Abstract is missing.
- Toward efficient flow-sensitive induction variable analysis and dependence testing for loop optimizationYixin Shou, Robert A. van Engelen, Johnnie Birch, Kyle A. Gallivan. 1-6 [doi]
- Tuning file system block addressing for performanceHarrison Caudill, Ada Gavrilovska. 7-11 [doi]
- Finding optimal weighted bridges with applicationsOvidiu Daescu, James D. Palmer. 12-17 [doi]
- Hierarchical decomposition algorithm for hardware/software partitioningBrennon Meals. 18-23 [doi]
- The averaged mappings problem: statement, applications, and approximate solutionXavier Hilaire, B. John Oommen. 24-29 [doi]
- A SAT-based solver for Q-ALL SATBen Browning, Anja Remshagen. 30-33 [doi]
- Gene intrusion on a society of Hill-ClimbersLei Chen, Chung-wei Lee, Wen-Chen Hu. 34-39 [doi]
- A parsing algorithm for Korean implemented in PrologSoyoung Kwon. 40-44 [doi]
- A speech recognition and synthesis toolHala ElAarag, Laura Schindler. 45-49 [doi]
- Optimizing octree motion representation for 3D animationJinghua Zhang, Jinsheng Xu. 50-55 [doi]
- HELLAS: a specialized architecture for interactive deformable object modelingShrirang M. Yardi, Benjamin Bishop, Thomas P. Kelliher. 56-61 [doi]
- Chessboard domination on programmable graphics hardwareNathan Cournia. 62-67 [doi]
- R-D optimized compression of 3-D mesh sequences based on principal component analysisJunhee Heu, Jeong-Hyu Yang, Chang-Su Kim, Sang Uk Lee. 68-73 [doi]
- Using hybrid automata to model four stroke engines with variable valve timing in Simulink/StateflowBrian Wesley Williams. 74-79 [doi]
- Templates and automation for temporal query generationHong Liu, David P. Gluch. 80-84 [doi]
- A series of choices variability in the development processJohn M. Hunt, John D. McGregor. 85-90 [doi]
- Metrics for class cohesion and similarity between methodsChalla Bonja, Eyob Kidanmariam. 91-95 [doi]
- Incremental computation of shortest paths in semi-dynamic graphs using software componentsNighat Yasmin. 96-101 [doi]
- Determining a sequence of stable multicast Steiner trees in mobile ad hoc networksNatarajan Meghanathan. 102-106 [doi]
- Density-based multipath secure communication over mobile ad hoc networksLei Chen, Chung-wei Lee, Jyh-haw Yeh. 107-112 [doi]
- Security issues in privacy and key management protocols of IEEE 802.16Sen Xu, Manton M. Matthews, Chin-Tser Huang. 113-118 [doi]
- LARS: a locally aware reputation system for mobile ad hoc networksJiangyi Hu, Mike Burmester. 119-123 [doi]
- Broadcast Updates with Local Look-up Search (BULLS): a new peer-to-peer protocolG. Perera, Kenneth J. Christensen. 124-129 [doi]
- Mostly C, challenges in LEGO® RCX code generationRobert P. Cook. 130-133 [doi]
- An evaluation of negative selection algorithm with constraint-based detectorsHaiyu Hou, Gerry V. Dozier. 134-139 [doi]
- Using genetic algorithms to generate test plans for functionality testingFrancisca Emanuelle Vieira, Francisco Martins, Rafael Silva, Ronaldo Menezes, Márcio Braga. 140-145 [doi]
- Intelligent tutoring system for CS-I and II laboratoryJungsoon P. Yoo, Chrisila C. Pettey, Sung K. Yoo, Judy Hankins, Cen Li, Suk Jai Seo. 146-151 [doi]
- Student perspectives of ePortfolios in computing educationAlbert Dieter Ritzhaupt, Oma Singh. 152-157 [doi]
- Large dataset offers view of math and computer self-efficacy among computer science undergraduatesAntonio M. Lopez Jr., Marguerite S. Giguette, Lisa J. Schulte. 158-163 [doi]
- Beyond objects-first: a project-driven CS2 courseE. Frank Barry, Christopher C. Ellsworth, Barry L. Kurtz, James T. Wilkes. 164-168 [doi]
- Support vector machines for collaborative filteringZhonghang Xia, Yulin Dong, Guangming Xing. 169-174 [doi]
- Bootstrapping methodology for the Session-based Anomaly Notification Detector (SAND)Bruce D. Caulkins, Joohan Lee, Morgan C. Wang. 175-179 [doi]
- Mining frequent itemsets with partial enumerationPeiyi Tang, Markus P. Turkia. 180-185 [doi]
- Modeling student online learning using clusteringCen Li, Jungsoon P. Yoo. 186-191 [doi]
- Introduction to extended common coupling with an application study on LinuxLiguo Yu, Srini Ramaswamy. 192-197 [doi]
- A framework for the effective adoption of software development methodologiesFleming Woo, Romas Mikusauskas, Dean Bartlett, Rob Law. 198-203 [doi]
- Crosscutting score: an indicator metric for aspect orientationSubhajit Datta. 204-208 [doi]
- A relational database model for representation of formal specificationsRobert Leithiser. 209-217 [doi]
- Computer generated hologram speed-up on generic surfacesLuis E. Cuéllar, John M. Tyler, Richard Muffoletto. 218-221 [doi]
- Comprehensive workflow miningAubrey J. Rembert. 222-227 [doi]
- Efficiently unifying parallel simulation techniquesJinsheng Xu, Jinghua Zhang. 228-232 [doi]
- Parallelization of local search for Euclidean Steiner tree problemRashid Bin Muhammad. 233-238 [doi]
- Revisiting a limit on efficient quantum computationTarsem S. Purewal Jr.. 239-243 [doi]
- Morphological NNs with orthonormal basis dendritesAngelos Barmpoutis. 244-248 [doi]
- Quantum computing: a surveySiddhartha Kasivajhula. 249-253 [doi]
- Applying multiresolution methods to medical image enhancementMonica A. Trifas, John M. Tyler, Oleg S. Pianykh. 254-259 [doi]
- Variability of user interaction with multi-platform news feedsChandresh Chhatpar, Manuel A. Pérez-Quiñones. 260-264 [doi]
- An introduction to proper-coupled-domination in graphsSuk Jai Seo, Peter J. Slater. 265-270 [doi]
- Agility measurement index: a metric for the crossroads of software development methodologiesSubhajit Datta. 271-273 [doi]
- Identifying immediate intention during usability evaluationJonathan Howarth. 274-279 [doi]
- Discovering communities in complex networksHemant Balakrishnan, Narsingh Deo. 280-285 [doi]
- Hybrid intelligent systems for network securityJ. Lane Thames, Randal Abler, Ashraf Saad. 286-289 [doi]
- Detecting outliers in interval dataShuxin Li, Robert Lee, Sheau-Dong Lang. 290-295 [doi]
- A machine learning method with hybrid neural networks for spectrum analysisZlatko Zografski, Gordana Bogoeva-Gaceva, Vladimir Petrusevski. 296-299 [doi]
- VTQuest: a voice-based multimodal web-based software system for maps and directionsThomas W. Schneider, Osman Balci. 300-305 [doi]
- A model for the software engineering capstone sequence using the Rational Unified Process®Robert F. Roggio. 306-311 [doi]
- Framework design using function generalization: a binary tree traversal case studyH. Conrad Cunningham, Yi Liu, Pallavi Tadepalli. 312-318 [doi]
- Middleware specialization using aspect oriented programmingDimple Kaul, Aniruddha S. Gokhale. 319-324 [doi]
- Automatic support for testing web-based enterprise applicationsArturo Sanchez, Brandon Vega, Alexander Gonzalez, Gregory Jackson. 325-330 [doi]
- Stationary queue-size distribution for variable complexity sequential decoders with large timeoutKhalid Darabkh, W. David Pan. 331-336 [doi]
- Assessing denial of service vulnerabilities in DOCSISScott Moser, Jim Martin. 337-342 [doi]
- Efficient route establishment and maintenance in wireless sensor networks with mobile base stationsJu Wang, Hongsik Choi, Esther A. Hughes. 343-349 [doi]
- Performance comparison of ::::BQM:::: and normal queue management techniquesXiaoming Li. 350-354 [doi]
- 802.11g wireless range and the Army Shadow TUAVDavid Last. 355-358 [doi]
- Embodied data objects: tangible interfaces to information appliancesManas Tungare, Pardha S. Pyla, Pradyut Bafna, Vladimir Glina, Wenjie Zheng, Xiaoyan Yu, Umut Balli, Steve R. Harrison. 359-364 [doi]
- A conceptual model for agent-based simulation of physical security systemsVolkan Ustun, Levent Yilmaz, Jeffrey S. Smith. 365-370 [doi]
- Intelligent library navigation using location-aware systems: the Newman projectBrian Sciacchitano, Chris Cerwinski, Ivan Brown, Miten Sampat, Jason Chong Lee, D. Scott McCrickard. 371-376 [doi]
- WARD: an exploratory study of an affective sociotechnical framework for addressing medical errorsWilliam Lee, Woodrow W. Winchester III, Tonya L. Smith-Jackson. 377-382 [doi]
- Agent-based simulation study of behavioral anticipation: anticipatory fault management in computer networksAvdhoot Saple, Levent Yilmaz. 383-388 [doi]
- Incorporating Object Relationship Notation (ORN) into SQL: revisitedBryon K. Ehlmann. 389-394 [doi]
- Theoretical properties of two problems of distribution of interrelated dataJonathan M. Graham. 395-398 [doi]
- Specifying and solving Boolean constraint problems in relational databases: a case studyJames J. Lu, M. Jeremy Scoggins. 399-404 [doi]
- VisIOn: an interactive visualization ontologyPhilippa Rhodes, Eileen Kraemer, Bina Reed. 405-410 [doi]
- Automatic quality assessment of Affymetrix GeneChip dataSteffen Heber, Beate Sick. 411-416 [doi]
- Reconstructing networks using co-temporal functionsEdward E. Allen, Anthony Pecorella, Jacquelyn S. Fetrow, David J. John, William Turkett. 417-422 [doi]
- 3D face authentication by mutual coupled 3D and 2D feature extractionT.-H. Lin, W. P. Shih, W. C. Chen, W. Y. Ho. 423-427 [doi]
- An efficient hybrid clustering algorithm for molecular sequences classificationWei-bang Chen. 428-433 [doi]
- Computer security and ethics awareness in university environments: a challenge for management of information systemsMax M. North, Roy George, Sarah M. North. 434-439 [doi]
- Evolution of online financial trading systems: assessing critical end-user requirementsAlexander Y. Yap. 440-445 [doi]
- NASA s standards advisor pilot: search solutions for an intranetNiveditha Thagarapu, Tilak Mulukalapally, Sachin Lad, Randy K. Smith. 446-451 [doi]
- Conceptual modeling of service composition using aggregation and specialization relationshipsRicardo Quintero, Vicente Pelechano. 452-457 [doi]
- Composing aggregate web services in BPELOnyeka Ezenwoye, Seyed Masoud Sadjadi. 458-463 [doi]
- A conceptual modeling approach for the design of web applications based on servicesRicardo Quintero, Victoria Torres, Marta Ruiz, Vicente Pelechano. 464-469 [doi]
- Inductive bases and their application to searches for minimal unary NFAsGeoffrey Smith. 470-475 [doi]
- SHEPPACK: a Fortran 95 package for interpolation using the modified Shepard algorithmManjula A. Iyer, Layne T. Watson, Michael W. Berry. 476-481 [doi]
- Optimal evolutionary reconstructions with a parsimony graphTreena J. Larrew. 482-487 [doi]
- Pipelining of double precision floating point division and square root operationsAnuja Jayraj Thakkar, Abdel Ejnioui. 488-493 [doi]
- Evaluation of a location-linked notes systemManas Tungare, Ingrid Burbey, Manuel A. Pérez-Quiñones. 494-499 [doi]
- Alumni campus tour: capturing the fourth dimension in location based notification systemsSandeep Nair, Anupam Kumar, Miten Sampat, Jason Chong Lee, D. Scott McCrickard. 500-505 [doi]
- An approach for developing real-time distributed systems using an agent architecture description languageCraig Eichelkraut, Letha H. Etzkorn. 506-511 [doi]
- VTAssist: a location-based feedback notification system for the disabledSarav Bhatia, Curtis Dahn, Jason Chong Lee, Miten Sampat, D. Scott McCrickard. 512-517 [doi]
- Real time self-maintenable data warehouseClemente García. 518-524 [doi]
- The determination of synonyms for fuzzy modifiers in a fuzzy database based on user community consensusDebra M. Duke. 525-530 [doi]
- Application layer intrusion detection for SQL injectionFrank S. Rietta. 531-536 [doi]
- Determining the membership values to optimize retrieval in a fuzzy relational databaseShweta Sanghi. 537-542 [doi]
- Type inference and informative error reporting for secure information flowZhenyue Deng, Geoffrey Smith. 543-548 [doi]
- Achieving efficient polynomial multiplication in fermat fields using the fast Fourier transformSelçuk Baktir, Berk Sunar. 549-554 [doi]
- Mobile-driven architecture for managing enterprise security policiesWilliam Claycomb, Dongwan Shin. 555-559 [doi]
- Static analysis of anomalies and security vulnerabilities in executable filesJay-Evan J. Tevis, John A. Hamilton Jr.. 560-565 [doi]
- Application performance prediction in autonomic systemsShobhana Kirtane, Jim Martin. 566-572 [doi]
- Website engineering in the real worldChris Gibson. 573-578 [doi]
- Complete inlining of recursive calls: beyond tail-recursion eliminationPeiyi Tang. 579-584 [doi]
- An algorithm for computing linksCong-Cong Xing. 585-589 [doi]
- Aligning learning objectives with service-learning outcomes in a mobile computing applicationRebecca F. Bruce, Susan Reiser. 590-595 [doi]
- Box English - preparing for CS1James F. Wirth. 596-600 [doi]
- Computer science students difficulties with proofs by induction: an exploratory studyIrene Polycarpou. 601-606 [doi]
- Computer tutoring for programming educationSusan Eitelman. 607-610 [doi]
- Closet buddy: dressing the visually impairedJoseph Rose. 611-615 [doi]
- CPVM: customizable portable virtual machinesRalph Butler, Chrisila C. Pettey, Zach Lowry. 616-619 [doi]
- Vizability: a tool for usability engineering process improvement through the visualization of usability problem dataPardha S. Pyla, Jonathan R. Howarth, Chris Catanzaro, Chris North. 620-625 [doi]
- Spatial datbase feasibility for facial characterization using fuzzy logic queriesJames L. Mastros. 626-631 [doi]
- Determining an optimal membership function based on community consensus in a fuzzy database systemJoanne Cunningham. 632-637 [doi]
- Using visual attention to extract regions of interest in the context of image retrievalOge Marques, Liam M. Mayron, Gustavo B. Borba, Humberto R. Gamba. 638-643 [doi]
- Real time 2-D face detection using color ratios and K-mean clusteringRob Byrd, Ranjani Balaji. 644-648 [doi]
- Edge detection using waveletsEvelyn Brannock, Michael Weeks. 649-654 [doi]
- Some new approaches for preventing software tamperingBin Fu, Golden G. Richard III, Yixin Chen. 655-660 [doi]
- Scanning workstation memory for malicious codes using dedicated coprocessorsSirish A. Kondi, Yoginder S. Dandass. 661-666 [doi]
- Understanding the intruder through attacks on cryptographic protocolsShahabuddin Muhammad, Zeeshan Furqan, Ratan K. Guha. 667-672 [doi]
- Polymorphic type inference for the relational algebra in the functional database programming language neonLajos Nagy, Ryan Stansifer. 673-678 [doi]
- Phoenix-based clone detection using suffix treesRobert Tairas, Jeffrey G. Gray. 679-684 [doi]
- Yaccscript: a platform for intersecting high-level languagesJohn Healey. 685-690 [doi]
- Modern features for systems programming languagesEric L. McCorkle. 691-697 [doi]
- The future of Java:::TM::: game developmentBrian Ingles. 698-701 [doi]
- Using an end-to-end demonstration in an undergraduate grid computing courseMark A. Holliday, Barry Wilkinson, James Ruff. 702-707 [doi]
- Performance evaluation of the reactor pattern using the OMNeT++ simulatorArundhati Kogekar, Aniruddha S. Gokhale. 708-713 [doi]
- RepoMan: a component repository manager for enterprise distributed real-time and embedded systemsStoyan Paunov, Douglas C. Schmidt. 714-419 [doi]
- Poor performance: is it the application or the network?Susan McGill. 720-725 [doi]
- TDX: a high-performance table-driven XML parserWei Zhang, Robert A. van Engelen. 726-731 [doi]
- A network processor implementation for solving the ACK implosion problemDharani Sankar Vijayakumar, S. Vijay Ram. 732-733 [doi]
- A drawback of current anti-virus simulations: the need for background trafficAttila Ondi. 734-735 [doi]
- On merging user-supplied topic ontologies on the semantic webStanislav Ustymenko. 736-737 [doi]
- Design, development and usage of a generic job submission grid serviceEnis Afgan, William T. Jones. 738-739 [doi]
- A system for investigating characteristics that make effective visualizationsBina Reed. 740-741 [doi]
- Extracting knowledge in the internet agePreetha Annamalai. 742-743 [doi]
- Capturing organizational wisdom for effective software developmentDavid Wright. 744-745 [doi]
- Mobility models for vehicular ad hoc network simulationsNiranjan Potnis, Atulya Mahajan. 746-747 [doi]
- Reasoning driven blackboard system for image understandingAlicia Paul. 748-749 [doi]
- Facial feature extraction for face characterizationJeff McDermott. 750-751 [doi]
- Grid-based distributed search structurePallavi Tadepalli. 752-753 [doi]
- Segmentation of color images for image data analysisSanmati S. Kamath. 754-755 [doi]
- Newton s method for steady and unsteady reacting flowsWensheng Shen, Jun Zhang, Fuqian Yang. 756-757 [doi]
- Unconstrained separation of handwriting for form classification applicationsDean Curtis, Evangelos A. Yfantis, Jae Adams, Carryn Bellomo. 758-759 [doi]
- Comparing CART with backpropagation neural networks in vegetation greenness classificationJiang Li. 760-761 [doi]
- Performance analysis of network protocol offload in a simulation environmentJacob Engel, Joseph Meneskie, Taskin Koçak. 762-763 [doi]
- Computation core binding in GTM mapping on reconfigurable computersXuejun Liang. 764-765 [doi]
- Distance- and curvature-constrained shortest paths and an application in mission planningAndré Berger, Nader Razouk, Greg Angelides. 766-767 [doi]
- A program for proving that a given graph is not a unit-distance graph: preliminary reportRobert Hochberg. 768-769 [doi]
- Parameterized objects and inducements to explore functional programmingKarl R. Abrahamson. 770-771 [doi]
- What the disorder pattern toolbox can doKuo-pao Yang, Martha W. Evens, David Trace. 772-773 [doi]
- Controlling the entire path of a virtual cameraRoss Ptacek, John K. Johnstone. 774-775 [doi]
- A nearest neighbor approach to letter recognitionAiyuan Ji, Roy George. 776-777 [doi]
- Tic-Tac-LEGO: an investigation into coordinated robotic controlRuben Vuittonet, Jeffrey G. Gray. 778-779 [doi]
- Developing efficient pipeline tools for animation productionEdward Siomacco, John L. Kundert-Gibbs, Timothy A. Davis. 780-781 [doi]
- Extensions to and optimization of a mobile computational system for internet programmingSarah Monisha Pulimood, Gregory Adkins, Elizabeth Carter, Amanda Micai. 782-783 [doi]
- Energy efficient topology control in wireless sensor networksRashid Bin Muhmmad. 784-785 [doi]
- Software cultivation using the artificial intelligence design frameworkVaradraj Gurupur, Urcun J. Tanik. 786-787 [doi]
- Evaluating web page and web site usabilityChristopher C. Whitehead. 788-789 [doi]
- Applying role based access control and genetic algorithms to insider threat detectionNing Hu, Phillip G. Bradford, Jun Liu. 790-791 [doi]
- On the channel modelling and transmission power control for wireless sensor networksJu Wang, Jeremy Cooper, Hongsik Choi. 792-793 [doi]
- Web sites usability, usability requirements specification & usability evaluationGuoqiang Hu, Kai H. Chang. 794-795 [doi]
- Test-driven specification: paradigm and automationEdward L. Jones. 796-797 [doi]