Abstract is missing.
- RoboPress - An Automated Mobile Press for Manufacturing Concrete ProductsGeorge K. Adam, Edward Grant, Gordon K. Lee. 3-8 [doi]
- Keynote 1: Grid Computing: Opportunities for Bioinformatics ResearchAlbert Y. Zomaya. 3 [doi]
- Keynote 2: Trust and Reputation Relationships in Service-Oriented EnvironmentsElizabeth Chang, Tharam S. Dillon, Farookh Khadeer Hussain. 4-14 [doi]
- Local Path Planning Based on New Repulsive Potential Functions with Angle DistributionsDong Hun Kim, Hyun-Woo Lee, Seiichi Shin, Tomoharu Suzuki. 9-14 [doi]
- Virtual Repulsive Force in Competitive Multi-Robot TeleoperationChunying Zhao, Jingtai Liu, Yujuan Li, Tao Chen, Lei Sun. 15-20 [doi]
- Keynote 3: Digital Inpainting - Survey and Multilayer Image Inpainting AlgorithmsTimothy K. Shih, Rong-Chi Chang. 15-24 [doi]
- Algorithm for Robot Writing Using Character SegmentationSalman Yussof, Adzly Anuar, Karina Fernandez. 21-24 [doi]
- The Ant Algorithm for Solving Robot Path Planning ProblemGengqian Liu, Tiejun Li, Yuqing Peng, Xiangdan Hou. 25-27 [doi]
- Keynote 4: Can Parallel Software Catch up with Parallel Hardware? Trends in Automatic ParallelizationMinyi Guo. 25 [doi]
- Application of Two Synaptic Weight Neural Networks for Nonlinear ControlWenming Cao, Shoujue Wang. 28-31 [doi]
- Conceptual Modelling within the MAS-CommonKADS Plus OPEN Method Engineering ApproachQuynh-Nhu Numi Tran, Brian Henderson-Sellers, John K. Debenham, Cesar Gonzalez-Perez. 29-34 [doi]
- A Metamodel for the Behavior Trees Modelling TechniqueCesar Gonzalez-Perez, Brian Henderson-Sellers, R. Geoff Dromey. 35-39 [doi]
- Using Real-Time Traffic Pattern Detection for Dynamic Cache Size Tuning in Information RetrievalRichard S. L. Wu, Allan K. Y. Wong, Tharam S. Dillon. 35-40 [doi]
- Design and Implementation of a Model for Business Rules AutomationSaqib Ali, Ben Soh, Torab Torabi. 40-45 [doi]
- The Research and Design of Business Component Reuse in Enterprise Information System IntegrationYinzhang Guo, Guoyou Zhang, Lipin Xie, Yubin Xu. 41-44 [doi]
- Flexible Concurrency Control for Collaborative Office SystemsHaifeng Shen, Suiping Zhou, Chengzheng Sun. 45-50 [doi]
- Using UML2.0 and GG for Describing the Dynamic of Software ArchitecturesMohamed Hadj Kacem, Mohamed Jmaiel, Ahmed Hadj Kacem, Khalil Drira. 46-51 [doi]
- A Cost Effective Spacial Redundancy with Data-Path PartitioningShigeharu Matsusaka, Koji Inoue. 51-56 [doi]
- Applying Machine Learning Using Case-Based Reasoning (CBR) and Rule-Based Reasoning (RBR) Approaches to Object-Oriented Application Framework DocumentationHajar Mat Jani, Sai Peck Lee. 52-57 [doi]
- Partition-Based Parallel PageRank AlgorithmArnon Rungsawang, Bundit Manaskasemsak. 57-62 [doi]
- Providing Agent Support for Collaborative Systems: Using a Domain Oriented Design MethodI. T. Hawryszkiewycz. 58-63 [doi]
- Extending Metadata with Scenarios in Adaptive Distributed SystemYanni Wu, Kuo Zhang, Xiaoge Wang, Jinlan Tian. 63-68 [doi]
- PURPLE: A Reflective Middleware for Pervasive ComputingKuo Zhang, Xiaoge Wang, Yanni Wu, Zhenkun Zheng. 64-69 [doi]
- Virtual Disk Reconfiguration with Performance Guarantees in Shared Storage EnvironmentYong Feng, Yan-yuan Zhang. 69-74 [doi]
- DREAM: A Practical Product Line Engineering Using Model Driven ArchitectureSoo Dong Kim, Hyun Gi Min, Jin Sun Her, Soo Ho Chang. 70-75 [doi]
- A Wallet-Size Cluster for H.264 EncodingLiang-Teh Lee, Chia-Ying Tseng, Kang-Yuan Liu, Kuan-Ching Li. 75-80 [doi]
- Royalty Rate of Business Method Patents for Large Scale Software ApplicationsShigeo Kaneda, Takuya Senbo, Kazunori Fujimoto. 76-81 [doi]
- E-DM: A QoS-Enabled Storage Service Schedule System in Shared Storage EnvironmentYong Feng, Yan-yuan Zhang. 81-84 [doi]
- A Hybrid Approach in the Evaluation of Usability for Multimedia Objects: Case Study of the Media Assets Management Platform for an Advertainment Production Project toward Beijing Olympics 2008Natalie Lee-San Pang, Sanxing Cao, Don Schauder, Rody R. Klein. 82-87 [doi]
- Sharing the Same Operation with a Large Number of Users Using P2PTakashi Yamanoue. 85-88 [doi]
- XBMS - An Open XML Bibliography Management SystemTseng-Chang Yen, Shang-Juh Kao. 88-94 [doi]
- An Internet-Enabled Setup Planning SystemWenjian Liu, Gaoliang Peng. 89-92 [doi]
- GCSLight: A Light-Weight Group Communication Service for Metadata Server ClusterRui-yong Jia, Yan-yuan Zhang, Yong Feng. 93-96 [doi]
- Business-Process-Oriented Software Requirements Automatic GeneratorZaobin Gan, Deng-Wen Wei, Jin-Long Zhang, Vijay Varadharajan. 95-98 [doi]
- Service-Cloud Model of Composed Web ServicesYanping Chen, Zeng-zhi Li, Li Wang, Huaizhou Yang. 97-100 [doi]
- A New Adaptive Business Model for E-CommerceSaqib Ali, Ben Soh, Torab Torabi. 99-102 [doi]
- Research on Load Balance of Multi Clusters Architecture Based on Business Components PartitionYiqiang Zheng, Heqing Guo, Wei Gao, Botong Xu. 101-104 [doi]
- The Method to Choose Architectural Approaches in the Software Architecture Design PhaseHyonHee Koh, SangHwan Kung, Jaenyun Park. 103-106 [doi]
- Computing Tumour Coverage as a Result of Respiratory Motion during Radiotherapy TreatmentJ. Chen, Mark Lanthier, Melissa Macpherson, Doron Nussbaum. 107-112 [doi]
- Integrating Code Generators into the C# LanguageDirk Draheim, Christof Lutteroth, Gerald Weber. 107-110 [doi]
- Evaluating the Performance and Scalability of Web Application SystemsZaobin Gan, Deng-Wen Wei, Vijay Varadharajan. 111-114 [doi]
- Bush Babies Broadband: On-Demand Virtual Neonatal Intensive Care Unit Support for Regional AustraliaCarolyn McGregor, Bruce Kneale, Mark Tracy. 113-118 [doi]
- Conceptual Nuclear Decommissioning Knowledge Management System DesignI-Hsin Chou, Chin-Feng Fan, Yen-Chang Tzeng. 115-118 [doi]
- Applying Information Technology to Produce Affordable IT Solutions for Small BusinessAnthony Van Donselaar, Lisa Twigg, David Tien. 119-123 [doi]
- Intelligent User-Support in Learning Environments for Remote ExperimentationJim Harkin, Michael J. Callaghan, T. Martin McGinnity, Liam P. Maguire. 119-124 [doi]
- Compiler Development in Component-Oriented Software Development (COSD): Issues and ChallengesHazleen Aris. 124-127 [doi]
- Client-Server Architecture for Collaborative Remote ExperimentationMichael J. Callaghan, Jim Harkin, M. El-Gueddari, T. Martin McGinnity, Liam P. Maguire. 125-129 [doi]
- Certified Assessment Artifacts for ePortfoliosNicholas L. Carroll, Rafael A. Calvo. 130-135 [doi]
- Agent-Based Network Intrusion Detection System Using Data Mining ApproachesCheung-Leung Lui, Tak-Chung Fu, Ting-Yee Cheung. 131-136 [doi]
- Lightweight Desktop-Sharing System for Web BrowsersSatoshi Ichimura, Yutaka Matsushita. 136-141 [doi]
- Buyer-Supplier Negotiation by Fuzzy Logic Based AgentsChi-Bin Cheng, Chu-Chai Henry Chan, Cheng-Chuan Lin. 137-142 [doi]
- Employing Wikis for Online Collaboration in the E-Learning Environment: Case StudyRuth S. Raitman, Naomi Augar, Wanlei Zhou. 142-146 [doi]
- Ontology-Based Resource Descriptions for Distributed Information SourcesHui Yang, Minjie Zhang. 143-148 [doi]
- Tools for Inclusive Play: Developing Auslan for Kinder Kirsten Ellis. 147-152 [doi]
- SBT-Forest, an Indexing Approach for Specialized Binary TreeTak-Chung Fu, Fu-Lai Chung, Robert Wing Pong Luk, Chak-man Ng. 149-154 [doi]
- A New Remote Laboratory for Hardware Experiment with Shared Resources and Service ManagementNorihiro Fujii, Nobuhiko Koike. 153-158 [doi]
- Security and Trust Enhanced Mobile Agent Based System DesignD. Foster, Vijay Varadharajan. 155-160 [doi]
- Designing Multimedia for Differences: e-Lecturer, e-Tutor, and e-Student PerspectivesVladlena Benson, Lara A. Frumkin, Alan Murphy. 159-164 [doi]
- Multimodal Communication System Allowing Man and Avatar to Use Voice and BeckYasuhiro Watanabe, Norihiro Abe, Kazuaki Tanaka, Hirokazu Taki, Tetsuya Yagi, Shoujie He. 161-166 [doi]
- Framework for an IT-Supported Balanced Scorecard in Health CareHolger Kunz, Thorsten Schaaf, Jürgen Braun, Thomas Tolxdorff. 165-168 [doi]
- Multivariate Interdependent Discretization for Continuous AttributeSam Chao, Yiping Li. 167-172 [doi]
- Embedding Information Retrieval and Nearest-Neighbour Algorithm into Automated Essay Grading SystemS. M. F. D. Syed Mustapha, Norisma Idris, Rukaini Abdullah. 169-172 [doi]
- Combining Diversity-Based Active Learning with Discriminant Analysis in Image RetrievalCharlie K. Dagli, Shyamsundar Rajaram, Thomas S. Huang. 173-178 [doi]
- Evaluation of Students Performance in Online Seminars via Email with Mobile PhonesKazunori Hino, Kazuo Terashima, Teruyuki Bunno, Takashi Yamanoue, Nobuyuki Hino. 173-176 [doi]
- Ontology Querying and Its Software Component for Design Support in Supply ChainsIncheon Paik, Hiroyuki Akimoto. 179-184 [doi]
- Classify of Underwater Target Utilizing Audio FingerprintJian Yuan, Xin-Wen Xu, Chang-Jian Fu, Guo-hui Li. 179-184 [doi]
- Querying on News Stream by Using Random ProjectionHirohito Oh uchi, Takao Miura, Isamu Shioya. 185-190 [doi]
- Self-Organizing Gaussian Fuzzy CMAC with Truth Value RestrictionMinh Nhut Nguyen, Daming Shi, Chai Quek. 185-190 [doi]
- A New Classification Scheme for Software AgentsAaron Hector, V. Lakshmi Narasimhan. 191-196 [doi]
- The Network Monitoring Tool - PickPacketBrajesh Pande, Deepak Gupta, Dheeraj Sanghi, Sanjay Kumar Jain. 191-196 [doi]
- SAFE Model Approach to Construction of Intelligent Security SystemsZenon Chaczko, Sourendra Nath Sinha. 197-202 [doi]
- Autonomous Concept Formation in Software Agents for Extending OntologiesElise Langham, Seth Bullock. 197-202 [doi]
- Wireless Sensor Network Based System for Fire Endangered AreasZenon Chaczko, Fady Ahmad. 203-207 [doi]
- Decision Supporting Functionality in a Virtual Enterprise NetworkHenry C. W. Lau, George T. S. Ho. 203-208 [doi]
- QoS Functions and Theorems for Moving Wireless NetworksJohnson I. Agbinya. 208-213 [doi]
- Mechanism of Semantic Oriented Flexible WorkflowYi-ming Wu, Joan Lu, Shaowen Yao, Zhi-jie Zheng. 209-214 [doi]
- Real-Time Representation of Network Traffic Behavior for Enhanced SecurityJohn C. McEachen, John Zachary. 214-219 [doi]
- An Agent Related Implementation on the Web Information Retrieval SystemJoan Lu, Umair Rahman, Shaowen Yao. 215-220 [doi]
- Dynamic Topic Mapping Using Latent Semantic IndexingFrédéric Andrès, Motomu Naito. 220-225 [doi]
- Towards a Web Digital Archive Ontological UnificationJuan P. Palacios, José Cremades, Carmen Costilla. 221-226 [doi]
- A Method of Remote Sensing Image Retrieval Based on ROILei Niu, Lin Ni, Wei Lu, Miao Yuan. 226-229 [doi]
- A Grid Semantic Approach for a Digital Archive Integrated ArchitectureAntonio Calleja, MarÃa José RodrÃguez, Carmen Costilla, Raúl Fernández. 227-232 [doi]
- The Multifaceted and Ever-Changing Directions of Information Security - Australia Get Ready!Leanne Ngo, Wanlei Zhou. 230-233 [doi]
- A Design Methodology for Semantic Web Database-Based SystemsMarÃa del Mar Roldán GarcÃa, Ismael Navas Delgado, José Francisco Aldana Montes. 233-237 [doi]
- The Research of Data Mining Based on Extension SetsQing Lu, Yongquan Yu. 234-237 [doi]
- Satellite Interference Detection Using Real-Time Watermarking Technique for SMSChuen-Ching Wang, Yih-Chuan Lin, Shu-Chung Yi. 238-241 [doi]
- A Formal Description of Ontology Change in OWLJohn Avery, John Yearwood. 238-243 [doi]
- Experimental Findings on Collaborative Interactions in a Co-Located EnvironmentNorlaila Hussain, Oscar de Bruijn, Zainuddin Hassan. 242-245 [doi]
- Searching the Web: From Keywords to Semantic QueriesJosé A. Royo, Eduardo Mena, Jorge Bernad, Arantza Illarramendi. 244-249 [doi]
- A Novel OFDM Synchronization AlgorithmHu Liu, Yu hong Duan, Guang qing Xi, Li yun Luo. 249-254 [doi]
- Design and Implementation of Negotiation Agent of Dynamic Supply ChainXiaohong Li, Danjie Yang, Zhiyong Feng. 250-255 [doi]
- Performance Analysis of Multiple Packets Combining Decoding in HARQYanping Lu, Weiling Wu. 255-258 [doi]
- An Ontology Search Engine Based on Semantic AnalysisMingxia Gao, Chunnian Liu, Furong Chen. 256-259 [doi]
- Design of Binary Multi-code CDMA System with Constant AmplitudeJin Kwan Kim, Sang-Woo Kim, Kee-Hoo Yoon, Heung-Gyoon Ryu. 259-264 [doi]
- Application of Data Mining in Fault Diagnosis Based on OntologyXiangdan Hou, Junhua Gu, Xueqin Shen, Weili Yan. 260-263 [doi]
- Multi-Agent Based Modeling and Simulation of Consensus Formations in ArgumentsKosuke Ono, Masateru Harao, Kouichi Hirata. 264-267 [doi]
- A Lightweight UI Software Infrastructure for Wrist-Based Displays: If Your Microwave Oven Could Talk to Your Watch, What Would It Say?Peter Hutterer, Mark T. Smith, John Ankcorn, Wayne Piekarski, Bruce H. Thomas. 265-270 [doi]
- The Survey and Expansion on Quantitative Methods to Conflict ResolutionChih-Yao Lo, Chen-Feng Wu. 268-271 [doi]
- p-MANET: Efficient Power Saving Protocol for Multi-Hop Mobile Ad Hoc NetworksChiung-Ying Wang, Chi-Jen Wu, Guan-Nan Chen, Ren-Hung Hwang. 271-276 [doi]
- Using Information-Flow Theory to Support Information Interoperability in the GridWeihua Li, Shixian Li. 272-275 [doi]
- A Framework for Intelligent Meta-search Engine Based on AgentJunjie Chen, Wei Liu. 276-279 [doi]
- The MTCR Scheme for the Integrated Multiple Rate Mobile Data NetworksJeich Mar, Shang Weng Wang. 277-282 [doi]
- Using of Clustering Algorithm CWSP-PAM for Rural Network PlanningLamiaa Fattouh Ibrahim. 280-283 [doi]
- Constructing Long-Lived Scatternets in Bluetooth NetworksHong-Yi Chang, Chang-Wu Yu. 283-288 [doi]
- Pattern Discovery from Few DataHsiao-Fan Wang. 284-287 [doi]
- A Study of the Time Effect during Data ProcessingZenggui Ou. 288-290 [doi]
- A Mobility Model with Group Partitioning for Wireless Ad Hoc NetworksJim Mee Ng, Yan Zhang. 289-294 [doi]
- The Design and Implement of Virtual Instrument Based on Computing Technique and USB PlatformGuangfan Shi, Guangming Yan, Jigang Li, Guanran Wang, Zeguo Cheng. 291-294 [doi]
- Multipath Channel Models for Wireless Local and Metropolitan Area NetworksKyungsoo Jeong, S. H. Kim, K. M. Chung, J. C. Kim, J. H. Yu, J. S. Lee, S. H. Seo. 295-298 [doi]
- Comparison between Fuzzy and NN Method for Speech Emotion RecognitionAishah Abdul Razak, Ryoichi Komiya, Mohamad Izani Zainal Abidin. 297-302 [doi]
- Adaptive Modulation with Space-Time Block Coding for MIMO-OFDM SystemsKevin H. Lin, Seedahmed S. Mahmoud, Zahir M. Hussain. 299-304 [doi]
- LMRL: A Multi-Agent Reinforcement Learning Model and AlgorithmBen-Nian Wang, Yang Gao, Zhaoqian Chen, Jun-Yuan Xie, Shifu Chen. 303-307 [doi]
- A Transparent Cache-Based Mechanism for Mobile Ad Hoc NetworksYing-Hong Wang, Jenhui Chen, Chih-Feng Chao, Chien-Min Lee. 305-310 [doi]
- Quantum NN vs. NN in Signal RecognitionXin-Yi Tsai, Yu-Ju Chen, Huang-Chu Huang, Shang Jen Chuang, Rey-Chue Hwang. 308-312 [doi]
- A Novel Time and Frequency Synchronization Approach for OFDM SystemsJibin Wang, Jinkang Zhu. 311-315 [doi]
- Fast Learning Neural Network with Modified NeuronsRey-Chue Hwang, Yu-Ju Chen, Shang Jen Chuang, Huang-Chu Huang, Wei-Der Chang. 313-318 [doi]
- Performance Tuning in the MacauMap Mobile Map ApplicationRobert P. Biuk-Aghai. 316-321 [doi]
- Development of Life Originated Artificial Designer SystemYandong Wang, Kezheng Huang. 319-324 [doi]
- Using the LAS Space-Time Spreading Codes to Achieve High Spectral EfficiencyHao Jiang. 322-325 [doi]
- Study and Implementation of the Expert System for Greenhouse Tomato PlantingWei-Long Ding, Fan-lun Xiong, Zhi-jun Cheng. 325-329 [doi]
- PAPR Reduction in MC/DS CDMA System by DFT Spreading CodesYingshan Li, Ju-Hyun Kyung, Jong-Won Son, Heung-Gyoon Ryu. 326-329 [doi]
- A PAPR Reduction Method Using the Correlation of Information in OFDM Communication SystemSang-Woo Kim, Hun-Hee Lee, Chan-Ho Park, Rag Gyu Jung, Heung-Gyoon Ryu. 330-333 [doi]
- Tractor-Implement Dynamic Trajectory Model for Automated Navigation ApplicationsLei Feng, Yong He, Qin Zhang. 330-335 [doi]
- Wide Area Service Discovery and Adaptation for Mobile Clients in Networks with Ad Hoc BehaviourGennadi Oumanski, Peter Bertók. 334-337 [doi]
- Data Mining - An Adaptive Neural Network Model for Financial AnalysisShuxiang Xu, Ming Zhang. 336-340 [doi]
- Over-Saturated Wavelet Packet Multiple Access Communication and Its Multi-User DetectionPeng Liang, Chuan-gang Zhao, Weiling Wu. 338-341 [doi]
- Nonlinear Nearest-Neighbour Matching and Its Application in Legal Precedent RetrievalRuili Wang, Yiming Zeng. 341-346 [doi]
- Using Look-Ahead Protocol for Mobile Data BroadcastKwok-Wa Lam, C. S. Wong, William Leung. 342-345 [doi]
- WiPS: Location and Motion Sensing Technique of IEEE 802.11 DevicesTeruaki Kitasuka, Kenji Hisazumi, Tsuneo Nakanishi, Akira Fukuda. 346-349 [doi]
- A Two Level Lexical Stress Assignment Model for Highly Inflected Slovenian LanguageTomaz Sef. 347-351 [doi]
- Performance of a Multiple Access Orthogonal Wavelet Division Multiplexing SystemBenjamin A. Liew, Stevan M. Berber, Gobindar S. Sandhu. 350-353 [doi]
- The Use of Formal Grammars in Isolated Word RecognitionChaiyaporn Chirathamjaree. 352-356 [doi]
- Crop Nutrition Diagnosis Expert System Based on Artificial Neural NetworksHaiyan Song, Yong He. 357-362 [doi]
- Use Symmetrical Color-Spatial Feature for Image ComparisonBing Zhou, Shou-zhi Wei. 357-360 [doi]
- Robust Image Watermarking Scheme Based on SubsamplingYonggang Fu, Ruimin Shen, Liping Shen. 361-365 [doi]
- Particle Swarm Optimization Learning Fuzzy Systems DesignHsuan-Ming Feng. 363-366 [doi]
- Error Detection and Copyrights Protection Scheme for MPEG-2 Based on Channel Coded Watermark SignalChangseok Bae, Yuk Ying Chung, Xiaoming Chen, PengHao Wang. 366-370 [doi]
- Constraints for Automated Generating Chinese MetaphorsChang Su, Changle Zhou. 367-370 [doi]
- Utilizing Disks for the Available Link Bandwidth Video Delivery MethodHideaki Ito, Teruo Fukumura. 371-376 [doi]
- Evolving Task Specific Algorithms for Machine Vision ApplicationsMichael J. Callaghan, T. Martin McGinnity, Liam McDaid. 371-374 [doi]
- A Decomposition Scheme Based on Error-Correcting Output Codes for Ensembles of Text CategorisersJuan Jose GarcÃa Adeva, Rafael A. Calvo. 375-378 [doi]
- Stream-Based Interactive Video Language Authoring Using Correlated Audiovisual WatermarkingRichard Y. D. Xu, Jesse S. Jin, John G. Allen. 377-380 [doi]
- Automatic Vehicle Classification Instrument Based on Multiple Sensor Information FusionWeiming Liu, Xueping Zhao, Jingfang Xiao, Youlong Wu. 379-382 [doi]
- Space-Time OFDM with Adaptive Beamforming for Wireless Multimedia ApplicationsTasso Athanasiadis, Kevin H. Lin, Zahir M. Hussain. 381-386 [doi]
- Probabilistic Reasoning Techniques for Situation AssessmentsCatherine Howard, Markus Stumptner. 383-386 [doi]
- Experiences with Simulated Robot Soccer as a Teaching ToolRhys Hill, Anton van den Hengel. 387-390 [doi]
- Performance Analysis of Caching Strategies for Proxy-Assisted VOD ServicesChen-Lung Chan, Shih-Yu Huang, Nien-Chen Lin, Jia-Shung Wang. 387-392 [doi]
- A Fuzzy Expert System Based on Reconstructable Neural Network and Its ApplicationRui-Jun Zhang, Ding-Fang Chen, Yu Li. 391-394 [doi]
- Multimedia Multicast Using SPLIT and Layered FECNaveen K. Chilamkurti, Ben Soh. 393-396 [doi]
- Extension Set and Restricting Qualifications of Matter-Elements ExtensionYijing Ju, Yongquan Yu, Guangming Ju, Wen Cai. 395-398 [doi]
- Fuzzy-Based Mass Media Content Management Platform: Architecture and Application ModelSanxing Cao, Xianglin Huang, Rui Lu, Zhanxin Yang. 397-400 [doi]
- Extension Set and the Research of the Extension ADD TransformationQinhua Zhu, Yongquan Yu, Wen Cai. 399-402 [doi]
- Image Indexing in DCT DomainYung-Gi Wu, Je-Hung Liu. 401-406 [doi]
- Automatically Compute the Classical Filed of Matter-Element Model Based on Genetic AlgorithmsHeqing Chen, Yongquan Yu, Zhibin Chen. 403-406 [doi]
- Extension Control Algorithm Using Extension Set in Control SystemYing Huang, Yongquan Yu, Ling Zhang. 407-410 [doi]
- Dynamic Markov Compression Using a Crossbar-Like Tree Initial Structure for Chinese TextsGhim Hwee Ong, Jun-Ping Ng. 407-410 [doi]
- The Related Matter-Elements in Extension Detecting and ApplicationYongquan Yu, Ying Huang, Minghui Wang. 411-414 [doi]
- Perfect KDB-Tree: A Compact KDB-Tree Structure for Indexing Multidimensional DataHung-Yi Lin, Po-Whei Huang. 411-414 [doi]
- Using Fuzzy Functions to Aggregate Usability Study Data: A Novel ApproachSoodamani Ramalingam, Dmitri Iourinski. 415-418 [doi]
- Performance Analysis for Construction of a Performance Practice Support SystemShogo Ozaki, Masateru Harao, Kouichi Hirata. 415-418 [doi]
- Using Topic Keyword Clusters for Automatic Document ClusteringHsi-Cheng Chang, Chiun-Chieh Hsu. 419-424 [doi]
- A Model for Secure Knowledge SharingIsmail Ahmad, Hong Tat Ewe. 421-425 [doi]
- Mutually-Beneficial iE-E Seeker, a Web Intelligent Matching Using Multi-Dimensional Case-Based ReasoningEsyin Chew. 425-428 [doi]
- A New Method for Exchanging Secret KeysEberhard Stickel. 426-430 [doi]
- Using Dempster Shafer Theory to Aggregate Usability Study DataDmitri Iourinski, Soodamani Ramalingam. 429-434 [doi]
- A Defense System against DDoS Attacks by Large-Scale IP TracebackYang Xiang, Wanlei Zhou. 431-436 [doi]
- Iris Feature Extraction Using 2D Phase CongruencyXiaoyan Yuan, Pengfei Shi. 437-441 [doi]
- A Parallel Euler Approach for Large-Scale Biological Sequence AssemblyWei Shi, Wanlei Zhou. 437-441 [doi]
- Optimal Policy for a Class of Compartmental ModelsAye Thanda, Pyke Tin, Koichiro Ochimizu. 442-446 [doi]
- EC-PAY: An Efficient and Secure ECC-Based Wireless Local Payment SchemeGianluigi Me, Maurizio Adriano Strangio. 442-447 [doi]
- Fast Parallel DNA-Based Algorithms for Molecular Computation: Determining a Prime NumberWeng-Long Chang, Michael (Shan-Hui) Ho, Minyi Guo, Xiaohong Jiang, Jingling Xue, Minglu Li. 447-452 [doi]
- An Efficient Authentication Scheme with Fault Tolerance for Database SystemsChang N. Zhang, Chunren Lai, Honglan Zhong. 448-453 [doi]
- Motif Extraction from Biological Sequences: Trends and Contributions to Other Scientific FieldsKaterina Perdikuri, Athanasios K. Tsakalidis. 453-458 [doi]
- Study on NTRU Decryption FailuresWeichi Yu, Dake He, Shixiong Zhu. 454-459 [doi]
- Integration of Knowledge-Discovery and Artificial-Intelligence Approaches for Promoter Recognition in DNA SequencesYin-Fu Huang, Chia-Ming Wang. 459-464 [doi]
- Distributed Denial of Service Attacks and Anonymous Group Authentication on the InternetAmitabh Saxena, Ben Soh. 460-464 [doi]
- Statistical-Based SYN-Flooding Detection Using Programmable Network ProcessorBoonPing Lim, Md. Safi Uddin. 465-470 [doi]
- Protein Ontology: Vocabulary for Protein DataAmandeep S. Sidhu, Tharam S. Dillon, Elizabeth Chang, Baldev S. Sidhu. 465-469 [doi]
- Classification of Alcohol Abusers: An Intelligent ApproachP. Sharmila Kanna, Ramaswamy Palaniappan, K. V. R. Ravi. 470-474 [doi]
- Rights Sensitive Information Sharing Space Based on Multi-Agent SystemSatoshi Amamiya, Makoto Amamiya. 471-476 [doi]
- Comparative Study of Multivariate Classification Methods Using Microarray Gene Expression Data for BRCA1/BRCA2 Cancer TumorsMansoor Raza, Iqbal Gondal, David G. Green, Ross L. Coppel. 475-480 [doi]
- Efficient Secret Sharing Schemes from Room SquareJustie Su-tzu Juan, Chia-Li Huang. 477-481 [doi]
- Privacy Protection in Mobile Agent Based Service DomainHuda Md. Nurul, Shigeki Yamada, Eiji Kamioka. 482-487 [doi]
- Real-Time Spoken Affect Classification and Its Application in Call-CentresDonn Morrison, Ruili Wang, Liyanage C. De Silva, W. L. Xu. 483-487 [doi]
- Capability-Based Egress Network Access Control for Transferring Access RightsShinichi Suzuki, Yasushi Shinjo, Toshio Hirotsu, Kozo Itano, Kazuhiko Kato. 488-495 [doi]
- Accessibility Solutions for Visually Impaired Users of Web Discussion BoardsPaul Andrew Watters, Antonio Araujo, Armin Hezart, Sonali Naik. 488-493 [doi]
- Spoken Communication with Computer Game CharactersTarashankar Rudra, David Tien, Terry Bossomaier. 494-497 [doi]
- A Multimedia Traffic Classification Scheme for Intrusion Detection SystemsOge Marques, Pierre Baillargeon. 496-501 [doi]
- Building a Road Weather Information Network for Integrating Data from Heterogeneous SourcesAwtar Koonar, Paul Delannoy, Dave Denault. 501-507 [doi]
- A Fair Item-Item Exchange Protocol Satisfying Newly Introduced RequirementsHao Wang, Heqing Guo, Manshan Lin, Jianfei Yin. 502-507 [doi]
- WiFiAdmin: An Intelligent Web-Based Management Environment for Wireless NetworksEythimios Dimopoulos, Athanasios Panousis, Evangelos Sakkopoulos, Athanasios K. Tsakalidis. 508-513 [doi]
- Security for Authenticated Key Exchange Based on Non-MalleabilityHiroki Hada, Keisuke Tanaka. 508-513 [doi]
- Automated Question Answering: Review of the Main ApproachesAndrea Andrenucci, Eriks Sneiders. 514-519 [doi]
- Universal Designated-Verifier Signature with AggregationAkihiro Mihara, Keisuke Tanaka. 514-519 [doi]
- Enhancing RSS Feeds: Eliminating Overhead through Binary EncodingRobbie De Sutter, Sam Lerouge, Davy De Schrijver, Rik Van de Walle. 520-525 [doi]
- Recognising Individuals Using Their Brain PatternsK. V. R. Ravi, Ramaswamy Palaniappan. 520-523 [doi]
- A Description Logic for PKI Trust Domain ModelingHaibo Yu 0002, Chunzhao Jin, Haiyan Che. 524-528 [doi]
- Study on Farm Information Acquisition by Using Wireless Remote Methods and Treatment SystemsYong He, Haihong Yu, Zhengjun Qiu. 526-530 [doi]
- Building Scale-Free Overlay Mix Networks with Small-World PropertiesTianbo Lu, Binxing Fang, Yuzhong Sun, Xueqi Cheng, Li Guo. 529-534 [doi]
- Robust Routing Table Design for IPv6 LookupS. M. Yong, H. T. Ewe. 531-536 [doi]
- A Scalable Grouping Random Key Predistribution Scheme for Large Scale Distributed Sensor NetworksPo-Jen Chuang, Tun-Hao Chao, Bo-Yi Li. 535-540 [doi]
- On Dynamic Routing and Wavelength Assignment in Multi-granular All-Optical NetworksChing-Fang Hsu, Te-Lung Liu, Fang-Sheng Lin. 537-542 [doi]
- Efficient Security Mechanisms for the Distributed Wireless Sensor NetworksPrasan Kumar Sahoo, Jonathan Jen-Rong Chen, Ping-Tai Sun. 541-546 [doi]
- A Web Redirection Service for Variant Chinese Domain Name ResolutionJeng-Wei Lin, Li-Ming Tseng, Jan-Ming Ho, Feipei Lai. 543-548 [doi]
- FPGA and ASIC Implementation of ECC Processor for Security on Medical Embedded SystemJin Park, Jeong-Tae Hwang, Young-Chul Kim. 547-551 [doi]
- Incomplete Test Vectors Fail to Detect Obscure VoIP Software ErrorsTeck-Kuen Chua, David C. Pheanis. 549-554 [doi]
- A Framework for Quantifying Information System SurvivabilityXuegang Lin, Miaoliang Zhu, RongSheng Xu. 552-555 [doi]
- Single Event Effects as a Reliability Issue of IT InfrastructureEishi Ibe, Hideaki Kameyama, Yasuo Yahagi, Hironaru Yamaguchi. 555-560 [doi]
- Application of Rough Set Theory in Network Fault DiagnosisYuqing Peng, Gengqian Liu, Tao Lin, Hengshan Geng. 556-559 [doi]
- Some Remarks on Security of Receipt-Free E-auctionYong-Sork Her, Kenji Imamoto, Kouichi Sakurai. 560-563 [doi]
- Zero-Skew Driven for RLC Clock Tree Construction in SoCChia-Chun Tsai, Jan-Ou Wu, Chung-Chieh Kuo, Trong-Yen Lee, Wen-Ta Lee. 561-566 [doi]
- The Authorization Service in Dynamic Trust DomainsWu Liu, Jianping Wu, Hai-Xin Duan, Xing Li. 564-567 [doi]
- Research on Knowledge Communication of Dynamic Virtual Communities Based on OntologyLi Wang, Xueli Yu. 567-572 [doi]
- Secure Embedded Error Detection Arithmetic CodingPrasit Teekaput, Somphop Chokchaitam. 568-571 [doi]
- Uncovering Attacks on Security ProtocolsWuu Yang. 572-575 [doi]
- Personalized Web Search Results with Profile ComparisonsJun Lai, Ben Soh. 573-576 [doi]
- A Modified (t, n) Threshold Proxy Signature Scheme Based on the RSA CryptosystemWen-Chung Kuo, Ming-Yang Chen. 576-579 [doi]
- Ship Steering System Based on Fuzzy Control Using Real-Time Tuning AlgorithmMinghui Wang, Yongquan Yu, Bi Zeng. 577-580 [doi]
- Protecting Customer s Privacy in Querying Valuable Information Combined with E-Payment SchemeChun-Hua Chen, Chi-Min Lan, Gwoboa Horng. 580-583 [doi]
- Design and Verification for PCI Express ControllerEugin Hyun, Kwang-Su Seong. 581-586 [doi]
- Investigation on Operations of a Secure Communication System Based on the Chaotic Phase Shift Keying SchemeGobindar S. Sandhu, Stevan M. Berber. 584-587 [doi]
- A Study for Packet Buffer Algorithms for a Protocol ProcessorVinod Rajan, Yul Chu. 587-590 [doi]
- Implementation of Velocity Filtering for Sequential ArchitecturesStephen J. Searle. 591-596 [doi]
- Receiver Design for OCDMA Users in a Hybrid OCDMA/WDMA SystemPo-Hao Chang, Chi-Yi Liao, Jun-Ren Chen. 591-594 [doi]
- Algorithms for Intelligent Turret Assembly SystemHock-Woo Tan, Keok-Kee Lee, Leng-Phuan Tay. 595-598 [doi]
- A Robust Watermarking Scheme Combined with the FSVQ for ImagesYih-Chuan Lin, Zni-Kang Huang, Ri-Ting Pong, Chuen-Ching Wang. 597-602 [doi]
- A Compression Layer for NAND Type Flash Memory SystemsWen-Tzeng Huang, Chun-Ta Chen, Yen-Sheng Chen, Chin-Hsing Chen. 599-604 [doi]
- New Approach for Detection Using Wavelet CoefficientsMarwa Chendeb, Mohamad Khalil, Jacques Duchêne. 603-607 [doi]
- A 3D Reconstruction Algorithm Based on 3D Deformable AtlasYing Zhu, Saeid Belkasim. 607-612 [doi]
- Do You Know a Similar Project I Can Learn From? Self-Monitoring of Communities of Practice in the Cultural SciencesRalf Klamma, Marc Spaniol, Matthias Jarke. 608-613 [doi]
- A New Digital Implementation of Ridgelet Transform for Images of Dyadic LengthXia Jun Jun, Ni Lin, Y. Miao. 613-616 [doi]
- Background Noise Distribution after High-Resolution Processing in Ship-Borne RadarZhang Zhong. 614-617 [doi]
- Image Deblurring via Smoothness-Switching on Hölder SpacesMong-Shu Lee. 617-622 [doi]
- A Nonlinear Detection Scheme for Sinusoid in Additive Unknown Colored Gaussian NoiseJianfeng Weng. 618-621 [doi]
- Improved Reconstruction Algorithm from Weighted Sampling Points in Shift-Invariant Signal SpacesJun Xian, Yong He. 622-625 [doi]
- Automatic Colour Detection for Car RepaintingIbrahim Al-Bahadly, Hassane Darhmaoui. 623-628 [doi]
- Performance of Sinusoidally-Distributed Dithering for Signed-Error Constant Modulus AlgorithmJusak Jusak, Zahir M. Hussain. 626-629 [doi]
- Elimination of Exposure Artifacts in Predicted Images by Means of an Adaptive Circular Median FilterMirco Pieper, Anton Kummert. 629-633 [doi]
- A New Approach in Chaos Shift Keying for Secure CommunicationYuu-Seng Lau, Zahir M. Hussain. 630-633 [doi]
- Capsule Endoscopy Image Coding Using Wavelet-Based Adaptive Vector Quantization without Codebook TrainingShaou-Gang Miaou, Shih-Tse Chen, Fu-Sheng Ke. 634-637 [doi]
- Models of the Sea Mixed Waves in Navigating Radar SimulatorDan Liu, Xiangjian He. 634-637 [doi]
- On Accuracy/Robustness/Complexity Trade-Offs in Face VerificationConrad Sanderson, Fabien Cardinaux, Samy Bengio. 638-643 [doi]
- Modified Packet Combining Using Error Forecasting Decoding to Control ErrorC. T. Bhunia. 641-646 [doi]
- An Effective Skeletonization Method Based on Adaptive Selection of Contour PointsPaul Morrison, Ju Jia Zou. 644-649 [doi]
- A Novel Traffic Independent NNC for Dynamic Buffer Tuning to Shorten the RTT of a TCP ChannelWilfred W. K. Lin, Allan K. Y. Wong, Tharam S. Dillon. 647-652 [doi]
- On Local Features for GMM Based Face VerificationConrad Sanderson, Marc Saban, Yongsheng Gao. 650-655 [doi]
- An Intelligent Algorithm for Improving QoS in a Delay-Based End-to-End Congestion Avoidance SchemeLi Yan, Bin Qiu. 653-658 [doi]
- Recent Progresses on Cerebral Vasculature Segmentation for 3D Quantification and Visualization of MRASuhuai Luo, Jesse S. Jin. 656-661 [doi]
- IPv6 Packet Classification Based on Flow Label, Source and Destination AddressesEric C. K. Poh, Hong Tat Ewe. 659-664 [doi]
- WDFB Contourlet and Shearing Invariant for Image DenoisingPeng Zhang, Lin Ni. 662-667 [doi]
- Evaluation of IPv6 and Comparative Study with Different Operating SystemsSulaiman Syed Mohamed, Asaad A. Y. Malik Abusin, David Chieng. 665-670 [doi]
- Automatic Visual Recognition of Face and Body Action UnitsHatice Gunes, Massimo Piccardi. 668-673 [doi]
- A Structured Peer-to-Peer Method to Discover QoS Enhanced Alternate PathsThierry Rakotoarivelo, Patrick Sénac, Aruna Seneviratne, Michel Diaz. 671-676 [doi]
- Adaptive-Centre Candidate Decimation Distance-Dependent Thresholding Search for Motion EstimationGolam Sorwar. 674-679 [doi]
- A Comparison of Ultra Wideband Signal Functions for Wireless Ad Hoc NetworksJohnson I. Agbinya, Ha Dang Truong. 677-682 [doi]
- Region Graph Based Text Extraction from Outdoor ImagesHiroki Takahashi, Masayuki Nakajima. 680-685 [doi]
- A Critical Analysis of Multilayer IP Security ProtocolJoel Sing, Ben Soh. 683-688 [doi]
- On-Line Recognition of Pitman Shorthand for Fast Mobile Text EntryMa Yang, Graham Leedham, Colin Higgins, Swe Myo Htwe. 686-691 [doi]
- On the Use of Snoop with Geostationary Satellite LinksJoel Sing, Ben Soh. 689-694 [doi]
- Mean Shift Object Tracking for a SIMD ComputerJohn G. Allen, Richard Y. D. Xu, Jesse S. Jin. 692-697 [doi]
- Limited Range Wavelength Converter Sharing in WDM NetworksMohammad Mamunur Rashid, Sugang Xu, Yoshiaki Tanaka. 695-700 [doi]
- Online Character RecognitionSuneeta Agarwal, Vikas Kumar. 698-703 [doi]
- The Algorithm of Repeat TPC DecodingYuhuang Ye, Jun Chen. 701-703 [doi]
- An Enhanced Exact Procedure for the CMST ProblemJinpeng Huai, Jun Han. 704-709 [doi]
- Skew Detection of Document Images Using Line Structural InformationChih-Hong Kao, Hon-Son Don. 704-715 [doi]
- FICC-DiffServ: A New QoS Architecture Supporting Resources Discovery, Admission and Congestion ControlsHa Trung Phan, Doan B. Hoang. 710-715 [doi]
- Region-Based Color Correction of ImagesChin-Hao Hsu, Zhih-Wei Chen, Cheng-Chin Chiang. 710-715 [doi]
- A European Knowledgebase Framework for Deployment of Real Time AV-Communication in Distance TeachingJohn B. Stav, Hariklia Tsalapatas. 716-721 [doi]
- Quad-Tree-Based Image Shape Coding with Block CompensationLih-Yang Wang, Ching-Hui Lai, Kuan-Ren Pan. 716-719 [doi]
- Combining Multiple Precision-Boosted Classifiers for Indoor-Outdoor Scene ClassificationDa Deng, Jianhua Zhang. 720-725 [doi]
- Performance Study for Streaming Layered Encoded Videos in Broadcast EnvironmentWing-Fai Poon, Kwok-Tung Lo, Jian Feng. 722-727 [doi]
- Fast Fourier Transform in the Spiral Honeycomb Image AlgebraPhil Sheridan, David M. Alexander, Kelly S. Nunn-Clark. 726-731 [doi]
- Specknets: New Challenges for Wireless Communication ProtocolsKai Juan Wong, D. K. Arvind. 728-733 [doi]
- Mean Shift for Accurate Number Plate DetectionWenjing Jia, Huaifeng Zhang, Xiangjian He. 732-737 [doi]
- A New Sum-of-Disjoint-Products Technique to Determine Network Reliabilities with Known Minimal PathsWei-Chang Yeh. 734-738 [doi]
- Fingerprint Alignment Using Ring ModelFang Li, Maylor K. H. Leung, Chuan Liu. 738-743 [doi]
- Grid Architecture Storage - Utilising Grid Computing for Dynamic Data StorageP. Koszek, K. Sandrasegaran. 739-742 [doi]
- An Efficient EWS for Non-PC DeviceWenbo Zhang, Hai Zhao, Xiaoying Wang, Zhenyu Yin, Ming Zhao. 743-746 [doi]
- Enhancement of Semantics in CBIRZiqiang Feng, David Tien. 744-745 [doi]
- Visual Steganalysis of LSB-Encoded Natural ImagesPaul Andrew Watters, Frances Martin, H. Steffen Stripf. 746-751 [doi]
- A Control Theoretic Analysis of Mixed TCP and UDP Traffic under RED Based on Nonlinear Dynamic ModelLi Wang, Zeng-zhi Li, Yanping Chen. 747-750 [doi]
- Extendable Media Stream Mechanisms for Heterogeneous Communication EnvironmentsKoji Hashimoto, Yoshitaka Shibata. 751-754 [doi]
- Experiments on Emergence Index in Content-Based Image RetrievalSagarmay Deb. 752-755 [doi]
- Automatic Address Assignment for IPv6 End-to-End Multihoming SitesKenji Ohira, Youichi Koyama, Kenji Fujikawa, Yasuo Okabe. 755-758 [doi]
- Fractal Image Compression Methods: A ReviewErjun Zhao, Dan Liu. 756-759 [doi]
- Improved Marking Model ERPPM Tracing Back to DDoS AttackerWu Liu, Hai-Xin Duan, Jianping Wu, Xing Li. 759-762 [doi]
- Automated Feature Points Management for Video Mosaic ConstructionJing Li, Quan Pan, Tao Yang, Stan Z. Li. 760-763 [doi]
- Using Image Contour Recognition in GIS NavigationWei Lai, Donggang Yu, Jiro Tanaka, Cai Fei. 764-767 [doi]
- Managing the Co-Existing Network of IPv6 and IPv4 under Various Transition MechanismsI-Ping Hsieh, Shang-Juh Kao. 765-771 [doi]
- Automatic Seal Imprint Verification System for Bankcheck ProcessingKatsuhiko Ueda, Ken ichi Matsuo. 768-771 [doi]
- Detection of Dominant Points Based on Noise Suppression and Error MinimisationMathew Shearer, Ju Jia Zou. 772-775 [doi]
- An Overview of Research on Reverse Engineering XML Schemas into UML DiagramsAugustin Yu, Robert Steele. 772-777 [doi]
- An Efficient Image Compression Scheme for Air Tickets StorageShengke Wang, Zhiyan Wang, Dehua Zhou. 776-779 [doi]
- UDDI Access ControlJuan Dai, Robert Steele. 778-783 [doi]
- A Hybrid Wavelet-Based Compression SystemVooi Voon Yap, Richard Comley. 780-783 [doi]
- Adaptation of the Balanced Scorecard Model to the IT FunctionsHamid Jahankhani, Justus I. Ekeigwe. 784-787 [doi]