Abstract is missing.
- Message from the Program Chairs [doi]
- Software Engineering - Components, Interfaces, BehaviorsWalter Dosch. [doi]
- Message from the Conference Chairs [doi]
- Acquiring Dominant Compound Terms to Build Korean Domain Knowledge BasesHanmin Jung, HeeKwan Koo, Byeong-Hee Lee, Won-Kyung Sung. 2-7 [doi]
- Genetic Algorithm Implementation in PythonWonjae Lee, Hak-Young Kim. 8-12 [doi]
- Kernel Based Intrusion Detection SystemByung-Joo Kim, Il Kon Kim. 13-18 [doi]
- An Effective Real Time Update Rule for Improving Performances both the Classification and Regression Problems in Kernel MethodsEun-Mi Kim, Bae-Ho Lee. 19-24 [doi]
- Knowledge-Based Compliance Management Systems - Methodology and ImplementationMurlikrishna Viswanathan, Young-Gyu Yang, Taeg Keun Whangbo, Nak-Bin Kim, B. Garner. 25-29 [doi]
- Design of Translator for Stack-Based Codes from 3-Address Codes in CTOCYoung-Kook Kim, Sun-Moon Jo, Weon-Hee Yoo. 32-36 [doi]
- A Reflective Practice of Automated and Manual Code Reviews for a Studio ProjectJun-Suk Oh, Ho-Jin Choi. 37-42 [doi]
- Design and Implementation of UML Based Mobile Integrated Management SystemSeong-Man Choi, Chang-Mog Lee, Cheol-Jung Yoo, Ok-Bae Chang. 43-48 [doi]
- Design and Implementation of Forced UnmountDong Wook Kim, Eun-Ji Lim, Gyu-Il Cha, Sung-In Jung. 49-53 [doi]
- Development of Embedded Software with Component Integration Based on ABCD ArchitecturesHaeng-Kon Kim, Roger Y. Lee, Hae Sool Yang. 54-60 [doi]
- A Review Approach to Detecting Structural Consistency Violations in ProgramsYuting Chen, Shaoying Liu, Fumiko Nagoya. 61-66 [doi]
- PRBAC: An Extended Role Based Access Control for Privacy Preserving Data MiningAnour F. A. Dafa-Alla, Eun Hee Kim, Keun Ho Ryu, Yong Jun Heo. 68-73 [doi]
- RGSN Model for Database IntegrationJeong-Mi Kim, JuHum Kwon, Doo-Kwon Baik. 74-79 [doi]
- An Efficient Workcase Classification Method and Tool in Workflow MiningMin-Jae Park, Kwang-Hoon Kim, Chang-Min Kim. 80-85 [doi]
- Equivalence of Transforming Non-Linear DACG to Linear Concept TreeWenyi Bi, Junping Sun. 86-91 [doi]
- Palmprint Identification Algorithm Using Hu Invariant Moments and Otsu BinarizationJin Soo Noh, Kang Hyeon Rhee. 94-99 [doi]
- Natural Image Compression Based on Modified SPIHTJae-Ju Song, Bong-Jae Yi, Jin-Ho Shin, Ju-Young Kang, Jung-Il Lee, Seon-Ku Cho. 100-104 [doi]
- A Development of the Automatic Digitizing System for Power Distribution Facility ImagesJae-Ju Song, Bong-Jae Yi, Jin-Ho Shin, Ju-Young Kang, Jung-Il Lee, Seon-Ku Cho. 105-110 [doi]
- Research on Fast Block Participation Mode Selection Algorithm in H.264Jianjun Guo, Kui Dai, Yun Cheng, Zhiying Wang. 111-113 [doi]
- Comparison of Shape-Based and Stroke-Based Methods for Segmenting Handwritten Chinese CharactersJian Yang, Han Zhang, Mark Dencler, Chao Lu. 114-119 [doi]
- Use of SCTP for IP Handover SupportDong Phil Kim, Jong-Shik Ha, Sang-Tae Kim, Seok Joo Koh. 122-126 [doi]
- Multiuser CDMA Parameters Estimation Using Sigma Point Particle FilterJang-Sub Kim, Ho-Jin Shin, Dong Ryeol Shin. 127-132 [doi]
- MAMIP - Interoperation Mechanism of Ad Hoc Network and IP NetworkSulyun Sung, Yuhwa Seo, Soonho Chu, Yongtae Shin. 133-138 [doi]
- A Study on Secure Group Transmission in Group EnvironmentBaehyun Kim, Hoon Ko, Intae Ryoo. 139-143 [doi]
- A Performance Analysis Model of PC-Based Software Router Supporting IPv6-IPv4 Translation for Residential GatewaySsang-Hee Seo, In-Yeup Kong. 144-150 [doi]
- Experience of Combining Qualitative and Quantitative Analysis Methods for Evaluating Software ArchitectureYounbok Lee, Ho-Jin Choi. 152-157 [doi]
- On the Benefits of Industrial Network: A New Approach with Market Survey and Fuzzy Statistical AnalysisShu-Meei Ho, Berlin Wu. 158-163 [doi]
- A Method for Classification of Electricity Demands Using Load Profile DataIn Hyeob Yu, Jin Ki Lee, Jong Min Ko, Sun Ic Kim. 164-168 [doi]
- A Generic Software Framework for the Software System Achitecture Design and Implementation of Handset DevicesPo-Chang Liu, Ming-Jyh Tsai, Deng-Jyi Chen. 169-174 [doi]
- Incorporating Semantics-Based Search and Policy-Based Access Control Mechanism in Context Service DeliveryMaria Riaz, Saad Liaquat Kiani, Sungyoung Lee, Young-Koo Lee. 175-180 [doi]
- Business Process Improvement Using ebXMLYeong-Tae Song, Sribara Narasimhadevara, Yanggon Kim. 181-186 [doi]
- Implementation on Event Notification Service over Multimedia FrameworkKyunghee Ji, Nammee Moon, Jaegon Kim. 188-193 [doi]
- Streaming Player Support Protocol Adaptation and Independent Operating SystemSangok Kim, Kanghee Lee, Zhefan Jiang, Hyunchul Bae, Sangwook Kim. 194-197 [doi]
- ebXML Test Framework on Dually Coupled Asynchronous MSHYoungkon Lee. 198-203 [doi]
- Implementation of Prefix Delegation Mechanism Using DHCPv6 ProtocolJooChul Lee, Hyoung Jun Kim. 204-209 [doi]
- Automatic Generation of XForms Code Using DTDEunujung Lee, Tae Hoon Kim. 210-214 [doi]
- A Distributed Platform for Archiving and Retrieving RSS FeedsDavid Chmielewski, Gongzhu Hu. 215-220 [doi]
- Multi-Granularity Locks for XML RepetitiveEunujung Lee. 222-227 [doi]
- Generation of 3D Facial Expressions Using 2D Facial ImageHyun Cheol Lee, Eun Seok Kim, Gi Taek Hur, Hee Young Choi. 228-232 [doi]
- Security Service Framework for Home NetworkZhefan Jiang, Sangok Kim, Kanghee Lee, Hyunchul Bae, Sangwook Kim. 233-238 [doi]
- Matchmaking Algorithms to Improve Dynamic Service Matching in Ubiquitous EnvironmentsKyu Min Lee, Kee-Hyun Choi, Seung-Phil Her, Dong Ryeol Shin. 239-244 [doi]
- A Shortest-Path Network Problem Using an Annealed Ant System AlgorithmShao-Han Liu, Jzau-Sheng Lin, Zi-Sheng Lin. 245-250 [doi]
- A Comprehensive Middleware Architecture for Context-Aware Ubiquitous Computing SystemsAnjum Shehzad, Hung Quoc Ngo, Sungyoung Lee, Young-Koo Lee. 251-256 [doi]
- An Approach to Extension of UML 2.0 for Representing VariabilitiesYou-Hee Choi, Gyu-Sang Shin, Youngjong Yang, Changsoon Park. 258-261 [doi]
- Reengineering Legacy Source Code to Model Driven ArchitectureK. Gowthaman, Khurram Mustafa, R. A. Khan. 262-267 [doi]
- A Metalevel Component-Based Framework for Distributed Computing ApplicationsAndy S. Y. Lai, A. J. Beaumont. 268-273 [doi]
- Realizing the Open-Closed PrincipleChong-Wei Xu, Jose Hughes. 274-279 [doi]
- Performance Improvement of Cluster System by Server Status InformationChunkyun Youn. 282-287 [doi]
- Performance Estimations of Clustered Workflow ArchitecturesKwang-Hoon Kim, Hyung-Jin Ahn, Chang-Min Kim. 288-293 [doi]
- A General Scalable Parallelizing of Strassen s Algorithm for Matrix Multiplication on Distributed Memory ComputersDuc Kien Nguyen, Ivan Lavallée, Marc Bui, Quoc Trung Ha. 294-299 [doi]
- An Effective Cache Overlapping Storage Structure for SMT ProcessorsLiqiang He, Zhiyong Liu. 300-305 [doi]
- An Evaluation of Process Performance for a Small-Team Project - A Case StudySo-Young Kim, Ho-Jin Choi. 308-313 [doi]
- A Reflective Case Study of Software Process Improvement for a Small-Scale ProjectJung-Hee Jo, Ho-Jin Choi. 314-319 [doi]
- Use of Honeynets in Computer Security EducationShiva Azadegan, Vanessa McKenna. 320-325 [doi]
- A Process-Driven e-Learning Content Organization ModelKwang-Hoon Kim, Hyuk-Jae Yoo, Hak-Sung Kim. 328-333 [doi]
- On Employing Ontology to e-LearningTai-Jong Kim, Min-Cheol Kim, Gyung-Leen Park. 334-339 [doi]
- Impact of Image Organizations on Multimedia Document RetrievalNazmul Haque, Morshed U. Chowdhury, Syed Mahbubur Rahman. 340-343 [doi]
- Measuring Personal Information Competency for Organizational ComputingChui Young Yoon. 344-349 [doi]
- Access Control Model for Secure XML DocumentsSun-Moon Jo, Young-Kook Kim, Hoon-Joon Kouh, Weon-Hee Yoo. 352-357 [doi]
- Intelligent Airbag Deployment Algorithm Design and Implemented by DSP ChipYi-Jen Mon. 358-363 [doi]
- Development of Incident Detection Model Using Neuro-Fuzzy AlgorithmSeung-Heon Lee, Jin-Woo Choi, Nam-Kwan Hong, Murlikrishna Viswanathan, Young-Kyu Yang. 364-368 [doi]
- A Framework of Context-Awareness for Ubiquitous Computing MiddlewaresHyunjung Park, Jeehyong Lee. 369-374 [doi]
- Data Protection of Multimedia Contents Using Scalable Digital WatermarkingJungHee Seo, HungBog Park. 376-380 [doi]
- Mining for Context Recognition in Document Filtering and ClassificationRey-Long Liu. 381-386 [doi]
- The Design of a Virtual Prototyping Based on ARMulatorYoung-Ran Lee, Sang-Young Cho, Jeong-Bae Lee. 387-390 [doi]
- Use of Image Processing to Collect the Time Data of NC MachiningKeyhoon Ko, Bo Hyun Kim, Byoung Kyu Choi. 392-396 [doi]
- Robust Audio Watermarking in Wavelet Domain Using Pseudorandom SequencesChin-Su Ko, Ki-Young Kim, Rim-Wo Hwang, YoungSeop Kim, Sang-Bum Rhee. 397-401 [doi]
- A Vector-Quantizer Based Method of Speaker NormalizationOk Keun Shin. 402-407 [doi]
- Wavelet Transform Based Digital Watermarking for Image AuthenticationMin-Jen Tsai, Hsiao-Ying Hung. 408-411 [doi]
- Performance Evaluation Technique of the RTSP Based Streaming ServerYong-Ju Lee, Ok-Gee Min, Hag-Young Kim. 414-417 [doi]
- Design of HDTS System for Locating Logical Errors in Java ProgramsHoon-Joon Kouh, Sun-Moon Jo, Weon-Hee Yoo. 418-423 [doi]
- Development of Quality Evaluation Metrics for BPM (Business Process Management) SystemYeongSeok Lee, JungHyun Bae, Seokkoo Shin. 424-429 [doi]
- Mock Objects Framework for TDD in the Network EnvironmentHo-Yeon Ryu, Byeong-Kil Sohn, Jae-Heung Park. 430-434 [doi]
- HW/SW Codesigned Implementation of IEEE 802.16 TDMA MAC for the Subscriber StationNak Woon Sung. 436-440 [doi]
- LQ-Routing Protocol for Mobile Ad-Hoc NetworksTang Tao, Shigeaki Tagashira, Satoshi Fujita. 441-446 [doi]
- Efficient Mobility Management for Multimedia Service in Wireless IP NetworksSang-Bum Han, Heyi-Sook Suh, Keun-Ho Lee, Chong-Sun Hwang. 447-452 [doi]
- Proactive Health Care Underpinned by Embedded and Mobile TechnologiesHwang-Cheng Wang, Jia-Chi Lin, Shiang-Ren Yang, Ping Chang, Jun-Yan Chen, Yu-Ren Guo. 453-460 [doi]
- AuToCrawler: An Integrated System for Automatic Topical CrawlerJyh-Jong Tsay, Chen-Yang Shih, Bo-Liang Wu. 462-467 [doi]
- A Model for Application Integration Using Web ServicesAshok K. Harikumar, Roger Y. Lee, Hae Sool Yang, Haeng-Kon Kim, Byeongdo Kang. 468-475 [doi]
- Rank-Based Image Transformation for Entropy Coding EfficientlyDeuk-Su Han, Myung-Jae Lee, Kang-Soo You, Euee S. Jang, Hoon-Sung Kwak. 478-482 [doi]
- Digital Image Filter Design Using Evolvable HardwareP. Nirmal Kumar, S. Suresh, J. Raja Paul Perinbam. 483-488 [doi]
- DCT-Based Image Compression Using Wavelet-Based Algorithm with Efficient Deblocking FilterWen-Chien Yen, Shen-Chuan Tai. 489-494 [doi]
- Multibiometrics Based on Palmprint and HandgeometryXiao-Yong Wei, Dan Xu, Chong-Wah Ngo. 495-500 [doi]
- Bundle Authentication and Authorization Using XML Security in the OSGi Service PlatformHee-Young Lim, Young-Gab Kim, Chang-Joo Moon, Doo-Kwon Baik. 502-507 [doi]
- Device-Independent Markup LanguageTai-Yeon Ku, Dong-Hwan Park, Kyeong-Deok Moon. 508-512 [doi]
- Context Awareness in Large Scale Ubiquitous Environments with a Service Oriented Distributed Middleware ApproachSaad Liaquat Kiani, Maria Riaz, Sungyoung Lee, Young-Koo Lee. 513-518 [doi]
- Extending OBDD Graphs for Composite Event Matching in Content-Based Pub/Sub SystemsGang Xu, Wei Xu, Tao Huang. 519-525 [doi]
- Performance Analysis on Mobility of Ad-Hoc Network for Inter-Vehicle CommunicationJaehyun Kim, Woojin Han, Woohyuk Choi, Yunil Hwang, Taehwan Kim, Joowook Jang, Jaeyong Um, JunChae Lim. 528-533 [doi]
- Design and Implementation of Policy Decision Point in Policy-Based NetworkGeonlyang Kim, Jinoh Kim, Jungchan Na. 534-538 [doi]
- Semantic Web Enabled VHE for 3rd Generation TelecommunicationsSongtao Lin, Junliang Chen. 539-544 [doi]
- Design and Implementation of QoS Measurement and Network Diagnosing Framework for IP Multicast in Advanced Collaborative EnvironmentJinyong Jo, Woojin Seok, JaiSeung Kwak, Okhwan Byeon. 545-550 [doi]
- Design of Healthcare System for Disabled Person Using Eye BlinkingHyotaek Lim, Vinay Kumar Singh. 551-555 [doi]
- Performance Analysis of Audio Streaming in Secure Wireless Access NetworkBinod Vaidya, Jongwoo Kim, Jae-Young Pyun, Jong-An Park, Seung Jo Han. 556-561 [doi]
- Two Approaches for the Improvement in Testability of Communication ProtocolsAnthony Chung, Tao Huang. 562-565 [doi]
- Enhanced Distributed Streaming System Based on RTP/RTSP in Resurgent AbilityJooyoen Lee, Junghak Kim, Shinho Kim, Changku Lim, Jaeil Jung. 568-572 [doi]
- Visualizing Hierarchical Information Using a New Focus+Context MethodHee Yong Yoo, Hee Jin Yoo. 573-576 [doi]
- Video Event Understanding through Building Knowledge DomainDan Song, Haitao Liu, Miyoung Cho, PanKoo Kim. 577-582 [doi]
- An Efficient Connectivity Compression for Triangular MeshesBin Shyan Jong, Wen Hao Yang, Juin-Ling Tseng, Tsong Wuu Lin. 583-588 [doi]
- The Design and Implementation of Asset Management System on the NGISChoon Seo Park, Jung Keun Kim, Su-Jung Mun, Yu-Hyeon Bak, Hag-Young Kim. 589-592 [doi]
- Data Broadcasting Software Architecture supporting Real-Time Caching and Monitoring in Interactive TVDong-Hwan Park, Tai-Yeon Ku, Kyeong-Deok Moon. 593-597 [doi]
- Oriental Color Ink Rendering for LandscapeKi Jung Lee, Taeg Keun Whangbo, Young-Kyu Yang. 598-602 [doi]
- Study on Address Allocation in Ad-Hoc NetworksInsu Jeong, Hyunjun Choi, Joongsoo Ma. 604-609 [doi]
- An Effective Multicast Communication Based on Locality in Mobile IPv6 NetworksSulyun Sung, Soonho Chu, Yongtae Shin. 610-615 [doi]
- A Novel Vertical Handoff Strategy for Integrated IEEE802.11 WLAN/CDMA NetworksKyung-Soo Jang, Jang-Sub Kim, Ho-Jin Shin, Dong Ryeol Shin. 616-621 [doi]
- A Development of the Mobile Computing System for Repair and Patrol of Electric Power FacilitiesJin-Ho Shin, Bong-Jae Yi, Jae-Ju Song, Ju-Young Kang, Jung-Il Lee, Seon-Ku Cho. 622-627 [doi]
- Dependable Public Wireless LANs without Hardware SupportJenn-Wei Lin, Ming-Feng Yang. 628-633 [doi]
- Using Code Division Technique to Improve the Performance of Ad Hoc Wireless NetworkWei-Lun Jeng, Tung-Shih Su, Wen-Shyong Hsieh. 634-639 [doi]
- Enhancing Transparency and Adaptability of Dynamically Changing Execution Environments for Mobile AgentsJinHo Ahn, ChaYoung Kim. 642-646 [doi]
- Service Discovery Using FIPA-Compliant AP to Support Scalability in Ubiquitous EnvironmentsHyung-Jun Kim, Kyu Min Lee, Kee-Hyun Choi, Dong Ryeol Shin. 647-652 [doi]
- Bounds on the Multi-Client Incremental ComputingCho-chin Lin, Hao-Yun Yin. 653-658 [doi]
- Integration Service for Biological Information Resources Using Agent Service to Web Service GatewayHoon Jin, In-Cheol Kim. 659-663 [doi]
- Interactions and Cooperation between Machines as a Society of AgentsS. Poonphon, Yong-Soo Kim, Chulsoo Lee, R. Sadananda. 664-669 [doi]
- A Conceptual Architecture for the Uniform Identification of ObjectsSyed Shariyar Murtaza, Choong Seon Hong. 670-675 [doi]
- Modeling Uncertainty in Context-Aware ComputingBinh An Truong, Young-Koo Lee, Sungyoung Lee. 676-681 [doi]
- Protein Knowledge Extension Based on Web DatabaseJ. Park, D. Hwang. 682-687 [doi]
- A Call Admission Control Scheme for Heterogeneous Service Considering Fairness in Wireless NetworksYoungHa Hwang, SungKee Noh. 688-692 [doi]
- Concurrency Control of Spatial Join on Spatial DatabaseJeang-Kuo Chen. 693-697 [doi]
- Mining Frequent Pattern Using Item-Transformation MethodTsai-Pin Chu, Fan Wu, Shih-Wen Chiang. 698-706 [doi]
- An Adaptive Full Parallel Interference Canceller with Imperfect Channel Estimation for CDMA SystemsYing-Fa Huang, Jyh-Horng Wen. 707-712 [doi]
- Taguchi-Based Metrics for Software QualityKiumi Akingbehin. 713-716 [doi]