Abstract is missing.
- Cross-domain service change notification via trader federationBanjong Huongrat, Twittie Senivongse. 2-7 [doi]
- Extending desktop applications to the webArno Puder. 8-13 [doi]
- The design of the IPACS distributed software architectureHeinz Kredel, Matthias Merz. 14-19 [doi]
- Value type-based smart proxies: a concept for adaptable distributed applicationsMarkus Aleksy, Ralf Gitzel. 20-25 [doi]
- Convergence technologies for sensor systems in the Next Generation networks (NGN)Conor Gildea, Declan Barber. 26-31 [doi]
- Traffic protection and restoration schemes in core routers/switchesDeepak Mathur. 32-37 [doi]
- SuperPipe: next generation of high speed trunksDeepak Mathur. 38-43 [doi]
- A clustered tree method for implementing application level multicastXue Bai, Ade G. Ola, Yinjing Cui, Fidelis Ikem. 44-49 [doi]
- Developing multiparty conferencing services for the NGN: towards a service creation frameworkGavin Byrne, Declan Barber. 50-55 [doi]
- Resource allocation and QoS in mobile ad hoc networksHussein Ali, Mohammad Inayatullah, Shmuel Rotenstreich. 56-62 [doi]
- One name—many objects—one result: a possible solution for naming systemLadda Preechaveerakul, Pattarasinee Bhattarakosol. 63-67 [doi]
- Retrieval schemes for scalable unstructured P2P systemLan Quan, Tai Rang Eom, Kyung-Geun Lee, Ju-wook Jang, Sang-Yun Lee. 68-73 [doi]
- QoS multi-agent applied for Grid Service managementMontree Bunruangses, Weerawat Poompatanapong, Pratheep Banyatnoparat, Bunjong Piyatamrong. 74-79 [doi]
- Packet arrivals in ethernet-based data networksTh. Vergin, Thomas Kessler, Andreas Ahrens, Christoph Lange, Hans-Dietrich Melzer. 80-85 [doi]
- Improving information retrieval effectiveness by assigning context to documentsVivek Chanana, Athula Ginige, San Murugesan. 86-91 [doi]
- Autonomous collaborative web agentsDavid Byer, Colin Depradine. 92-96 [doi]
- A system for document markup and organisationShazia Akhtar, John Dunnion, Ronan G. Reilly. 97-102 [doi]
- Topic Detection in the news domainCormac Flynn, John Dunnion. 103-108 [doi]
- Adaptive recommendation: putting the best foot forwardJohn O Donovan, John Dunnion. 109-114 [doi]
- Automatically building conceptual graphs using VerbNet and WordNetSvetlana Hensman, John Dunnion. 115-120 [doi]
- The educational value chain as a modelling tool in re-engineering effortsAlta van der Merwe, Johannes C. Cronjé. 122-127 [doi]
- A component integration meta-framework using smart adaptersLeon Jololian, Jean-Claude Ngatchou, Remzi Seker. 128-133 [doi]
- Role-based information security: change management issuesPratap Chillakanti. 134-139 [doi]
- Knowledge discovery and experience modeling in computer forensics media analysisA. Chris Bogen, David A. Dampier. 140-145 [doi]
- Experiments in hiding data inside the file structure of common office documents: a stegonography applicationGary Cantrell, David D. Dampier. 146-151 [doi]
- Management of information technology: the study on strategy, planning and policiesAmirrudin Kamsin. 152-157 [doi]
- The collaborative system strategiesAmirrudin Kamsin, Mas Idayu Md Sabri. 158-165 [doi]
- A review of research: an investigation of the impact of data quality on decision performanceWonjin Jung. 166-171 [doi]
- Business rules domains and business rules modelingNicholas Zsifkov, Radu Campeanu. 172-177 [doi]
- A theoretical concept for XML-enabled global small business networksNils Schumacher. 178-184 [doi]
- Multi-discipline-reengineering/redevelopment of IT-infrastructuresThomas H. Lenhard. 185-189 [doi]
- Investigating heterogeneous combination of functional units for a criticality-based low-power processor architectureAkihiro Chiyonobu, Toshinori Sato. 190-195 [doi]
- Performance sensitivity of SPEC CPU2000 over operating frequencyJunSeong Kim, JongSu Yi. 196-201 [doi]
- The image analysis system with Adaptive ComponentChul Choi, Young-Kwan Choi, Chang-Chun Park. 202-207 [doi]
- A research of merging regions through isophotes analysisSeung Soo Lee, Jeong-A. Lee, Chang Choon Park. 208-213 [doi]
- Image retrieval using color component analysisYoung-Kwan Choi, Chul Choi, Chang-Chun Park. 214-219 [doi]
- Meta-EAH: an adaptive encoder based on adaptive codes. Moving between adaptive mechanismsDragos Trinca. 220-225 [doi]
- Growing adaptation of computer science in BioinfomaticsMayumi Kato, Chia-Tien Dan Lo. 226-231 [doi]
- Illustrating the curse of dimensionality numerically through different data distribution modelsIan Eccles, Meng Su. 232-237 [doi]
- Resource allocation for handoffs in integrated wireless cellular networksWei Li, Hang Chen, Qing-An Zeng, Dharma P. Agrawal. 238-243 [doi]
- Preventing type flaw attacks on security protocols with a simplified tagging schemeYafen Li, Wuu Yang, Ching-Wei Huang. 244-249 [doi]
- High-level heterogeneous distributed parallel programmingChia-Chu Chiang. 250-255 [doi]
- A CORBA adapter to promote reusability of Java componentsChia-Chu Chiang, Zhendong Chen. 256-261 [doi]
- Explicitly and implicitly teaching Java best practices across the undergraduate curriculumJoel K. Hollingsworth, David J. Powell. 262-267 [doi]
- Experiences in code migration from main applications to J2EE serversPat Shuff, Michael Bolton. 268-274 [doi]
- A Java framework for bio-analysis systemsRaymond Imhoff, Colin Depradine. 275-280 [doi]
- N-queens pattern generation: an insight into space complexity of a backtracking algorithmAdrijan Bozinovski, Stevo Bozinovski. 281-286 [doi]