ISSN : 1796-203X
Volume : 2    Issue : 2    Date : April 2007

Article Information

P3ARM-t: Privacy-Preserving Protocol for Association Rule Mining with t Collusion Resistance
Iman Saleh and Mohamed Eltoweissy
Page(s): 1-12
Abstract  |  Full Text: PDF (645 KB)

p-Trust: A New Model of Trust to Allow Finer Control Over Privacy in Peer-to-Peer Framework
Sudip Chakraborty and Indrajit Ray
Page(s): 13-24
Abstract  |  Full Text: PDF (426 KB)

Defending Cyberspace with Fake Honeypots
Neil C. Rowe, E. John Custy, and Binh T. Duong
Page(s): 25-36
Abstract  |  Full Text: PDF (352 KB)

An Integrated Educational Platform Implementing Real, Remote Lab-Experiments for Electrical
Engineering Courses
Dimitris Karadimas and Kostas Efstathiou
Page(s): 37-44
Abstract  |  Full Text: PDF (850 KB)

Authoring of Units of Learning via Dialogue Systems
Dietmar Janetzko
Page(s): 45-52
Abstract  |  Full Text: PDF (700 KB)

Taking Multiple-Choise Quiz by SMS on Mobile Phones Including Analyzing Property
Mohammad Shirali-Shahreza
Page(s): 53-60
Abstract  |  Full Text: PDF (375 KB)

Introducing Virtual Private Overlay Network Services in Large Scale Grid Infrastructures
Francesco Palmieri
Page(s): 61-72
Abstract  |  Full Text: PDF (527 KB)

Optical 3D Surface Reconstruction by a Multi-Period Phase Shift Method
Erik Lilienblum and Bernd Michaelis
Page(s): 73-83
Abstract  |  Full Text: PDF (1,416 KB)

A Psychological Profile of Defender Personality Traits
Tara Whalen and Carrie Gates
Page(s): 84-93
Abstract  |  Full Text: PDF (314 KB)