| Performance Variations in Profiling Mysql Server on the Xen Platform: Is It Xen or Mysql? |
| Ashish Tapdiya and Yuan Xue, Vanderbilt University, United States |
| Volume : 6 volume number : 2 pdf |
| Design of a Virtual Ecological Pond for Motion-Sensing Game-Based Learning |
| Wernhuar Tarng1, Nien-Yin Lu1, Yi-Syuan Shih1 and Hsin-Hun Liou2, 1National Hsinchu University of Education, Taiwan and 2National Central University, Taiwan |
| Volume : 6 volume number : 2 pdf |
| Cloud Web-Based Operating System (Cloud Web Os) |
| Hesham Abusaimeh, Applied Science University, Jordan |
| Volume : 6 volume number : 2 pdf |
| An Adaptive Framework for Enhancing Recommendation Using Hybrid Techniques |
| Radhya Sahal, SaharSelim and Abeer ElKorany, Cairo University, Egypt |
| Volume : 6 volume number : 2 pdf |
| Estimation of Optimized Energy and Latency Constraint for Task Allocation in 3d Network on Chip |
| Vaibhav Jha1, Mohit Jha2 and G K Sharma1, 1ABV- Indian Institute of Information Technology and Management, India and 2Jabalpur Engineering College, India |
| Volume : 6 volume number : 2 pdf |
| Case-Based Reasoning for Explaining Probabilistic Machine Learning |
| Tomas Olsson1,2, Daniel Gillblad2, Peter Funk1, and Ning Xiong1, 1Mälardalens University, Sweden and 2SICS Swedish ICT, Sweden |
| Volume : 6 volume number : 2 pdf |
| Business Bankruptcy Prediction Based on Survival Analysis Approach |
| Ming-Chang Lee, National Kaohsiung University of Applied Science, Taiwan |
| Volume : 6 volume number : 2 pdf |
| Recognition and Ranking Critical Success Factors of Business Intelligence in Hospitals - Case Study: Hasheminejad Hospital |
| Marjan Naderinejad, Mohammad Jafar Tarokh and Alireza Poorebrahimi, Islamic Azad University, Iran |
| Volume : 6 volume number : 2 pdf |
| Design and Implementation of a Personal Super Computer |
| Heba A. Kurdi, Al Imam Muhammad Ibn Saud Islamic University, Saudi Arabia |
| Volume : 6 volume number : 2 pdf |
| Output Privacy Protection With Pattern-Based Heuristic Algorithm |
| P.Cynthia Selvi1 and A.R.Mohammed Shanavas2, 1KNGA College(W), India and 2Jamal Mohamed College, India |
| Volume : 6 volume number : 2 pdf |
| Change Management and Version Control of Scientific Applications |
| Bojana Koteska and Anastas Mishev, Ss. Cyril and Methodius University, Macedonia |
| Volume : 6 volume number : 2 pdf |
| Advanced Authentication Scheme Using a Predefined Keystroke Structure |
| Abdulameer K. Hussain and Mohammad M. Alnabhan, Jerash University, Jordan |
| Volume : 6 volume number : 2 pdf |
| The Impact of Knowledge-Based Trust (Kbt) on The Adoption and Acceptability of Cashless Economy in Nigeria |
| Galadima, Talatu O.1, Akinyemi, Ibidapo O.2, and Asani, Emmanuel O.3, 1Federal Polytechnic, Nigeria, 2Covenant University, Nigeria and 3Landmark University, Nigeria |
| Volume : 6 volume number : 2 pdf |
| A Methodology for the Study of Fiber-Optic Cables |
| Muzammil H Mohammed and Mohd Aasif Ansari, College of Computers and Information Technology, Saudi Arabia |
| Volume : 6 volume number : 2 pdf |
| Sharing of Cluster Resources among Multiple Workflow Applications |
| Uma Boregowda1 and Venugopal Chakravarthy2, 1Malnad College of Engineering, India and 2Sri Jayachamarajendra College of Engineering, India |
| Volume : 6 volume number : 2 pdf |
| Review of Closed Circuit Television (CCTV) Techniques for Vehicles Traffic Management |
| Heba A. Kurdi, Al Imam Muhammad Ibn Saud Islamic University, Saudi Arabia |
| Volume : 6 volume number : 2 pdf |