Abstract is missing.
- Speaker Model and Decision Threshold Updating in Speaker VerificationM. Mehdi Homayounpour. 1-10 [doi]
- Application of Constraint Hierarchy to Timetabling ProblemsTatyana M. Yakhno, Evren Tekin. 11-18 [doi]
- An Intelligent System for Therapy Control in a Distributed OrganizationJoaquín Cañadas, Isabel María del Águila, Alfonso Bosch, Samuel Túnez. 19-26 [doi]
- Discovering Local Patterns from Multiple Temporal SequencesXiaoming Jin, Yuchang Lu, Chunyi Shi. 27-34 [doi]
- The Geometric Framework for Exact and Similarity Querying XML DataMichal Krátký, Jaroslav Pokorný, Tomás Skopal, Václav Snásel. 35-46 [doi]
- A Mobile System for Extracting and Visualizing Protein-Protein InteractionsKyungsook Han, Hyoungguen Kim. 47-56 [doi]
- Discovering Temporal Relation Rules Mining from Interval DataJun Wook Lee, Yong Joon Lee, Hey Kyu Kim, Bu Hun Hwang, Keun Ho Ryu. 57-66 [doi]
- An Abstract Image Representation Based on Edge Pixel Neighborhood Information (EPNI)Abdolah Chalechale, Alfred Mertins. 67-74 [doi]
- Motion Estimation Based on Temporal CorrelationsH. S. Yoon, G. S. Lee, S. H. Kim, J. Y. Chang. 75-83 [doi]
- A New Boundary Matching Algorithm Based on Edge DetectionNamRye Son, YoJin Yang, Gueesang Lee, Sungju Park. 84-92 [doi]
- Lookmark: A 2.5D Web Information Visualization SystemChristian Breiteneder, Horst Eidenberger, Geert Fiedler, Markus Raab. 93-101 [doi]
- Different Local Search Algorithms in STAGE for Solving Bin Packing ProblemSaeed Bagheri Shouraki, Gholamreza Haffari. 102-109 [doi]
- A Prototype for Functionality Based Network Management SystemNeelanarayanan Venkataraman, N. Satyanarayana, N. Subramanian, E. Usha Rani. 110-116 [doi]
- Coaching a Soccer Simulation Team in RoboCup EnvironmentJafar Habibi, Ehsan Chiniforooshan, Abbas Heydarnoori, Mehdi Mirzazadeh, Mohammad Ali Safari, HamidReza Younesi. 117-126 [doi]
- Improving Information Retrieval System Security via an Optimal Maximal Coding SchemeDongyang Long. 127-134 [doi]
- A New Scheme Based on Semiconductor Lasers with Phase-Conjugate Feedback for Cryptographic CommunicationsAndrés Iglesias. 135-144 [doi]
- Parallel Algorithm and Architecture for Public-Key CryptosystemHyun-Sung Kim, Kee-Young Yoo. 145-153 [doi]
- Specification and Verification of Security Policies in FirewallsRasool Jalili, Mohsen Rezvani. 154-163 [doi]
- Image Segmentation Based on Shape Space ModelingDaehee Kim, Yo-Sung Ho. 164-171 [doi]
- HERMES: File System Support for Multimedia Streaming in Information Home ApplianceYoujip Won, Jinyoun Park, Sangback Ma. 172-179 [doi]
- Motion Vector Recovery for Error Concealment Based on Macroblock Distortion ModelingJae-Won Suh, Yo-Sung Ho. 180-187 [doi]
- A Memory Copy Reduction Scheme for Networked Multimedia Service in Linux KernelJeongWon Kim, YoungUhg Lho, YoungJu Kim, KwangBaek Kim, SeungWon Lee. 188-195 [doi]
- Hidden Markov Model and Neural Network HybridDongsuk Yook. 196-203 [doi]
- Neural Network Based Algorithms for IP Lookup and Packet ClassificationMehran Mahramian, Nasser Yazdani, Karim Faez, Hassan Taheri. 204-211 [doi]
- Non-linear Prediction of Speech Signal Using Artificial Neural NetsK. Ashouri, M. Amini, M. H. Savoji. 212-219 [doi]
- Web Document Access Control Using Two-Layered Storage Structures with RBAC ServerWon Bo Shim, Seog Park. 220-227 [doi]
- Development of UML Descriptions with USEMartin Gogolla, Mark Richters. 228-238 [doi]
- FPGA Implementation of Digital Chaotic CryptographyDewi Utami, Hadi Suwastio, Bambang Sumadjudin. 239-247 [doi]
- Stereo for Recovering Sharp Object BoundariesJeonghee Jeon, Choongwon Kim, Yo-Sung Ho. 248-255 [doi]
- Priority Vantage Points Structures for Similarity Queries in Metric SpacesCengiz Celik. 256-263 [doi]
- A High Performance Image Coding Using Uniform Morphological Sampling, Residues Classifying, and Vector QuantizationSaeid Saryazdi, Mostafa Jafari. 264-271 [doi]
- A Genetic Algorithm for Steiner Tree Optimization with Multiple Constraints Using Prüfer NumberAbolfazl Toroghi Haghighat, Karim Faez, Mehdi Dehghan, A. Mowlaei, Y. Ghahremani. 272-280 [doi]
- A New Technique for Participation of Non-CORBA Independent Persistent Objects in OTS TransactionsMohsen Sharifi, S. F. Noorani, F. Orooji. 281-288 [doi]
- Compositional Modelling of Workflow ProcessesKhodakaram Salimifard, Mike B. Wright. 289-296 [doi]
- EDMIS: Metadata Interchange System for OLAPIn-Gi Lee, Minsoo Lee, Hwan-Seung Yong. 297-305 [doi]
- An Efficient Method for Controlling Access in Object-Oriented DatabasesWoochun Jun, Le Gruenwald. 306-313 [doi]
- Extracting Information from XML Documents by Reverse Generating a DTDJong-Seok Jung, Dong-Ik Oh, Yong-Hae Kong, Jong-Keun Ahn. 314-321 [doi]
- Mapping XML-Schema to Relational SchemaHongwei Sun, Shusheng Zhang, Jingtao Zhou, Jing Wang. 322-329 [doi]
- Flexible Modification of Relational Schema by X2RMap in Storing XML into RelationsJaehoon Kim, Seog Park. 330-338 [doi]
- B2B Integration - Aligning ebXML and Ontology ApproachesBirgit Hofreiter, Christian Huemer. 339-349 [doi]
- An Agent Based Service Discovery Architecture for Mobile EnvironmentsZhou Wang, Jochen Seitz. 350-357 [doi]
- Location Management Using Multicasting HLR in Mobile NetworksDong Chun Lee. 358-365 [doi]
- Packet Error Probability of Multi-carrier CDMA System in Fast/Slow Correlated Fading Plus Interference ChannelJae-Sung Roh, Chang-Heon Oh, Heau-Jo Kang, Sung-Joon Cho. 366-376 [doi]
- A Distributed Low-Cost Dynamic Multicast Routing Algorithm with Delay ConstraintsMin-Woo Shin, Nak-Keun Joo, Hyeong-Seok Lim. 377-386 [doi]
- A New Bandwidth Reduction Method for Distributed Rendering SystemsWon-Jong Lee, Hyung-Rae Kim, Woo-Chan Park, Jung-Woo Kim, Tack-Don Han, Sung-Bong Yang. 387-394 [doi]
- Neural Networks Based Mesh Generation Method in 2-DAhmet Çinar, Ahmet Arslan. 395-401 [doi]
- Image Denoising Using Hidden Markov ModelsLeila Ghabeli, Hamidreza Amindavar. 402-409 [doi]
- Anaphoric Definitions in Description LogicMaarten Marx, Mehdi Dastani. 410-417 [doi]
- Storage and Querying of High Dimensional Sparsely Populated Data in Compressed RepresentationAbu Sayed Md. Latiful Hoque. 418-425 [doi]
- The GlobData Fault-Tolerant Replicated Distributed Object DatabaseLuís Rodrigues, Hugo Miranda, Ricardo Almeida, João Martins, Pedro Vicente. 426-433 [doi]
- A Levelized Schema Extraction for XML Document Using User-Defined GraphsSungrim Kim, Yong-Ik Yoon. 434-441 [doi]
- Extracting, Interconnecting, and Accessing Heterogeneous Data Sources: An XML Query Based ApproachGilles Nachouki, Mohamed Quafafou. 442-449 [doi]
- Call Admission Control in Cellular Mobile Networks: A Learning Automata ApproachHamid Beigy, Mohammad Reza Meybodi. 450-457 [doi]
- An Adaptive Flow Control Scheme for Improving TCP Performance in Wireless InternetSeung-Joon Seok, Sung-Min Hong, Chul-Hee Kang. 458-465 [doi]
- An Adaptive TCP Protocol for Lossy Mobile EnvironmentChoong Seon Hong, YingXia Niu, Jae-Jo Lee. 466-478 [doi]
- Design and Implementation of Application-Level Multicasting Services over ATM NetworksSung-Yong Park, Jihoon Yang, Yoonhee Kim. 479-486 [doi]
- Bon: The Persian StemmerMasoud Tashakori, Mohammad Reza Meybodi, Farhad Oroumchian. 487-494 [doi]
- Current and Future Features of Digital JournalsHarald Krottmaier. 495-502 [doi]
- Solving Language Problems in a Multilingual Digital Library FederationNieves R. Brisaboa, José R. Paramá, Miguel R. Penabad, Ángeles S. Places, Francisco J. Rodríguez. 503-510 [doi]
- Performing IP Lookup on Very High Line SpeedNasser Yazdani, Nazila Salimi. 511-518 [doi]
- A Study of Marking Aggregated TCP and UDP Flows Using Generalized Marking SchemeSeung-Joon Seok, Sung-Min Hong, Chul-Hee Kang. 519-526 [doi]
- Towards the Global Information Society: The Enactment of a Regulatory Framework as a Factor of Transparency and Social CohesionPanagiotes S. Anastasiades. 527-535 [doi]
- On the Application of the Semantic Web Concepts to Adaptive E-learningJuan M. Santos, Luis E. Anido-Rifón, Martín Llamas Nistal, Judith S. Rodríguez. 536-543 [doi]
- An Integrated Programming Environment for Teaching the Object-Oriented Programming ParadigmStelios Xinogalos, Maya Satratzemi. 544-551 [doi]
- The Current Legislation Covering E-learning Provisions for the Visually Impaired in the EUHamid Jahankhani, John A. Lynch, Jonathan Stephenson. 552-559 [doi]
- Monte Carlo Soft Handoff ModelingAlexey S. Rodionov, Hyunseung Choo. 560-568 [doi]
- A QoS Provision Architecture for Mobile IPv6 over MPLS Using HMATZhaowei Qu, Choong Seon Hong, Sungyoung Lee. 569-579 [doi]
- A New Propagation Model for Cellular Mobile Radio Communications in Urban Environments Including Tree EffectsReza Arablouei, Ayaz Ghorbani. 580-587 [doi]
- A Secure Mobile Agent System Applying Identity-Based Digital Signature SchemeSeongyeol Kim, Ilyong Chung. 588-596 [doi]
- Transmission Time Analysis of WAP over CDMA System Using Turbo Code SchemeIl-Young Moon, Jae-Sung Roh, Sung-Joon Cho. 597-606 [doi]
- On the Use of New Technologies in Health CareLuis E. Anido-Rifón, Fernando Aguado, Olga Folgueiras, Judith S. Rodríguez, Juan M. Santos, Manuel Caeiro. 607-614 [doi]
- Hybrid Queuing Strategy to Reduce Call Blocking in Multimedia Wireless NetworksDong Chun Lee, Il-Sun Hwang, Robert Young Chul Kim. 615-623 [doi]
- A Dynamic Backoff Scheme to Guarantee QoS over IEEE 802.11 Wireless Local Area NetworksKil-Woong Jang, Sung Ho Hwang, Ki Jun Han. 624-631 [doi]
- Performance Evaluation of Serial/Parallel Block Coded CDMA System with Complex Spreading in Near/Far Multiple-Access Interference and Multi-path Nakagami Fading ChannelJae-Sung Roh, Choon-Gil Kim, Sung-Joon Cho. 632-642 [doi]
- A Learning Automata Based Dynamic Guard Channel SchemeHamid Beigy, Mohammad Reza Meybodi. 643-650 [doi]
- Dynamic System Simulation on the WebKhaled Mahbub, M. S. J. Hashmi. 651-658 [doi]
- Using Proximity Information for Load Balancing in Geographically Distributed Web Server SystemsDheeraj Sanghi, Pankaj Jalote, Puneet Agarwal. 659-666 [doi]
- Strategie Tool for Assessment of the Supply and Demand Relationship between ASPs and SMEs for Competitive AdvantageBabak Akhgar, Jawed I. A. Siddiqi, Mehrdad Naderi. 667-676 [doi]
- Trust and Commitment in Dynamic LogicJan Broersen, Mehdi Dastani, Zhisheng Huang, Leendert W. N. van der Torre. 677-684 [doi]
- Modelling Heterogeneity in Multi Agent SystemsStefania Bandini, Sara Manzoni, Carla Simone. 685-692 [doi]
- Pricing Agents for a Group Buying SystemYong Kyu Lee, Shin Woo Kim, Min Jung Ko, Sung Eun Park. 693-700 [doi]
- Evolution of Cooperation in Multiagent SystemsBrian H. Mayoh. 701-710 [doi]
- A Dynamic Window-Based Approximate Shortest Path Re-computation Method for Digital Road Map Databases in Mobile EnvironmentsJaehun Kim, Sungwon Jung. 711-720 [doi]
- Web-Based Process Control Systems: Architectural Patterns, Data Models, and ServicesMykola V. Tkachuk, Heinrich C. Mayr, Dmytry V. Kuklenko, Michail D. Godlevsky. 721-729 [doi]
- A Comparison of Techniques to Estimate Response Time for Data PlacementShahram Ghandeharizadeh, Shan Gao, Chris Gahagan. 730-738 [doi]
- Using a Real-Time Web-Based Pattern Recognition System to Search for Component Patterns DatabaseSung-Jung Hsiao, Kuo-Chin Fan, Wen-Tsai Sung, Shih-Ching Ou. 739-746 [doi]
- An Adaptive Call Admission Control to Support Flow Handover in Wireless Ad Hoc NetworksJoo-Hwan Seo, Ki Jun Han. 747-754 [doi]
- Design of Optimal LA in Personal Communication Services Network Using Simulated Annealing TechniqueMadhubanti Maitra, Ranjan Kumar Pradhan, Debashis Saha, Amitava Mukherjee. 755-765 [doi]
- Secure Bluetooth Piconet Using Non-anonymous Group KeyDae-Hee Seo, Im-Yeong Lee, Dong-Ik Oh, Doo-Soon Park. 766-777 [doi]
- Differentiated Bandwidth Allocation and Power Saving for Wireless Personal Area NetworksTae-Jin Lee, Yongsuk Kim. 778-785 [doi]
- Combining Extreme Programming with ISO 9000Jerzy R. Nawrocki, Michal Jasiñski, Bartosz Walter, Adam Wojciechowski. 786-794 [doi]
- The Class Cohesion Using the Reference Graph G1 and G2Wan-Kyoo Choi, Il-Yong Chung, Sung Joo Lee, Hong-Sang Yoon. 795-805 [doi]
- Process-Oriented Interactive Simulation of Software Acquisition ProjectsTobias Häberlein, Thomas Gantner. 806-815 [doi]
- Automatic Design Patterns Identification of C++ ProgramsFélix Agustín Castro Espinoza, Gustavo Núñez Esquer, Joel Suárez Cansino. 816-823 [doi]
- Specifying the Merging of Desires into Goals in the Context of BeliefsMehdi Dastani, Leendert W. N. van der Torre. 824-831 [doi]
- The Illegal Copy Protection Using Hidden AgentDeok-Gyu Lee, Im-Yeong Lee, Jong-Keun Ahn, Yong-Hae Kong. 832-841 [doi]
- Mobile Agent-Based Misuse Intrusion Detection Rule Propagation Model for Distributed SystemTae-Kyung Kim, Dong-Young Lee, Tai-Myung Chung. 842-849 [doi]
- H-Colorings of Large Degree GraphsJosep Díaz, Jaroslav Nesetril, Maria J. Serna, Dimitrios M. Thilikos. 850-857 [doi]
- Hyper-Star Graph: A New Interconnection Network Improving the Network Cost of the HypercubeHyeong-Ok Lee, Jong-Seok Kim, Eunseuk Oh, Hyeong-Seok Lim. 858-865 [doi]
- Sequential Consistency as Lazy LinearizabilityMichel Raynal. 866-873 [doi]
- Embedding Full Ternary Trees into Recursive CirculantsCheol Kim, Jung Choi, Hyeong-Seok Lim. 874-882 [doi]
- A Handoff Priority Scheme for TDMA/FDMA-Based Cellular NetworksKil-Woong Jang, Sun-Woo Lee, Ki Jun Han. 883-890 [doi]
- On Delay Times in a Bluetooth Piconet: The Impact of Different Scheduling PoliciesJelena V. Misic, Vojislav B. Misic. 891-898 [doi]
- Intelligent Paging Strategy in 3G Personal Communication SystemsIti Saha Misra, S. Karmakar, M. S. Mahapatra, Partha Sarathi Bhattacharjee, Debashis Saha, Amitava Mukherjee. 899-906 [doi]
- Experience from Mobile Application Service Framework in WIPShinyoung Lim, Youjin Song. 907-915 [doi]
- An Efficient Approach to Improve TCP Performance over Wireless NetworksSatoshi Utsumi, Salahuddin Muhammad Salim Zabir, Norio Shiratori. 916-925 [doi]
- Extended Hexagonal Constellations as a Means of Multicarrier PAPR ReductionAli Pezeshk, Babak Hossein Khalaj. 926-936 [doi]
- Adaptive Application-Centric Management in Meta-computing EnvironmentsYoonhee Kim, Sung-Yong Park. 937-944 [doi]
- The Weakest Failure Detector for Solving Election Problems in Asynchronous Distributed SystemsSung-Hoon Park. 945-952 [doi]
- From Lens to Flow StructureDavid Fauthoux, Jean Paul Bahsoun. 953-964 [doi]
- ADML: A Language for Automatic Generation of Migration PlansJennifer Pérez, José A. Carsí, Isidro Ramos. 965-974 [doi]
- Considerations for Using Domain-Specific Modeling in the Analysis Phase of Software Development ProcessKalle Korhonen. 975-981 [doi]
- Organizations and Normative AgentsMehdi Dastani, Virginia Dignum, Frank Dignum. 982-989 [doi]
- A Framework for Agent-Based Software DevelopmentBehrouz Homayoun Far. 990-997 [doi]
- Application of Agent Technologies in Extended Enterprise Production PlanningVladimír Marík, Michal Pechoucek, Jirí Vokrínek, Ales Ríha. 998-1007 [doi]
- Zamin: An Artificial EcosystemRamin Halavati, Saeed Bagheri Shouraki. 1008-1016 [doi]