Follow


Submissions from 2019

Link

Memory Forensics: Recovering Chat Messages and Encryption Master Key, Abdullah Kazim, Fadya Almaeeni, Shamsah Al Ali, Farkhund Iqbal, and Khalil Al-Hussaeni

Link

Congestion Control in Wireless Sensor Networks based on Support Vector Machine, Grey Wolf Optimization and Differential Evolution, Hafiza Syeda Zainab Kazmi, Nadeem Javaid, Muhammad Imran, and Fatma Outay

Link

An Application of Using Support Vector Machine Based on Classification Technique for Predicting Medical Data Sets, Mohammed Khalaf, Abir Jaafar Hussain, Omar Alfandi, Dhiya Al-Jumeily, Mohamed Alloghani, Mahmood Alsaadi, Omar A. Dawood, and Dhafar Hamed Abd

Link

Urban sensing: Towards security efficient sensing network scheme, Salam Khanji, Mohamad Badra, Omar Alfandi, and Rouba Borghol

Link

ZigBee Security Vulnerabilities: Exploration and Evaluating, Salam Khanji, Farkhund Iqbal, and Patrick Hung

Link

Boosting IoT Efficiency and Security through Blockchain: Blockchain-based Car Insurance Process - A Case Study, Salam Khanji, Farkhund Iqbal, Zakaria Maamar, and Hakim Hacid

Link

Blockchain technology as a support infrastructure in E-Government evolution at Dubai economic department, Shafaq Naheed Khan, Mohammed Shael, and Munir Majdalawieh

Link

Smart meter security: Vulnerabilities, threat impacts, and countermeasures, Asad Masood Khattak, Salam Khanji, and Wajahat Ali Khan

Link

Stock market trend prediction using supervised learning, Asad Masood Khattak, Habib Ullah, Hassan Ali Khalid, Ammara Habib, Muhammad Zubair Asghar, and Fazal Masud Kundi

Link

Speculo: A tool for multiple identities exploration and detection in social networks, Sumaya Khoory, Noora Al Roken, Maryam Al Abdooli, and Hakim Hacid

Link

Parking availability forecasting model, Mohammad Amin Kuhail, Manohar Boorlu, Neeraj Padarthi, and Collin Rottinghaus

Link

Noise Reduction in Network Embedding, Cong Li, Donghai Guan, Zhiyuan Cui, Weiwei Yuan, Asad Masood Khattak, and Muhammad Fahim

Link

Robot computing for music visualization, Pei Chun Lin, David Mettrick, Patrick C.K. Hung, and Farkhund Iqbal

Link

Towards a music visualization on robot (MVR) prototype, Pei Chun Lin, David Mettrick, Patrick C.K. Hung, and Farkhund Iqbal

PDF

Cognitive Computing Meets the Internet of Things, Zakaria Maamar, Thar Baker, Noura Faci, Emir Ugljanin, Yacine Atif, Mohammed Al-Khafajiy, and Mohamed Sellami

Link

Towards a Resource-aware Thing Composition Approach, Zakaria Maamar, Saoussen Cheikhrouhou, Muhammad Asim, Ayesha Qamar, Thar Bake, and Emir Ugljanin

PDF

Everything-as-a-Thing for Abstracting the Internet-of-Things, Zakaria Maamar, Noura Faci, Mohamed Sellami, Emir Ugljanin, and Ejub Kajan

Link

Towards a seamless coordination of cloud and fog, Zakaria Maamar, Emir Ugljanin, Thar Baker, Mohammed Al Khafajiy, Noura Faci, and Vanilson Burégio

Link

Forensic analysis of wearable devices: Fitbit, Garmin and HETP Watches, Aine MacDermott, Stephen Lea, Farkhund Iqbal, Ibrahim Idowu, and Babar Shah

Link

Advancing digital transformation: Integrated digital transformation framework for a successful deployment, Munir Majdalawieh

Link

A recursive co-occurrence text mining of the quran to build corpora for islamic banking business processes, Farhi Marir, Issam Tlemsani, and Munir Majdalwieh

Link

Advanced mineral carbonation: An approach to accelerate CO2 sequestration using steel production wastes and integrated fluidized bed reactor, Abdel Mohsen Onsy Mohamed, Maisa El-Gamal, and Suhaib Hameedi

Link

Humanoid robots as teaching assistants in an arab school, Omar Mubin, Mariam Alhashmi, Rama Baroud, and Fady S. Alnajjar

Link

Facial image pre-processing and emotion classification: A deep learning approach, Alramzana Nujum Navaz, Serhani Mohamed Adel, and Sujith Samuel Mathew

Link

A Novel Game Theoretic Approach for Forming Coalitions between IMS Cloud Providers, Hani Nemati, May El Barachi, Nadjia Kara, and Fatna Belqasmi

Link

Applying system dynamics to model advanced persistent threats, Mathew Nicho and Hussein Fakhry

PDF

Dimensions of 'socio' vulnerabilities of advanced persistent threats, Mathew Nicho and Christopher D. McDermott

Link

Improving collaboration in blended learning environments through differentiated activities and mobile-assisted language learning tools, Ajda Osifo

PDF

The covcrav project: Architecture and design of a cooperative v2v crash avoidance system, Fatma Outay, Hichem Bargaoui, Anouar Chemek, Faouzi Kamoun, and Ansar Yasar

PDF

V2V and V2I communications for traffic safety and CO2 emission reduction: A performance evaluation, Fatma Outay, Faouzi Kamoun, Florent Kaisser, Doaa Alterri, and Ansar Yasar

Link

Social networks and leadership emergence, Jin Park

Link

Computation of axisymmetric vibration transmission using a well-conditioned system for elastic layers over a half–space, Andrew T. Peplow, Lars V. Andersen, and Peter Persson

Link

How building adjacency affects occupant-perceivable vibrations due to urban sources: A parametric study, Peter Persson, Loukas F. Kallivokas, Lars V. Andersen, and Andrew T. Peplow

Link

Data-driven curation, learning and analysis for inferring evolving IoT botnets in the wild, Morteza Safaei Pour, Antonio Mangino, Kurt Friday, Matthias Rathbun, Elias Bou-Harb, Farkhund Iqbal, Khaled Shaban, and Abdelkarim Erradi

Link

Digital investigation of wireless sensor networks - IRIS mote, Argianto Rahartomo, Arne Bochem, and Omar Alfandi

Link

Holistic User eXperience in Mobile Augmented Reality Using User eXperience Measurement Index, Fahad Ahmed Satti, Jamil Hussain, Hafiz Syed Muhammad Bilal, Wajahat Ali Khan, Asad Masood Khattak, Ju Eun Yeon, and Sungyoung Lee

Link

Resolving data interoperability in ubiquitous health profile using semi-structured storage and processing, Fahad Ahmed Satti, Wajahat Ali Khan, Ganghun Lee, Asad Masood Khattak, and Sungyoung Lee

Link

Radiomic-based framework for early diagnosis of lung cancer, Ahmed Shaffie, Ahmed Soliman, Hadil Abu Khalifeh, Mohammed Ghazal, Fatma Taher, Adel Elmaghraby, Robert Keynton, and Ayman El-Baz

Link

On the Integration of CT-Derived Features for Accurate Detection of Lung Cancer, Ahmed Shaffie, Ahmed Soliman, Hadil Abu Khalifeh, Mohammed Ghazal, Fatma Taher, Robert Keynton, Adel Elmaghraby, and Ayman El-Baz

Link

A New System for Lung Cancer Diagnosis based on the Integration of Global and Local CT Features, Ahmed Shaffie, Ahmed Soliman, Hadil Abu Khalifeh, Fatma Taher, Mohammed Ghazal, Neal Dunlap, Adel Elmaghraby, Robert Keynton, and Ayman El-Baz

Link

A Novel CT-Based Descriptors for Precise Diagnosis of Pulmonary Nodules, Ahmed Shaffie, Ahmed Soliman, Hadil Abu Khalifeh, Fatma Taher, Mohammed Ghazal, Neal Dunlap, Adel Elmaghraby, Robert Keynton, and Ayman El-Baz

Link

Higher Education 4.0: Uni for nothin’, MOOCs for free?, Ravi Sharma, Kevin Jones, Warwick Anderson, and Anushia Inthiran

Link

Early Assessment of Acute Renal Rejection Post-transplantation: A Combined Imaging and Clinical Biomarkers Protocol, Mohamed Shehata, Fatma Taher, Mohammed Ghazal, Ali Mahmoud, Garth Beache, Mohamed Abou El-Ghar, Amy C. Dwyer, Adel Elmaghraby, and Ayman El-Baz

Link

Smart homes as an IoT application: Predicting attitudes and behaviours, Ahmed Shuhaiber, Ibrahim Mashal, and Osama Alsaryrah

Link

The Role of Smart Homes' Attributes on Users' Acceptance, Ahmed Shuhaiber, Ibrahim Mashal, and Osama Alsaryrah

PDF

Forecasting Temperature in a Smart Home with Segmented Linear Regression, Bruce Spencer, Omar Alfandi, and Feras Al-Obeidat

PDF

Whose Responsibility is it Anyway?, Kristine N. Stewart and Judith Mavodza

Link

Faculty perception of engineering student cheating and effective measures to curb it, Sami W. Tabsh, Hany A. El Kadi, and Akmal S. Abdelfatah

Link

A Review on the Cerebrovascular Segmentation Methods, Fatma Taher, Ali Mahmoud, Ahmed Shalaby, and Ayman El-Baz

Link

Colorizing gray level images by using wavelet filters, F. Taher, M. Darweesh, and H. Al-Ahmad

Link

Security in cloud computing: State-of-the-art, key features, challenges, and opportunities, Abdallah Tubaishat

Link

Improving Complex Network Controllability via Link Prediction, Ran Wei, Weiwei Yuan, Donghai Guan, Asad Masood Khattak, and Muhammad Fahim

Link

A Privacy-Preserving Context Ontology (PPCO) for Smart Connected Toys, Benjamin Yankson, Farkhund Iqbal, Saiqa Aleem, Babar Shah, Patrick C.K. Hung, and Anna Priscilla De Albuquerque

PDF

HICSS - Modeling Privacy Preservation in Smart Connected Toys by Petri-Nets, Benjamin Yankson, Farkhund Iqbal, Zhihui Lu, Xiaoling Wang, and Patrick Hung

Link

Drone forensics: A case study on a DJI mavic air, Maryam Yousef and Farkhund Iqbal

Link

Resource Allocation in Moving Small Cell Network using Deep Learning based Interference Determination, Saniya Zafar, Sobia Jangsher, Moayad Aloqaily, Ouns Bouachir, and Jalel Ben Othman

Link

Active Sampling Based on MMD for Model Adaptation, Qi Zhang, Donghai Guan, Weiwei Yuan, and Asad Masood Khattak

Link

Proceedings of the Applied Linguistics and Language Teaching Conference 2018: Teaching and Learning in a Globalized World, Wafa Zoghbor, Suhair Al-Alami, and Thomaï Alexiou

Submissions from 2018

Link

Classification of Foetal Distress and Hypoxia Using Machine Learning Approaches, Rounaq Abbas, Abir Jaafar Hussain, Dhiya Al-Jumeily, Thar Baker, and Asad Khattak

Link

Green computing: Awareness and practices, Ahed Abugabah and Amira Abubaker

Link

A novel framework for software defined wireless sensor networks, Khandakar Ahmed, Nazmus S. Nafi, Waleed Ejaz, Mark A. Gregory, and Asad M. Khattak

Link

Towards Inclusive Social Networks for the Developing World, Christian Akpona, Rose Gohoue, Herve Ahouantchede, Fatna Belqasmi, Roch Glitho, and Jules Degila

Link

A Survey of Resource Management Challenges in Multi-cloud Environment: Taxonomy and Empirical Analysis, Bandar Aldawsari, Thar Baker, Muhammad Asim, Zakaria Maamar, Dhiya Al-Jumeily, and Mohammed Alkhafajiy

Link

Characterizing realistic signature-based intrusion detection benchmarks, Monther Aldwairi, Mohammad A. Alshboul, and Asmaa Seyam

PDF

Detecting Fake News in Social Media Networks, Monther Aldwairi and Ali Alwahedi

Link

Seamless WSN Connectivity Using Diverse Wireless Links, Omar Alfandi, Jagadeesha Rb, and John Beachboard

Link

Large scale image dataset construction using distributed crawling with hadoop YARN, Rahman Ali, Asmat Ali, Asad Masood Khatak, and Muhammad Saqlain Aslam

Link

A case-based meta-learning and reasoning framework for classifiers selection, Rahman Ali, Aasad Masood Khatak, Francis Chow, and Sungyoung Lee

Link

Malware detection using DNS records and domain name features, Khulood Al Messabi, Monther Aldwairi, Ayesha Al Yousif, Anoud Thoban, and Fatna Belqasmi

Link

Analyzing the Behavior of Autistic and Normal Developing Children Using Eye Tracking Data, Mohamed Basel Almourad, Emad Bataineh, Joana Stocker, and Farhi Marir

Link

Opinions Sandbox: Turning Emotions on Topics into Actionable Analytics, Feras Al-Obeidat, Eleanna Kafeza, and Bruce Spencer

Link

Detecting Malware Domains: A Cyber-Threat Alarm System, Khalifa AlRoum, Abdulhakim Alolama, Rami Kamel, May El Barachi, and Monther Aldwairi

Link

Penetration and security of openssh remote secure shell service on raspberry Pi 2, Hesham H. Alsaadi, Monther Aldwairi, May Al Taei, Mansoor Albuainain, and Maktoom Alkubaisi

Link

Detecting Distributed Denial of Service Attacks in Neighbour Discovery Protocol Using Machine Learning Algorithm Based on Streams Representation, Abeer Abdullah Alsadhan, Abir Hussain, Thar Baker, and Omar Alfandi

Link

Intelligent information systems and image processing: A novel pan-sharpening technique based on Multiscale decomposition, Ahmad Al Smadi and Ahed Abugabah

Link

E-Healthcare Knowledge Creation Platform Using Action Research, May Al Taei, Eleanna Kafeza, and Omar Alfandi

Link

Just-in-time Customer Churn Prediction: With and Without Data Transformation, Adnan Amin, Babar Shah, Asad Masood Khattak, Thar Baker, Hamood Ur Rahman Durani, and Sajid Anwar

Link

Configurable data acquisition for cloud-centric IoT, Muhammad Bilal Amin, Muhammad Sadiq, Wajahat Ali Khan, Asad Masood Khattak, Usman Akhtar, and Sungyoung Lee

Link

Impact of document representation on neural ad hoc retrieval, Ebrahim Bagheri, Faezeh Ensan, and Feras Al-Obeidat

Link

Highlighting the Future of Autonomous Vehicle Technology in 2020-2050, Nedaa Baker Al Barghuthi, Deepa Pavithran, and Huwida E. Said

Link

Energy efficient resource allocation for NOMA in cellular IoT with energy harvesting, Mehak Basharat, Waleed Ejaz, Muhammad Naeem, Asad Masood Khattak, Alagan Anpalagan, and Omar Alfandi

An understanding of consumption trends of smart phones on university campus: A comparison study, Emad Bataineh and Sara Alamodi

Link

Visual attention toward socially rich context information for autism spectrum disorder (ASD) and normal developing children: An eye tracking study, Emad Bataineh, Mohamed Basel Almourad, Farhi Marir, and Joana Stocker

Link

Usability analysis on Dubai e-government portal using eye tracking methodology, Emad Bataineh, Basel Al Mourad, and Fazouzi Kammoun

Link

Multi-classifier system for authorship verification task using word embeddings, Nacer Eddine Benzebouchi, Nabiha Azizi, Monther Aldwairi, and Nadir Farah

Link

Achievement and attitudes in technology-supported postsecondary education: Complexity of relationships through the lens of meta-analysis, Eugene Borokhovski, Robert M. Bernard, Rana M. Tamim, and Richard F. Schmid

Link

Drone Forensics: Challenges and New Insights, Hana Bouafif, Faouzi Kamoun, Farkhund Iqbal, and Andrew Marrington

Link

News, Fake News, and Critical Authority, John M. Budd and Kristine N. Stewart

PDF

Estimating meteorological visibility range under foggy weather conditions: A deep learning approach, Hazar Chaabani, Naoufel Werghi, Faouzi Kamoun, Bilal Taha, Fatma Outay, and Ansar Ul Haque Yasar

Link

Formal specification and verification of cloud resource allocation using timed petri-nets, Saoussen Cheikhrouhou, Nesrine Chabouh, Slim Kallel, and Zakaria Maamar

Link

A novel feature selection-based sequential ensemble learning method for class noise detection in high-dimensional data, Kai Chen, Donghai Guan, Weiwei Yuan, Bohan Li, Asad Masood Khattak, and Omar Alfandi

Link

Empowering Graduates for Knowledge Economies in Developing Countries, Maurice Danaher, Kevin Shoepp, Ashley Ater Kranov, and Julie Bauld Wallace

Link

Impact of credibility on opinion analysis in social media, Fatima Zohra Ennaji, Lobna Azaza, Zakaria Maamar, Abdelaziz El Fazziki, Marinette Savonnet, Mohamed Sadgal, Eric Leclercq, Idir Amine Amarouche, and Djamal Benslimane

Link

Stopword detection for streaming content, Hossein Fani, Masoud Bashari, Fattane Zarrinkalam, Ebrahim Bagheri, and Feras Al-Obeidat

Link

Rumor Detection in Business Reviews Using Supervised Machine Learning, Ammara Habib, Saima Akbar, Muhammad Zubair Asghar, Asad Masood Khattak, Rahman Ali, and Ulfat Batool

Link

Analysis of symbolic models of biometric data and their use for action and user identification, James Alexander Hughes, Joseph Alexander Brown, Adil Mehmood Khan, Asad Masood Khattak, and Mark Daley

Link

Remote Data Acquisition Using Raspberry Pi3, Saeed Ibrahim, Nawwaf Al Harmi, Ebrahim Al Naqbi, Farkhund Iqbal, Djedjiga Mouheb, and Omar Alfandi

Link

Cloud Digital Forensics Evaluation and Crimes Detection, Raja Jabir and Omar Alfandi

Link

Malware Classification with Deep Convolutional Neural Networks, Mahmoud Kalash, Mrigank Rochan, Noman Mohammed, Neil D.B. Bruce, Yang Wang, and Farkhund Iqbal

Impact of IoT device saturation on home WiFi networks, Dylan Kauling, May AlTaei, and Qusay H. Mahmoud

Link

An Enhanced Temperature Aware Routing Protocol in Wireless Body Area Networks, Beom Su Kim, Ki Il Kim, and Babar Shah

Link

Mobility and Temperature Aware QoS Routing Protocol in Wireless Body Area Networks, Beom Su Kim, Kyong Hoon Kim, Babar Shah, and Ki Il Kim

Link

Medical images protection and authentication using hybrid DWT-DCT and SHA256-MD5 hash functions, Alavi Kunhu, Hussain Al-Ahmad, and Fatma Taher

Link

Thing federation as a service: Foundations and demonstration, Zakaria Maamar, Khouloud Boukadi, Emir Ugljanin, Thar Baker, Muhammad Asim, Mohammed Al-Khafajiy, Djamal Benslimane, and Hasna El Alaoui El Abdallaoui

Link

How to agentify the Internet-of-Things?, Zakaria Maamar, Noura Faci, Khouloud Boukadi, Emir Ugljanin, Mohamed Sellami, Thar Baker, and Rafael Angarita

Link

Storytelling integration of the internet of things into business processes, Zakaria Maamar, Mohamed Sellami, Noura Faci, Emir Ugljanin, and Quan Z. Sheng

Link

Toward a reliable service-based approach to software application development, Qusay Mahmoud, Ian Andrusiak, and May AlTaei

Link

Developing Adaptive Islamic Law Business Processes Models for Islamic Finance and Banking by Text Mining the Holy Qur'an and Hadith, Munir Majdalawieh, Farhi Marir, and Issam Tiemsani

Link

Higher education analytics: New trends in program assessments, Adam Marks and Maytha AL-Ali

Link

An Analytical Study Towards the UAE Universities Smart Education Innovated Approaches, Shaikha Saleh Mohamed, Nedaa Baker Al Barghuthi, and Huwida Said

PDF

A process model for implementing information systems security governance, Mathew Nicho

When spear phishers craft contextually convincing emails, Mathew Nicho, Hussein Fakhry, and Uche Egbue

Link

A decision matrix model to identify and evaluate APT vulnerabilities at the user plane, Mathew Nicho and Shafaq Naheed Khan

Link

Identifying vulnerabilities in APT Attacks: A simulated approach, Mathew Nicho, Adelaiye Oluwasegun, and Faouzi Kamoun

PDF

Computation of a well-conditioned dynamic stiffness matrix for elastic layers overlying a half-space, Andrew T. Peplow

Link

The best-of-n problem with dynamic site qualities: Achieving adaptability with stubborn individuals, Judhi Prasetyo, Giulia De Masi, Pallavi Ranjan, and Eliseo Ferrante

Link

Dynamic malware analysis of phishing emails, Mohammad Abu Qbeitah and Monther Aldwairi

Link

Intelligent multi-agent collaboration model for smart home IoT security, Laura Rafferty, Farkhund Iqbal, Saiqa Aleem, Zhihui Lu, Shih Chia Huang, and Patrick C.K. Hung

The X-supply game, Sinan Salman and Suzan Alaswad

Link

Developing Information Literacy in Interdisciplinary Classrooms: Engaging with Diverse Literacies, Kristen M. Schuster and Kristine N. Stewart

Link

Developing Information Literacy in Interdisciplinary Classrooms: Engaging with Diverse Literacies, Kristen M. Schuster and Kristine N. Stewart

Link

Librarians participating in service learning at federal universities in the United Arab Emirates, Mary Sengati-Zimba and Judith Mavodza

Link

A Novel Autoencoder-Based Diagnostic System for Early Assessment of Lung Cancer, Ahmed Shaffie, Ahmed Soliman, Mohammed Ghazal, Fatma Taher, Neal Dunlap, Brian Wang, Victor Van Berkel, Georgy Gimelfarb, Adel Elmaghraby, and Ayman El-Baz

Link

Fuzzy Energy Efficient Routing for Internet of Things (IoT), Babar Shah

Link

The Impact of the Number of Eigen-Faces on the Face Recognition Accuracy Using Different Distance Measures, Yousef Shatnawi, Mohammad Alsmirat, Mahmoud Al-Ayyoub, and Monther Aldwairi

Link

Bayesian network model for temperature forecasting in Dubai, L. Smail

Link

Junction trees construction: Application to Bayesian networks, L. Smail

PDF

A Refinement of Lasso Regression Applied to Temperature Forecasting, Bruce Spencer, Omar Alfandi, and Feras Al-Obeidat

Link

Review - Challenges of mobility aware MAC protocols in WSN, Sijo Sudheendran, Ons Bouachir, Sherif Moussa, and Adel Omar Dahmane

Link

Adoption Challenges of the Internet of Things: ASurvey, Abdallah Tubaishat and Suhail Paliath

Link

Initiating and tracking social actions to adapt and improve smart city's business processes, Emir Ugljanin, Dragan H. Stojanović, Ejub Kajan, and Zakaria Maamar

Link

Improved label noise identification by exploiting unlabeled data, Hongqiang Wei, Donghai Guan, Qi Zhu, Weiwei Yuan, Asad Masood Khattak, and Francis Chow

Link

Information literacy outside the classroom, Melanie Wood

Link

Application of fuzzy logic to assess the quality of BPMN models, Fadwa Yahya, Khouloud Boukadi, Hanêne Ben-Abdallah, and Zakaria Maamar

PDF

An Enhanced AODV Protocol for Avoiding Black Holes in MANET, Qussai M. Yaseen and Monther Aldwairi

Link

Recommending with limited number of trusted users in social networks, Weiwei Yuan, Donghai Guan, and Asad Masood Khattak

Link

Improving Human Action Recognition through Hierarchical Neural Network Classifiers, Pavel Zhdanov, Adil Khan, Adin Ramirez Rivera, and Asad Masood Khattak

Submissions from 2017

PDF

Enterprise systems: The quality of system outputs and their perceived business value, Ahed Abugabah

Link

Evaluation of healthcare enterprise information systems: A structural equation model, Ahed Abugabah

PDF

Impact of Ideological Disagreements on International Relations: a Study on Islam and the West, Bashir AbulQaraya

Link

Unsupervised geometrical feature learning from hyperspectral data, Muhammad Ahmad, Adil Mehmood Khan, Rasheed Hussain, Stanislav Protasov, Francis Chow, and Asad Masood Khattak

Link

FLUKES: Autonomous log forensics, intelligence and visualization tool, Monther Aldwairi and Hesham H. Alsaadi

Link

Architecture guidelines for SaaS development process, Saiqa Aleem, Rabia Batool, Faheem Ahmed, Asad Khatak, and Raja Muhammad Ubaid Ullah

The best practice in implementing itil service transition for successful it service production, Mohamed Basel Almourad, Mohammed Hussain, and Feras Al-Obeidat

PDF

Identifying Major Tasks from On-line Reviews, Feras Al-Obeidat and Bruce Spencer

Link

Mobile Technology and its Use among Media Students at Zayed University in Dubai, Najat AlSaied and Fokiya Akhtar

Link

Compromised user credentials detection using temporal features: A prudent based approach, Adnan Amin, Sajid Anwar, Babar Shah, and Asad Masood Khattak

Link

Efficiency of nearly periodic structures for mitigation of ground vibration, Lars V. Andersen, Andrew Peplow, and P. Bucinskas

PDF

Variation in models for simple dynamic structure-soil-structure interaction problems, L. V. Andersen, A. Peplow, P. Bucinskas, P. Persson, and K. Persson

Link

Variants of spray and forwarding scheme in delay tolerant networks, Mohammad Abdul Azim, Babar Shah, Beom Su Kim, Kyong Hoon Kim, and Ki Il Kim

PDF

The Creation of an Arabic Emotion Ontology Based on E-Motive, Anoud Bani-Hani, Munir Majdalweieh, and Feras Obeidat

Link

When Informing Doesn't Inform [Abstract], John Beachboard and Martine Robinson Beachboard

Link

Obstacle-aware resource allocation in business processes, Farah Bellaaj, Mohamed Sellami, Sami Bhiri, and Zakaria Maamar

Link

Configurable structure tree as a means to manage configurable business processes, Wehbi Benallal, Mahmoud Barhamgi, Djamal Benslimane, and Zakaria Maamar

Link

Designing And Implementing B2B Applications Using Argumentative Agents, Jamal Bentahar, Nanjangud Narendra, Zakaria Maamar, Rafiul Alam, and Philippe Thiran

Leveraging the affordances of mobile learning for vocabulary gains, Michael Bowles

PDF

A Neural network approach to visibility range estimation under foggy weather conditions, Hazar Chaabani, Faouzi Kamoun, Hichem Bargaoui, Fatma Outay, and Ansar Ul Haque Yasar

An evaluation of seasonal patterns of thermal conditions inside a vegetated courtyard area of a Mediterranean city (Athens), Ioannis Charalampopoulos, Fotoula Droulia, Areti Tseliou, and Ioannis Tsiros

Link

The computing professional skills assessment utilized with graduate students, Maurice Danaher, Kevin Schoepp, and Ashley Ater Kranov

Link

Large residual multiple view 3D CNN for false positive reduction in pulmonary nodule detection, Anton Dobrenkii, Ramil Kuleev, Adil Khan, Adin Ramirez Rivera, and Asad Masood Khattak

Link

Charging infrastructure placement for electric vehicles: An optimization prospective, Waleed Ejaz, M. Naeem, M. R. Ramzan, Farkhund Iqbal, and A. Anpalagan

PDF

Production of durable and cost effective sewer pipes using petroleum and industrial waste by-products, Maisa El Gamal, Amr El-Dieb, Khaled El-Sawy, Amr Sweedan, and Abdel Mohsen Mohamed

Academic reading on a collaborative, online platform, Jenny Eppard and Preeya Reddy

Localising content for an XMOOC in the UAE, Jenny Eppard and Preeya Reddy

A framework for flipped learning, Jenny Eppard and Aicha Rochdi

Link

Alert me: Enhancing active lifestyle via observing sedentary behavior using mobile sensing systems, Muhammad Fahim, Thar Baker, Asad Masood Khattak, and Omar Alfandi

Link

Physical activity recognizer based on multimodal sensors in smartphone for ubiquitous-lifecare services, Muhammad Fahim, Asad Masood Khattak, Saiqa Aleem, and Haseena Al Katheeri

Link

Joint workload scheduling and BBU allocation in cloud-RAN for 5G networks, Lilatul Ferdouse, Waleed Ejaz, Alagan Anpalagan, and Asad Masood Khattak

Link

Basis independence of implicitly defined hamiltonian circuit dynamics, Jon Pierre Fortney

Link

Deep learning models for bone suppression in chest radiographs, Maxim Gusarev, Ramil Kuleev, Adil Khan, Adin Ramirez Rivera, and Asad Masood Khattak

Link

The application of narrow-band NDVI as a tool for mapping mangrove environment in Abu Dhabi, Hassan Hajjdiab, Haitham Farok, and Fares M. Howari

Link

Multimedia File Signature Analysis for Smartphone Forensics, D. Hamdi, F. Iqbal, T. Baker, and B. Shah

Link

Securing the internet of things: A worst-case analysis of trade-off between query-anonymity and communication-cost, Kadhim Hayawi, Pin Han Ho, Sujith Samuel Mathew, and Limei Peng

Link

Local mean consistency on numerical solutions of stochastic wave equation with cubic nonlinearities on 2D rectangles, Haziem M. Hazaimeh

PDF

Mean Square Consistency on Numerical Solutions of Stochastic Wave Equation with Cubic Nonlinearities on 2D Rectangles, Haziem M. Hazaimeh

Link

A study of children facial recognition for privacy in smart TV, Patrick C.K. Hung, Kamen Kanev, Farkhund Iqbal, David Mettrick, Laura Rafferty, Guan Pu Pan, Shih Chia Huang, and Benjamin C.M. Fung

Link

A novel approach for analyzing student interaction with educational systems, Mohammed Hussain, M. Basel Al-Mourad, Abdullah Hussein, Sujith Mathew, and Essam Morsy

Link

Continuous health monitoring using smartphones-A case-study for monitoring diabetic patients in UAE, A. J. Jihad, Sujith Samuel Mathew, Sujni Paul, and D. Ponmary Pushpalatha

Link

Exploiting Time Series Analysis in Twitter to Measure a Campaign Process Performance, Eleanna Kafeza, Christos Makris, and Gerasimos Rompolas

Link

Forensic analysis of xbox one and playstation 4 gaming consoles, Salam Khanji, Raja Jabir, Farkhund Iqbal, and Andrew Marrington

Link

Privacy Requirements for mobile e-Service in the Health Authority-Abu Dhabi (HAAD), Asad M. Khattak, Farkhund Iqbal, Patrick C.K. Hung, Jwo Shiun Sun, Guan Pu Pan, and Jing Jie Lin

Link

Privacy-aware in the IoT applications: A systematic literature review, Faiza Loukil, Chirine Ghedira-Guegan, Aïcha Nabila Benharkat, Khouloud Boukadi, and Zakaria Maamar

Link

Ongoing Research Agenda on the Internet of Things (IoT) in the Context of Artificial Intelligence (AI), Zakaria Maamar

Link

Detecting and tackling run-time obstacles in social business processes, Zakaria Maamar, Mohamed Sellami, Noura Faci, and Sylvain Lefebvre

Link

A reference framework for enterprise computing curriculum, Munir Majdalawieh and Adam Marks

Link

Learning systems' learning analytics, Adam Marks, Maytha Al-Ali, and Kees Rietsema

Link

Automated malicious advertisement detection using VirusTotal, URLVoid, and TrendMicro, Rima Masri and Monther Aldwairi

Link

From the Internet of Things to the web of things-enabling by sensing as-A service, Sujith Samuel Mathew, Yacine Atif, and May El-Barachi

A Decision support framework for public healthcare: An approach to follow-up support service, Shah Jahan Miah, John G. Gammack, Rashadul Hasan, and Najmul Hasan

Developing a framework towards design understanding for crowdsourcing research: A content analysis, Shah Jahan Miah, Najmul Hasan, Don Kerr, and John G. Gammack

Link

Gamifying Foundational STEM Skills, Jim Morey, John Gammack, and Erik Thornquist

Link

Towards safer roads through cooperative hazard awareness and avoidance in connected vehicles, Fatma Outay, Faouzi Kammoun, Florent Kaisser, and Mohammed Atiquzzaman

PDF

ConVeh: Driving Safely into a Connected Future, Fatma Outay, Faouzi Kamoun, Ansar Yasar, Elhadi Shakshuki, and Samar El-Amine

PDF

Geologic environments for nuclear waste repositories, Evan K. Paleologos, Abdel Mohsen O. Mohamed, and Kosmas Pavlopoulos

Variations within simple models for structure-soil interaction, Andrew Peplow, Lars Andersen, and Paulius Bucinskas

PDF

Environmental vibration reduction utilizing an array of mass scatterers, A. T. Peplow, L. V. Andersen, and P. Bucinskas

Link

Authorship attribution of Arabic tweets, Abdullateef Rabab'Ah, Mahmoud Al-Ayyoub, Yaser Jararweh, and Monther Aldwairi

PDF

Towards a Privacy Rule Conceptual Model for Smart Toys, Laura Rafferty, Patrick C. K. Hung, Marcelo Fantinato, Sarajane Marques Peres, Farkhund Iqbal, Sy-Yen Kuo, and Shih-Chia Huang

Reading while listening on mobile devices: An innovative approach to enhance reading, Aicha Rochdi and Jenny Eppard

Urban road network crisis response management: Time-sensitive decision optimization, Sinan Salman and Suzan Alaswad

Link

SONAR: Automatic detection of cyber security events over the twitter stream, Quentin Le Sceller, El Mouatez Billah Karbab, Mourad Debbabi, and Farkhund Iqbal

Link

Predictors of graduate employability in Indian information technology sector, Nidhi Sehgal and Saboohi Nasim

Link

The role of expats, local residents and tourists in defining a destination: A branding case study for Abu Dhabi tourism, Nataša Slak Valek

Junction trees constructions in Bayesian networks, Linda Smail

Link

Factorization of computations in Bayesian networks: Interpretation of factors, Linda Smail and Zineb Azouz

PDF

SAND - A dashboard for analyzing employees' social actions over google hangouts, Edvan Soares, Marcos Eduardo, Vanilson Burégio, Emir Ugljanin, and Zakaria Maamar

PDF

Selecting Sensors when Forecasting Temperature in Smart Buildings, Bruce Spencer, Feras Al-Obeidat, and Omar Alfandi

Link

Staying on track: The buffering effect of culture on leadership strength and derailment potential, Mary F. Sully de Luque, Yi Zhang, and Jean Brittain Leslie

Safe city: Introducing a flawless model and implementation guidelines to reduce crime rate and response time, Abdallah Tubaishat and Rami Elsayed

PDF

A fuzzy logic-based approach for assessing the quality of business process models, Fadwa Yahya, Khouloud Boukadi, Hanêne Ben Abdallah, and Zakaria Maamar

Link

Collusion attacks in Internet of Things: Detection and mitigation using a fog based model, Qussai Yaseen, Yaser Jararweh, Mahmoud Al-Ayyoub, and Monther Al Dwairi

Link

A sequential inspection and replacement policy for degradation-based systems, Zhicheng Zhu, Yisha Xiang, Suzan Alaswad, and C. Richard Cassady

Submissions from 2016

Link

Bounded message delay with threshold time constraint in delay tolerant networks (DTNs), Ali Abbas, Babar Shah, Feras Al-Obeidat, and Farkhund Iqbal

Information quality of enterprise systems in healthcare: An empirical study, Ahed Abugabah

PDF

An Architecture for QoS-Enabled Mobile Video Surveillance Applications in a 4G EPC and M2M Environment, Mohammad Abu-Lebdeh, Fatna Belqasmi, and Roch Glitho

Link

Gait fingerprinting-based user identification on smartphones, Muhammad Ahmad, Adil Mehmood Khan, Joseph Alexander Brown, Stanislav Protasov, and Asad Masood Khattak

Link

Challenges in managing real-time data in health information system (HIS), Usman Akhtar, Asad Masood Khattak, and Sungyoung Lee

Link

Secure and efficient multiparty computation on genomic data, Md Momin Al Aziz, Mohammad Z. Hasan, Noman Mohammed, and Dima Alhadidi

Link

Calculating the speed of vehicles using Wireless Sensor Networks, Omar Alfandi, Arne Bochem, Mehdi Akbari Gurabi, Alberto Rivera Diaz, Md Istiak Mehedi, and Dieter Hogrefe

PDF

An Algorithm for Inferring Big Data Objects Correlation Using Word Net, M. Basel Almourad, Mohammed Hussain, and Talal Bonny

PDF

Forensic investigation of cyberstalking cases using Behavioural Evidence Analysis, Noora Al Mutawa, Joanne Bryce, Virginia N.L. Franqueira, and Andrew Marrington

PDF

Cloud-based Lineament Extraction of Topographic Lineaments from NASA Shuttle Radar Topography Mission Data, Feras Al-Obeidat, Leonardo Feltrin, and Farhi Marir

Link

A meta-heuristic approach for developing PROAFTN with decision tree, Feras Al-Obeidat, Babar Shah, Asad Masood Khattak, and Ali Abbas

Predicting students' performance using mutli-criteria classification: A case study, Feras Al-Obeidat and Abdallah Tubasihat

PDF

Towards on Demand Road Condition Monitoring Using Mobile Phone Sensing as a Service, Wael Alrahal AlOrabi, Sawsan Abdul Rahman, May El Barachi, and Azzam Mourad

Link

Magec: An image searching tool for detecting forged images in forensic investigation, S. Al Sharif, M. Al Ali, N. Al Reqabi, F. Iqbal, T. Baker, and A. Marrington

Link

White-Hat Hacking Framework for Promoting Security Awareness, S. Al-Sharif, F. Iqbal, T. Baker, and A. Khattack

Link

Evaluating dispersion forces for optimization of van der Waals complexes using a non-empirical functional, Alya A. Arabi

Link

Significant Predictors of e-Learning Readiness for Faculty and Students in a Public University in the UAE, Fida Atallah and Jase Moussa-Inaty

Link

A credibility and classification-based approach for opinion analysis in social networks, Lobna Azaza, Fatima Zohra Ennaji, Zakaria Maamar, Abdelaziz El Fazziki, Marinette Savonnet, Mohamed Sadgal, Eric Leclercq, Idir Amine Amarouche, and Djamal Benslimane

PDF

A Lightweight Security Protocol for NFC-based Mobile Payments, Mohamad Badra and Rouba Borghol Badra

PDF

Monetizing Personal Data: A Two-Sided Market Approach, Ahmed Saleh Bataineh, Rabeb Mizouni, May El Barachi, and Jamal Bentahar

PDF

A MOF-based social web services description metamodel, Amel Benna, Zakaria Maamar, and Mohamed Ahmed Nacer

Link

Sedentary behavior-based user life-log monitoring for wellness services, Hafiz Syed Muhammad Bilal, Asad Masood Khattak, and Sungyoung Lee

Link

A privacy-preserving and power-efficient bicycle tracking scheme for theft mitigation, Arne Bochem, Kevin Freeman, Martin Schwarzmaier, Omar Alfandi, and Dieter Hogrefe

Link

Fusion: Privacy-preserving distributed protocol for high-dimensional data mashup, Gaby G. Dagher, Farkhund Iqbal, Mahtab Arafati, and Benjamin C.M. Fung

Link

Dynamic and efficient brokering of energy suppliers and consumers in a smart grid, Waltenegus Dargie, Omar Alfandi, and Mohamad Badra

Link

Micro-context recognition of sedentary behaviour using smartphone, Muhammad Fahim, Asad Masood Khattak, Thar Baker, Francis Chow, and Babar Shah

Link

Tracking the sedentary lifestyle using smartphone: A pilot study, Muhammad Fahim, Asad Masood Khattak, Francis Chow, and Babar Shah

PDF

Combining Weights of Evidence Analysis with Feature Extraction - A Case Study from the Hauraki Goldfield, New Zealand, Leonardo Feltrin, João Gabriel Motta, Feras Al-Obeidat, Farhi Marir, and Martina Bertelli

Link

Lightweight context-aware activity recognition, Byung Gill Go, Asad Masood Khattak, Babar Shah, and Adil Mehmood Khan

Link

Social-based semantic framework for cloud resource management in business processes, Emna Hachicha, Walid Gaaloul, and Zakaria Maamar

Link

Towards strategic information & communication technology (ICT) framework for smart cities decision-makers, Mahmoud El Hendy, Sami Miniaoui, and Hussein Fakhry

Link

A crowdsource model for quality assurance in cloud computing, Mohammed Hussain and Mohamed Basel Al-Mourad

Link

Collect, scope, and verify big data - A framework for institution accreditation, Mohammed Hussain, Mohamed Basel Al-Mourad, and Sujith Samuel Mathew

Link

Interdiscursive strategies of metaphor-driven rhetoric in Romanian discourses on a political crisis, Cornelia Ilie and Ariadna ŞtefǍnescu

Link

Analysis of cloud computing attacks and countermeasures, Raja Mohamed Jabir, Salam Ismail Rasheed Khanji, Liza Abdallah Ahmad, Omar Alfandi, and Huwida Said

Link

Database auditing and forensics: Exploration and evaluation, Salam Ismail Rasheed Khanji, Asad Masood Khattak, and Hakim Hacid

Link

Evaluation of Linux SMTP server security aspects - A case study, Salam Khanji, Raja Jabir, Liza Ahmad, Omar Alfandi, and Huwida Said

Link

Smart meter: Toward client centric energy efficient smartphone based solution, Salam Khanji, Asad Masood Khattak, and Omar Alfandi

Link

Communication overload management through social interactions clustering, Juan Antonio Lossio-Ventura, Hakim Hacid, Mathieu Roche, and Pascal Poncelet

Link

On capturing and quantifying social qualities in business processes, Zakaria Maamar, Hakim Hacid, Emir Ugljanin, and Mohamed Sellami

PDF

Mining the Web and Literature to Discover New Knowledge about Diabetes, Farhi Marir, Huwida Said, and Feras Al-Obeidat

Link

Analytics within UAE higher education context, Adam Marks and Maytha Al-Ali

Link

Assessing the Status of Housing Conditions for Workers of Farms in Liwa within the United Arab Emirates, Fatima Marzouq AlMehairbi

Design methodologies for M-health innovations: A content analysis, Shah Jahan Miah, John Gammack, Najmul Hasan, and Md Rakibul Hoque

Link

A data visualisation for horizontal eye-movements, Jim Morey and John Gammack

Link

Extending TLS with KMIP protocol for cloud computing, Mounira Msahli, Ahmed Serhrouchni, and Mohamad Badra

Al Ain Oases Mapping Project: Qattārah Oasis, past and present (poster), Timothy Power, Peter Sheehan, Shamsa Mohamed Al Dhaheri, Mariyam Abd Al Aziz Al Hammadi, Khuloud Ibrahim Al Hammadi, Afra Adnan Al Noaimi, Ayesha Muhsen Al Subaihi, Hamda Hasan Al Omar, Fatima Thani Al-Romeithi, Muzna Khalifa Al Mansoori, Leqa Jawher Al Zaabi, Zainab Rubaiya Al Naemi, Mohamed Khalifa, and Mohamed Al Dhaheri

PDF

An Elastic Hybrid Sensing Platform: Architecture and Research Challenges, Sleiman Rabah, Fatna Belqasmi, Rabeb Mizouni, and Rachida Dssouli

Link

Security analysis of IoT protocols: A focus in CoAP, Reem Abdul Rahman and Babar Shah

Link

The computing professional skills assessment: An innovative method for assessing ABET's student outcomes, Kevin Schoepp, Maurice Danaher, and Ashley Ater Kranov

Link

Fuzzy Query Routing in Unstructured Mobile Peer-to-Peer Networks, Babar Shah, Farkhund Iqbal, and Asad Masood Khattak

Link

A fuzzy logic scheme for real-time routing in wireless sensor networks, Babar Shah, Asad Masood Khattak, and Ki Il Kim

Link

Comparison of Lauritzen-Spiegelhalter and successive restrictions algorithms for computing probability distributions in Bayesian networks, Linda Smail

PDF

Forecasting Internal Temperature in a Home with a Sensor Network, Bruce Spencer and Omar Alfandi

PDF

Temperature Forecasts with Stable Accuracy in a Smart Home, Bruce Spencer and Feras Al-Obeidat

Link

Student Perspectives of eFolios – an Experience from an Outcome-Based University, Abdallah Tubaishat

Link

How to Restrict Web 2.0 Applications Use in the Workplace? Example of Google+ Hangouts, Emir Ugljanin, Noura Faci, Vanilson Buregio, and Zakaria Maamar

Link

Tracking users' actions over social media: Application to Facebook, Emir Ugljanin, Noura Faci, Mohamed Sellami, and Zakaria Maamar

Link

Integrating Content and English-Language Learning in a Middle Eastern Information Technology College: Investigating Faculty Perceptions, Practices and Capabilities, Norman Williams, John Beachboard, and Robert Bohning

Link

Towards a meta-modeling approach for social business process requirements capture, Fadwa Yahya, Khouloud Boukadi, Zakaria Maamar, and Hanêne Ben-Abdallah

Link

IoT end-user applications provisioning in the cloud: State of the art, Sami Yangui, Roch H. Glitho, Fatna Belqasmi, Monique J. Morrow, and Paul A. Polakos

Link

Android device hacking tricks and countermeasures, Khulood Al Zaabi

Link

Android forensics: Investigating social networking cybercrimes against man-in-the-middle attacks, Khulood Ali Al Zaabi

Submissions from 2015

Link

Smart parking system for vehicles, Sripriya Srikant Adhatarao, Omar Alfandi, Arne Bochem, and Dieter Hogrefe

Link

Exhaust: Optimizing Wu-Manber pattern matching for intrusion detection using Bloom filters, Monther Aldwairi and Koloud Al-Khamaiseh

Link

Challenges of leveraging mobile sensing devices in wireless healthcare, Omar Alfandi, Suhail Ahmed, May El Barachi, and Adil Khan

Link

Received signal strength indication for movement detection, Omar Alfandi, Arne Bochem, Kirill Bulert, Dieter Hogrefe, and Alwin Maier

Link

Social learning on the move - A research roadmap, Dima Alhadidi, Zakaria Maamar, and Farhi Marir

Link

Towards HSS as a virtualized service for 5G networks, Hanieh Alipour, Fatna Belqasmi, Mohammad Abu-Lebdeh, and Roch Glitho

Link

Consumers Attitude towards the Use of Mobile Health Apps: An Empirical Review, Ayesha Almarri and Tariq Bhatti

Link

Behavioural evidence analysis applied to digital forensics: An empirical analysis of child pornography cases using P2P networks, Noora Al Mutawa, Joanne Bryce, Virginia N.L. Franqueira, and Andrew Marrington

Link

Identification and analysis of free games' permissions in Google Play, Eiman Alothali, Fatna Belqasmi, Omar Alfandi, and Farkhund Iqbal

Intelligent cloud computing first international conference, ICC 2014 Muscat, Oman, february 24–26, 2014 revised selected papers, Asma Al-Saidi, Rudolf Fleischer, Zakaria Maamar, and Omer F. Rana

Link

A new information model towards context-aware service provisioning in the Internet-of-Things, Mohab Aly, May Elbarachi, and Rachida Dssouli

Link

iPads in UAE University Classrooms: Implications for Teaching and Learning, Fida Atallah, Rana M. Tamim, Linda Colburn, and Lina El Saadi

Link

A novel cryptography based privacy preserving solution for urban mobility and traffic control, Mohamad Badra and Elyes Ben Hamida

Link

An innovative platform for person-centric health and wellness support, Oresti Banos, Muhammad Bilal Amin, Wajahat Ali Khan, Muhammad Afzel, Mahmood Ahmad, Maqbool Ali, Taqdir Ali, Rahman Ali, Muhammad Bilal, Manhyung Han, Jamil Hussain, Maqbool Hussain, Shujaat Hussain, Tae Ho Hur, Jae Hun Bang, Thien Huynh-The, Muhammad Idris, Dong Wook Kang, Sang Beom Park, Hameed Siddiqui, Le Ba Vui, Muhammad Fahim, Asad Masood Khattak, Byeong Ho Kang, and Sungyoung Lee

Link

NGNaaS: NGNs as cloud computing services, Fatna Belqasmi, May El Barachi, Jose M.Alcaraz Calero, Mohamad Badra, and Omar Alfandi

Link

Technology Integration in Postsecondary Education: A Summary of Findings of a Series of Meta-Analytical Research, Eugene Borokhovski, Robert M. Bernard, Rana M. Tamim, and Richard F. Schmid

Link

Sandboxing: Aid in digital forensic research, Asif Iqbal, Hanan Alobaidli, Mario Guimaraes, and Oliver Popov

PDF

Exploring the extent to which English LIS Masters programs in the UAE and Qatar meet the skills and knowledge needs of employers in the library and information studies field, Nicole Johnston, Judith Mavodza, and Jassim Mohammed Jirjees

Link

An RFID solution for the monitoring of storage time and localization of perishable food in a distribution center, Faouzi Kamoun, Omar Alfandi, and Sami Miniaoui

PDF

Weaving risk identification into crowdsourcing lifecycle, Faouzi Kamoun, Dima Alhadidi, and Zakaria Maamar

Link

Correlating health and wellness analytics for personalized decision making, Wajahat Ali Khan, Muhammad Idris, Taqdir Ali, Rahman Ali, Shujaat Hussain, Maqbool Hussain, Muhammad Bilal Amin, Asad Masood Khattak, Yuan Weiwei, Muhammad Afzal, Sungyoung Lee, and Byeong Ho Kang

Link

'Controlling' Web 2.0 Applications in the Workplace, Zakaria Maamar, Vanilson Buregio, Noura Faci, Djamal Benslimane, and Quan Z. Sheng

Link

Collaborative enterprise applications based on business and social artifacts, Zakaria Maamar, Vanilson Burégio, and Mohamed Sellami

PDF

Business Reputation of Social Networks of Web Services, Zakaria Maamar, Gianpiero Costantino, Marinella Petrocchi, and Fabio Martinelli

Link

Using incentives to analyze social web services’ behaviors, Zakaria Maamar, Gianpiero Costantino, Marinella Petrocchi, and Fabio Martinelli

Link

Enterprise 2.0: Research challenges and opportunities, Zakaria Maamar, Noura Faci, Ejub Kajan, Khouloud Boukadi, Sherif Sakr, Mohamed Boukhebouze, Soraya Kouadri Mostéfaoui, Vanilson Burégio, Fadwa Yahya, Valérie Monfort, and Romain Hennion

Link

A framework of enriching business processes life-cycle with tagging information, Zakaria Maamar, Sherif Sakr, Ahmed Barnawi, and Seyed Mehdi Reza Beheshti

Link

SUPER: Social-based business process management framework, Zakaria Maamar, Sherif Sakr, Noura Faci, Mohamed Boukhebouze, and Ahmed Barnawi

Link

Analyzing social web services' capabilities, Zakaria Maamar, Hamdi Yahyaoui, Azzam Mourad, and Mohamed Sellami

Link

Secure and private management of healthcare databases for data mining, Noman Mohammed, Samira Barouti, Dima Alhadidi, and Rui Chen

Link

Interface development for a gaze-controlled reading support application, Jim Morey, John Gammack, and Erik S. Thornquist

Link

How can one learn mathematical word problems in a second language? A cognitive load perspective, Jase Moussa-Inaty, Mark Causapin, and Timothy Groombridge

PDF

Distributed computing and artificial intelligence, 12th international conference, Sigeru Omatu, Qutaibah M. Malluhi, Sara Rodríguez González, Grzegorz Bocewicz, Edgardo Bucciarelli, Gianfranco Giulioni, and Farkhund Iqbal

Link

Impact of Sybil attacks on Web services trust assessment, Zohra Saoud, Noura Faci, Zakaria Maamar, and Djamal Benslimane

Link

Sybil tolerance and probabilistic databases to compute web services trust, Zohra Saoud, Noura Faci, Zakaria Maamar, and Djamal Benslimane

Link

Web services trust assessment based on probabilistic databases, Zohra Saoud, Noura Faci, Zakaria Maamar, and Djamal Benslimane

Mathematics and mobile learning, Fayez Sayed

PDF

Innovative Public Libraries in United Arab Emirates: Taking library services in public spaces, Mary Sengati-Zimba, Judith Mavodza, and Emad Abu Eid

Link

Making a Massive Tablet Initiative Work: Perspectives from a United Arab Emirates Case Study, Rana M. Tamim, Linda Colburn, Fida Atallah, and Lina El Saadi

Link

Enhancing business processes with web 2.0 features, Fadwa Yahya, Khouloud Boukadi, Zakaria Maamar, and Hanêne Ben Abdallah

Submissions from 2014

Link

CAT Record (computer activity timeline record): A unified agent based approach for real time computer forensic evidence collection, Shadi Al Awawdeh, Ibrahim Baggili, Andrew Marrington, and Farkhund Iqbal

Link

An information security awareness program to address common security concerns in IT unit, Shadi Al Awawdeh and Abdallah Tubaishat

Link

A comparison of forensic acquisition techniques for android devices: A case study investigation of orweb browsing sessions, Nedaa Al Barghouthy and Andrew Marrington

Link

Ethics behind cyber warfare: A study of Arab citizens awareness, Nedaa Baker Al Barghuthi and Huwida Said

Link

An approach for the validation of file recovery functions in digital forensics' software tools, Sultan Al Sharif, Mohamed Al Ali, Naser Salem, Farkhund Iqbal, May El Barachi, and Omar Alfandi

Link

A forensic analysis framework for recovering encryption keys and BB10 backup decryption, Halima Al Shehhi, Dua'A Abu Hamdi, Izzeddin Asad, and Farkhund Iqbal

PDF

Competitive Moves Over Time: The Case of SAP, Michelle Antero, Jonas Hedman, and Stefan Henningsson

Link

Performance of a Logical, Five- Phase, Multithreaded, Bootable Triage Tool, Ibrahim Baggili, Andrew Marrington, and Yasser Jafar

Performance of a logical, five-phase, multithreaded, bootable triage tool, Ibrahim Baggili, Andrew Marrington, and Yasser Jafar

Analysis of the Rhode Island schumann resonance daily-average data, Robert Boldi, Earle Williams, and Anirban Guha

Link

Green Computing in the Desert: Applying Problem-Based Learning at an Emirati University, John C. Beachboard and Martine Robinson Beachboard

Link

Reputation-based composition of social web services, Alessandro Celestini, Gianpiero Costantino, Rocco De Nicola, Zakaria Maamar, Fabio Martinelli, Marinella Petrocchi, and Francesco Tiezzi

Link

The iPad: Another Gadget or a tool for Constructive Learning?, Linda Colburn and Rana M. Tamim

Link

Online engineering courses: Benchmarking quality, Maurice Danaher

Digital forensics and cyber crime: Fifth international conference, ICDF2C 2013 Moscow, Russia, September 26–27, 2013 revised selected papers, Pavel Gladyshev, Andrew Marrington, and Ibrahim Baggili

Schumann Resonance spectral characteristics: A useful tool to study Transient Luminous Events (TLEs) on a global scale, Anirban Guha, Earle Williams, Robert Boldi, Gabriella Satori, Tamás Nagy, Joan Montanyà, and Pascal Ortega

Link

Session details: Gamification, Mario Guimaraes

Link

FDG - Gender differences in videogame development classes: U.S. and the U.A.E., Mario Guimaraes and Leon Jololian

Link

Privacy-preserving medical reports publishing for cluster analysis, Ali Hmood, Benjamin C.M. Fung, and Farkhund Iqbal

Link

Differentiated QoS for overlay-based disaster response systems, Mohammadmajid Hormati, Ferhat Khendek, Roch Glitho, and Fatna Belqasmi

Link

An authentication scheme to protect the location privacy of femtocell users, Mohammed Hussain

Link

Trust in Mobile Cloud Computing with LTE-based Deployment, Mohammed Hussain and Basel Mohamed Almourad

Link

Effective third party auditing in cloud computing, Mohammed Hussain and Mohamed Basel Al-Mourad

Link

Amazon Kindle Fire HD forensics, Asif Iqbal, Hanan Alobaidli, Andrew Marrington, and Ibrahim Baggili

Link

Forensic artifacts of the ChatON Instant Messaging application, Asif Iqbal, Andrew Marrington, and Ibrahim Baggili

Link

A new business model and architecture for context-aware applications provisioning in the cloud, Nadjia Kara, May El Barachi, Abderrahmane El Bardai, and Omar Alfandi

Link

A direct method for teaching and measuring engineering professional skills for global workplace competency: Adaptations to computing at a University in the United Arab Emirates, Ashley Ater Kranov, Maurice Danaher, and Kevin Schoepp

Link

Using fixed-price auctions for selection in communities of web services, Erbin Lim and Zakaria Maamar

Impact of cloud computing adoption on firm stock price - An empirical research, Adam M. Mahmood, Faruk Arslan, Jagadish Dandu, Godwin Udo, and Aurelia Nicholas-Donald

Link

AMCIS - Impact of cloud computing adoption on firm stock price - An empirical research, M. Adam Mahmood, Faruk Arslan, Jagadish Dandu, and Godwin J. Udo

Link

In Search of Localization Criteria for Learning Solutions: Examining the localization needs of Finnish learning solutions in the United Arab Emirates, Tiina Mäkelä, Marja Kankaanranta, Bradley Young, and Qasim Alshannag

Link

In Search of Educational, Socio-cultural, and Technological Criteria for Localizing Learning Solutions for Varying Cultural Contexts, Tiina Mäkelä, Bradley Young, and Jan Pawlowski

Link

Computer Profiling for Preliminary Forensic Examination, Andrew Marrington, Farkhund Iqbal, and Ibrahim Baggili

PDF

Testing the forensic soundness of forensic examination environments on bootable media, Ahmed Fathy Abdul Latif Mohamed, Andrew Marrington, Farkhund Iqbal, and Ibrahim Baggili

PDF

Preliminary forensic analysis of the Xbox one, Jason Moore, Ibrahim Baggili, Andrew Marrington, and Armindo Rodrigues

Link

An infrastructure for robotic applications as cloud computing services, Carla Mouradian, Fatima Zahra Errounda, Fatna Belqasmi, and Roch Glitho

Link

Adaptive SLA-based elasticity management algorithms for a virtualized IP multimedia subsystem, Hani Nemati, Arjun Singhvi, Nadjia Kara, and May El Barachi

Link

Assessing the Level of Knowledge About Cybercrimes Among Young Adults Within the United Arab Emirates, Sarah Omar Bamatraf

Link

A RESTfull architecture for enabling rapid development and deployment of companion robot applications, Razieh Safaripour, Ferhat Khendek, Roch Glitho, and Fatna Belqasmi

Link

A fuzzy clustering-based credibility model for trust assessment in a service-oriented architecture, Zohra Saoud, Noura Faci, Zakaria Maamar, and Djamal Benslimane

Global circuit response to the 11-year solar cycle: Changes in source or in medium?, Earle Williams, Anirban Guha, Robert Boldi, Gabriella Satori, Alexander Koloskov, and Yuri Yampolski

Submissions from 2013

Deploying open source software (OSS) in UAE schools, Manar Abu Talib, Mezhel Bashayer, Abdulla Huda, Khalid Reem, and Ali Zamzam

Link

Critical structure of ethics behind offensive cyber warfare, Nedaa B. Al Barghouthi and Huwida Said

Link

Improving energy efficiency of data communication in a hybrid PKI-based approach for WSNs, Omar Alfandi, Arne Bochem, Ansgar Kellner, and Dieter Hogrefe

Link

BlackBerry PlayBook backup forensic analysis, Mohamed Al Marzougy, Ibrahim Baggili, and Andrew Marrington

Link

ECIS - Evolution Of Business Models: A Case Study Of SAP, Michelle Antero, Jonas Hedman, and Stefan Henningsson

Link

Emirati Student Voices on E-learning Readiness, Fida Atallah and Jase Moussa-Inaty

Link

Towards a unified agent-based approach for real time computer forensic evidence collection, Shadi Al Awawdeh, Ibrahim Baggili, Andrew Marrington, and Farkhund Iqbal

Link

Cybercrime, Censorship, Perception and Bypassing Controls: An Exploratory Study, Ibrahim Baggili, Moza Al Shamlan, Bedoor Al Jabri, and Ayesha Al Zaabi

Link

Research Trends in Digital Forensic Science: An Empirical Analysis of Published Research, Ibrahim Baggili, Afrah Baabdallah, Deena Al-Safi, and Andrew Marrington

Link

A framework for enterprise Social Computing: Towards the realization of enterprise 2.0, Youcef Baghdadi and Zakaria Maamar

Link

The forensic investigation of android private browsing sessions using orweb, Nedaa Al Barghouthy, Andrew Marrington, and Ibrahim Baggili

Link

Symmetrically-private database search in cloud computing, Samira Barouti, Dima Alhadidi, and Mourad Debbabi

Link

An Introduction to Business Problem-Solving and Decision-Making, John C. Beachboard and Kregg Aytes

Link

An architecture for QoS-enabled video telephony in a 3GPP 4G evolved packet core environment, Fatna Belqasmi, Hanieh Alipour, Malek El Ferjani, and Roch Glitho

Link

The design and implementation of a wireless healthcare application for WSN-enabled IMS environments, May El Barachi and Omar Alfandi

Link

A multi-service multi-role integrated information model for dynamic resource discovery in virtual networks, May El Barachi, Sleiman Rabah, Nadjia Kara, Rachida Dssouli, and Joey Paquet

Link

SIGCSE - A multi-level video game for teaching security (abstract only), Mario Guimaraes and Huwida Said

Link

The study of the interrelation between law programs and digital forensics in UAE Academia, Asif Iqbal, Hanan Al Obaidli, Huwida Said, and Mario Guimaraes

Link

WCAG 1.0 versus WCAG 2.0 Web Accessibility Compliance: A Case Study, Faouzi Kamoun, Basel M. Al Mourad, and Emad Bataineh

Link

Enhancing protection techniques of e-banking security services using open source cryptographic algorithms, Adel Khelifi, Maher Aburrous, Manar Abu Talib, and P. V.S. Shastry

Link

A reliable mobile application for safety on roads, Adel Khelifi, Lama Mahmoud Daoud, and Manar Abu Talib

Link

A social network-based architecture for on-line RoSCAs in the developing world, Gilles Kounou, Christian Akpona, Herve Ahouantchede, Rose Gohoue, Fatna Belqasmi, and Roch Glitho

Link

Students' perception on the use of visual tilings to support their learning of programming concepts, Hai Ning Liang, Charles Fleming, Jim Morey, Kamran Sedig, and Ka Lok Man

Link

Network-based conflict resolution in business processes, Zakaria Maamar, Noura Faci, Soraya Kouadri Mostéfaoui, and Ejub Kajan

Link

Blackberry Use and Sociability Amongst Female Emirati University Students, Ebtisam Mahmoud Thoban

Link

Towards an efficient sales pitch with the Web of Things, Sujith Samuel Mathew, Yacine Atif, Quan Z. Sheng, and Zakaria Maamar

Link

An E-health Infrastructure Design to Support Management of Lifestyle Disease, Shah Jahan Miah, John G. Gammack, and Md. Jahidul Hasan

Link

Innovative RFID solution for tracking and control, Sami Miniaoui and Faouzi Kamoun

Link

Mobile phone sensing as a service: Business model and use cases, Rabeb Mizouni and May El Barachi

Paying back borrowed meanings: The implications of the metaphor-driven history of IS research for its future, Diarmuid J. Pigott, Callan F. Ledsham, Valerie J. Hobbs, and John G. Gammack

Link

Product modelling for simulating business networks offering mass customization, Marc Poulin and Benoit Montreuil

Link

IPads for Project-Based Inter-disciplinary Collaborative Learning, Rana M. Tamim and Linda Colburn

Submissions from 2012

Link

A diversity-based approach for managing faults in web services, Hanane Abdeldjelil, Noura Faci, Zakaria Maamar, and Djamal Benslimane

Link

Towards reliable web applications: ISO 19761, Manar Abu Talib, Emilia Mendes, and Adel Khelifi

PDF

iPad2 Logical Acquisition: Automated or Manual Examination?, Somaya Ali, Sumaya AlHosani, Farah AlZarooni, and Ibrahim Baggili

PDF

Forensic analysis of social networking applications on mobile devices, Noora Al Mutawa, Ibrahim Baggili, and Andrew Marrington

Link

Exploring Faculty and Student Readiness for E-Learning in a UAE Public University, Fida Atallah and Jase Moussa-Inaty

Link

A Systematic review of web resource estimation, Damir Azhar, Emilia Mendes, and Patricia Riddle

Link

Fuzzy logic election of node for routing in WSNs, Shaik Sahil Babu, Arnab Raha, Mrinal Kanti Naskar, Omar Alfandi, and Dieter Hogrefe

Link

A business model for a sensors-enabled IMS environment, May El Barachi

The curriculum design of computing & information systems with concentration in database systems, M. Basel Al Mourad

Link

Information Privacy: Legal and Ethical Decision-making, John C. Beachboard and Kregg Aytes

Link

Eye tracking analysis of browser security indicators, Ali Darwish and Emad Bataineh

Link

Towards understanding phishing victims' profile, Ali Darwish, Ahmed El Zarka, and Fadi Aloul

Link

Open virtual playground: Initial architecture and results, May El Barachi, Nadjia Kara, and Rachida Dssouli

Link

AAAI Spring Symposium: Intelligent Web Services Meet Social Computing - Which Social Networks Should Web Services Sign-Up In?, Noura Faci, Zakaria Maamar, and Parisa Ghodous

Which social networks should web services sign-up in?, Noura Faci, Zakaria Maamar, and Parisa Ghodous

Link

Web effort estimation: The value of cross-company data set compared to single-company data set, Filomena Ferrucci, Federica Sarro, and Emilia Mendes

Link

Cognitive Load & Multimedia Use in Higher Learning: A United Arab Emirates Case, Jase Inaty and Fida Atallah

Link

A novel method of iDevice (iPhone, iPad, iPod) forensics without jailbreaking, Babar Iqbal, Asif Iqbal, and Hanan Al Obaidli

Link

Amazon kindle fire from a digital forensics perspective, Babar Iqbal, Asif Iqbal, Mario Guimaraes, Kashif Khan, and Hanan Al Obaidli

Link

Mining criminal networks from chat log, Farkhund Iqbal, Benjamin C.M. Fung, and Mourad Debbabi

Link

Using visual tiling patterns to support the teaching of programming concepts, Hai Ning Liang, Jim Morey, and Kamran Sedig

Link

On the analysis of satisfaction for web services selection, Erbin Lim, Philippe Thiran, Zakaria Maamar, and Jamal Bentahar

Link

Towards a quality of social network (o) model in the context of social web services, Zakaria Maamar, Noura Faci, Alfred Loo, and Parisa Ghodous

Link

Specifying and implementing social Web services operation using commitments, Zakaria Maamar, Noura Faci, Michael Luck, and Salahdine Hachimi

Link

Towards a user-centric social approach to web services composition, execution, and monitoring, Zakaria Maamar, Noura Faci, Quan Z. Sheng, and Lina Yao

Innovative use of it applications for teaching entrepreneurship to youth: Uae case study, Abu Talib Manar, Khelifi Adel, Al Mansori Fatema, Ballaith Zahra, and Hableel Eman

Towards a women's entrepreneurship century: The uae case study, Abu Talib Manar, El Barachi May, Khelifi Adel, Obaid Hanadi, and Sultan Ayesha

Entrepreneurship games: Overview and their future in the UAE, Abu Talib Manar, Al Fandi Omar, Al Ammari Heba, Al Amri Asma, and Al Mansoori Asma

Link

Portable web browser forensics: A forensic examination of the privacy benefits of portable web browsers, Andrew Marrington, Ibrahim Baggili, Talal Al Ismail, and Ali Al Kaf

Link

Cost estimation of web applications through knowledge elicitation, Emilia Mendes

Link

Using knowledge elicitation to improve Web effort estimation: Lessons from six industrial case studies, Emilia Mendes

Link

Applying knowledge elicitation to improve web effort estimation: A case study, Emilia Mendes, Manar Abutalib, and Steve Counsell

Link

The role of systematic reviews in identifying the state of the art in web resource estimation, Emilia Mendes and Damir Azhar

Link

Phishing in a university community: Two large scale phishing experiments, Jamshaid G. Mohebzada, Ahmed El Zarka, Arsalan H. Bhojani, and Ali Darwish

Link

Al Bidiya Mosque in Fujairah, UAE "A VESSEL OF CULTURAL AND RELIGIOUS HERITAGE IN THE EMIRATES TODAY" A phenomenological photographical Study, Marco Sosa

Link

Using ISO 27001 in teaching information security, Manar Abu Talib, Adel Khelifi, and Tahsin Ugurlu

Link

Virtual Classrooms for Student-Centered Learning in the UAE: A Qualitative Exploratory Study, Rana M. Tamim

Submissions from 2011

Exploratory study on innovative use of ISO standards for IT security in the UAE, Talib Manar Abu, Adel Khelifi, and May El Barachi

Link

Incorporating innovative practices in software engineering education, Ghazi Alkhatib, Zakaria Maamar, Ghassan Issa, Aiman Turani, Daoud Daoud, and M. Ibrahim Zaroor

Forensic artifacts of Facebook's instant messaging service, Noora Al Mutawa, Ibtesam Al Awadhi, Ibrahim Baggili, and Andrew Marrington

Link

Multi-level social networking to enable and foster collaborative organizations, Youakim Badr, Noura Faci, Zakaria Maamar, and Frédérique Biennier

Link

Digital Forensics and Cyber Crime: Second International ICST Conference ICDF2C 2010 Abu Dhabi, United Arab Emirates, October 4-6, 2010 Revised Selected Papers, Ibrahim Baggili

Link

Defining a Standard for Reporting Digital Evidence Items in Computer Forensic Tools, Hamda Bariki, Mariam Hashmi, and Ibrahim Baggili

Link

The Emergence of Game Based Learning (GBL) From Informal to Formal Contexts in Gulf Higher Education, Kimberly Bunts-Anderson

Link

The Logic and Language of IT Service Management, John C. Beachboard and Kregg Aytes

PDF

Composite Web Services Formation Using a Social Network of Web Services: A Preliminary Investigation, Said Elnaffar and Zakaria Maamar

Link

Using diversity to design and deploy fault tolerant web services, Noura Faci, Hanane Abdeldjelil, Zakaria Maamar, and Djamal Benslimane

Link

Towards a framework for weaving social networks principles into Web services discovery, Noura Faci, Zakaria Maamar, Hanane Abdeldjelil, and Djamal Benslimane

Link

Game development with game maker, flash and unity, Mario A.M. Guimaraes

Link

Using video games to teach security, Mario Guimaraes, Huwida Said, and Richard Austin

Link

A Simple Cost-Effective Framework for iPhone Forensic Analysis, Mohammad Iftekhar Husain, Ibrahim Baggili, and Ramalingam Sridhar

Link

Software engineering framework for digital service-oriented EcoSystem, Ejub Kajan, Ljubomir Lazić, and Zakaria Maamar

Link

Software testing as a service (TaaS): The BISA approach, Ejub Kajan, Ljubomir Lazić, and Zakaria Maamar

Link

Towards a self-healing approach to sustain web services reliability, Mohamed Hedi Karray, Chirine Ghedira, and Zakaria Maamar

Link

Towards defining and assessing the non-functional properties of communities of Web services, Erbin Lim, Philippe Thiran, and Zakaria Maamar

Link

Using 3-way satisfaction for web service selection: Preliminary investigation, Erbin Lim, Philippe Thiran, Zakaria Maamar, and Jamal Bentahar

Link

Conceptual analysis of transactional-, capacity-driven web services, Zakaria Maamar, Sami Bhiri, Samir Tata, Khouloud Boukadi, and Wathiq Mansoor

Link

Towards a framework for weaving social networks principles into web services discovery, Zakaria Maamar, Noura Faci, Youakim Badr, Leandro Krug Wives, Pédro Bispo Dos Santos, Djamal Benslimane, and José Palazzo Moreira De Oliveira

Link

Towards a method for engineering social web services, Zakaria Maamar, Noura Faci, Leandro Krug Wives, Hamdi Yahyaoui, and Hakim Hacid

Link

Social engineering of communities of web services, Zakaria Maamar, Hamdi Yahyaoui, Erbin Lim, and Philippe Thiran

Link

Revitalizing the introductory programming course, Qusay Mahmoud, Manar Abu Talib, Zakaria Maamar, Emad Bataineh, and Leon Jololian

PDF

CAT detect (computer activity timeline detection): A tool for detecting inconsistency in computer activity timelines, Andrew Marrington, Ibrahim Baggili, George Mohay, and Andrew Clark

Link

Web of things: Description, discovery and integration, Sujith Samuel Mathew, Yacine Atif, Quan Z. Sheng, and Zakaria Maamar

Link

Knowledge representation using Bayesian networks: A case study in web effort estimation, Emilia Mendes

Link

S-commerce: Injecting social elements into m-commere, Soraya Kouadri Mostéfaoui, Noura Faci, and Zakaria Maamar

Link

FedCSIS - Semantic interoperability for infectious diseases reporting system, Murugavell Pandiyan, Osama El Hassan, Zakaria Maamar, and Pallikonda Rajasekaran

Semantic interoperability for infectious diseases reporting system, Murugavell Pandiyan, Osama El Hassan, Zakaria Maamar, and Pallikonda Rajasekaran

Survey on Cloud Forensics and Critical Criteria for Cloud Forensic Capability: A Preliminary Analysis, Keyun Ruan, Ibrahim Baggili, Joe Carthy, and Tahar Kechadi

Link

Forensic analysis of private browsing artifacts, Huwida Said, Noora Al Mutawa, Ibtesam Al Awadhi, and Mario Guimaraes

Forensics and war-driving on unsecured wireless network, Huwida Said, Mario Guimaraes, Noora Al Mutawa, and Ibtesam Al Awadhi

Link

IPhone forensics techniques and crime investigation, Huwida Said, Alya Yousif, and Hessa Humaid

Link

Towards More Secure Biometric Readers for Effective Digital Forensic Investigation, Zouheir Trabelsi, Mohamed Al-Hemairy, Ibrahim Baggili, and Saad Amin

Submissions from 2010

A preliminary open source software infrastructure for the health sector in the UAE, Khelifi Adel and Abu Talib Manar

Why customers reluctant to buy from your website?, Fahim Akhter and Adam Marks

Classification of Al-Hadith Al-Shareef using data mining algorithm, Manar Alkhatib

Social media marketing in the UAE, Afraa Abdulla Al Tenaiji and Yoosuf Cader

Link

Towards a new-digital learning ecosystem based on autonomic Web services, Yacine Atif, Youakim Badr, and Zakaria Maamar

Link

IT Governance and IT Management: Is There a Difference That Makes a Difference?, Kregg Aytes, Jack Probst, and John C. Beachboard

Generating system requirements for a mobile digital device collection system: A preliminary step towards enhancing the forensic collection of digital devices, Ibrahim Baggili

Link

SMIRK: SMS Management and Information Retrieval Kit, Ibrahim Baggili, Ashwin Mohan, and Marcus K. Rogers

Link

Towards an approach for modeling serviceoriented business processes, Youcef Baghdadi and Zakaria Maamar

The construction of a new Lexicon design for Arabic language, Bilal Bataineh and Emad Bataineh

Link

Using argumentation to model and deploy agent-based β2β applications, Jamal Bentahar, Rafiul Alam, Zakaria Maamar, and Nanjangud C. Narendra

Engineering process for capacity-driven web services, Imen Benzarti, Samir Tata, Zakaria Maamar, Nejib Ben Hadj-Alouane, and Moez Yeddes

Towards the unification of success measures for enterprise systesm (ES), Tariq Bhatti

Link

Is Facebook really "open" to all?, Maria Claudia Buzzi, Marina Buzzi, Barbara Leporini, and Fahim Akhter

Towards a service-oriented network virtualization architecture, May El Barachi, Nadjia Kara, and Rachida Dssouli

Link

Database forensics, Mario A.M. Guimaraes, Richard Austin, and Huwida Said

Link

Analyzing communities vs. single agent-based Web services: Trust perspectives, Babak Khosravifar, Jamal Bentahar, Ahmad Moazin, Zakaria Maamar, and Philippe Thiran

Link

WEBIST (1) - WEB SERVICES & RECOMMENDER SYSTEMS - A Research Roadmap, Leandro Krug Wives, Jose Palazzo Moreira de Oliveira, Zakaria Maamar, Samir Tata, and Mohamed Sellami

Link

ICSOFT (2) - TOWARDS A META-MODEL FOR WEB SERVICES' PREFERENCES, Zakaria Maamar, Ghazi Alkhatib, Said Elnaffar, and Youcef Baghdadi

Towards a meta-model for web service's preferences, Zakaria Maamar, Ghazi Al-Khatib, Said Lnaffar, and Youcef Baghdadi

Link

Business artifacts discovery and modeling, Zakaria Maamar, Youakim Badr, and Nanjangud C. Narendra

Link

Towards an approach for Enterprise Application Integration based on specialized services and Business Objects, Zakaria Maamar, Youcef Baghdadi, and Wathiq Mansoor

Link

How do goals drive the engineering of capacity-driven Web services?, Zakaria Maamar, Samir Tata, Djamal Benslimane, and Philippe Thiran

Link

From communities of web services to marts of composite web services, Zakaria Maamar, Leandro Krug Wives, Ghazi Al-Khatib, Quan Z. Sheng, Antônio Rodrigo Delepiane De Vit, and Djamal Benslimane

Link

Track 4 - digital ecosystem research and development, Zakaria Mammar and Yoosuf Cader

Link

Investigating cognitive load during multimedia learning in the UAE, Jase Moussa and Fida Atallah

Link

Referral based expertise search system in a time evolving social network, S. Pushpa, K. S. Easwarakumar, Susan Elias, and Zakaria Maamar

Link

Ubiquitous RFID: Where are we?, Quan Z. Sheng, Sherali Zeadally, Zongwei Luo, Jen Yao Chung, and Zakaria Maamar

Link

Discovering the next level: An it college quality assurance investigation, Gregory Skulmoski, Azzedine Lansari, Mohammed Lakhim, and Nadhera Al Nasser

Link

Techniques for quantitative analysis of software quality throughout the SDLC: The SWEBOK guide coverage, Manar Abu Talib, Adel Khelifi, Alain Abran, and Olga Ormandjieva

Link

Body image, health, and modernity: Women's perspectives and experiences in the United Arab Emirates, Sarah S. Trainer

Link

A Gulf Perspective to Using a Blended Learning Approach to Motivate Students in an Outcome-Based University, Abdallah Tubaishat and Azzedine Lansari

Web Services & recommender systems: A research roadmap, Leandro Krug Wives, Jose Palazzo Moreira De Oliveira, Zakaria Maamar, Samir Tata, and Mohamed Sellami

Submissions from 2009

Link

Conceptual framework: How to engineer online trust for disabled users, Fahim Akhter, Maria Claudia Buzzi, Marina Buzzi, and Barbara Leporini

Link

Web Intelligence/IAT Workshops - Conceptual Framework: How to Engineer Online Trust for Disabled Users., Fahim Akhter, Maria Claudia Buzzi, Marina Buzzi, and Barbara Leporini

Link

Identifying client goals for web service discovery, Eyhab Al-Masn and Qusay H. Mahmoud

Link

Discovering the best web service: A neural network-based solution, Eyhab Al-Masri and Qusay H. Mahmoud

Link

Developing An Effective Network Course Using The Cisco Ccna Exploration Curriculum, Akram Al-Rawi and Azzedine Lansari

Link

Autonomic service-oriented grid to enhance E-learning experiences, Youakim Badr and Zakaria Maamar

Link

The role of laptop as a platform in an outcome-based learning environment, Emad Bataineh and Abdallah Tubaishat