Combining quality of services path first routing and admission control to support VoIP traffic Fulltext Access 9 Pages 2013
Analyzing the impact of elasticity on the profit of cloud computing providers Fulltext Access 9 Pages 2013
Cost minimization for computational applications on hybrid cloud infrastructures Fulltext Access 9 Pages 2013
Biomechanical loading of the shoulder complex and lumbosacral joints during dynamic cart pushing task Fulltext Access 9 Pages 2013
Organisational adaptation in an activist network: Social networks, leadership, and change in al-Muhajiroun Fulltext Access 9 Pages 2013
CCBKE — Session key negotiation for fast and secure scheduling of scientific applications in cloud computing Fulltext Access 9 Pages 2013
Hybrid modelling and simulation of huge crowd over a hierarchical Grid architecture Fulltext Access 9 Pages 2013
Semi-automated CCTV surveillance: The effects of system confidence, system accuracy and task complexity on operator vigilance, reliance and workload Fulltext Access 9 Pages 2013
An economic and energy-aware analysis of the viability of outsourcing cluster computing to a cloud Fulltext Access 9 Pages 2013
The effects of individual and context on aggression in repeated social interaction Fulltext Access 9 Pages 2013
Detecting suspicious behaviour using speech: Acoustic correlates of deceptive speech – An exploratory investigation Fulltext Access 9 Pages 2013
Investigation of the performance of trackpoint and touchpads with varied right and left buttons function locations Fulltext Access 9 Pages 2013
Assessment of psychosocial risks faced by workers in Almería-type greenhouses, using the Mini Psychosocial Factor method Fulltext Access 9 Pages 2013
The impact of a multifaceted ergonomic intervention program on promoting occupational health in community nurses Fulltext Access 9 Pages 2013
Identifying fall-protection training needs for residential roofing subcontractors Fulltext Access 9 Pages 2013
The influence of socio-cultural background and product value in usability testing Fulltext Access 9 Pages 2013
Disturbance and recovery of trunk mechanical and neuromuscular behaviors following repeated static trunk flexion: Influences of duration and duty cycle on creep-induced effects Fulltext Access 9 Pages 2013
Cost-efficient measurement strategies for posture observations based on video recordings Fulltext Access 9 Pages 2013
Innovative system for real-time ergonomic feedback in industrial manufacturing Fulltext Access 9 Pages 2013
Quantifying age-related differences in visual-discrimination capacity: Drivers with and without visual impairment Fulltext Access 9 Pages 2013
Testing thermal comfort of trekking boots: An objective and subjective evaluation Fulltext Access 9 Pages 2013
Anticipating the use of future things: Towards a framework for prospective use analysis in innovation design projects Fulltext Access 9 Pages 2013
From the knowledge acquisition bottleneck to the knowledge acquisition overflow: A brief French history of knowledge acquisition Fulltext Access 9 Pages 2013
Touching annotations: A visual metaphor for navigation of annotation in digital documents Fulltext Access 9 Pages 2013
Who but not where: The effect of social play on immersion in digital games Fulltext Access 9 Pages 2013
Faces and Pictures: Understanding age differences in two types of graphical authentications Fulltext Access 9 Pages 2013
Effects of restrictive clothing on lumbar range of motion and trunk muscle activity in young adult worker manual material handling Fulltext Access 9 Pages 2013
Designing automation for complex work environments under different levels of stress Fulltext Access 9 Pages 2013
Evaluating a multi-player brain–computer interface game: Challenge versus co-experience Fulltext Access 9 Pages 2013
Square++: Making a connection game win-lose complementary and playing-fair Fulltext Access 9 Pages 2013
Carpe diem, Carpe ampulla: A numerical model as an aid to the design of child-resistant closures Fulltext Access 9 Pages 2013
Controllable privacy preserving search based on symmetric predicate encryption in cloud storage Fulltext Access 9 Pages 2013
Grid based sleep research — Analysis of polysomnographies using a grid infrastructure Fulltext Access 9 Pages 2013
The influence of environmental features on route selection in an emergency situation Fulltext Access 10 Pages 2013
Standardizing the narrative of use cases: A controlled vocabulary of web user tasks Fulltext Access 10 Pages 2013
The effect of prescribed fluid consumption on physiology and work behavior of wildfire fighters Fulltext Access 10 Pages 2013
An investigation of ‘build vs. buy’ decision for software acquisition by small to medium enterprises Fulltext Access 10 Pages 2013
Simulation-based driver and vehicle crew training: Applications, efficacy and future directions Fulltext Access 10 Pages 2013
Designing simulator tools for rail research: The case study of a train driving microworld Fulltext Access 10 Pages 2013
Reliability studies of incident coding systems in high hazard industries: A narrative review of study methodology Fulltext Access 10 Pages 2013
Pressure variations on a train – Where is the threshold to railway passenger discomfort? Fulltext Access 10 Pages 2013
Analysing factors related to slipping, stumbling, and falling accidents at work: Application of data mining methods to Finnish occupational accidents and diseases statistics database Fulltext Access 10 Pages 2013
Understanding the requirements of geographical data for blind and partially sighted people to make journeys more independently Fulltext Access 10 Pages 2013
A comparison of the efficiency and effectiveness of vulnerability discovery techniques Fulltext Access 10 Pages 2013
Stereoscopic 3D entertainment and its effect on viewing comfort: Comparison of children and adults Fulltext Access 10 Pages 2013
Numerical solutions to shock reflection and shock interaction problems for the self-similar transonic two-dimensional nonlinear wave systems Fulltext Access 10 Pages 2013
Optimizing execution time predictions of scientific workflow applications in the Grid through evolutionary programming Fulltext Access 10 Pages 2013
Color image authentication with tamper detection and remedy based on BCH and Bayer Pattern Fulltext Access 10 Pages 2013
Performance evaluation of parallel strategies in public clouds: A study with phylogenomic workflows Fulltext Access 10 Pages 2013
User transparent data and task parallel multimedia computing with Pyxis-DT Fulltext Access 10 Pages 2013
Embedded systems for global e-Social Science: Moving computation rather than data Fulltext Access 10 Pages 2013
Batch scheduling of consolidated virtual machines based on their workload interference model Fulltext Access 10 Pages 2013
How level of realism influences anxiety in virtual reality environments for a job interview Fulltext Access 10 Pages 2013
Haptic Carillon: A computationally enhanced mechanical performing instrument Fulltext Access 10 Pages 2013
Cooperative Inquiry revisited: Reflections of the past and guidelines for the future of intergenerational co-design Fulltext Access 10 Pages 2013
Measuring product liking in preschool children: An evaluation of the Smileyometer and This or That methods Fulltext Access 10 Pages 2013
A rapid interpolation method of finding vascular CFD solutions with spectral collocation methods Fulltext Access 10 Pages 2013
Legibility and visual fatigue affected by text direction, screen size and character size on color LCD e-reader Fulltext Access 10 Pages 2013
Implementation of an LED tile controller for high-quality image display Fulltext Access 10 Pages 2013
Exploiting perceptual limitations and illusions to support walking through virtual environments in confined physical spaces Fulltext Access 10 Pages 2013
Scenario-driven analysis of systems specified through graph transformations Fulltext Access 10 Pages 2013
Preventing deadlock during anisotropic 2D mesh adaptation in hp-adaptive FEM Fulltext Access 10 Pages 2013
A decomposition approach for a new test-scenario in complex problem solving Fulltext Access 10 Pages 2013
Bounding models families for performance evaluation in composite Web services Fulltext Access 10 Pages 2013
Self-stabilizing algorithm for efficient topology control in Wireless Sensor Networks Fulltext Access 10 Pages 2013
Distance-aware bloom filters: Enabling collaborative search for efficient resource discovery Fulltext Access 10 Pages 2013
Efficient and incentive-compatible resource allocation mechanism for P2P-assisted content delivery systems Fulltext Access 10 Pages 2013
In-network redundancy generation for opportunistic speedup of data backup Fulltext Access 10 Pages 2013
Information disclosure on mobile devices: Re-examining privacy calculus with actual user behavior Fulltext Access 11 Pages 2013
Guide to measuring privacy concern: Review of survey and observational instruments Fulltext Access 11 Pages 2013
Acquiring and sharing tacit knowledge in software development teams: An empirical study Fulltext Access 11 Pages 2013
The influence of selection bias on effort overruns in software development projects Fulltext Access 11 Pages 2013
A process for managing interaction between experimenters to get useful similar replications Fulltext Access 11 Pages 2013