Follow


Submissions from 2016

PDF

A Lightweight Security Protocol for NFC-based Mobile Payments, Mohamad Badra and Rouba Borghol Badra

PDF

Monetizing Personal Data: A Two-Sided Market Approach, Ahmed Saleh Bataineh, Rabeb Mizouni, May El Barachi, and Jamal Bentahar

PDF

A MOF-based social web services description metamodel, Amel Benna, Zakaria Maamar, and Mohamed Ahmed Nacer

Link

Sedentary behavior-based user life-log monitoring for wellness services, Hafiz Syed Muhammad Bilal, Asad Masood Khattak, and Sungyoung Lee

Link

A privacy-preserving and power-efficient bicycle tracking scheme for theft mitigation, Arne Bochem, Kevin Freeman, Martin Schwarzmaier, Omar Alfandi, and Dieter Hogrefe

Link

Fusion: Privacy-preserving distributed protocol for high-dimensional data mashup, Gaby G. Dagher, Farkhund Iqbal, Mahtab Arafati, and Benjamin C.M. Fung

Link

Dynamic and efficient brokering of energy suppliers and consumers in a smart grid, Waltenegus Dargie, Omar Alfandi, and Mohamad Badra

Link

Micro-context recognition of sedentary behaviour using smartphone, Muhammad Fahim, Asad Masood Khattak, Thar Baker, Francis Chow, and Babar Shah

Link

Tracking the sedentary lifestyle using smartphone: A pilot study, Muhammad Fahim, Asad Masood Khattak, Francis Chow, and Babar Shah

PDF

Combining Weights of Evidence Analysis with Feature Extraction - A Case Study from the Hauraki Goldfield, New Zealand, Leonardo Feltrin, João Gabriel Motta, Feras Al-Obeidat, Farhi Marir, and Martina Bertelli

Link

Lightweight context-aware activity recognition, Byung Gill Go, Asad Masood Khattak, Babar Shah, and Adil Mehmood Khan

Link

Social-based semantic framework for cloud resource management in business processes, Emna Hachicha, Walid Gaaloul, and Zakaria Maamar

Link

Towards strategic information & communication technology (ICT) framework for smart cities decision-makers, Mahmoud El Hendy, Sami Miniaoui, and Hussein Fakhry

Link

A crowdsource model for quality assurance in cloud computing, Mohammed Hussain and Mohamed Basel Al-Mourad

Link

Collect, scope, and verify big data - A framework for institution accreditation, Mohammed Hussain, Mohamed Basel Al-Mourad, and Sujith Samuel Mathew

Link

Interdiscursive strategies of metaphor-driven rhetoric in Romanian discourses on a political crisis, Cornelia Ilie and Ariadna ŞtefǍnescu

Link

Analysis of cloud computing attacks and countermeasures, Raja Mohamed Jabir, Salam Ismail Rasheed Khanji, Liza Abdallah Ahmad, Omar Alfandi, and Huwida Said

Link

Database auditing and forensics: Exploration and evaluation, Salam Ismail Rasheed Khanji, Asad Masood Khattak, and Hakim Hacid

Link

Evaluation of Linux SMTP server security aspects - A case study, Salam Khanji, Raja Jabir, Liza Ahmad, Omar Alfandi, and Huwida Said

Link

Smart meter: Toward client centric energy efficient smartphone based solution, Salam Khanji, Asad Masood Khattak, and Omar Alfandi

Link

Communication overload management through social interactions clustering, Juan Antonio Lossio-Ventura, Hakim Hacid, Mathieu Roche, and Pascal Poncelet

Link

On capturing and quantifying social qualities in business processes, Zakaria Maamar, Hakim Hacid, Emir Ugljanin, and Mohamed Sellami

PDF

Mining the Web and Literature to Discover New Knowledge about Diabetes, Farhi Marir, Huwida Said, and Feras Al-Obeidat

Link

Analytics within UAE higher education context, Adam Marks and Maytha Al-Ali

Design methodologies for M-health innovations: A content analysis, Shah Jahan Miah, John Gammack, Najmul Hasan, and Md Rakibul Hoque

Link

A data visualisation for horizontal eye-movements, Jim Morey and John Gammack

Link

Extending TLS with KMIP protocol for cloud computing, Mounira Msahli, Ahmed Serhrouchni, and Mohamad Badra

Al Ain Oases Mapping Project: Qattārah Oasis, past and present (poster), Timothy Power, Peter Sheehan, Shamsa Mohamed Al Dhaheri, Mariyam Abd Al Aziz Al Hammadi, Khuloud Ibrahim Al Hammadi, Afra Adnan Al Noaimi, Ayesha Muhsen Al Subaihi, Hamda Hasan Al Omar, Fatima Thani Al-Romeithi, Muzna Khalifa Al Mansoori, Leqa Jawher Al Zaabi, Zainab Rubaiya Al Naemi, Mohamed Khalifa, and Mohamed Al Dhaheri

PDF

An Elastic Hybrid Sensing Platform: Architecture and Research Challenges, Sleiman Rabah, Fatna Belqasmi, Rabeb Mizouni, and Rachida Dssouli

Link

Security analysis of IoT protocols: A focus in CoAP, Reem Abdul Rahman and Babar Shah

Link

The computing professional skills assessment: An innovative method for assessing ABET's student outcomes, Kevin Schoepp, Maurice Danaher, and Ashley Ater Kranov

Link

Fuzzy Query Routing in Unstructured Mobile Peer-to-Peer Networks, Babar Shah, Farkhund Iqbal, and Asad Masood Khattak

Link

A fuzzy logic scheme for real-time routing in wireless sensor networks, Babar Shah, Asad Masood Khattak, and Ki Il Kim

Link

Comparison of Lauritzen-Spiegelhalter and successive restrictions algorithms for computing probability distributions in Bayesian networks, Linda Smail

PDF

Forecasting Internal Temperature in a Home with a Sensor Network, Bruce Spencer and Omar Alfandi

PDF

Temperature Forecasts with Stable Accuracy in a Smart Home, Bruce Spencer and Feras Al-Obeidat

Link

How to Restrict Web 2.0 Applications Use in the Workplace? Example of Google+ Hangouts, Emir Ugljanin, Noura Faci, Vanilson Buregio, and Zakaria Maamar

Link

Tracking users' actions over social media: Application to Facebook, Emir Ugljanin, Noura Faci, Mohamed Sellami, and Zakaria Maamar

Link

Integrating Content and English-Language Learning in a Middle Eastern Information Technology College: Investigating Faculty Perceptions, Practices and Capabilities, Norman Williams, John Beachboard, and Robert Bohning

Link

Towards a meta-modeling approach for social business process requirements capture, Fadwa Yahya, Khouloud Boukadi, Zakaria Maamar, and Hanêne Ben-Abdallah

Link

IoT end-user applications provisioning in the cloud: State of the art, Sami Yangui, Roch H. Glitho, Fatna Belqasmi, Monique J. Morrow, and Paul A. Polakos

Link

Android device hacking tricks and countermeasures, Khulood Al Zaabi

Link

Android forensics: Investigating social networking cybercrimes against man-in-the-middle attacks, Khulood Ali Al Zaabi

Submissions from 2015

Link

Smart parking system for vehicles, Sripriya Srikant Adhatarao, Omar Alfandi, Arne Bochem, and Dieter Hogrefe

Link

Exhaust: Optimizing Wu-Manber pattern matching for intrusion detection using Bloom filters, Monther Aldwairi and Koloud Al-Khamaiseh

Link

Challenges of leveraging mobile sensing devices in wireless healthcare, Omar Alfandi, Suhail Ahmed, May El Barachi, and Adil Khan

Link

Received signal strength indication for movement detection, Omar Alfandi, Arne Bochem, Kirill Bulert, Dieter Hogrefe, and Alwin Maier

Link

Social learning on the move - A research roadmap, Dima Alhadidi, Zakaria Maamar, and Farhi Marir

Link

Towards HSS as a virtualized service for 5G networks, Hanieh Alipour, Fatna Belqasmi, Mohammad Abu-Lebdeh, and Roch Glitho

Link

Consumers Attitude towards the Use of Mobile Health Apps: An Empirical Review, Ayesha Almarri and Tariq Bhatti

Link

Behavioural evidence analysis applied to digital forensics: An empirical analysis of child pornography cases using P2P networks, Noora Al Mutawa, Joanne Bryce, Virginia N.L. Franqueira, and Andrew Marrington

Link

Identification and analysis of free games' permissions in Google Play, Eiman Alothali, Fatna Belqasmi, Omar Alfandi, and Farkhund Iqbal

Intelligent cloud computing first international conference, ICC 2014 Muscat, Oman, february 24–26, 2014 revised selected papers, Asma Al-Saidi, Rudolf Fleischer, Zakaria Maamar, and Omer F. Rana

Link

A new information model towards context-aware service provisioning in the Internet-of-Things, Mohab Aly, May Elbarachi, and Rachida Dssouli

Link

A novel cryptography based privacy preserving solution for urban mobility and traffic control, Mohamad Badra and Elyes Ben Hamida

Link

An innovative platform for person-centric health and wellness support, Oresti Banos, Muhammad Bilal Amin, Wajahat Ali Khan, Muhammad Afzel, Mahmood Ahmad, Maqbool Ali, Taqdir Ali, Rahman Ali, Muhammad Bilal, Manhyung Han, Jamil Hussain, Maqbool Hussain, Shujaat Hussain, Tae Ho Hur, Jae Hun Bang, Thien Huynh-The, Muhammad Idris, Dong Wook Kang, Sang Beom Park, Hameed Siddiqui, Le Ba Vui, Muhammad Fahim, Asad Masood Khattak, Byeong Ho Kang, and Sungyoung Lee

Link

NGNaaS: NGNs as cloud computing services, Fatna Belqasmi, May El Barachi, Jose M.Alcaraz Calero, Mohamad Badra, and Omar Alfandi

Link

Sandboxing: Aid in digital forensic research, Asif Iqbal, Hanan Alobaidli, Mario Guimaraes, and Oliver Popov

PDF

Exploring the extent to which English LIS Masters programs in the UAE and Qatar meet the skills and knowledge needs of employers in the library and information studies field, Nicole Johnston, Judith Mavodza, and Jassim Mohammed Jirjees

Link

An RFID solution for the monitoring of storage time and localization of perishable food in a distribution center, Faouzi Kamoun, Omar Alfandi, and Sami Miniaoui

PDF

Weaving risk identification into crowdsourcing lifecycle, Faouzi Kamoun, Dima Alhadidi, and Zakaria Maamar

Link

Correlating health and wellness analytics for personalized decision making, Wajahat Ali Khan, Muhammad Idris, Taqdir Ali, Rahman Ali, Shujaat Hussain, Maqbool Hussain, Muhammad Bilal Amin, Asad Masood Khattak, Yuan Weiwei, Muhammad Afzal, Sungyoung Lee, and Byeong Ho Kang

Link

'Controlling' Web 2.0 Applications in the Workplace, Zakaria Maamar, Vanilson Buregio, Noura Faci, Djamal Benslimane, and Quan Z. Sheng

Link

Collaborative enterprise applications based on business and social artifacts, Zakaria Maamar, Vanilson Burégio, and Mohamed Sellami

PDF

Business Reputation of Social Networks of Web Services, Zakaria Maamar, Gianpiero Costantino, Marinella Petrocchi, and Fabio Martinelli

Link

Using incentives to analyze social web services’ behaviors, Zakaria Maamar, Gianpiero Costantino, Marinella Petrocchi, and Fabio Martinelli

Link

Enterprise 2.0: Research challenges and opportunities, Zakaria Maamar, Noura Faci, Ejub Kajan, Khouloud Boukadi, Sherif Sakr, Mohamed Boukhebouze, Soraya Kouadri Mostéfaoui, Vanilson Burégio, Fadwa Yahya, Valérie Monfort, and Romain Hennion

Link

A framework of enriching business processes life-cycle with tagging information, Zakaria Maamar, Sherif Sakr, Ahmed Barnawi, and Seyed Mehdi Reza Beheshti

Link

SUPER: Social-based business process management framework, Zakaria Maamar, Sherif Sakr, Noura Faci, Mohamed Boukhebouze, and Ahmed Barnawi

Link

Analyzing social web services' capabilities, Zakaria Maamar, Hamdi Yahyaoui, Azzam Mourad, and Mohamed Sellami

Link

Secure and private management of healthcare databases for data mining, Noman Mohammed, Samira Barouti, Dima Alhadidi, and Rui Chen

Link

Interface development for a gaze-controlled reading support application, Jim Morey, John Gammack, and Erik S. Thornquist

Link

How can one learn mathematical word problems in a second language? A cognitive load perspective, Jase Moussa-Inaty, Mark Causapin, and Timothy Groombridge

PDF

Distributed computing and artificial intelligence, 12th international conference, Sigeru Omatu, Qutaibah M. Malluhi, Sara Rodríguez González, Grzegorz Bocewicz, Edgardo Bucciarelli, Gianfranco Giulioni, and Farkhund Iqbal

Link

Impact of Sybil attacks on Web services trust assessment, Zohra Saoud, Noura Faci, Zakaria Maamar, and Djamal Benslimane

Link

Sybil tolerance and probabilistic databases to compute web services trust, Zohra Saoud, Noura Faci, Zakaria Maamar, and Djamal Benslimane

Link

Web services trust assessment based on probabilistic databases, Zohra Saoud, Noura Faci, Zakaria Maamar, and Djamal Benslimane

Mathematics and mobile learning, Fayez Sayed

PDF

Innovative Public Libraries in United Arab Emirates: Taking library services in public spaces, Mary Sengati-Zimba, Judith Mavodza, and Emad Abu Eid

Link

Enhancing business processes with web 2.0 features, Fadwa Yahya, Khouloud Boukadi, Zakaria Maamar, and Hanêne Ben Abdallah

Submissions from 2014

Link

CAT Record (computer activity timeline record): A unified agent based approach for real time computer forensic evidence collection, Shadi Al Awawdeh, Ibrahim Baggili, Andrew Marrington, and Farkhund Iqbal

Link

An information security awareness program to address common security concerns in IT unit, Shadi Al Awawdeh and Abdallah Tubaishat

Link

A comparison of forensic acquisition techniques for android devices: A case study investigation of orweb browsing sessions, Nedaa Al Barghouthy and Andrew Marrington

Link

Ethics behind cyber warfare: A study of Arab citizens awareness, Nedaa Baker Al Barghuthi and Huwida Said

Link

An approach for the validation of file recovery functions in digital forensics' software tools, Sultan Al Sharif, Mohamed Al Ali, Naser Salem, Farkhund Iqbal, May El Barachi, and Omar Alfandi

Link

A forensic analysis framework for recovering encryption keys and BB10 backup decryption, Halima Al Shehhi, Dua'A Abu Hamdi, Izzeddin Asad, and Farkhund Iqbal

PDF

Competitive Moves Over Time: The Case of SAP, Michelle Antero, Jonas Hedman, and Stefan Henningsson

Link

Performance of a Logical, Five- Phase, Multithreaded, Bootable Triage Tool, Ibrahim Baggili, Andrew Marrington, and Yasser Jafar

Performance of a logical, five-phase, multithreaded, bootable triage tool, Ibrahim Baggili, Andrew Marrington, and Yasser Jafar

Analysis of the Rhode Island schumann resonance daily-average data, Robert Boldi, Earle Williams, and Anirban Guha

Link

Green Computing in the Desert: Applying Problem-Based Learning at an Emirati University, John C. Beachboard and Martine Robinson Beachboard

Link

Reputation-based composition of social web services, Alessandro Celestini, Gianpiero Costantino, Rocco De Nicola, Zakaria Maamar, Fabio Martinelli, Marinella Petrocchi, and Francesco Tiezzi

Link

Online engineering courses: Benchmarking quality, Maurice Danaher

Digital forensics and cyber crime: Fifth international conference, ICDF2C 2013 Moscow, Russia, September 26–27, 2013 revised selected papers, Pavel Gladyshev, Andrew Marrington, and Ibrahim Baggili

Schumann Resonance spectral characteristics: A useful tool to study Transient Luminous Events (TLEs) on a global scale, Anirban Guha, Earle Williams, Robert Boldi, Gabriella Satori, Tamás Nagy, Joan Montanyà, and Pascal Ortega

Link

Session details: Gamification, Mario Guimaraes

Link

FDG - Gender differences in videogame development classes: U.S. and the U.A.E., Mario Guimaraes and Leon Jololian

Link

Privacy-preserving medical reports publishing for cluster analysis, Ali Hmood, Benjamin C.M. Fung, and Farkhund Iqbal

Link

Differentiated QoS for overlay-based disaster response systems, Mohammadmajid Hormati, Ferhat Khendek, Roch Glitho, and Fatna Belqasmi

Link

An authentication scheme to protect the location privacy of femtocell users, Mohammed Hussain

Link

Trust in Mobile Cloud Computing with LTE-based Deployment, Mohammed Hussain and Basel Mohamed Almourad

Link

Effective third party auditing in cloud computing, Mohammed Hussain and Mohamed Basel Al-Mourad

Link

Amazon Kindle Fire HD forensics, Asif Iqbal, Hanan Alobaidli, Andrew Marrington, and Ibrahim Baggili

Link

Forensic artifacts of the ChatON Instant Messaging application, Asif Iqbal, Andrew Marrington, and Ibrahim Baggili

Link

A new business model and architecture for context-aware applications provisioning in the cloud, Nadjia Kara, May El Barachi, Abderrahmane El Bardai, and Omar Alfandi

Link

A direct method for teaching and measuring engineering professional skills for global workplace competency: Adaptations to computing at a University in the United Arab Emirates, Ashley Ater Kranov, Maurice Danaher, and Kevin Schoepp

Link

Using fixed-price auctions for selection in communities of web services, Erbin Lim and Zakaria Maamar

Impact of cloud computing adoption on firm stock price - An empirical research, Adam M. Mahmood, Faruk Arslan, Jagadish Dandu, Godwin Udo, and Aurelia Nicholas-Donald

Link

AMCIS - Impact of cloud computing adoption on firm stock price - An empirical research, M. Adam Mahmood, Faruk Arslan, Jagadish Dandu, and Godwin J. Udo

Link

Computer Profiling for Preliminary Forensic Examination, Andrew Marrington, Farkhund Iqbal, and Ibrahim Baggili

PDF

Testing the forensic soundness of forensic examination environments on bootable media, Ahmed Fathy Abdul Latif Mohamed, Andrew Marrington, Farkhund Iqbal, and Ibrahim Baggili

PDF

Preliminary forensic analysis of the Xbox one, Jason Moore, Ibrahim Baggili, Andrew Marrington, and Armindo Rodrigues

Link

An infrastructure for robotic applications as cloud computing services, Carla Mouradian, Fatima Zahra Errounda, Fatna Belqasmi, and Roch Glitho

Link

Adaptive SLA-based elasticity management algorithms for a virtualized IP multimedia subsystem, Hani Nemati, Arjun Singhvi, Nadjia Kara, and May El Barachi

Link

A RESTfull architecture for enabling rapid development and deployment of companion robot applications, Razieh Safaripour, Ferhat Khendek, Roch Glitho, and Fatna Belqasmi

Link

A fuzzy clustering-based credibility model for trust assessment in a service-oriented architecture, Zohra Saoud, Noura Faci, Zakaria Maamar, and Djamal Benslimane

Global circuit response to the 11-year solar cycle: Changes in source or in medium?, Earle Williams, Anirban Guha, Robert Boldi, Gabriella Satori, Alexander Koloskov, and Yuri Yampolski

Submissions from 2013

Deploying open source software (OSS) in UAE schools, Manar Abu Talib, Mezhel Bashayer, Abdulla Huda, Khalid Reem, and Ali Zamzam

Link

Critical structure of ethics behind offensive cyber warfare, Nedaa B. Al Barghouthi and Huwida Said

Link

Improving energy efficiency of data communication in a hybrid PKI-based approach for WSNs, Omar Alfandi, Arne Bochem, Ansgar Kellner, and Dieter Hogrefe

Link

BlackBerry PlayBook backup forensic analysis, Mohamed Al Marzougy, Ibrahim Baggili, and Andrew Marrington

Link

ECIS - Evolution Of Business Models: A Case Study Of SAP, Michelle Antero, Jonas Hedman, and Stefan Henningsson

Link

Towards a unified agent-based approach for real time computer forensic evidence collection, Shadi Al Awawdeh, Ibrahim Baggili, Andrew Marrington, and Farkhund Iqbal

Link

Cybercrime, Censorship, Perception and Bypassing Controls: An Exploratory Study, Ibrahim Baggili, Moza Al Shamlan, Bedoor Al Jabri, and Ayesha Al Zaabi

Link

Research Trends in Digital Forensic Science: An Empirical Analysis of Published Research, Ibrahim Baggili, Afrah Baabdallah, Deena Al-Safi, and Andrew Marrington

Link

A framework for enterprise Social Computing: Towards the realization of enterprise 2.0, Youcef Baghdadi and Zakaria Maamar

Link

The forensic investigation of android private browsing sessions using orweb, Nedaa Al Barghouthy, Andrew Marrington, and Ibrahim Baggili

Link

Symmetrically-private database search in cloud computing, Samira Barouti, Dima Alhadidi, and Mourad Debbabi

Link

An Introduction to Business Problem-Solving and Decision-Making, John C. Beachboard and Kregg Aytes

Link

An architecture for QoS-enabled video telephony in a 3GPP 4G evolved packet core environment, Fatna Belqasmi, Hanieh Alipour, Malek El Ferjani, and Roch Glitho

Link

The design and implementation of a wireless healthcare application for WSN-enabled IMS environments, May El Barachi and Omar Alfandi

Link

A multi-service multi-role integrated information model for dynamic resource discovery in virtual networks, May El Barachi, Sleiman Rabah, Nadjia Kara, Rachida Dssouli, and Joey Paquet

Link

SIGCSE - A multi-level video game for teaching security (abstract only), Mario Guimaraes and Huwida Said

Link

The study of the interrelation between law programs and digital forensics in UAE Academia, Asif Iqbal, Hanan Al Obaidli, Huwida Said, and Mario Guimaraes

Link

WCAG 1.0 versus WCAG 2.0 Web Accessibility Compliance: A Case Study, Faouzi Kamoun, Basel M. Al Mourad, and Emad Bataineh

Link

Enhancing protection techniques of e-banking security services using open source cryptographic algorithms, Adel Khelifi, Maher Aburrous, Manar Abu Talib, and P. V.S. Shastry

Link

A reliable mobile application for safety on roads, Adel Khelifi, Lama Mahmoud Daoud, and Manar Abu Talib

Link

A social network-based architecture for on-line RoSCAs in the developing world, Gilles Kounou, Christian Akpona, Herve Ahouantchede, Rose Gohoue, Fatna Belqasmi, and Roch Glitho

Link

Students' perception on the use of visual tilings to support their learning of programming concepts, Hai Ning Liang, Charles Fleming, Jim Morey, Kamran Sedig, and Ka Lok Man

Link

Network-based conflict resolution in business processes, Zakaria Maamar, Noura Faci, Soraya Kouadri Mostéfaoui, and Ejub Kajan

Link

Towards an efficient sales pitch with the Web of Things, Sujith Samuel Mathew, Yacine Atif, Quan Z. Sheng, and Zakaria Maamar

Link

An E-health Infrastructure Design to Support Management of Lifestyle Disease, Shah Jahan Miah, John G. Gammack, and Md. Jahidul Hasan

Link

Innovative RFID solution for tracking and control, Sami Miniaoui and Faouzi Kamoun

Link

Mobile phone sensing as a service: Business model and use cases, Rabeb Mizouni and May El Barachi

Paying back borrowed meanings: The implications of the metaphor-driven history of IS research for its future, Diarmuid J. Pigott, Callan F. Ledsham, Valerie J. Hobbs, and John G. Gammack

Link

Product modelling for simulating business networks offering mass customization, Marc Poulin and Benoit Montreuil

Submissions from 2012

Link

A diversity-based approach for managing faults in web services, Hanane Abdeldjelil, Noura Faci, Zakaria Maamar, and Djamal Benslimane

Link

Towards reliable web applications: ISO 19761, Manar Abu Talib, Emilia Mendes, and Adel Khelifi

PDF

Forensic analysis of social networking applications on mobile devices, Noora Al Mutawa, Ibrahim Baggili, and Andrew Marrington

Link

A Systematic review of web resource estimation, Damir Azhar, Emilia Mendes, and Patricia Riddle

Link

Fuzzy logic election of node for routing in WSNs, Shaik Sahil Babu, Arnab Raha, Mrinal Kanti Naskar, Omar Alfandi, and Dieter Hogrefe

Link

A business model for a sensors-enabled IMS environment, May El Barachi

The curriculum design of computing & information systems with concentration in database systems, M. Basel Al Mourad

Link

Information Privacy: Legal and Ethical Decision-making, John C. Beachboard and Kregg Aytes

Link

Eye tracking analysis of browser security indicators, Ali Darwish and Emad Bataineh

Link

Towards understanding phishing victims' profile, Ali Darwish, Ahmed El Zarka, and Fadi Aloul

Link

Open virtual playground: Initial architecture and results, May El Barachi, Nadjia Kara, and Rachida Dssouli

Link

AAAI Spring Symposium: Intelligent Web Services Meet Social Computing - Which Social Networks Should Web Services Sign-Up In?, Noura Faci, Zakaria Maamar, and Parisa Ghodous

Which social networks should web services sign-up in?, Noura Faci, Zakaria Maamar, and Parisa Ghodous

Link

Web effort estimation: The value of cross-company data set compared to single-company data set, Filomena Ferrucci, Federica Sarro, and Emilia Mendes

Link

A novel method of iDevice (iPhone, iPad, iPod) forensics without jailbreaking, Babar Iqbal, Asif Iqbal, and Hanan Al Obaidli

Link

Amazon kindle fire from a digital forensics perspective, Babar Iqbal, Asif Iqbal, Mario Guimaraes, Kashif Khan, and Hanan Al Obaidli

Link

Mining criminal networks from chat log, Farkhund Iqbal, Benjamin C.M. Fung, and Mourad Debbabi

Link

Using visual tiling patterns to support the teaching of programming concepts, Hai Ning Liang, Jim Morey, and Kamran Sedig

Link

On the analysis of satisfaction for web services selection, Erbin Lim, Philippe Thiran, Zakaria Maamar, and Jamal Bentahar

Link

Towards a quality of social network (o) model in the context of social web services, Zakaria Maamar, Noura Faci, Alfred Loo, and Parisa Ghodous

Link

Specifying and implementing social Web services operation using commitments, Zakaria Maamar, Noura Faci, Michael Luck, and Salahdine Hachimi

Link

Towards a user-centric social approach to web services composition, execution, and monitoring, Zakaria Maamar, Noura Faci, Quan Z. Sheng, and Lina Yao

Innovative use of it applications for teaching entrepreneurship to youth: Uae case study, Abu Talib Manar, Khelifi Adel, Al Mansori Fatema, Ballaith Zahra, and Hableel Eman

Towards a women's entrepreneurship century: The uae case study, Abu Talib Manar, El Barachi May, Khelifi Adel, Obaid Hanadi, and Sultan Ayesha

Entrepreneurship games: Overview and their future in the UAE, Abu Talib Manar, Al Fandi Omar, Al Ammari Heba, Al Amri Asma, and Al Mansoori Asma

Link

Portable web browser forensics: A forensic examination of the privacy benefits of portable web browsers, Andrew Marrington, Ibrahim Baggili, Talal Al Ismail, and Ali Al Kaf

Link

Cost estimation of web applications through knowledge elicitation, Emilia Mendes

Link

Using knowledge elicitation to improve Web effort estimation: Lessons from six industrial case studies, Emilia Mendes

Link

Applying knowledge elicitation to improve web effort estimation: A case study, Emilia Mendes, Manar Abutalib, and Steve Counsell

Link

The role of systematic reviews in identifying the state of the art in web resource estimation, Emilia Mendes and Damir Azhar

Link

Phishing in a university community: Two large scale phishing experiments, Jamshaid G. Mohebzada, Ahmed El Zarka, Arsalan H. Bhojani, and Ali Darwish

Link

Using ISO 27001 in teaching information security, Manar Abu Talib, Adel Khelifi, and Tahsin Ugurlu

Submissions from 2011

Exploratory study on innovative use of ISO standards for IT security in the UAE, Talib Manar Abu, Adel Khelifi, and May El Barachi

Link

Incorporating innovative practices in software engineering education, Ghazi Alkhatib, Zakaria Maamar, Ghassan Issa, Aiman Turani, Daoud Daoud, and M. Ibrahim Zaroor

Forensic artifacts of Facebook's instant messaging service, Noora Al Mutawa, Ibtesam Al Awadhi, Ibrahim Baggili, and Andrew Marrington

Link

Multi-level social networking to enable and foster collaborative organizations, Youakim Badr, Noura Faci, Zakaria Maamar, and Frédérique Biennier

Link

Digital Forensics and Cyber Crime: Second International ICST Conference ICDF2C 2010 Abu Dhabi, United Arab Emirates, October 4-6, 2010 Revised Selected Papers, Ibrahim Baggili

Link

Defining a Standard for Reporting Digital Evidence Items in Computer Forensic Tools, Hamda Bariki, Mariam Hashmi, and Ibrahim Baggili

Link

The Logic and Language of IT Service Management, John C. Beachboard and Kregg Aytes

PDF

Composite Web Services Formation Using a Social Network of Web Services: A Preliminary Investigation, Said Elnaffar and Zakaria Maamar

Link

Using diversity to design and deploy fault tolerant web services, Noura Faci, Hanane Abdeldjelil, Zakaria Maamar, and Djamal Benslimane

Link

Towards a framework for weaving social networks principles into Web services discovery, Noura Faci, Zakaria Maamar, Hanane Abdeldjelil, and Djamal Benslimane

Link

Game development with game maker, flash and unity, Mario A.M. Guimaraes

Link

Using video games to teach security, Mario Guimaraes, Huwida Said, and Richard Austin

Link

A Simple Cost-Effective Framework for iPhone Forensic Analysis, Mohammad Iftekhar Husain, Ibrahim Baggili, and Ramalingam Sridhar

Link

Software engineering framework for digital service-oriented EcoSystem, Ejub Kajan, Ljubomir Lazić, and Zakaria Maamar

Link

Software testing as a service (TaaS): The BISA approach, Ejub Kajan, Ljubomir Lazić, and Zakaria Maamar

Link

Towards a self-healing approach to sustain web services reliability, Mohamed Hedi Karray, Chirine Ghedira, and Zakaria Maamar

Link

Towards defining and assessing the non-functional properties of communities of Web services, Erbin Lim, Philippe Thiran, and Zakaria Maamar

Link

Using 3-way satisfaction for web service selection: Preliminary investigation, Erbin Lim, Philippe Thiran, Zakaria Maamar, and Jamal Bentahar

Link

Conceptual analysis of transactional-, capacity-driven web services, Zakaria Maamar, Sami Bhiri, Samir Tata, Khouloud Boukadi, and Wathiq Mansoor

Link

Towards a framework for weaving social networks principles into web services discovery, Zakaria Maamar, Noura Faci, Youakim Badr, Leandro Krug Wives, Pédro Bispo Dos Santos, Djamal Benslimane, and José Palazzo Moreira De Oliveira

Link

Towards a method for engineering social web services, Zakaria Maamar, Noura Faci, Leandro Krug Wives, Hamdi Yahyaoui, and Hakim Hacid

Link

Social engineering of communities of web services, Zakaria Maamar, Hamdi Yahyaoui, Erbin Lim, and Philippe Thiran

Link

Revitalizing the introductory programming course, Qusay Mahmoud, Manar Abu Talib, Zakaria Maamar, Emad Bataineh, and Leon Jololian

PDF

CAT detect (computer activity timeline detection): A tool for detecting inconsistency in computer activity timelines, Andrew Marrington, Ibrahim Baggili, George Mohay, and Andrew Clark

Link

Web of things: Description, discovery and integration, Sujith Samuel Mathew, Yacine Atif, Quan Z. Sheng, and Zakaria Maamar

Link

Knowledge representation using Bayesian networks: A case study in web effort estimation, Emilia Mendes

Link

S-commerce: Injecting social elements into m-commere, Soraya Kouadri Mostéfaoui, Noura Faci, and Zakaria Maamar

Link

FedCSIS - Semantic interoperability for infectious diseases reporting system, Murugavell Pandiyan, Osama El Hassan, Zakaria Maamar, and Pallikonda Rajasekaran

Semantic interoperability for infectious diseases reporting system, Murugavell Pandiyan, Osama El Hassan, Zakaria Maamar, and Pallikonda Rajasekaran

Link

Forensic analysis of private browsing artifacts, Huwida Said, Noora Al Mutawa, Ibtesam Al Awadhi, and Mario Guimaraes

Forensics and war-driving on unsecured wireless network, Huwida Said, Mario Guimaraes, Noora Al Mutawa, and Ibtesam Al Awadhi

Link

IPhone forensics techniques and crime investigation, Huwida Said, Alya Yousif, and Hessa Humaid

Link

Towards More Secure Biometric Readers for Effective Digital Forensic Investigation, Zouheir Trabelsi, Mohamed Al-Hemairy, Ibrahim Baggili, and Saad Amin

Submissions from 2010

A preliminary open source software infrastructure for the health sector in the UAE, Khelifi Adel and Abu Talib Manar

Why customers reluctant to buy from your website?, Fahim Akhter and Adam Marks

Classification of Al-Hadith Al-Shareef using data mining algorithm, Manar Alkhatib

Social media marketing in the UAE, Afraa Abdulla Al Tenaiji and Yoosuf Cader

Link

Towards a new-digital learning ecosystem based on autonomic Web services, Yacine Atif, Youakim Badr, and Zakaria Maamar

Link

IT Governance and IT Management: Is There a Difference That Makes a Difference?, Kregg Aytes, Jack Probst, and John C. Beachboard

Generating system requirements for a mobile digital device collection system: A preliminary step towards enhancing the forensic collection of digital devices, Ibrahim Baggili

Link

SMIRK: SMS Management and Information Retrieval Kit, Ibrahim Baggili, Ashwin Mohan, and Marcus K. Rogers

Link

Towards an approach for modeling serviceoriented business processes, Youcef Baghdadi and Zakaria Maamar

The construction of a new Lexicon design for Arabic language, Bilal Bataineh and Emad Bataineh

Link

Using argumentation to model and deploy agent-based β2β applications, Jamal Bentahar, Rafiul Alam, Zakaria Maamar, and Nanjangud C. Narendra

Engineering process for capacity-driven web services, Imen Benzarti, Samir Tata, Zakaria Maamar, Nejib Ben Hadj-Alouane, and Moez Yeddes

Towards the unification of success measures for enterprise systesm (ES), Tariq Bhatti

Link

Is Facebook really "open" to all?, Maria Claudia Buzzi, Marina Buzzi, Barbara Leporini, and Fahim Akhter

Towards a service-oriented network virtualization architecture, May El Barachi, Nadjia Kara, and Rachida Dssouli

Link

Database forensics, Mario A.M. Guimaraes, Richard Austin, and Huwida Said

Link

Analyzing communities vs. single agent-based Web services: Trust perspectives, Babak Khosravifar, Jamal Bentahar, Ahmad Moazin, Zakaria Maamar, and Philippe Thiran

Link

WEBIST (1) - WEB SERVICES & RECOMMENDER SYSTEMS - A Research Roadmap, Leandro Krug Wives, Jose Palazzo Moreira de Oliveira, Zakaria Maamar, Samir Tata, and Mohamed Sellami

Link

ICSOFT (2) - TOWARDS A META-MODEL FOR WEB SERVICES' PREFERENCES, Zakaria Maamar, Ghazi Alkhatib, Said Elnaffar, and Youcef Baghdadi

Towards a meta-model for web service's preferences, Zakaria Maamar, Ghazi Al-Khatib, Said Lnaffar, and Youcef Baghdadi

Link

Business artifacts discovery and modeling, Zakaria Maamar, Youakim Badr, and Nanjangud C. Narendra

Link

Towards an approach for Enterprise Application Integration based on specialized services and Business Objects, Zakaria Maamar, Youcef Baghdadi, and Wathiq Mansoor

Link

How do goals drive the engineering of capacity-driven Web services?, Zakaria Maamar, Samir Tata, Djamal Benslimane, and Philippe Thiran

Link

From communities of web services to marts of composite web services, Zakaria Maamar, Leandro Krug Wives, Ghazi Al-Khatib, Quan Z. Sheng, Antônio Rodrigo Delepiane De Vit, and Djamal Benslimane

Link

Track 4 - digital ecosystem research and development, Zakaria Mammar and Yoosuf Cader

Link

Referral based expertise search system in a time evolving social network, S. Pushpa, K. S. Easwarakumar, Susan Elias, and Zakaria Maamar

Link

Ubiquitous RFID: Where are we?, Quan Z. Sheng, Sherali Zeadally, Zongwei Luo, Jen Yao Chung, and Zakaria Maamar

Link

Discovering the next level: An it college quality assurance investigation, Gregory Skulmoski, Azzedine Lansari, Mohammed Lakhim, and Nadhera Al Nasser

Link

Techniques for quantitative analysis of software quality throughout the SDLC: The SWEBOK guide coverage, Manar Abu Talib, Adel Khelifi, Alain Abran, and Olga Ormandjieva

Link

Body image, health, and modernity: Women's perspectives and experiences in the United Arab Emirates, Sarah S. Trainer

Web Services & recommender systems: A research roadmap, Leandro Krug Wives, Jose Palazzo Moreira De Oliveira, Zakaria Maamar, Samir Tata, and Mohamed Sellami

Submissions from 2009

Link

Conceptual framework: How to engineer online trust for disabled users, Fahim Akhter, Maria Claudia Buzzi, Marina Buzzi, and Barbara Leporini

Link

Web Intelligence/IAT Workshops - Conceptual Framework: How to Engineer Online Trust for Disabled Users., Fahim Akhter, Maria Claudia Buzzi, Marina Buzzi, and Barbara Leporini

Link

Identifying client goals for web service discovery, Eyhab Al-Masn and Qusay H. Mahmoud

Link

Discovering the best web service: A neural network-based solution, Eyhab Al-Masri and Qusay H. Mahmoud

Link

Developing An Effective Network Course Using The Cisco Ccna Exploration Curriculum, Akram Al-Rawi and Azzedine Lansari

Link

Autonomic service-oriented grid to enhance E-learning experiences, Youakim Badr and Zakaria Maamar

Link

The role of laptop as a platform in an outcome-based learning environment, Emad Bataineh and Abdallah Tubaishat

Link

Context-aware data and IT services collaboration in E-business, Khouloud Boukadi, Chirine Ghedira, Zakaria Maamar, Djamal Benslimane, and Lucien Vincent

Link

A rule-based modeling for the description of flexible and self-healing business processes, Mohamed Boukhebouze, Youssef Amghar, Aïcha Nabila Benharkat, and Zakaria Maamar

Link

Towards an approach for estimating impact of changes on business processes, Mohamed Boukhebouze, Youssef Amghar, Aïcha Nabila Benharkat, and Zakaria Maamar

Link

Towards self-healing execution of business processes based on rules, Mohamed Boukhebouze, Youssef Amghar, Aïcha Nabila Benharkat, and Zakaria Maamar

Link

EDOC - Rule-Based Modeling and Verification of Business Processes Using ECAPE Net., Mohamed Boukhebouze, Youssef Amghar, Aïcha-Nabila Benharkat, and Zakaria Maamar

Link

Usability and accessibility of eBay by screen reader, Maria Claudia Buzzi, Marina Buzzi, Barbara Leporini, and Fahim Akhter

Link

User trust in ecommerce services: perception via screen reader, Maria Claudia Buzzi, Marina Buzzi, Barbara Leporini, and Fahim Akhter

WORLD8: International working group for new virtual reality applications in architecture, Yoshihiro Kobayashi, Ronald Hawker, Kostas Terzidis, Taro Narahara, Wael Abdelhameed, Tomohiro Fukuda, Claudio Labarca, Carlos Calderon, and Michael Jemtrud

Link

A formal verification approach of conversations in composite web services using NuSMV, Melissa Kova, Jamal Bentahar, Zakaria Maamar, and Hamdi Yahyaoui

Link

SoMeT - A Formal Verification Approach of Conversations in Composite Web Services Using NuSMV, Melissa Kova, Jamal Bentahar, Zakaria Maamar, and Hamdi Yahyaoui

Link

Social networks as a service in modern enterprises, Zakaria Maamar and Youakim Badr

Link

Privacy-aware web services in smart homes, Zakaria Maamar, Qusay Mahmoud, Nabil Sahli, and Khouloud Boukadi

Link

A P2P implementation for the high availability of web services, Zakaria Maamar, Mohamed Sellami, Samir Tata, and Quan Z. Sheng

Link

A new approach to modelweb services' behaviors based on synchronization, Zakaria Maamar, Quan Z. Sheng, Hamdi Yahyaoui, Jamal Bentahar, and Khouloud Boukadi

Link

On the synchronization of web services interactions, Zakaria Maamar, Quan Z. Sheng, Hamdi Yahyaoui, Khouloud Boukadi, and Xitong Li

Link

Towards an approach to defining capacity-driven web service, Zakaria Maamar, Samir Tata, Djamel Belaïd, and Khouloud Boukadi

Link

Even web services can socialize: A new service-oriented social networking model, Zakaria Maamar, Leandro Krug Wives, Youakim Badr, and Said Elnaffar

Link

Towards a unified approach for business process modeling using context-based artifacts and Web services, Nanjangud C. Narendra, Youakim Badr, Philippe Thiran, and Zakaria Maamar

Link

Database and database application security, Huwida E. Said, Mario A. Guimaraes, Zakaria Maamar, and Leon Jololian

Link

A recommender system for web services discovery in a distributed registry environment, Mohamed Sellami, Samir Tata, Zakaria Maamar, and Bruno Defude

Link

Robust web services provisioning through on-demand replication, Quan Z. Sheng, Zakaria Maamar, Jian Yu, and Anne H.H. Ngu

Link

ContextServ: A platform for rapid and flexible development of context-aware web services, Quan Z. Sheng, Sam Pohlenz, Jian Yu, Hoi S. Wong, Anne H.H. Ngu, and Zakaria Maamar

Link

Compatibility checking of heterogeneous Web service policies using VDM++, Quan Z. Sheng, Jian Yu, Zakaria Maamar, Wei Jiang, and Xitong Li

Internet usage among Arab adolescents: Preliminary findings, Kathy Ning Shen and Maha Shakir

Link

IT Systems Development: An IS Curricula Course that Combines Best Practices of Project Management and Software Engineering, Abdallah Tubaishat

Link

E-portfolio Assessment System for an Outcome-Based Information Technology Curriculum, Abdallah Tubaishat, Azzedine Lansari, and Akram Al-Rawi

Web services synchronization in composition scenarios, Hamdi Yahyaoui, Zakaria Maamar, Jamal Bentahar, and Khouloud Boukadi

Link

Web services synchronization in composition scenarios: The centralized view, Hamdi Yahyaoui, Zakaria Maamar, and Khouloud Boukadi

Submissions from 2008

Link

Assessment of real-time software specifications quality using COSMIC-FFP, Manar Abu Talib, Adel Khelifi, Alain Abran, and Olga Ormandjieva

Link

E-commerce security: The categorical role of computers in forensic online crime, Fahim Akhter

Link

Gender and cultural differences in adoption of e-business infrastructure in UAE, Fahim Akhter

Link

Building secure e-business systems: Technology and culture in the UAE, Fahim Akhter and Lami Kaya

Link

A preliminary study and proposed methodology: Utilisation of pervasive computing (NeXus-4) and questionnaires to determine selected physiological and psychological parameters in participants working at a higher education institute in the UK, Usama ALAlamil, Ross G. Cooper, Craig Jackson, Hu Bin, Hora Ejtehadi, and Robert Ashford

Link

Integrating The Security+ Exam Objectives Into Information Technology Curricula, Akram Al-Rawi and Azzedine Lansari

Designing and implementing B2B applications using argumentative agents, Jamal Bentahar, Nanjangud Narendra, Zakaria Maamar, Rafiul Alam, and Philippe Thiran

The adoption of mobile commerce in the United Arab Emirates, Tariq Bhatti

Link

CWSC4EC: How to employ context, web service, and community in enterprise collaboration, Khouloud Boukadi, Chirine Ghedira, Sodki Chaari, Lucien Vincent, and Emad Bataineh

Link

Reputation of communities of Web services - Preliminary investigation, Said Elnaffar, Zakaria Maamar, Hamdi Yahyaoui, Jamal Bentahar, and Philippe Thiran

Link

Globalization and state autonomy in Singapore, Habibul Haque Khondker

Link

A Course Sequence For Integrating Problem Solving And Critical Thinking In A Hybrid Outcome Based Is/It Curriculum, Azzedine Lansari, Akram Al-Rawi, Abdallah Tubaishat, and Faouzi Bouslama

Link

Exceptions in a Web services environment, Zakaria Maamar and Djamal Benslimane

Link

Using Policies to handle exceptions in a Web services environment., Zakaria Maamar and Djamal Benslimane

Link

Sustaining Web services high-availability using communities, Zakaria Maamar, Quan Z. Sheng, and Djamal Benslimane

Link

Web Services: Analysis, Modeling, and Management., Zakaria Maamar, Quan Z. Sheng, Djamal Benslimane, and Hamdi Yahiaoui

Link

A framework for modeling B2B applications, Zakaria Maamar, Philippe Thiran, Nanjangud C. Narendra, and Sattanathan Subramanian

Link

Using context to enable semantic mediation in web service communities, Michael Mrissa, Philippe Thiran, Chirine Ghedira, Djamal Benslimane, and Zakaria Maamar

Exploring UAE women's experiences with IT, Maha Shakir, Kathy Shen, Shahper Vodanovich, and Cathy Urquhart

Link

International workshop on context enabled source and service selection, integration and adaptation: Workshop summary, Quan Z. Sheng, Ullas Nambiar, Amit P. Sheth, Biplav Srivastava, Zakaria Maamar, and Said Elnaffar

Link

WS3 - international workshop on context-enabled source and service selection, integration and adaptation (CSSSIA 2008), Quan Z. Sheng, Biplav Srivastava, Ullas Nambiar, Zakaria Maamar, Amit P. Sheth, and Said Elnaffar

Link

Beyond IT interoperability assessment: Complexity analysis of the project context, Gregory J. Skulmoski and Francis T. Hartman

Link

On the enhancement of BPEL engines for self-healing composite Web services, Sattanathan Subramanian, Philippe Thiran, Nanjangud C. Narendra, Ghita Kouadri Mostefaoui, and Zakaria Maamar

Link

On the reputation of communities of Web services, Hamdi Yahyaoui, Zakaria Maamar, Jamal Bentahar, Nabil Sahli, Said Elnaffar, and Philippe Thiran

Submissions from 2007

WSRS: A web service recommender system, Esma Aimeur, David Daboue, Flavien Serge Mani Onana, Djamal Benslimane, and Zakaria Maamar

Link

A case study: Adoption of information technology in e-business of United Arab Emirates, Fahim Akhter

Link

ICEBE - A Case Study: Adoption of Information Technology in E-Business of United Arab Emirates, Fahim Akhter

Link

ICEBE - The Contribution of Intelligent System in Forming Trust and Competitiveness during Online Transactions, Fahim Akhter

Link

The contribution of intelligent system in forming trust and competitiveness during online transactions, Fahim Akhter

An intelligent integrated e-Government framework: The case of Jordan, Ghazi Alkhatib, Emad Bataineh, Haider Fraihat, and Zakaria Maamar

Link

A MultiLayer and MultiPerspective approach to compose Web services, Djamal Benslimane, Zakaria Maamar, Yehia Taher, Mohammed Lahkim, Marie Christine Fauvet, and Michael Mrissa

Link

A Multi-Layer and Multi-Perspective Approach for Web Services Composition, Djamal Benslimane, Zakaria Maamar, Yehia Taher, Mohammed Lahkim, Marie-Christine Fauvet, and Michael Mrissa

Towards owl ontologies from relational databases: An HTML-form driven approach, Sidi Mohamed Benslimane, Djamal Benslimane, Seksun Suwanmannee, Zakaria Maamar, and Hamadou Saliah-Hassane

Link

Using argumentative agents to manage communities of Web services, Jamal Bentaha, Zakaria Maamar, Djamal Benslimane, and Philippe Thiran

Link

Complexity results for argumentation-based agent communication, Jamal Bentahar and Zakaria Maamar

Exploring factors influencing the adoption of mobile commerce, Tariq Bhatti

Assessing enterprise resource planning systems success: An empirical study, Tariq Bhatti and V. Jayaraman

Link

ICEIS (4) - SPECIFICATION AND VERIFICATION OF VIEWS OVER COMPOSITE WEB SERVICES USING HIGH LEVEL PETRI-NETS, Khouloud Boukadi, Chirine Ghedira, Zakaria Maamar, and Djamal Benslimane

Link

Specification and verification of views over composite web services using high level Petri-Nets, Khouloud Boukadi, Chirine Ghedira, Zakaria Maamar, and Djamal Benslimane

Link

PDCAT - On checking the compatibility of web services' policies, Fredrik Degerlund, Marina Walden, and Kaisa Sere

Link

Digital architectural reconstruction: New media technology and their use as educational tools in the Arabian Gulf, R. W. Hawker

Link

Assessing The Effectiveness Of An Outcome Based Information Systems Curriculum, Azzedine Lansari, Akram Al-Rawi, and Faouzi Bouslama

Assessing the effectiveness of an outcome-based information systems curriculum, Azzedine Lansari, Akram Al-Rawi, and Faouzi Bouslama

A comparative study of web content accessibility of public and private organizations in Australia, Carrie Siu Man Lui and Wendy Hui

CP4WS - A method for designing and developing systems based on web services, Zakaria Maamar, Djamal Benslimane, and Chirine Ghedira

Link

ICEIS (3) - CP4WS - A Method for Designing and Developing Systems Based on Web Services., Zakaria Maamar, Djamal Benslimane, and Chirine Ghedira

Link

Towards a two-layered framework for managing web services interaction, Zakaria Maamar, Djamal Benslimane, and Quan Z. Sheng

Web services communities concepts and operations, Zakaria Maamar, Mohammed Lahkim, Djamal Benslimane, Philippe Thiran, and Subramanian Sattanathan

Link

Enabling ad-hoc collaboration between mobile users in the MESSENGER project, Zakaria Maamar, Qusay H. Mahmoud, and Abdelouahid Derhab

Link

Policies for context-driven transactional web services, Zakaria Maamar, Nanjangud C. Narendra, Djamal Benslimane, and Sattanathan Subramanian

Link

On Checking the Compatibility of Web Services' Policies, Zakaria Maamar, Quan Z. Sheng, Hamdi Yahyaoui, Djamal Benslimane, and Fenglin Liu

Link

Towards an approach for enhancing web services discovery, Nomane Ould Ahmed M'Bareck, Samir Tata, and Zakaria Maamar

Link

On modeling and developing self-healing Web services using aspects, Ghita Kouadri Mostefaoui, Nanjangud C. Narendra, Zakaria Maamar, and Philippe Thiran

An evolutionary approach for business process redesign - Towards an intelligent system, Mariska Netjes, Selma Limam Mansar, Hajo A. Reijers, and Wil M.P. Van der Aalst

Link

CP4TWS - A prototype demonstrating context and policies for transactional Web services, Sattanathan Subramanian, Zakaria Maamar, Nanjangud C. Narendra, Djamai Benslimane, and Philippe Thiran

Link

ICSOC - CP4TWS - A Prototype Demonstrating Context and Policies for Transactional Web Services., Sattanathan Subramanian, Zakaria Maamar, Nanjangud C. Narendra, Djamal Benslimane, and Philippe Thiran

Submissions from 2006

The cross-cultural challenges of adopting b2ce-commerce in middle east, europe, north americaand africa: An exploratory study, Fahim Akhter

Integrating IT certifications in networking courses: CISCO CCNA versls comptia network+, Akram Al-Rawi, Azzedine Lansari, and Faouzi Bouslama

Link

Integrating It Certifications In Networking Courses: Cisco Ccna Versus Comptia Network+, Akram Al-Rawi, Azzedine Lansari, and Faouzi Bouslama

Link

Integrating IT Certification into an Information System Course, A. Al-Rawi, A. Lansari, and F. Bouslama

Smart e-trader: A prototype information management system for UAE stock markets, F. A. Amir, H. Ibraheem, H. Mesmar, S. A. Mutawa, and E. Bataineh

Link

Web service = E + F + I, Emad Bataineh, Zakaria Maamar, Djamai Benslimane, and Chirine Ghedira

Link

Contextual ontologies motivations, challenges, and solutions, Djamal Benslimane, Ahmed Arara, Gilles Falquet, Zakaria Maamar, Philippe Thiran, and Faiez Gargouri

Implemntation process of enterprise resource planning (ERP): Emprical validation, Tariq Bhatti

Link

Ethics and professionalism for an IT professional in the UAE, Sara Saeed Bilal, Fatma Hassan, and C. Dianne Martin

Link

Fuzzy Rules In Assessing Student Learning Outcomes, Faouzi Bouslama, Azzedine Lansari, and Akram Al-Rawi

A study on implementing probabilistic packet marking in IPv6, Xuan Hien Dang, Emil Albright, and Abdullah Abonamah

Discussion forums and peer collaboration: A case study of an on-campus teaching strategy, Gilles Doiron

Link

On-campus blended learning: Using discussion forums for peer collaboration on tutorial assignments, J. A.Gilles Doiron

Effects of camel versus oryx and gazelle grazing on the plant ecology of the Dubai Desert Conservation Reserve, D. J. Gallacher and J. P. Hill

Optimal restrictions for shareware use - time or functionality based, Wendy Hui and Fahim Akhter

Economics of shareware: How uncertainty and piracy affect shareware quality and brand premium, Wendy Hui, Byungjoon Yoo, and Kar Yan Tam

Link

ICIS - Economics of shareware: How uncertainty and piracy affect shareware quality and brand premium, Wendy Hui, Byungjoon Yoo, and Kar Yan Tam

Analysis of distributed resource management in wireless LANs that support fault tolerance, Ghassan Kbar and Wathiq Mansoor

Towards a contextual model-driven development approach for web services, Zakaria Maamar, Karim Baïna, Djamal Benslimane, Nanjangud C. Narendra, and Mehdi Chelbabi

Link

On promoting ad-hoc collaboration among messengers, Zakaria Maamar, Qusay H. Mahmoud, and Abdelouahid Derhab

Link

Ad-hoc collaboration between messengers: Operations and incentives, Zakaria Maamar, Qusay H. Mahmoud, Abdelouahid Derhab, and Wathiq Mansoor

A policy-based approach to secure context in a Web services environment, Zakaria Maamar, Ghita Kouadri Mostéfaoui, and Djamal Benslimane

Towards a Coordination Model for Web Services, Zakaria Maamar, Nanjangud C. Narendra, and Philippe Thiran

Link

Applying the MVC design pattern to multi-agent systems, Qusay H. Mahmoud and Zakaria Maamar

Link

Editorial message, Qusay H. Mahmoud and Zakaria Maamar

E-government implementation: A comparative evaluation of websites maturity, Selma Limam Mansar

Link

E-government implementation: Impact on business processes, Selma Limam Mansar

Link

Towards aspect-based modeling of self-healing Web Services, G. Kouadri Mostéfaoui, Z. Maamar, N. C. Narendra, and Ph Thiran

Link

Decoupling security concerns in web services using aspects, G. Kouadri Mostéfaoui, N. C. Narendra, Z. Maamar, and S. Sattanathan

Link

A context model for semantic mediation in Web services composition, Michael Mrissa, Chirine Ghedira, Djamal Benslimane, and Zakaria Maamar

Link

Context and semantic composition of Web services, Michael Mrissa, Chirine Ghedira, Djamal Benslimane, and Zakaria Maamar

Link

SEKE - Towards Context-based Mediation for Semantic Web Services Composition, Michael Mrissa, Chirine Ghedira, Djamal Benslimane, and Zakaria Maamar

Link

The world of work beneath the veil, A. Rhodes and N. Edge

PDF

Ontologies for specifying and reconciling contexts of web services, S. Sattanathan, N. C. Narendra, and Z. Maamar

Context-driven policy enforcement and reconciliation for Web services, S. Sattanathan, N. C. Narendra, Z. Maamar, and G. Kouadri Mostéfaoui

Link

Towards an approach for web services substitution, Yehia Taher, Djamal Benslimane, Marie Christine Fauvet, and Zakaria Maamar

Submissions from 2005

Link

Knowledge management - The next generation of TQM?, Ivana Adamson

NILE-PDT: A phenomenon detection and tracking framework for data stream management systems, M. H. Ali, W. G. Aref, R. Bose, A. K. Elmagarmid, A. Helal, I. Kamel, and M. F. Mokbel

Detection and tracking of discrete phenomena in sensor-network databases, M. H. Ali, F. Mokbel Mohamed, G. Aref Walid, and Kamel Ibrahim

Link

VLDB - Nile-PDT: a phenomenon detection and tracking framework for data stream management systems, Mohamed Ali, Walid G. Aref, Raja Bose, Ahmed K. Elmagarmid, Abdelsalam A. Helal, Ibrahim Kamel, and Mohamed F. Mokbel

Link

SSDBM - Detection and tracking of discrete phenomena in sensor-network databases, Mohamed Ali, Mohamed F. Mokbel, Walid G. Aref, and Ibrahim Kamel

Integrating certifications into information systems curricula, Akram Al-Rawi, Azzedine Lansari, and Faouzi Bouslama

E-learning and the educational organizations structure reengineering (EOSR), Osama Alshara and Abdallah Tubaishat

Link

A view-based approach for tracking composite Web services, Djamal Benslimane, Zakaria Maamar, and Chirine Ghedira

Using information technology certifications in problem solving and programming languages for improving marketability, Faouzi Bouslama, Akram Al-Rawi, and Azzedine Lansari

Link

General chair's foreword, Brian J. D'Auriol, Hamid R. Arabnia, Ping Tsai Chung, Kathy Liszka, Yi Pan, Behrooz Parhami, Antonio Pescapè, Jan Smid, Abdullah Abonamah, Tarek Alameldin, Jaafar M. Alghazo, Padma Apparao, Virendra Bhavsar, Saad Biaz, Rajendra V. Boppana, Anu Bourgeois, Herwig Bruneel, Seyed Mohamed Buhari, Henry Chan, Zhao Chen, Clincy Victor, Yuanshun Dai, Xuan Hien Dang, Filip De Turck, Frank Dehne, Thomas Engel, M. Rasit Eskicioglu, Edward E.E. Frietman, Jose Garrido, and Marina L. Gavrilova

Link

Mobile station location based on hybrid of signal strength and time of arrival, Ghassan Kbar and Wathiq Mansoor

Link

Testing the performance of wireless LAN, Ghassan Kbar and Wathiq Mansoor

Using learning outcomes and e-portfolios to assess student learning in information systems, Azzedine Lansari, Akram Al-Rawi, and Faouzi Bouslama

On coordinating personalizedweb services using CooPS, Zakaria Maamar, Emad Bataineh, and Ghazi AlKhatib

Link

Tuple spaces for self-coordination of web services, Zakaria Maamar, Djamal Benslimane, Chirine Ghedira, Qusay H. Mahmoud, and Hamdi Yahyaoui

Link

On tracking personalized Web services using views, Zakaria Maamar, Djamal Benslimane, Chirine Ghedira, and Michael Mrissa

Link

On specifying an environment of software agents and web services, Zakaria Maamar and Soraya Kouadri Mostéfaoui

Link

Conversations for Web services composition, Zakaria Maamar, Soraya Kouadri Mostéfaoui, and Djamal Benslimane

Link

On Coordinating Personalized Web Services using COOPS, Z. Maamar, E. Bataineh, and G. AlKhatib

Link

Context for Personalized Web Services, Z. Maamar, S.K. Mostefaoui, and Q.H. Mahmoud

Link

On self-coordinating web services using similarity and neural networks, Z. Maamar, I. Younas, D. Benslimane, C. Ghedira, and H. Yahyaoui

Link

BPR Implementation: A Decision-Making Strategy, Selma Limam Mansar, Hajo A. Reijers, and Fouzia Ounnar

Link

Removing the veil: personal reflections on educating women in Dubai, C. Dianne Martin

Link

A Mediation Framework for Web Services in a Distributed Healthcare Information System, Michael Mrissa, Djamal Benslimane, Chirine Ghedira, and Zakaria Maamar

Link

A mediation framework for web services in a peer-to-peer environment, Michael Mrissa, Chirine Ghedira, Djamal Benslimane, Zakaria Maamar, and Jacques Fayolle

Addressing enterprise information security, Anthony Rhodes

A morphological generator for the indexing of Arabic audio, Khaled F. Shaalan, Habib E. Talhami, and Ibrahim H. Kamel

Link

iiWAS - Towards Context-Based Tracking of Web Services Security., Sattanathan Subramanian, Nanjangud C. Narendra, and Zakaria Maamar

Identifying semantically similar arabic words using a large vocabulary speech recognition system, Habib Talhami and Ibrahim Kamel

Towards a model for e-learning using web services and fuzzy logic, Irfan Younas and Mohammad Asim Makki

Submissions from 2004

Link

Determining the factors which engender customer trust in business-to-consumer (B2C) electronic commerce, Fahim Akhter, Dave Hobbs, and Zakaria Maamar

Model curriculum for undergraduate degree programs in information systems, Akram Al-Rawi, Azzedine Lansari, and Faouzi Bouslama

Infrastructure for mobile learning environments, Arif Bhatti and Miroslaw Majewski

Information Systems curriculum optimization for effective learning of problem solving, Faouzi Bouslama, Azzedine Lansari, and Akram Al-Rawi

Link

Experimental Setup for Underwater Artifact Identification and Signal Analysis using Wavelets, Mounir Hergli, Faouzi Bouslama, Jamel Baili, Azzedine Lansari, Akram Al-Rawi, and Kamel Besbes

Link

An efficient mechanism for searching arabic audio libraries, Ibrahim Kamel and Habib Talhami

The application of polynomial discriminant function classifiers to isolated arabic speech recognition, Mohammed Khasawneh, Khaled Assaleh, Wesam Sweidan, and Monther Haddad

Using technology to facilitate student learning in information systems, Azzedine Lansari, Akram Al-Rawi, and Faouzi Bouslama

Link

Context-based personalization of web services composition and provisioning, Zakaria Maamar, Ghazi Alkhatib, Soraya Kouadri Mostéfaoui, Mohammed B. Lahkim, and Wathiq Mansoor

Link

A conceptual analysis of the role of conversations in Web services composition, Zakaria Maamar, Soraya Kouadri Mostéfaoui, and Emad Bataineh

Towards an agent-based and context-oriented approach to compose Web services, Zakaria Maamar, Soraya Kouadri Mostéfaoui, Hamdi Yahyaoui, and Willem Jan Van Den Heuvel

Link

A web services composition approach based on software agents and context, Zakaria Maamar, Soraya Kouadri M, and Hamdi Yahyaoui

Link

Messengers for the dynamic management of distributed UDDI registries, Zakaria Maamar, Hamdi Yahyaoui, Qusay H. Mahmoud, Soraya Kouadri Mostéfaoui, and Wathiq Mansoor

Conceptual model for software fault localization, Abdallah Tubaishat

Submissions from 2003

Link

A new non-recursive algorithm for binary search tree traversal, Akram Ai-Rawi, Azzedine Lansari, and Faouzi Bouslama

Modeling the performance of an outcome based educational framework, Faouzi Bouslama, Azzedine Lansari, Akram Al-Rawi, and Abdullah Abonamah

Using an outcome based model to foster learning in information systems, Azzedine Lansari, Akram Al-Rawi, and Faouzi Bouslama

Link

A Novel Electromyography (EMG) Based Classification Approach for Arabic Handwriting, Azzedine Lansari, Faouzi Bouslama, Mohammed Khasawneh, and Akram Al-Rawi

Link

WWW (Alternate Paper Tracks) - Service Chart Diagrams "º Description & Application, Zakaria Maamar, Boualem Benatallah, and Wathiq Mansoor

Link

An agent-based approach to specify a Web service-oriented environment, Z. Maamar, F. Akhter, and M. Lahkim

Link

Mining the web and medline medical records to discover new facts on diabetes, Farhi Marir, Huwida Said, and Usama Alalami

Link

Habitus in transition? CMC use and impacts among young women in the United Arab Emirates, James Piecowye

Submissions from 2002

Link

Assessing a New Academic Model Using Artificial Neural Networks, Faouzi Bouslama, Azzedine Lansari, Akram Al-Rawi, and Abdullah Abonamah

"Where's the air conditioning switch?": Identifying problems for sustaining local architectural traditions in the contemporary United Arab Emirates, R. W. Hawker

Infrastructure improvements for nomadic users of pervasive services, Paul Labbé, Zakaria Maamar, and Driss Kettani

Link

Association of users with software agents in e-commerce, Zakaria Maamar

Link

Software agents to support mobile services, Zakaria Maamar, Wathiq Mansoor, and Qusay H. Mahmoud

Link

Rethinking process guidance for selecting software components, N. Maiden, H. Kim, and Cornelius Ncube

Link

The limitations of current decision-making techniques in the procurement of COTS software components, Cornelius Ncube and John C. Dean

Link

Activity theory to investigate the implementation of ICTE, Geoff Romeo and Ian Walker

Link

Integration of Workflow and Agent Technology for Business Process Management, Yuhong Yan, Zakaria Maamar, and Weiming Shen

Submissions from 2001

Moving code (Servlet strategy) vs. inviting code (applet strategy), Zakaria Maamar

Link

How to Deal with Influence in Multiagent Systems?, Zakaria Maamar and Fahim Akhter

Link

E-commerce through wireless devices, Z. Maamar, H. Yahyaoui, and W. Mansoor