Page 21 of 22
Abstract Background Feature selection techniques use a search-criteria driven approach for ranked feature subset selection. Often, selecting an optimal subset of ranked features using the existing m…
Alex Pappachen James & Sima Dimitrijev Human-centric Computing and Information Sciences volume
Human-centric Computing and Information Sciences 2012 2:12Abstract Background Multimedia objects like music and movies are distributed to peers through downloading and caching in peer-to-peer (P2P) overlay networks. In this paper, we consider multimedia ob…
Tadateru Ohkawara, Ailixier Aikebaier, Tomoya Enokido & Makoto Takizawa Human-centric Computing and Information Sciences
Human-centric Computing and Information Sciences 2012 2:11Abstract Background and purpose Muscle tissue composition can be efficiently analyzed and quantified using images from spiral computed tomography technology (SCT) and the associated values of Hounsf…
Paolo Gargiulo, Thordur Helgason, Páll Ingvarsson, Winfried Mayr, Helmut Kern & Ugo Carraro Human-centric Computing and Information Sciences
Human-centric Computing and Information Sciences 2012 2:10Abstract Semantic Associations are complex relationships between entities over metadata represented in a RDF graph. While searching for complex relationships, it is possible to find too many relation…
Viswanathan V & Ilango Krishnamurthi
Human-centric Computing and Information Sciences 2012 2:09Abstract Background With wide application of virtualization technology, the demand is increasing for performance analysis and system diagnosis in virtualization environment. There are some profiling…
Xia Xie, Haiou Jiang, Hai Jin, Wenzhi Cao, Pingpeng Yuan & Laurence Tianruo Yang
Human-centric Computing and Information Sciences 2012 2:08Abstract Voice communication systems such as Voice-over IP (VoIP), Public Switched Telephone Networks, and Mobile Telephone Networks, are an integral means of human tele-interaction. These systems po…
Abhishek Bhattacharya, Wanmin Wu & Zhenyu Yang
Human-centric Computing and Information Sciences 2012 2:07Abstract Background This paper presents a model approach to examine the relationships among e-learning systems, self-efficacy, and students' apparent learning results for university online courses. …
Tanzila Saba
Human-centric Computing and Information Sciences 2012 2:06Abstract Background Service selection in pervasive computing is significant as it requires identifying the best service provider based on users requirements. After identifying the best service provi…
Salaja Silas, Kirubakaran Ezra & Elijah Blessing Rajsingh
Human-centric Computing and Information Sciences 2012 2:05Abstract Background Once multi-relational approach has emerged as an alternative for analyzing structured data such as relational databases, since they allow applying data mining in multiple tables …
Carlos Roberto Valêncio, Fernando Takeshi Oyama, Paulo Scarpelini Neto, Angelo Cesar Colombini, Adriano Mauro Cansian, Rogéria Cristiane Gratão de Souza & Pedro Luiz Pizzigatti Corrêa
Human-centric Computing and Information Sciences 2012 2:04Abstract In an underwater environment there can be various applications relating to the naval monitoring of an area and information gathering through the sensor nodes or underwater vehicles. The info…
Sanjay K Dhurandher, Mohammad S Obaidat & Megha Gupta
Human-centric Computing and Information Sciences 2012 2:03Abstract Background Our work is focused on fuzzy keyword search over encrypted data in Cloud Computing. Methods We adapt results on private identification schemes by Bringer et al. to this new c…
Julien Bringer & Hervé Chabanne
Human-centric Computing and Information Sciences 2012 2:02Abstract This paper describes a study on the organization and the exploration of heterogeneous personal data that are collected from mobile devices and web services in daily use. Although large amoun…
Teruhiko Teraoka
Human-centric Computing and Information Sciences 2012 2:01Abstract Information systems are being shifted to scalable architectures like Cloud and peer-to-peer (P2P) models. In this paper, we consider the P2P model as a fully distributed, scalable system dif…
Ailixier Aikebaier, Tomoya Enokido & Makoto Takizawa
Human-centric Computing and Information Sciences 2011 1:06Abstract The prevalence of multimedia applications has drastically increased the amount of multimedia data. With the drop of the hardware cost, more and more mobile devices with higher capacities are…
Hongli Luo & Mei-Ling Shyu
Human-centric Computing and Information Sciences 2011 1:05Abstract The black hole attack is one of the well-known security threats in wireless mobile ad hoc networks. The intruders utilize the loophole to carry out their malicious behaviors because the rout…
Fan-Hsun Tseng, Li-Der Chou & Han-Chieh Chao
Human-centric Computing and Information Sciences 2011 1:04