Abstract is missing.
- Design of random noise generator using SW algorithmJinkeun Hong, Sunchun Park, Janghong Yoon, Jae-Young Koh, Daeho Kim. 9-14 [doi]
- A processor array for computing wavelet energiesNeil Dunstan, Stephen Hodgson. 15-20 [doi]
- A wavelet-based approach for frequency estimation of interference signals in printed circuit boardsAbdellah Kacha, Francis Grenez, P. De Doncker, Khier Benmahammed. 21-26 [doi]
- The use of smart devices in eHealthJohn Fulcher. 27-32 [doi]
- Detection of the mucosal wave in the speech signal for larynx pathology characterizationP. Gómez, V. Nieto, R. Martínez, A. Alvarez, F. Rodríguez, V. Rodellar. 33-39 [doi]
- A neural network, speech-based approach to literacyJohn Fulcher, Russell Gluck, Marion Worthy, Kim Draisma, Wilma Vialle. 40-45 [doi]
- Assistive technology in computer scienceBlaise W. Liffick. 46-51 [doi]
- Correlation of the entrance examination result and the study success at the Medical Faculty, Charles University PragueCestmir Stuka, Daniel Smutek. 52-57 [doi]
- Problems in operational and systems analysis educational process: solved by ICT applicationMartina Berankova, Petra Nevrivova. 58-63 [doi]
- Radial basis function classifier for fault diagnosticsGanka Petkova Kovacheva, Hidemitsu Ogawa. 64-69 [doi]
- Adapting support vector machine methods for horserace odds predictionDavid Edelman. 70-75 [doi]
- An evolutionary approach for reducing the energy in address busesGiuseppe Ascia, Vincenzo Catania, Maurizio Palesi, Antonio Parlato. 76-81 [doi]
- Detecting watermarks at arbitrary image resolutionJosef Scharinger. 82-87 [doi]
- Image data compression in wavelet transform domain using modified LBG algorithmOthman Khalifa. 88-93 [doi]
- The encryption method to share a secret binary image and its decryption systemSang-Su Lee, Jong-Wook Han, Hyo-wook Bae. 94-99 [doi]
- Different types of image texture features in ultrasound of patients with lymphocytic thyroiditisDaniel Smutek, Radim Sára, Petr Sucharda, Ludvík Tesar. 100-102 [doi]
- The involvement of human resources in large scale data mining projectsMarkus Hofmann, Brendan Tierney. 103-109 [doi]
- Using metadata for developing automated Web system interfaceAbdualrraouf A. Elbibas, Mick J. Ridley. 113-118 [doi]
- A new histogram method for sparse attributes: the averaged rectangular attribute cardinality mapB. John Oommen, Jing Chen. 119-125 [doi]
- A novel speed-sensitive bidirectional overflow and hand-down resource allocation strategy for hierarchical cellular networksVahid Tabataba Vakili, Arash Aziminejad, Mohammad Reza Dehbozorgi. 126-131 [doi]
- Wireless technologies for data acquisition systemsSakari Junnila, Jarkko Niittylahti. 132-137 [doi]
- Video transmission over a GSM wireless networkYun Gong, Tadas Marcinkevicius. 138-143 [doi]
- Analyzing the codes that avoid specified differences by binary treeXuerong Yong. 144-149 [doi]
- MAI-suppression with fractional T-equalizer for CDMAKlaus Knoche, Jäurgen Rinas, Karl-Dirk Kammeyer. 150-155 [doi]
- Adaptive systems for ubiquitous computingDavid Lewis, Declan O Sullivan. 156 [doi]
- Present and future organisational models for wireless networksRobert O Connor, Sven van der Meer. 157-162 [doi]
- Applications considered harmful for ambient systemsSimon Dobson. 163-168 [doi]
- Towards a natural interface to adaptive service compositionSteffen Higel, Tony O Donnell, Vincent Wade. 169-174 [doi]
- Usability of mobile devices and intelligently adapting to a user s needsStephen Greene, Jason Finnegan. 175-180 [doi]
- Intelligent access and mobility management in heterogeneous wireless networks using policyKen Murray, Rajiv Mathur, Dirk Pesch. 181-186 [doi]
- Dynamic configuration management for MANETs: an overviewJohn Paul O Grady, Susan Rea, Sinead Cummins, Dirk Pesch, Rajiv Mathur. 187-192 [doi]
- Programming structures for adaptive ambient systemsPaddy Nixon, Feng Wang, Sotirios Terzis. 193-198 [doi]
- Topic maps for context managementRuaidhri Power. 199-204 [doi]
- Next generation context aware adaptive servicesOwen Conlan, Ruaidhri Power, Steffen Higel, Declan O Sullivan, Keara Barrett. 205-212 [doi]
- Adaptive content networkingSven Buchholz, Thomas Buchholz. 213-219 [doi]
- An interaction model for universal interaction and control in multi display environmentsHannah Slay, Bruce H. Thomas, Rudi Vernik. 220-225 [doi]
- Outdoor virtual realityBruce H. Thomas, Wayne Piekarski. 226-231 [doi]
- Iso-phone: a total submersion telephonic experienceJames Auger, Jimmy Loizeau, Stefan Agamanolis. 232-236 [doi]
- Adding haptic feedback to engineering simulationJ. Shi, I. A. Oraifige, F. R. Hall. 237-241 [doi]
- New tools and practices for electronic music distributionFrancis Rousseaux, Alain Bonardi. 242-248 [doi]
- On merging structured documents with move operationNobutaka Suzuki, Yorichiro Sato, Michiyoshi Hayase. 249-254 [doi]
- Digital document life cycle developmentHenryk Krawczyk, Bogdan Wiszniewski. 255-260 [doi]
- Enriching online learning resources with explanograms Arnold Neville Pears, Carl Erickson. 261-266 [doi]
- Developing an XML framework for metadata systemRuey-Shun Chen, Shien-Chiang Yu. 267-272 [doi]
- Tag semantics for the retrieval of XML documentsDavide Buscaldi, Giovanna Guerrini, Marco Mesiti, Paolo Rosso. 273-278 [doi]
- The influence of semantics in IR using LSI and K-means clustering techniquesDaniel Jiménez, Edgardo Ferretti, Vicente Vidal, Paolo Rosso, Carlos F. Enguix. 279-284 [doi]
- An entity-relation approach to information retrievalAntonio Ferrández Rodríguez, Julio Martínez, Jesús Peral. 285-290 [doi]
- Spam filters: bayes vs. chi-squared; letters vs. wordsCormac O Brien, Carl Vogel. 291-296 [doi]
- Inducing a cline from corpora of political manifestosSofie Van Gijsel, Carl Vogel. 297-303 [doi]
- An improved algorithm for semantic clusteringGabriel Castillo, Gerardo Sierra, John McNaught. 304-309 [doi]
- A new approach to conceptual document indexing: building a hierarchical system of concepts based on document clustersMartin Holub. 310-315 [doi]
- An abstraction-based approach to measuring the structural similarity between two unordered XML documentsMarco Mesiti, Elisa Bertino, Giovanna Guerrini. 316-321 [doi]
- Analysis of a mobile communication security protocolTom Coffey, Reiner Dojen. 322-328 [doi]
- On the automated implementation of modal logics used to verify security protocolsTom Coffey, Reiner Dojen, Tomas Flanagan. 329-334 [doi]
- Security protocols for 2G and 3G wireless communicationsT. Newe, Tom Coffey. 335-340 [doi]
- Structure free highway toll collection using non-repudiated ticketsNol Premasathian, Somying Thainimit. 341-344 [doi]
- A study of the method of providing secure network channel among secure OSsJae-Deok Lim, Joon-Suk Yu, Jeong-Nyeo Kim. 345-350 [doi]
- Analysing the security of a non-repudiation communication protocol with mandatory proof of receiptTom Coffey, Puneet Saidha, Peter Burrows. 351-356 [doi]
- E-business security issues for SMEs in a virtual hosting environmentNeville I. Williams. 357-364 [doi]
- Modelling a flexible network security systems using multi-agents systems: security assessment considerationsGustavo A. Santana Torrellas, Luis A. Villa Vargas. 365-371 [doi]
- Hybrid stochastic framework for freeway traffic flow modellingLyudmila Mihaylova, René K. Boel. 372-377 [doi]
- Signal pattern recognition, hidden markov modeling and traffic flow modeling filters applied in existing signaling of cellular networks for vehicle volume estimationTheodore S. Stamoulakatos, Efstathios D. Sykas. 378-384 [doi]
- A new modified Smith predictor designPauline Sourdille, Aidan O Dwyer. 385-390 [doi]
- Anti-run-dry algorithm for optimal control of playoutbuffersBrita H. Hafskjold. 391-398 [doi]
- Digital interaction: introduction to the first international workshopClaudia Roda, Julie Thomas. 399-402 [doi]
- Supporting human interaction through digital technology: theory and practiceJacqueline Brodie, James Evans, Laurence Brooks, Mark Perry. 403-408 [doi]
- The language of machinesEva Jacobus, Brian R. Duffy. 409-414 [doi]
- The design of I-mass as a tool for interacting with cultural heritageGeert de Haan. 415-420 [doi]
- Explicitness and interactivityPäivö Laine, Lic. Phil. 421-426 [doi]
- Interaction space theory: a framework for tool developmentDuska Rosenberg, Simon Foley, Stavros Kammas, Mirja Lievonen. 427-432 [doi]
- Considerations in the usage of text to speech (TTS) in the creation of natural sounding voice enabled web systemsBryan Duggan, Mark Deegan. 433-438 [doi]
- Hand posture matching for Irish Sign language interpretationG. Somers, R. N. Whyte. 439-444 [doi]
- Perceptual issues for the use of 3D auditory displays in operational environmentsDerek Brock, James A. Ballas, Brian McClimens. 445-448 [doi]
- Supporting complexity through (informational and physical) collaboration and modelingDaniel C. M. May, Bent Bruun Kristensen, Palle Nowack. 449-455 [doi]
- Designing and creating relational schemas with a CWM-based toolKumpon Farpinyo, Twittie Senivongse. 456-461 [doi]
- The development of the information systemsJosef Pavlicek, Vojtech Merunka, Petra Nevrivova. 462-467 [doi]
- Dynamic profiling & comparison of Sun Microsystems JDK1.3.1 versus the Kaffe VM APIsAnthony Sartini, John Waldron. 468-474 [doi]
- Designing for flexibility: separating user interface design from program logic and dataMarko Niinimäki, Miika Tuisku, Matti Heikkurinen. 475-480 [doi]
- Security in the Web Services FrameworkChen Li 0008, Claus Pahl. 481-486 [doi]
- A policy-based security framework for Web-enabled applicationsMarian Ventuneac, Tom Coffey, Ioan Salomie. 487-492 [doi]
- Multi-users shared whiteboard under Web-multicast systemM. A. Ngadi, Bernard S. Doherty. 493-498 [doi]
- MIEA 2003 workshop: message from the editorsRalf Gitzel, Markus Aleksy. 499 [doi]
- Unified security frameworkGilson Wilson, Ullas O. Tharakan. 500-505 [doi]
- A marriage of Web services and reflective middleware to solve the problem of mobile client interoperabilityPaul Grace, Gordon S. Blair, Sam Samuel. 506-511 [doi]
- Relationship between the standard compliance of IDL-compilers and interoperability of CORBA-based applicationsMarkus Aleksy, Ralf Gitzel. 512-517 [doi]
- A multithreaded Java framework for information extraction in the context of enterprise application integrationStefan Kuhlins, Axel Korthaus. 518-523 [doi]
- An open system architecture for operation support system at telecommunications service providersCledson Akio Sakurai, Moacyr Martucci Junior. 524-529 [doi]
- An automated reasoning for diagnostic knowledge in a distributed environmentSusumu Yamasaki, Mariko Sasakura. 530-535 [doi]
- Middleware for large distributed systems and organizationsGeorge Dimitoglou, Philippe Moore, Shmuel Rotenstreich. 536-542 [doi]
- Applying grid security and virtual organization tools in distributed publication databasesMarko Niinimäki, Vesa Sivunen. 543-548 [doi]
- Adaptive domain model: dealing with multiple attributes of self-managing distributed object systemsPavel Motuzenko. 549-554 [doi]
- IPv6 single-path and multi-path anycast routing protocols performance analysisK. H. Tan, Mashkuri Yaacob, T. C. Ling, K. K. Phang. 555-560 [doi]
- A query federation of UDDI registriesPornpong Rompothong, Twittie Senivongse. 561-566 [doi]
- An investigation of TCP throughput variation for SIP trafficMeredith Lulling, John Vaughan. 567-572 [doi]
- Forwarding treatment preservation of differentiated services behaviour aggregate flows across heterogenous network domains by employing the symbiotic packet processing architectureIstvan Matyasovszki, Colin Flanagan. 573-578 [doi]
- A new approach for distributed computing in avionics systemsMiguel A. Sánchez-Puebla, Jesús Carretero. 579-584 [doi]
- Software algorithms in intelligent employment agentJ. Nazean, Jason Chan. 585-589 [doi]
- Object oriented analysis and UML design in the development of accommodation services systemSiti Hafizah Ab Hamid, Tan Yoke Pei, Nazean Jomhari. 590-595 [doi]
- HISC architecture: an object-oriented computing system596 [doi]
- Object-oriented processor requirements with instruction analysis of Java programsMok Pak Lun, Anthony Fong, Gary K. W. Hau. 597-602 [doi]
- Hardware support for user-access control on an object-oriented processorKaiman Lo, Pak Lun Mok, Wing Shing Yu, Anthony S. Fong. 603-608 [doi]
- Test bench for software development of object-oriented processorRyan W. S. Yu, Gary K. W. Hau, Anthony S. Fong. 609-614 [doi]
- Support of Java API for the jHISC systemGary K. W. Hau, Anthony Fong, Mok Pak Lun. 615-620 [doi]