Abstract is missing.
- A Flexible Constraint-Based Portal ArchitectureChristopher J. Hogger, Frank Kriwaczek, Mohd S. Ahmad. 1-6
- A Novel System for Publishing Relational Data in XML Based on ER-DTD MethodGuohua Liu, Qi He, Ziyang Chen, Ying Wang. 7-10
- On-Line Rollback in Log-Structured File SystemsRobert Matthews, Phil Kearns. 11-16
- Watermarking Remotely Sensed Images (RSI) (Digital Image or Relational Data?)Stephen Krebsbach, George Hamer, William Perrizo. 17-21
- Image Processing Enhancement over WAP: An Enhancement of Transmitting Image over Mobile Devices Using WAP ArchitectureAhmed H. Salem, Addagarla Kondala Rayudu, Anup Kumar, Adel Said Elmaghraby. 22-27
- Message Hiding in ImagesClayton Crenshaw, Nelson L. Passos. 28-31
- Effects of Compression On Digital Phantom X-Ray ImagesYongshen Ni, Ray Gamero, Hong Liu, John Y. Cheung. 32-35
- A Brief Study of Cooperative Web Caching Protocols in Cellular NetworksAdiseshu K. Gelli, Joseph Nalluru, Eric Freeman, Nelson L. Passos. 36-39
- Fault-tolerant MA Migration Scheme based on Encrypted CheckpointsGu Su Kim, Young Ik Eom. 40-43
- Mobile Agent Based Discovery Scheme in Pure P2P EnvironmentsIn-suk Kim, Moon Jeong Kim, Young Ik Eom. 44-49
- Neural Network Based Anomaly Detection in Computer Networks: A Novel Training ParadigmAhmad R. Sharafat, Mehdi Rasti, Ali Yazdian. 50-53
- Genetic Algorithm to Improve a Solution for a General Assignment ProblemPaul Juell, Amal Perera, Kendall E. Nygard. 54-57
- A Fuzzy Logic Based Multiple Reference Model Adaptive ControlSukumar Kamalasadan, Adel A. Ghandakly, Khalid S. Al-Olimat. 58-61
- OASIS: Text Search Using High-Speed NetworksV. V. Kluev. 62-67
- Performance Benefits of Partitioning in a Web-Caching EnvironmentRichard T. Hurley, Wenying Feng, B. Y. Li. 68-73
- Meaningful UDDI Web Services DescriptionAtul Sajjanhar, Hongen Lu. 74-77
- Web-Based Parallel Computing System for Database Concurrency Control SimulationJingpeng Tang, Victor Shi, Vijayakumar Shanmugasundaram. 78-82
- Recent Advances on Intrusion Detection TechniquesGuangyuan Sun, Huirong Fu. 83-86
- An Efficient Multiplication Architecture using Montgomery Algorithm based on Programmable Cellular AutomataH. Y. Park, Jun-Cheol Jeon, Jai-Boo Oh, Kee-Yon Yoo. 87-90
- A New Authenticated Key Agreement ProtocolKee-Won Kim, Eun-Kyung Ryu, Hyung-Mok Lee, Kee-Young Yoo. 91-94
- A Unified Architecture for the Implementation of Security ProtocolsIbrahim S. Abdullah, Daniel A. Menascé. 95-100
- An Integration of Principal Component Analysis and Self-Organizing Map for Effective Palmprint RetrievalKing Hong Cheung, Adams Wai-Kin Kong, Jane You, David Zhang. 101-104
- On Hierarchical Palmprint Coding with Multi-Features for Personal Identification in Large DatabasesJane You, Adams Wai-Kin Kong, David Zhang, King Hong Cheung. 105-108
- Access Control Via Invertible Multilevel ScramblingWenbin Luo. 109-112
- Fuzzy Rules for Finger Print Verification using Ridge ExtractionGregory Vert, James Arseneau, Sara Nasser. 113-116
- A New Intruder Traceback Mechanism based on System Process StructureHyungwoo Kang, Jaewoo Park, Gunwoo Nam, Sangseo Park, Jinseok Lee. 117-121
- Analysis Tool for Honeypot SystemsTerry Griffin. 122-125
- Design and Implementation of AES (Rijndael) AlgorithmParimal Patel, Chirag Parikh. 126-130
- A Visual Algebra for Detecting Port Attacks on Computer SystemsGregory Vert, B. Yuan, N. Cole. 131-135
- Agent-Aided Executive Project ControlMohammad S. Haqudf, Kendall E. Nygard. 136-138
- An Agent Based Framework for Modeling UAV sNathan Huff, Ahmed Kamel, Kendall E. Nygard. 139-144
- POMDP Planning for High Level UAV Decisions: Search vs. StrikeDoug Schesvold, Jingpeng Tang, Benzir Md Ahmed, Karl Altenburg, Kendall E. Nygard. 145-148
- Agent-based Fault Management in Cellular NetworksBhagyavati. 149-152
- Data Mining Strategies From Network Intrusion Detection as Applied to Identifying High-Risk ContainersNicole Harlow, Thomas Puch, Kamal Dahbur. 153-158
- A Scheme for Content Based Retrieval of Music Data in MIDI FormatS. R. Subramanya, Morshed U. Chowdhury, Thao Pham, Sanjay Shankar. 159-162
- A Genetic Algorithm for Clustering on Very Large Data SetsJim Gasvoda, Qin Ding. 163-167
- Efficient Quantitative Frequent Pattern Mining Using Predicate TreesBaoying Wang, Fei Pan, Yue Cui, William Perrizo. 168-171
- Summarization of Jewish Law Articles in HebrewYaakov HaCohen-Kerner, Eylon Malin, Itschack Chasson. 172-177
- Automatic Text Categorization with Learning LogicHisham Al-Mubaid, Mohammad S. Siddiqui. 178-183
- Partitioning in Distributed and Hierarchical Web-Caching Architectures: A Performance ComparisonRichard T. Hurley, Wenying Feng, B. Y. Li. 184-188
- Interactive Virtual Reality Visualization for a Three-Dimensional Earth s Ionosphere Simulation ProblemSaleh H. Al-Sharaeh, J. Montgomery. 189-192
- Partner Selection Modeling in a Virtual EnterpriseZhi Liu, Mei Lai, Neng Qian. 193-196
- A Simulation Model for Video Traffic Performance via ATM over TCP/IPMorshed U. Chowdhury, Yiqing Tu, Thao Pham. 197-202
- Performance-Based Modeling for Object-Oriented SoftwareAmal Abdel-raouf, Reda A. Ammar, Howard A. Sholl, Tahany A. Fergany. 203-207
- Displacement Monitoring at Building Construction SiteNaai-Jung Shih, Hsin-Hung Chen. 208-210
- Parametric Estimation of Autonomous Threaded Fastenings Operation based on Non-linear Least Square MethodN. I. Giannoccaro, Mongkorn Klingajay. 211-215
- Optimized Implementation of Distributed Real-Time Embedded Systems Mixing Control and Data ProcessingNicolas Pernet, Yves Sorel. 216-220
- Video Segmentation for Transporting Pre-Stored Video across NetworksHuirong Fu, Liren Zhang. 221-224
- The Advantages of Real Time in TORAJeffrey Dobbelaere, Phil Kearns, Jean Mayo. 225-229
- Evolutionary Programming in a Distributed Packet Scheduling ArchitectureMin Song, Sachin Shetty, Weiying Zhu. 230-233
- A Scalable MPLS Multicast Solution for Dense Mode Multicast NetworksMansoor Alam, Min Song, Amit Deshmukh. 234-237
- Analysis of Consequences in a Computer-Assisted Model for Diagnosis and Management of DementiaDonna L. Hudson, Maurice E. Cohen. 238-241
- Modeling Complexity in Dementia DiagnosisMaurice E. Cohen, Donna L. Hudson. 242-245
- A Web-Based Approach for Myofascial Pain Syndrome Monitoring System in the HomeSung Y. Shin, Charlie Y. Shim, Xiaohng Chen, Chang Oan Sung. 246-249
- Task Scheduling in Distributed Data Mining for Medical ApplicationsRex E. Gantenbein, Chang Oan Sung. 250-253
- Design and Performance Analysis of Communication Module for Linux Clustering VOD ServerSung Y. Shin, Chan G. Yoo, Kwan Jong Yoo. 254-257
- Development of a Computational Toolkit for Biomechanical Analysis and Simulation: The Vertebrate AnalyzerK. F. Hulme, F. C. Mendel, K. P. Chugh. 258-263
- Effects of Digital Watermarking On Digital ImagesRay Gamero, Yongshen Ni, Yuan Chen, Hong Liu, John Y. Cheung. 264-267
- An Issue Logic for Superscalar MicroprocessorsFeng-Jiann Shiao, Jong-Jiann Shieh. 268-271
- Direct Alignment Algorithm for High-Speed Floating-Point Adder DesignHaixia Wang, Chengde Han. 272-275
- Semi Greedy Algorithm for Finding Connectivity in Microchip Physical LayoutsClemente Izurieta. 276-281
- Simplifying High-Frequency Microprocessor Design via Timing Constraint SpeculationAsami Tanino, Toshinori Sato. 282-287
- A New Predictive Dynamic Reservation Strategy for Cellular Networks Using Explanation PatternsAhmad Almunayyes. 288-291
- Efficient Proximal Support Vector Machine for Spatial DataFei Pan, Baoying Wang, Dongmei Ren, Xin Hu, William Perrizo. 292-297
- VLSI Implementation of Genetic AlgorithmPratap Ramamurthy, Jai Vasanth. 298-301
- Web Programming Language Evaluation using LSPNarayan C. Debnath, M. Peralta, C. Salgado, Ana Funes, Aristides Dasso, Daniel Riesco, German Montejano, Robert Uzal. 302-305
- Object-Oriented Approach of Bounded Predictable (BP) Task SchedulerHaesun K. Lee, Ilhyun Lee, Narayan C. Debnath. 306-309
- Evaluating Biometric Software Packages using a Practioners MethodologyLuiz H. R. Sucupira, Lívia C. F. Araújo, Miguel Gustavo Lizárraga, Lee Luan Ling. 310-313
- Hardship of Program Utilization and User-Friendly SoftwareMark Burgin, Narayan C. Debnath. 314-317
- An Application to Match Campus Visitors with Student Tour GuidesSarah Davis, Donald R. Schwartz. 318-321
- XMI based Model LinkingStefan Mitterdorfer, Egon Teiniker, Christian Kreiner, Reinhold Weiss, Zsolt Kovács. 322-325
- An Optimal Fuzzy Logic Controller Design for Precision Intelligent Tracking SystemJia Lu. 326
- Survey and Models of Spatio-Temporal DatabasesHatem Fawzi Halaoui. 327
- Embedded Home Gateway Systems in WAP Phone ControlMing-Chen Chung, Chun-Yuan Yu, Chen-Chih Yang, Chen-Ming Lin. 328
- Extending the Beowulf Cluster to the DesktopGeorge Hamer, Daniel Steinwand. 329
- Improvement to CNN QueryGuo-hua Liu, Ying Zhang, Zi-Jun Chen, Zi-Yang Chen. 330
- Quantitative Association Rules Mining Methods with Privacy-PreservingZi-Yang Chen, Zhao-Hong Ma, Ying Wa, Guo-hua Liu. 331
- Integrating optimization into a Scenario of Conflict ManagementAlbrecht M. Fritzsche. 332
- Hidden Challenges on Web Application DesignEric Freeman, Katia Passos, Cerise Wuthrich, Catherine Stringfellow. 333
- An Equation Based Approach to the Implementation of Generalized PDE Solver in CEMToolChoonKi Ahn, Soo Hee Han, Wook Hyun Kwon. 334
- Design of State of the Art Video Tracker for Test Range ApplicationsB. K. Das. 335
- Applying the Perceptron Rule for Extraction of Keywords from AbstractsYaakov HaCohen-Kerner. 336
- Importance of Scientific Visualization Course in CurriculumVijayakumar Shanmugasundaram. 337
- Software Specification of a Web-Based Fitness Tracking ApplicationSteve Arnold, Cathy Osterhout, Chul Yim, Sergiu M. Dascalu. 338
- Towards an Automated Adaptive Content Delivery Training SystemGregory Vert, Aparna Phadnis, Rajasekhar Yakkali, Xin Yu. 339