Abstract is missing.
- Meta-Learning: From Classification to Forecasting, to Optimization, and BeyondKate Smith-Miles. 2 [doi]
- 2D Barcode and Augmented Reality Supported English Learning SystemTsung-Yu Liu, Tan-Hsu Tan, Yu-Ling Chu. 5-10 [doi]
- Answering English Queries in Automatically Transcribed Arabic SpeechAbdusalam F. A. Nwesri, Seyed M. M. Tahaghoghi, Falk Scholer. 11-16 [doi]
- Minimum Message Length Clustering of Spatially-Correlated Data with Varying Inter-Class PenaltiesGerhard Visser, David L. Dowe. 17-22 [doi]
- Growing the Pipeline: Restructuring an Introductory Computer Programming CourseCynthia Y. Lester. 23-28 [doi]
- User Perceptions and Acceptance of Benevolent Worms -- A Matter of Fear?Luke Bellamy, Damien Hutchinson, Jason Wells. 29-36 [doi]
- An Integrated Technique for Video WatermarkingChien-Chuan Ko, Bo-Zhi Yang. 37-42 [doi]
- Chip Design of LPC-cepstrum for Speech RecognitionGin-Der Wu, Zhen-Wei Zhu. 43-47 [doi]
- CMOS Schmitt Trigger Circuit with Controllable Hysteresis Using Logical Threshold Voltage Control CircuitCong-Kha Pham. 48-53 [doi]
- Combining Local and Global History Hashing in Perceptron Branch PredictionC.-Y. Ho, Anthony Shi-Sheung Fong. 54-59 [doi]
- On the Limitations of Compilers to Exploit Thread-Level Parallelism in Embedded ApplicationsMd. Mafijul Islam. 60-66 [doi]
- A Domain Identification Algorithm for Personalised Query Expansion with Contextual InformationIndra Seher, Athula Ginige, Seyed A. Shahrestani. 67-72 [doi]
- A performance analysis of page and object retrieval using HTTP-MPLEX in symmetric network environmentsRobert Mattson, Somnath Ghosh. 73-80 [doi]
- Service Oriented Architecture for Legal Web PortalKenneth Patrick Payne, Joarder Kamruzzman. 81-86 [doi]
- Towards A Two-Layered Framework for Managing Web Services InteractionZakaria Maamar, Djamal Benslimane, Quan Z. Sheng. 87-92 [doi]
- Towards Agent Based Web ServiceManish Chhabra, Hongen Lu. 93-99 [doi]
- A Comparison of Relevance Feedback Strategies in CBIRGita Das, Sid Ray. 100-105 [doi]
- A fully Automated CAD system using Multi-category Feature Selection with Restricted RecombinationRanadhir Ghosh, Moumita Ghosh, John Yearwood, Subhasis Mukherjee. 106-111 [doi]
- A Kernel-Based Method for Semi-Supervised LearningAndrew Skabar, Narendra Juneja. 112-117 [doi]
- A Modified K-means Algorithm for Noise Reduction in Optical Motion Capture DataJan Carlo Barca, Grace W. Rumantir. 118-122 [doi]
- A New Approach for Image Thresholding under Uneven Lighting ConditionsYao-Hong Tsai. 123-127 [doi]
- A Novel Adaptive-Boost-Based Strategy for Combining Classifiers Using Diversity ConceptAbbas Golestani, Kushan Ahmadian, Ali Amiri, Mohammad-Reza Jahed Motlagh. 128-134 [doi]
- A Conflict Resolution Method in Context-Aware ComputingYong Qi, Min Xi, Saiyu Qi, Jizhong Zhao. 135-140 [doi]
- A Critique of Mobility Models for Wireless Network SimulationBabak Pazand, Chris McDonald. 141-146 [doi]
- A Fuzzy Adaptive Soft Handover Scheme Supporting Four Active SetsKemeng Yang, Iqbal Gondal, Bin Qiu, Laurence S. Dooley. 147-152 [doi]
- A Secure Routing Protocol for Mobile Ad hoc NetworksZhitang Li, Shudong Shi. 153-157 [doi]
- Applying Concurrent Versioning to Serverless Mobile Device SynchronisationHenry Larkin. 157-162 [doi]
- Voice over Internet Protocol on Mobile DevicesGuo Fang Mao, Alex Talevski, Elizabeth Chang. 163-169 [doi]
- A Framework for Deterministic Intention Specifications of an Agent toward an Incomplete Declared IntentionDussadee Praserttitipong, Peraphon Sophatsathit. 170-175 [doi]
- Cognitive Process during Incremental Software DevelopmentShaochun Xu, Zendi Cui, Yufeng Gui. 176-181 [doi]
- Constructing a Process Model for Decision Analysis and Resolution on COTS Selection Issue of Capability Maturity Model IntegrationPhamorn Vantakavikran, Nakornthip Prompoon. 182-187 [doi]
- Integration of Configuration Management and Hypermedia for Managing Changes in Database ApplicationsTien N. Nguyen. 188-193 [doi]
- Architectural View in Software Development Life-Cycle PracticesJinalben Patel, Roger Y. Lee, Haeng-Kon Kim. 194-199 [doi]
- Frameworks of Integration Repository for Software Process Improvement using SOAEun-Ju Park, Haeng-Kon Kim, Roger Y. Lee. 200-206 [doi]
- Adaptive Watermarking Algorithm Using SVR in Wavelet DomainJun Li, Hong Peng, Zheng Pei. 207-211 [doi]
- Bezier Curve-Based Character Descriptor Considering Shape InformationFerdous Ahmed Sohel, Gour C. Karmakar, Laurence S. Dooley. 212-216 [doi]
- Evolving Ensemble of Classifiers In Low-Dimensional Spaces Using Multi-Objective Evolutionary ApproachKushan Ahmadian, Abbas Golestani, Morteza Analoui, Mohammad R. Jahed. 217-222 [doi]
- The GVF Snake with a Minimal Path ApproachChensheng Sun, Kin-Man Lam. 223-228 [doi]
- Fast Scene Change Detection Based HistogramMorshed U. Chowdhury, Rezwanur Rahman, Joydip Saha, S. M. Raiyan Kabir. 229-233 [doi]
- Fingerprint Recognition System Using Hybrid Matching TechniquesAliaa A. A. Youssif, Morshed U. Chowdhury, Sid Ray, Howida Youssry Nafaa. 234-240 [doi]
- Defining Functional Requirements for a Lightweight GNSS Support Protocol (LGSP)Mike Tyson, Carlo Kopp. 241-246 [doi]
- Design of Multi-signature Scheme in Wireless NetworksPing Han, Yanqin Zhu, Yuemei Hu. 247-251 [doi]
- Development of Multimodal Ubiquitous System: A pilot studyDavid Kang, Wei Dai. 252-256 [doi]
- Effects of Varying Superframe Duration on Jitter in Interactive Multimedia Traffic Transmission over WLANsSuhaimi Bin Abd Latif, M. A. Rashid, F. Alam. 257-260 [doi]
- Pheromone Communication Simulation for Mobile Robots Using Java 3DAnies Hannawati Purnamadjaja, Johan Iskandar, R. Andrew Russell. 261-266 [doi]
- Cell Phone System for Tour & Information GuideNariaki Kato, Naohiro Ishii. 267-273 [doi]
- Software Development for B92 Quantum Key Distribution Communication ProtocolShirantha Wijesekera, Sajal Palit, Bala Balachandran. 274-278 [doi]
- Towards Aspect Oriented Web Service Composition with UMLYang Xu, Shengqun Tang, Youwei Xu, Zukai Tang. 279-284 [doi]
- XPL, a Presentation Language based on User Interface Design PatternGiuseppe Vella, Nunzio Ingraffia, Marilia Liotta, Antonella Santangelo, Antonio Gentile. 285-290 [doi]
- A Comparison of Bipartite N-Qubit States to Classify Entangled States under Symmetric ConsiderationAlauddin Ahmed, Atiqur Rahman, Mohammed Anwer, Nazmul Haque, Morshed U. Chowdhury. 291-295 [doi]
- Reliability Analysis of Component Software Based on Stochastic Petri NetsLianzhang Zhu, Yanchen Li. 296-301 [doi]
- Evaluating the Usefulness of Pair Programming in a Classroom SettingTheodore Van Toll III, Roger Lee, Tom Ahlswede. 302-308 [doi]
- Fuzzy Model Based Recognition of Handwritten Hindi Numerals using Bacterial ForagingMadasu Hanmandlu, A. V. Nath, A. C. Mishra, Vamsi Krishna Madasu. 309-314 [doi]
- Image Watermarking Using Structure Based Wavelet Tree QuantizationGin-Der Wu, Pang-Hsuan Huang. 315-319 [doi]
- Impact of Clustering Techniques on Content-Based Pattern Generation Algorithm for Low Bit Rate Video CodingManoranjan Paul, M. Manzur Murshed. 320-325 [doi]
- Improved Background Removal through Polarisation in Vision-Based Tabletop InterfaceRoss Eldridge, Heiko Rudolph, Jonathan Duckworth, Peter H. Wilson. 326-331 [doi]
- Real-time Linear Projection Speed Sign Detection System in Low Light ConditionsTam Phuong Cao, Darrell M. Elton, John Devlin. 332-338 [doi]
- Slice and Blockwise Well-Composed SetsLuke Domanski. 339-345 [doi]
- Hybrid Group Key Management Scheme for Secure Wireless MulticastYiling Wang, Phu Dung Le, Balasubramaniam Srinivasan. 346-351 [doi]
- Network Lifetime of Application-Specific Randomly Deployed Wireless Sensor Networks in Arbitrary Sensor DensityJing He, Yanchun Zhang, Guangyan Huang, Yong Shi. 352-357 [doi]
- Performance Analysis of OFDM Systems with Phase NoiseM. Mahbubur Rahman, M. Delowar Hossain, A. B. M. Shawkat Ali. 358-362 [doi]
- RFID-based Hospital Real-time Patient Management SystemBelal Chowdhury, Rajiv Khosla. 363-368 [doi]
- Taxonomy and Survey of Location Management SystemsAhadur Rahaman, Jemal H. Abawajy, Michael Hobbs. 369-374 [doi]
- Tokenisation of Class Files for an Embedded Java ProcessorShawn Haggett, Greg Knowles, Graham Bignell. 375-381 [doi]
- A Combined MA-GA Approach for Solving Constrained Optimization ProblemsAbu Saleh Shah Muhammad Barkat Ullah, Ruhul A. Sarker, David Cornforth. 382-387 [doi]
- A Genetic Robot Path Planner with Fuzzy Logic AdaptationMahmoud Tarokh. 388-393 [doi]
- A Hybrid Method for Solving Traveling Salesman ProblemBager Zarei, Mohammad Reza Meybodi, Mortaza Abbaszadeh Meinagh. 394-399 [doi]
- A Hybrid Simulated Annealing with Kempe Chain Neighborhood for the University Timetabling ProblemMauritsius Tuga, Regina Berretta, Alexandre Mendes. 400-405 [doi]
- A Neuro-Fuzzy Model for Motion CognitionMohamed Shaarawy, Mohamed Belal, Ehab ElGindy. 406-411 [doi]
- A Procedural Approach to Forecasting Nocturnal Air Temperature for Frost PredictionMegan Woods, Iqbal Gondal. 412-418 [doi]
- Acoustic Features Extraction for Emotion RecognitionJia Rong, Yi-Ping Phoebe Chen, Morshed Chowdhury, Gang Li. 419-424 [doi]
- Statistical Analysis of Impulse Noise Model for Color Image RestorationMieng Quoc Phu, Peter E. Tischer, Hon Ren Wu. 425-431 [doi]
- 2D Barcodes as Watermarks in Image AuthenticationPrashan Premaratne, Farzad Safaei. 432-437 [doi]
- A Hybrid Algorithm for Estimation of the Parameters of Hidden Markov Model based Acoustic Modeling of Speech Signals using Constraint-Based Genetic Algorithm and Expectation MaximizationMd. Shamsul Huda, John Yearwood, Ranadhir Ghosh. 438-443 [doi]
- Accent Classification Using Support Vector MachinesCarol Pedersen, Joachim Diederich. 444-449 [doi]
- One-Dimensional Grey Polynomial Interpolators for Image EnlargementCheng-Hsiung Hsieh, Ren-Hsien Huang, Ting-Yu Feng. 450-456 [doi]
- A Fuzzy-Based Approach for Partner Selection in Multi-Agent SystemsFenghui Ren, Minjie Zhang, Quan Bai. 457-462 [doi]
- An Empirical Study of Knowledge Representation and Learning within Conceptual Spaces for Intelligent AgentsIckjai Lee, Bayani Portier. 463-468 [doi]
- Decontamination of Arbitrary Networks using a Team of Mobile Agents with Limited VisibilityPaola Flocchini, Amiya Nayak, Arno Schulz. 469-474 [doi]
- Learning in Market-based Resource AllocationEduardo Rodrigues Gomes, Ryszard Kowalczyk. 475-482 [doi]
- Policy based Ontology Framework for Mobile AgentsSarmad Sadik, Arshad Ali, Hafiz Farooq Ahmad, Hiroki Suguri. 483-488 [doi]
- Routing with Load Balancing in Ad Hoc Network: A Mobile Agent ApproachNeeraj Nehra, R. B. Patel, V. K. Bhat. 489-495 [doi]
- Ambient Cardiac Expert: A Cardiac Patient Monitoring System using Genetic and Clinical Knowledge FusionIqbal Gondal, Muhammad Shoaib B. Sehgal, Mudasser Iqbal, Joarder Kamruzzaman. 496-501 [doi]
- An Attribute Reduction Method Based on Rough Set and SVM and with Application in Oil-Gas PredictionRu Nie, Jianhua Yue. 502-506 [doi]
- Finding Motifs in miRNA SequencesChinnu Subramaniam, Jiyuan An, Jayavardhana Gubbi, Yi-Ping Phoebe Chen. 507-512 [doi]
- Higher Order Voronoi Diagrams for Concept Boundaries and TessellationsIckjai Lee, Kyungmi Lee. 513-518 [doi]
- Hybrid Genetic Algorithm for Solving Job-Shop Scheduling ProblemS. M. Kamrul Hasan, Ruhul A. Sarker, David Cornforth. 519-524 [doi]
- Learning Structure of a Gene Regulatory NetworkRamesh Ram, Madhu Chetty. 525-531 [doi]
- A Novel Classifier Selection Approach for Adaptive Boosting AlgorithmsA. B. M. Shawkat Ali, Tony Dobele. 532-536 [doi]
- Gene-finding as an Attribute Selection TaskHelyane Bronoski Borges, Júlio C. Nievola. 537-542 [doi]
- Hybrid Multi-Feature Indexing for Music Data RetrievalYu-lung Lo, Chun-Hsiung Wang. 543-548 [doi]
- Obtain Weather Data with Data WarehousingM. H. Peyravi, P. Khosraviyan Dehkordi, Z. Davari Nejad. 549-554 [doi]
- ORN Additive: Shrinking the Gap between Database Modeling and ImplementationBryon K. Ehlmann. 555-560 [doi]
- Service-mining Based on the Knowledge and Customer DatabasesHu Wang, Chunqiang Gong, Yan Li. 561-568 [doi]
- A New Cooperative Communication MAC Strategy for Wireless Ad Hoc NetworksLi Yi, Ji Hong. 569-574 [doi]
- An Efficient Node Partitioning Algorithm for the Capacitated Minimum Spanning Tree ProblemJun Han, Zhaohao Sun, Jinpeng Huai, Xian Li. 575-580 [doi]
- Integrated Sensing and Diagnosis -- The next step in Real Time Patient Health CareIqbal Gondal, Mudasser Iqbal, Megan Woods, Muhammad Shoaib B. Sehgal. 581-586 [doi]
- Intrusion Detection via Fuzzy-Genetic Algorithm Combination with Evolutionary AlgorithmsAbolfazl Toroghi Haghighat, Mostafa Esmaeili, Amin Saremi, V. R. Mousavi. 587-591 [doi]
- Massive Data Delivery in Unstructured Peer-to-Peer Networks with Network CodingShui Yu, Zhongwen Li. 592-597 [doi]
- Optimization of QoS RoutingHimanshu Agrawal, Melanie Grah, Mark Gregory. 598-603 [doi]
- 3D Graphics Performance Scaling and Workload Decomposition and AnalysisFadi N. Sibai. 604-609 [doi]
- A Study on Data Placement of Extensible Parallel Storage SystemHu Zhang, Weiguo Wu, Xiaoshe Dong, Depei Qian, Luogeng Dai. 610-615 [doi]
- Adjacency Cache: Fast Web Cache Indexing and LookupJohn Casey, Ashley Chonka, Wanlei Zhou. 616-621 [doi]
- Average Routing Distance Analysis and Comparison of Master-Slave Super-Super-Hypercube 4-Cube Topology with different Message Passing ArchitecturesMaryam Amiripour, Hamid Abachi. 622-626 [doi]
- Improving Interactive Experience of Thin Client Computing by Reducing Data SpikesYang Sun, Teng Tiow Tay. 627-632 [doi]
- Approximate Element Computational Time for Domain Decomposition in Parallel Finite Element CodeThuy T. Le. 633-639 [doi]
- A Novel Differentiated Service Hybrid Signaling Protocol for Optical Burst Switching NetworksYantao Guo, Aijun Wen, Zengji Liu, Zhiqing Zhang. 640-645 [doi]
- A Smart Proxy for a Next Generation Web Services TransactionSunam Pradhan, Arkady B. Zaslavsky. 646-651 [doi]
- Adapting the FT-CORBA Replication Management Service for Large-scale Distributed SystemsLau Cheuk Lung, Joni da Silva Fraga. 652-657 [doi]
- An Edge Extraction Method for Color Image Using Multiple-Valued LoG Filter and Color SpaceCong-Kha Pham, Koutaro Yamano. 658-662 [doi]
- Evaluation of Authentication Mechanisms for Mobile Agents on top of JavaLeila Ismail. 663-668 [doi]
- Intelligent Adaptive Services for On-demand Systems IntegrationWei Dai, Jonathan Liu. 669-675 [doi]
- Rerouting Technique for Faster Restoration of Preempted CallsIftekhar Ahmad, Joarder Kamruzzaman, Daryoush Habibi. 676-681 [doi]
- Self Adjusted Security Architecture for Mobile Ad Hoc Networks (MANETs)Atef Z. Ghalwash, Aliaa A. A. Youssif, Sherif M. Hashad, Robin Doss. 682-687 [doi]
- The Virtual Topology Reconfiguration Controller for WDM NetworksSeungyeon You, Sungchun Kim. 688-693 [doi]
- Towards Multicast Delay Analysis for Ad hoc Wireless NetworksK. Sithitavorn, C. Wilson, B. Qiu. 694-699 [doi]
- A Comparative Study on the Performance of Wireless Sensor NetworksLin Zou, Zhongwei Zhang. 700-705 [doi]
- Cross-layer Resource Control to Improve TCP Performance over Wireless NetworkMing Li. 706-711 [doi]
- Managing Unstructured and Semi-Structured Information in OrganisationsAshley M. Aitken. 712-717 [doi]
- Performance Modeling of Business Processes Enabled by RFID and Web ServicesChen-Yang Cheng, Vittal Prabhu. 718-723 [doi]
- Structural Equation Modelling of Large-scale Information System Application Development Productivity: the Hong Kong ExperienceLes R. Foulds, Mohammed Quaddus, M. West. 724-731 [doi]
- Portfolio Management of Option-Based Investment in Technology Research and DevelopmentJirawute Choungsirakulwit, Daricha Sutivong. 732-737 [doi]
- Nanorobots for Laparoscopic Cancer SurgeryAdriano Cavalcanti, Bijan Shirinzadeh, Declan Murphy, Julian Smith. 738-743 [doi]
- Robust-Optimal Control of a Nonlinear Two Degree-of-Freedom HelicopterGwo-Ruey Yu. 744-749 [doi]
- Encoding and Decoding Techniques for Medical Video Signal Transmission and ViewingManoranjan Paul, Golam Sorwar. 750-756 [doi]
- Dynamic Feature Selection for Spam Filtering Using Support Vector MachineMd. Rafiqul Islam, Wanlei Zhou, Morshed U. Chowdhury. 757-762 [doi]
- Improvement of the Recall and the Precision for Semantic Web Services SearchDaewook Lee, Joonho Kwon, SeungHoon Yang, Sukho Lee. 763-768 [doi]
- Internet Communities and Open innovation: an Information System Design MethodologyRoula Michaelides, Dennis F. Kehoe. 769-775 [doi]
- A Multilevel Trust Management FrameworkSoon Keow Chong, Jemal H. Abawajy, Robert A. Dew. 776-781 [doi]
- SEFAP: An Email System for Anti-PhishingQiong Ren, Yi Mu, Willy Susilo. 782-787 [doi]
- A Matrix Algorithm forWeb Cache Pre-fetchingWenying Feng, Hua Chen. 788-794 [doi]
- A Composite Descriptor for Shape RetrievalAtul Sajjanhar, Guojun Lu, Dengsheng Zhang, Wanlei Zhou. 795-800 [doi]
- An Efficient and Robust Technique for Region Based Shape Representation and RetrievalDengsheng Zhang, Melissa Chen Yi Lim. 801-806 [doi]
- Efficient Probabilistic Spatio-Temporal Video Object SegmentationRakib Ahmed, Gour C. Karmakar, Laurence S. Dooley. 807-811 [doi]
- Image Retrieval Based on Fuzzy Mapping of Image Database and Fuzzy Similarity DistanceSiddhivinayak Kulkarni. 812-817 [doi]
- Model of a Semantic Web Search Engine for Multimedia Content RetrievalMohan Ponnada, Nalin Sharda. 818-823 [doi]
- Research on Intelligent Visual Surveillance for Public SecurityWenxiong Kang, Feiqi Deng. 824-829 [doi]
- A New DRM System Based on Graded Contents Sharing and Time-Block Distribution for Home NetworksEun Seok Jeong, Chul Sur, Kyung Hyune Rhee. 830-833 [doi]
- An Integrated Haptic Data Transmission in Haptic Collaborative Virtual EnvironmentsYonghee You, Mee Young Sung, Kyungkoo Jun. 834-839 [doi]
- Analysis of relations between spoken utterances and text messages in chat-augmented meetingsTomoya Kobayashi, Kazushi Nishimoto. 840-843 [doi]
- Cache Predicting Algorithm Based on Context-Aware in Pervasive ComputingJizhong Zhao, Min Xi, Yong Qi. 844-849 [doi]
- A Campus Information Processing based on Educational Resources Reuse and IntegrationTakayuki Fujimoto, Tokuro Matsuo. 850-855 [doi]
- Collaborative Education Model and Its Application in E-learningGang Chen, Ruimin Shen, Jiajun Wang, Zeyu Chen. 856-860 [doi]
- A solution to block Cross Site Scripting Vulnerabilities based on Service Oriented ArchitectureJayamsakthi Shanmugam, M. Ponnavaikko. 861-866 [doi]
- Dynamic Reconfiguration Planning with Influence ControlZhikun Zhao, Wei Li. 867-872 [doi]
- Validation process and component analysis in semantic mediationRaymond Wu. 873-878 [doi]
- Collaborative File Editor Using Repository in a BoxGongzhu Hu, Ivan Milenkovic. 879-884 [doi]
- A new approach to detecting memory access errors in C programsDae Wan Cho, Hyeon Soo Kim, Seunguk Oh. 885-890 [doi]
- Model-Based Software Component Testing: A UML-Based ApproachWeiqun Zheng, Gary A. Bundell. 891-899 [doi]
- Split Private and Shared L2 Cache Architecture for Snooping-based CMPXuemei Zhao, Karl Sammut, Fangpo He, Shaowen Qin. 900-905 [doi]
- Trust Realisation in Multi-domain Collaborative EnvironmentsOluwafemi Ajayi, Richard O. Sinnott, Anthony Stell. 906-911 [doi]
- Investigating the Shared Visual Context in Distributed Collaborative WorkDawei Jia, Kathy Blashki, Penelope Goward, R. T. Jim Eales. 912-917 [doi]
- Reduct-Based Result Set Fusion for Relevance Feedback in CBIRSamar Zutshi, Campbell Wilson, Bala Srinivasan. 918-923 [doi]
- Speech Animation Based on Chinese Mandarin Triphone ModelZhou Wei, Wang Zengfu. 924-929 [doi]
- Motion Control of a Dancing Character with MusicGunwoo Kim, Yan Wang, Hyewon Seo. 930-936 [doi]
- Conceptual Modeling of Product Information in e-CommerceHyunja Lee, Junho Shim. 937-942 [doi]
- A New Cooperative Communication System in Distance EducationTokuro Matsuo, Takayuki Fujimoto. 943-948 [doi]
- InfoXP: An E-government Information eXchange Platform Based on Overlay NetworkJun Han, Xudong Liu, Jinpeng Huai, Xuelian Lin, Xiaoxuan Ma, Xian Li. 949-954 [doi]
- Intelligent Access Control Mechanism for Ubiquitous ApplicationsTae-Hum Lim, Sang Uk Shin. 955-960 [doi]
- Long Distance Redundancy Reduction in Thin Client ComputingYang Sun, Teng Tiow Tay. 961-966 [doi]
- Restricted Access to Exam Grades on the Web by HIPSajad Shirali-Shahreza, Mohammad Shirali-Shahreza, Ali Movaghar. 967-971 [doi]
- Spam Classification Using Adaptive Boosting AlgorithmA. B. M. Shawkat Ali, Yang Xiang. 972-976 [doi]
- A Novel Genetic Algorithm Based on Image Databases for Mining Association RulesShangping Dai, Li Gao, Qiang Zhu, Changwu Zhu. 977-980 [doi]
- Using Links to Aid Web ClassificationWei Xie, Musa A. Mammadov, John Yearwood. 981-986 [doi]
- Visual Tools for Analysing Evolution, Emergence, and Error in Data StreamsSol Hart, John Yearwood, Adil M. Bagirov. 987-992 [doi]
- Recognition of Power Quality Events by Using Multiwavelet-Based Neural NetworkSuriya Kaewarsa, Kitti Attakitmongcol, Thanatchai Kulworawanichpong. 993-998 [doi]
- SubSS: A Protein-Protein Interaction Detection ToolNazar M. Zaki, Safaai Deris, Saleh Alwahaishi. 999-1004 [doi]
- The Research of Social Navigation based on Fuzzy Concept LatticeChunZhi Xie, Liangzhong Yi, Yajun Du, Zheng Pei. 1005-1011 [doi]
- Control Network ProgrammingKostadin Kratchanov, Tzanko Golemanov, Emilia Golemanova. 1012-1018 [doi]
- Slicing Aided Design of Obfuscating TransformsStephen Drape, Anirban Majumdar, Clark D. Thomborson. 1019-1024 [doi]
- A Low Cost Interactive Distance Learning SolutionFaisal Sana, Shakeel Ahmed Khoja. 1025-1029 [doi]
- Bridge Information Assurance Education Gap between the Majority and Minority Universities through CollaborationH. Yu, X. Yuan, J. Xu, S. Providence, B. Chu, D. Gu. 1030-1035 [doi]
- Collegiate Cyber Game Design Criteria and ParticipationBei-tseng Chu, Gail-Joon Ahn, Steven Blanchard, James Deese, Richard Kelly, Huiming Yu, Ashika Young. 1036-1041 [doi]
- Information Technology Project Management Curriculum PracticeGrace W. Rumantir. 1042-1048 [doi]
- Software Installation on a Huge Heterogeneous Network using Mobile AgentsB. Srikanth, D. Kirubakaran, N. Siddharth, Sudip Sanyal. 1049-1052 [doi]
- Using Metrics for Estimating Maintainability of Web Applications: An Empirical StudyHeung Seok Chae, Tae Yeon Kim, Woo-Sung Jung, Joon-Sang Lee. 1053-1059 [doi]
- Bad-Smell Metrics for Aspect-Oriented SoftwareKomsan Srivisut, Pornsiri Muenchaisri. 1060-1065 [doi]
- A Framework to Detect Deviations During Process EnactmentSean Thompson, Torab Torabi, Purva Joshi. 1066-1073 [doi]
- Challenges and Solutions in Process Automation in Tertiary Education Institutes: An Australian Case StudyJeewani Anupama Ginige, Athula Ginige. 1074-1079 [doi]
- CAD model of Process Elements: Towards Effective Management of Process Evolution in Web-based WorkflowsJeewani Anupama Ginige, Athula Ginige, Uma Sirinivasan. 1080-1086 [doi]
- New Methods for Transparent and Accurate Echo Hiding By Using the Original Audio Cepstral ContentYousof Erfani, Mohammad Shahram Moin, Mehdi Parviz. 1087-1092 [doi]
- Voice Activity Detection Based on GM(1, 1) ModelCheng-Hsiung Hsieh, Ting-Yu Feng, Ren-Hsien Huang. 1093-1098 [doi]
- Automated Speech Discrimination using Frequency Derivative Threshold DetectionChristopher J. Page, Syed Mahfuzul Aziz. 1099-1103 [doi]
- Technology Management, Data management, Improved outcomes, Efficiency and Software limitation influencing the use of wireless technology for healthcare in PakistanAbdul Hafeez-Baig, Shelly Grist, Raj Gururajan. 1104-1110 [doi]
- Providing Reliable Web Services through Active ReplicationXinfeng Ye. 1111-1116 [doi]
- Towards a Table Driven XML QoS Aware Transmission FrameworkAlex Ng. 1117-1123 [doi]
- Two Logical Verification of Quantum NOT GateAlauddin Ahmed, Atiqur Rahman, Mohammed Anwer, Nazmul Haque, Morshed U. Chowdhury. 1124-1128 [doi]
- Determining the Loss of Investment Probability for Risk based Decision Support SystemOmar Khadeer Hussain, Elizabeth Chang, Farookh Khadeer Hussain, Tharam S. Dillon. 1129-1134 [doi]
- Understanding Consumer Search Activity and Online Purchase Intensions for Improving the Product Recommendation SearchWen-Shan Lin, Ming-Fong Chen, Yan-Yan Chen. 1135-1140 [doi]