Abstract is missing.
- Global Leadership in C-CommerceSteven Chen. 7 [doi]
- Methodological Contributions to Professional Education and TrainingGünther Ruhe. 11-16 [doi]
- Quality Issues in System Engineering Affecting Virtual Distance Learning SystemsElsabé Cloete. 17-20 [doi]
- An Education Class on Design and Implementation of an Information System in a University and Its EvaluationAtsuo Hazeyama. 21-27 [doi]
- Knowledge, Professionalism and Free Movement of Labor (Visions of the Software Engineering Future)J. Barrie Thompson. 28 [doi]
- Modeling Web Navigation by StatechartKarl R. P. H. Leung, Lucas Chi Kwong Hui, Siu-Ming Yiu, Ricky W. M. Tang. 41-47 [doi]
- LRU-SP: A Size-Adjusted and Popularity-Aware LRU Replacement Algorithm for Web CachingKai Cheng, Yahiko Kambayashi. 48-53 [doi]
- A Web-Based Parallel PDE Solver Generation System for Distributed Memory Computing EnvironmentsChao-Jen Lee, Yeh-Ching Chung. 54-59 [doi]
- Design and Implementation of a Web-Based Bulletin System for Official DocumentsH. C. Hong, Y.-C. Chen. 60 [doi]
- Sentient Map and Its Application to E-LearningShi-Kuo Chang. 73-78 [doi]
- Portfolio Management: A New Approach for Managing IT AssetsRaymond A. Paul. 79 [doi]
- TTP: Secure ACID Transfer Protocol for Electronic Ticket between Personal Tamper-Proof Devices Kimio Kuramitsu, Tadashi Murakami, Hajime Matsuda, Ken Sakamura. 87-92 [doi]
- PENS: A Predictive Event Notification System for e-Commerce EnvironmentJun-Jang Jeng, Youssef Drissi. 93-98 [doi]
- Using Pattern-Join and Purchase-Combination for Mining Web Transaction Patterns in an Electronic Commerce EnvironmentChing-Huang Yun, Ming-Syan Chen. 99-104 [doi]
- Transforming Legacy Energy Management System (EMS) Modules into Reusable Components: A Case StudyQing Zhao, Hoh In, Xiaowei Wu, Garng M. Huang. 105 [doi]
- Security Enhancement for the "Simple Authentication Key Agreement Algorithm"Iuon-Chang Lin, Chin-Chen Chang, Min-Shiang Hwang. 113-115 [doi]
- Firewall Security: Policies, Testing and Performance EvaluationMichael R. Lyu, Lorrien K. Y. Lau. 116-121 [doi]
- Chinese Wall Security Model and Conflict AnalysisTsau Young Lin. 122 [doi]
- Network and Web Security and E-Commerce and Other ApplicationsBhavani M. Thuraisingham. 131 [doi]
- Protecting XML Documents: Position PaperElisa Bertino. 132 [doi]
- FACL: A Form-Based Agent Communication Language for Enduser-Initiative Agent-Based Application DevelopmentTakeshi Chusho, Katsuya Fujiwara. 139-148 [doi]
- Affinity-Based Probabilistic Reasoning and Document Clustering on the WWWMei-Ling Shyu, Shu-Ching Chen, Chi-Min Shu. 149-154 [doi]
- Towards Building a Smarter Domain Knowledge Recovery Assistant1Yang Li, Hongji Yang, William C. Chu. 155-160 [doi]
- Network Management with Intelligent TraderShinichi Matsumoto, Makoto Amamiya. 161 [doi]
- Software Process DisturbancesTsang Ming Jiang, Michael Coyner. 167-168 [doi]
- Internet Procurement of Formosa PlasticsJoyce Lien Tai, Ray M. Yang. 169-170 [doi]
- Understanding Data Mining and applying it to Command, Control, Communications and Intelligence EnvironmentsBhavani M. Thuraisingham, Marion G. Ceruti. 171-175 [doi]
- Identifying Key Attributes of Projects that Affect the Field Quality of Communication SoftwareNahomi Kikuchi, Osamu Mizuno, Tohru Kikuno. 176 [doi]
- A National Clearinghouse Service for B2B Exchanges in the Telecommunications IndustryMohammad Moghadam, Chung-Min Chen, Tony Lin, Amjad Umar. 179-181 [doi]
- Reengineering Legacy Systems Using WebRakesh Agarwal, Suresh Nayak, Sambit Mishra. 182 [doi]
- Mining the Web for Knowledge with Sub-Optimal Mining AlgorithmStuart Harvey Rubin, Marion G. Ceruti, Lydia C. Shen. 184-186 [doi]
- A Framework for WWW Query ProcessingBinghui Helen Wu. 187 [doi]
- A Practical Method for Watermarking Java ProgramsAkito Monden, Hajimu Iida, Ken-ichi Matsumoto, Koji Torii, Katsuro Inoue. 191-197 [doi]
- A Proof of Copyright Ownership Using Moment-PreservingChin-Chen Chang, Kuo-Feng Hwang, Yi Lin. 198-203 [doi]
- Fuzzy Data Recognition by Polynomial Bidirectional HeteroassociatorCheng-Fa Tsai. 204-209 [doi]
- Tree Indexing for Efficient Search of Similar DocumentsChung-Min Chen, Duen-Ren Liu. 210 [doi]
- Formalizing UML Class Diagrams: A Hierarchical Predicate Transition Net ApproachXudong He. 217-222 [doi]
- ConC++: A Concurrent C++Bangqing Li, Baowen Xu, Hongji Yang, William C. Chu. 223-227 [doi]
- Development of XML-Based Software and Service Commerce Language XSCL and Javabeans PlayerMikio Aoyama, Taro Saiki, Noriyoshi Matsumoto. 228-233 [doi]
- Designing An FSM Architectural Framework for Service-Based ApplicationsJun-Jang Jeng, Wang-Chuan Tsai. 234 [doi]
- Selection of Melody Lines for Music DatabasesMichael Tang, Chi Lap Yip, Ben Kao. 243-248 [doi]
- A Visual Authoring System for Animated Multimedia HomepageShih-Fang Chuang, Chorng-Shiuh Koong, Jyi-Sheng Tyan, Deng-Jyi Chen. 249 [doi]
- A Component-Based Visual Scenario Construction Language for Electronic BookChorng-Shiuh Koong, Jyi-Sheng Tyan, Shih-Fang Chuang, Deng-Jyi Chen. 255-260 [doi]
- The Design and Implementation of a Virtual Conference SystemTimothy K. Shih, Jiung-Yao Huang, Jason C. Hung, Te-Hua Wang, Wen C. Pai. 261 [doi]
- An Integrated Solution for Creating Dependable SoftwareW. Eric Wong. 269-270 [doi]
- Distributed System Resource Management Infrastructure for Information Quality AssuranceRaymond A. Paul. 271-273 [doi]
- Inserting Software Fault Measurement Techniques into Development EffortsAllen P. Nikora. 274-275 [doi]
- A Phase-Based Approach to Creating Highly Reliable SoftwareMichael R. Lyu. 276-280 [doi]
- Challenges for Virtual UniversitiesElsabé Cloete. 281-283 [doi]
- Criteria of Virtual University OperationTimothy K. Shih. 284-285 [doi]
- A Corporate Insider s View About Virtual UniversitiesMaying Chen. 286-287 [doi]
- Global Virtual University: An Experiment between the University of North Carolina at Wilmington and the Digital Communities of JapanH. E. Thompson Jr. 288 [doi]
- Designing an Efficient Fuzzy classifier Using an Intelligent Genetic AlgorithmShinn-Ying Ho, Tai-Kang Chen, Shinn-Jang Ho. 293-298 [doi]
- Plan Tracking Knowledge BaseDick B. Simmons, Ching-Seh Wu. 299-304 [doi]
- Software Project Planning Associate (SPPA): A Knowledge-Based Approach for Dynamic Software Project Planning and TrackingChing-Seh Wu, Dick B. Simmons. 305-310 [doi]
- Automating Scenario-Driven Structured Requirements EngineeringHong Zhu, Lingzi Jin. 311 [doi]
- Online Non-stop Software Update Using Replicated Execution BlocksKuo-Feng Ssu, Hewijin Christine Jiau. 319-324 [doi]
- Fast Link Layer and Intra-Domain Handoffs for Mobil InternetJyh-Cheng Chen, Prathima Agrawal. 325-330 [doi]
- A Visual Supporting Method for Sequence Controller ProgrammingYongil Shin, Atsushi Ohnishi. 331-336 [doi]
- A New Framework for Testing Real-Time SoftwareJin-Cherng Lin, Ian Ho. 337 [doi]
- Is the Harmonization of Professional Standards for Software Engineers Feasible? Or Even Welcome?J. Barrie Thompson. 345-345 [doi]
- Towards Harmonized Professional Standards for Software Engineers: Constraints, Conflicts, and ConcessionsT. H. Tse. 346 [doi]
- Supporting the Partitioning of Distributed Systems with Function-Class DecompositionJane Cleland-Huang, Carl K. Chang. 351-356 [doi]
- Reliable Transaction Design Using MTSIl-Chul Yoon, Hyung-Ho Kim, Doo-Hwan Bae, Cheong Youn. 357-362 [doi]
- Component-Based Architecture for Simulation of Transmission SystemsJohn K. Pollard. 363-368 [doi]
- Integration in Component-Based Software Development Using Design PatternsStephen S. Yau, Ning Dong. 369 [doi]
- Performance Enhancement of Web-Based Push Transmitter with Channel SchedulingHsing Mei, Chia-His Chang, Wen-Hsien Tseng. 377-382 [doi]
- Enlarged-Maximum-Scannable-Groups for Real-Time Disk Scheduling in a Multimedia SystemHsung-Pin Chang, Ruei-Chuan Chang, Ray-I Chang, Wei Kuan Shih. 383-388 [doi]
- Reducing Network Traffic Using Two-layered Cache Servers for Continuous Media Data on the InternetYong Woon Park, Kun Hyo Baek, Ki-Dong Chung. 389-394 [doi]
- A New Mesh-Based Temporal-Spatial Segmentation for Image SequenceChung Ming Kuo, Chaur-Heh Hsieh, Yong Ren Huang, Zen Sun Lo. 395 [doi]
- Defect-Based Reliability Analysis for Mission-Critical SoftwareRaymond A. Paul, Farokh B. Bastani, I-Ling Yen, Venkata U. B. Challagulla. 439-444 [doi]
- Improvement of authenticated encryption scheme with (t, n) shared verificationJian-zhu Lu, Huo Yan Chen. 445-448 [doi]
- Detecting Dealer Cheating in Secret Sharing SystemsChin-Chen Chang, Chao-Wen Chan. 449-453 [doi]
- Effort-Index-Based Software Reliability Growth Models and Performance AssessmentChin-Yu Huang, Sy-Yen Kuo, Michael R. Lyu. 454 [doi]
- Using Rough Sets to Build-up Web-Based One to One Customer ServicesI-Jen Chiang, Tsau Young Lin. 463-464 [doi]
- Web for Data Mining ApplicationsBing Liu, Yiming Ma, Ching Kian Wong. 465-466 [doi]
- Problems with Mining Medical DataShusaku Tsumoto. 467-468 [doi]
- Web Intelligence (WI)Ning Zhong, Jiming Liu, Yiyu Yao, Setsuo Ohsuga. 469 [doi]
- Presentation Layer Framework of Web Application Systems with Server-Side Java TechnologyAkihiro Saimi, Tsutomu Syomura, Hiroshi Suganuma, Itaru Ishida. 473-478 [doi]
- Interoperability with Distributed Objects through Java WrapperNgom Cheng, Valdis Berzins, Luqi, Swapan Bhattacharya. 479-485 [doi]
- Dependence Analysis of Java BytecodeJianjun Zhao. 486-491 [doi]
- Applying Reflective Middleware Techniques to Optimize a QoS-Enabled CORBA Component Model ImplementationNanbor Wang, Kirthika Parameswaran, Michael Kircher, Douglas C. Schmidt. 492 [doi]
- Towards the Verification of Scenarios with Time Petri-NetsJonathan Lee, Jong-Yih Kuo, Yong-Yi Fanjiang, Stephen J. H. Yang, Jiann-I Pan. 503-508 [doi]
- Region Encoding Diagram for Fully Symbolic Verification of Real-Time SystemsFarn Wang. 509-515 [doi]
- Concurrent Embedded Real-Time Software VerificationPao-Ann Hsiung. 516-521 [doi]
- Learning How to Improve Effort Estimation in Small Software Development CompaniesJohn Moses. 522-527 [doi]
- Successful Software Applications: Can They Be Evaluated?Chris E. Hillam, Helen M. Edwards, Caroline L. Young. 528 [doi]
- An Object-Oriented Web Test Model for Testing Web ApplicationsDavid Chenho Kung, Chien-Hung Liu, Pei Hsia. 537-542 [doi]
- Function Point Measurement for Object-Oriented Requirements SpecificationShinji Kusumoto, Katsuro Inoue, Takashi Kasimoto, Ayane Suzuki, Katsuhiko Yuura, Michio Tsuda. 543-548 [doi]
- Time-Triggered Message-Triggered Object Modeling of a Distributed Real-Time Control Application for Its Real-Time SimulationMoon-hae Kim, Jung-Guk Kim, K. H. Kim, Myeong-Soo Lee, Shin-Yeol Park. 549-556 [doi]
- A Methodology to Extract Objects from Procedural SoftwareMoon-Kun Lee, Sung-Og Park. 557 [doi]
- Practical Key Distribution Schemes for Channel ProtectionYu-Lun Huang, Shiuh-Pyng Winston Shieh, Jian-Chyuan Wang. 569-574 [doi]
- Popularity-Independent Multimedia-on-Demand Server ModelMohammad A. Mikki, Kangbin Yim, Gihyun Jung. 575-580 [doi]
- The Multimedia Maintenance Interface (MuMMI) SystemRachel Jane McCrindle, Stuart Doggett. 581 [doi]
- A Cost-Based Replacement Algorithm for Object BuffersChong-Mok Park, Kyu-Young Whang, Jeong-Joon Lee, Il-Yeol Song. 589-597 [doi]
- 2D-CHI: A Tunable Two-Dimensional Class Hierarchy Index for Object-Oriented DatabasesJong-Hak Lee, Kyu-Young Whang, Wook-Shin Han, Wan-Sup Cho, Il-Yeol Song. 598-607 [doi]
- Analyzing Reconfigurable Algorithms for Managing Replicated Data with Strict Consistency Requirements: A Case StudyDing-Chau Wang, Chih-Ping Chu, Ing-Ray Chen. 608-613 [doi]
- GAPS: A Genetic Programming SystemMichael D. Kramer, Du Zhang. 614 [doi]