Abstract is missing.
- Visualization of Network Security Traffic using Hexagonal Self-Organizing MapsChet Langin, Dunren Che, Michael Wainer, Shahram Rahimi. 1-6
- Pandemic Virus Spreading SimulatorAdina Morariu, Honoriu Valean, Camelia Avram. 7-12
- Self-Protection against Attacks in an Autonomic Computing EnvironmentGuangzhi Qu, Osamah A. Rawashdeh, Salim Hariri. 13-18
- A Space-Efficient Approach to Consistency Check of Firewall RulesWei Li 0025. 19-24
- Quality of Security Service in a Virtual Private NetworkYan Bai, Angkul Kongmunvattana, Soujanya Kantubukta. 25-29
- Adaptive Fuzzy Inference for Edge Detection Using Compander Functions and Linear Fitness Function TransformationsGordon K. Lee, Edward Grant. 30-35
- 3D Scans of AS-Built Street Scenes in TaipeiNaai-Jung Shih, Chia-Yu Lee, Shih-Wei Jhan, Yong-Fong Jhao, Guan-Syun Wang. 36-41
- Wavelet Based Regularized Deconvolution for Digital ImagesPradeep Kumar, Devinder Pathania, Sandeep Kumar Singla, Jatinder Singh Tathgir. 42-47
- Job Planning and Simulation in a Digital Factory EnvironmentHelge Hemmer, Thorsten Kisner, Sebastian Meiser, Wolfgang Kühn. 48-53
- Performance Analysis and Parallelization of Simulink ModelsJoshua D. Tyson, Ryan A. Kellar, Johnothan S. Corley, Kenneth G. Ricks, David Jeff Jackson. 54-61
- Speedup Techniques for Simulink Model ExecutionRyan A. Kellar, Joshua D. Tyson, Johnothan S. Corley, Kenneth G. Ricks, David Jeff Jackson. 62-68
- D-RNA: Towards a DDoS Resistant Network Architecture using Social Network AnalysisMohammad Iftekhar Husain, Ramalingam Sridhar. 69-74
- Optimum Simulation of 2-Dimensional Torus NetworksChang-Shyh Peng, Daisy F. Sang. 75-80
- Modeling of Hot Rolling Industrial Process Using Fuzzy LogicAlaa Sheta, E. Öznergiz, M. A. Abdelrahman, Robert Babuska. 81-86
- Modeling An Adaptable Memory ControllerGary Thorpe, Nagi N. Mekhiel. 87-92
- Multi-Level Power Management Policy for Multi-Core ChipsWael Kdouh, Hesham El-Rewini. 93-101
- Fault Tolerance in Parallelizing Three-Dimensional Particle-In-Cell Plasma SimulationAbdelmageed Elsadek Abdelrazek. 102-107
- Business Process Optimization by Workflow AnalysisAhmad H. Shraideh, Hervé G. Camus, Pascal G. M. Yim. 108-113
- Floorplan Optimization for Hierarchical VLSI DesignChia-Pin R. Liu. 114-119
- 2.5GHz Low Power CMOS Cross-Coupled VCO with High Linearity and Wide Tuning RangeLu Wang, Prasanta Ghosh. 120-124
- Design of a Hierarchical Principal Component Analysis System for Field Intrusion DetectionAleksey Y. Ashikhmin, James H. Graham, Ahmed H. Desoky, Benjamin Arazi. 125-132
- FPGA-Based MPEG-4 Video Encoder SOPC Design with Performance Acceleration of Motion Estimation BlockSeemantini Majgaonkar, Omar S. Elkeelany. 133-138
- Using Ponder as a Standard Security Specification Language in Heterogeneous NetworksRaouf Alomainy, Wei Li. 145-150
- A Framework for Structured Search of Distributed Research ResourcesAnthony W. Wallace, Rex E. Gantenbein. 151-156
- Comparison of JSON and XML Data Interchange Formats: A Case StudyNurzhan Nurseitov, Michael Paulson, Randall Reynolds, Clemente Izurieta. 157-162
- Sentiment Analysis of Surveys using both Numeric Ratings and Text CommentsGongzhu Hu. 163-168
- Proposal of Predictive Coding Using Error Convergence-type Neuron Network SystemShunsuke Kobayakawa, Hirokazu Yokoi. 169-174
- Digital PreProcessing of Speech for Feature IdentificationReva Freedman, Adam Scovel, Lichuan Liu. 175-179
- Software Estimating, Flexibility and Principled NegotiationKalman C. Toth. 180-182
- A Model for Learning Words in a Language by Crawling the WebJeffrey J. Thomson, Rex E. Gantenbein. 183-188
- Parallel Quasi-Newton Optimization using Graphics Processing UnitsKreshna Gopal, Liuxia Wang, Steven Washington. 189-194
- Isolation as a Threat Reduction Strategy for Super-SystemsRobert G. Eyer, Ramesh K. Karne, Alexander L. Wijesinha. 195-200
- Mechanically Generating and Executing Test Cases -Preliminary Design and Implementation of a ToolM. M. F. Bari, Narayan C. Debnath, Ilhyun Lee, Haesun K. Lee. 201-206
- Constant Splitting of Instructions Applied to Embedded Systems for Code CompressionM. M. F. Bari, Narayan C. Debnath. 207-212
- Clustering Customer Transactions: A Rough Set Based ApproachArunava Saha, Darsana Das, Dipanjan Karmakar, Dilip Dubey, Anirban Sarkar, Narayan C. Debnath. 213-218
- On Formalizing UML 2.0 Activities: Stream and Exception ParametersSabine Boufenara, Faiza Belala, Narayan C. Debnath. 219-224
- In Silico White Blood Cell: A Synthetic Model of Leukocyte Rolling, Activation, and Adhesion During InflammationJonathan Tang, C. Anthony Hunt. 225-230
- Build a Promoter Motif Database for System Biology ResearchCarlos Cortes, Yi Lu. 231-236
- Computational Methods for Personal HealthcareDonna L. Hudson, Maurice E. Cohen. 237-242
- An Integrated DNA Support System for Crime Investigations: DNA TracersNoor Maizura Mohamad Noor, Razif bin Baital Latif. 243-248
- Double Secrecy: An Enhanced Cryptographic Approach for SCADA System SecurityWaleed H. El-said, James H. Graham. 249-253
- Data Broadcast Scheduling with Multiple ChannelsZiping Liu, Bidyut Gupta. 254-259
- Multi-channel Multiplexed Stand-alone Audio Data Acquisition System: The effect of settling time on acquisition accuracyMohammed Abdallah, Omar S. Elkeelany. 260-165
- Communication Reduction Techniques for Application-Specific Traffic in Mesh NetworksDavid R. Surma. 266-271
- Creating a Virtual Science Center -Virtual DUSEL (vDUSEL)Stephen Krebsbach, Steve Graham, Judy Vondruska, George Hamer. 272-277
- Predicting Likelihood of Undergraduate Students graduating with HonorsJonathan M. Graham, Janice Smith, Cheryl V. Hinds. 278-283
- Visualization Tools for Understanding a Complex Code from a Real ApplicationFernanda Campos, Estban Cortazar, Yadran Eterovic, Leonardo Ramirez, Cristian Tejos, Pablo Irarrazaval. 284-291