Submissions from 2017
Three-dimensional wireless ad hoc and sensor networks 2016, Soo Chang Park, Babar Shah, Euisin Lee, and Ki Il Kim
OS2: Oblivious similarity based searching for encrypted data outsourced to an untrusted domain, Zeeshan Pervez, Mahmood Ahmad, Asad Masood Khattak, Naeem Ramzan, and Wajahat Ali Khan
mlCAF: Multi-level cross-domain semantic context fusioning for behavior identification, Muhammad Asif Razzaq, Claudia Villalonga, Sungyoung Lee, Usman Akhtar, Maqbool Ali, Eun Soo Kim, Asad Masood Khattak, Hyonwoo Seung, Taeho Hur, Jaehun Bang, Dohyeong Kim, and Wajahat Ali Khan
Assessing students' foundation skills prior to the STEM majors, Anthony Rhodes, Maurice M. Danaher, and Ashley Ater Kranov
Urban road network crisis response management: time-sensitive decision optimization, Sinan Salman and Suzan Alaswad
Implementation guidelines for green data centres, Abdallah Tubaishat and Sara Sumaidaa
Energy-Efficient Region Shift Scheme to Support Mobile Sink Group in Wireless Sensor Networks., Yongbin Yim, Kyong Hoon Kim, Monther Aldwairi, and Ki-Il Kim
Submissions from 2016
Bloom Filters Optimized Wu-Manber for Intrusion Detection, Monther Aldwairi, Koloud Al-Khamaiseh, Fatima Alharbi, and Babar Shah
Critical Success Factors to Improve the Game Development Process from a Developer’s Perspective, Saiqa Aleem, Luiz Fernando Capretz, and Faheem Ahmed
Game development software engineering process life cycle: a systematic review, Saiqa Aleem, Luiz Fernando Capretz, and Faheem Ahmed
Auto-Configuration of ACL Policy in Case of Topology Change in Hybrid SDN, Rashid Amin, Nadir Shah, Babar Shah, and Omar Alfandi
Significant Predictors of e-Learning Readiness for Faculty and Students in a Public University in the UAE, Fida Atallah and Jase Moussa-Inaty
An improved privacy solution for the smart grid, Mohamad Badra and Sherali Zeadally
Development of a DSS and Online Tools to Support Sleep Disorder Consultations using Design Science., Jacqueline Blake, Don Kerr, and John Gammack
Streamlining patient consultations for sleep disorders with a knowledge-based CDSS, Jacqueline N. Blake, Don V. Kerr, and John G. Gammack
Social networks and information retrieval, how are they converging? A survey, a taxonomy and an analysis of social information retrieval approaches and platforms, Mohamed Reda Bouadjenek, Hakim Hacid, and Mokrane Bouzeghoub
PerSaDoR: Personalized social document representation for improving web search, Mohamed Reda Bouadjenek, Hakim Hacid, Mokrane Bouzeghoub, and Athena Vakali
Constructs for quality in on-line learning, Maurice M. Danaher
Assessing IT disaster recovery plans the case of publicly listed firms on Abu Dhabi/UAE security exchange, Osama El-Temtamy, Munir Majdalawieh, and Lela Pumphrey
A glance of child’s play privacy in smart toys, Patrick C.K. Hung, Farkhund Iqbal, Shih Chia Huang, Mohammed Melaisi, and Kevin Pang
A survey on network simulators in three-dimensional wireless ad hoc and sensor networks, Seokyoon Kang, Monther Aldwairi, and Ki Il Kim
Wireless sensor network virtualization: A survey, Imran Khan, Fatna Belqasmi, Roch Glitho, Noel Crespi, Monique Morrow, and Paul Polakos
Towards a self adaptive system for social wellness, Asad Masood Khattak, Wajahat Ali Khan, Zeeshan Pervez, Farkhund Iqbal, and Sungyoung Lee
Privacy-preserving data mashup model for trading person-specific information, Rashid Hussain Khokhar, Benjamin C.M. Fung, Farkhund Iqbal, Dima Alhadidi, and Jamal Bentahar
An architecture for (m, k)-firm real-time streams in wireless sensor networks, Chung Jae Lee, Babar Shah, and Ki Il Kim
Designing an Interactive Visualization to Explore Eye-movement Data, Jim Morey and John Gammack
Privacy-aware relevant data access with semantically enriched search queries for untrusted cloud storage services, Zeeshan Pervez, Mahmood Ahmad, Asad Masood Khattak, Sungyoung Lee, and Tae Choong Chung
Measuring attainment of foundation skills in general education at a public university in the United Arab Emirates, Anthony Rhodes, Maurice M. Danaher, Ashley Ater Kranov, and Lisa Isaacson
Supporting Sensemaking of Complex Objects with Visualizations: Visibility and Complementarity of Interactions, Kamran Sedig, Paul Parsons, Hai-Ning Liang, and Jim Morey
International financial reporting standards compliance and information asymmetries: The role of enforcement authority and audit quality, Abiot Tessema and Jagadish Dandu
Student Perspectives of eFolios "“ an Experience from an Outcome-Based University, Abdallah Tubaishat
Submissions from 2015
Secure and authenticated data communication in wireless sensor networks, Omar Alfandi, Arne Bochem, Ansgar Kellner, Christian Göge, and Dieter Hogrefe
Well-formed semantic model for co-learning, Jehad Alomari, Mohammed Hussain, Skander Turki, and Mehedi Masud
Graph-theoretic characterization of cyber-threat infrastructures, Amine Boukhtouta, Djedjiga Mouheb, Mourad Debbabi, Omar Alfandi, Farkhund Iqbal, and May El Barachi
Is there such a thing as "Least Publishable Unit"? An empirical investigation, John M. Budd and Kristine N. Stewart
An open virtual multi-services networking architecture for the future internet, May El Barachi, Nadjia Kara, Sleiman Rabah, and Mathieu Forgues
Towards a Better Understanding of Organizational Adoption and Diffusion of RFID Technology: A Case Study Approach, Faouzi Kamoun and Sami Miniaoui
Wireless sensor network virtualization: Early architecture and research perspectives, Imran Khan, Fatna Belqasmi, Roch Glitho, Noel Crespi, Monique Morrow, and Paul Polakos
Object-oriented and ontology-alignment patterns-based expressive Mediation Bridge Ontology (MBO), Wajahat Ali Khan, Muhammad Bilal Amin, Asad Masood Khattak, Maqbool Hussain, Muhammad Afzal, Sungyoung Lee, and Eun Soo Kim
Mapping evolution of dynamic web ontologies, A. M. Khattak, Z. Pervez, W. A. Khan, A. M. Khan, K. Latif, and S. Y. Lee
Airport Management"”Value of Customer Display Systems, Adam Marks, Maytha AL-Ali, and Kees Rietsema
Aspect-oriented security hardening of UML design models, Djedjiga Mouheb, Mourad Debbabi, Makan Pourzandi, Lingyu Wang, Mariam Nouh, Raha Ziarati, Dima Alhadidi, Chamseddine Talhi, and Vitor Lima
A service oriented broker-based approach for dynamic resource discovery in virtual networks, Sleiman Rabah, May El Barachi, Nadjia Kara, Rachida Dssouli, and Joey Paquet
Agent-based framework for sensor-to-sensor personalization, Nabil Sahli, Nafaa Jabeura, and Mohamad Badra
E-mail authorship attribution using customized associative classification, Michael R. Schmid, Farkhund Iqbal, and Benjamin C.M. Fung
Fuzzy logic-based guaranteed lifetime protocol for real-time wireless sensor networks, Babar Shah, Farkhund Iqbal, Ali Abbas, and Ki Il Kim
Enhancing social science research in the UAE: An open source software solution university of sharjah (UOS) case study, Manar Abu Talib, Muhammed AbuOdeh, Adhraa Almansoori, and Arwa AlNauimi
A green energy-aware hybrid virtual network embedding approach, Nizar Triki, Nadjia Kara, May El Barachi, and Souad Hadjres
Can E-Portfolio Improve Students’ Readiness to Find an IT Career?, Abdallah Tubaishat
Network and device forensic analysis of Android social-messaging applications, Daniel Walnycky, Ibrahim Baggili, Andrew Marrington, Jason Moore, and Frank Breitinger
Security Awarness Program for Customers Using Online Banking, Khulood Al Zaabi and Abdallah Tubaishat
Submissions from 2014
Privacy of mobile users: Pitfalls and recommendations, Naser Mohamed Al Ali, Dima Alhadidi, and Zakaria Maamar
The Impact of Cloud Computing on ITIL Service Strategy Processes, Mohamed B. Al Mourad and Mohammed Hussain
Resolution of Challenges That Are Facing Organizations before ITIL Implementation, Mohamed B. Al Mourad and Rozita Johari
Design and performance analysis of a virtual ring architecture for smart grid privacy, Mohamad Badra and Sherali Zeadally
An Analysis Study Of Smartphone Usage Habit Of Undergraduate Female Students At Zayed University, Emad Bataineh, Alya Alsaadi, and Maha AlAli
New technologies track chairs welcome message, Jose M.Alcaraz Calero, Yan Zhang, and Munir Majdalawieh
Accessibility as an integral factor in e-government web site evaluation: The case of Dubai e-government, Faouzi Kamoun and Mohamed Basel Almourad
A wireless environmental sensor network for the condition monitoring of paper rolls at printing facilities, Faouzi Kamoun and Sami Miniaoui
Mobility track chairs welcome message, Andreas Kassler, Rui Aguiar, and May El Barachi
Airport Information Systems"”Landside Management Information Systems, Adam Marks, Kees Rietsema, and Maytha AL-Ali
Building sustainable parking lots with the Web of Things, Sujith Samuel Mathew, Yacine Atif, Quan Z. Sheng, and Zakaria Maamar
Ensemble artifact design for context sensitive decision support, Shah Jahan Miah and John G. Gammack
Multiple case study approach to identify aggravating variables of insider threats in information systems, Mathew Nicho and Faouzi Kamoun
Security track chairs welcome message, George Spanoudakis, Andrew Marrington, and Farkhund Iqbal
Submissions from 2013
Social networks IM forensics: Encryption analysis, Nedaa B. Al Barghuthi and Huwida Said
Accessibility Evaluation of Dubai e-Government Websites: Findings and Implications, M. Basel Al Mourad and Faouzi Kamoun
Using tabu search to configure support vector regression for effort estimation, A. Corazza, S. Di Martino, F. Ferrucci, C. Gravino, F. Sarro, and E. Mendes
Intervening Mechanisms Between Personality and Turnover: Mediator and Suppressor Effects, Emily M. David and Courtney L. Holladay
A research agenda for the UAE iPad Initiative, Christina Gitsaki, Matthew Robby, Troy Priest, Khaled Hamdan, and Yazid Ben-Chabane
E-Government Web Accessibility: WCAG 1.0 versus WCAG 2.0 Compliance, Faouzi Kamoun, Emad Bataineh, and Basel M. Al Mourad
Cultural differences on seeking information: an eye tracking study, Mari-Carmen Marcos, Ruth Garcia-Gavilanes, Emad Bataineh, and Lara Pasarin
The Web of Things - Challenges and enabling technologies, Sujith Samuel Mathew, Yacine Atif, Quan Z. Sheng, and Zakaria Maamar
Using Student e-Portfolios to Facilitate Learning Objective Achievements in an Outcome-Based University, Abdallah Tubaishat and Azzedine Lansari
Submissions from 2012
A systematic mapping on the use of visual data mining to support the conduct of systematic literature reviews, Katia R. Felizardo, Stephen G. Macdonell, Emília Mendes, and José Carlos Maldonado
Performance Analysis of Two Priority Queuing Systems in Tandem, Faouzi Kamoun
User Interface Design and E-Commerce Security Perception: An Empirical Study, Faouzi Kamoun and Mohanad Halaweh
Towards an approach for weaving preferences into Web services operation, Zakaria Maamar, Quan Z. Sheng, Yacine Atif, Sujith Samuel Mathew, and Khouloud Boukadi
A conference to promote undergraduate research in the Arab World, Qusay H. Mahmoud, May AlTaei, and Leon Jololian
Success Factors for Integrated Itil Deployment: An it Governance Classification, Mathew Nicho and Basel A.I. Mourad
Internet usage among Arab adolescents: Preliminary findings, Kathy Ning Shen and Maha Shakir
Software process improvement success factors for small and medium Web companies: A qualitative study, Muhammad Sulayman, Cathy Urquhart, Emilia Mendes, and Stefan Seidel
Submissions from 2011
Why web services need social networks, Zakaria Maamar, Hakim Hacid, and Michael N. Huhns
Preface, Quan Z. Sheng, Yanbo Wu, Sherali Zeadally, and Zakaria Maamar
Submissions from 2010
Secure software engineering: A new teaching perspective based on the SWEBOK, Manar Abu Talib, Adel Khelifi, and Leon Jololian
A Gulf Perspective to Using a Blended Learning Approach to Motivate Students in an Outcome-Based University, Abdallah Tubaishat and Azzedine Lansari
Submissions from 2009
Developing an initial open-source platform for the higher education sector - A case study: Alhosn University, Adel Khelifi, Manar Abu Talib, Mohamed Farouk, and Habib Hamam
Database and database application security, Huwida E. Said, Mario A. Guimaraes, Zakaria Maamar, and Leon Jololian
The Impact of Laptops on Female Students Learning in an Outcome-Based Learning Environment, Abdallah Tubaishat and Emad Bataineh
Submissions from 2008
Special track on E-business applications, Fahim Akhter, Lami Kaya, and Ibrahim Kamel
Reliability model for component-based systems in cosmic (a case study), Olga Ormandjieva, Manar Abu Talib, and Alain Abran
Submissions from 2007
New Mobile-based Electronic Grade Management System, Emad Bataineh and Hend Al Abbar
A Framework towards Assessing the Merits of Inviting IT Professionals to the Classroom, Faouzi Kamoun and Said Selim
Using an Outcome-Based Information Technology Curriculum and an E-Learning Platform to Facilitate Student Learning, Azzedine Lansari, Abdallah Tubaishat, and Akram Al-Rawi
Using an Outcome-Based Information Technology Curriculum and an E-Learning Platform to Facilitate Student Learning, Azzedine Lansari, Abdallah Tubaishat, and Akram Mahmoud Al-Rawi
Submissions from 2006
A Fuzzy Logic-Based Approach for Supporting Decision-Making Process in B2C Electronic Commerce Transaction, Fahim Akhter, Zakaria Maamar, and Dave Hobbs
New hardware architecture for bit-counting, Ahmed Dalalah, Sami Baba, and Abdallah Tubaishat
Hardware architecture for popcount, Eyas El-Qawasmeh, Abdallah Tubaishat, Sami Baba, and Ahmed Dalalah
Towards an ontology-based approach for specifying and securing Web services, Z. Maamar, N. C. Narendra, and S. Sattanathan
Understanding technochange in ERP implementation through two case studies, Maha Shakir and Dennis Viehland