Vol. 6, No. 2, 2013
- Trust Network and Small World Trust Community Clustering for
E-Commerce
DOI: http://dx.doi.org/10.14257/ijhit.2013.6.2.01
by: Shaozhong Zhang and Haidong Zhong
- Achieving Efficient File Compression with Linear Cellular Automata Pattern Classifier
DOI: http://dx.doi.org/10.14257/ijhit.2013.6.2.02
by: Pokkuluri Kiran Sree and Nedunuri Usha Devi
- Global Rating Prediction Mechanism for Trust-Aware Recommender System using K-Shell Decomposition
DOI: http://dx.doi.org/10.14257/ijhit.2013.6.2.03
by: Linshan Shen, Weiwei Yuan and Donghai Guan
- A Modified Priority Based CPU Scheduling Scheme for Virtualized Environment
DOI: http://dx.doi.org/10.14257/ijhit.2013.6.2.04
by: Chia-Ying Tseng and Kang-Yuan Liu
- Time Series Model for Bankruptcy Prediction via Adaptive Neuro-Fuzzy Inference System
DOI: http://dx.doi.org/10.14257/ijhit.2013.6.2.05
by: Nidhi Arora and Jatinderkumar R. Saini
- Challenges, Promising Solutions and Open Problems of Cyber-Physical Systems
DOI: http://dx.doi.org/10.14257/ijhit.2013.6.2.06
by: Lichen Zhang, Jifeng He and Wensheng Yu
- A Secure Password-Authenticated Key Agreement Using Smart Cards
DOI: http://dx.doi.org/10.14257/ijhit.2013.6.2.07
by: Kai Chain, Wen-Chung Kuo and Jiin-Chiou Cheng
- SCN: An Efficient Wireless Sensor Network Based Communication Scheme for Stacked Containers
DOI: http://dx.doi.org/10.14257/ijhit.2013.6.2.08
by: Jin Liu, Tianlun Chen, Jialiang Bao, Xiaofeng Wang and Anqi Wang
- A Default Discrimination Method for Manufacturing Companies by Improved PSO-based LS-SVM
DOI: http://dx.doi.org/10.14257/ijhit.2013.6.2.09
by: Weiwei Wang, Jie Cao , Hongke Lu and Jian Wang
- Application of Subset Theory towards Solution of Functional Diversity Paradox
DOI: http://dx.doi.org/10.14257/ijhit.2013.6.2.10
by: Muhammad Naeem, Saira Gillani and Sohail Asghar
- Group Nearest Neighbor Queries over Uncertain Data in Location Based Services
DOI: http://dx.doi.org/10.14257/ijhit.2013.6.2.11
by: Peng Chen, Junzhong Gu, Xin Lin and Rong Tan