Year: 2009




Introducing JETWI Associate Editor-in-Chiefs
Author(s): Sabah Mohammed
Volume: 1
Issue: 1
Year: 2009




Pixel Indicator Technique for RGB Image Steganography
Author(s): Adnan Abdul-Aziz Gutub
Volume: 2
Issue: 1
Year: 2010




Introduction to the Special Issue on Learning and the Social Web
Author(s): Daniel Lemire | Richard Hotte
Volume: 2
Issue: 1
Year: 2010




A Heuristic Based Approach for Improving Website Link Structure and Navigation
Author(s): Haider A Ramadhan
Volume: 1
Issue: 1
Year: 2009




P2P-NetPay: An Off-line Micro-payment System for Content Sharing in P2P-Networks
Author(s): Kaylash Chaudhary | Xiaoling Dai
Volume: 1
Issue: 1
Year: 2009




TANGRAM for Personalized Learning Using the Semantic Web Technologies
Author(s): Jelena Jovanovic | Dragan Gašević | Vladan Devedžić
Volume: 1
Issue: 1
Year: 2009




Semantic Wikis: A Comprehensible Introduction with Examples from the Health Sciences
Author(s): Maged N. Kamel Boulos
Volume: 1
Issue: 1
Year: 2009




A Survey of Text Mining Techniques and Applications
Author(s): Vishal Gupta | Gurpreet S. Lehal
Volume: 1
Issue: 1
Year: 2009




Remote Presence: Technologies for ‘Beaming’ Teachers Where They Cannot Go
Author(s): Sugata Mitra
Volume: 1
Issue: 1
Year: 2009



