Abstract is missing.
- Resource Demand Prediction-Based Grid Resource Transaction Network Model in Grid Computing EnvironmentIn Kee Kim, Jong Sik Lee. 1-9 [doi]
- A CGM Algorithm Solving the Longest Increasing Subsequence ProblemDavid Semé. 10-21 [doi]
- Computer Assisted Source-Code ParallelisationPeter J. Vidler, Michael J. Pont. 22-31 [doi]
- A Template Language for Agent ConstructionLi Xiaohong, Feng Zhiyong, Li tie, Lv Li. 32-38 [doi]
- Efficient Parallel Processing for ::::K::::-Nearest-Neighbor Search in Spatial DatabasesYunjun Gao, Ling Chen, Gencai Chen, Chun Chen. 39-48 [doi]
- An Adaptive Mobile System Using Mobile Grid Computing in Wireless NetworkJehwan Oh, Seunghwa Lee, Eunseok Lee. 49-57 [doi]
- Comparison of Allocation Algorithms for Mesh Structured Networks with Using Multistage SimulationLeszek Koszalka, Dominik Lisowski, Iwona Pozniak-Koszalka. 58-67 [doi]
- The Election Problem in Asynchronous Distributed Systems with Bounded Faulty ProcessesSeongHoon Park. 68-77 [doi]
- Improving the Genetic Algorithms Performance in Simple Assembly Line BalancingSeren Özmehmet Tasan, Semra Tunali. 78-87 [doi]
- Reformulation and Solution Approaches for an Integrated Scheduling ModelHerbert Jodlbauer, Sonja Reitner, Andreas Weidenhiller. 88-97 [doi]
- Safety of a Client-Based Version Vector Consistency Protocol of Session GuaranteesJerzy Brzezinski, Cezary Sobaniec, Dariusz Wawrzyniak. 98-107 [doi]
- A New I/O Architecture for Improving the Performance in Large Scale ClustersL. M. Sánchez García, Florin Isaila, Félix García Carballeira, Jesús Carretero Pérez, Rolf Rabenseifner, Panagiotis A. Adamidis. 108-117 [doi]
- Performance Modeling of a Fully Adaptive and Fault-Tolerant Wormhole Switching Strategy in 2-D MeshFarshad Safaei, Mahmood Fathy, Ahmad Khonsari, Mohamed Ould-Khaoua. 118-128 [doi]
- Parallelization of Simulations for Various Magnetic System Models on Small-Sized Cluster Computers with MPIFrank Schurz, Dietmar Fey, Dmitri Berkov. 129-138 [doi]
- A New Reflective and Reliable Context-Oriented Event Service Architecture for Pervasive ComputingSung-Keun Song, Hee Yong Youn, Ung-Mo Kim. 139-148 [doi]
- X-Torus: A Variation of Torus Topology with Lower Diameter and Larger Bisection WidthHuaxi Gu, Qiming Xie, Kun Wang, Jie Zhang, Yunsong Li. 149-157 [doi]
- Feedback Vertex Sets in Rotator GraphsChiun-Chieh Hsu, Hon-Ren Lin, Hsi-Cheng Chang, Kung-Kuei Lin. 158-164 [doi]
- Efficient Longest Common Subsequence Computation Using Bulk-Synchronous ParallelismPeter Krusche, Alexandre Tiskin. 165-174 [doi]
- Simulation of Internet Transport Protocols for High Bandwidth-Delay NetworksJunsoo Lee. 175-184 [doi]
- Performance Evaluation of Parallel Systems Employing Roll-Forward Checkpoint SchemesGyung-Leen Park, Hee Yong Youn, Junghoon Lee, Chul Soo Kim, Bongkyu Lee, Sang Joon Lee, Wang-Cheol Song, Yung-Cheol Byun. 185-191 [doi]
- A Purely Distributed Approach for Coupling Scientific and Engineering ApplicationsVicente Berbegall, L. Anthony Drummond, Gumersindo Verdú, Vicente Vidal. 192-201 [doi]
- A Monitoring and Visualization Tool and Its Application for a Network Enabled Server PlatformRaphael Bolze, Eddy Caron, Frederic Desprez, Georg Hoesch, Cyril Pontvieux. 202-213 [doi]
- Parallel Hash Join Algorithms for Dynamic Load Balancing in a Shared Disks ClusterAekyung Moon, Haengrae Cho. 214-223 [doi]
- Towards Reliable and Trustworthy Cooperation in Grid: A Pre-evaluating Set Based Trust ModelXiangli Qu, Jingwei Zhong, Xuejun Yang. 224-235 [doi]
- A Spreading MIMO-OFDM Transmission Scheme for Wireless Mobile EnvironmentSang Soon Park, Tae Jin Hwang, Juphil Cho, Heung Ki Baik. 236-242 [doi]
- A Security Auditing Approach Based on Mobile Agent in Grid EnvironmentsZhenghong Xiao, Changqin Huang, Fuyin Xu. 243-250 [doi]
- XML-Signcryption Based LBS Security Protocol Acceleration Methods in Mobile Distributed ComputingNamje Park, Howon Kim, Kyoil Chung, Sungwon Sohn, Dongho Won. 251-259 [doi]
- Optimization of a Simulation for 300mm FAB Semiconductor ManufacturingDongsik Park, Youngshin Han, Chilgee Lee. 260-268 [doi]
- Performance Analysis Using the Two Kinds of Receiving Gain of Smart Antenna in IS20001X SystemSungsoo Ahn, Minsoo Kim, Jungsuk Lee. 269-275 [doi]
- An Improved Popescu s Authenticated Key Agreement ProtocolEun-Jun Yoon, Kee-Young Yoo. 276-283 [doi]
- SVM Based False Alarm Minimization Scheme on Intrusion Prevention SystemGil-Han Kim, Hyung-Woo Lee. 284-293 [doi]
- Lightweight Wireless Intrusion Detection Systems Against DDoS AttackHyung-Woo Lee. 294-302 [doi]
- One-Time Password Authentication Scheme Using Smart Cards Providing User AnonymityEun-Jun Yoon, Kee-Young Yoo. 303-311 [doi]
- Loss Reduction in Distribution Networks Using Cyclic Best First SearchSang-Yule Choi, Myong-chul Shin, Jae Sang Cha. 312-321 [doi]
- Short-Term Power Demand Forecasting Using Information Technology Based Data Mining MethodSang-Yule Choi. 322-330 [doi]
- A Design of the Flexible Mobile Agents Based on WebYun Ji Na, Il Seok Ko, Gun Heui Han. 331-337 [doi]
- A Sales Agent Using Case-Based Reasoning and Rule-Based Reasoning for E-Commerce SystemYun Ji Na, Il Seok Ko, Jong Min Kwak. 338-345 [doi]
- A New Ciphering Method Associated with Evolutionary AlgorithmFouzia Omary, Abdelaaziz Mouloudi, Abderrahim Tragha, Abdelghani Bellaachia. 346-354 [doi]
- Power Distribution Automation System Using Information Technology Based Web Active DatabaseSang-Yule Choi. 355-364 [doi]
- Alternative Target Density Functions for Radar ImagingAskin Demirkol. 365-374 [doi]
- A Novel Image Restoration Algorithm Based on High-Dimensional Space GeometryWenming Cao, Mei-fen Xie, Shoujue Wang. 375-383 [doi]
- A Fast Image Retrieval System Based on Color-Space and Color-Texture FeaturesChuen-Horng Lin, Kai-Hung Chen, Yung-Kuan Chan. 384-393 [doi]
- Generation of Dynamic Heart Model Based on 4D Echocardiographic ImagesMichal Chlebiej, Pawel Mikolajczak, Krzysztof Nowinski, Piotr Scislo, Piotr Bala. 394-403 [doi]
- Object-Based Image Retrieval Using Dominant Color Pairs Between Adjacent RegionsKi Tae Park, Young Shik Moon. 404-411 [doi]
- Real-Time Vision Tracking AlgorithmEdgar Arce Santana, Jose Martin Luna-Rivera, Daniel U. Campos-Delgado, Ulises Pineda Rico. 412-421 [doi]
- Efficient Method to Perform Isomorphism Testing of Labeled GraphsShu-Ming Hsieh, Chiun-Chieh Hsu, Li-Fu Hsu. 422-431 [doi]
- Camera Motion Parameter Estimation Technique Using 2D Homography and LM Method Based on Projective and Permutation Invariant FeaturesJeong-Hee Cha, Gye-Young Kim. 432-440 [doi]
- Automatic Generation Technique of Three-Dimensional Model Corresponding to Individual VesselsNa-Young Lee, Gye-Young Kim, Hyung-Il Choi. 441-449 [doi]
- Modulating Energy Distribution of Reflected Light Based on ImagesZhanwei Li, Guolin Duan, Jizhou Sun, Lijuan Sun, Xinran Lv. 450-456 [doi]
- Aerodynamic Analysis on the Supersonic Separation of Air-Launching Rocker from the Mother PlaneYoung Mu Ji, Young Shin Kim, Jae-Woo Lee, Young Hwan Byun, Jun-Sang Park. 457-466 [doi]
- Effect of Grid Resolution on the Statistics of Passive Scalar in an Injection-Driven ChannelYang Na, Dongshin Shin, Seungbae Lee. 467-475 [doi]
- Test of Large Eddy Simulation in Complex Flow with High Schmidt NumberYang Na, Seungmin Lee. 476-483 [doi]
- High-End Modeling and Simulation of Cookoff of HMX-Based Energetic MaterialsJack Jai-ick Yoh. 484-490 [doi]
- Multiobjective Optimization Using Adjoint Gradient Enhanced Approximation Models for Genetic AlgorithmsSangho Kim 0002, Hyoung-Seog Chung. 491-502 [doi]
- Development of Automated Generation Algorithm for Skipped Surface in Die DesignSang-Jun Lee, Seoung Soo Lee, Jong-Hwa Kim, Yoon-Jung Kwon. 503-511 [doi]
- Development of Requirement Driven Design Concept Selection Process in Aerospace SystemHyeong-Uk Park, Mee-Young Park, Seung-Jin Lee, Jae-Woo Lee, Yung-Hwan Byun. 512-521 [doi]
- A TMO-Based Tele-operation Model: Supporting Real-Time Applications in Grid EnvironmentsChulgoon Kim, Karpjoo Jeong, Hanku Lee, Moon-hae Kim, Kum Won Cho, Segil Jeon, Jaehoon Ahn, Hyunho Ju. 522-530 [doi]
- Design Trade-Offs and Power Reduction Techniques for High Performance Circuits and SystemTaikyeong T. Jeong, Anthony P. Ambler. 531-536 [doi]
- Cavitation Flow Analysis of Axisymmetric Bodies Moving in the WaterChangjin Lee, Doyoung Byun. 537-545 [doi]
- Design and Implementation of Semantic Web Search System Using Ontology and Anchor TextNam-deok Cho, Eun-ser Lee. 546-554 [doi]
- Design Progress Management for Security Requirements in Ubiquitous Computing Using COQUALMOEun-ser Lee, Sang Ho Lee. 555-564 [doi]
- Web Document Classification Using Changing Training Data SetGilcheol Park, Seoksoo Kim. 565-574 [doi]
- Study on Contents Protection in M-Learning EnvironmentJaekoo Song, Mingyun Kang, Seoksoo Kim. 575-583 [doi]
- Design of Security Session Reuse in Content-Based Load Distribution ServerSeoksoo Kim, Kunhee Han. 584-590 [doi]
- Design of POC System in Ubiquitous EnvironmentSeoksoo Kim, Gilcheol Park. 591-599 [doi]
- The Performance Evaluation of OFDM/HL-16QAM System for Optimizing Image Transmission Quality in Wireless FadingJae-Min Kwak, Yang-Sun Lee, Sung-Eon Cho. 600-608 [doi]
- Reliable Evaluations of URL NormalizationSung Jin Kim, Hyo Sook Jeong, Sang Ho Lee. 609-617 [doi]
- Enhanced Misuse Case Model: A Security Requirement Analysis and Specification ModelSang-soo Choi, So-yeon Kim, Gang-Soo Lee. 618-625 [doi]
- An Analysis of Policy Provisioning Complexity in Accordance with the Application Attributes of the Policy-Based NetworkHyung-Jin Lim, Moonseong Kim, Dong-Young Lee, Tai-Myoung Chung. 626-634 [doi]
- Privacy Preserving Unsupervised Clustering over Vertically Partitioned DataDimitris K. Tasoulis, E. C. Laskari, Gerasimos C. Meletiou, Michael N. Vrahatis. 635-643 [doi]
- Process Development Methodology for U-Integrated Management SystemSeong-Man Choi, Malrey Lee, Cheol-Jung Yoo, Ok-Bae Chang. 644-654 [doi]
- A Study on Agent-Based Integrated Security Management System for Managing Heterogeneous Firewall SystemsDong-Young Lee, Hyung-Jin Lim, Tai-Myoung Chung. 655-664 [doi]
- Optimization of Fuzzy Rules: Integrated Approach for Classification ProblemsYunjeong Kang, Malrey Lee, Yongseok Lee, Thomas M. Gatton. 665-674 [doi]
- A Cooperation Model Using Reinforcement Learning for Multi-agentMalrey Lee, Jae-deuk Lee, Hye-Jin Jeong, YoungSoon Lee, Seong-Man Choi, Thomas M. Gatton. 675-681 [doi]
- Development of Network Event Analysis Algorithm Applying Association RuleSeakjae Han, Wooyoung Soh. 682-689 [doi]
- A New Secure Oblivious Transfer ProtocolSoon-gohn Kim, Heau-Jo Kang. 690-699 [doi]
- Analysis of Security Session Reusing in Distribution Server SystemTai-Hoon Kim, Seoksoo Kim, Hee-Un Park, Myoung-sub Kim. 700-707 [doi]
- Clustered OFDMA in the Multi-path Fading ChannelKyujin Lee, Kyesan Lee. 708-716 [doi]
- Distribution Antenna Diversity System According to Adaptive Correlation Method for OFDM-DS/CDMA in a Frequency Selective Fading ChannelKyesan Lee, Eui-nam Huh. 717-724 [doi]
- MIDAS: Detection of Non-technical Losses in Electrical Consumption Using Neural Networks and Statistical TechniquesIñigo Monedero, Félix Biscarri, Carlos León, Jesús Biscarri, Rocío Millán. 725-734 [doi]
- Hyperbolic Voronoi DiagramZahra Nilforoushan, Ali Mohades. 735-742 [doi]
- Effects of Confinement on Chemical Reaction Equilibrium in Nanoporous MaterialsWilliam R. Smith, Martin Lísal, John K. Brennan. 743-751 [doi]
- Multi-channel Estimation in Multiple Antenna MB-OFDM UWB System for Home Entertainment NetworkMyung-Sun Baek, So-Young Yeo, Byung-Jun Jang, Young-Hwan You, Hyoung-Kyu Song. 752-761 [doi]
- Compiler-Optimized Kernels: An Efficient Alternative to Hand-Coded Inner KernelsJosé R. Herrero, Juan J. Navarro. 762-771 [doi]
- Noise Subspace Fuzzy C-Means Clustering for Robust Speech RecognitionJuan Manuel Górriz, Javier Ramírez, José C. Segura, Carlos García Puntonet, J. J. González. 772-779 [doi]
- Using Box-Muller with Low Discrepancy PointsTim Pillards, Ronald Cools. 780-788 [doi]
- A Fast Integration Method and Its Application in a Medical Physics ProblemShujun Li, Elise de Doncker, Karlis Kaugars, Haisen S. Li. 789-797 [doi]
- Payment in a Kiosk Centric Model with Mobile and Low Computational Power DevicesJesús Téllez Isaac, José Sierra Camara, Antonio Izquierdo Manzanares, Mildrey Carbonell Castro. 798-807 [doi]
- Survivable Mechanism for IEEE 802.11 WLAN ImprovementsFlavio E. de Deus, Ricardo Staciarini Puttini, Luis Molinaro, Joseph Kabara, L. Javier García-Villalba. 808-818 [doi]
- Proposal of a System for Searching and Indexing Heterogeneous Vulnerabilities DatabasesRobson de Oliveira Albuquerque, Fabio Buiati, L. Javier García-Villalba, Daniel Silva Almendra, Leonardo Lobo Pulcineli, Rafael Timóteo de Sousa Júnior, Cláudia J. Barenco Abbas. 819-828 [doi]
- Performance Analysis of Dynamic Host Isolation System in Wireless Mobile NetworksHyuncheol Kim, Seong-Jin Ahn, Jun Kyun Choi. 829-838 [doi]
- Meta-model Driven Collaborative Object Analysis Process for Production Planning and Scheduling DomainChang Kim, Jun-Geol Baek, Jin Jun. 839-850 [doi]
- Response Against Hacking and Malicious Code in P2PWongoo Lee, Sijung Kim, Bonghan Kim. 851-857 [doi]
- Two Efficient and Secure Authentication Schemes Using Smart CardsYoungsook Lee, Junghyun Nam, Seungjoo Kim, Dongho Won. 858-866 [doi]
- Location-Aware Agent Using Data Mining for the Distributed Location-Based ServicesJaewan Lee, Romeo Mark A. Mateo, Bobby D. Gerardo, Sung-Hyun Go. 867-876 [doi]
- An Empirical Development Case of a Software-Intensive System Based on the Rational Unified ProcessKilsup Lee. 877-886 [doi]
- Color Preference and Personality Modeling Using Fuzzy Reasoning RuleAm-suk Oh, Tae-Jung Lho, Jang-Woo Kwon, Kwang-Baek Kim. 887-894 [doi]
- The Development of Reliability Verification Tool of RFID Tag for Effective Product Control SystemsKi-Uk Kim, Hyun-Suk Hwang, Bong-Je Kim, Su-Hwan Jeong, Chang Soo Kim. 895-904 [doi]
- Avoidance of State Explosion Using Dependency Analysis in Model Checking Control Flow ModelSachoun Park, Gihwon Kwon. 905-911 [doi]
- Design and Implementation of Web Usage Mining System Using Page ScrollIl Kim, Bong Joon Choi, Kyoo Seok Park. 912-921 [doi]
- A Security Architecture for Adapting Multiple Access Control Models to Operating SystemsJung-Sun Kim, Seungyong Lee, Minsoo Kim, Jae-Hyun Seo, BongNam Noh. 922-931 [doi]
- Rotor Design for the Performance Optimization of Canard Rotor/Wing AircraftJae-Woo Lee, Kwon-Su Jeon, Min-Ji Kim, Yung-Hwan Byun, Chang J. Kim, Yung H. Yu. 932-941 [doi]
- Process Decomposition and Choreography for Distributed Scientific Workflow EnactmentJae-Yoon Jung, Wookey Lee, Suk-Ho Kang. 942-951 [doi]
- Adaptive Multi-carrier Direct-Sequence CDMA System Using Fast-Frequency-HoppingKyesan Lee, Gigan Lee. 952-957 [doi]
- Object Modeling for Mapping XML Document Represented in XML-GDM to UML Class DiagramDae-Hyeon Park, Chun-Sik Yoo, Yong-Sung Kim, Soon-Ja Yeom. 958-967 [doi]
- A Two-Phase Local Server Security Model Based on XML CertificateYong-Hwa Kim, Jin-Sung Kim, Yong-Sung Kim, Jang-Sup Shim. 968-978 [doi]
- Integrated Object Modeling for Web-Based XML Application DocumentsChun-Sik Yoo, Jin-Sung Kim, Yong-Sung Kim, Jang-Sup Shim. 979-989 [doi]
- Model of Generating SMIL Document Using Temporal Scripts of Animation ComponentChun-Sik Yoo, He-Jue Eun, Yong-Sung Kim, Jang-Sup Shim. 990-1000 [doi]
- Marginal Bone Destructions in Dental Radiography Using Multi-template Based on Internet ServicesYonghak Ahn, Oksam Chae. 1001-1009 [doi]
- The Band Selection Algorithm in Supervised Classification Using Mixed-Pixels and Canonical Correlation AnalysisHoon Chang, Hwan-Hee Yoo, Hong Sok Kim. 1010-1017 [doi]
- Domain Analysis for Components Based DevelopmentsHa Jin Hwang. 1018-1027 [doi]