Submissions from 2020
Detection and Analysis of Drive-by Downloads and Malicious Websites, Saeed Ibrahim, Nawwaf Al Herami, Ebrahim Al Naqbi, and Monther Aldwairi
Integrity verification and behavioral classification of a large dataset applications pertaining smart OS via blockchain and generative models, Salman Jan, Shahrulniza Musa, Toqeer Ali, Mohammad Nauman, Sajid Anwar, Tamleek Ali Tanveer, and Babar Shah
A Spam Email Detection Mechanism for English Language Text Emails Using Deep Learning Approach, Sanaa Kaddoura, Omar Alfandi, and Nadia Dahmani
Promoting Teaching Practices in IT Higher Education, Sanaa Kaddoura and Rima Grati
Legal smart contracts in ethereum block chain: Linking the dots, Eleanna Kafeza, Syed Juned Ali, Irene Kafeza, and Haseena Alkatheeri
Forecasting with deep learning: S&P 500 index, Firuz Kamalov, Linda Smail, and Ikhlaas Gurrib
Stock price forecast with deep learning, Firuz Kamalov, Linda Smail, and Ikhlaas Gurrib
A geolocation-aware mobile crowdsourcing solution for the emergency supply of oxygen cylinders, Faouzi Kamoun, May El Barachi, Abderrazak Hachani, Fatna Belqasmi, Amir Ben Said, and Imed Amri
AI and machine learning: A mixed blessing for cybersecurity, Faouzi Kamoun, Farkhund Iqbal, Mohamed Amir Esseghir, and Thar Baker
Analysis of the Importance of Systolic Blood Pressure Versus Diastolic Blood Pressure in Diagnosing Hypertension: MRA Study., Heba Kandil, Ahmed Soliman, Fatma Taher, Mohammed Ghazal, Mohiuddin Hadi, Adel Elmaghraby, and Ayman El-Baz
Dynamic framework to mining Internet of Things for multimedia services, Yaser Khamayseh, Wail Mardini, J. William Atwood, and Monther Aldwairi
Towards a Novel Intrusion Detection Architecture using Artificial Intelligence, Salam Khanji and Asad Khattak
Interpretable and Generalizable Person Re-identification with Query-Adaptive Convolution and Temporal Lifting, Shengcai Liao and Ling Shao
Interpretable Neural Network Decoupling, Yuchao Li, Rongrong Ji, Shaohui Lin, Baochang Zhang, Chenqian Yan, Yongjian Wu, Feiyue Huang, and Ling Shao
Internet of Things, Zakaria Maamar
Thingsourcing to Enable IoT Collaboration, Zakaria Maamar, Khouloud Boukadi, Bamory Koné, Muhammad Asim, Djamal Benslimane, and Said Elnaffar
OWL-T for a Semantic Description of IoT, Zakaria Maamar, Noura Faci, Ejub Kajan, Muhammad Asim, and Ayesha Qamar
Process-of-Things: Weaving film industry’s practices into the Internet-of-Things, Zakaria Maamar, Noura Faci, Ejub Kajan, Safet Purković, and Emir Ugljanin
Bridging the gap between business processes and IoT, Zakaria Maamar, Ejub Kajan, Ikbel Guidara, Leyla Moctar-M'baba, and Mohamed Sellami
Atomicity in the Internet of Transactional Things (Io2T), Zakaria Maamar, Mohamed Sellami, Thar Baker, Said Elnaffar, and Maj Alshibly
Towards an Approach for Validating the Internet-of-Transactional-Things, Zakaria Maamar, Mohamed Sellami, Nanjangud C. Narendra, Ikbel Guidara, Emir Ugljanin, and Bita Banihashemi
Structure Preserving Stain Normalization of Histopathology Images Using Self Supervised Semantic Guidance, Dwarikanath Mahapatra, Behzad Bozorgtabar, Jean Philippe Thiran, and Ling Shao
Pink Ocean Strategy: Democratizing Business Knowledge for Social Growth and Innovation, Evangelos Markopoulos, Maria Barbara Ramonda, Lisa Marie Carolin Winter, Haseena Al Katheeri, and Hannu Vanharanta
Effective Patient Similarity Computation for Clinical Decision Support Using Time Series and Static Data, Mohammad M. Masud, Kadhim Hayawi, Sujith Samuel Mathew, Ahmed Dirir, and Muhsin Cheratta
On the need for cultural sensitivity in digital wellbeing tools and messages: A UK-China comparison, John McAlaney, Manal Aldhayan, Mohamed Basel Almourad, Sainabou Cham, and Raian Ali
Predictors of Acceptance and Rejection of Online Peer Support Groups as a Digital Wellbeing Tool, John McAlaney, Manal Aldhayan, Mohamed Basel Almourad, Sainabou Cham, and Raian Ali
WorldCIST (2) - On the Need for Cultural Sensitivity in Digital Wellbeing Tools and Messages: A UK-China Comparison., John McAlaney, Manal Aldhayan, Mohamed Basel Almourad, Sainabou Cham, and Raian Ali
Bi-orthogonal wavelets for investigating Gibbs effects via oblique extension principle, Mutaz Mohammad
Digital Forensic Acquisition and Analysis of Discord Applications, Michal Motylinski, Aine MacDermott, Farkhund Iqbal, Mohammed Hussain, and Saiqa Aleem
ECCV (22) - Latent Embedding Feedback and Discriminative Features for Zero-Shot Classification, Sanath Narayan, Akshita Gupta, Fahad Shahbaz Khan, Cees G. M. Snoek, and Ling Shao
Latent Embedding Feedback and Discriminative Features for Zero-Shot Classification, Sanath Narayan, Akshita Gupta, Fahad Shahbaz Khan, Cees G.M. Snoek, and Ling Shao
Evaluating IT Governance Structure Implementation in the Gulf Cooperation Council Region, Mathew Nicho and Suadad Muamaar
A Novel Ensemble Method for Advanced Intrusion Detection in Wireless Sensor Networks, Safa Otoum, Burak Kantarci, and Hussein T. Mouftah
Blockchain-Supported Federated Learning for Trustworthy Vehicular Networks, Safa Otoum, Ismaeel Al Ridhawi, and Hussein T. Mouftah
Contextual healing: Privacy through interpretation management, Fatma Outay and Rula Sayaf
PhishOut: PhishOut: Effective Phishing Detection Using Selected Features, Suhail Paliath, Mohammad Abu Qbeitah, and Monther Aldwairi
The effect of differential quality and differential zealotry in the best-of-n problem, Judhi Prasetyo, Giulia De Masi, Elio Tuci, and Eliseo Ferrante
Quaternionic Channel-based Modulation For Dual-polarized Antennas, Sara Shakil Qureshi, Syed Ali Hassan, and Sajid Ali
On the use of elitism to improve convergence of the chemical reaction optimization algorithm in discrete optimization problems, Sinan Salman
Network design using chemical reaction optimization and markov-chain traffic assignment, Sinan Salman and Suzan Alaswad
Vehicles' emissions consideration in transportation network design using Markov chain traffic assignment, Sinan Salman and Suzan Alaswad
A Comprehensive Framework for Accurate Classification of Pulmonary Nodules, Ahmed Shaffie, Ahmed Soliman, Hadil Abu Khalifeh, Mohammed Ghazal, Fatma Taher, Adel Elmaghraby, Robert Keynton, and Ayman El-Baz
Access Permissions for Apple Watch Applications: A Study on Users' Perceptions, Muhammad Umair Shah, Umair Rehman, Farkhund Iqbal, Fazli Wahid, Mohammed Hussain, and Ali Arsalan
Invertible Zero-Shot Recognition Flows, Yuming Shen, Jie Qin, Lei Huang, Li Liu, Fan Zhu, and Ling Shao
Algorithm Appreciation: Algorithmic Performance, Developmental Processes, and User Interactions, Donghee Shin, Bouziane Zaid, and Mohammed Ibahrine
A predictive model of users’ behavior and values of smart energy meters using PLS-SEM, Ahmed Shuhaiber
Trust in smart energy meters: The role of perceived values, Ahmed Shuhaiber
Panel: Autonomy Control at Work: Cars, Robots, Drones and Satellites, Roy Sterritt, Petr Skobelev, Mario Döller, Iaria Dini, Claudius Stern, Giulia De Masi, Timothy Patten, and Pedro Forero
Precise Cerebrovascular Segmentation, F. Taher, A. Soliman, H. Kandil, A. Mahmoud, A. Shalaby, G. Gimel'farb, and A. El-Baz
Improving the impact of power efficiency in mobile cloud applications using cloudlet model, Lo'ai Tawalbeh, Mohammad A. Tawalbeh, and Monther Aldwairi
Building a security framework for smart cities: A case study from UAE, Abdallah Tubaishat and Mariam Al Jouhi
Optimizing the Efficiency of Machine Learning Techniques, Anwar Ullah, Muhammad Zubair Asghar, Anam Habib, Saiqa Aleem, Fazal Masud Kundi, and Asad Masood Khattak
Automatic C-Plane Detection in Pelvic Floor Transperineal Volumetric Ultrasound, Helena Williams, Laura Cattani, Mohammad Yaqub, Carole Sudre, Tom Vercauteren, Jan Deprest, and Jan D’hooge
Region Graph Embedding Network for Zero-Shot Learning, Guo Sen Xie, Li Liu, Fan Zhu, Fang Zhao, Zheng Zhang, Yazhou Yao, Jie Qin, and Ling Shao
Count- and Similarity-Aware R-CNN for Pedestrian Detection, Jin Xie, Hisham Cholakkal, Rao Muhammad Anwer, Fahad Shahbaz Khan, Yanwei Pang, Ling Shao, and Mubarak Shah
ICML - On the Number of Linear Regions of Convolutional Neural Networks, Huan Xiong, Lei Huang, Mengyang Yu, Li Liu, Fan Zhu, and Ling Shao
A Multi-Criteria Decision Making Approach for Cloud-Fog Coordination, Fadwa Yahya, Zakaria Maamar, and Khouloud Boukadi
4P based forensics investigation framework for smart connected toys, Benjamin Yankson, Farkhund Iqbal, and Patrick C.K. Hung
ECCV (17) - Dynamic Dual-Attentive Aggregation Learning for Visible-Infrared Person Re-Identification, Mang Ye, Jianbing Shen, David J. Crandall, Ling Shao, and Jiebo Luo
Dynamic Dual-Attentive Aggregation Learning for Visible-Infrared Person Re-identification, Mang Ye, Jianbing Shen, David J. Crandall, Ling Shao, and Jiebo Luo
Drone Forensics: A Detailed Analysis of Emerging DJI Models, Maryam Yousef, Farkhund Iqbal, and Mohammed Hussain
Learning Enriched Features for Real Image Restoration and Enhancement, Syed Waqas Zamir, Aditya Arora, Salman Khan, Munawar Hayat, Fahad Shahbaz Khan, Ming Hsuan Yang, and Ling Shao
Unsupervised Domain Adaptation with Noise Resistible Mutual-Training for Person Re-identification, Fang Zhao, Shengcai Liao, Guo Sen Xie, Jian Zhao, Kaihao Zhang, and Ling Shao
M2Net : Multi-modal Multi-channel Network for Overall Survival Time Prediction of Brain Tumor Patients, Tao Zhou, Huazhu Fu, Yu Zhang, Changqing Zhang, Xiankai Lu, Jianbing Shen, and Ling Shao
Submissions from 2019
Delay and energy based message delivery in delay tolerant networks, Ali Abbas, Babar Shah, Muhammad Habib, Francis Chow, Raza Hasan, and Ki Il Kim
A Novel Deep Learning Approach for Left Ventricle Automatic Segmentation in Cardiac Cine MR, Hisham Abdeltawab, Fahmi Khalifa, Fatma Taher, Garth Beache, Tamer Mohamed, Adel Elmaghraby, Mohammed Ghazal, Robert Keynton, and Ayman El-Baz
Automatic segmentation and functional assessment of the left ventricle using u-net fully convolutional network, Hisham Abdeltawab, Fahmi Khalifa, Fatma Taher, Garth Beache, Tamer Mohamed, Adel Elmaghraby, Mohammed Ghazal, Robert Keynton, and Ayman El-Baz
Healthcare applications of intelligent information systems: A novel technique for medical image fusion, Ahed Abugabah and Ahmad Alsmadi
Data Mining in Health Care Sector: Literature Notes, Ahed Abugabah, Ahmad Al Smadi, and Alaa Abuqabbeh
Towards an end-user layer for data integrity, Lu'ay Abu-Rayyan, Hakim Hacid, and Andrew Leoncé
The effect of demand variability on supply chain performance, Suzan Alaswad, Sinan Salman, Arwa Alhashmi, Hawra Almarzooqi, and Meera Alhammadi
Blockchain in Supply Chain Trading, Nedaa Baker Al Barghuthi, Hussam Juma Mohamed, and Huwida E. Said
State of Art of the Effectiveness in Adopting Blockchain Technology-UAE Survey Study, Nedaa Baker Al Barghuthi, Cornelius Ncube, and Huwida Said
Readiness, Safety, and Privacy on Adopting Autonomous Vehicle Technology: UAE Case Study, Nedaa Baker Al Barghuthi and Huwida Said
Online peer support groups to combat digital addiction: User acceptance and rejection factors, Manal Aldhayan, Sainabou Cham, Theodoros Kostoulas, Mohamed Basel Almourad, and Raian Ali
n‐Grams exclusion and inclusion filter for intrusion detection in Internet of Energy big data systems, Monther Aldwairi and Duaa Alansari
Guidelines for key organizational factors for saas organizations, Saiqa Aleem, Rabia Batool, Faheem Ahmed, and Asad Khattak
Design guidelines for SaaS development process, Saiqa Aleem, Rabia Batool, Faheem Ahmed, and Asad Masood Khattak
Assessment and hardening of IOT development boards, Omar Alfandi, Musaab Hasan, and Zayed Balbahaith
A comparative analysis of cyberbullying and cyberstalking laws in the UAE, US, UK and Canada, Haifa Al Hosani, Maryam Yousef, Shaima Al Shouq, Farkhund Iqbal, and Djedjiga Mouheb
Solving MAX-SAT Problem by Binary Biogeograph-based Optimization Algorithm, Hafiz Munsub Ali, Waleed Ejaz, May Al Taei, and Farkhund Iqbal
Fog computing framework for internet of things applications, Mohammed Al-Khafajiy, Thar Baker, Hilal Al-Libawy, Atif Waraich, Carl Chalmers, and Omar Alfandi
Enabling high performance fog computing through fog-2-fog coordination model, Mohammed Al-Khafajiy, Thar Baker, Atif Waraich, Omar Alfandi, and Aseel Hussien
Using Data Mining Techniques to Identify Construction Claims Causes: A Case Study, Vasila Al Khaldi, Nazar Zaki, Essam Zaneldin, and Elfadil A. Mohamed
Comparing the behaviour of human face capturing attention of autistic & normal developing children using eye tracking data analysis approach, Mohamed Basel Almourad and Emad Bataineh
A Sentiment Analysis Approach of Data Volatility for Consumer Satisfaction in the Fashion Industry, Feras Al-Obeidat, Anoud Bani Hani, Elhadj Benkhelifa, Oluwasegun Adedugbe, and Munir Majdalawieh
Analyzing D-wave quantum macro assembler security, Hesham H. Alsaadi, Monther Aldwairi, and Eva Marie Muller-Stuler
Cross-Linguistic Twitter Analysis of Discussion Themes before, during and after Ramadan, Aamna Alshehhi, Justin Thomas, Roy Welsch, and Zeyar Aung
Blockchain for UAE Organizations: Insights from CIOs with Opportunities and Challenges, May Altaei, Nedaa Baker Al Barghuthi, Qusay H. Mahmoud, Sonia Al Barghuthi, and Huwida Said
A Deep Learning Approach for Amazon EC2 Spot Price Prediction, Hana Al-Theiabat, Mahmoud Al-Ayyoub, Mohammad Alsmirat, and Monther Aldwair
Features weight estimation using a genetic algorithm for customer churn prediction in the telecom sector, Adnan Amin, Babar Shah, Ali Abbas, Sajid Anwar, Omar Alfandi, and Fernando Moreira
Mitigation of ground vibrations by circular arrays of rigid blocks, Lars V. Andersen, Andrew T. Peplow, and Peter Persson
A Blockchain based Architecture for the Detection of Fake Sensing in Mobile Crowdsensing, Mohamad Arafeh, May El Barachi, Azzam Mourad, and Fatna Belqasmi
A comparison between google cloud service and icloud, Hera Arif, Hassan Hajjdiab, Fatima Al Harbi, and Mohammed Ghazal
Online authentication methods used in banks and attacks against these methods, Anoud Bani-Hani, Munir Majdalweieh, and Aisha AlShamsi
A relational approach to exploring inequalities within the human resource management model in the Middle East, Safiya Banu, Nicolina Kamenou-Aigbekaen, and Laura Galloway
Towards a new generation of web browsers: An eyettracking study, Emad Bataineh and Bilal Bataineh
Domain Adaptation for Car Accident Detection in Videos, Elizaveta Batanina, Imad Eddine Ibrahim Bekkouch, Youssef Youssry, Adil Khan, Asad Masood Khattak, and Mikhail Bortnikov
EDBT/ICDT Workshops - Privacy-Preserving Data Analysis Workflows for eScience., Khalid Belhajjame, Noura Faci, Zakaria Maamar, Vanilson Burégio, Edvan Soares, and Mahmoud Barhamgi
Privacy-preserving data analysis workflows for eScience, Khalid Belhajjame, Noura Faci, Zakaria Maamar, Vanilson Burégio, Edvan Soares, and Mahmoud Barhamgi
Authors' Writing Styles Based Authorship Identification System Using the Text Representation Vector, Nacer Eddine Benzebouchi, Nabiha Azizi, Nacer Eddine Hammami, Didier Schwab, Mohammed Chiheb Eddine Khelaifia, and Monther Aldwairi
Incentive Based Relaying in D2D Social Networks, Jagadeesha R. Bhat, C. V. Anoop, and Omar Alfandi
Testbed of QoS Ad-Hoc network designed for cooperative multi-drone tasks, Ouns Bouachir, Moayad Aloqaily, Fabien Garcia, Nicolas Larrieu, and Thierry Gayraud
Corrigendum to Norm-based and commitment-driven agentification of the Internet of Things [Internet of Things volume 6 (2019) 100042], Khouloud Boukadi, Noura Faci, Zakaria Maamar, Emir Ugljanin, Mohamed Sellami, Thar Baker, and Mohammed Al-Khafajiy
Norm-based and commitment-driven agentification of the Internet of Things, Khouloud Boukadi, Noura Faci, Zakaria Maamar, Emir Ugljanin, Mohamed Sellami, Thar Baker, and Mohammed Al-Khafajiy
Digital addiction: Negative life experiences and potential for technology-assisted solutions, Sainabou Cham, Abdullah Algashami, Manal Aldhayan, John McAlaney, Keith Phalp, Mohamed Basel Almourad, and Raian Ali
The Relationship between Board Structure, Innovation and Firm Efficiency: Empirical Evidence from the Chinese Listed Firms, Haviour Xihui Chen, Musa Mangena, and Kienpin Tee
Are Women Holding Half the Sky? A Case Study of Chinese Listed Companies, Haviour Xihui Chen and Kienpin Tee
An Active Noise Correction Graph Embedding Method Based on Active Learning for Graph Noisy Data, Zhiyuan Cui, Donghai Guan, Cong Li, Weiwei Guan, and Asad Masood Khattak
Student proficiency profiles through the computing professional skills assessment, Maurice Danaher, Kevin Schoepp, Anthony Rhodes, and Tiffany Cammidge
What is Academic Writing?, Peter Davidson
Dynamic Neural Network for Business and Market Analysis, Javier de Arquer Rilo, Abir Hussain, May Al-Taei, Thar Baker, and Dhiya Al-Jumeily
Deep Learning Based Method for Computer Aided Diagnosis of Diabetic Retinopathy, Omar Dekhil, Ahmed Naglah, Mohamed Shaban, Mohammed Ghazal, Fatma Taher, and Ayman Elbaz
A Novel Fully Automated CAD System for Left Ventricle Volume Estimation, Omar Dekhil, Fatma Taher, Fahmi Khalifa, Garth Beache, Adel Elmaghraby, and Ayman El-Baz
Using Academic Reading Circles to Assist Students, studying in a second language, with the Case-based Analysis of Cyberethical issues, Kirk Lloyd Barclay Dowswell
Proof systems in blockchains: A survey, Georgios Drakopoulos, Eleanna Kafeza, and Haseena Al Katheeri
In Situ Mutation for Active Things in the IoT Context, Noura Faci, Zakaria Maamar, Thar Baker, Emir Ugljanin, and Mohamed Sellami
The socio-net of things modeling framework, Amjad Fayoumi, Juliana Sutanto, and Zakaria Maamar
Human Activity Recognition Using Deep Models and Its Analysis from Domain Adaptation Perspective, Nikita Gurov, Adil Khan, Rasheed Hussain, and Asad Khattak
Drone forensics: A case study on DJI phantom 4, Dua'a Abu Hamdi, Farkhund Iqbal, Saiqa Alam, Abdulla Kazim, and Aine MacDermott
Internet of Things Platform for Transparency and Traceability of Food Supply Chain, Ahmed Haroon, Mehak Basharat, Asad Masood Khattak, and Waleed Ejaz
Detection of SQL Injection Attacks: A Machine Learning Approach, Musaab Hasan, Zayed Balbahaith, and Mohammed Tarique
Media Urbanism and the development of local creative communities, Adina Hempel and Janet Bellotto
Smart Home Systems Security, Abir Hussain, Deimante Marcinonyte, Farkhund Iqbal, Hissam Tawfik, Thar Baker, and Dhiya Al-Jumeily
Market basket analysis of student attendance records, Mohammed Hussain and Abdullah Hussein
Raising Children’s Cultural Awareness: A Task-Based Approach, Nadine Jaafarawi
Novel robust digital watermarking in mid-rank co-efficient based on DWT and RT transform, Zahoor Jan, Inayat Ullah, Faryal Tahir, Naveed Islam, and Babar Shah
A fog-based architecture for remote phobia treatment, Yassine Jebbar, Fatna Belqasmi, Roch Glitho, and Omar Alfandi
Psychological vulnerability as an integral component of comprehensive vulnerability assessment: Informing policy and practice in disaster risk reduction, Jigar Jogia and Gayan Wedawatta
Restriction-based fragmentation of business processes over the cloud, Slim Kallel, Zakaria Maamar, Mohamed Sellami, Noura Faci, Ahmed Ben Arab, Walid Gaaloul, and Thar Baker
A CAD System for the Early Prediction of Hypertension based on Changes in Cerebral Vasculature, Heba Kandil, Ahmed Soliman, Fatma Taher, Mohammed Ghazal, Mohiuddin Hadi, Guruprasad Giridharan, and Ayman El-Baz
Using 3-D CNNs and Local Blood Flow Information to Segment Cerebral Vasculature, Heba Kandil, Ahmed Soliman, Fatma Taher, Ali Mahmoud, Adel Elmaghraby, and Ayman El-Baz
Memory Forensics: Recovering Chat Messages and Encryption Master Key, Abdullah Kazim, Fadya Almaeeni, Shamsah Al Ali, Farkhund Iqbal, and Khalil Al-Hussaeni
Congestion Control in Wireless Sensor Networks based on Support Vector Machine, Grey Wolf Optimization and Differential Evolution, Hafiza Syeda Zainab Kazmi, Nadeem Javaid, Muhammad Imran, and Fatma Outay
An Application of Using Support Vector Machine Based on Classification Technique for Predicting Medical Data Sets, Mohammed Khalaf, Abir Jaafar Hussain, Omar Alfandi, Dhiya Al-Jumeily, Mohamed Alloghani, Mahmood Alsaadi, Omar A. Dawood, and Dhafar Hamed Abd
Urban sensing: Towards security efficient sensing network scheme, Salam Khanji, Mohamad Badra, Omar Alfandi, and Rouba Borghol
ZigBee Security Vulnerabilities: Exploration and Evaluating, Salam Khanji, Farkhund Iqbal, and Patrick Hung
Boosting IoT Efficiency and Security through Blockchain: Blockchain-based Car Insurance Process - A Case Study, Salam Khanji, Farkhund Iqbal, Zakaria Maamar, and Hakim Hacid
Blockchain technology as a support infrastructure in E-Government evolution at Dubai economic department, Shafaq Naheed Khan, Mohammed Shael, and Munir Majdalawieh
Smart meter security: Vulnerabilities, threat impacts, and countermeasures, Asad Masood Khattak, Salam Khanji, and Wajahat Ali Khan
Stock market trend prediction using supervised learning, Asad Masood Khattak, Habib Ullah, Hassan Ali Khalid, Ammara Habib, Muhammad Zubair Asghar, and Fazal Masud Kundi
Speculo: A tool for multiple identities exploration and detection in social networks, Sumaya Khoory, Noora Al Roken, Maryam Al Abdooli, and Hakim Hacid
Parking availability forecasting model, Mohammad Amin Kuhail, Manohar Boorlu, Neeraj Padarthi, and Collin Rottinghaus
Noise Reduction in Network Embedding, Cong Li, Donghai Guan, Zhiyuan Cui, Weiwei Yuan, Asad Masood Khattak, and Muhammad Fahim
Robot computing for music visualization, Pei Chun Lin, David Mettrick, Patrick C.K. Hung, and Farkhund Iqbal
Towards a music visualization on robot (MVR) prototype, Pei Chun Lin, David Mettrick, Patrick C.K. Hung, and Farkhund Iqbal
Cognitive Computing Meets the Internet of Things, Zakaria Maamar, Thar Baker, Noura Faci, Emir Ugljanin, Yacine Atif, Mohammed Al-Khafajiy, and Mohamed Sellami
Towards a Resource-aware Thing Composition Approach, Zakaria Maamar, Saoussen Cheikhrouhou, Muhammad Asim, Ayesha Qamar, Thar Bake, and Emir Ugljanin
Everything-as-a-Thing for Abstracting the Internet-of-Things, Zakaria Maamar, Noura Faci, Mohamed Sellami, Emir Ugljanin, and Ejub Kajan
Towards a seamless coordination of cloud and fog, Zakaria Maamar, Emir Ugljanin, Thar Baker, Mohammed Al Khafajiy, Noura Faci, and Vanilson Burégio
Forensic analysis of wearable devices: Fitbit, Garmin and HETP Watches, Aine MacDermott, Stephen Lea, Farkhund Iqbal, Ibrahim Idowu, and Babar Shah
Advancing digital transformation: Integrated digital transformation framework for a successful deployment, Munir Majdalawieh
A recursive co-occurrence text mining of the quran to build corpora for islamic banking business processes, Farhi Marir, Issam Tlemsani, and Munir Majdalwieh
Advanced mineral carbonation: An approach to accelerate CO2 sequestration using steel production wastes and integrated fluidized bed reactor, Abdel Mohsen Onsy Mohamed, Maisa El-Gamal, and Suhaib Hameedi
Humanoid robots as teaching assistants in an arab school, Omar Mubin, Mariam Alhashmi, Rama Baroud, and Fady S. Alnajjar
Facial image pre-processing and emotion classification: A deep learning approach, Alramzana Nujum Navaz, Serhani Mohamed Adel, and Sujith Samuel Mathew
A Novel Game Theoretic Approach for Forming Coalitions between IMS Cloud Providers, Hani Nemati, May El Barachi, Nadjia Kara, and Fatna Belqasmi
Applying system dynamics to model advanced persistent threats, Mathew Nicho and Hussein Fakhry
Dimensions of 'socio' vulnerabilities of advanced persistent threats, Mathew Nicho and Christopher D. McDermott
The covcrav project: Architecture and design of a cooperative v2v crash avoidance system, Fatma Outay, Hichem Bargaoui, Anouar Chemek, Faouzi Kamoun, and Ansar Yasar
V2V and V2I communications for traffic safety and CO2 emission reduction: A performance evaluation, Fatma Outay, Faouzi Kamoun, Florent Kaisser, Doaa Alterri, and Ansar Yasar
Social networks and leadership emergence, Jin Park
Computation of axisymmetric vibration transmission using a well-conditioned system for elastic layers over a half–space, Andrew T. Peplow, Lars V. Andersen, and Peter Persson
How building adjacency affects occupant-perceivable vibrations due to urban sources: A parametric study, Peter Persson, Loukas F. Kallivokas, Lars V. Andersen, and Andrew T. Peplow
Data-driven curation, learning and analysis for inferring evolving IoT botnets in the wild, Morteza Safaei Pour, Antonio Mangino, Kurt Friday, Matthias Rathbun, Elias Bou-Harb, Farkhund Iqbal, Khaled Shaban, and Abdelkarim Erradi
Digital investigation of wireless sensor networks - IRIS mote, Argianto Rahartomo, Arne Bochem, and Omar Alfandi
Holistic User eXperience in Mobile Augmented Reality Using User eXperience Measurement Index, Fahad Ahmed Satti, Jamil Hussain, Hafiz Syed Muhammad Bilal, Wajahat Ali Khan, Asad Masood Khattak, Ju Eun Yeon, and Sungyoung Lee
Resolving data interoperability in ubiquitous health profile using semi-structured storage and processing, Fahad Ahmed Satti, Wajahat Ali Khan, Ganghun Lee, Asad Masood Khattak, and Sungyoung Lee
Radiomic-based framework for early diagnosis of lung cancer, Ahmed Shaffie, Ahmed Soliman, Hadil Abu Khalifeh, Mohammed Ghazal, Fatma Taher, Adel Elmaghraby, Robert Keynton, and Ayman El-Baz
On the Integration of CT-Derived Features for Accurate Detection of Lung Cancer, Ahmed Shaffie, Ahmed Soliman, Hadil Abu Khalifeh, Mohammed Ghazal, Fatma Taher, Robert Keynton, Adel Elmaghraby, and Ayman El-Baz
A New System for Lung Cancer Diagnosis based on the Integration of Global and Local CT Features, Ahmed Shaffie, Ahmed Soliman, Hadil Abu Khalifeh, Fatma Taher, Mohammed Ghazal, Neal Dunlap, Adel Elmaghraby, Robert Keynton, and Ayman El-Baz
A Novel CT-Based Descriptors for Precise Diagnosis of Pulmonary Nodules, Ahmed Shaffie, Ahmed Soliman, Hadil Abu Khalifeh, Fatma Taher, Mohammed Ghazal, Neal Dunlap, Adel Elmaghraby, Robert Keynton, and Ayman El-Baz
Higher Education 4.0: Uni for nothin’, MOOCs for free?, Ravi Sharma, Kevin Jones, Warwick Anderson, and Anushia Inthiran
Early Assessment of Acute Renal Rejection Post-transplantation: A Combined Imaging and Clinical Biomarkers Protocol, Mohamed Shehata, Fatma Taher, Mohammed Ghazal, Ali Mahmoud, Garth Beache, Mohamed Abou El-Ghar, Amy C. Dwyer, Adel Elmaghraby, and Ayman El-Baz
Smart homes as an IoT application: Predicting attitudes and behaviours, Ahmed Shuhaiber, Ibrahim Mashal, and Osama Alsaryrah
The Role of Smart Homes' Attributes on Users' Acceptance, Ahmed Shuhaiber, Ibrahim Mashal, and Osama Alsaryrah
Forecasting Temperature in a Smart Home with Segmented Linear Regression, Bruce Spencer, Omar Alfandi, and Feras Al-Obeidat
Whose Responsibility is it Anyway?, Kristine N. Stewart and Judith Mavodza
Faculty perception of engineering student cheating and effective measures to curb it, Sami W. Tabsh, Hany A. El Kadi, and Akmal S. Abdelfatah
A Review on the Cerebrovascular Segmentation Methods, Fatma Taher, Ali Mahmoud, Ahmed Shalaby, and Ayman El-Baz
Colorizing gray level images by using wavelet filters, F. Taher, M. Darweesh, and H. Al-Ahmad
Security in cloud computing: State-of-the-art, key features, challenges, and opportunities, Abdallah Tubaishat
Improving Complex Network Controllability via Link Prediction, Ran Wei, Weiwei Yuan, Donghai Guan, Asad Masood Khattak, and Muhammad Fahim
A Privacy-Preserving Context Ontology (PPCO) for Smart Connected Toys, Benjamin Yankson, Farkhund Iqbal, Saiqa Aleem, Babar Shah, Patrick C.K. Hung, and Anna Priscilla De Albuquerque
HICSS - Modeling Privacy Preservation in Smart Connected Toys by Petri-Nets, Benjamin Yankson, Farkhund Iqbal, Zhihui Lu, Xiaoling Wang, and Patrick Hung
Drone forensics: A case study on a DJI mavic air, Maryam Yousef and Farkhund Iqbal
Resource Allocation in Moving Small Cell Network using Deep Learning based Interference Determination, Saniya Zafar, Sobia Jangsher, Moayad Aloqaily, Ouns Bouachir, and Jalel Ben Othman
Active Sampling Based on MMD for Model Adaptation, Qi Zhang, Donghai Guan, Weiwei Yuan, and Asad Masood Khattak
Proceedings of the Applied Linguistics and Language Teaching Conference 2018: Teaching and Learning in a Globalized World, Wafa Zoghbor, Suhair Al-Alami, and Thomaï Alexiou
Submissions from 2018
Classification of Foetal Distress and Hypoxia Using Machine Learning Approaches, Rounaq Abbas, Abir Jaafar Hussain, Dhiya Al-Jumeily, Thar Baker, and Asad Khattak
Green computing: Awareness and practices, Ahed Abugabah and Amira Abubaker
A novel framework for software defined wireless sensor networks, Khandakar Ahmed, Nazmus S. Nafi, Waleed Ejaz, Mark A. Gregory, and Asad M. Khattak
Towards Inclusive Social Networks for the Developing World, Christian Akpona, Rose Gohoue, Herve Ahouantchede, Fatna Belqasmi, Roch Glitho, and Jules Degila
A Survey of Resource Management Challenges in Multi-cloud Environment: Taxonomy and Empirical Analysis, Bandar Aldawsari, Thar Baker, Muhammad Asim, Zakaria Maamar, Dhiya Al-Jumeily, and Mohammed Alkhafajiy
Characterizing realistic signature-based intrusion detection benchmarks, Monther Aldwairi, Mohammad A. Alshboul, and Asmaa Seyam
Detecting Fake News in Social Media Networks, Monther Aldwairi and Ali Alwahedi
Seamless WSN Connectivity Using Diverse Wireless Links, Omar Alfandi, Jagadeesha Rb, and John Beachboard
Large scale image dataset construction using distributed crawling with hadoop YARN, Rahman Ali, Asmat Ali, Asad Masood Khatak, and Muhammad Saqlain Aslam
A case-based meta-learning and reasoning framework for classifiers selection, Rahman Ali, Aasad Masood Khatak, Francis Chow, and Sungyoung Lee
Malware detection using DNS records and domain name features, Khulood Al Messabi, Monther Aldwairi, Ayesha Al Yousif, Anoud Thoban, and Fatna Belqasmi
Analyzing the Behavior of Autistic and Normal Developing Children Using Eye Tracking Data, Mohamed Basel Almourad, Emad Bataineh, Joana Stocker, and Farhi Marir
Opinions Sandbox: Turning Emotions on Topics into Actionable Analytics, Feras Al-Obeidat, Eleanna Kafeza, and Bruce Spencer
Detecting Malware Domains: A Cyber-Threat Alarm System, Khalifa AlRoum, Abdulhakim Alolama, Rami Kamel, May El Barachi, and Monther Aldwairi
Penetration and security of openssh remote secure shell service on raspberry Pi 2, Hesham H. Alsaadi, Monther Aldwairi, May Al Taei, Mansoor Albuainain, and Maktoom Alkubaisi
Detecting Distributed Denial of Service Attacks in Neighbour Discovery Protocol Using Machine Learning Algorithm Based on Streams Representation, Abeer Abdullah Alsadhan, Abir Hussain, Thar Baker, and Omar Alfandi
Intelligent information systems and image processing: A novel pan-sharpening technique based on Multiscale decomposition, Ahmad Al Smadi and Ahed Abugabah
E-Healthcare Knowledge Creation Platform Using Action Research, May Al Taei, Eleanna Kafeza, and Omar Alfandi
Just-in-time Customer Churn Prediction: With and Without Data Transformation, Adnan Amin, Babar Shah, Asad Masood Khattak, Thar Baker, Hamood Ur Rahman Durani, and Sajid Anwar
Configurable data acquisition for cloud-centric IoT, Muhammad Bilal Amin, Muhammad Sadiq, Wajahat Ali Khan, Asad Masood Khattak, Usman Akhtar, and Sungyoung Lee
Impact of document representation on neural ad hoc retrieval, Ebrahim Bagheri, Faezeh Ensan, and Feras Al-Obeidat
Highlighting the Future of Autonomous Vehicle Technology in 2020-2050, Nedaa Baker Al Barghuthi, Deepa Pavithran, and Huwida E. Said
Energy efficient resource allocation for NOMA in cellular IoT with energy harvesting, Mehak Basharat, Waleed Ejaz, Muhammad Naeem, Asad Masood Khattak, Alagan Anpalagan, and Omar Alfandi
An understanding of consumption trends of smart phones on university campus: A comparison study, Emad Bataineh and Sara Alamodi
Visual attention toward socially rich context information for autism spectrum disorder (ASD) and normal developing children: An eye tracking study, Emad Bataineh, Mohamed Basel Almourad, Farhi Marir, and Joana Stocker
Usability analysis on Dubai e-government portal using eye tracking methodology, Emad Bataineh, Basel Al Mourad, and Fazouzi Kammoun
Multi-classifier system for authorship verification task using word embeddings, Nacer Eddine Benzebouchi, Nabiha Azizi, Monther Aldwairi, and Nadir Farah
Achievement and attitudes in technology-supported postsecondary education: Complexity of relationships through the lens of meta-analysis, Eugene Borokhovski, Robert M. Bernard, Rana M. Tamim, and Richard F. Schmid
Drone Forensics: Challenges and New Insights, Hana Bouafif, Faouzi Kamoun, Farkhund Iqbal, and Andrew Marrington
News, Fake News, and Critical Authority, John M. Budd and Kristine N. Stewart
Estimating meteorological visibility range under foggy weather conditions: A deep learning approach, Hazar Chaabani, Naoufel Werghi, Faouzi Kamoun, Bilal Taha, Fatma Outay, and Ansar Ul Haque Yasar
Formal specification and verification of cloud resource allocation using timed petri-nets, Saoussen Cheikhrouhou, Nesrine Chabouh, Slim Kallel, and Zakaria Maamar
A novel feature selection-based sequential ensemble learning method for class noise detection in high-dimensional data, Kai Chen, Donghai Guan, Weiwei Yuan, Bohan Li, Asad Masood Khattak, and Omar Alfandi
Empowering Graduates for Knowledge Economies in Developing Countries, Maurice Danaher, Kevin Shoepp, Ashley Ater Kranov, and Julie Bauld Wallace
Impact of credibility on opinion analysis in social media, Fatima Zohra Ennaji, Lobna Azaza, Zakaria Maamar, Abdelaziz El Fazziki, Marinette Savonnet, Mohamed Sadgal, Eric Leclercq, Idir Amine Amarouche, and Djamal Benslimane
Stopword detection for streaming content, Hossein Fani, Masoud Bashari, Fattane Zarrinkalam, Ebrahim Bagheri, and Feras Al-Obeidat
Rumor Detection in Business Reviews Using Supervised Machine Learning, Ammara Habib, Saima Akbar, Muhammad Zubair Asghar, Asad Masood Khattak, Rahman Ali, and Ulfat Batool
Analysis of symbolic models of biometric data and their use for action and user identification, James Alexander Hughes, Joseph Alexander Brown, Adil Mehmood Khan, Asad Masood Khattak, and Mark Daley
Remote Data Acquisition Using Raspberry Pi3, Saeed Ibrahim, Nawwaf Al Harmi, Ebrahim Al Naqbi, Farkhund Iqbal, Djedjiga Mouheb, and Omar Alfandi
Cloud Digital Forensics Evaluation and Crimes Detection, Raja Jabir and Omar Alfandi
Malware Classification with Deep Convolutional Neural Networks, Mahmoud Kalash, Mrigank Rochan, Noman Mohammed, Neil D.B. Bruce, Yang Wang, and Farkhund Iqbal
Impact of IoT device saturation on home WiFi networks, Dylan Kauling, May AlTaei, and Qusay H. Mahmoud
An Enhanced Temperature Aware Routing Protocol in Wireless Body Area Networks, Beom Su Kim, Ki Il Kim, and Babar Shah
Mobility and Temperature Aware QoS Routing Protocol in Wireless Body Area Networks, Beom Su Kim, Kyong Hoon Kim, Babar Shah, and Ki Il Kim
Medical images protection and authentication using hybrid DWT-DCT and SHA256-MD5 hash functions, Alavi Kunhu, Hussain Al-Ahmad, and Fatma Taher
Thing federation as a service: Foundations and demonstration, Zakaria Maamar, Khouloud Boukadi, Emir Ugljanin, Thar Baker, Muhammad Asim, Mohammed Al-Khafajiy, Djamal Benslimane, and Hasna El Alaoui El Abdallaoui
How to agentify the Internet-of-Things?, Zakaria Maamar, Noura Faci, Khouloud Boukadi, Emir Ugljanin, Mohamed Sellami, Thar Baker, and Rafael Angarita
Storytelling integration of the internet of things into business processes, Zakaria Maamar, Mohamed Sellami, Noura Faci, Emir Ugljanin, and Quan Z. Sheng
Toward a reliable service-based approach to software application development, Qusay Mahmoud, Ian Andrusiak, and May AlTaei
Developing Adaptive Islamic Law Business Processes Models for Islamic Finance and Banking by Text Mining the Holy Qur'an and Hadith, Munir Majdalawieh, Farhi Marir, and Issam Tiemsani
Higher education analytics: New trends in program assessments, Adam Marks and Maytha AL-Ali
An Analytical Study Towards the UAE Universities Smart Education Innovated Approaches, Shaikha Saleh Mohamed, Nedaa Baker Al Barghuthi, and Huwida Said
A process model for implementing information systems security governance, Mathew Nicho
When spear phishers craft contextually convincing emails, Mathew Nicho, Hussein Fakhry, and Uche Egbue
A decision matrix model to identify and evaluate APT vulnerabilities at the user plane, Mathew Nicho and Shafaq Naheed Khan
Identifying vulnerabilities in APT Attacks: A simulated approach, Mathew Nicho, Adelaiye Oluwasegun, and Faouzi Kamoun
Computation of a well-conditioned dynamic stiffness matrix for elastic layers overlying a half-space, Andrew T. Peplow
The best-of-n problem with dynamic site qualities: Achieving adaptability with stubborn individuals, Judhi Prasetyo, Giulia De Masi, Pallavi Ranjan, and Eliseo Ferrante
Dynamic malware analysis of phishing emails, Mohammad Abu Qbeitah and Monther Aldwairi
Intelligent multi-agent collaboration model for smart home IoT security, Laura Rafferty, Farkhund Iqbal, Saiqa Aleem, Zhihui Lu, Shih Chia Huang, and Patrick C.K. Hung
The X-supply game, Sinan Salman and Suzan Alaswad
Developing Information Literacy in Interdisciplinary Classrooms: Engaging with Diverse Literacies, Kristen M. Schuster and Kristine N. Stewart
Librarians participating in service learning at federal universities in the United Arab Emirates, Mary Sengati-Zimba and Judith Mavodza
A Novel Autoencoder-Based Diagnostic System for Early Assessment of Lung Cancer, Ahmed Shaffie, Ahmed Soliman, Mohammed Ghazal, Fatma Taher, Neal Dunlap, Brian Wang, Victor Van Berkel, Georgy Gimelfarb, Adel Elmaghraby, and Ayman El-Baz
Fuzzy Energy Efficient Routing for Internet of Things (IoT), Babar Shah
The Impact of the Number of Eigen-Faces on the Face Recognition Accuracy Using Different Distance Measures, Yousef Shatnawi, Mohammad Alsmirat, Mahmoud Al-Ayyoub, and Monther Aldwairi
Bayesian network model for temperature forecasting in Dubai, L. Smail
Junction trees construction: Application to Bayesian networks, L. Smail
A Refinement of Lasso Regression Applied to Temperature Forecasting, Bruce Spencer, Omar Alfandi, and Feras Al-Obeidat
Review - Challenges of mobility aware MAC protocols in WSN, Sijo Sudheendran, Ons Bouachir, Sherif Moussa, and Adel Omar Dahmane
Adoption Challenges of the Internet of Things: ASurvey, Abdallah Tubaishat and Suhail Paliath
Initiating and tracking social actions to adapt and improve smart city's business processes, Emir Ugljanin, Dragan H. Stojanović, Ejub Kajan, and Zakaria Maamar
Improved label noise identification by exploiting unlabeled data, Hongqiang Wei, Donghai Guan, Qi Zhu, Weiwei Yuan, Asad Masood Khattak, and Francis Chow
Information literacy outside the classroom, Melanie Wood
Application of fuzzy logic to assess the quality of BPMN models, Fadwa Yahya, Khouloud Boukadi, Hanêne Ben-Abdallah, and Zakaria Maamar
An Enhanced AODV Protocol for Avoiding Black Holes in MANET, Qussai M. Yaseen and Monther Aldwairi
Recommending with limited number of trusted users in social networks, Weiwei Yuan, Donghai Guan, and Asad Masood Khattak
Improving Human Action Recognition through Hierarchical Neural Network Classifiers, Pavel Zhdanov, Adil Khan, Adin Ramirez Rivera, and Asad Masood Khattak
Submissions from 2017
Enterprise systems: The quality of system outputs and their perceived business value, Ahed Abugabah
Evaluation of healthcare enterprise information systems: A structural equation model, Ahed Abugabah
Impact of Ideological Disagreements on International Relations: a Study on Islam and the West, Bashir AbulQaraya
Unsupervised geometrical feature learning from hyperspectral data, Muhammad Ahmad, Adil Mehmood Khan, Rasheed Hussain, Stanislav Protasov, Francis Chow, and Asad Masood Khattak
FLUKES: Autonomous log forensics, intelligence and visualization tool, Monther Aldwairi and Hesham H. Alsaadi
Architecture guidelines for SaaS development process, Saiqa Aleem, Rabia Batool, Faheem Ahmed, Asad Khatak, and Raja Muhammad Ubaid Ullah
The best practice in implementing itil service transition for successful it service production, Mohamed Basel Almourad, Mohammed Hussain, and Feras Al-Obeidat
Identifying Major Tasks from On-line Reviews, Feras Al-Obeidat and Bruce Spencer
Mobile Technology and its Use among Media Students at Zayed University in Dubai, Najat AlSaied and Fokiya Akhtar
Compromised user credentials detection using temporal features: A prudent based approach, Adnan Amin, Sajid Anwar, Babar Shah, and Asad Masood Khattak
Efficiency of nearly periodic structures for mitigation of ground vibration, Lars V. Andersen, Andrew Peplow, and P. Bucinskas
Variation in models for simple dynamic structure-soil-structure interaction problems, L. V. Andersen, A. Peplow, P. Bucinskas, P. Persson, and K. Persson
Variants of spray and forwarding scheme in delay tolerant networks, Mohammad Abdul Azim, Babar Shah, Beom Su Kim, Kyong Hoon Kim, and Ki Il Kim
The Creation of an Arabic Emotion Ontology Based on E-Motive, Anoud Bani-Hani, Munir Majdalweieh, and Feras Obeidat
When Informing Doesn't Inform [Abstract], John Beachboard and Martine Robinson Beachboard
Obstacle-aware resource allocation in business processes, Farah Bellaaj, Mohamed Sellami, Sami Bhiri, and Zakaria Maamar
Configurable structure tree as a means to manage configurable business processes, Wehbi Benallal, Mahmoud Barhamgi, Djamal Benslimane, and Zakaria Maamar
Designing And Implementing B2B Applications Using Argumentative Agents, Jamal Bentahar, Nanjangud Narendra, Zakaria Maamar, Rafiul Alam, and Philippe Thiran
Leveraging the affordances of mobile learning for vocabulary gains, Michael Bowles
A Neural network approach to visibility range estimation under foggy weather conditions, Hazar Chaabani, Faouzi Kamoun, Hichem Bargaoui, Fatma Outay, and Ansar Ul Haque Yasar
An evaluation of seasonal patterns of thermal conditions inside a vegetated courtyard area of a Mediterranean city (Athens), Ioannis Charalampopoulos, Fotoula Droulia, Areti Tseliou, and Ioannis Tsiros
The computing professional skills assessment utilized with graduate students, Maurice Danaher, Kevin Schoepp, and Ashley Ater Kranov
Large residual multiple view 3D CNN for false positive reduction in pulmonary nodule detection, Anton Dobrenkii, Ramil Kuleev, Adil Khan, Adin Ramirez Rivera, and Asad Masood Khattak
Charging infrastructure placement for electric vehicles: An optimization prospective, Waleed Ejaz, M. Naeem, M. R. Ramzan, Farkhund Iqbal, and A. Anpalagan
Production of durable and cost effective sewer pipes using petroleum and industrial waste by-products, Maisa El Gamal, Amr El-Dieb, Khaled El-Sawy, Amr Sweedan, and Abdel Mohsen Mohamed
Academic reading on a collaborative, online platform, Jenny Eppard and Preeya Reddy
Localising content for an XMOOC in the UAE, Jenny Eppard and Preeya Reddy
A framework for flipped learning, Jenny Eppard and Aicha Rochdi
Alert me: Enhancing active lifestyle via observing sedentary behavior using mobile sensing systems, Muhammad Fahim, Thar Baker, Asad Masood Khattak, and Omar Alfandi
Physical activity recognizer based on multimodal sensors in smartphone for ubiquitous-lifecare services, Muhammad Fahim, Asad Masood Khattak, Saiqa Aleem, and Haseena Al Katheeri
Joint workload scheduling and BBU allocation in cloud-RAN for 5G networks, Lilatul Ferdouse, Waleed Ejaz, Alagan Anpalagan, and Asad Masood Khattak
Basis independence of implicitly defined hamiltonian circuit dynamics, Jon Pierre Fortney
Deep learning models for bone suppression in chest radiographs, Maxim Gusarev, Ramil Kuleev, Adil Khan, Adin Ramirez Rivera, and Asad Masood Khattak
The application of narrow-band NDVI as a tool for mapping mangrove environment in Abu Dhabi, Hassan Hajjdiab, Haitham Farok, and Fares M. Howari
Multimedia File Signature Analysis for Smartphone Forensics, D. Hamdi, F. Iqbal, T. Baker, and B. Shah
Securing the internet of things: A worst-case analysis of trade-off between query-anonymity and communication-cost, Kadhim Hayawi, Pin Han Ho, Sujith Samuel Mathew, and Limei Peng
Local mean consistency on numerical solutions of stochastic wave equation with cubic nonlinearities on 2D rectangles, Haziem M. Hazaimeh
Mean Square Consistency on Numerical Solutions of Stochastic Wave Equation with Cubic Nonlinearities on 2D Rectangles, Haziem M. Hazaimeh
A study of children facial recognition for privacy in smart TV, Patrick C.K. Hung, Kamen Kanev, Farkhund Iqbal, David Mettrick, Laura Rafferty, Guan Pu Pan, Shih Chia Huang, and Benjamin C.M. Fung
A novel approach for analyzing student interaction with educational systems, Mohammed Hussain, M. Basel Al-Mourad, Abdullah Hussein, Sujith Mathew, and Essam Morsy
Continuous health monitoring using smartphones-A case-study for monitoring diabetic patients in UAE, A. J. Jihad, Sujith Samuel Mathew, Sujni Paul, and D. Ponmary Pushpalatha
Exploiting Time Series Analysis in Twitter to Measure a Campaign Process Performance, Eleanna Kafeza, Christos Makris, and Gerasimos Rompolas
Forensic analysis of xbox one and playstation 4 gaming consoles, Salam Khanji, Raja Jabir, Farkhund Iqbal, and Andrew Marrington
Privacy Requirements for mobile e-Service in the Health Authority-Abu Dhabi (HAAD), Asad M. Khattak, Farkhund Iqbal, Patrick C.K. Hung, Jwo Shiun Sun, Guan Pu Pan, and Jing Jie Lin
Privacy-aware in the IoT applications: A systematic literature review, Faiza Loukil, Chirine Ghedira-Guegan, Aïcha Nabila Benharkat, Khouloud Boukadi, and Zakaria Maamar
Ongoing Research Agenda on the Internet of Things (IoT) in the Context of Artificial Intelligence (AI), Zakaria Maamar
Detecting and tackling run-time obstacles in social business processes, Zakaria Maamar, Mohamed Sellami, Noura Faci, and Sylvain Lefebvre
A reference framework for enterprise computing curriculum, Munir Majdalawieh and Adam Marks
Learning systems' learning analytics, Adam Marks, Maytha Al-Ali, and Kees Rietsema
Automated malicious advertisement detection using VirusTotal, URLVoid, and TrendMicro, Rima Masri and Monther Aldwairi
From the Internet of Things to the web of things-enabling by sensing as-A service, Sujith Samuel Mathew, Yacine Atif, and May El-Barachi
A Decision support framework for public healthcare: An approach to follow-up support service, Shah Jahan Miah, John G. Gammack, Rashadul Hasan, and Najmul Hasan
Developing a framework towards design understanding for crowdsourcing research: A content analysis, Shah Jahan Miah, Najmul Hasan, Don Kerr, and John G. Gammack
Gamifying Foundational STEM Skills, Jim Morey, John Gammack, and Erik Thornquist
Towards safer roads through cooperative hazard awareness and avoidance in connected vehicles, Fatma Outay, Faouzi Kammoun, Florent Kaisser, and Mohammed Atiquzzaman
ConVeh: Driving Safely into a Connected Future, Fatma Outay, Faouzi Kamoun, Ansar Yasar, Elhadi Shakshuki, and Samar El-Amine
Geologic environments for nuclear waste repositories, Evan K. Paleologos, Abdel Mohsen O. Mohamed, and Kosmas Pavlopoulos
Variations within simple models for structure-soil interaction, Andrew Peplow, Lars Andersen, and Paulius Bucinskas
Environmental vibration reduction utilizing an array of mass scatterers, A. T. Peplow, L. V. Andersen, and P. Bucinskas
Authorship attribution of Arabic tweets, Abdullateef Rabab'Ah, Mahmoud Al-Ayyoub, Yaser Jararweh, and Monther Aldwairi
Towards a Privacy Rule Conceptual Model for Smart Toys, Laura Rafferty, Patrick C. K. Hung, Marcelo Fantinato, Sarajane Marques Peres, Farkhund Iqbal, Sy-Yen Kuo, and Shih-Chia Huang
Reading while listening on mobile devices: An innovative approach to enhance reading, Aicha Rochdi and Jenny Eppard
Urban road network crisis response management: Time-sensitive decision optimization, Sinan Salman and Suzan Alaswad
SONAR: Automatic detection of cyber security events over the twitter stream, Quentin Le Sceller, El Mouatez Billah Karbab, Mourad Debbabi, and Farkhund Iqbal
Predictors of graduate employability in Indian information technology sector, Nidhi Sehgal and Saboohi Nasim
The role of expats, local residents and tourists in defining a destination: A branding case study for Abu Dhabi tourism, Nataša Slak Valek
Junction trees constructions in Bayesian networks, Linda Smail
Factorization of computations in Bayesian networks: Interpretation of factors, Linda Smail and Zineb Azouz
SAND - A dashboard for analyzing employees' social actions over google hangouts, Edvan Soares, Marcos Eduardo, Vanilson Burégio, Emir Ugljanin, and Zakaria Maamar
Selecting Sensors when Forecasting Temperature in Smart Buildings, Bruce Spencer, Feras Al-Obeidat, and Omar Alfandi
Staying on track: The buffering effect of culture on leadership strength and derailment potential, Mary F. Sully de Luque, Yi Zhang, and Jean Brittain Leslie
Safe city: Introducing a flawless model and implementation guidelines to reduce crime rate and response time, Abdallah Tubaishat and Rami Elsayed
A fuzzy logic-based approach for assessing the quality of business process models, Fadwa Yahya, Khouloud Boukadi, Hanêne Ben Abdallah, and Zakaria Maamar
Collusion attacks in Internet of Things: Detection and mitigation using a fog based model, Qussai Yaseen, Yaser Jararweh, Mahmoud Al-Ayyoub, and Monther Al Dwairi
A sequential inspection and replacement policy for degradation-based systems, Zhicheng Zhu, Yisha Xiang, Suzan Alaswad, and C. Richard Cassady
Submissions from 2016
Bounded message delay with threshold time constraint in delay tolerant networks (DTNs), Ali Abbas, Babar Shah, Feras Al-Obeidat, and Farkhund Iqbal
Information quality of enterprise systems in healthcare: An empirical study, Ahed Abugabah
An Architecture for QoS-Enabled Mobile Video Surveillance Applications in a 4G EPC and M2M Environment, Mohammad Abu-Lebdeh, Fatna Belqasmi, and Roch Glitho
Gait fingerprinting-based user identification on smartphones, Muhammad Ahmad, Adil Mehmood Khan, Joseph Alexander Brown, Stanislav Protasov, and Asad Masood Khattak
Challenges in managing real-time data in health information system (HIS), Usman Akhtar, Asad Masood Khattak, and Sungyoung Lee
Secure and efficient multiparty computation on genomic data, Md Momin Al Aziz, Mohammad Z. Hasan, Noman Mohammed, and Dima Alhadidi
Calculating the speed of vehicles using Wireless Sensor Networks, Omar Alfandi, Arne Bochem, Mehdi Akbari Gurabi, Alberto Rivera Diaz, Md Istiak Mehedi, and Dieter Hogrefe
An Algorithm for Inferring Big Data Objects Correlation Using Word Net, M. Basel Almourad, Mohammed Hussain, and Talal Bonny
Forensic investigation of cyberstalking cases using Behavioural Evidence Analysis, Noora Al Mutawa, Joanne Bryce, Virginia N.L. Franqueira, and Andrew Marrington
Cloud-based Lineament Extraction of Topographic Lineaments from NASA Shuttle Radar Topography Mission Data, Feras Al-Obeidat, Leonardo Feltrin, and Farhi Marir
A meta-heuristic approach for developing PROAFTN with decision tree, Feras Al-Obeidat, Babar Shah, Asad Masood Khattak, and Ali Abbas
Predicting students' performance using mutli-criteria classification: A case study, Feras Al-Obeidat and Abdallah Tubasihat
Towards on Demand Road Condition Monitoring Using Mobile Phone Sensing as a Service, Wael Alrahal AlOrabi, Sawsan Abdul Rahman, May El Barachi, and Azzam Mourad
Magec: An image searching tool for detecting forged images in forensic investigation, S. Al Sharif, M. Al Ali, N. Al Reqabi, F. Iqbal, T. Baker, and A. Marrington
White-Hat Hacking Framework for Promoting Security Awareness, S. Al-Sharif, F. Iqbal, T. Baker, and A. Khattack
Evaluating dispersion forces for optimization of van der Waals complexes using a non-empirical functional, Alya A. Arabi
Significant Predictors of e-Learning Readiness for Faculty and Students in a Public University in the UAE, Fida Atallah and Jase Moussa-Inaty
A credibility and classification-based approach for opinion analysis in social networks, Lobna Azaza, Fatima Zohra Ennaji, Zakaria Maamar, Abdelaziz El Fazziki, Marinette Savonnet, Mohamed Sadgal, Eric Leclercq, Idir Amine Amarouche, and Djamal Benslimane
A Lightweight Security Protocol for NFC-based Mobile Payments, Mohamad Badra and Rouba Borghol Badra
Monetizing Personal Data: A Two-Sided Market Approach, Ahmed Saleh Bataineh, Rabeb Mizouni, May El Barachi, and Jamal Bentahar
A MOF-based social web services description metamodel, Amel Benna, Zakaria Maamar, and Mohamed Ahmed Nacer
Sedentary behavior-based user life-log monitoring for wellness services, Hafiz Syed Muhammad Bilal, Asad Masood Khattak, and Sungyoung Lee
A privacy-preserving and power-efficient bicycle tracking scheme for theft mitigation, Arne Bochem, Kevin Freeman, Martin Schwarzmaier, Omar Alfandi, and Dieter Hogrefe
Fusion: Privacy-preserving distributed protocol for high-dimensional data mashup, Gaby G. Dagher, Farkhund Iqbal, Mahtab Arafati, and Benjamin C.M. Fung
Dynamic and efficient brokering of energy suppliers and consumers in a smart grid, Waltenegus Dargie, Omar Alfandi, and Mohamad Badra
Micro-context recognition of sedentary behaviour using smartphone, Muhammad Fahim, Asad Masood Khattak, Thar Baker, Francis Chow, and Babar Shah
Tracking the sedentary lifestyle using smartphone: A pilot study, Muhammad Fahim, Asad Masood Khattak, Francis Chow, and Babar Shah
Combining Weights of Evidence Analysis with Feature Extraction - A Case Study from the Hauraki Goldfield, New Zealand, Leonardo Feltrin, João Gabriel Motta, Feras Al-Obeidat, Farhi Marir, and Martina Bertelli
Lightweight context-aware activity recognition, Byung Gill Go, Asad Masood Khattak, Babar Shah, and Adil Mehmood Khan
Social-based semantic framework for cloud resource management in business processes, Emna Hachicha, Walid Gaaloul, and Zakaria Maamar
Towards strategic information & communication technology (ICT) framework for smart cities decision-makers, Mahmoud El Hendy, Sami Miniaoui, and Hussein Fakhry
A crowdsource model for quality assurance in cloud computing, Mohammed Hussain and Mohamed Basel Al-Mourad
Collect, scope, and verify big data - A framework for institution accreditation, Mohammed Hussain, Mohamed Basel Al-Mourad, and Sujith Samuel Mathew
Interdiscursive strategies of metaphor-driven rhetoric in Romanian discourses on a political crisis, Cornelia Ilie and Ariadna ŞtefǍnescu
Analysis of cloud computing attacks and countermeasures, Raja Mohamed Jabir, Salam Ismail Rasheed Khanji, Liza Abdallah Ahmad, Omar Alfandi, and Huwida Said
Women in Middle-Eastern organisations: career experiences, opportunities and work-life balance, Nicolina Kamenou-Aigbekaen and Kathryn Thory
Utilizing ERP System in Higher Education: A Case of a HEI in the UAE, Maitha Khalifa Alshaer
Database auditing and forensics: Exploration and evaluation, Salam Ismail Rasheed Khanji, Asad Masood Khattak, and Hakim Hacid
Evaluation of Linux SMTP server security aspects - A case study, Salam Khanji, Raja Jabir, Liza Ahmad, Omar Alfandi, and Huwida Said
Smart meter: Toward client centric energy efficient smartphone based solution, Salam Khanji, Asad Masood Khattak, and Omar Alfandi
Perspectives on cervical cancer screening in Muslim women of Dubai (UAE): A qualitative study, Sarah Khan and Gillian Woolhead
Communication overload management through social interactions clustering, Juan Antonio Lossio-Ventura, Hakim Hacid, Mathieu Roche, and Pascal Poncelet
On capturing and quantifying social qualities in business processes, Zakaria Maamar, Hakim Hacid, Emir Ugljanin, and Mohamed Sellami
Mining the Web and Literature to Discover New Knowledge about Diabetes, Farhi Marir, Huwida Said, and Feras Al-Obeidat
Analytics within UAE higher education context, Adam Marks and Maytha Al-Ali
Assessing the Status of Housing Conditions for Workers of Farms in Liwa within the United Arab Emirates, Fatima Marzouq AlMehairbi
Design methodologies for M-health innovations: A content analysis, Shah Jahan Miah, John Gammack, Najmul Hasan, and Md Rakibul Hoque
The effects of Culture on Emirati Tourist motivation and destination choice, Noela Michael, Charlotte Wien, and Depaa Kumar
A data visualisation for horizontal eye-movements, Jim Morey and John Gammack
Extending TLS with KMIP protocol for cloud computing, Mounira Msahli, Ahmed Serhrouchni, and Mohamad Badra
Al Ain Oases Mapping Project: Qattārah Oasis, past and present (poster), Timothy Power, Peter Sheehan, Shamsa Mohamed Al Dhaheri, Mariyam Abd Al Aziz Al Hammadi, Khuloud Ibrahim Al Hammadi, Afra Adnan Al Noaimi, Ayesha Muhsen Al Subaihi, Hamda Hasan Al Omar, Fatima Thani Al-Romeithi, Muzna Khalifa Al Mansoori, Leqa Jawher Al Zaabi, Zainab Rubaiya Al Naemi, Mohamed Khalifa, and Mohamed Al Dhaheri
An Elastic Hybrid Sensing Platform: Architecture and Research Challenges, Sleiman Rabah, Fatna Belqasmi, Rabeb Mizouni, and Rachida Dssouli
Security analysis of IoT protocols: A focus in CoAP, Reem Abdul Rahman and Babar Shah
The computing professional skills assessment: An innovative method for assessing ABET's student outcomes, Kevin Schoepp, Maurice Danaher, and Ashley Ater Kranov
Fuzzy Query Routing in Unstructured Mobile Peer-to-Peer Networks, Babar Shah, Farkhund Iqbal, and Asad Masood Khattak
A fuzzy logic scheme for real-time routing in wireless sensor networks, Babar Shah, Asad Masood Khattak, and Ki Il Kim
Forecasting Internal Temperature in a Home with a Sensor Network, Bruce Spencer and Omar Alfandi
Temperature Forecasts with Stable Accuracy in a Smart Home, Bruce Spencer and Feras Al-Obeidat
Student Perspectives of eFolios – an Experience from an Outcome-Based University, Abdallah Tubaishat
How to Restrict Web 2.0 Applications Use in the Workplace? Example of Google+ Hangouts, Emir Ugljanin, Noura Faci, Vanilson Buregio, and Zakaria Maamar
Tracking users' actions over social media: Application to Facebook, Emir Ugljanin, Noura Faci, Mohamed Sellami, and Zakaria Maamar
Integrating Content and English-Language Learning in a Middle Eastern Information Technology College: Investigating Faculty Perceptions, Practices and Capabilities, Norman Williams, John Beachboard, and Robert Bohning
Towards a meta-modeling approach for social business process requirements capture, Fadwa Yahya, Khouloud Boukadi, Zakaria Maamar, and Hanêne Ben-Abdallah
IoT end-user applications provisioning in the cloud: State of the art, Sami Yangui, Roch H. Glitho, Fatna Belqasmi, Monique J. Morrow, and Paul A. Polakos
Android device hacking tricks and countermeasures, Khulood Al Zaabi
Android forensics: Investigating social networking cybercrimes against man-in-the-middle attacks, Khulood Ali Al Zaabi
Submissions from 2015
Smart parking system for vehicles, Sripriya Srikant Adhatarao, Omar Alfandi, Arne Bochem, and Dieter Hogrefe
Exhaust: Optimizing Wu-Manber pattern matching for intrusion detection using Bloom filters, Monther Aldwairi and Koloud Al-Khamaiseh
Challenges of leveraging mobile sensing devices in wireless healthcare, Omar Alfandi, Suhail Ahmed, May El Barachi, and Adil Khan
Received signal strength indication for movement detection, Omar Alfandi, Arne Bochem, Kirill Bulert, Dieter Hogrefe, and Alwin Maier
Social learning on the move - A research roadmap, Dima Alhadidi, Zakaria Maamar, and Farhi Marir
Towards HSS as a virtualized service for 5G networks, Hanieh Alipour, Fatna Belqasmi, Mohammad Abu-Lebdeh, and Roch Glitho
Consumers Attitude towards the Use of Mobile Health Apps: An Empirical Review, Ayesha Almarri and Tariq Bhatti
Behavioural evidence analysis applied to digital forensics: An empirical analysis of child pornography cases using P2P networks, Noora Al Mutawa, Joanne Bryce, Virginia N.L. Franqueira, and Andrew Marrington
Identification and analysis of free games' permissions in Google Play, Eiman Alothali, Fatna Belqasmi, Omar Alfandi, and Farkhund Iqbal
Intelligent cloud computing first international conference, ICC 2014 Muscat, Oman, february 24–26, 2014 revised selected papers, Asma Al-Saidi, Rudolf Fleischer, Zakaria Maamar, and Omer F. Rana
A new information model towards context-aware service provisioning in the Internet-of-Things, Mohab Aly, May Elbarachi, and Rachida Dssouli
iPads in UAE University Classrooms: Implications for Teaching and Learning, Fida Atallah, Rana M. Tamim, Linda Colburn, and Lina El Saadi
A novel cryptography based privacy preserving solution for urban mobility and traffic control, Mohamad Badra and Elyes Ben Hamida
An innovative platform for person-centric health and wellness support, Oresti Banos, Muhammad Bilal Amin, Wajahat Ali Khan, Muhammad Afzel, Mahmood Ahmad, Maqbool Ali, Taqdir Ali, Rahman Ali, Muhammad Bilal, Manhyung Han, Jamil Hussain, Maqbool Hussain, Shujaat Hussain, Tae Ho Hur, Jae Hun Bang, Thien Huynh-The, Muhammad Idris, Dong Wook Kang, Sang Beom Park, Hameed Siddiqui, Le Ba Vui, Muhammad Fahim, Asad Masood Khattak, Byeong Ho Kang, and Sungyoung Lee
NGNaaS: NGNs as cloud computing services, Fatna Belqasmi, May El Barachi, Jose M.Alcaraz Calero, Mohamad Badra, and Omar Alfandi
Technology Integration in Postsecondary Education: A Summary of Findings of a Series of Meta-Analytical Research, Eugene Borokhovski, Robert M. Bernard, Rana M. Tamim, and Richard F. Schmid
Sandboxing: Aid in digital forensic research, Asif Iqbal, Hanan Alobaidli, Mario Guimaraes, and Oliver Popov
Exploring the extent to which English LIS Masters programs in the UAE and Qatar meet the skills and knowledge needs of employers in the library and information studies field, Nicole Johnston, Judith Mavodza, and Jassim Mohammed Jirjees
An RFID solution for the monitoring of storage time and localization of perishable food in a distribution center, Faouzi Kamoun, Omar Alfandi, and Sami Miniaoui
Weaving risk identification into crowdsourcing lifecycle, Faouzi Kamoun, Dima Alhadidi, and Zakaria Maamar
Correlating health and wellness analytics for personalized decision making, Wajahat Ali Khan, Muhammad Idris, Taqdir Ali, Rahman Ali, Shujaat Hussain, Maqbool Hussain, Muhammad Bilal Amin, Asad Masood Khattak, Yuan Weiwei, Muhammad Afzal, Sungyoung Lee, and Byeong Ho Kang
'Controlling' Web 2.0 Applications in the Workplace, Zakaria Maamar, Vanilson Buregio, Noura Faci, Djamal Benslimane, and Quan Z. Sheng
Collaborative enterprise applications based on business and social artifacts, Zakaria Maamar, Vanilson Burégio, and Mohamed Sellami
Business Reputation of Social Networks of Web Services, Zakaria Maamar, Gianpiero Costantino, Marinella Petrocchi, and Fabio Martinelli
Using incentives to analyze social web services’ behaviors, Zakaria Maamar, Gianpiero Costantino, Marinella Petrocchi, and Fabio Martinelli
Enterprise 2.0: Research challenges and opportunities, Zakaria Maamar, Noura Faci, Ejub Kajan, Khouloud Boukadi, Sherif Sakr, Mohamed Boukhebouze, Soraya Kouadri Mostéfaoui, Vanilson Burégio, Fadwa Yahya, Valérie Monfort, and Romain Hennion
A framework of enriching business processes life-cycle with tagging information, Zakaria Maamar, Sherif Sakr, Ahmed Barnawi, and Seyed Mehdi Reza Beheshti
SUPER: Social-based business process management framework, Zakaria Maamar, Sherif Sakr, Noura Faci, Mohamed Boukhebouze, and Ahmed Barnawi
Analyzing social web services' capabilities, Zakaria Maamar, Hamdi Yahyaoui, Azzam Mourad, and Mohamed Sellami
Secure and private management of healthcare databases for data mining, Noman Mohammed, Samira Barouti, Dima Alhadidi, and Rui Chen
Interface development for a gaze-controlled reading support application, Jim Morey, John Gammack, and Erik S. Thornquist
How can one learn mathematical word problems in a second language? A cognitive load perspective, Jase Moussa-Inaty, Mark Causapin, and Timothy Groombridge
Distributed computing and artificial intelligence, 12th international conference, Sigeru Omatu, Qutaibah M. Malluhi, Sara Rodríguez González, Grzegorz Bocewicz, Edgardo Bucciarelli, Gianfranco Giulioni, and Farkhund Iqbal
Impact of Sybil attacks on Web services trust assessment, Zohra Saoud, Noura Faci, Zakaria Maamar, and Djamal Benslimane
Sybil tolerance and probabilistic databases to compute web services trust, Zohra Saoud, Noura Faci, Zakaria Maamar, and Djamal Benslimane
Web services trust assessment based on probabilistic databases, Zohra Saoud, Noura Faci, Zakaria Maamar, and Djamal Benslimane
Mathematics and mobile learning, Fayez Sayed
Innovative Public Libraries in United Arab Emirates: Taking library services in public spaces, Mary Sengati-Zimba, Judith Mavodza, and Emad Abu Eid
Making a Massive Tablet Initiative Work: Perspectives from a United Arab Emirates Case Study, Rana M. Tamim, Linda Colburn, Fida Atallah, and Lina El Saadi
Enhancing business processes with web 2.0 features, Fadwa Yahya, Khouloud Boukadi, Zakaria Maamar, and Hanêne Ben Abdallah
Submissions from 2014
CAT Record (computer activity timeline record): A unified agent based approach for real time computer forensic evidence collection, Shadi Al Awawdeh, Ibrahim Baggili, Andrew Marrington, and Farkhund Iqbal
An information security awareness program to address common security concerns in IT unit, Shadi Al Awawdeh and Abdallah Tubaishat
A comparison of forensic acquisition techniques for android devices: A case study investigation of orweb browsing sessions, Nedaa Al Barghouthy and Andrew Marrington
Ethics behind cyber warfare: A study of Arab citizens awareness, Nedaa Baker Al Barghuthi and Huwida Said
An approach for the validation of file recovery functions in digital forensics' software tools, Sultan Al Sharif, Mohamed Al Ali, Naser Salem, Farkhund Iqbal, May El Barachi, and Omar Alfandi
A forensic analysis framework for recovering encryption keys and BB10 backup decryption, Halima Al Shehhi, Dua'A Abu Hamdi, Izzeddin Asad, and Farkhund Iqbal
Competitive Moves Over Time: The Case of SAP, Michelle Antero, Jonas Hedman, and Stefan Henningsson
Performance of a Logical, Five- Phase, Multithreaded, Bootable Triage Tool, Ibrahim Baggili, Andrew Marrington, and Yasser Jafar
Performance of a logical, five-phase, multithreaded, bootable triage tool, Ibrahim Baggili, Andrew Marrington, and Yasser Jafar
Analysis of the Rhode Island schumann resonance daily-average data, Robert Boldi, Earle Williams, and Anirban Guha
Green Computing in the Desert: Applying Problem-Based Learning at an Emirati University, John C. Beachboard and Martine Robinson Beachboard
Reputation-based composition of social web services, Alessandro Celestini, Gianpiero Costantino, Rocco De Nicola, Zakaria Maamar, Fabio Martinelli, Marinella Petrocchi, and Francesco Tiezzi
The iPad: Another Gadget or a tool for Constructive Learning?, Linda Colburn and Rana M. Tamim
Online engineering courses: Benchmarking quality, Maurice Danaher
Digital forensics and cyber crime: Fifth international conference, ICDF2C 2013 Moscow, Russia, September 26–27, 2013 revised selected papers, Pavel Gladyshev, Andrew Marrington, and Ibrahim Baggili
Schumann Resonance spectral characteristics: A useful tool to study Transient Luminous Events (TLEs) on a global scale, Anirban Guha, Earle Williams, Robert Boldi, Gabriella Satori, Tamás Nagy, Joan Montanyà, and Pascal Ortega
Session details: Gamification, Mario Guimaraes
FDG - Gender differences in videogame development classes: U.S. and the U.A.E., Mario Guimaraes and Leon Jololian
Privacy-preserving medical reports publishing for cluster analysis, Ali Hmood, Benjamin C.M. Fung, and Farkhund Iqbal
Differentiated QoS for overlay-based disaster response systems, Mohammadmajid Hormati, Ferhat Khendek, Roch Glitho, and Fatna Belqasmi
An authentication scheme to protect the location privacy of femtocell users, Mohammed Hussain
Trust in Mobile Cloud Computing with LTE-based Deployment, Mohammed Hussain and Basel Mohamed Almourad
Effective third party auditing in cloud computing, Mohammed Hussain and Mohamed Basel Al-Mourad
Amazon Kindle Fire HD forensics, Asif Iqbal, Hanan Alobaidli, Andrew Marrington, and Ibrahim Baggili
Forensic artifacts of the ChatON Instant Messaging application, Asif Iqbal, Andrew Marrington, and Ibrahim Baggili
A new business model and architecture for context-aware applications provisioning in the cloud, Nadjia Kara, May El Barachi, Abderrahmane El Bardai, and Omar Alfandi
A direct method for teaching and measuring engineering professional skills for global workplace competency: Adaptations to computing at a University in the United Arab Emirates, Ashley Ater Kranov, Maurice Danaher, and Kevin Schoepp
Using fixed-price auctions for selection in communities of web services, Erbin Lim and Zakaria Maamar
Impact of cloud computing adoption on firm stock price - An empirical research, Adam M. Mahmood, Faruk Arslan, Jagadish Dandu, Godwin Udo, and Aurelia Nicholas-Donald
AMCIS - Impact of cloud computing adoption on firm stock price - An empirical research, M. Adam Mahmood, Faruk Arslan, Jagadish Dandu, and Godwin J. Udo
In Search of Localization Criteria for Learning Solutions: Examining the localization needs of Finnish learning solutions in the United Arab Emirates, Tiina Mäkelä, Marja Kankaanranta, Bradley Young, and Qasim Alshannag
In Search of Educational, Socio-cultural, and Technological Criteria for Localizing Learning Solutions for Varying Cultural Contexts, Tiina Mäkelä, Bradley Young, and Jan Pawlowski
Computer Profiling for Preliminary Forensic Examination, Andrew Marrington, Farkhund Iqbal, and Ibrahim Baggili
Testing the forensic soundness of forensic examination environments on bootable media, Ahmed Fathy Abdul Latif Mohamed, Andrew Marrington, Farkhund Iqbal, and Ibrahim Baggili
Preliminary forensic analysis of the Xbox one, Jason Moore, Ibrahim Baggili, Andrew Marrington, and Armindo Rodrigues
An infrastructure for robotic applications as cloud computing services, Carla Mouradian, Fatima Zahra Errounda, Fatna Belqasmi, and Roch Glitho
Adaptive SLA-based elasticity management algorithms for a virtualized IP multimedia subsystem, Hani Nemati, Arjun Singhvi, Nadjia Kara, and May El Barachi
Assessing the Level of Knowledge About Cybercrimes Among Young Adults Within the United Arab Emirates, Sarah Omar Bamatraf
A RESTfull architecture for enabling rapid development and deployment of companion robot applications, Razieh Safaripour, Ferhat Khendek, Roch Glitho, and Fatna Belqasmi
A fuzzy clustering-based credibility model for trust assessment in a service-oriented architecture, Zohra Saoud, Noura Faci, Zakaria Maamar, and Djamal Benslimane
Global circuit response to the 11-year solar cycle: Changes in source or in medium?, Earle Williams, Anirban Guha, Robert Boldi, Gabriella Satori, Alexander Koloskov, and Yuri Yampolski
Submissions from 2013
Deploying open source software (OSS) in UAE schools, Manar Abu Talib, Mezhel Bashayer, Abdulla Huda, Khalid Reem, and Ali Zamzam
Critical structure of ethics behind offensive cyber warfare, Nedaa B. Al Barghouthi and Huwida Said
Improving energy efficiency of data communication in a hybrid PKI-based approach for WSNs, Omar Alfandi, Arne Bochem, Ansgar Kellner, and Dieter Hogrefe
BlackBerry PlayBook backup forensic analysis, Mohamed Al Marzougy, Ibrahim Baggili, and Andrew Marrington
ECIS - Evolution Of Business Models: A Case Study Of SAP, Michelle Antero, Jonas Hedman, and Stefan Henningsson
Emirati Student Voices on E-learning Readiness, Fida Atallah and Jase Moussa-Inaty
Towards a unified agent-based approach for real time computer forensic evidence collection, Shadi Al Awawdeh, Ibrahim Baggili, Andrew Marrington, and Farkhund Iqbal
Cybercrime, Censorship, Perception and Bypassing Controls: An Exploratory Study, Ibrahim Baggili, Moza Al Shamlan, Bedoor Al Jabri, and Ayesha Al Zaabi
Research Trends in Digital Forensic Science: An Empirical Analysis of Published Research, Ibrahim Baggili, Afrah Baabdallah, Deena Al-Safi, and Andrew Marrington