Loading…
Loading…
Independent and Personal SMS Spam Filtering
Nuruzzaman, M. T., Changmoo Lee, Deokjai Choi
Published in 2011 IEEE 11th International Conference on Computer and Information Technology (01.08.2011)
Published in 2011 IEEE 11th International Conference on Computer and Information Technology (01.08.2011)
Get full text
Conference Proceeding
Loading…
An Efficient Role Based Access Control System for Cloud Computing
Zhu Tianyi, Liu Weidong, Song Jiaxing
Published in 2011 IEEE 11th International Conference on Computer and Information Technology (01.08.2011)
Published in 2011 IEEE 11th International Conference on Computer and Information Technology (01.08.2011)
Get full text
Conference Proceeding
Loading…
Cloud Computing: Characteristics and Deployment Approaches
Mahmood, Z.
Published in 2011 IEEE 11th International Conference on Computer and Information Technology (01.08.2011)
Published in 2011 IEEE 11th International Conference on Computer and Information Technology (01.08.2011)
Get full text
Conference Proceeding
Loading…
Flexible Homecare Application Personalization and Integration Using Pattern-Based Service Tailoring: Supporting Independent Living of Elderly with IT
Eslami, M. Z., Zarghami, A., Sapkota, B., van Sinderen, M.
Published in 2011 IEEE 11th International Conference on Computer and Information Technology (01.08.2011)
Published in 2011 IEEE 11th International Conference on Computer and Information Technology (01.08.2011)
Get full text
Conference Proceeding
Loading…
The Elderly Fall Risk Assessment and Prediction Based on Gait Analysis
Susu Jiang, Bofeng Zhang, Daming Wei
Published in 2011 IEEE 11th International Conference on Computer and Information Technology (01.08.2011)
Published in 2011 IEEE 11th International Conference on Computer and Information Technology (01.08.2011)
Get full text
Conference Proceeding
Loading…
Keynote Addresses
Psarris, Kleanthis
Published in 2011 IEEE 11th International Conference on Computer and Information Technology (01.08.2011)
Published in 2011 IEEE 11th International Conference on Computer and Information Technology (01.08.2011)
Get full text
Conference Proceeding
Loading…
Wavelet Filter Bank-Based Non Uniform Multi-tone Transceiver for Digital Subscriber Line
Mustafa, S., Hikmat, V., Shekha, S.
Published in 2011 IEEE 11th International Conference on Computer and Information Technology (01.08.2011)
Published in 2011 IEEE 11th International Conference on Computer and Information Technology (01.08.2011)
Get full text
Conference Proceeding
Loading…
Scalable Wide-Area Multicast with Temporal Rate Filtering Distribution Framework
Gjermundrod, H., Hauser, C., Bakken, D.
Published in 2011 IEEE 11th International Conference on Computer and Information Technology (01.08.2011)
Published in 2011 IEEE 11th International Conference on Computer and Information Technology (01.08.2011)
Get full text
Conference Proceeding
Loading…
Model Tree Based Adaption Strategy for Software Effort Estimation by Analogy
Azzeh, M.
Published in 2011 IEEE 11th International Conference on Computer and Information Technology (01.08.2011)
Published in 2011 IEEE 11th International Conference on Computer and Information Technology (01.08.2011)
Get full text
Conference Proceeding
Loading…
Loading…
Scalable and Energy-Efficient Scheduling Techniques for Large-Scale Systems
Diaz, C. O., Guzek, M., Pecero, J. E., Bouvry, P., Khan, S. U.
Published in 2011 IEEE 11th International Conference on Computer and Information Technology (01.08.2011)
Published in 2011 IEEE 11th International Conference on Computer and Information Technology (01.08.2011)
Get full text
Conference Proceeding
Loading…
A Privacy Preserving System for Cloud Computing
Greveler, U., Justus, B., Loehr, D.
Published in 2011 IEEE 11th International Conference on Computer and Information Technology (01.08.2011)
Published in 2011 IEEE 11th International Conference on Computer and Information Technology (01.08.2011)
Get full text
Conference Proceeding
Loading…
AOP4CSM: An Aspect-Oriented Programming Approach for Cloud Service Monitoring
Mdhaffar, A., Ben Halima, Riadh, Juhnke, E., Jmaiel, M., Freisleben, B.
Published in 2011 IEEE 11th International Conference on Computer and Information Technology (01.08.2011)
Published in 2011 IEEE 11th International Conference on Computer and Information Technology (01.08.2011)
Get full text
Conference Proceeding
Loading…
A Secure Recognition Based Graphical Password by Watermarking
Lashkari, A. H., Manaf, A. A., Masrom, M.
Published in 2011 IEEE 11th International Conference on Computer and Information Technology (01.08.2011)
Published in 2011 IEEE 11th International Conference on Computer and Information Technology (01.08.2011)
Get full text
Conference Proceeding
Loading…
Effects of Radio Triggered Sensor MAC Protocol over Wireless Sensor Network
Sthapit, P., Jae-Young Pyun
Published in 2011 IEEE 11th International Conference on Computer and Information Technology (01.08.2011)
Published in 2011 IEEE 11th International Conference on Computer and Information Technology (01.08.2011)
Get full text
Conference Proceeding
Loading…
A Fully Automatic Approach for Fixing Firewall Misconfigurations
Souayeh, N. B. Y. B., Bouhoula, A.
Published in 2011 IEEE 11th International Conference on Computer and Information Technology (01.08.2011)
Published in 2011 IEEE 11th International Conference on Computer and Information Technology (01.08.2011)
Get full text
Conference Proceeding
Loading…
An Instruction-Level Energy Estimation and Optimization Methodology for GPU
Yue Wang, Ranganathan, N.
Published in 2011 IEEE 11th International Conference on Computer and Information Technology (01.08.2011)
Published in 2011 IEEE 11th International Conference on Computer and Information Technology (01.08.2011)
Get full text
Conference Proceeding
Loading…
Message from SCALSOL 2011 Workshop Chairs
Published in 2011 IEEE 11th International Conference on Computer and Information Technology
(01.08.2011)
Get full text
Conference Proceeding
Loading…
Message from the SCALCOM-2011 Steering Committee
Published in 2011 IEEE 11th International Conference on Computer and Information Technology
(01.08.2011)
Get full text
Conference Proceeding