Abstract is missing.
- Wavelet-Chaos-Neural Network Models for EEG-Based Diagnosis of Neurological DisordersHojjat Adeli. 1-11 [doi]
- An Introduction to Perception Based ComputingAndrzej Skowron, Piotr Wasilewski. 12-25 [doi]
- The Roadmap for Sharing Electronic Health Records: The Emerging Ubiquity and Cloud Computing TrendsSabah Mohammed, Jinan Fiaidhi. 27-38 [doi]
- Compound Analytics of Compound Data within RDBMS Framework - Infobright s PerspectiveDominik Slezak. 39-40 [doi]
- From Grid Computing to Cloud Computing: Experiences on Virtualization TechnologyHai Jin. 41 [doi]
- Recursive Queries Using Object Relational MappingMarta Burzanska, Krzysztof Stencel, Patrycja Suchomska, Aneta Szumowska, Piotr Wisniewski. 42-50 [doi]
- Agent Based Ontology Driven Virtual Meeting AssistantPhil Thompson, Anne E. James, Emanuel Stanciu. 51-62 [doi]
- Topic Number Estimation by Consensus Soft Clustering with NMFTakeru Yokoi. 63-73 [doi]
- Infrastructure Aided Privacy Preserving-Authentication in VANETsBrijesh Kumar Chaurasia, Shekhar Verma, G. S. Tomar. 74-84 [doi]
- Computational Analysis of a Power Distribution System with Petri NetsAndrés Iglesias, Akemi Gálvez. 85-98 [doi]
- Analysis of Effect of Different Factors on Burst Dropping Probability in Optical Burst Switching NetworkLaxman D. Netak, Sandeep S. Udmale, Girish V. Chowdhary, Rupali Tajanpure. 99-113 [doi]
- An Optimization of Fundamental Frequency and Length of Syllables for Rule-Based Speech SynthesisKyawt Yin Win, Tomio Takara. 114-124 [doi]
- Grid Smoothing for Image EnhancementGuillaume Noel, Karim Djouani, Yskandar Hamam. 125-135 [doi]
- Suppressing False Nagatives in Skin SegmentationRoziati Zainuddin, Sinan Naji, Jubair Al-Jaafar. 136-144 [doi]
- Steady State Analysis of an Energy Efficient Mobility Management Scheme in IP-Based Wireless NetworksHo Young Hwang, Sun Jong Kwon, Yun Won Chung, Dan Keun Sung, Suwon Park. 145-153 [doi]
- Performance Comparison of Handoff Modes in Terms of EnergyYoung-uk Chung, Hyukjoon Lee, Suwon Park. 154-163 [doi]
- Energy Efficient Coexistence of WiFi and WiMAX Systems Sharing Frequency BandJongwoo Kim, Suwon Park, Seung Hyong Rhee, Yong-Hoon Choi, Ho Young Hwang. 164-170 [doi]
- IP Mobility Performance Enhancement Using Link-Layer PredictionJun-Hui Lee, Hyun Woo Kim, Yong-Hoon Choi, Young-uk Chung, Seung Hyong Rhee. 171-179 [doi]
- Header Compression for Resource and Energy Efficient IP over Tactical Data LinkYongkoo Yoon, Suwon Park, Hyungkeun Lee, Jong-Sung Kim, Seung Bae Jee. 180-190 [doi]
- A Frequency-Based Algorithm for Workflow Outlier MiningYu-Cheng Chuang, PingYu Hsu, MinTzu Wang, Sin-Cheng Chen. 191-207 [doi]
- A Framework to Describe and Search for Virtual Resource ObjectsÉric Renault, Wajdi Louati, Ines Houidi, Houssem Medhioub. 208-219 [doi]
- Developer Toolkit for Embedded Fuzzy System Based on E-FuzzChantana Chantrapornchai, K. Sripanomwan, O. Chaowalit, J. Pipatpaisarn. 220-233 [doi]
- A Quadsection Algorithm for Grammar-Based Image CompressionMorihiro Hayashida, Peiying Ruan, Tatsuya Akutsu. 234-248 [doi]
- Effective Storage Structure for Multi-version XML DocumentsChih-Chu Chang, Ming-Shien Cheng, Ping-Yu Hsu. 249-266 [doi]
- An Ontology-Based Platform for Scientific Writing and PublishingHao Xu, Changhai Zhang, Yang Ai, Ziwen Wang, Zhan-shan Li. 267-271 [doi]
- Multi-facade and Ubiquitous Web Navigation and Access through Embedded SemanticsAhmet Soylu, Felix Mödritscher, Patrick De Causmaecker. 272-289 [doi]
- New Format and Framework for Managing Scientific KnowledgeHao Xu. 290-293 [doi]
- A General Bayesian Network-Assisted Ensemble System for Context Prediction: An Emphasis on Location PredictionKun Chang Lee, Heeryon Cho. 294-303 [doi]
- Bayesian Network Approach to Predict Mobile Churn Motivations: Emphasis on General Bayesian Network, Markov Blanket, and What-If SimulationKun Chang Lee, Nam Yong Jo. 304-313 [doi]
- Logical Mechanism for Allocating Resources to Exploitation and Exploration to Achieve Ambidexterity: Team Level AnalysisKun Chang Lee, Do Young Choi. 314-323 [doi]
- Analyzing Economic Impact of Disruptive Technology Using Multi-Agent Simulation: Smart Payment CaseKun Chang Lee, Young Wook Seo, Min Hee Hahn. 324-333 [doi]
- Research on Mobile Payment Technology and Business Models in China under e-Commerce EnvironmentRuijun Gu, Juan Yao, Jiacai Wang. 334-343 [doi]
- Fusion of Gaussian Mixture Densities for Face and Ear Biometrics Using Support Vector MachinesDakshina Ranjan Kisku, Phalguni Gupta, Jamuna Kanta Sing, Mita Nasipuri. 344-351 [doi]
- Benchmarking Query Complexity between RDB and OWLChidchanok Choksuchat, Chantana Chantrapornchai. 352-364 [doi]
- FEDTIC: A Security Design for Embedded Systems with Insecure External MemoryMei Hong, Hui Guo. 365-375 [doi]
- Enhanced Technique for Secure Wireless Sensor Routing with Respect to Energy ConservationMaqsood Mahmud, Abdulrahman Abdulkarim Mirza, Ihsan Ullah, Naveed Khan, Abdul Hanan Bin Abdullah, Mohammad Yazid Bin Idris. 376-382 [doi]
- End-to-End Security Methods for UDT Data TransmissionsDanilo Valeros Bernardo, Doan B. Hoang. 383-393 [doi]
- Evading Virus Detection Using Code ObfuscationKhurram Murad, Syed Noor-ul-Hassan Shirazi, Yousaf Bin Zikria, Nassar Ikram. 394-401 [doi]
- High Flexible Sanitizing Signature Scheme Based on Bilinear MapsWen-Chung Kuo, Jiin-Chiou Cheng, Yen-Hung Lin, Lih-Chyau Wuu. 402-412 [doi]
- An Access Control Framework of Federated IPTV Providers for Mobile IPTV ServicesMaría Elizabeth Aldana Díaz, Eui-nam Huh. 413-428 [doi]
- A Novel Scheme for PMIPv6 Based Wireless Sensor NetworkMd. Motaharul Islam, Sang-Ho Na, Seung-Jin Lee, Eui-nam Huh. 429-438 [doi]
- Mobile Partial Identity Management: The Non-repudiable Minimal Mobile Identity ModelMohammad Hasan Samadani, Mehdi Shajari. 439-449 [doi]
- A Privacy Preserving Service Broker Architecture for Data SharingFahed Al-Neyadi, Jemal Abawajy. 450-458 [doi]
- Checking the Paths to Identify Mutant Application on Embedded SystemsAhmadou Al Khary Séré, Julien Iguchi-Cartigny, Jean-Louis Lanet. 459-468 [doi]
- Enhanced Sinkhole System by Improving Post-processing MechanismHaeng-Gon Lee, Sang-soo Choi, Youn-Su Lee, Hark-Soo Park. 469-480 [doi]
- A Practical Methodology and Framework for Comprehensive Incident Handling Focused on Bot ResponseSang-soo Choi, Myung-Jin Chun, Youn-Su Lee, Hyeak-Ro Lee. 481-492 [doi]
- Real Time Watermarking and Encryption Method for DMB Contents ProtectionWon-Hee Kim, Jong-Nam Kim. 493-501 [doi]
- A Study on Data Transmission Performance of Sensor Networks for Livestock FeedlotJi-Woong Lee, Hyun-joong Kang, Jeong-hwan Hwang, Meong-hun Lee, Hyun Yoe. 502-509 [doi]
- Development of an MPEG-4 Scene Converter for Rich Media Services in Mobile EnvironmentsHee-Sun Kim, Ilgun Ko. 510-517 [doi]
- Dynamic Profiling for Efficiency Searching System in Distributed ComputingChang-Woo Song, Tae-Gan Kim, Kyung-Yong Chung, Kee-Wook Rim, Jung-Hyun Lee. 518-525 [doi]
- Evaluating the Intention to Use the Use Case Precedence Diagram in Software Development ProjectsJosé Antonio Pow-Sang. 526-537 [doi]
- A Simple Method Using Multi-Core and Multiple GbE Ports for Improving Parallel Performance in Commodity PC ClusterKei Shimada, Miku Kai, Tsuyoshi Yoshioka, Takafumi Fukunaga. 538-548 [doi]
- Proposal for Sophisticated Periodic Execution Control in Embedded SystemsYuuki Furukawa, Toshihiro Yamauchi, Hideo Taniguchi. 549-563 [doi]
- Videogames and Virtual Reality as Effective Edutainment ToolsAkemi Gálvez, Andrés Iglesias. 564-576 [doi]
- An SMS Spam Filtering System Using Support Vector MachineInwhee Joe, Hyetaek Shim. 577-584 [doi]
- Telecommunications User Behaviors Analysis Based on Fuzzy C-Means ClusteringZhe Guo, Furong Wang. 585-591 [doi]
- Performance Evaluation of a Hybrid TOA/AOA Based IR-UWB Positioning SystemNammoon Kim, Junho Gal, Eunyoung Lee, Inho Jeon, Youngok Kim. 592-600 [doi]
- All-Optical RZ-to-NRZ Converted Data Transmission at 10 Gb/sHyuek Jae Lee, Ik Soo Jin, Hae Geun Kim. 601-605 [doi]
- Improved Location Aided Cluster Based Routing Protocol for GPS Enabled ManetsS. Mangai, A. Tamilarasi. 606-615 [doi]
- State of the Art in Wireless Sensor Networks Operating Systems: A SurveyMuhammad Omer Farooq, Sadia Aziz, Abdul Basit Dogar. 616-631 [doi]
- A Study on the Implementation of Pigpen Management System Using Wireless Sensor NetworksJeong-hwan Hwang, Jiwoong Lee, Ho Chul Lee, Hyun Yoe. 632-641 [doi]
- A Study on Energy Efficient MAC Protocol of Wireless Sensor Network for Ubiquitous AgricultureHo Chul Lee, Ji-Woong Lee, Jeong-hwan Hwang, Hyun Yoe. 642-650 [doi]
- Design and Implementation of Wireless Sensor Networks Based Paprika Green House SystemJi-Woong Lee, Ho Chul Lee, Jeong-hwan Hwang, Yongyun Cho, Chang-Sun Shin, Hyun Yoe. 651-660 [doi]
- A Smart Service Model Using Smart DevicesYongyun Cho, Hyun Yoe. 661-666 [doi]
- An Implementation of the Salt-Farm Monitoring System Using Wireless Sensor NetworkJongGil Ju, InGon Park, Yong-Woong Lee, Jong-Sik Cho, HyunWook Cho, Hyun Yoe, Chang-Sun Shin. 667-675 [doi]
- Mobile Business Agents Model and ArchitectureHaeng-Kon Kim. 676-685 [doi]
- Implementation of Greenhouse Monitoring System Using Ubiquitous Sensor Networks Based on WMNJeong-hwan Hwang, Hyun Yoe. 686-698 [doi]
- A Study of the Energy Efficient MAC Protocol Apply to Ubiquitous Livestock FarmingHo Chul Lee, Jeonghwan Hwang, Hyun Yoe. 699-707 [doi]
- Design and Implementation of Middleware for GreenHouse Based on Ubiquitous Sensor NetworkJi-Woong Lee, Jeong-hwan Hwang, Hyun Yoe. 708-718 [doi]
- A Context-Aware Streaming Agent Method for Optimal Seamless Service in a Vertical Handover EnvironmentInwhee Joe, Jong-Yong Park. 719-726 [doi]
- A Message Priority Routing Protocol for Delay Tolerant Networks (DTN) in Disaster AreasInwhee Joe, Sang-Bo Kim. 727-737 [doi]
- A Queue Management Algorithm for QoS Provisioning in WMSNJunghye Kim, Seongwon Myung, Yongjae Jang, Sungkeun Lee. 738-750 [doi]
- OLAP Data Cube Compression Techniques: A Ten-Year-Long HistoryAlfredo Cuzzocrea. 751-754 [doi]