Abstract is missing.
- A Middleware for Mobile and Ubiquitous Learning Ecosystems Based on a Reconfigurable Plug-and-Play Architecture: Application to MashupsSergio Martín, Manuel Castro, Alex Talevski, Vidyasagar M. Potdar. 1-6 [doi]
- Towards Adaptive Mobile Mashups: Opportunities for Designing Effective Persuasive Technology on the RoadFlora Dilys Salim. 7-11 [doi]
- Mashup Patterns from Service Component TaxonomyMichele Stecca, Massimo Maresca. 12-17 [doi]
- Evaluation of Error Control Mechanisms Based on System Throughput and Video Playable Frame Rate on Wireless ChannelWurong Pan, Xuefen Chi, Lin Guan, Yining Wang, Xin Gang Wang. 18-23 [doi]
- An Analytical Model of k-Ary n-Cube under Spatial Communication LocalityKai Hu, Zhe Wang. 24-29 [doi]
- DTCC: A Distributed Congestion Control Scheme for Connectionless NetworksGirish Gokuldasan, Arobinda Gupta. 30-35 [doi]
- Performance Evaluation of an Optimized Load Allocation Approach for Web Server ClustersYan Yang, Fei Yang, Ailixier Aikebaier, Naixue Xiong, Tomoya Enokido, Makoto Takizawa. 36-41 [doi]
- Applying Bloom Filter Addressing in Metro Ethernet NetworkVinicius Garcia de Oliveira, Marcos Rogério Salvador, Daniel Kenji Takayassu, Vinicius Geraldo Felix, Nelson Luis Saldanha da Fonseca. 42-49 [doi]
- A Selective Minimum Delay Value (SMDV) Algorithm for Packet Contention Resolution in Optical Packet SwitchingAhmed Galib Reza, Tan Saw Chin, F. M. Abbou. 50-54 [doi]
- Development of SCRIS: A Knowledge Based System Tool for Assisting Organizations in Managing Supply Chain RisksPutu Dana Karningsih, Berman Kayis, Sami Kara. 55-60 [doi]
- Enriched Cyberspace through Adaptive Multimedia Utilization for Dependable Remote CollaborationYoshitaka Sakurai, Kinshuk, Kouhei Takada, Rainer Knauf, Setsuo Tsuruta. 61-67 [doi]
- Analytical Temporal Specification Issues for Industrial Control SystemsRachna Dhand, Gareth Lee, Graeme Cole. 68-74 [doi]
- Routing Analysis and Flexibility of ROADMs in All Optical NetworksT. S. Indumathi, T. Srinivas, K. Rajaiah, Velur Rajappa. 75-78 [doi]
- A Workflow Fragmentation Framework for Enterprise Grid Workflow SystemsKwanghoon Kim, Minseok Oh. 79-84 [doi]
- Deadline Aware Virtual Machine Scheduler for Grid and Cloud ComputingOmer Khalid, Ivo Maljevic, Richard Anthony, Miltos Petridis, Kevin Parrott, Markus Schulz. 85-90 [doi]
- Effect of Virtual Techniques in Data Storage AccessMohammad Reza Ahmadi, Davood Maleki. 91-96 [doi]
- Generating Optimum Number of Clusters Using Median Search and Projection AlgorithmsSuresh L, Jay B. Simha, Rajappa Velur. 97-102 [doi]
- A Framework for Tag-Based Research Paper Recommender System: An IR ApproachPijitra Jomsri, Siripun Sanguansintukul, Worasit Choochaiwattana. 103-108 [doi]
- User Interface Development for a Computer-Based User Study: The Universal Model ApproachRathiah Hashim, Siti Z. Z. Abidin. 109-114 [doi]
- NLAR: A New Approach to AQMXunli Fan, Feng Zheng, Lin Guan, Xin Gang Wang. 115-120 [doi]
- Data Filtering Utilizing Window IndexingScott Loper, S. Kami Makki. 121-126 [doi]
- Proposal of Transmission Control Methods with Multihopped Environments in Cognitive Wireless NetworksNoriki Uchida, Kazuo Takahata, Yoshitaka Shibata. 127-132 [doi]
- A Shared-Memory Design for Crosspoint Buffered Switches under Mixed Uni- and Multicast TrafficWen-Fong Wang, Fong-Cheng Lee, Guo-Lung Lu. 133-138 [doi]
- JXTA Security in Mobile Constrained DevicesMarc Domingo-Prieto, Joan Arnedo-Moreno, Jordi Herrera-Joancomartí. 139-144 [doi]
- Distribution of Machine Information Using Blackboard Designed Component for Remote Monitoring of Reconfigurable Manufacturing SystemsVishal Barot, Robert Harrison, Stuart McLeod. 145-151 [doi]
- Isolated Forwarding Strategy in Ethernet NetworksFarhad Faghani, Ghasem Mirjalily. 152-156 [doi]
- Program Learning Using Static Information and Dynamic Program Execution SlicesJun Sawamoto, Eiji Sugino, Norihisa Segawa, Yuji Wada. 157-162 [doi]
- Enhanced Fair Joint Multiple Resource Allocation Method in All-IP NetworksYasunori Osana, Shin-ichi Kuribayashi. 163-168 [doi]
- A Joint Antenna Selection and Power Allocation Algorithm for CoMP SystemsJi Qing, Xiaohui Li, Naian Liu, YongQiang Hei, Guanghui Yu. 169-172 [doi]
- An Evaluation Technique Using Network Voronoi Diagram for Balanced Optical Network DesignMasayuki Minoura, Norihiko Shinomiya, Kazuyuki Tajima, Takuya Miyashita, Motoyoshi Sekiya. 173-176 [doi]
- Storage Access Optimization with Virtual Machine Migration During Execution of Parallel Data Processing on a Virtual Machine PC ClusterShiori Toyoshima, Saneyasu Yamaguchi, Masato Oguchi. 177-182 [doi]
- Implementing and Testing a Semantic-Driven Approach Towards a Better Comprehension Between Service Consumers and ProvidersKaouthar Fakhfakh, Saïd Tazi, Khalil Drira, Tarak Chaari, Mohamed Jmaiel. 183-188 [doi]
- Routing Based on Message AttractionAlcides Calsavara, Luiz A. Paula Lima Jr.. 189-194 [doi]
- Improving Software Dependability Using System-Level Virtualization: A SurveyArash Rezaei, Hadi Salimi, Mohsen Sharifi. 195-199 [doi]
- Adaptive Channel Coding and Modulation Scheme Selection for Achieving High Throughput in Wireless NetworksAtif Sharif, Vidyasagar M. Potdar, Rana Fayyaz Ahmad. 200-207 [doi]
- Information Security Threats Classification PyramidMohammed A. Alhabeeb, Abdullah M. Almuhaideb, Phu Dung Le, Bala Srinivasan. 208-213 [doi]
- Virtual Database Technology for Distributed DatabaseYuji Wada, Yuta Watanabe, Keisuke Syoubu, Jun Sawamoto, Takashi Katoh. 214-219 [doi]
- Requirements for Distributed Event-Based Awareness in P2P Groupware SystemsFatos Xhafa, Alex Poulovassilis. 220-225 [doi]
- Security Verification for Authentication and Key Exchange Protocols, RevisitedHaruki Ota, Shinsaku Kiyomoto, Toshiaki Tanaka. 226-233 [doi]
- Concurrent Error Detection in Shifted Dual Basis Multiplier over GF(2m) Using Cyclic Code ApproachChiou-Yng Lee, Yu-Hsin Chiu, Jung-Hui Chiu. 234-239 [doi]
- Some Thoughts on the Legal Background of the Continuously Increasing Privacy Risk in Information Systems and on How to Deal with ItGerald Quirchmayr, Christopher C. Wills. 240-244 [doi]
- Performance Evaluation of Wireless Sensor Networks for Mobile Sink Considering Consumed Energy MetricTao Yang, Makoto Ikeda, Gjergji Mino, Leonard Barolli, Arjan Durresi, Fatos Xhafa. 245-250 [doi]
- Design and Implementation of an IEEE 802.15.4 Protocol Stack in Embedded Linux KernelLi-Chi Feng, Hsin-Yang Chen, Tsung-Hsien Li, Jr-Jung Chiou, Chung-Chiu Shen. 251-256 [doi]
- Evaluating Product Line Architecture for Grid Computing Middleware Systems: Uba ExperienceDavi Junio Silva de Oliveira, Nelson Souto Rosa. 257-262 [doi]
- Ubiquitous Public Transportation Route Guide for a Developing CountryErwin Adi, Sri Ayu Ningsih. 263-268 [doi]
- Development of Hi-Speed X.509 Certification Path Validation SystemTakahiro Fujishiro, Akane Sato, Yoko Kumagai, Tadashi Kaji, Kenichi Okada. 269-274 [doi]
- Practical Threshold One-Time Proxy Signature SchemeGuoyan Zhang. 275-279 [doi]
- Supporting Home Security System in OSGi PlatformMin-Xiou Chen, Yung-Cheng Chuang. 280-285 [doi]
- SMART CAMP: Environmental Sustainability Through Intelligent Automation TechnologiesMarkus M. Kohn, Elizabeth Chang, Achim Karduck, Alex Talevski. 286-292 [doi]
- Effects of Diffracted Waves for Perfectly Conducting Wedges in Propagation Path of Wireless CommunicationJiro Iwashige, Leonard Barolli. 293-298 [doi]
- Multi-set Architecture for Multi-applications Running on Wireless Sensor NetworksAmjed Majeed, Tanveer A. Zia. 299-304 [doi]
- Requirement of Handover Modeling in the Downlink 3GPP Long Term Evolution SystemCheng-Chung Lin, Kumbesan Sandrasegaran, Huda Adibah Mohd Ramli, Minjie Xue. 305-310 [doi]
- SP2MS: A MANet-Based P2P ServiceMarcelo H. Vithoft, Altair Olivo Santin, Cinthia O. Freitas, Heverson Borba Ribeiro. 311-316 [doi]
- A Graph Weighting Method for Reducing Consensus Time in Random Geographical NetworksMahdi Jalili. 317-322 [doi]
- Street Broadcast with Smart Relay for Emergency Messages in VANETChing-Yi Yang, Shou-Chih Lo. 323-328 [doi]
- Cross-Layer Subchannel Assignment with Multicast over WiMAX NetworksChien-Yu Wu, Hann-Jang Ho, Sing-Ling Lee. 329-334 [doi]
- An Adaptive n-Resolution Anti-Collision Algorithm for RFID Tag IdentificationKuo-Hui Yeh, N. W. Lo, Yingjiu Li, Enrico Winata. 335-338 [doi]
- On the Impact of Wi-Fi Multmedia Power Save Mode on the VoIP Capacity of WLANsKwan-Wu Chin. 339-344 [doi]
- Design and Construction of a Prototype Secure Wireless Mesh Network TestbedDonglai Sun, Yue Wu, Tian Wu, Yang Liu, Ning Liu, Junhua Tang. 345-350 [doi]
- Trust Formalization in Mobile Ad-Hoc NetworksRaihana Ferdous, Vallipuram Muthukkumarasamy, Abdul Sattar. 351-356 [doi]
- Secure Mobile IP Communication in Residential NetworksRoja Kiran Basukala, Kyu Jin Park, Dong-You Choi, Seung Jo Han. 357-362 [doi]
- Efficient Mobile IP Registration in Certificateless SignatureManjun Zhang, Changxing Pei, Lanjun Dang. 363-366 [doi]
- Service Selection Based on Fuzzy TOPSIS MethodChi-Chun Lo, Ding-Yuan Cheng, Chen-Fang Tsai, Kuo-Ming Chao. 367-372 [doi]
- A Semantic-Based Web Service Registry Filtering MechanismThair Khdour, Maria Fasli. 373-378 [doi]
- How do Goals Drive the Engineering of Capacity-Driven Web Services?Zakaria Maamar, Samir Tata, Djamal Benslimane, Philippe Thiran. 379-386 [doi]
- Web Service Provisioning to Nomadic Users Using a Light Weight Multi Agent SystemAdeel Shajjar, Hafiz Farooq Ahmad. 387-394 [doi]
- Pros and Cons of Utilizing Mobile Navigation Systems in Pedestrian Way FindingKaori Kobayashi, Ryong Lee, Kazutoshi Sumiya. 395-400 [doi]
- Effectively Generating and Delivering Personalized Product Information: Adopting the Web 2.0 ApproachShuchih Ernest Chang, Chia-Wei Wang. 401-406 [doi]
- A Web-Feed Based Service for Enhancing Asynchronous Learning on Personal Computers and Mobile DevicesShuchih Ernest Chang, Ching-Huei Tung. 407-412 [doi]
- An Adaptive Content Sharing Protocol for P2P Mobile Social NetworksBasit Qureshi, Geyong Min, Demetres D. Kouvatsos, Mohammad Ilyas. 413-418 [doi]
- Securing Queries to Outsourced XML DatabasesBrent Kimpton, Eric Pardede. 419-424 [doi]
- iAuth: HTTP Authentication Framework Integrated into HTML FormsTakeru Inoue, Yohei Katayama, Hiroshi Sato, Noriyuki Takahashi. 425-430 [doi]
- Scoring Web-Based Vulnerability Impact Using Property-Based Vulnerability ModelHa-Thanh Le, Deepak Subramanian, Wen-Jing Hsu, Peter Kok Keong Loh. 431-436 [doi]
- Self-Proxy Mobile Signature: A New Client-Based Mobile Signature ModelMohammad Hasan Samadani, Mehdi Shajari, Mohammad Mehdi Ahaniha. 437-442 [doi]
- Query Visualization for Query Trimming in Semantic CachingS. Kami Makki, Matthew Rockey. 443-448 [doi]
- Dynamic Data Allocation Scheme for Multi-server Web-Based MORPG SystemMasaki Kohana, Shusuke Okamoto, Masaru Kamada, Tatsuhiro Yonekura. 449-454 [doi]
- Managing Schema Evolution in Hybrid XML-Relational Database SystemsAbdullah Baqasah, Eric Pardede. 455-460 [doi]
- Managing the Dynamics of E/mCommerce with a Hierarchical Overlapping Business-Value-FrameworkAndreas Rusnjak, Marwane El Kharbili, Hristomir Hristov, Andreas Speck. 461-466 [doi]
- Detection of Unusually Crowded Places through Micro-Blogging SitesTatsuya Fujisaka, Ryong Lee, Kazutoshi Sumiya. 467-472 [doi]
- Kernel Mechanisms for Supporting Differentiated Services and Content-Aware Request Distribution in Web Clusters Providing Multiple ServicesChun-Hung Wu, Mei-Ling Chiang, Tsung-Lin Lu. 473-478 [doi]
- Density Control-Based Algorithms for Dynamic Maintenance in Sensor Networks with Limited MobilityWei-Jhih Lin, Kuen-Ding Lin, K. Robert Lai. 479-484 [doi]
- Enhanced Performance of Packet Transmission over VoIP NetworkKashif Nisar, Abas Md Said, Halabi Hasbullah. 485-490 [doi]
- Performance Evaluation on Common Radio Resource Management AlgorithmsLeijia Wu, Abdallah E. Al Sabbagh, Kumbesan Sandrasegaran, Maged Elkashlan, Cheng-Chung Lin. 491-495 [doi]
- Implementation and Evaluation of Emulator for Testing Service Programs in MANETDaisuke Kasamatsu, Norihiko Shinomiya. 496-501 [doi]
- Service Migration Scenarios for Embedded NetworksStephan Sommer, Andreas Scholz, Irina Gaponova, Alois Knoll, Alfons Kemper, Christian Buckl, Gerd Kainz, Jörg Heuer, Anton Schmitt. 502-507 [doi]
- Efficient and Flexible XML-Based Data-Exchange in Microcontroller-Based Sensor Actor NetworksSebastian Kabisch, Daniel Peintner, Jörg Heuer, Harald Kosch. 508-513 [doi]
- Encoding and Compression for the Devices Profile for Web ServicesGuido Moritz, Dirk Timmermann, Regina Stoll, Frank Golatowski. 514-519 [doi]
- An Evaluation of the Performance of DPWS on Embedded Devices in a Body Area NetworkRobert Hilbrich. 520-525 [doi]
- Lightweight Policy-Based Management of Quality-Assured, Device-Based Service SystemsOliver Dohndorf, Jan Krüger, Heiko Krumm, Christoph Fiehe, Anna Litvina, Ingo Lück, Franz-Josef Stewing. 526-531 [doi]
- Towards a Platform for User-Generated Mobile ServicesJürgen Tacken, Stephan Flake, Frank Golatowski, Steffen Prüter, Carsten Rust, Alexandra Chapko, Andreas Emrich. 532-538 [doi]
- SAGE: An Approach to Evaluate the Impact of SOA Governance PoliciesAmit Sangroya, Kirti Garg, Vasudeva Varma. 539-544 [doi]
- SOA Interoperability for Large-Scale Pervasive EnvironmentsRaphael Zender, Ulrike Lucke, Djamshid Tavangarian. 545-550 [doi]
- A Comparative Study into Distributed Load Balancing Algorithms for Cloud ComputingMartin Randles, David Lamb, A. Taleb-Bendiab. 551-556 [doi]
- A Secure Communication Protocol for EPCglobal Class 1 Generation 2 RFID SystemsN. W. Lo, Kuo-Hui Yeh. 562-566 [doi]
- The Performance Analysis Using Multiple Beams for RFID Warehouse Management SystemTongliang Zhang, Feng Wei, Hui Tang, Jianming Cui, Dan Han. 567-570 [doi]
- Algorithm Based on One s Complement for Fast Scalar Multiplication in ECC for Wireless Sensor NetworkPritam Gajkumar Shah, Xu Huang, Dharmendra Sharma. 571-576 [doi]
- Torpid Mode: Hybrid of Sleep and Idle Mode as Power Saving Mechanism for IEEE 802.16jAshish Kumar Singh, Vidyasagar M. Potdar. 577-582 [doi]
- Priority Enabled Transport Layer Protocol for Wireless Sensor NetworkAtif Sharif, Vidyasagar M. Potdar, A. J. D. Rathnayaka. 583-588 [doi]
- Analytical Study of Implementation Issues of Elliptical Curve Cryptography for Wireless Sensor networksPritam Gajkumar Shah, Xu Huang, Dharmendra Sharma. 589-592 [doi]
- Developing Distributed Reasoning-Based Applications for the Semantic WebDimitrios A. Koutsomitropoulos, Georgia D. Solomou, Tzanetos Pomonis, Panagiotis Aggelopoulos, Theodore S. Papatheodorou. 593-598 [doi]
- A New Over-Sampling Method Based on Cluster EnsemblesSi Chen, Gongde Guo, Lifei Chen. 599-604 [doi]
- Eye-like Algorithm to produce voice web pagesAhmad Hammoud, Daniel Bourget. 605-608 [doi]
- Image Extraction from Online Text Streams: A Straightforward Template Independent Approach without TrainingGeorge Adam, Christos Bouras, Vassilis Poulopoulos. 609-614 [doi]
- Multimedia Data Analysis on a Massively Distributed Parallelization Network of Anonymous Web ClientsJeremy K. Hall, Shuichi Kurabayashi, Yasushi Kiyoki. 615-620 [doi]
- CASIT: Content Based Identification of Textual Information in a Large DatabaseLarbi Guezouli, Hassane Essafi. 621-625 [doi]
- Web Tracking Site Detection Based on Temporal Link AnalysisAkira Yamada, Hara Masanori, Yutaka Miyake. 626-631 [doi]
- User Studies in Web Information Retrieval: User-Centered Measures in Web IR EvaluationAnwar Alhenshiri, Jack Duffy. 632-637 [doi]
- An MIU [Most Influential Users]-Based Model for Recommender SystemsIshant Arora, V. K. Panchal. 638-643 [doi]
- Identifying Key Users for Targeted Marketing by Mining Online Social NetworkYu Zhang, Zhaoqing Wang, Chaolun Xia. 644-649 [doi]
- A Function Alternation Algorithm for Wireless Sensor NetworksDaiki Shitara, Toshiaki Miyazaki, Hidenori Igari. 650-655 [doi]
- A Collision Avoidance Multi-channel MAC Protocol with Physical Carrier Sensing for Mobile Ad Hoc NetworksKuei-Ping Shih, Yen-Da Chen, Shu-Sheng Liu. 656-661 [doi]
- Self-Organizing Data Collection in Wireless Sensor NetworksPeter Janacik, Emi Mathews, Dalimir Orfanus. 662-667 [doi]
- A Hierarchy Energy Driven Architecture for Wireless Sensor NetworksNajmeh Kamyabpour, Doan B. Hoang. 668-673 [doi]
- A New Quorum-Based Power Saving Protocol to Maintain QoS for MANETs with Burst TrafficsHossein Memarzadeh, Mehdi Dehghan, Sam Jabbehdari. 674-679 [doi]
- Tree-Based Clustering(TBC) for Energy Efficient Wireless Sensor NetworksKyung Tae Kim, Chang Hoon Lyu, Sung Soo Moon, Hee Yong Youn. 680-685 [doi]
- T-SNIPER: Trust-Aware Sensor Network Information Protocol for Efficient RoutingSourendra Nath Sinha, Zenon Chaczko. 686-691 [doi]
- Optimizing Duty-Cycle for Delay and Energy Bound WSN ApplicationsPardeep Kumar, Mesut Günes, Qasim Mushtaq, Jochen H. Schiller. 692-697 [doi]
- SAGe: Sensor Advanced Gateway for Integrating Wireless Sensor Networks and InternetAntonio Vicente Lourenco Damaso, Jeisa Pereira de Oliveira Domingues, Nelson Souto Rosa. 698-703 [doi]
- Tsunami Early Alert and Evacuation Support System for Fishery Workers by Mobile PhonesHidenori Torii, Jun Sawamoto, Norihisa Segawa, Eiji Sugino, Yukinori Nomura. 704-709 [doi]
- Performance Evaluation of Disaster Information System Based on P2PnetworkWei Kang, Yoshitaka Shibata. 710-715 [doi]
- Improvement of the Survivor Information System for UniversityHiroaki Yuze, Naoyoshi Suzuki. 716-720 [doi]
- Self Power Supplied Wireless Disaster Information NetworkToshihiro Suzuki, Yoshitaka Shibata. 721-726 [doi]
- Construction of Wireless Network for Information Communication for a Disaster-Affected IslandMisako Urakami, Yuya Okada, Yasuyuki Niwa, Hisaya Motogi, Hiroshi Matsuno. 727-732 [doi]
- Dynamic Network Configuration Method Based Cognitive Radio LANs for Disaster Information SystemGoshi Sato, Noriki Uchida, Kazuo Takahata, Yoshitaka Shibata. 733-738 [doi]
- Disaster Communication Method Using Electromagnetic Wave Leaking from Wireless LAN System to OutdoorsKazuo Takahata, Takashi Miura, Noriki Uchida, Yoshitaka Shibata. 739-744 [doi]
- Mnesic Evocation: An Isochron-Based AnalysisHedi Ben Amor, Jacques Demongeot, Nicolas Glade. 745-750 [doi]
- Demographic and Spatial Factors as Causes of an Epidemic Spread, the Copule Approach: Application to the Retro-prediction of the Black Death Epidemy of 1346Jean Gaudart, Mohamad Ghassani, Julie Mintsa, Jules Waku, Mustapha Rachdi, Ogobara K. Doumbo, Jacques Demongeot. 751-758 [doi]
- Behavioral Telemonitoring of the Elderly at Home: Detection of Nycthemeral Rhythms Drifts from Location DataCeline Franco, Jacques Demongeot, Christophe Villemazet, Nicolas Vuillerme. 759-766 [doi]
- Evolution of the Genetic Regulatory Networks: The Example of the Cell Cycle Control NetworkFlavien Caraguel, Muhammad Tayyab, Françoise Giroud, Jacques Demongeot. 767-774 [doi]
- Methodological Proposal to Estimate a Tailored to the Problem Specificity Mathematical Transformation: Use of Computer Intelligence to Optimize Algorithm Complexity and Application to Auditory Brainstem Responses ModelingAntonio Glaria, Carla Taramasco, Jacques Demongeot. 775-781 [doi]
- On the Number of Attractors of Positive and Negative Boolean Automata CircuitsJacques Demongeot, Mathilde Noual, Sylvain Sené. 782-789 [doi]
- Feature Selection for Medical Diagnosis Using Fuzzy Artmap Classification and Intersection ConflictMourad Benkaci, Bruno Jammes, Andrei Doncescu. 790-795 [doi]
- Main Pathway Discovery in Metabolic PathwaysKatsumi Inoue, Andrei Doncescu, Gabriel Synaeve, Nabil Kabbaj. 796-801 [doi]
- Global Strategy of Active Machine Learning for Complex Systems: Embryogenesis Application on Cell Division DetectionEmmanuel Faure, Carla Taramasco, Jacques Demongeot, Louise Duloquin, Benoit Lombardot, Nadine Peyriéras, Paul Bourgine. 802-809 [doi]
- Multipath Transmission with Forward Error Correction Mechanism for Delay-Sensitive Video CommunicationsMing-Fong Tsai, Naveen K. Chilamkurti, Ce-Kuen Shieh. 810-813 [doi]
- Global Top-k Aggregate Queries Based on X-tuple in Uncertain DatabaseDexi Liu, Changxuan Wan, Naixue Xiong, Jong Hyuk Park, Sang-Soo Yeo. 814-821 [doi]
- An Authentication and Authorization Protocol Using Ticket in Pervasive EnvironmentJong Sik Moon, Im-Yeong Lee, Kang Bin Yim, Sang-Gu Byeon. 822-826 [doi]
- Quality Metrics for Software Process Certification Based on K-modelSun-Myung Hwang. 827-830 [doi]
- Towards a Unified Trust Model in Pervasive SystemsHamed Khiabani, Zailani Mohamed Sidek, Jamalul-lail Ab Manan. 831-835 [doi]
- Improved Gait Recognition Performance Using Cycle MatchingDavrondzhon Gafurov, Einar Snekkenes, Patrick Bours. 836-841 [doi]
- A Context Conflict Resolution with Optimized MediationYifei Wang, Yao Shen, Minyi Guo, Daqiang Zhang. 842-847 [doi]
- An Instructional Strategy Selection Model Based on Agent and Ontology for an Intelligent Tutoring SystemJaesoo Kim, Y. H. Shinn. 848-853 [doi]
- HiTrust: A Hybrid Tree Based Trust Negotiation ServiceJianxin Li, Bo Li, Linlin Meng, Dazhi Sun. 854-859 [doi]
- Analysis of Anonymity in P2P Anonymous Communication SystemsJia Zhang, Hai-Xin Duan, Wu Liu, Jianping Wu. 860-865 [doi]
- Body Area Networks for Movement Analysis in Physiotherapy TreatmentsKashif Kifayat, Paul Fergus, Simon Cooper, Madjid Merabti. 866-872 [doi]
- A Novel Geographic Routing Strategy over VANETYan-Bo Wang, Tin Yu Wu, Wei-Tsong Lee, Chih-Heng Ke. 873-879 [doi]
- Peer-to-Peer Overlay Gateway Services for Home Automation and ManagementArshad Muhammad, Paul Fergus, Madjid Merabti, Bob Askwith. 880-886 [doi]
- A Proposal for Method to Manage License Based on LogAkihiro Tomono, Minoru Uehara, Yuji Shimada. 887-892 [doi]
- Implementation of Alarm Correlation System for Hybrid Networks Based upon the perfSONAR FrameworkJen-Wei Hu, Hui-Min Chen, Te-Lung Liu, Hui-Min Tseng, Daniel Lin, Chu-Sing Yang, C. Eugene Yeh. 893-898 [doi]
- Improvement and its Evaluation of Worker s Motion Monitor System in Automobile Assembly FactoryNobuyoshi Sato, Toshihiro Takahashi, Akira Tajima, Shouichi Odashima, Jun Suzuki, Taiji Ishikawa, Yoshitoshi Murata. 899-904 [doi]
- Storage Access Optimization with Virtual Machine Migration and Basic Performance Analysis of Amazon EC2Shiori Toyoshima, Saneyasu Yamaguchi, Masato Oguchi. 905-910 [doi]
- SLA-Based Online Charging Model in Mobile EnvironmentShengqiong Wang. 911-914 [doi]
- Performance Analysis of Two Packet Scheduling Algorithms in Downlink 3GPP LTE SystemMinjie Xue, Kumbesan Sandrasegaran, Huda Adibah Mohd Ramli, Cheng-Chung Lin. 915-919 [doi]
- Android, Java ME and Windows Mobile Interplay: The Case of a Context-Aware Meeting RoomTor-Morten Grønli, Jarle Hansen, Gheorghita Ghinea. 920-925 [doi]
- A Seamless Playback Mechanism for Mobile Multicast Streaming Video in IEEE 802.11-Based Wireless Mesh NetworksGuan-Hsiung Liaw, Chien-Fu Lee, Jun-Lin Liu. 926-931 [doi]
- EDQD: An Energy-Distance Aware Query-Based Data Aggregation Technique for Wireless Sensor NetworksEhsan Ahvar. 932-937 [doi]
- Incorporating Imprecise Computations in Scheduling of Aggregated Data within Wireless Sensor NetworksSami J. Habib, Paulvanna Nayaki Marimuthu. 938-943 [doi]
- A Top-k Query Method by Estimating Score Distribution in Mobile Ad Hoc NetworksYuya Sasaki, Ryo Hagihara, Takahiro Hara, Masako Shinohara, Shojiro Nishio. 944-949 [doi]
- A P2P Network Construction Method Based on Cycle of Sensing in Ubiquitous Sensor EnvironmentYoshihiro Kosaka, Akimitsu Kanzaki, Takahiro Hara, Shojiro Nishio. 950-955 [doi]
- A Focus Control Method Based on City Blocks for the Focus+Glue+Context MapDaisuke Yamamoto, Kohei Hukuhara, Naohisa Takahashi. 956-961 [doi]
- mTracker: A Mobile Tracking Application for Pervasive EnvironmentLuis Carlos Moreno Varandas, Binod Vaidya, Joel José Puga Coelho Rodrigues. 962-967 [doi]
- A Framework of Better Deployment for WLAN Access Point Using Virtualization TechniqueTsuyoshi Hamaguchi, Takuya Komata, Takahiro Nagai, Hiroshi Shigeno. 968-973 [doi]
- The Use of Public Health Grid Technology in the United States Centers for Disease Control and Prevention H1N1 Pandemic ResponseTerry Boyd, Thomas Savel, Gautam Kesarinath, Brian Lee, John Stinn. 974-978 [doi]
- Data Security and Information Privacy for PDA Accessible Clinical-Log for Medical Education in Problem-Based Learning (PBL) ApproachRattiporn Luanrattana, Khin Than Win, John Fulcher. 979-984 [doi]
- Intelligent Agents for Fault Tolerance: From Multi-agent Simulation to Cluster-Based ImplementationBlesson Varghese, Gerard T. McKee, Vassil Alexandrov. 985-990 [doi]
- Detecting Suspicious Motion with Nonimaging SensorsNeil C. Rowe, Ahren A. Reed, Jose J. Flores. 991-996 [doi]
- A Feasibility of Incorporating PDAs into Problem-Based Learning Approach to Medical Education: An OverviewRattiporn Luanrattana, Khin Than Win, John Fulcher. 997-1004 [doi]
- Energy Saving of Air Condition Using Fuzzy Control System over Zigbee Temperature SensorTzu-Ming Wang, Po-Chun Lin, Hung-Lin Chan, Jen-Chi Liao, Tian-Wen Sun, Tin Yu Wu. 1005-1010 [doi]
- A Wheel Graph Structured Associative Memory for Single-Cycle Pattern Recognition within P2P NetworksAmiza Amir, Raja Azlina Raja Mahmood, Asad I. Khan. 1011-1016 [doi]
- Choosing Text Description Language Features for Training and Testing Adaptive Resonance Theory: A Case Study for Botanical ClassificationWen-Sen Lee. 1017-1022 [doi]
- Is the Strategic Role of Large-Scale Information Systems an Essential Part of Quantitative Evaluation Process?Ricardo Santa, W. K. Daniel Pun. 1023-1028 [doi]
- HPC Benchmarks on Amazon EC2Sayaka Akioka, Yoichi Muraoka. 1029-1034 [doi]
- Performance Evaluation of TPC-H Queries on MySQL ClusterSudsanguan Ngamsuriyaroj, Rangsan Pornpattana. 1035-1040 [doi]
- A Framework for Performing Statistical Testing of Distributed SystemsMichael Horie, Stephen W. Neville, Christopher Mueller, Fiona Warman. 1041-1046 [doi]
- Contributions of Sensor Networks to Improve Gaming ExperienceOrlando R. E. Pereira, Joel J. P. C. Rodrigues, Abel J. P. Gomes. 1047-1052 [doi]
- Testing Cross-Platform Streaming of Video Games over Wired and Wireless LANsAudrius Jurgelionis, Francesco Bellotti, Alessandro De Gloria, Jukka-Pekka Laulajainen, Philipp Fechteler, Peter Eisert, Haggai David. 1053-1058 [doi]
- Database and State Replication in Multiplayer Online GamesPaula Prata, Etelvina Pinho, Eduardo Aires. 1059-1064 [doi]
- IPTV Service with Automatic Channels PersonalizationJoão Rodrigues, Paulo Salvador, António Nogueira, Joel J. P. C. Rodrigues. 1065-1070 [doi]
- GEPETO: A GEoPrivacy-Enhancing TOolkitSébastien Gambs, Marc-Olivier Killijian, Miguel Nunez del Prado Cortez. 1071-1076 [doi]
- A New Trust Chain ModelJohnson I. Agbinya, Denise Umuhoza. 1077-1084 [doi]
- Towards a Pervasive Formal Privacy LanguageAli Dehghantanha, Nur Izura Udzir, Ramlan Mahmod. 1085-1091 [doi]
- Implementing Trust-to-Trust with Customer Edge SwitchingRaimo Kantola. 1092-1099 [doi]
- Privacy Preservation Through Process ViewsAmirreza Tahamtan, Johann Eder. 1100-1107 [doi]
- Subjective and Objective Types of Trustworthiness in Peer-to-Peer(P2P) Overlay NetworksSoichi Sawamura, Ailixier Aikebaier, Tomoya Enokido, Valbona Barolli, Makoto Takizawa. 1108-1113 [doi]
- A High-Level Semiotic Trust Agent Scoring Model for Collaborative Virtual OrgansationsTimothy Stewart French, Nik Bessis, Carsten Maple. 1114-1120 [doi]
- Dynamic Role-Based Access Control with Trust-Satisfaction and Reputation for Multi-agent SystemJae Wook Woo, Myung Jin Hwang, Chun Gyeong Lee, Hee Yong Youn. 1121-1126 [doi]