Abstract is missing.
- DPNA-2005 Organizing Committee [doi]
- SNDS05 Reviewers [doi]
- PMAC-PDG 05 Reviewers [doi]
- PDES-2005 Organizing Committee [doi]
- Message from the DPNA-2005 Chairs [doi]
- ICPADS 2005 - Copyright [doi]
- Welcome from the Program Committee Chair [doi]
- Organizing Committee [doi]
- Message from the General Co-Chairs [doi]
- Message from the PMWMNC-2005 Chairs [doi]
- SaNSO-2005 Program Committee [doi]
- ICPADS 2005 - Title [doi]
- RAMPDS-2005 Reviewers [doi]
- Message from the INVITE-2005 Chairs [doi]
- PMWMCN-2005 Reviewers [doi]
- PDES-2005 Reviewers [doi]
- Message from the HWISE-2005 Chairs [doi]
- ICPADS 2005 Workshops - Copyright [doi]
- INVITE 2005 Organizing Committee [doi]
- DPNA-2005 Reviewers [doi]
- Message from the SNDS05 Chairs [doi]
- SNDS05 Organizing Committee [doi]
- SaNSO-2005 Reviewers [doi]
- Message from the PMAC-PDG 05 Co-Chairs [doi]
- Message from the PDES-2005 Chairs [doi]
- Message from the RAMPDS-2005 Chairs [doi]
- SaNSO 2005 Foreword [doi]
- Message from the HiPCoMB-2005 Chairs [doi]
- HWISE-2005 Organizing Committee [doi]
- RAMPDS-2005 Organizing Committee [doi]
- HWISE-2005 Reviewers [doi]
- INVITE 2005 Reviewers [doi]
- HiPCoMB-2005 Organizing Committee [doi]
- PMAC-PDG 05 Organizing Committee [doi]
- ICPADS 2005 Workshops - Title [doi]
- HiPCoMB-2005 Reviewers [doi]
- Overlay Network Topologies for Gossip-Based MulticastDaisuke Igarashi, Tatsuhiro Tsuchiya, Tohru Kikuno. 2-7 [doi]
- Minimizing Energy via Loop Scheduling and DVS for Multi-Core Embedded SystemsYing Chen, Zili Shao, Qingfeng Zhuge, Chun Xue, Bin Xiao, Edwin Hsing-Mean Sha. 2-6 [doi]
- A Dynamic Node Degree Management Scheme for Energy-efficient Routing Protocols in Wireless Ad Hoc NetworksYi-Cheng Huang, Sheng-Yan Chuang, Sheng-De Wang. 7-11 [doi]
- An Efficient Multi-Source Multicast Routing Protocol in Mobile Ad Hoc NetworksYi-Yu Su, Shiow-Fen Hwang, Chyi-Ren Dow. 8-14 [doi]
- A Hierarchical Approach for Energy-Aware Distributed Embedded Intelligent Video SurveillanceArnold Maier, Bernhard Rinner, Helmut Schwabach. 12-16 [doi]
- A Scalable Multimedia Streaming Model Based-on Multi-source Streaming ConceptSatoshi Itaya, Tomoya Enokido, Makoto Takizawa. 15-21 [doi]
- A Code Generation Algorithm for Affine Partitioning FrameworkShih-Wei Liao, Zhaohui Du, Gansha Wu, Guei-Yuan Lueh. 17-21 [doi]
- Dynamic Scheduling Methods for Computational Grid EnvironmentsSheng-De Wang, I-Tar Hsu, Zheng Yi Huang. 22-28 [doi]
- Constructing a Memory-Based Distributed Code Storage on Networked Diskless Embedded SystemsTai-Yi Huang, Tsung-Yen Chen, Po-Yu Chuang, Tsung-Hao Li. 22-26 [doi]
- Design of a Configurable Embedded Processor Architecture for DSP FunctionsHong Yue, Ming-che Lai, Kui Dai, Zhiying Wang. 27-31 [doi]
- A Scalable Semantic Routing Architecture for Grid Resource DiscoveryJuan Li, Son T. Vuong. 29-35 [doi]
- Cramer-Rao Bound Analysis of Quantized RSSI Based Localization in Wireless Sensor NetworksHongchi Shi, Xiaoli Li, Yi Shang, Dianfu Ma. 32-36 [doi]
- Resource Co-Allocation : A Complementary Technique that Enhances Performance in Grid Computing EnvironmentDriss Azougagh, Jung-Lok Yu, Jin-Soo Kim, Seung Ryoul Maeng. 36-42 [doi]
- Partitioning and Pipelined Scheduling of Embedded System Using Integer Linear ProgrammingShiann-Rong Kuang, Chin-Yang Chen, Ren-Zheng Liao. 37-41 [doi]
- Design and Integration of Parallel Hough-Transform Chips for High-speed Line DetectionMing-Yang Chern, Yi-Hsiang Lu. 42-46 [doi]
- An Adaptive Multiparty Protocol for Secure Data ProtectionQingkai Ma, Liangliang Xiao, I-Ling Yen, Manghui Tu, Farokh B. Bastani. 43-49 [doi]
- Hardware-based Packet Classification Made Fast and EfficientPi-Chung Wang, Chun-Liang Lee, Chia-Tai Chan, Hung-Yi Chang. 47-51 [doi]
- Message Authentication Scheme for Mobile Ad hoc NetworksFumiaki Sato, Hirohisa Takahira, Tadanori Mizuno. 50-56 [doi]
- Embedded Fingerprint Verification SystemGwo-Cheng Chao, Shung-Shing Lee, Hung-Chuan Lai, Shi-Jinn Horng. 52-57 [doi]
- Using Covert Channels to Evaluate the Effectiveness of Flow Confidentiality MeasuresBryan Graham, Ye Zhu, Xinwen Fu, Riccardo Bettati. 57-63 [doi]
- Pulse Position Modulation for Active RFID SystemBin Zhen, Kohei Mizuno, Mamoru Kobayashi, Masashi Shimizu. 58-62 [doi]
- Novel Anti-collision Algorithms for Fast Object Identification in RFID SystemJae-Ryong Cha, Jae-Hyun Kim. 63-67 [doi]
- Byzantine Agreement Protocol using Hierarchical GroupsHiroyuki Yoshino, Naohiro Hayashibara, Tomoya Enokido, Makoto Takizawa. 64-70 [doi]
- A node-based available bandwidth evaluation in IEEE 802.11 ad hoc networksCheikh Sarr, Claude Chaudet, Guillaume Chelius, Isabelle Guérin Lassous. 68-72 [doi]
- Adaptive Box-Based Efficient Fault-tolerant Routing in 3D TorusYamin Li, Shietung Peng, Wanming Chu. 71-77 [doi]
- More Efficient and Secure Remote User Authentication Scheme using Smart CardsEun-Jun Yoon, Kee-Young Yoo. 73-77 [doi]
- Parallel Self-Diagnosis of Large Multiprocessor Systems Under the Generalized Comparison ModelKaouther Abrougui, Mourad Elhadef. 78-84 [doi]
- An Efficient Authentication and Access Control Scheme Using Smart CardsYen-Cheng Chen, Lo-Yao Yeh. 78-82 [doi]
- Secure extensible type system for efficient embedded operating system by using metatypesGilles Grimaud, Yann Hodique, Isabelle Simplot-Ryl. 83-87 [doi]
- A Broadband P2P MoD System: Its Implementation and ApplicationShyh Chang Lui, Tsung Hung Chen, Ciyi Huang. 85-90 [doi]
- Lower and Upper Bounds for Minimum Energy Broadcast and Sensing Problems in Sensor NetworksGuillaume Chelius, Eric Fleury, Thierry Mignon. 88-92 [doi]
- Synchronous Transmission of Real-Time Multimedia Data in Group CommunicationTakuya Tojo, Makoto Takizawa. 91-97 [doi]
- Multicast Scaling Properties in Massively Dense Ad Hoc NetworksPhilippe Jacquet, Georgios Rodolakis. 93-99 [doi]
- An Application-Level Multicast Framework for Large Scale VOD ServicesChen-Lung Chan, Shih-Yu Huang, Hung-Hsuan Chen, Wei-Hao Tung, Jia-Shung Wang. 98-104 [doi]
- Choosing an Accurate Network Model using Domain AnalysisAlmudena Konrad, Ben Y. Zhao, Anthony D. Joseph. 100-104 [doi]
- An Analytical Model for Performance Evaluation of Network Traffic Analysis SystemsArmando Ferro, Igor Delgado, Alejandro Muñoz, Fidel Liberal. 105-109 [doi]
- I/O Processor Allocation for Mesh Cluster ComputersPangfeng Liu, Chun-Chen Hsu, Jan-Jan Wu. 105-111 [doi]
- ModellingWeb transfer Performance over Asymmetric NetworksGuang Tan, Stephen A. Jarvis, Ligang He, Xinuo Chen, Daniel P. Spooner. 110-114 [doi]
- GA-Based Automated Task Assignment on Network ProcessorsShoumeng Yan, Xingshe Zhou, Lingmin Wang, Haipeng Wang. 112-118 [doi]
- Analysis of Discrete-Time Queues with Space and Service Priorities for Arbitrary Arrival ProcessesIrfan-Ullah Awan, Rod J. Fretwell. 115-119 [doi]
- Performance Improvement Techniques for Software Distributed Shared MemoryByung-Hyun Yu, Paul Werstein, Martin K. Purvis, Stephen Cranefield. 119-125 [doi]
- Systematic Performance Modeling and Characterization of Heterogeneous IP NetworksAlessio Botta, Donato Emma, Antonio Pescapè, Giorgio Ventre. 120-124 [doi]
- On the Performance of Probabilistic Flooding in Mobile Ad Hoc NetworksM. Masadeh Bani Yassein, Mohamed Ould-Khaoua, Stylianos Papanastasiou. 125-129 [doi]
- Network-aware Data mMapping on Parallel Molecular DynamicasYuichiro Hourai, Akira Nishida, Yoshio Oyanagi. 126-132 [doi]
- Clustering Overhead and Convergence Time Analysis of the Mobility-based Multi-Hop Clustering Algorithm for Mobile Ad Hoc NetworksInn Inn Er, Winston Khoon Guan Seah. 130-134 [doi]
- A novel micro-mobility management method in wireless communication networkYing-Hong Wang, Chien-Wen Wang, Hui-Min Huang. 133-139 [doi]
- Performance Evaluation for Self-Healing Distributed ServicesElla Grishikashvili Pereira, Rubem Pereira, A. Taleb-Bendiab. 135-139 [doi]
- Variants of Multidimensional Scaling for Node LocalizationAhmed A. Ahmed, Yi Shang, Hongchi Shi. 140-146 [doi]
- The Impact of Random Waypoint Mobility on Infrastructure Wireless NetworksDennis Pong, Tim Moors. 140-144 [doi]
- Performance Modeling of Hand Off calls in 4G NetworksYue Li, Demetres D. Kouvatsos. 145-149 [doi]
- Strategies for Data Location Management in Mobile Ad Hoc NetworksTakahiro Hara. 147-153 [doi]
- An Evaluation Mechanism for QoS Management in Wireless SystemsBehzad Bordbar, Rachid Anane, Kozo Okano. 150-154 [doi]
- A Finite-State-Model Scheme for Efficient Cooperation Enforcement in Mobile Ad Hoc NetworksNing Jiang, Simon Sheu, Kien A. Hua, Onur Ozyer. 154-160 [doi]
- Experimental Performance Modeling of MANET InterconnectivityZhi Ang Eu, Winston Khoon Guan Seah, Kean Soon Tan. 155-161 [doi]
- Activities Awareness in a Cache NetworkShen-Tat Goh, Kian-Lee Tan. 161-167 [doi]
- Collaborative Virtual Traditional Japanese Crafting System over the Japan Gigabit Network IITomoyuki Ishida, Akihiro Miyakawa, Yoshitaka Shibata. 162-166 [doi]
- Interactive Controller for 3D Contents with Omni-directional DisplayYukio Yasuhara, Naohisa Sakamoto, Nobuyuki Kukimoto, Yasuo Ebara, Koji Koyamada. 167-171 [doi]
- Relationship-aware Content Adaptation of Structured Web Documents for Mobile ComputingWai Yip Lum, Francis C. M. Lau. 168-174 [doi]
- Constructing real time simulation using by familiar PCHiroaki Matsuura, Norihiro Abe, Kazuaki Tanaka, Hiroaki Taki. 172-176 [doi]
- Modeling e-Marketplaces with Multi-Agents Web ServicesYinsheng Li, Kuo-Ming Chao, Muhammad Younas, Ying Huang, Xiaohua Lu. 175-181 [doi]
- Proposing Internet Analysis for Improvement of Usability on the 3D virtaul shared SpaceYushi Nakai, Yoshitaka Shibata. 177-176 [doi]
- Position-Based Keyframe Selection for Human Motion AnimationHideyuki Togawa, Masahiro Okuda. 182-185 [doi]
- A Hybrid Web Server Architecture for e-Commerce ApplicationsDavid Carrera, Vicenç Beltran, Jordi Torres, Eduard Ayguadé. 182-188 [doi]
- The Method to Evaluate a Similarity of Two Dimensional Data Using Critical Point GraphTomoki Minami, Koji Sakai, Koji Koyamada. 186-190 [doi]
- Design of Consistent SMIL Documents for Distributed Multimedia Presentation Using Temporal AlgebraAnthony Y. Chang. 189-195 [doi]
- Verbal/Nonverbal Communication Permitting User to Communicate with Virtual Environment without Special InstrumentTatsuya Yoshikawa, Norihiro Abe, Kazuaki Tanaka, Hirokazu Taki, Tetsuya Yagi, Shoujie He. 191-195 [doi]
- Peer Collaboration Modes and Private Room Services in TOMSCOPKei Nakanishi, Takahito Aonuma, Jianhua Ma, Jeneung Lee. 196-200 [doi]
- Concurrency Control Based-on Significancy on RolesTomoya Enokido, Makoto Takizawa. 196-202 [doi]
- GeDA-3D Agent ArchitectureFabiel Zúñiga, Félix F. Ramos, H. Ivan Piza. 201-205 [doi]
- A Model for Distributing and Querying a Data Warehouse on a Computing GridPascal Wehrle, Maryvonne Miquel, Anne Tchounikine. 203-209 [doi]
- Level of Detail Control for Texture on 3D MapsHiroyuki Inatsuka, Makoto Uchino, Masahiro Okuda. 206-209 [doi]
- Performance Analysis of an Adaptive Medium Access Control Protocol for Robot CommunicationJunpei Arai, Akio Koyama, Leonard Barolli. 210-216 [doi]
- A Study of data reduction method with data accuracy for triangle dataTakashi Furukawa, Akio Doi. 210-213 [doi]
- Virtual Object Reconstruction in Real WorldKoji Sakai, Naohisa Sakamoto, Koji Koyamada, Tatsuo Hasegawa. 214-218 [doi]
- A Sniff Scheduling Policy for Power Saving in Bluetooth PiconetXiang Li, Xiaozong Yang. 217-222 [doi]
- 3D visualization techniques and its usefulness of eyeground images data sets generated by Optical Coherence TomographyFumihito Ito, Akio Doi, Masayuki Tokuda. 219-223 [doi]
- Anycast Extensions to OSPFv3Yue Wang, Li Zhang, Zhinan Han, Wei Yan. 223-229 [doi]
- Using a Declarative Language to Describe the Interactions in Virtual ScenesH. Ivan Piza, Fabiel Zúñiga, Félix F. Ramos. 224-229 [doi]
- Peer-to-Peer Based Social Interaction Tools in UbiquitousGuozhen Zhang, Qun Jin, Timothy K. Shih. 230-236 [doi]
- Generating authentication data without keeping a private key for MobilityJong-Phil Yang, Kyung Hyune Rhee. 230-234 [doi]
- Query Forwarding Algorithm Supporting Initiator Anonymity in GNUnetKohei Tatara, Yoshiaki Hori, Kouichi Sakurai. 235-239 [doi]
- An E-learning System for Improving Learner Study Efficiency by Stimulating Learner VolitionSouichirou Takahama, Nobuhiro Nakamura, Leonard Barolli, Akio Koyama, Arjan Durresi, Kaoru Sugita. 237-243 [doi]
- Supporting Efficient Authorization in Delegation with SupervisionRichard W. C. Lui, Sherman S. M. Chow, Lucas Chi Kwong Hui, Siu-Ming Yiu. 240-244 [doi]
- Game Theory As A Tool To Strategize As Well As Predict Nodes Behavior In Peer-to-Peer NetworksRohit Gupta, Arun K. Somani. 244-249 [doi]
- UNIDES: An Efficient Real-Time System to Detect and Block Unauthorized Internet AccessYusuf Uzunay, Kemal Bicakci. 245-249 [doi]
- Path Analysis: Detection of Triangle Routing Attacks in IPv6Su-Kit Tang, Kin Yeung Wong, Kai Hau Yeung. 250-254 [doi]
- Fair and Scalable Peer-to-Peer Games of TurnsAdam Wierzbicki, Tomasz Kucharski. 250-256 [doi]
- A Differentiated Message Delivery Architecture to Control SpamZhenhai Duan, Yingfei Dong, Kartik Gopalan. 255-259 [doi]
- An Efficient Partition-Based Parallel PageRank AlgorithmBundit Manaskasemsak, Arnon Rungsawang. 257-263 [doi]
- The Security Requirement for off-line E-cash system based on IC CardHaeryong Park, Kilsoo Chun, Seungho Ahn. 260-264 [doi]
- On The Cooperation of Web Clients and Proxy CachesYiu-Fai Sit, Francis C. M. Lau, Cho-Li Wang. 264-270 [doi]
- An Efficient and Practical Defense Method Against DDoS Attack at the Source-EndYanxiang He, Wei Chen, Wenling Peng, Bin Xiao. 265-269 [doi]
- Delegatable Access Control for Fine-Grained XMLJing Wu, Jennifer Seberry, Yi Mu, Chun Ruan. 270-274 [doi]
- Performance Evaluation of WWW Conference System for Supporting Remote Mental Health Care EducationKaoru Sugita, Noriki Uchida, Akihiro Miyakawa, Giuseppe De Marco, Arjan Durresi. 271-277 [doi]
- Separable and Anonymous Identity-Based Key IssuingAi Fen Sui, Sherman S. M. Chow, Lucas Chi Kwong Hui, Siu-Ming Yiu, K. P. Chow, Wai Wan Tsang, C. F. Chong, Kevin K. H. Pun, H. W. Chan. 275-279 [doi]
- A Three-layer Architecture for Reconciling Compound Actions in Collaborative Editing SystemsHaifeng Shen, Suiping Zhou. 278-284 [doi]
- Group key distribution scheme for reducing required rekey message sizeRyuzou Nishi, Kouichi Sakurai. 280-284 [doi]
- An Efficient Distributed Key Generation Protocol for Secure Communications with Causal OrderingCaimu Tang, Anthony T. Chronopoulos. 285-289 [doi]
- Integrated Multimedia Understanding for Sensor and Actor Networks Based on Mental Image Directed Semantic TheoryMasao Yokota, Daisuke Hironaka, Valbona Barolli, Genci Capi. 285-291 [doi]
- Key Agreement for Heterogeneous Mobile Ad-Hoc GroupsMark Manulis. 290-294 [doi]
- Delay-Energy Aware Routing Protocol for Sensor and Actor NetworksArjan Durresi, Vamsi Paruchuri, Leonard Barolli. 292-298 [doi]
- Real Time Digital Video Watermarking for Digital Rights Management via Modification of VLCSHung-Hsun Liu, Long-Wen Chang. 295-299 [doi]
- A Localization Scheme for Sensor Networks based onWireless Communication with Anchor GroupsHiroyuki Ochi, Shigeaki Tagashira, Satoshi Fujita. 299-305 [doi]
- Sharing a Secret Two-Tone Image in Two Gray-Level ImagesChin-Chen Chang, Jun-Chou Chuang, Pei-Yu Lin. 300-304 [doi]
- Universal Designated Multi Verifier Signature SchemesChing Yu Ng, Willy Susilo, Yi Mu. 305-309 [doi]
- Process Migration for MPI Applications based on Coordinated CheckpointJiannong Cao, Yinghao Li, Minyi Guo. 306-312 [doi]
- GBR: Grid Based Random Key Predistribution for Wireless Sensor NetworkMohammed Golam Sadi, Dong Seong Kim, Jong Sou Park. 310-315 [doi]
- Performance Evaluation of the Concurrent Execution of NAS Parallel Benchmarks with BYTE Sequential Benchmarks on a ClusterAndrzej M. Goscinski, Adam K. L. Wong. 313-319 [doi]
- A Parallel Implementation of 2-D/3-D Image Registration for Computer-Assisted SurgeryFumihiko Ino, Yasuhiro Kawasaki, Takahito Tashiro, Yoshikazu Nakajima, Yoshinobu Sato, Shinichi Tamura, Kenichi Hagihara. 316-320 [doi]
- A Mechanism for Tracking Mobile Agents in a Cluster TopologyTing-Yuan Yeh, Tzone I. Wang. 320-327 [doi]
- Rotational and Translational Alignment Errors in 3D Reconstruction of Virus Structures at High ResolutionYongchang Ji, Dan C. Marinescu. 321-325 [doi]
- Multiple Sequence Alignment on an FPGATimothy F. Oliver, Bertil Schmidt, Douglas L. Maskell, Darran Nathan, Ralf Clemens. 326-330 [doi]
- Design and Implementation of Advanced Multicast Router Based on Cluster ComputingTakeru Inoue, Seiichiro Tani, Hirokazu Takahashi, Toshiaki Miyazaki, Kan Toyoshima. 328-335 [doi]
- Exploiting Multi-level Parallelism for Homology Search using General Purpose ProcessorsXiandong Meng, Vipin Chaudhary. 331-335 [doi]
- An Efficient Location-Aided Routing Protocol for Mobile Ad Hoc NetworksNen-Chung Wang, Si-Ming Wang. 335-341 [doi]
- Concurrent Numerical Simulation of Flow and Blood Clotting using the Lattice Boltzmann TechniqueJörg Bernsdorf, Sarah E. Harrison, Stephen M. Smith, Patricia V. Lawford, D. Rodney Hose. 336-340 [doi]
- Protein Fold Recognition by Mixed Environment-Specific Amino Acid Substitution Mapping Using Neural NetworksNan Jiang, Wendy Xinyu Wu, Ian Mitchell. 341-345 [doi]
- Efficient Distributed QoS Routing Protocol for MPLS NetworksMan-Ching Yuen, Weijia Jia, Chi-Chung Cheung. 342-348 [doi]
- PRec-I-DCM3: A Parallel Framework for Fast and Accurate Large Scale Phylogeny ReconstructionCristian Coarfa, Yuri Dotsenko, John M. Mellor-Crummey, Luay Nakhleh, Usman Roshan. 346-350 [doi]
- WIN: An Effcient Data Placement Strategy for Parallel XML DatabasesNan Tang, Guoren Wang, Jeffrey Xu Yu, Kam-Fai Wong, Ge Yu. 349-355 [doi]
- Numerical Solutions of Master Equation for Protein Folding KineticsYiming Li. 351-357 [doi]
- Increasing Resiliency through Priority Scheduling of Asynchronous Data ReplicationKevin P. Adams, Denis Gracanin, Michael G. Hinchey. 356-362 [doi]
- A Two-Level Strategy for Topology Control in Wireless Sensor NetworksBolian Yin, Hongchi Shi, Yi Shang. 358-362 [doi]
- Distributed Integrity Checking for Systems with Replicated DataRoverli Pereira Ziwich, Elias Procópio Duarte Jr., Luiz Carlos Pessoa Albini. 363-369 [doi]
- Avoiding the Bottlenecks in the MAC Layer in 802.15.4 Low Rate WPANJelena V. Misic, Shairmina Shafi, Vojislav B. Misic. 363-367 [doi]
- A Configurable Time-Controlled Clustering Algorithm for Wireless Sensor NetworksS. Selvakennedy, Sukunesan Sinnappan. 368-372 [doi]
- A Walkthrough from Smart Spaces to Smart Hyperspaces towards a Smart World with Ubiquitous IntelligenceJianhua Ma, Laurence Tianruo Yang, Bernady O. Apduhan, Runhe Huang, Leonard Barolli, Makoto Takizawa, Timothy K. Shih. 370-376 [doi]
- Learning patterns in wireless sensor networks based on wavelet neural networksAndrea Kulakov, Danco Davcev, Georgi Stojanov. 373-377 [doi]
- An Architecture for Observing Physical World EventsMartin Bauer, Kurt Rothermel. 377-383 [doi]
- Evolution of Learning Parameters in a Team of Mobile AgentsGenci Capi, Masao Yokota. 378-382 [doi]
- A Simple Two-Dimensional Coded Detection Scheme in Wireless Sensor NetworksHung-Ta Pai, Jing-Tian Sung, Yunghsiang S. Han. 383-387 [doi]
- A Context Based Architecture for Ubiquitous Kid s Safety Care Using Space-oriented ModelKatsuhiro Takata, Jianhua Ma, Bernady O. Apduhan. 384-390 [doi]
- WISER: Cooperative Sensing Using Mobile RobotsYoshito Tobe, Tsuyoshi Suzuki. 388-392 [doi]
- Verifying Large Numbers of Cooperating Adaptive AgentsChristopher Rouff, Michael G. Hinchey, Walt Truszkowski, James L. Rash. 391-397 [doi]
- A Hybrid Wireless Network Approach to Support QoS Data TransmissionYing-Hong Wang, Hung-Jen Mao, Chih-Hsiao Tsai, Jeng-You Lai. 393-396 [doi]
- Routing through Backbone Structures in Sensor NetworksVamsi Paruchuri, Arjan Durresi, Mimoza Durresi, Leonard Barolli. 397-401 [doi]
- Study on Enhanced Strategies for TCP/IP Offload EnginesWen-Fong Wang, Jun-Yau Wang, Jin-Jie Li. 398-404 [doi]
- Emergency Broadcast Protocol for Inter-Vehicle CommunicationsMimoza Durresi, Arjan Durresi, Leonard Barolli. 402-406 [doi]
- An Enhanced Slow-Start Mechanism for TCP VegasCheng-Yuan Ho, Yi-Cheng Chan, Yaw-Chung Chen. 405-411 [doi]
- Sensor Network Design and Implementation for Health Telecare and Diagnosis Assistance ApplicationsMing-Hui Jin, Ren-Guey Lee, Cheng-Yan Kao, You-Rui Wu, D. Frank Hsu, Tse-Ping Dong, Kuan-Tsae Huang. 407-411 [doi]
- A Smart Ambient Sound Aware Environment for Be Quiet RemindingJianhua Ma, Jeneung Lee, Kotaro Yamanouchi, Akira Nishizono. 412-416 [doi]
- RED Tuning for TCP Performance on the Mobile Ad Hoc NetworksShin-Jer Yang, Yung-Chieh Lin. 412-418 [doi]
- Low Power Platform for Wireless Sensor NetworkChia-Nian Shyi, Wei-Feng Weng, Hsien-Tsai Wu. 417-421 [doi]
- Performance Analysis of Unstructured Peer-to-Peer Schemes In Integrated Wired and Wireless Network EnvironmentsLan Quan, Kyung-Geun Lee, Timothy Mark Pinkston. 419-425 [doi]
- A Security Solution of WLAN Based on Public Key CryptosystemLongjun Zhang, Han Wei, Dong Zheng, Kefei Chen. 422-427 [doi]
- Dynamic Resource Allocation for Handoff in WATM NetworksBih-Hwang Lee, Hsin-Pei Chen, Su-Shun Huang. 426-431 [doi]
- Comparing Persistent Computing with Autonomic ComputingJingde Cheng. 428-432 [doi]
- A Hint-Based Probabilistic Protocol for Unicast Communications in MANETsRoberto Beraldi, Leonardo Querzoni, Roberto Baldoni. 432-438 [doi]
- A Simulation-Based Framework for Autonomic Web ServicesEmilio Mancini, Umberto Villano, Massimiliano Rak, Roberto Torella. 433-437 [doi]
- Management of Event Domains - The MEDiator-ApproachMarkus Aleksy, Lisa Koblitz, Martin Schader. 438-442 [doi]
- A Distributed IP Address Assignment Scheme for Ad Hoc NetworksJang-Ping Sheu, Shin-Chih Tu, Li-Hsiang Chan. 439-445 [doi]
- Group Communication Protocol for Autonomic ComputingTomoya Enokido, Makoto Takizawa. 443-447 [doi]
- An MAC Protocol for Wireless Ad-hoc Networks Using Smart AntennasWen-Tsuen Chen, Yen-Cheng Chen. 446-452 [doi]
- Secure Group Communication Based Scheme for Differential Access Control in Dynamic EnvironmentsYogesh Karandikar, Xukai Zou, Yuan-Shun Dai. 448-452 [doi]
- Distributed Computer Systems Reliability Considering Imperfect Coverage and Common-Cause FailuresLiudong Xing, Akhilesh Shrestha. 453-457 [doi]
- Distributed Spanning Tree Algorithms for Large Scale TraversalsSylvain Dahan. 453-459 [doi]
- Fault Tolerance Mechanisms for SLA-aware Resource ManagementMatthias Hovestadt. 458-462 [doi]
- Efficient Distributed Algorithms for Parallel I/O SchedulingJan-Jan Wu, Yih-Fang Lin, Pangfeng Liu. 460-466 [doi]
- Challenges of Developing New Classes of NASA Self-Managing MissionsMichael G. Hinchey, James L. Rash, Walt Truszkowski, Christopher Rouff, Roy Sterritt. 463-467 [doi]
- A Fair and Space-ef.cient Mutual ExclusionSheng-Hsiung Chen, Ting-Lu Huang. 467-473 [doi]
- Reliability Improvement and Models in Autonomic ComputingT. Marshall, Y. S. Dai. 468-472 [doi]
- Towards Autonomic Management of NASA MissionsChristopher Rouff, Michael G. Hinchey, James L. Rash, Walt Truszkowski, Roy Sterritt. 473-477 [doi]
- On the Connectedness of Peer-to-Peer Overlay NetworksWeisheng Si, MingChu Li. 474-480 [doi]
- Towards an Autonomic Cluster Management System (ACMS) with Reflex AutonomicityWalt Truszkowski, Michael G. Hinchey, Roy Sterritt. 478-482 [doi]
- Charge-based Flooding Algorithm for Looking Up Multimedia Objects in Peer-to-Peer Overlay NetworksKenichi Watanabe, Tomoya Enokido, Makoto Takizawa, K. H. (Kane) Kim. 481-487 [doi]
- Optimality of Control-Limit Type of Software Rejuvenation PolicyHiroyuki Ito, Tadashi Dohi. 483-487 [doi]
- Comparison of Software Reliability Assessment Methods for Open Source SoftwareYoshinobu Tamura, Shigeru Yamada. 488-492 [doi]
- Autonomous Topology Optimization for Unstructured Peer-to-Peer NetworksHaoyi Wan, Norihiro Ishikawa, Johan Hjelm. 488-494 [doi]
- A Dynamic Programming Algorithm for Software Rejuvenation Scheduling under Distributed Computation CircumstanceHiroyuki Okamura, Kazuki Iwamoto, Tadashi Dohi. 493-499 [doi]
- A Highly Efficient Transport Protocol for Large Capacity Data Files: Non-ordered Block Transfer on XCASTTomoo Sumida, Katsuyoshi Ito. 495-501 [doi]
- What are Cycle-Stealing Systems Good For? A Detailed Performance Model Case StudyWayne Kelly, Jiro Sumitomo. 500-504 [doi]
- F-TCP: Light-weight TCP for File Transfer in High Bandwidth-Delay Product NetworksYongJae Chuh, JaeSub Kim, YongJoo Song, Daeyeon Park. 502-508 [doi]
- Performance Evaluation of Flooding in MANETs in the Presence of Multi-Broadcast TrafficM. Masadeh Bani Yassein, Ould Khaoua-Khaoua, Stylianos Papanastasiou. 505-509 [doi]
- Delay Propagation Properties with Self-similarityTakuo Nakashima. 509-515 [doi]
- Performance Evaluation of Fully Adaptive Routing Under Different Workloads and Constant Node Buffer SizeMostafa Rezazad, Hamid Sarbazi-Azad. 510-514 [doi]
- On the Performance of Routing Algorithms in Wormhole-Switched Multicomputer NetworksAlireza Shahrabi, Mohamed Ould-Khaoua. 515-519 [doi]
- Adaptive Bandwidth Sharing to Support QoS in Infrastructure Wireless NetworksWei Kuang Lai, Yuh-Chung Lin. 516-522 [doi]
- BET: A Hybrid Bandwidth Estimation ToolAlessio Botta, Salvatore D Antonio, Antonio Pescapè, Giorgio Ventre. 520-524 [doi]
- Sharing and Multiplexing of Downlink Traffic Resources in Mobile Packet Data NetworksChen-Nien Tsai, Kai-Wei Ke, Ho-Ting Wu. 523-529 [doi]
- On the Use of Fuzzy Logic to Enhance Mobile Agents in Distributed E-CommerceJoao Paulo Delgado Preti, Fernando M. B. M. de Castilho, João Bosco M. Sobral, Kathia Regina L. Jucá, Mirela Sechi Moretti Annoni Notare, Azzedine Boukerche. 525-528 [doi]
- Efficient Polynomial Root Finding Using SIMD ExtensionsM. Moslemi, Hossein Ahmadi, Hamid Sarbazi-Azad. 529-533 [doi]
- ATraffic Shedding Algorithm for Soft-Handoff in MC-CDMA SystemsBih-Hwang Lee, Hsin-Pei Chen, Su-Shun Huang. 530-535 [doi]
- BECP: The Scheduling Policy Based on Best-Effort in Clustered VOD ServersJunwei Wang, Jun Liu, Yuxing Peng, Shiyao Jin. 534-539 [doi]
- Parallel AI Game Playing Approach for Faster Processor Allocation in Hypercube Systems using Veitch DiagramT. Srinivasan, P. J. S. Srikanth, K. Praveen, L. Harish Subramaniam. 536-542 [doi]
- The Security Analyses of RosettaNet in GridJingwei Liu, Weidong Kou, Rong Sun, Yuxia Xiao. 540-544 [doi]
- Efficient Task Scheduling with Duplication for Bounded Number of ProcessorsSrikar Pasham, Wei-Ming Lin. 543-549 [doi]
- Dynamic RWA mechanism for group-based protection on IP over WDM networksChen-Shie Ho, Zu-Yu Lee, Chien-Huang Chang, Jyunn-Yao Liao. 545-549 [doi]
- Automated Discovery of Brand Piracy on the InternetUlrich Pinsdorf, Peter Ebinger. 550-554 [doi]
- A Novel Dynamic Allocation and Scheduling Scheme with CPNA and FCF Algorithms in Distributed Real-time SystemsHai Jin, Pengliu Tan. 550-556 [doi]
- Universal Routing in Distributed NetworksKevin F. Chen, Edwin Hsing-Mean Sha, Bin Xiao. 555-559 [doi]
- A Sorted RSSI Quantization Based Algorithm for Sensor Network LocalizationXiaoli Li, Hongchi Shi, Yi Shang. 557-563 [doi]
- Causally Ordered Delivery with Global Clock in Hierarchical GroupTakeshi Nishimura, Naohiro Hayashibara, Makoto Takizawa, Tomoya Enokido. 560-564 [doi]
- Coverage and Energy Tradeoff in Density Control on Sensor NetworksYi Shang, Hongchi Shi. 564-570 [doi]
- MeshTree: Reliable Low Delay Degree-bounded Multicast OverlaysSu-Wei Tan, A. Gill Waters, John S. Crawford. 565-569 [doi]
- Enabling Requirements-Based Programming for Highly-Dependable Complex Parallel and Distributed SystemsMichael G. Hinchey, James L. Rash, Christopher Rouff. 570-574 [doi]
- Tracking Irregularly Moving Objects based on Alert-enabling Sensor Model in Sensor NetworksChao-Chun Chen, Yu-Chi Chung. 571-577 [doi]
- A Route Secure Parallel Dispatch Model for Mobile Agents SecurityAbhinav Sarje, Deependra Choudhari, Shravan K. Rayanchu. 575-579 [doi]
- HON-P2P: A Cluster-based Hybrid Overlay Network for Multimedia Object ManagementMouna Kacimi, Kokou Yétongnon, Yinghua Ma, Richard Chbeir. 578-584 [doi]
- An Architecture for Multi-Agent COTS Software Integration SystemsGuo-Ming Fang, Jim-Min Lin. 580-584 [doi]
- An Image Refining Method Using Digital Watermark via Vector QuantizationChin-Chen Chang, Po-Wen Lu. 585-589 [doi]
- P-Hera: Scalable fine-grained access control for P2P infrastructuresBruno Crispo, Swaminathan Sivasubramanian, Pietro Mazzoleni, Elisa Bertino. 585-591 [doi]
- Zone-based Traffic Load Balancing to Ensure Quality of Service (QoS) in Distributed SystemsAshraf Uddin Ahmed, Zixue Cheng. 590-594 [doi]
- A Service Discovery Mechanism with Load Balance Issue in Decentralized Peer-to-Peer NetworkChing-Wen Chen, Phui-Si Gan, Chao-Hsiang Yang. 592-598 [doi]
- A Technique to Analyse Session Initiation Protocol TrafficGiuseppe De Marco, Giovanni Iacovoni. 595-599 [doi]
- Efficient Implementation of 3G-324M Protocol Stack for Multimedia CommunicationWeijia Jia, Bo Han, Ji Shen, Haohuan Fu, Man-Ching Yuen. 599-605 [doi]
- Two Hops Backup Routing Protocol in Mobile Ad Hoc NetworksHsing-Lung Chen, Chein-Hsin Lee. 600-604 [doi]
- A Dynamic Caching Mechanism for Mobile Ad Hoc NetworksYing-Hong Wang, Chih-Feng Chao, Tai-Hong Yueh. 605-609 [doi]
- Dynamic Packet Video Rate Control over Wireless NetworkKazuo Takahata, Noriki Uchida, Yoshitaka Shibata. 606-612 [doi]
- An application layer protocol interoperability design model for content evolution in the mobile InternetToshihiko Yamakami. 610-614 [doi]
- A Content-Aware Multimedia Accessing Model in Ad Hoc NetworksBo Yang, Ali R. Hurson. 613-619 [doi]
- Parity Placement Schemes with Generalized Fault-Tolerant Technique in Disk Array SystemsChih-Shing Tau, Tzone-I Wang. 615-619 [doi]
- An Area-Efficient Architecture of Reed-Solomon Codec for Advanced RAID SystemsMin-An Song, I-Feng Lan, Sy-Yen Kuo. 620-626 [doi]
- Cycle Embedding on the Möbius Cube with Both Faulty Nodes and Faulty EdgesSun-Yuan Hsieh, Nai-Wen Chang. 620-624 [doi]
- A Declustering Scheme With Guaranteed Worst-Case Additive Error O(k/frac{1}{{d - 1}})Fouad B. Chedid. 625-628 [doi]
- Dependable Networked RAID for the Open Source CommunityPeter T. Breuer, Arne Wiebalck. 627-633 [doi]
- A GPS-less self-positioning method for sensor networksHung-Chi Chu, Rong-Hong Jan. 629-633 [doi]
- The Development of the Adaptive Traffic Signal Control SystemLawrence Y. Deng, Chin Thin Wang, Ching-Sheng Wang, Lun-Ping Hung. 634-638 [doi]
- Efficient Allocation Algorithms for FLASH File SystemsLi-Fu Chou, Pangfeng Liu. 634-641 [doi]
- Static Scheduling of Periodic Tasks in a Decentralized Real-time Control System Using an ILPThanikesavan Sivanthi, Ulrich Killat. 639 [doi]
- Dynamic Dispersion Framework for Router Load BalancingYunhuai Liu, Lionel M. Ni. 641-647 [doi]
- Transactional Agent on Distributed ObjectsYouhei Tanaka, Makoto Takizawa, Tomoya Enokido. 644-649 [doi]
- A CAC and Routing Framework for Multimedia Applications in Broadband Networks Using Fuzzy Logic and Genetic AlgorithmMakoto Ikeda, Leonard Barolli, Shohei Ohba, Genci Capi, Akio Koyama, Mimoza Durresi. 648-654 [doi]
- An efficient long-lived adaptive collect algorithmBurkhard Englert. 649-653 [doi]
- A Middleware for Distributed System in Heterogeneous Wireless NetworksGowrishankar, G. Varaprasad, G. T. Raju, Suresh Kahandige, Pallapa Venkataram, R. S. D. Wahida Banu. 654-658 [doi]
- A New Quality of Service Multicast Routing Protocol Based on Genetic AlgorithmAkio Koyama, Toshiki Nishie, Junpei Arai, Leonard Barolli. 655-660 [doi]
- A Distributed Computing Approach for Marketable Quality and Profitability of CorporationsValbona Barolli, Heihachiro Fukuda. 659-663 [doi]
- Semantic Access Control in Grid ComputingXiaopeng Wang, Junzhou Luo, Aibo Song, Teng Ma. 661-667 [doi]
- A Simple Quorum Reconfiguration for Open Distributed EnvironmentsArmin Lawi, Kentaro Oda, Takaichi Yoshida. 664-668 [doi]
- A User-friendly Platform for Developing Grid Services over Globus Toolkit 3Hiroyuki Morohoshi, Runhe Huang. 668-674 [doi]
- An On-Line Page-Structure Approximation Scheme for Web ProxiesJiunn-Jye Lee, Chin-Laung Lei. 669-673 [doi]
- On-Demand Service in Grid: Architecture, Design and ImplementationZhenchun Huang, Lei Gu, Jianfeng Wu. 674-678 [doi]
- Enhanced Collective Communication Functions Using Factorization and Pairwise-exchange CommunicationDongyoung Kim, Dongseung Kim. 675-681 [doi]
- Design and Implementation of Mobile Grid Middleware for HandsetKen Ohta, Tomohiro Nakagawa, Hiroshima Inamura. 679-683 [doi]
- MidGate: Middleware Platform for Service Gateway Based Distributed SystemsDaniel Pakkala, Aki Koivukoski, Juhani Latvakoski. 682-688 [doi]
- Validating the Distributed Ontology Framework for Deployment onto the Semantic Grid EnvironmentAndrew Flahive, J. Wenny Rahayu, David Taniar. 684-688 [doi]
- An Efficient Algorithm for Solving Distributed State Estimator and Laboratory ImplementationS.-S. Lin, Huay Chang. 689-694 [doi]
- Towards a Service-based Collaborative Framework for Data-intensive Grid ApplicationsHsi-Min Chen, Jan-Jan Wu, Chien-Min Wang, Chun-Chen Hsu. 689-693 [doi]
- MPI-I/O Operations to a Remote Computer Using JavaYuichi Tsujita. 694-698 [doi]
- Application-oriented communication for networked systemsRoger Karrer, Thomas R. Gross. 695-701 [doi]
- POERS: A Performance-Oriented Energy Reduction Scheduling Technique for a High-Performance MPSoC ArchitectureSlo-Li Chu. 699-703 [doi]
- A Visualization Method of Relations Among Knowledge-Information for Research ActivitiesShoichi Nakamura, Naohiro Hayashi, Setsuo Yokoyama, Youzou Miyadera. 702-708 [doi]
- An Optimized Algorithm of High Spatial-temporal Efficiency for MegaBlastGuangming Tan, Lin Xu, Yishan Jiao, Shengzhong Feng, Dongbo Bu, Ninghui Sun. 704-708 [doi]
- An Active Detecting Method Against SYN Flooding AttackBin Xiao, Wei Chen, Yanxiang He, Edwin Hsing-Mean Sha. 709-715 [doi]
- IFTS: Intrusion Forecast and Traceback based on Union Defense EnvironmentFang-Yie Leu, Wei-Jie Yang, Wen-Kui Chang. 716-722 [doi]
- Protecting IEEE 802.11 Wireless LANs against the FCS False Blocking AttackShih Tsung Liang, Ming-Yi Weng. 723-729 [doi]
- An Approach to Provide Mobile Agents with Planning Capability for P2P EnvironmentJin-Wook Baek, Heon Young Yeom. 730-736 [doi]
- An Intelligent Agent-based Mobile Resource Reservation SchemeJui-Tang Wang, Jen-Shun Yang, Chien-Chao Tseng. 737-742 [doi]
- AMUSE: An Agent-based Middleware for Context-aware Ubiquitous ServicesHideyuki Takahashi, Takuo Suganuma, Norio Shiratori. 743-749 [doi]
- Adaptive Calculation of Scores for Fresh Information RetrievalMinoru Uehara, Nobuyoshi Sato, Yoshifumi Sakai. 750-755 [doi]
- Information Retrieval based on Temporal Attributes in WWW ArchivesMinoru Uehara, Nobuyoshi Sato. 756-761 [doi]
- A Search Scheme Resulting in Mixing Compressed Text FilesKuo-Feng Hwang, Chin-Chen Chang, Chao-Wen Chan. 762-768 [doi]
- A High Performance Implementation of an OAI-Based Federation ServiceKurt Maly, Mohammad Zubair, Li Xuemei. 769-774 [doi]
- System Throughput Maximization Subject to Delay and Time Fairness Constraints in 802.11 WLANsYean-Fu Wen, Frank Yeong-Sung Lin, Kun-Wei Lai. 775-781 [doi]
- Efficient Barrier Synchronization on Wireless Computing Systems Nian-Feng Tzeng, Bhanurekha Kasula, and Hongyi WuNian-Feng Tzeng, Bhanurekha Kasula, Hongyi Wu. 782-788 [doi]
- Access Delay of Efficient Media Access Schemes for Wireless LAN with Smart AntennaChangle Li, Jiandong Li, Xuelian Cai. 789-764 [doi]
- An Adaptive Consistency Maintenance Approach for Replicated Continuous ApplicationsLing Chen. 795-801 [doi]
- A Pure Lazy Technique for Scalable Transaction Processing in Replicated DatabasesKhuzaima Daudjee, Kenneth Salem. 802-808 [doi]
- Consistency Management for Partial Replication in a High Performance Database ClusterCédric Coulon, Esther Pacitti, Patrick Valduriez. 809-815 [doi]