Abstract is missing.
- A Study about Different Strategies in Risk ElicitationAri Riabacke, Mona Pahlman, Aron Larsson. 1-6
- Intensional Knowledge Processing in RDBMS - Improved Performance of ReDaReS systemIgor Wojnicki. 7-12
- Developing a Usable Mobile Expert Support System for Emergency Response CenterKuo-Wei Su, Sheue-Ling Hwang, Chun-Ting Wu. 13-17
- An Improving Fuzzy Ant Clustering Using Artificial Immune Recognition System Werasak Kurutach, Surat Srinoy, Witcha Chimphlee, Siriporn Chimphlee. 18-22
- Computer Based Prescriptive Support-A Study about Decision Making under RiskAri Riabacke. 23-28
- Natural Languages Translation Using an Intermediate LanguageKeerthi Kamal Adusumilli. 29-31
- Application of Mobile Agents in Managing the Traffic in the Network and Improving the Reliability and Quality of ServiceShamila Makki, Wunnava V. Subbarao. 32-35
- A Neural Network Approach for Controller Area Network Message Scheduling ControlChuan Ku Lin, Hao-Wei Yen, Mu-Song Chen, Chi-Pan Hwang, Nguyen Minh Thanh. 36-41
- A Hopfield Neural Network Model for the Outerplanar Drawing ProblemHongmei He, Ondrej Sýkora. 42-47
- The Aiding of MEMS INS/GPS Integration Using Artificial Intelligence for Land Vehicle NavigationJ. H. Wang, Y. Gao. 48-53
- Adaptive Backstepping Tracking Control Using Self-Organizing Fuzzy Neural NetworkChih-Min Lin, Chun-Fei Hsu, I-Fang Chung. 54-59
- Pedestrian Recognition Based on SVMHongsong Li, Jun Sun. 60-63
- An Isolation Model for Agent-Agent Interactions Vu Quang Le. 64-68
- Representation of Family Tree for CARAGi-Chul Yang, Hyun-Sang Park. 69-73
- Image Denoising Using Adaptive Neuro-Fuzzy systemNguyen Minh Thanh, Mu-Song Chen. 74-79
- Supporting the conception of a Knowledge Management System by the PIFA approach: case study STMicroelectronicsHendrik Busch, Mickael Gardoni, Michel Tollenaere. 80-85
- Fuzzy Control Chart for Software Defect ManagementJin-Cherng Lin, Kuo-Chiang Wu. 86-91
- Acquisition of Knowledge for Spam Filtering by Rule InductionChih-Hung Wu, Hsiang-Chun Kuo, Chih-Chin Lai. 92-97
- Bayesian and Fuzzy Logic Student Model in the C++ STL Intelligent Tutoring SystemChristine Lee, Mohd Sapiyan Baba. 98-103
- Solving the Mobile Agent Planning Problem with a Hopfield-Tank Neural NetworkCha-Hwa Lin, Jin-Fu Wang. 104-114
- Partial Swarm Optimization for Segmentation of Microcalcifications in MammogramsM. Karnan, K. Thangavel, K. Thanushkodi, K. Geetha. 115-120
- A Clustering and Feature Selection Method using Wavelet Power SpectrumS. Prabakaran, Rajendra Sahu, Sekher Verma. 121-125
- Parallelized Multiple Biological Sequence Alignment with MPI: The Divide-and-Conquer ApproachMd. Maruf Monwar, Siamak Rezaei. 126-130
- Optimized Mining of Bioinformatics Database via Clustered Indexing MethodS. Thabasu Kannan. 131-137
- Feature Selection using PSO-SVMChung-Jui Tu, Li-Yeh Chuang, Jun-Yang Chang, Cheng-Hong Yang. 138-143
- Primer e-PCR: Provide Sequences between PrimersYu-Huei Cheng, Cheng-Hao Wen, Hsueh-Wei Chang, Li-Yeh Chuang, Cheng-Hong Yang. 144-149
- SNPrimer- Design of Natural and Degenerated Primers for SNPsCheng-Hao Wen, Yu-Huei Cheng, Hsueh-Wei Chang, Li-Yeh Chuang, Cheng-Hong Yang. 150-153
- Docking studies of Tau ProteinHarkewal Singh, Soma S. Marla, Manas Agarwal. 154-159
- On the Revocation of Proxy SignaturesHung-Yu Chien. 160-162
- ANA - Black Box (Optical CPU)Kotaru Kiran. 163-168
- Visual Modeling of XML Constraints Based on a New Extensible Constraint Markup LanguageJingkun Hu, Lixin Tao. 169-174
- Odd-Even Based CryptographyKeerthi Kamal Adusumilli. 175-177
- Comments on Distributed Sign-and-Encryption SchemesYa-Fen Chang, Chin-Chen Chang, Wei-Liang Tai. 178-180
- Interval Method for Solving Non-linear EquationsTrong Wu. 181-186
- The Local Z-Buffering RenderingHenry X. Han, Michael Zeiger. 187-192
- Hybrid Topology based Watermarking Method for Reconstructed Triangular Mesh SurfaceMahfuzur Rahman, Harada Koichi. 193-197
- Image Enlargement Based on Adaptive Fuzzy InterpolationHongsong Li, Jun Sun. 198-201
- Fault-Tolerant Issues in Modern Operating SystemsHuan-Yu Tu. 202-207
- Interactive Physically-Based Modeling for Gaseous Object using Smoothed Particle HydrodynamicsSuriyong Lertkulvanich, Sanan Srakaew. 208-212
- A CMOS High-Speed Nine-Stage Programmable CounterKo-Chi Kuo, Feng-Ji Wu. 213-216
- A Low-Power Multiplier with Bypassing Logic and Operand DecompositionKo-Chi Kuo, Chi-Wen Chou. 217-220
- Error Analysis of Large Word-Length LNS Addition/Subtraction ComputationChichyang Chen. 221-224
- ID-Based E-Will System using Bilinear PairingsHung-Yu Chien, Ru-Yu Lin. 225-230
- Differentiability of a 4-point Ternary Subdivision Scheme and its ApplicationsHongchan Zheng, Hongxing Zhao, Zhenglin Ye, Min Zhou. 231-236
- A Fuzzy Controller for a Network Protocol over the IEEE 1394 DeviceYong Yu, Yu-Fai Fung. 237-242
- Identification of Chaotic Systems by Neural Network with Hybrid Learning AlgorithmShing-Tai Pan, Jiann-Shu Lee, Chih-Chin Lai. 243-248
- An IP Watermarking Technique Based on Relative Distance Vector for an Efficient Detection Scheme by Power Consumption in Control StepsS. Kwak, J. Lee, D. Har. 249-251
- Owner Verification and Copyright Protection of Relational DataS. A. Shah, S. A. M. Gilani, I. A. Awan. 252-257
- Highly Efficient Authenticated Key Agreement in Integrated 3G/WLAN IP NetworksHung-Yu Chien, Hung-Yi Teng, Yen-Cheng Chen. 258-263
- Transparent Intensional Logic and Multiagent SystemsJaroslav Müller. 264-269
- An Efficient Scheduling Algorithm for Irregular Data RedistributionKun-Ming Yu, Yi-Lin Tsai. 270-275
- An Improvement of the Design of Integrating Subliminal Channel with Access ControlChin-Chen Chang, Chia-Chi Wu. 276-279
- Computer-Aided Diagnosis: Automatic Detection of Microcalcifications in Mammographic Images using Soft ComputingK. Thangavel, M. Karnan, P. Jaganathan, R. Sivakumar, A. Pethalakshmi. 280-285
- Classification Rule Discovery with Ant Colony Optimization with Improved Quick Reduct AlgorithmP. Jaganathan, K. Thangavel, A. Pethalakshmi, M. Karnan. 286-291
- On Semantic Evaluation of Preference QueriesJunping Sun. 292-297
- Efficient Associating Mining Approaches for Compressing Incrementally Updatable Native XML DatabasesChin-Feng Lee, Chia-Hsing Tsai. 298-305
- Generating Multidimensional Association Rules Implying Fuzzy ValueRolly Intan. 306-310
- The Design and Implementation of a Grid-Computing Environment for Mining Sequential PatternsChih-Hung Wu, Yu-Chieh Lo, Shing-Tai Pan. 311-316
- Better Quality of Decisions : Approaches to more Effective AnalysisNavneet Malhotra, Anjana Gosain. 317-323
- Analyzing Factors Influencing Quality of Decisions- An Approach for Data Warehouse DevelopmentNavneet Malhotra, Anjana Gosain. 324-330
- Automatic Recognition of Birdsongs Using Mel-frequency Cepstral Coefficients and Vector QuantizationChang-Hsing Lee, Cheng-Chang Lien, Ren-Zhuang Huang. 331-335
- Finite State Automata and Data AggregatesMichal Burda, Marian Mindek, Jana Sarmanova. 336-341
- On the Discovery of Interesting Patterns from Evolving Spatial Data Mining EnvironmentsAhmed Sultan Al-Hegami, Harleen Kaur. 342-345
- Case Based Reasoning with State Transition Mechanism for Problem-Solving in AIArijit Chatterjee. 346-352
- Generalized Linear Quadratic Gaussian and Loop Transfer Recovery Design of F-16 Aircraft Lateral Control SystemHuan-Liang Tsai, Jium-Ming Lin. 353-358
- A Wide Swing Low Voltage CMOS OTAChia-Hsiung Kao, Ping-Yu Tsai, Cheng-Ping Han. 359-361
- A Low Jitter High Linearity Voltage Controlled Ring OscillatorChia-Hsiung Kao, Ping-Yu Tsai, Jian-Jia Lan. 362-365
- A New Decision Algorithm for Audio Voting SystemsBonifacio Carbajo, M. D. R-Moreno, Angel Moreno, Javier de Pedro. 366-370
- Intelligent Robust Control for Uncertain Transfer Functions with Sliding ModeT. C. Kuo, Y. J. Huang, S. H. Chang. 371-374
- Analysis of Hybrid Translinear Circuit and Its ApplicationCheng Yuhua, Wu Xiaobo, Yan Xiaolang. 375-380
- Design of Low Power CMOS Crystal Oscillator with Tuning CapacitorsShun Yao, Hengfang Zhu, Xiaobo Wu. 381-385
- A High Precision Bandgap Reference Used in Power Management IcsGu Shurong, Wu Xiaobo, Yan Xiaolang. 386-389
- Emotion Mimicry in Humanoid Robots using Fuzzy Logic-Based Computational Theory of PerceptionMohsen Davoudi, Mehdi Davoudi, M. B. Menhaj. 390-395
- An Application of Principal Components Analysis to Portfolio Optimization under the Sharpe Multiple Index FrameworkN. Hossain, C. G. Troskie, R. Guo. 396-401
- An Efficient GARCH Option Pricing ModelChung-Gee Lin. 402-407
- Carpooling: A Step to Reduce Congestion (A Case Study of Delhi)Kum Kum Dewan, Israr Ahmad. 408-413
- Valuing Double Barrier Options with Time-Dependent ParametersEdward Chi-Fai Lo, Cho-Hoi Hui. 414-418
- Utilizing Generalized Growing and Pruning Algorithm for Radial Basis Function (GGAPRBF) Network in Predicting IPOs PerformanceTong-Seng Quah, Kian-Chong Wong. 419-424
- The Design of One Distributed Interactive Simulation Platform for Electric Power Market with Dynamic AspectHai-Tao Song, Shi-Xiong Zheng, Ying-Yu Yin, Shou-Qiang Liu. 425-429
- Robust Hybrid Intelligent System for Financial PredictionsS. I. Ao. 430-435
- A Novel Identity Authentication and Key Agreement Scheme for Ad Hoc Network SecurityPi Jian-yong, Liu Xin-song, Wu Ai, Fu Qing-yun. 436-440
- An Untraceable Forward-Secure Blind Signature SchemeHui-Feng Huang, Chin-Chen Chang. 441-446
- Collaborative Learning System Based On Instant MessagingTian-Wen Song, Ting-Ting Wu, Rui-Xuan Lee. 447-451
- A Cryptanalysis on a Generalized Threshold CryptosystemChin-Chen Chang, Wen-Bin Wu, Jieh-Shan Yeh. 452-455
- Machine-supported Instructional DesignGeorge Mavrommatis. 456-459
- Internet Application of Quad/Triangle Subdivision SchemeAhsan Ullah, Koichi Harada. 460-463
- No More Keyword Search or FAQ: Innovative Ontology and Agent Based Dynamic User InterfaceNelson K. Y. Leung, Sim Kim Lau. 464-469
- Top-down Natural Language Query Approach for Embodied Conversational AgentOng Sing Goh, Arnold Depickere, Chun Che Fung, Kok Wai Wong. 470-475
- Combining Intelligent WEB Portal and Multicast WAP Technology to Maximize Competitive Business AdvantageJon T. S. Quah, Winnie C. H. Leow. 476-480
- New Mechanism for Buffer Overflow PreventionCheng-Hung Li, Chi-Wei Luo, Show-Wei Leu, Gene Eu Jan. 481-486
- The Role of Software Agents in Intelligent Multi-channel Contact CentersMahtab Kahaki, Fattaneh Taghi Yareh. 487-492
- A Scheme to Decrease Bit-Rate of Streaming Media for GPRSWang Hongtao, Shen Qing, Xiang Liseng. 493-495
- Approach of Facial Feature Extraction for 3D Face ModelingJui-Chen Wu, Yung-Sheng Chen, I-Cheng Chang. 496-501
- An Efficient Method for Enhancing High-Contrast Digital Photos AutomaticallyJiunn-lin Wu, Chia-Yi Chuang. 502-506
- A Scene-Based General Baseball Event Detection SystemCheng-Chang Lien, Chiu-Lung Chiang. 507-512
- A Robust Technique for Pain Recognition from Video Sequences using Skin Color Modeling and Eigenimage MethodMd. Maruf Monwar, Siamak Rezaei, Padma Polash Paul, Ken Prkachin. 513-518
- A New Face Recognition Method for Blurred Images Using Multi-Channel Wiener FilterChing-Te Wang, Tung-Shou Chen, Chiu-Hsiung Liao, Feng-Yung Chang. 519-524
- Translation and Orthogonal Rotation of BDD Encoded ImageWatis Leelapatra, Kanchana Kanchanasut, Chidchanok Lursinsap. 525-530
- A Scheme of Wavelet Based Compression of 2D ImageKamrul Hasan Talukder, Koichi Harada. 531-536
- Binary Image Deconvolution with Positive Semidefinite ProgrammingYijiang Shen, Edmund Y. Lam, Ngai Wong. 537-542
- Segmentation and Volume Estimation of Brain tissues from MR ImagesS. S. Smitha, K. Revathy, C. Kesavadas. 543-547
- Watermarking Method for Copyright Protection and Retrieval of 2D/3D ModelMahfuzur Rahman, Harada Koichi. 548-551
- Efficient Proposals in Reversible Jump MCMC for Disk DetectionYuan Shen, Elke Thönnes. 552-557
- Electrical Capacitance Tomography System For Industrial ApplicationsApinai Rerkratn, Chanrit Yossontiku, Thanakorn Lertpakdee, Kitiphol Chitsakul, Manas Sangworasil. 558-561
- A Survey of 3D Reconstruction Algorithms from 2D ImagesHassan Hajjdiab. 562-567
- Video Object Retrieval using Color FeaturesJau-Ling Shih, Chih-Hao Chen. 568-573
- Smooth Model from 3-D Surface ConstructionAhsan Ullah, Koichi Harada. 574-577
- An MPEG-4 Texture Coding Approach Using Refined Boundary Block Merging and Adaptive SA-DCTJau-Ling Shih, Chang-Hsing Lee, Yen-Yi Chiang. 578-583
- Image Processing Application in Toll collectionYu-Fai Fung, Homan Lee, Muhammet Fikret Ercan. 584-588
- Vision Based Lane Detection using Genetic AlgorithmFarhad Samadzadegan, A. Sarafraz, M. Tabibi. 589-594
- A Biplane-Based Approach to Knee Joint Reconstruction without CalibrationJiann-Shu Lee, Yung-Nien Sun, Chwin-Min Weng, Chii-Jeng Lin, Shih-Hao Yeh, Hung-Chun Lee. 595-598
- Low Complexity Design on H.263 Resolution Downscaling using Partial Loop ArchitectureTsung-Han Tsai, Hsueh-Yi Lin. 599-602
- Development of Bill-Counterfeit Prevention Technology for Multi-Function PeripheralsYo-Chen Wang, Ya-Wen Chiang, Yan-Yau Jiang, Yuan-Hsiang Chang. 603-608
- Image Storage, Indexing and Recognition with Finite State AutomataMarian Mindek, Michal Burda. 609-613
- Progressive Videotext Regions Inpainting Based on Edge Detection and Statistic MethodTsung-Han Tsai, Chih-Lun Fang, Hsueh-Yi Lin. 614-618
- A Scheme for (t, n)-Threshold Secret Image SharingChao-Wen Chan, Chin-Chen Chang. 619-624
- A Study on Movement Compatibility for Lever Control and Circular Display with Computer Simulated TestW. H. Chan, Alan H. S. Chan. 625-629
- A step towards the Washington Accord (1989)?Koon Beng Ooi. 630-635
- Optimal Sequential PM Policy for Leased Equipment: Negligible and Non-Negligible Repair TimeW. Sungkharit, J. Pongpech. 636-639
- Optimal Quality Policy for Primary Foods Processing PlantP. Tangcharoen, J. Pongpech. 640-644
- A Comparison between Genetic Algorithms and Evolutionary Programming based on Cutting Stock ProblemRaymond Chiong, Ooi Koon Beng. 645-650
- The Development of a Generic Technique for Flow Line MonitoringC. S. Tang, C. Y. Chan, K. L. Yung. 651-655
- Intelligent Segmentation of Industrial Component ImagesCommander K. Velu, V. Selladurai, M. Karnan, R. Sivakumar. 656-661
- Machine Life Cycle with Fixed Operating and Maintenance Costs when Considering Customer LossJirarat Teeravaraprug. 662-664
- A Tree Search Approach on Flowshop Scheduling: Ranged Processing Time CaseP. Sukcharoenpong, P. Charnsethikul, S. Pararach. 665-670
- Extraction Processes in Making a Herbal Medicine ConcoctionJohnson H. F. Chong, John K. L. Ho, Z. J. Yang, W. F. Fong. 671-676
- Select the Best Surface Fitting Approach for the Reconstruction of High Quality 3-D Objects from Range-Image DataRalph W. L. Ip, Angela C. W. Yeung, Felix T. S. Chan, Henry C. W. Lau. 677-682
- A Study on Improvement of the Surface Roughness in MQL TurningS. W. Shin, C. M. Lee, J. Y. Jung, Y. K. Hwang. 683-687
- A Study on the Development of High Precision Cam Profile CNC Grinding Machine with CAD/CAM SystemS. H. Lim, C. M. Lee, J. Y. Jung, S. D. Yoon, Y. K. Hwang, S. W. Shin. 688-693
- Using Quality Function Deployment in Process AnalysisHang-Wai Law, Meng Hua. 694-698
- A Study on the Development of High Integrated Tool Tower Automatic Tool ChangerY. H. Roh, C. M. Lee, D.-K. Park. 699-703
- The Guessability Scores of Pre-users for Traffic SignsAnnie W. Y. Ng, Alan H. S. Chan. 704-709
- Cognitive Design Features on Traffic SignsAnnie W. Y. Ng, Alan H. S. Chan. 710-715
- A Study on Paced Reading Scheme for Students taking Ergonomics CoursesW. H. Wong, Alan H. S. Chan. 716-720
- Hardware Test on Movement Compatibility for Rotary Control and Digital DisplayW. H. Chan, Alan H. S. Chan. 721-725
- Limiting Frechet Subdifferentials of Marginal FunctionsK. Allali. 726-731
- Agent-based Intelligence System for US Wholesale Power TransactionToshiyuki Sueyoshi, Gopalakrishna Reddy Tadiparthi. 732-737
- Representation and Evaluation of Influence Diagrams in a Common Framework for Interval Decision AnalysisAron Larsson, Jim Idefeldt. 738-743
- Approximation of Controllable Set by Semidefinite Programming for Open-Loop Unstable Systems with Input SaturationWen-Liang Wang, Yen-ming Chen. 744-749
- Preference Ordering Algorithms with Imprecise ExpectationsJim Idefeldt, Aron Larsson, Mats Danielson. 750-755
- Synergies of Three Letters Syndrome for Revitalizing ManufacturingVishnu D. Wakchaure, M. A. Venkatesh, Shrikant P. Kallurkar. 756-761
- Solving the Assignment Problem using Genetic Algorithm and Simulated AnnealingAnshuman Sahu, Rudrajit Tapadar. 762-765
- Modeling a Queueing System with Transacting PopulationsI. M. Premachandra, D. R. Alexander, D. U. A. Galagedera. 766-768
- Better than RFID - an Alternative Solution for a Collaborative FMCG Forecasting System to Meet Grocery Demand during Promotion Period with Ideal Forecasting AccuracyAndrew Wood. 769-773
- On the Equality of Complexity Classes P and NP: Linear Programming Formulation of the Quadratic Assignment ProblemMoustapha Diaby. 774-779
- A Comparative Study of Probabilistic and Worst-case Tolerance SynthesisJirarat Teeravaraprug. 780-783
- Improvement on Branch and Bound in Flowshop Scheduling: Probabilistic Processing Time CaseS. Pararach, P. Sukcharoenpong, P. Charnsethikul. 784-789
- New Environment CREPE for Transportation Control and its EffectivenessNguyen Thanh Hung, Hideto Ikeda, Nikolaos Vogiatzis, Zin Lin. 790-795
- A New Method of Scheduling UET Tasks on Parallel MachinesYakov Zinder, Gaurav Singh, René Weiskircher. 796-801
- An Adjusted Recursive Operator Allocation Optimization Algorithm for Line Balancing ControlB. L. Song, W. K. Wong, J. Fan, S. F. Chan. 802-807
- A Simulation Study on Intracluster CorrelationKen W. Li. 808-814
- How to Make Lisp Go Faster than CDidier Verna. 815-820
- Sparse Hypermatrix Cholesky: Customization for High PerformanceJosé R. Herrero, Juan J. Navarro. 821-827
- Recursion Detection Testing on Software ComponentsKai Qian, Jigang Liu. 828-832
- System Utilization and Changes in Implemented Information Systems: A Case StudyH. Keith Edwards. 833-838
- The Study of Game Point Mechanism based on CORBA-Based EJB ArchitectureSuchen Chiang, Wei-Chun Chang. 839-843
- Global SA&D Approach for New Information Systems Architectures SecuritySnene Mehdi, Pardellas Jorge. 844-849
- A Defect Indicator for Software Quality AssuranceJin-Cherng Lin, Kuo-Chiang Wu. 850-855
- Ontologies and Object models in Object Oriented Software EngineeringWaralak V. Siricharoen. 856-861
- Approaching N-tier Application Software Readiness Decision Using Neural NetworkTong-Seng Quah, Mie Mie Thet Thwin. 862-869
- A Conformance Testing Approach for Component-Based SystemsAbdelaziz Guerrouat, Harald Richter. 870-874
- Requirement Analysis Model of Formalized UML 2.0 Activity DiagramW. C. Piao, C. H. Wang, William C. Chu, Ying-Da Chen. 875-880
- The TopK Scheme for the Energy-Saving Data Organization in Broadcast-Based Wireless EnvironmentsJun-Hong Shen, Ye-In Chang. 881-886
- A Lightweight Mechanism to Secure OLSRLin Chen, Xiaoyun Xue, Jean Leneutre. 887-895
- Performance Evaluation of MC-CDMA System with Exponent Multipath over Frequency-Selective Fading ChannelsJoy Iong-Zong Chen, Chieh Wen Liou. 896-901
- On the Channel Correlation of MC-DS-CDMA Systems in Different Scenarios of Carriers and UsersJoy Iong-Zong Chen, Tai-Wen Hsieh. 902-907
- Applying LCR and AFD in Performance Analysis for SC Diversity over General Fading ChannelsJoy Iong-Zong Chen, Kwei-Hua Lo. 908-913
- Fault-Tolerant Design for Mobile IPv6 NetworksJenn-Wei Lin, Ming-Feng Yang. 914-919
- M-QoS MPLS: A New Scheme for Micro-Mobility Management with QoS support in Next Generation Wireless Access NetworksO. Horvath, G. March, Oswald Drobnik. 920-925
- Automatic Resumption of Streaming Sessions over Wireless Communications Using AgentsÁlvaro Suárez, Mario La-Menza, Elsa M. Macías, Vaidy S. Sunderam. 926-931
- Using OLSR for Seamless Streaming Video in 802.11 Ad Hoc NetworksElsa M. Macías, Álvaro Suárez, Javier Martín, Vaidy S. Sunderam. 932-937
- Devices Location in 802.11 Infrastructure Networks using TriangulationDavid Sánchez, Sergio Afonso, Elsa M. Macías, Álvaro Suárez. 938-942
- Performance Analysis of QoS Supported by Enhanched Distributed Channel Access (EDCA) Mechanism in IEEE 802.11eSaurabh Sehrawat, Revoti Prasad Bora, Dheeraj Harihar. 943-948
- Detection, Penalization and Handling of Misbehavior in Ad Hoc Wireless NetworksRevoti Prasad Bora, Dheeraj Harihar, Saurabh Sehrawat. 949-953
- Performance Analysis of Space-Frequency Block Coding for DAB SystemsChia-Sheng Tsai, Chao-Wei Chang. 954-958
- Yet Another Attack on Mutual Authentication and Key Exchange Protocols for Low Power Wireless CommunicationsChin-Chen Chang, Keng-Chu Lin. 959-962
- First Passage Time Density for the Disease Progression of HIV Infected PatientsC. F. Lo. 963-968
- HIV Prevalence: A Comparison between Canada, the United States, and MexicoB. D. Aggarwala. 969-983
- Modeling the HIV/AIDS epidemic among injecting drug users and sex workers in Kunming, ChinaNicolas Bacaer, Xamxinur Abdurahman, Ye Jianli. 984-984
- Worst-case Optimal Robust Decisions for Multi-period Mean-Variance Portfolio OptimizationNalan Gülpinar, Berç Rustem. 985-985
- Performance Optimization of a Tandem Router Network Using a Fluid ModelNalan Gülpinar, Peter G. Harrison, Berç Rustem, Louis-François Pau. 986-986
- Wireless Local Area Network ImplementationShamila Makki, Wunnava V. Subbarao. 987-987
- Efficient Design of Streaming Applications on Wireless Networks using Aspect Oriented ProgrammingSalvador Galvan Sanchez, Miguel A. Quintana Suarez, Elsa M. Macías, Álvaro Suárez Sarmiento. 988-988
- Genetic Algorithm based Optimization of Fuzzy Based Attitude Controller for a Spin Stabilized Micro-SatelliteK. Suman Reddy, S. Lakshmi, J. Shanmugam. 989-989
- Phishing is here: Are we readyIndranil Bose, Alvin Leung. 990-990