Abstract is missing.
- Allocation of multiple wireless access points in mobile networksMichael R. Bartolacci, Boris Peltsverger, Abdullah Konak, Svetlana Peltsverger. 1-4 [doi]
- A collaborative problem-solving framework for mobile devicesStanislav Kurkovsky, Bhagyavati, Arris Ray. 5-10 [doi]
- A quadtree dictionary approach to multi-resolution compressionRion Dooley. 11-16 [doi]
- A Message Board Client for handheld devicesJennifer M. Bennett, Mickey L. Armstrong, Swapna Gupta. 17-18 [doi]
- Developing smart card applications using the OpenCard FrameworkMark Burge. 19-24 [doi]
- A performance simulation for route maintenance in wireless ad hoc networksMohammad Al-Shurman, Seong-Moo Yoo, Seungjin Park. 25-30 [doi]
- Solving billing issues in ad hoc networksManish Mohan, Laurie L. Joiner. 31-36 [doi]
- MIDP 2.0 changing the face of J2ME gamingChristopher Williams, Mark Burge. 37-41 [doi]
- An N-Tier Client/Server course: a classroom experienceTacksoo Im, Mário Guimarães, Kenneth E. Hoganson. 42-45 [doi]
- Incorporating wireless into the computer science curriculumBhagyavati, Tena F. McQueen. 46-51 [doi]
- An FSM model for situation-aware mobile application software systemsYu Wang. 52-57 [doi]
- Agent construction in Mobile SurveyorXin Zheng. 58-63 [doi]
- Implementing the TEA algorithm on sensorsShuang Liu, Olga V. Gavrylyako, Phillip G. Bradford. 64-69 [doi]
- Recent advances in mobility modeling for mobile ad hoc network researchQunwei Zheng, Xiaoyan Hong, Sibabrata Ray. 70-75 [doi]
- On the current state of transport layer protocols in mobile ad hoc networksJohn Calagaz, Wade Chatam, Brian Eoff, John A. Hamilton Jr.. 76-81 [doi]
- GANGS : an energy efficient MAC protocol for sensor networksSaad Biaz, Yawen Dai Barowski. 82-87 [doi]
- Trust based adaptive on demand ad hoc routing protocolRajiv K. Nekkanti, Chung-wei Lee. 88-93 [doi]
- A glance at MAC protocols for ultra widebandSaad Biaz, Yiming Ji. 94-95 [doi]
- Black hole attack in mobile Ad Hoc networksMohammad Al-Shurman, Seong-Moo Yoo, Seungjin Park. 96-97 [doi]
- Assessing the complexity of software architectureMohsen N. AlSharif, Walter P. Bond, Turky N. Al-Otaiby. 98-103 [doi]
- Sotware modularization using requirements attributesTurky N. Al-Otaiby, Walter P. Bond, Mohsen AlSherif. 104-109 [doi]
- Towards a semantic-based approach for software reusable component classification and retrievalHaining Yao, Letha H. Etzkorn. 110-115 [doi]
- A knowledge processing oriented life cycle study from a Digital Museum systemQiaozhu Mei. 116-121 [doi]
- Interface design for a modern software ticketing systemMinhui Xie, Mark Tomlinson, Bobby Bodenheimer. 122-127 [doi]
- Usability testing of notification interfaces: are we focused on the best metrics?John E. Booker, Christa M. Chewar, D. Scott McCrickard. 128-133 [doi]
- Generalization for component reuseSamira Sadaoui, Pengzhou Yin. 134-139 [doi]
- Specification-driven automated testing of GUI-based Java programsYanhong Sun, Edward L. Jones. 140-145 [doi]
- Computing software metrics from design documentsCara Stein, Letha H. Etzkorn, Dawn R. Utley. 146-151 [doi]
- JavaCHIME: Java class hierarchy inspector and method executerPallavi Tadepalli, H. Conrad Cunningham. 152-157 [doi]
- Automated auditing of design principle adherenceJoel Jones, Randy Smith. 158-159 [doi]
- E-R modeler: a database modeling toolkit for EclipseSong Zhou, Chuanxi Xu, Hui Wu, Jing Zhang, Yuehua Lin, Juanqin Wang, Jeffrey G. Gray, Barrett R. Bryant. 160-165 [doi]
- Addressing the middleware configuration challenges using model-based techniquesEmre Turkay, Aniruddha S. Gokhale, Balachandran Natarajan. 166-170 [doi]
- Integrating publisher/subscriber services in component middleware for distributed real-time and embedded systemsGeorge T. Edwards, Douglas C. Schmidt, Aniruddha S. Gokhale. 171-176 [doi]
- Mapping component specifications to Enterprise JavaBeans implementationsYi Liu, H. Conrad Cunningham. 177-182 [doi]
- XML middleware to services on STBDevyani Pujari, Niral Jhaveri, Juan Carlos Guzman. 183-184 [doi]
- A P2P intrusion detection system based on mobile agentsGeetha Ramachandran, Delbert Hart. 185-190 [doi]
- A framework for trusted instruction execution via basic block signature verificationMilena Milenkovic, Aleksandar Milenkovic, Emil Jovanov. 191-196 [doi]
- Methods for the prevention, detection and removal of software security vulnerabilitiesJay-Evan J. Tevis, John A. Hamilton Jr.. 197-202 [doi]
- A privacy-protecting proxy signature scheme and its applicationJia-Zhu Dai, Xiao-Hu Yang, Jinxiang Dong. 203-206 [doi]
- Plagiarism detection in software designsBoumediene Belkhouche, Anastasia Nix, Johnette Hassell. 207-211 [doi]
- Security for fixed sensor networksNing Hu, Randy K. Smith, Phillip G. Bradford. 212-213 [doi]
- A simple way to construct NFA with fewer states and transitionsGuangming Xing. 214-218 [doi]
- Algorithms for optimal orientations of a unicyclic graphSuk Jai Seo, Ashok T. Amin. 219-223 [doi]
- Giftwrapping a curve with the convex hullJohn K. Johnstone. 224-227 [doi]
- Deterministic Majority filters applied to stochastic sortingB. John Oommen, Jack R. Zgierski, Doron Nussbaum. 228-233 [doi]
- Anchors: a technique of pre-classification and its effects on Hidden Markov ModelsJeremy Fisher, Alan P. Sprague. 234-239 [doi]
- An algorithm for constructing an even grammar from a language sampleMargaret Ann Francel, David J. John. 240-245 [doi]
- Exploration on the commonality of hierarchical clustering algorithmsYonghui Chen, Alan P. Sprague. 246-247 [doi]
- The development of a Voice System that interacts with a student information databaseYifang Gu, Juan E. Gilbert. 248-252 [doi]
- A comparative study of presence in virtual reality vs. presence in the real worldLynn D. McKinnon, Max M. North. 253-254 [doi]
- Adding polymorphic tuples and lists to the syntax of JavaNattawut Sridranop, Ryan Stansifer. 255-260 [doi]
- Execution characteristics of SPEC CPU2000 benchmarks: Intel C++ vs. Microsoft VC++Swathi Tanjore Gurumani, Aleksandar Milenkovic. 261-266 [doi]
- Performance evaluation of cache replacement policies for the SPEC CPU2000 benchmark suiteHussein Al-Zoubi, Aleksandar Milenkovic, Milena Milenkovic. 267-272 [doi]
- Two parallel implementations for one dimension FFT on symmetric multiprocessorsRami A. AL-Na mneh, W. David Pan, B. Earl Wells. 273-278 [doi]
- Low-level language constructs considered harmful for distributed parallel programmingChia-Chu Chiang. 279-284 [doi]
- A parallel algorithm for Algebraic MultiGridX. Zhao, P. G. Richards, S. J. Zhang. 285-290 [doi]
- Distributed robotic target acquisition using Bluetooth communicationJ. T. McClain, B. J. Wimpey, D. H. Barnhard, Walter D. Potter. 291-296 [doi]
- On the implementation of SwarmLindaAhmed Charles, Ronaldo Menezes, Robert Tolksdorf. 297-298 [doi]
- Role of the resource broker in the GridEnis Afgan. 299-300 [doi]
- A parallel unstructured Chimera grid methodX. Zhao, P. G. Richards, S. J. Zhang. 301-302 [doi]
- Validation of Distributed Real-Time and Embedded System composition in UniFrameShih-Hsi Liu. 303-304 [doi]
- Interactive software architecture design with modeling & simulationYiming Ji, Kai H. Chang, Patrick O. Bobbie. 305-306 [doi]
- Data decoys for confidentiality in a distributed computation: matrix multiplicationTobin Jackson, Delbert Hart. 307-308 [doi]
- A framework for the identification of electronic commerce design elements that enable trust within the small hotel industryR. Todd Stephens. 309-314 [doi]
- Trustworthiness in e-commercePatricia Lanford, Roland Hübscher. 315-319 [doi]
- Using a parallel genetic algorithm to design vibratory bowl feedersAndrea Edwards. 320-325 [doi]
- A model of CPS translation and interpretationRamón Zatarain, Ryan Stansifer. 326-331 [doi]
- A model-driven approach for generating embedded robot navigation control softwareBina Shah, Rachael Dennison, Jeffrey G. Gray. 332-335 [doi]
- GXL: a new graph transformation languageMedha Shukla Sarkar. 336-340 [doi]
- Empirical reasoning about quality of service of component-based distributed systemsChanglin Sun. 341-346 [doi]
- A Mobile Computational model for Internet programmingSarah Monisha Pulimood, Boumediene Belkhouche. 347-352 [doi]
- Model-driven integration of federated event services in real-time component middlewareGan Deng, Aniruddha S. Gokhale, Balachandran Natarajan. 353-356 [doi]
- Designing the claims reuse library: validating classification methods for notification systemsAlain Fabian, David Felton, Melissa Grant, Cyril Montabert, Kevin Pious, Nima Rashidi, Anderson Ray Tarpley III, Nicholas Taylor, Christa M. Chewar, D. Scott McCrickard. 357-362 [doi]
- Case study: lessons learned during a nationwide computer system upgradeMaureen Ann Raley, Letha H. Etzkorn. 363-368 [doi]
- Multi-robot position trackingMarvin Roe, Brian Bourgeois, Patrick McDowell. 369-374 [doi]
- Automated selection of auto crash causesHuanjing Wang, Hui-Chuan Chen, Allen S. Parrish. 375-378 [doi]
- A mobile robot for corridor navigation: a multi-agent approachYuki Ono, Hajime Uchiyama, Walter D. Potter. 379-384 [doi]
- SA_MetaMatch: relevant document discovery through document metadata and indexingHiu S. Yau, J. Scott Hawker. 385-390 [doi]
- Adapting binary fitness functions in Genetic AlgorithmsRonald C. Linton. 391-395 [doi]
- Simulating robot collective behavior using StarLogoAndy Tinkham, Ronaldo Menezes. 396-401 [doi]
- Network flow for outlier detectionYing Liu, Alan P. Sprague, Elliot Lefkowitz. 402-103 [doi]
- Context-free grammar induction using genetic programmingFaizan Javed, Barrett R. Bryant, Matej Crepinsek, Marjan Mernik, Alan P. Sprague. 404-405 [doi]
- Engineering knowledgeShauntrelle D. Davis, Tia B. Walton. 406-407 [doi]
- Knowledge-contribution motivated adaptive neighborhood for multi-agent communitiesWan Huang, David Cordes. 408-409 [doi]
- Developing a language to describe world conflictsKirk Thomas. 410-411 [doi]
- Topic-based clustering of news articlesNajaf Ali Shah, Ehab M. ElBahesh. 412-413 [doi]
- Agent design to pass computer gamesAstrid Glende. 414-415 [doi]
- Digital production arts: coming soon to a college near you!S. Wang, Timothy A. Davis, Robert Geist, James Westall, John L. Kundert-Gibbs. 416-421 [doi]
- Teaching object-oriented simulation with PsimJ simulation packageJosé M. Garrido, Kyungsoo Im. 422-427 [doi]
- Paving the way towards an efficient Learning Management SystemRavi Darbhamulla, Pamela B. Lawhead. 428-433 [doi]
- X-Lab: XML-based laboratory exercises for CS1Rebecca F. Bruce, J. Dean Brock, Kenneth Bogert. 434-435 [doi]
- The Kennesaw Database Courseware (KDC) with an evaluation componentMário Guimarães. 436-439 [doi]
- A virtual machine environment for teaching the development of system softwareJoseph A. Driscoll, Ralph M. Butler, Joelle M. Key. 440-441 [doi]
- JRV: an interactive tool for data mining visualizationDanyu Liu, Alan P. Sprague, Upender Manne. 442-447 [doi]
- Interactive legendsMihail Eduard Tudoreanu, Delbert Hart. 448-453 [doi]
- Efficient edge detection and object segmentation using Gabor filtersYiming Ji, Kai H. Chang, Chi-Cheng Hung. 454-459 [doi]
- Complexity-distortion tradeoffs in variable complexity 2-D DCTZexin Pan, W. David Pan, Aleksandar Milenkovic. 460-465 [doi]
- Motion estimation with integrated motion modelsMahesh Nalasani, W. David Pan, Seong-Moo Yoo. 466-467 [doi]
- Investigating steganographyDorian A. Flowers. 468-469 [doi]