- 2014-12-26 16:14:14Medium-term Client-Perceived Performance Prediction
- 2014-12-26 16:14:12Pixel Indicator Technique for RGB Image Steganography
- 2014-12-26 16:14:10E-Text Watermarking: Utilizing 'Kashida' Extensions in Arabic Language Electronic Writing
- 2014-12-26 16:13:48Integrating Ontologies into Multi-Agent Systems Engineering (MaSE) for University Teaching Environment
- 2014-12-26 16:13:15Implementation of Web Ontology and Semantic Application for Electronic Journal Citation System
- 2014-12-26 16:10:23New Technology Supporting Informal Learning
- 2014-12-26 16:08:23The Function of Intrinsic and Extrinsic Motivation in Educational Virtual Games and Simulations (Rising Scholar Paper)
- 2014-12-26 16:05:26Connexions: A Social and Successful Anomaly among Learning Object Repositories
- 2014-12-26 15:59:07A 2-tiers p2p Architecture to Navigate the Learning Objects Sea
- 2014-12-26 15:54:47Guest Editorial—Introduction to the Special Issue on Learning and the Social Web
- 2014-12-26 15:50:34Protecting Data from the Cyber Theft – A Virulent Disease
- 2014-12-26 15:48:06Web Based Hindi to Punjabi Machine Translation System
- 2014-12-26 15:45:28Multistage Interconnection Networks: a Transition from Electronic to Optical
- 2014-12-26 15:43:12Efficient Visual Cryptography
- 2014-12-26 15:40:57Webinar – Education through Digital Collaboration