Abstract is missing.
- Internet-based system for remote monitoring of manufacturing operationsY. Z. Wang, C. Sahay, D. Zhu. 1-4
- Analysis and design of web-based information systems with UMLJyhjong Lin, Yalei Chu, Huammi Tsao. 5-8
- The technology and application of FEDI on the internetShin-Jer Yang, William Chung-Kung Yen. 9-14
- Rule-based image convolution for edge enhancementXiaolin Dai, Carl G. Looney. 15-17
- Detecting objects in digital imagesRami Qahwaji, Roger Green. 18-21
- People tracking algorithm using position correlation in discrete wavelet transformChing-Tang Hsieh, Feng-Jen Kuo. 22-24
- A new method of image interpolationBen Carlson, Carl Looney. 25-28
- Programming patterns and structural reductionChester T. Trahan. 29-34
- Application of a heuristic search to the deadlock avoidance algorithm which achieves the high concurrencyHoon Oh. 35-39
- Execution semantics to integrate control flow and data flowBertrand Ibrahim, Honitriniela Randriamparany. 40-43
- Seamless integration of control flow and data flowHonitriniela Randriamparany, Bertrand Ibrahim. 44-47
- Class assertions - an emerging factor in software engineeringWilliam Mitchell. 48-52
- A model to use software agents during software life cycleThomas Philip, Ravi Konda. 53-56
- Characteristics of object-oriented rearchitecture evaluation of methodologiesLeah Dawn Baker Cross, Mansour Zand. 57-60
- Topological algorithmsM. Burgin. 61-64
- A coordination-based cooperation environment for mobile agentsFang-Chang Lin, Chien-Nan Kuo, Jyh-Fu Hwang. 65-68
- A distributed fault-tolerant asynchronous algorithm for performing N tasksGehan Weerasinghe, Lester Lipsky. 69-73
- An efficient checkpoint scheme based on memory profile and time series analysisJiman Hong, Sangsu Kim, Juwon Park, Taesoon Park, Heon Young Yeom, Yookun Cho. 74-77
- Statistical analysis of security violations in computer softwareShivakant Mishra, Shengxiang Gui. 78-81
- Efficient complexity reduction approaches for hierarchical performance modelsFatouh Ghareb, Ehab Y. Abdel Maksoud, Tahany A. Fergany, Reda A. Ammar. 82-87
- Evaluating software s power consumptionH. Arafat Ali, Tahany A. Fergany, Reda A. Ammar. 88-93
- Object-oriented image database modelWilliam I. Grosky, Peter L. Stanchev. 94-97
- Disconnection tolerance in soft real-time mobile databasesLaurent Amanton, Bruno Sadeg, Samia Saad-Bouzefrane. 98-101
- An approach to schema integration between object-oriented databasesChing-Ming Chao. 102-107
- Database cost-benefit analysis: The case of quality control for a computer manufacturerG. K. Webb. 108-112
- A scheme design expert system of diesShijun Qiu, Zhiyong Jia, Shuang Song, Shankaran Sitarama, Jialong Wu. 113-116
- A tool set for computer implementation of cutting stock algorithmsEhab Abdelhafiz, Adel Said Elmaghraby, Mohamed F. Hassan. 117-120
- An improved autoassociative network for controlling autonomous robotsCharles Hand. 121-124
- A shared-way set associative architecture for on-chip cachesJosé Luis Hamkalo, Andrés Djordjalian, Bruno Cernuschi-Frías. 125-128
- Data collection with vehicle-bus interfaceDavid C. Pheanis, Jeffrey A. Tenney. 129-132
- A proposal for a new data model and its implications on I/O architectureGeorge G. Gorbatenko. 133-139
- Designing a GaAs-based floating-point multiplierJeffrey Espenschied, Eugene Lee, Ashok K. Goel. 140-143
- Key technology in hogging of blanks with large-scale sculptured surfacesB. Shen, George Q. Huang, X. C. Wang, K. L. Mak. 144-147
- Application of computer methods in structural masonryJerzy P. Szolomicki, Jeremi M. Sieczkowski. 148-151
- Numerical solution for thermal buckling in flat plates with square central cutoutsStuart Wylie, Masoud Bagheri, Suresh Chandra. 152-156
- A framework to facilitate mobile data access in a manufacturing environmentSrikanth Krishnamurthy, Ibrahim Zeid. 157-160
- A new model for macrocell partitioningShawki Areibi, Matt Thompson. 161-165
- An index-based checkpointing/recovery approach for distributed systemsB. Gupta, S. K. Banerjee, Z. Wang. 166-170
- Mixed scheduling of periodic and soft aperiodic tasks with reduced context switchesHaesun K. Lee, Ilhyun Lee, Martha Evens. 171-174
- Dedicated bus system for the shared-memory multiprocessorWu Woan Kim, Hee-Sik Chun. 175-178
- Exploitation of functional parallelism in hierarchical task graph using threadHyun-Chul Kim, Hyo-Cheol Kim, Kee-Young Yoo. 179-182
- Developing a modern land records systemDhigha Sekaran, L. L. Miller. 183-186
- A clustering algorithm for spectral image processing using self-organizing mapsHiroki Kusumoto, Yoshiyasu Takefuji. 187-191
- Generating concept-feature relationships for patient simulation using a textbook indexJong-Young Kim, Martha W. Evens, Injoo Jeong, David Trace. 192-195
- Cross-correlation property for the public watermarkingHyo-Cheol Kim, Jeung-Seop Kim, Hyun-Chul Kim, Kee-Young Yoo. 196-199
- Image compression using layered JPEG-like image coderChing-Tang Hsieh, Yeh-Kuang Wu. 200-203
- Eyelash detection model for accurate iris segmentationW. K. Kong, D. Zhang. 204-207
- The evaluation of new self-organization classification algorithms using magnetic resonance imagesSouichi Oka, Yoshiyasu Takefuji. 208-211
- A method of dynamically recovering feature dimensions for content-based image retrievalYutaka Kuramochi, Kazumasa Shinjo. 212-216
- Pattern recognition comparisons with fuzzy clustering algorithmsZhenyou Li, Carl G. Looney. 217-220
- Wavelet based moment invariants feature extraction for handwritten numerals recognitionChing-Tang Hsieh, Kuo-Ming Hung, Shi-Dong Hou. 221-224
- Detecting faces in noisy imagesRami Qahwaji, Roger Green. 225-228
- A fusion of bayesian and fuzzy analysis for print faults diagnosisShijun Qiu, Alice M. Agogino, Shuang Song, Jialong Wu, Shankaran Sitarama. 229-232
- A neural network and fuzzy logic system for face detection on RGB imagesChristos Anagnostopoulos, Ioannis Anagnostopoulos, Dimitrios D. Vergados, Eleftherios Kayafas, Vassilis Loumos, George I. Stassinopoulos. 233-236
- System and method using dual packet filtering for wireless network communicationLiang-Yi Hwang, Mei-Ling Chiang, Ruei-Chuan Chang. 237-240
- The impact of output selection function on adaptive routingAkira Funahashi, Michihiro Koibuchi, Akiya Jouraku, Hideharu Amano. 241-246
- Performance results on scheduling algorithms for broadcast information delivery systemsRichard T. Hurley, Wenying Feng. 247-250
- Mobility scheme using dynamic circle location register in wireless communicationsHyunCheul Shin, JongGoo Park. 251-255
- The performance comparison between backpropagation and extended incremental network model on speaker verificationSu Jeong Byun, Won Don Lee, Sung Y. Shin, Chih-Cheng Hung. 256-259
- Performance comparison of BNN and MPNN on proben1 databaseDaewon An, K. Wendy Tang, Petar M. Djuric. 260-263
- Applications of neural networks in socio-economic modelingAbdel-Hamid El-Kassas, Tomasz J. Cholewo, Adel Said Elmaghraby. 264-267
- A learning mechanism to enhance the time efficiency of proving theoremsAhmad Almonayyes, Hazem Raaft, Mohammed Almulla. 268-271
- Simulation and verification of an embedded systemPatrick Augé, Brigitte Rozoy, T. Maurin, Roger Reynaud, Kamel Bouchefra. 272-275
- The analysis and comparison for the software cache coherence schemesRong-Yuh Hwang, Ming-Hung Chiu. 276-279
- Modeling technological limitations in all-optical networksChad Peyton, Hamdy S. Soliman. 280-283
- Cooperative caching framework of VOD using P2P technologyJungohn Yim, Gil Yong Kim, Young-Sung Son. 284-289
- Maintaining maximal submeshes in torus-connected multi-computersSeong-Moo Yoo, Vladimir Zanev. 290-293
- Integrating knowledge discovery and spatial data visualization for health care researchRex E. Gantenbein, Chang Oan Sung. 294-297
- Mining association rulesHussein H. Aly, Yousry I. Taha, Ashraf A. Amr. 298-303
- Rule derivation from uncertain dataJunping Sun. 304-309
- A computer aided design tool for the identification and linkage of safety-critical factors to their mitigating requirementsFrederick Ferguson. 310-313
- Approaches to implementing decision aggregation in multi-agent systemsChengqi Zhang, Zili Zhang. 314-317
- Post-processing of multimedia information - concents, problems, and techniquesChengqi Zhang, Zili Zhang. 318-321
- Permutation routing and fault tolerance in omega plus networksRaj Sekhar Pamula. 322-324
- The link-orientation problem on weighted networksWilliam Chung-Kung Yen, Shin-Jer Yang. 325-329
- Emulation of task flow distributed system over TCP/IPHamdy S. Soliman. 330-333
- Performance evaluation of routing algorithms from the viewpoint of audio stream application usersKazuma Wakabayashi, Kazumasa Oida, Shigeru Saito. 334-337
- A novel method for visualizing similarity in gene expression and other large datasetsSandy Shaw, C. Anthony Hunt. 338-341
- Consequential reasoning in knowledge-based systemsDonna L. Hudson, Maurice E. Cohen. 342-345
- Therapeutic engineering: Models of individual variability in drug systemsAmina Qutub, Alex Lancaster, C. Anthony Hunt. 346-349
- A hybrid system for diagnosis of dementiaMaurice E. Cohen, Donna L. Hudson. 350-353
- Informatics techniques in bioinorganic chemistryScott E. Hudson. 354-357
- A Java unit and integration testing toolManuel Penaloza, Antonette M. Logar, Joseph Johnson, Michael Boucher. 358-361
- Dynamic memory allocation behavior in Java programsRichard Li, Anthony S. Fong, H. W. Chun, C. H. Tam. 362-365
- A graphical environment for transcription of american sign languageJorge Toro, Jacob Furst, Karen Alkoby, Roymieco Carter, Juliet Christopher, Brock Craft, Mary Jo Davidson, Damien Hinkle, Brian Konie, Glenn Lancaster, Steve Luecking, Ashley Morris, John McDonald, Eric Sedgwick, Noriko Tomuro, Rosalee Wolfe. 366-369
- Generating test cases for a three variable functionNarayan C. Debnath, Mohammad N. Islam, Roger Y. Lee, Hamid R. Abachi. 370-373
- Extracting information about proper nouns from arabic newspaper textSaleem Abuleil, Martha Evens. 374-378
- A hybrid scheme for hierarchical coding of imagesS. R. Subramanya. 379-382
- Human identification through body measurementsDavid B. Bracewell, Niels da Vitoria Lobo, Mubarak Shah. 383-386
- Low-level natural language technique for arabic text processingArafat Awajan. 387-390
- A word-based soft clustering algorithm for documentsKing-Ip Lin, Ravikumar Kondadadi. 391-394
- A parallel algorithm for lossy DPCM coding of imagesS. R. Subramanya. 395-398
- Media oriented video streaming flow control in Linux cluster serverJungohn Yim, Gil Yong Kim, Young-Sung Son. 399-404
- Applications of adaptive segmentation and orthogonal expansion to non-stationary signal processingJean Andrian, Christopher A. Edmonds, Kang Yen, James P. Stephens. 405-408
- A QoS based disk subsystemAthena Vakali, Constantina Stupa. 409-412
- Noise reduction in nonlinear time series using a library of wavelet basesKang Yen, Ali Naqui, Jean Andrian. 413-416
- An enterprise e-tax solutionShawn Wang, Rex E. Gantenbein. 417-420
- Re-engineering web-based systemsRaja Kannappan, Vinu George, Thomas Philip. 421-424
- Experiences in software development with different methodologiesJiang B. Liu. 425-428
- Secure internet-based transactions for public servicesFreimut Bodendorf, Gabriele Saueressig. 429-432
- Logical optimization for meta queriesWataru Matsumoto, Shingo Kashikawa, Takao Miura, Isamu Shioya. 433-436
- A distributed data distortion method for securing confidential dataHaklin Kimm. 437-440
- Agent-based system for cooperative databaseDjamal Benslimane. 441-446
- A model to detect multi-source information attacksBrajendra Panda, Rajesh Yalamanchili. 447-451
- A new analyzing approach for intelligent memory systemsTsung-Chuan Huang, Slo-Li Chu. 452-457
- Simulation of GaAs MESFET devices using TCAD toolsHua Ma, Ashok K. Goel. 458-461
- A new kernel-level key management system for non-interactive processesMoonSang Kwon, Yookun Cho. 462-467
- Block allocation of large scale arrays in jukebox systemAkiyoshi Wakatani. 468-471
- Scaleable distributed apache www serverJ. Michael Meehan, David Ladiges. 472-475
- A pseudo-synchronous rollforward recovery approach using basic checkpoints for distributed systemsB. Gupta, S. K. Banerjee, B. Liu. 476-480
- Branching computation for visualization in medical systemsMark Burgin, Damon Shing-Min Liu, Walter J. Karplus. 481-484
- A pipelined processor suitable for a bus-based parallel architectureBehnam S. Arad, Hung-Ru Shih. 485-488
- Improving the educational process by using IT solutions: Emphasizing pedagogy and technologyDaniela Marghitu, Jackson Lin, Jinghai Ma. 489-492
- The second generation CAI and Its research pathFengxiang Zhang, Rong Cheng. 493-496
- Concept map based interactive intelligent tutoring systemInjoo Jeong, Martha W. Evens, Jong-Young Kim. 497-500
- End-to-end network performance measurement for voice transission feasibilityWolfgang Kampichler, Karl M. Göschka. 501-504
- Implementation comparison of multicasting policies in an ATM switchParimal Patel, Harish Maiya. 505-510
- Implementation of write relocatable coherency protocol in multiple processor architecturesParimal Patel, Venkataramana Reddipalli. 511-516
- A methodology for developing a probabilistic security measure using a software reliability modelCharlie Yong-Sang Shim, Rex E. Gantenbein. 517-520
- An aspect-oriented approach to supporting the design of system softwarePaniti Netinant, Constantinos Constantinides, Tzilla Elrad. 521-524
- A design oriented approach to software maintenanceJaehyoun Kim, Sargon Hasso, C. Robert Carlson. 525-530
- An approach to remote software project management and developmentVladimir Zanev, Avram Eskenazi, Seong-Moo Yoo. 531-535