Abstract is missing.
- Data Link Frame Aggregation ProtocolJ. Michael Meehan, Philip A. Nelson. 1-4
- The First Language ProblemJ. Michael Meehan, James W. Hearne, Jeremy Powers. 5-8
- Mechanical Software Development Process ModelChang Oan Sung, Alireza Salehnia, Charlie Y. Shim. 9-12
- Dimension and Shape Invariant Array ProgrammingAhmed Sameh, Manal Ezzat. 13-17
- Exact Computations of the Longest Repeated Suffix Ending at Each Point in a WordThierry Lecroq, Jean Frédéric Myoupo, David Semé. 18-21
- Adaptive Thresholding to Eliminate up to 99 of Wavelet CoefficientsYe Zhou, Irene Gargantini. 22-25
- Predicting Accumulated Faults in Software Testing Process Using Radial Basis Function Network ModelsSultan Aljahdali, Alaa F. Sheta, David Rine. 26-29
- Software Change Analysis Using Metrics MeasurementHui Zeng, David Rine. 30-33
- Visual Hand Gesture Sequence InterpreterWalaa M. Sheta, Ashraf M. Emam, Ayman E. Ibrahim. 34-38
- Implementation of a Data Warehouse for Claims ProcessingManuel Penaloza. 39-42
- A UML Model to Relational Database Mapping for Dynamic CORBA Component Model PersistencyStefan Mitterdorfer, Egon Teiniker, Christian Kreiner, Reinhold Weiss, Zsolt Kovács. 43-48
- An Effective Way to Guarantee the Physical Consistency of Lock Waiting Information in Main Memory DatabasesSang-Wook Kim, Hwangkyu Choi, Changyeol Choi, Ju-Ha Seo, Jeong-Il Park. 49-54
- Knowledge Discovery, Information Retrieval, and Data MiningM. Burgin, Rex E. Gantenbein. 55-58
- Memory-Cordie Algorithm for Embedded Programmable Logic Device DesignsXianwei Wu, Phaisit Chewputtanagul, David Jeff Jackson, Tim A. Haskew. 59-62
- An Approach from Software Reliability Modeling to Security ModelingCharlie Y. Shim, Alireza Salehnia, Sung Y. Shin. 63-66
- The Interrelationship Among Speedup Models and Performance MeasurementsDominique A. Heger, Greg Simco. 67-72
- Performance Modeling of Windows 2000 Priority-driven Preemptive Thread SchedulingSarah Tasneem, Reda A. Ammar, Howard A. Sholl, James V. Petrizzi. 73-77
- A Fuzzy Neural Reasoning Approach to Edge DetectionGordon K. Lee, Edward Grant. 78-81
- A Link-Labeling Algorithm for Computing the Shortest Path based upon Edge and Turn ConstraintsHamdy S. Soliman, Chad Peyton. 82-85
- Grayscale ThinningJohn M. Weiss. 86-89
- A Fully Automated Femur and Patella Segmentation Approach to Magnetic Resonance Images of the Knee ArticularJiann-Shu Lee. 90-93
- Output-Based Speech Quality Assessment with Application to CTIMIT DatabaseKhalid A. Al-Mashouq, Mohammed S. Al-Shaye. 94-97
- Pruning of a Sliding Window for Rank-Order FilteringDulal C. Kar. 98-101
- User Verification System on Telebanking Using Kernel based PCASung Y. Shin, Su Jeong Byun, Won Don Lee. 102-105
- Remote Linear Pressure Sensing Vibration Device for Biomedical ApplicationsMaher E. Rizkalla, Ebtsam R. Rizkalla, Harry C. Gundrum. 106-109
- Extraction and Description of Moving Human Body by Periodic Motion AnalysisJang-Hee Yoo, Mark S. Nixon, Chris J. Harris. 110-113
- Development of Digital Tongue Inspection SystemB. Y. Kim, J. H. Jang, Y. S. Chang, K. M. Park. 114-117
- Dividing Database Login to Equal Size Segments for EfficiencyPrahalad Ragothaman, Brajendra Panda. 118-121
- On Mining the Longest Frequent ItemsetChienwen Wu. 122-125
- Cost Based Semantic Query TransformationJunping Sun. 126-131
- Mapping C-Extensions for Image Processing to Parallel ArchitecturesRalph Duncan, Anwar M. Ghuloum. 132-135
- Feature Extraction of Man-Made Objects from Aerial Photography ImagesRalph Flora, Chih-Cheng Hung. 136-139
- Competitive Fuzzy-Classifier Image Edge DetectionLily R. Liang, Carl G. Looney. 140-143
- Visualizing N Dimensional ClusteringPaul Juell, William Jockheck. 144-147
- Noise Reduction Techniques for Multi-Channels for Analog VLSI ApplicationsMaher E. Rizkalla, Mark M. Budnik, Mohamed El-Sharkawy, Akhouri S. C. Sinha, Harry C. Gundrum. 148-151
- Minimizing Cross Talk between Multi-Channels Instrumentation Amp. Using Guard RingsMaher E. Rizkalla, Mark M. Budnik, Mohamed El-Sharkawy, Akhouri S. C. Sinha, Harry C. Gundrum. 152-155
- BURAQ: A Re-Configurable Processor Toolkit for VLlW ArchitecturesAdeel Abbas, Shoab Khan. 156-159
- Exhaustive Test Pattern Generation for Parallel TestingWu Woan Kim. 160-163
- Drawing Non-Intersecting Lines on a Raster DisplayBrahma Dathan. 164-167
- Cluster Analysis of Spatial Data Using Peano Count TreeQiang Ding, William Perrizo. 168-171
- Battlespace Situation Assessment via Clustering and Case-Based ReasoningCarl G. Looney, Lily R. Liang. 172-175
- A New Texture Spectrum Descriptor and its Application in Image Semantic ClassificationHualin Wan, Morshed U. Chowdhury, Hong Hu, Zhongzhi Shi. 176-179
- Affordable Knowledge Discovery Through Distributed Data MiningRex E. Gantenbein, Chang Oan Sung. 180-183
- A New Method for Concurrency Control in Centralized Database SystemsVictor T.-S. Shi, William Perrizo. 184-187
- Migration of Relational DatabasesHeston Fernandes, Gongzhu Hu. 188-191
- Adverse Effects of Large Files in a File Migration SystemRichard T. Hurley, Wenying Feng. 192-199
- Modeling of Time Criterion and Utility Function for Multiobjective SynthesisJ. Boron. 198-200
- A Middleware for Constructing Highly Available, Fault Tolerant, and Attack Tolerant ServicesShivakant Mishra. 201-204
- An Adaptive Distributed Admission Approach in Bluetooth Network with QoS ProvisionsLe Thanh Son, Henrick Schieller, Ole Brun Madsen. 205-208
- Using Wireless Sensor Networks to Narrow the Gap Between Low-Level Information and Context-AwarenessIoan Raicu, Owen Richter, Loren Schwiebert, Sherali Zeadally. 209-214
- Bi-direction Slice Arrangement Algorithm for MPEG Video Transmission over ATM NetworksEnmin Song, Reza Sotudeh, Said Boussakta, Hong Liu. 215-218
- Reducing Communication Overhead inMultiple Multicasts for Mesh NetworksDavid R. Surma. 219-222
- QoS Control and Performance Analysis of a Gigabit NetworkMansoor Alam, Qing Tan, Min Song, Xingxue Hao. 223-227
- An All-to-All Multicast Routing Decreasing Channel Overheads in Wireless Ad Hoc NetworksZhong-Hua Zhou, Seong-Moo Yoo. 228-231
- Edge Station in Access Networks for Video DistributionMin-You Wu, Wei Shu. 232-235
- Minimizing Wait Time of Aperiodic Tasks in the Real-time Systems with a Non-preemptive Scheduling AlgorithmHoon Oh. 236-240
- Flash Memory in an Educational EnvironmentDavid C. Pheanis, Christian Johnson. 241-244
- Real-time Fixed-point Denoising of Ultrasound DataA. A. Abdel-Raouf, Ian R. Greenshields, Howard A. Sholl, Reda A. Ammar. 245-247
- Minimizing Task Completion Time for Real-Time Multiprocessor SystemsJia-Ping Wang. 248-252
- A Language Independent Tool for Documentation ExtractionDavid J. Serr, Aurel Cornell. 253-256
- Design Pattern Driven Code Generation TechniqueWoon-Yong Kim, R. Young-Chul Kim, Yong-Keun Choi. 257-260
- Building an Authoring Tool for Concept-Feature Relationships by Decomposing Phrases in the TextJong-Young Kim, Martha W. Evens, David Trace. 261-264
- Metrics Comparison for Java Programs Using a Software ToolNarayan C. Debnath, Haesun K. Lee, Roger Y. Lee, Waleed W. Smari. 265-268
- A Framework for the Efficient Global Roaming Management System for the IMT-2000Yeongkwun Kim, Injoo Jeong. 269-272
- An Optimal Broadcasting Schema for Mesh StructuresZhizhang Shen. 273-276
- On-Line k-Server Problem with Twin-RequestWeimin Ma, Hui Chen, Jane You, James Liu, Yinfeng Xu. 277-282
- A Configurer and GUI Network Specifier for a Multi-Processor Strong ARM NetworkE. W. K. Liew, B. C. O Neill, S. Clark, A. Cawley. 283-288
- pSlash: A Web Content Management SystemDerek Leung, Du Zhang. 289-292
- On-Line Agent Scheduling in Internet ComputingXinfeng Yang, Weimin Ma, Jane You, James Liu. 293-296
- Reengineering Legacy Client-Server Systems for New Scalable Secure Web PlatformsJulius Dichter, Ausif Mahmood, Andrew Barrett. 297-320
- A Process Model for Reengineering Web Based ApplicationsThomas Philip, Mark Goodman. 303-306
- Knowledge and Data in Computer SystemsM. Burgin. 307-310
- Autonomous Environment Monitoring NetworksCharles Hand. 311-314
- Pattern Identification in ElectroencephalogramsDonna L. Hudson, Maurice E. Cohen. 315-318
- Characterizing Thermal Devices by Identifying Spectra Using Principal Component AnalysisThomas Philip, Yi Su, David L. Monts. 319-322
- JDOP: A Virtual Machine for Java-Based Distributed Object ProcessingJulius Dichter, Tang Haofu, Ausif Mahmood. 323-326
- Providing Secure Internet Accessto Health Care InformationRex E. Gantenbein, Thomas L. James, Jung Y. Kim. 327-330
- Joint Scheduling of Bounded Predictable (BP) and Periodic TasksIlhyun Lee. 331-334
- Exploring Multiple Levels of Parallelism for Regular and Irregular Algorithms using BOPS DSPWasif Latif, Aniq Shahid, Faisal Saud, Saqib Ali, Shoab Ahmed Khan. 335-338
- Virtual Locks: A Concurrency Control Protocol for Adaptive Broadcasting SystemWeigang Ni, Susan V. Vrbsky. 339-344
- Evaluation of Parallel Algorithm for DPCMDecoding of Images Using Index DecouplingS. R. Subramanya. 345-348
- Design and Implementation of a Web Portal for a NeoCortical SimulatorKishor K. Waikul, Lianjun Jiang, E. Courtenay Wilson, Frederick C. Harris Jr., Philip H. Goodman. 349-353
- Adaptive Routing Control of Workflow Systemon the InternetShin-Jer Yang, William Chung-Kung Yen, Yung-Cheng Chou. 354-359
- Fuzzy Clustering of Web Logs for User ClassificationKing-Ip Lin, Ravikumar Kondadadi. 360-363
- Striped Checkpointing on Cluster Computer with Single IO SpaceY. S. Chang, B. Y. Kim. 364-367
- InCore: Accounting and Charging Heterogeneous Unix SystemsMoonSang Kwon, Jiman Hong, Yookun Cho, Juw Won Park. 368-371
- Distributed Mobile Applications with Dynamic Adaptive BehaviorIara Augustin, Adenauer C. Yamin, Cláudio F. R. Geyer. 372-375
- Solar Panel based Milk PasteurizationKirsten Mølgaard Nielsen, Tom Søndergaard Pedersen. 376-379
- Design and Use of a Programmable Logic Controller Training Station for Undergraduate Engineering EducationDavid Jeff Jackson. 380-383
- Composite Plates and Critical Buckling TemperatureStuart Wylie, Masoud Bagheri, Suresh Chandra. 384-388
- Fuzzy Threat Evaluation in Computer SecurityEssam M. Hamed, James H. Graham. 389-393
- New AB:::2::: Systolic Architectures in GF(2:::m:::)Nam-Yeun Kim, Hyun-Sung Kim, Won-Ho Lee, Kee-Won Kim, Kee-Young Yoo. 394-397
- An Information Model for Network Security ManagementKarima Boudaoud, Charles McCathieNevile. 398-401
- Reader-Writer Locks for Network Attached Storage and Storage Area NetworksArun Gandhi, Elizabeth Varki, Swapnil Bhatia. 402-405
- A Dynamic Self-Adaptive Multicast Protocol for Ad-Hoc Mobile NetworksA. Tewari, B. Gupta, X. Dong. 406-411
- High Performance ATM Network SimulatorsMin Song, Mansoor Alam, Uday Jarajapu. 412-416
- Congestion Sensitive Algorithm for Point-to-Multipoint Multicast Congestion Control in ATM NetworksHong Liu, Enmin Song, Reza Sotudeh, Christopher Bailey. 417-420
- Integrating IT Assessment Applications with University Software Administrative SystemsDaniela Marghitu, Jinghai Ma, Jackson Lin. 421-424
- Extending Access Grid Conferencing to Heterogeneous End-SystemsSaisrikiran Mudigonda, Narendra Dandu, Wei Shu, Min-You Wu. 425-428
- Music Retrieval Based on the Similarity of MelodyYuka Nakagaw, Yasuaki Nakamura. 429-432
- A Bayesian Classification Approach to Personal Automotive Marketing AnalysisJantima Polpinij, Chuleerat Jaruskulchai, Peter Haddawy. 433-437
- Basic Architecture for Modular Exponentiation over GF(2:::m:::)Hyun-Sung Kim, Kee-Young Yoo. 438-441
- Design of New Multiplier/Squarer using Montgomery Algorithm over GF(2:::m:::) Based on Cellular AutomataKyo-Min Ku, Kyeoung Ju Ha, Hyun-Sung Kim, Kee-Young Yoo. 442-445
- Architecture for AB:::2::: Operation over GF(2:::m:::) using Irreducible AOP and Its ApplicationsWon-Ho Lee, Kee-Won Kim, Nam-Yeun Kim, Kee-Young Yoo, Chang Hoon Kim, Chun-Pyo Hong. 446-449
- Implementation of Real Time Intelligent Intrusion Detection SystemsBin Cong. 450-453
- Zero-Temperature-Coefficient Biasing Point of a Fully-Depleted SOI MOSFETAshok K. Goel, Terrence H. Tan. 454-457
- TV-CONMAN: A System for the Management of Broadcast TV ContentS. R. Subramanya. 458-461
- A Multiple Agent Architecture for Demand Forecasting in Electronic Commerce Supply Chain SystemsWen-Bin Yu, James H. Graham. 462-466
- Automatic Generation of System Descriptions for Plant Supervisory Control SystemsHideo Nakata, Satoshi Harauchi, Taizo Kojima, Yasuaki Nakamura. 467-470
- Shot Boundary Detection of Video Sequence using Hierarchical Hidden Markov ModelsJong Hyun Park, Soon-Young Park, Man-Won Bang, Seong-Jun Kang, Wan Hyun Cho. 471-474
- A Promising Labeling Scheme for On-the-fly Data Race DetectionKeum-Sook Ha, Eun-Kyung Ryu, Kee-Young Yoo. 475-478
- Extending the Compiler Functionality with Source Code CompressionVladimir Zanev. 479-482
- Mobile Agents over E-businessYing-Hong Wang, Chen-An Wang, Wen-Nan Wang, An-Cheng Cheng. 483-486
- An Alternative Routing Algorithm for the Pyramid StructuresZhizhang Shen. 487-490
- Distributed Object System with the Concurrent Use of CORBA and RMIHaklin Kimm. 491-494
- Using Mobile Agents to Facilitate Mobile Information Access: An XML-based ApproachSrikanth Krishnamurthy, Ibrahim Zeid. 495-498
- Software Simulation of Intelligence Routing MethodJun Dong. 499-502
- Web-based Intelligent Tutoring SystemInjoo Jeong, Martha W. Evens, Yeongkwun Kim. 503-506
- Tool to Generate a Local Internet Weather ReportFabio A. González, Nivedita Sumi Majumdar, Kim-Ip Lin, Dipankar Dasgupta. 507-510
- Modeling Optimizing Compiler Effects and Processes Communication in Evaluating Software Power ConsumptionH. Arafat Ali, Tahany A. Fergany, Reda A. Ammar. 511