Abstract is missing.
- Stochastically Robust Resource Management in Heterogeneous Parallel Computing SystemsHoward Jay Siegel. 1-2 [doi]
- Data Structures and Algorithms for Packet Forwarding and ClassificationSartaj Sahni. 3 [doi]
- High-Performance Cloud Computing: A View of Scientific ApplicationsChristian Vecchiola, Suraj Pandey, Rajkumar Buyya. 4-16 [doi]
- Constructing Independent Spanning Trees for Hypercubes and Locally Twisted CubesYi-Jiun Liu, Well Y. Chou, James K. Lan, Chiuyuan Chen. 17-22 [doi]
- A Node-to-Set Disjoint-Path Routing Algorithm in MetacubeAntoine Bossard, Keiichi Kaneko, Shietung Peng. 23-28 [doi]
- A New Network Topology for P2P Overlay Based on a Contracted Star GraphSatoshi Fujita. 29-33 [doi]
- A Fault-Tolerant Routing Algorithm with Safety Vectors on the (n, k)-Star GraphChiao-Wei Chiu, Chang-Biau Yang, Kuo-Si Huang, Chiou-Ting Tseng. 34-39 [doi]
- A Single-Trace Cycle Collection for Reference Counting SystemsTing-Wei Hou, Chin-Yang Lin, Tien-Yan Ma. 40-45 [doi]
- A Heuristic Routing Scheme for Wireless Sensor Networks Based on a Local Search MethodSatoshi Fujita, XingPing He, Sayaka Kamei. 46-51 [doi]
- Identifying Useless States in Non-FIFO Distributed Computations by Using Pseudo TimestampsLung-Pin Chen, Meng-Yuan Ho, Jhen-You Hong. 52-56 [doi]
- Job Scheduling Techniques for Distributed Systems with Heterogeneous Processor CardinalityHung-Jui Chang, Jan-Jan Wu, Pangfeng Liu. 57-62 [doi]
- Effective Use of Dynamic Page Migration on NUMA Platforms: The Gaussian Chemistry Code on the SunFire X4600M2 SystemRui Yang, Joseph Antony, Alistair P. Rendell. 63-68 [doi]
- Pipelined Computation of Very Large Word-Length LNS Addition/Subtraction Computation with Exponential Convergence RateRui-Lin Chen, Chichyang Chen. 69-73 [doi]
- Smaller Split L-1 Data Caches for Multi-core Processing SystemsOluwayomi Adamo, Afrin Naz, Tommy Janjusic, Krishna M. Kavi, Chung-Ping Chung. 74-79 [doi]
- Conflict-Avoidance in Multicore Caching for Data-Similar ExecutionsSusmit Biswas, Diana Franklin, Timothy Sherwood, Frederic T. Chong. 80-85 [doi]
- dIP: A Non-intrusive Debugging IP for Dynamic Data Race Detection in Many-CoreChi-Neng Wen, Shu-Hsuan Chou, Tien-Fu Chen. 86-91 [doi]
- Greedy Prefix Cache for IP Routing LookupsZhuo Huang, Gang Liu, Jih-Kwon Peir. 92-97 [doi]
- Path-Analytic Distributed Object PrefetchingYang Luo, King Tin Lam, Cho-Li Wang. 98-103 [doi]
- An Effective Throttling Method Based on Quasi-global Congestion InformationTakashi Yokota, Kanemitsu Ootsu, Takanobu Baba. 104-109 [doi]
- Design and Implementation of a Web2.0-Based Home-Appliances Control Service PlatformChung-Ming Huang, Hao-Hsiang Ku, Cheng-Wei Lin. 110-115 [doi]
- Towards Thermal Aware Workload Scheduling in a Data CenterLizhe Wang, Gregor von Laszewski, Jai Dayal, Xi He, Andrew J. Younge, Thomas R. Furlani. 116-122 [doi]
- Network Aware Compression Based Rate Control for Printing SystemChih-Yu Tang, James A. Storer. 123-128 [doi]
- Toward a Human Nature Based Automation System with Dynamic Function Allocation Model Supported for Pervasive SystemsPo-Yu Chen, Wen-Jong Wu. 129-134 [doi]
- A Goal-Directed Human Activity Computing ModelJianwen Xiang, Akira Mori. 135-142 [doi]
- PlaceAware: A Tool for Enhancing Social Interactions in Urban PlacesTuan Nguyen, Seng Wai Loke, Torab Torabi, Hongen Lu. 143-147 [doi]
- A Pervasive System Architecture That Supports Adaptation Using Agents and OntologiesAchilles Kameas, Christos Goumopoulos, Hani Hagras, Michael Gardner, Tobias Heinroth, Wolfgang Minker, Apostolos Meliones, Dimitris Economou, Yacine Bellik, Gaëtan Pruvost. 148-153 [doi]
- SoCQ: A Framework for Pervasive EnvironmentsYann Gripay, Frédérique Laforest, Jean-Marc Petit. 154-159 [doi]
- Geo-spatial Tagging of Image Collections Using Temporal Camera Usage DynamicsFrode Eika Sandnes. 160-165 [doi]
- Defending Traffic Analysis with Communication Cycles in Wireless Sensor NetworksHou-Jie Wang, Tien-Ruey Hsiang. 166-171 [doi]
- Chaining Clock Synchronization: An Energy-Efficient Clock Synchronization Scheme for Wireless Sensor NetworksSang-Hoon Lee, Lynn Choi. 172-177 [doi]
- Locally Approximate Boundaries in Wireless Sensor NetworksChing-Yao Wang, Tien-Ruey Hsiang. 178-183 [doi]
- On the Reliability of Wireless Sensors with Software-Based Attestation for Intrusion DetectionIng-Ray Chen, Ding-Chau Wang. 184-189 [doi]
- TRENS: A Tracking-Assisted Routing Scheme for Wireless Sensor NetworksYuan-Po Chi, Hsung-Pin Chang. 190-195 [doi]
- Performance of an Energy Efficient Routing Design for Wireless Sensor NetworksYung-Fa Huang, Tan-Hsu Tan, Yau-Der Wang, Jiun-jian Liaw, Ding Yin. 196-201 [doi]
- Energy Conservation with Network Coding for Wireless Sensor Networks with Multiple Crossed Information FlowsPhilipp M. Glatz, Karima B. Hein, Reinhold Weiss. 202-207 [doi]
- Research on Service Oriented and Middleware Based Active QoS Infrastructure of Wireless Sensor NetworksNan Hua, Ning Yu, Yi Guo. 208-213 [doi]
- A Bandwidth-Based Routing Protocol with Efficient Path Discovery in Mobile Ad Hoc NetworksChing-Wen Chen, Chuan-Chi Weng. 214-219 [doi]
- Hierarchical Cell Relay Scheme with GPS for Mobile Ad Hoc NetworksTsung-Chuan Huang, Hung-Yi Chi, Shih-Kai Huang. 220-225 [doi]
- A Capacity-Aware and Multipath-Supported Traffic Control Framework in Wireless Mesh NetworksPa Hsuan, Chyi-Ren Dow, P. J. Lin, K. C. Lai. 226-231 [doi]
- A Zone Based Interleaved Scanning Technique for Fast Handoff in IEEE 802.11 Wireless NetworksAbhijit Sarma, Rajat Kumar Gupta, Sukumar Nandi. 232-237 [doi]
- An Energy-Efficient Dynamic Key Management Scheme in Wireless Sensor NetworksXing Zhang, Jingsha He, Qian Wei. 238-242 [doi]
- Multi-path Protocol for High Data Confidentiality and Reliability in Wireless Sensor Networks Using Non-dominated Dynamic CompensationYong Zeng, Qinqi Pei, Jianfeng Ma, Sang-Jae Moon. 243-248 [doi]
- An Efficient Three Party Authenticated Key Exchange for Mobile CommunicationsHui-Feng Huang, Yi-Jia Chang, Kuo-Ching Liu. 249-253 [doi]
- A Trust Discovery Model Based on Weighted ClosenessJunfeng Tian, Yuzhen Lu, Peng Yuan. 254-259 [doi]
- Decomposable Forward Error Correction Codes Based on Chinese Remainder TheoremHung-Min Sun, Shih-Ying Chang, Yu-Hsiang Hung, Yu-Kai Tseng, Hsin-Ta Chiao. 260-265 [doi]
- Efficient Broadcast Mechanism for Cooperative Collision Avoidance Using Power ControlAndy An-Kai Jeng, Rong-Hong Jan, Chien Chen, Tsun-Chieh Chiang. 266-271 [doi]
- Extended MIMO Model Research of Seismic Specific CableHaishan Wang, Cheng Ma, Huibo Jia. 272-277 [doi]
- Frame-Based Adaptive Uplink Scheduling Algorithm in OFDMA-Based WiMAX NetworksI-Shyan Hwang, Chih-Wei Huang, Bor-Jiunn Hwang. 278-283 [doi]
- Improvement of Multi-hop Packet Transmission Scheduling in WDM Optical Star NetworksHann-Jang Ho, Jung-Chun Liu, Sing-Ling Lee. 284-289 [doi]
- Solutions to Multihoming in IPv6 Based on MIPv6 and NEMOPeng-Hsien Wu, Kuan-Lin Chiu, Ren-Hung Hwang. 290-295 [doi]
- QoS Aware Multiple Spanning Tree Mechanism in Multi-radio Multi-channel Wireless Mesh NetworkS. Aoufi, Djamel Tandjaoui. 296-302 [doi]
- Performance Analysis of Algorithms with Multiple Attributes for Adaptive Call Admission Control in Heterogeneous Wireless NetworksCheng-Mu Shiao, Ruey-Rong Su, I-Shyan Hwang, Bor-Jiunn Hwang. 303-308 [doi]
- A Walkie-Talkie-Like Emergency Communication System for Catastrophic Natural DisastersYao-Nan Lien, Li-Cheng Chi, Yuh-Sheng Shaw. 309-314 [doi]
- The Hierarchically Distributed Mobile Metadata (HDMM) Style of Architecture for Pervasive Metadata NetworksCarl Taswell. 315-320 [doi]
- Bandwidth-Aware Minimum Power Multicast Routing in Wireless NetworksHong-Hsu Yen, Steven S. W. Lee. 321-325 [doi]
- On Succinctness of Geometric Greedy Routing in Euclidean PlaneLei Cao, Andrew Strelzoff, Jonathan Z. Sun. 326-331 [doi]
- Shortest Multilayered Path for Dimensioning in Two-Layer Connection-Oriented NetworksMichal Kucharzak, Leszek Koszalka, Andrzej Kasprzak. 332-337 [doi]
- Location-Based Reliable Multicast Routing Algorithm for Mobile Ad Hoc NetworksJipeng Zhou, Jianheng Lu. 338-343 [doi]
- A Data-Driven Architecture for Remote Control of Sensors over a Wireless Sensor Network and the InternetYuan-Jen Chang, Chin-Hsing Chen, Wen-Tzeng Huang, You-Yin Chen, Chih-Yuan Kuo. 344-349 [doi]
- Recommend Touring Routes to Travelers According to Their Sequential Wandering BehavioursDirksen Liu, Maiga Chang. 350-355 [doi]
- Using E-mail Authentication and Disposable E-mail Addressing for Filtering SpamJia-Ning Luo, Ming-Hour Yang. 356-363 [doi]
- Random Early Detection Web Servers for Dynamic Load BalancingChih-Chiang Yang, Chien Chen, Jing-Ying Chen. 364-368 [doi]
- Genetic Information Gathering System (GIGS): A New Meta-search Network ToolAndrea Sturm, Cameron McMunn-Coffran, D. Frank Hsu, Kuan-Tsae Huang. 369-372 [doi]
- Simulating an Automated System (SAS) for Merging Medical VocabulariesDan Tisher, Ray Alsaber, Kuan-Tsae Huang, D. Frank Hsu. 373-379 [doi]
- Medical Terminologies That Work: The Example of MeSHStuart J. Nelson. 380-384 [doi]
- Platform-Based Inference System Design Using FML and Fuzzy Technology for HealthcareChen-Yu Chen, Mingzoo Wu, Chi-Lu Yang, Shing-Hua Ho, Chin-Yuan Hsu. 385-389 [doi]
- An Electronic Hospital Bedside-Card Prototype Using RFID and DVB-MHP PlatformChin-Yang Lin, Tien-Yan Ma, Cheng-Liang Lin, Meng-Chin Hsu, Ting-Wei Hou. 390-393 [doi]
- Robust Pairwise Registration for Images of Indocyanine-Green Angiographic SequencesChia-Ling Tsai, Sheng-Tsz Huang, Kai-Shung Lin, Shih-Jen Chen. 394-399 [doi]
- An Intelligent-Mamdani Inference Scheme for Healthcare Applications Based on Fuzzy Markup LanguageShing-Hua Ho, Chi-Lu Yang, Chen-Yu Chen, Chin-Yuan Hsu, Yeim-Kuan Chang. 400-404 [doi]
- A Framework for Personalized Health Trend AnalysisGuo-Cheng Lan, Chao-Hui Lee, Jin-Shang Wu, Huan-Chung Li, Shing-Hua Ho, Vincent S. Tseng. 405-409 [doi]
- Developing a Scientific Image Retrieval System with Prediction CapabilityLi-Jen Kao, Chung-Fu Lu. 410-414 [doi]
- An Approach for Incorporating End User Knowledge into Applications of Information Extraction Classification and Fusion in Institutional EldercareC.-C. Hsia, K. J. Liou, Aung Aung Phyo Wai, Victor Foo Siang Fook, W. Huang, Jit Biswas. 415-420 [doi]
- An Incremental Mining Algorithm for High Average-Utility ItemsetsTzung-Pei Hong, Cho-Han Lee, Shyue-Liang Wang. 421-425 [doi]
- Designing Hi-Facsimile Briefing Remote-Controller with Bluetooth and Speech-Recognition ProcessorChun-Liang Hsu, Sheng-Yuan Yang, Wei-Heng Lin. 426-431 [doi]
- A Novel Approach to Establishing the VPRS Model with Threshold Parameter Selection Mechanism Based on Fuzzy AlgorithmsKuang Yu Huang, Ting Cheng Chang. 432-437 [doi]
- 2-D TERCOM Guidance - Neural Net ApproachShin-Jen Chen, Leh Luoh. 438-441 [doi]
- Estimation of Carrier Frequency Offset for Generalized OFDMA Uplink Systems Using Particle Swarm Optimization AlgorithmsTan-Hsu Tan, Yung-Fa Huang, Jia-Yang Tsao. 442-447 [doi]
- Attribute Normalization in Network Intrusion DetectionWei Wang 0012, Xiangliang Zhang, Sylvain Gombault, Svein J. Knapskog. 448-453 [doi]
- Reliability Analysis for Full-2 CodeSheng Lin, Chi Zhang, Gang Wang, Xiaoguang Liu, Jing Liu. 454-459 [doi]
- Maximized L-Measure and Its Choquet Integral Regression ModelHsiang-Chuan Liu. 460-465 [doi]
- Improved Frame/Block Based Wyner-Ziv Residual Video CodingJui-Chiu Chiang, Kuan-Liang Chen, Chang-Ming Lee, Wen-Nung Lie. 466-469 [doi]
- A Low Complexity Error Concealment Method for H.264 Video Coding Facilitating Hardware RealizationTao-Cheng Chang, Hung-Wei Shen, Jiun-In Guo. 470-473 [doi]
- Quality-of-Service Optimization for Multiple Multimedia Tasks in Real-Time Embedded SystemsKai-Jung Shih, Yi-Hsun Lin, Pao-Ann Hsiung. 474-479 [doi]
- A Demand-Aware Grouping Scheme for VoD Service in Peer to Peer EnvironmentPo-Ying Liao, Yen-Wen Chen. 480-484 [doi]
- Anode-ALM: An Aggregation-Based Application Level Multicast for Media StreamingFeng Liu, Yuxing Peng, Xicheng Lu. 485-491 [doi]
- A Flexible and Effective Colorization SystemHwei-Jen Lin, Li-Kang Chen, Chun-Wei Wang. 492-497 [doi]
- Design and Implementation of Music Information Retrieval and Gathering Engine (MIRAGE)Jenq-Shiou Leu, Chieh Changfan, Kuan-Wu Su, Chi-Feng Chen. 498-501 [doi]
- Watermarking Mechanism for Copyright Protection by Using the Pinned Field of the Pinned Sine TransformMn-Ta Lee, Hsuan T. Chang, Mu-Liang Wang. 502-507 [doi]
- Robust Light Objects Recognition Based on Computer VisionYi-Yuan Chen, Kuen-Ming Lan, Hung-I Pai, Jen-Hui Chuang, Chii-Yah Yuan. 508-514 [doi]
- Vector Bank Based Multimedia Codec System-on-a-Chip (SoC) DesignRuei-Xi Chen, Wei Zhao, Jeffrey Fan, Asad Davari. 515-520 [doi]
- SARIDS: A Self-Adaptive Resource Index and Discovery SystemYi-Hsiang Lin, Wu-Chun Chung, Kuan-Chou Lai, Kuan-Ching Li, Yeh-Ching Chung. 521-526 [doi]
- Peer-to-Peer Video-on-Demand Service in NuWebHui-Ching Huang, Hung-Yi Teng, Ren-Hung Hwang. 527-532 [doi]
- Service Guarantee for Inter-domain Movement in Wireless Peer-to-Peer Live Streaming SystemWenbin Jiang, Haixiang Li, Hai Jin, Xiaofei Liao. 533-538 [doi]
- Improving Processor Allocation in Heterogeneous Computing Grid through Considering Both Speed Heterogeneity and Resource FragmentationPo-Chi Shih, Kuo-Chan Huang, Yeh-Ching Chung. 539-544 [doi]
- Adaptive Workflow-Policy Based Management Scheme for Advanced Heart Disease IdentificationHoe Young Kim, Chan-Hyun Youn, Dong-hyun Kim, Hyewon Song, Eun Bo Shim. 545-549 [doi]
- Adaptivity in Risk and Emergency Management Applications on Pervasive GridsCarlo Bertolli, Gabriele Mencagli, Marco Vanneschi. 550-555 [doi]
- Improving Dense Linear Equation Solver on Hybrid CPU-GPU SystemZhichao Cao, Shiming Xu, Wei Xue, Wenguang Chen. 556-562 [doi]
- Parallel Implementation and Performance Prediction of Object Detection in Videos on the Tilera Many-Core SystemsYa-Fei Hung, Shau-Yin Tseng, Chung-Ta King, Huan-Yu Liu, Shih-Chieh Huang. 563-567 [doi]
- Enhanced Parallel Loop Self-Scheduling for Heterogeneous Multi-core Cluster SystemsChao-Chin Wu, Liang-Tsung Huang, Lien Fu Lai, Ming-Lung Chen. 568-573 [doi]
- The Restricted Connectivity of Locally Twisted CubesJianxi Fan, Shukui Zhang, Xiaohua Jia, Guangquan Zhang. 574-578 [doi]
- Multicast Network with MMI-Based Optical Switches on Active Splitter/Active Combiner StructureChi-Ping Lee, Jiun-Shiou Deng, Ming-Feng Lu, Chien-Ping Chang, Yang-Tung Huang, Ping-Yu Kuei. 579-585 [doi]
- A Path-Based Broadcast Algorithm for Wormhole HypercubesAzade Nazi, Hamid Sarbazi-Azad. 586-591 [doi]
- Fault-Tolerant Hamiltonicity of the WK-Recursive NetworksTung-Yang Ho, Cheng-Kuan Lin, Jimmy J. M. Tan, Lih-Hsing Hsu. 592-595 [doi]
- Efficient Algorithms for Embedding Cycles in Augmented CubesHong-Chun Hsu, Pao-Lien Lai, Chang-Hsiung Tsai, Tseng-Kuei Li. 596-600 [doi]
- Independent Spanning Trees on Folded HypercubesJinn-Shyong Yang, Jou-Ming Chang, Hung Chan. 601-605 [doi]
- The Mutually Independent Bipanconnected Property for HypercubeYuan-Kang Shih, Jimmy J. M. Tan, Lih-Hsing Hsu. 606-609 [doi]
- Adaptive Reactive Routing for VANET in City EnvironmentsC. A. T. H. Tee, A. Lee. 610-614 [doi]
- Performance Evaluation of Broadcast Communication Protocol DSCF (Directional Store-Carry-Forward) for VANETs with Two-Dimensional Road ModelShinpei Kuribayashi, Yusuke Sakumoto, Satoshi Hasegawa, Hiroyuki Ohsaki, Makoto Imase. 615-619 [doi]
- Cooperative Transmission Aid in Intermittent Broken Connection on VANETHung-Chin Jang, Sheng-Chih Chuang. 620-624 [doi]
- Dissemination of Data Aggregation in Vehicular Ad Hoc NetworksHua-Wen Tsai, Tzung-Shi Chen, Sheng-Kai Lin. 625-630 [doi]
- A Bulk Transfer Agent for Improving Data Communication Efficiency in Bullet TrainsTakuya Miyasaka, Yoshihiro Kawahara, Tohru Asami. 631-636 [doi]
- V2X-Based Traffic Congestion Recognition and AvoidanceJan W. Wedel, Björn Schünemann, Ilja Radusch. 637-641 [doi]
- Spatial Context-Awareness in Vehicular Ad Hoc NetworksAttila Török, Peter Laborczi, Balazs Mezny. 642-647 [doi]
- Effectively Changing Pseudonyms for Privacy Protection in VANETsJianxiong Liao, Jianqing Li. 648-652 [doi]
- Analyze a Privacy-Preserving Vehicular Communication Protocol and Propose a New OneLingbo Wei, Jianwei Liu. 653-657 [doi]
- A Simple Delay Time Estimation Method and Its Application to Adaptive OFDM Transmissions for Vehicular Wireless NetworksHong Zhou. 658-662 [doi]
- A Study of OFDMA Access Method in Multi-path Fading ChannelKenko Ota, Naoya Kanai, Yasuji Niitsu, Yukihiro Hirata, Hideaki Matsue. 663-668 [doi]
- Improving Scientific Data Extraction Using Metadata ClassificationYue-Shan Chang, Hsuan-Jen Lai, Hsiang-Tai Cheng. 669-673 [doi]
- Establishing and Evaluating Trust in a Grid EnvironmentShashi Bhanwar, Seema Bawa. 674-678 [doi]
- Implementation of a Distributed File Storage on Peer-to-Peer EnvironmentsChao-Tung Yang, Hung-Yen Chen, Chih-Lin Huang, Shyh-Chang Tsaur. 679-683 [doi]
- Cyberaide Creative: On-Demand Cyberinfrastructure Provision in CloudsCasey Rathbone, Lizhe Wang, Gregor von Laszewski, Fugang Wang. 684-690 [doi]
- Enabling Efficient Peer to Peer Resource Discovery in Dynamic Grids Using Variable Size Routing IndexesMohammad Hassan Khoobkar, Mehregan Mahdavi. 691-695 [doi]
- Distributed Adaptive Load Balancing for P2P Grid SystemsPo-Jung Huang, You-Fu Yu, Kuan-Chou Lai, Chao-Tung Yang. 696-700 [doi]
- On Effects of Resource Fragmentation on Job Scheduling Performance in Computing GridsKuo-Chan Huang. 701-705 [doi]
- Characteristic Approximation for Resources on Computational GridsUei-Ren Chen, Chin-Chi Wu, Woei Lin. 706-710 [doi]
- WebDB-Based CEMS Design and Applications in the Universities of TaiwanAn-Ping Wang, Chun-Yu Chen, Cheng-Ting Lin. 711-716 [doi]
- Temperature Control Framework Using Wireless Sensor Networks and Geostatistical Analysis for Total Spatial AwarenessCharles C. Castello, Jeffrey Fan, Asad Davari, Ruei-Xi Chen. 717-721 [doi]
- An Agile and Low Cost FPGA Implementation of MPEG-2 TS Remultiplexer for CATV Head-End EquipmentYing-Pei Chen, Tsan-Nan Chien, Po-Hsun Cheng, Sao-Jie Chen. 722-726 [doi]
- The Design of Intelligent Decomposed LMS with Embedded Ganglia AgentFu-Chien Kao, Chih-Hong Wang, Ting-Hao Huang, Wen-Yu Chang. 727-731 [doi]
- Bayesian Networks for Fault Detection under Lack of Historical DataRui Maximo Esteves, Tomasz Wiktor Wlodarczyk, Chunming Rong, Einar Landre. 732-736 [doi]
- Information Provenance for Open Distributed Collaborative SystemSyed Imran Jami, Jemal H. Abawajy, Zubair A. Shaikh. 737-741 [doi]
- An Approach to Filtering RFID Data StreamsHairulnizam Mahdin, Jemal H. Abawajy. 742-746 [doi]
- An Improved Parallel Implementation of 3D DRIE Simulation on GPUFan Zhang, Gang Wang, Xiaoguang Liu, Jing Liu. 747-751 [doi]
- A Batched GPU Algorithm for Set IntersectionDi Wu, Fan Zhang, Naiyong Ao, Fang Wang, Xiaoguang Liu, Gang Wang. 752-756 [doi]
- High Speed Articulated Object Tracking Using GPUs: A Particle Filter ApproachRaúl Cabido, David Concha, Juan José Pantrigo, Antonio S. Montemayor. 757-762 [doi]
- A Layered Security Approach for Cloud Computing InfrastructureMehmet Yildiz, Jemal H. Abawajy, Tuncay Ercan, Andrew Bernoth. 763-767 [doi]
- Governance of Information Security Elements in Service-Oriented Enterprise ArchitectureJanne J. Korhonen, Mehmet Yildiz, Juha Mykkänen. 768-773 [doi]
- Entropy-Based High-Accuracy Distributed Faulty Sensor Detection Algorithm in Wireless Sensor NetworksWen Ouyang, Yu-Ting Liu, Yu-Wei Lin. 774-778 [doi]
- Automatically Generating Classifier for Phishing Email PredictionLiping Ma, Rosemary Torney, Paul Watters, Simon Brown. 779-783 [doi]
- Determining Service Trustworthiness in Intercloud Computing EnvironmentsJemal H. Abawajy. 784-788 [doi]
- Multi-tier Phishing Email Classification with an Impact of Classifier ReschedulingMd. Raifqul Islam, Jemal H. Abawajy, Matthew Warren. 789-793 [doi]
- How RFID Attacks Are Expressed in Output DataLuke Mirowski, Jacqueline Hartnett, Raymond Williams. 794-799 [doi]