Abstract is missing.
- Programming Highly Parallel Reconfigurable Architectures for Public-Key Cryptographic ApplicationsGiovanni Agosta, Luca Breveglieri, Gerardo Pelosi, Martino Sykora. 3-10 [doi]
- A Reconfigurable Processor for the Cryptographic nT Pairing in Characteristic 3Robert Ronan, Colm O Eigeartaigh, Colin C. Murphy, Tim Kerins, Paulo S. L. M. Barreto. 11-16 [doi]
- Efficient Hardware for Modular Exponentiation Using the Sliding-Window MethodNadia Nedjah, Luiza de Macedo Mourelle, Rodrigo Martins da Silva. 17-24 [doi]
- Two Novel Resource Management Schemes for Integrated Wireless NetworksWei Shen, Qing-An Zeng. 25-30 [doi]
- TCP Congestion Window Optimization for CDMA2000 Packet Data NetworksMuhammad Adeel, Ahmad Ali Iqbal. 31-35 [doi]
- Computationally Efficient Resource Allocation in OFDM Systems: Genetic Algorithm ApproachYenumula B. Reddy, Nandigam Gajendar, Portia Taylor, Damian Madden. 36-41 [doi]
- Analysis of Time-Based Random Waypoint Mobility Model for Wireless Mobile NetworksAbbas Nayebi, M. R. Rahimi, Hamid Sarbazi-Azad. 42-47 [doi]
- No-Beacon GEDIR: Location-Based Ad-Hoc Routing with Less Communication OverheadMika Watanabe, Hiroaki Higaki. 48-55 [doi]
- Design of a QoS Signaling API for Advanced Multimedia Applications in NGNOgnjen Dobrijevic, Miran Mosmondor, Maja Matijasevic. 56-64 [doi]
- Study on Worm Poisoning TechnologyBing Wu, Xiao-chun Yun, Xiang Cui. 65-70 [doi]
- A Discrete-time Queue Analytical Model based on Dynamic Random Early DropHussein Abdel-jaber, Michael E. Woodward, Fadi A. Thabtah, Mahmud Etbega. 71-76 [doi]
- Dynamic Two-Layer Signature-Based IDS with Unequal DatabasesMehdi Salour, Xiao Su. 77-82 [doi]
- A new Dynamic Key Generation Scheme for Fraudulent Internet Payment PreventionOsama Dandash, Yiling Wang, Phu Dung Le, Bala Srinivasan. 83-88 [doi]
- THIS: THreshold security for Information aggregation in Sensor networksHai Vu, Neeraj Mittal, Subbarayan Venkatesan. 89-95 [doi]
- Proactive model for Mitigating Internet Denial-of-Service AttacksH. R. Nagesh, K. Chandra Sekaran, Adarsh Rao Kordcal. 96-101 [doi]
- IdSRF: ID-based Secure Routing Framework for Wireless Ad-Hoc NetworksWei Ren, Yoohwan Kim, Ju-Yeon Jo, Mei Yang, Yingtao Jiang. 102-110 [doi]
- Virtual Sensor Networks - A Resource Efficient Approach for Concurrent ApplicationsAnura P. Jayasumana, Qi Han, Tissa H. Illangasekare. 111-115 [doi]
- Cell-based Distributed Addressing Technique Using Clustered Backbone ApproachAshwini Raina, Venkatesan Muthukumar, Laxmi Gewali. 116-121 [doi]
- Node Clustering in Wireless Sensor Networks by Considering Structural Characteristics of the Network GraphNikos Dimokas, Dimitrios Katsaros, Yannis Manolopoulos. 122-127 [doi]
- Reliable and Efficient Data Transfer in Wireless Sensor Networks via Out-of-Sequence Forwarding and Delayed Request for Missing PacketsDamayanti Datta, Sukhamay Kundu. 128-133 [doi]
- Sensos: A Sensor Node Operating System with a Device Management Scheme for Sensor NodesManseok Yang, Sun Sup So, Steve Eun, Brian Kim, Jinchun Kim. 134-139 [doi]
- Interference Aware Routing in Sensor NetworkMin Tun, Laxmi Gewali, Henry Selvaraj. 140-146 [doi]
- Genetic Algorithm for Energy Efficient Clusters in Wireless Sensor NetworksSajid Hussain, Abdul Wasey Matin, Obidul Islam. 147-154 [doi]
- A Mobile Context Dissemination MiddlewareGuido Gehlen, Fahad Aijaz, Muhammad Sajjad, Bernhard Walke. 155-160 [doi]
- DPQ: Using A Distributed Priority Queue to Improve Ad hoc TCP PerformanceJinsuo Zhang, Stacey Franklin Jones, Junling Wang, Sumi Helal. 161-165 [doi]
- Wireless Community Networks: Public Assets for 21st Century SocietyElaine Lawrence, Maria Bina, Gordana Culjak, Tarek El Kiki. 166-174 [doi]
- Novel Edge DetectionMuhammad Saleem, Imran Touqir, Adil Masood Siddiqui. 175-180 [doi]
- Time Complexity Analysis for Decoding VOP Content in MPEG-4 PresentationsSarang Joshi, S. K. Bodhe. 181-182 [doi]
- Comparison of Pyramidal and Packet Wavelet Coder for Image Compression Using Cellular Neural Network (CNN) with Thresholding and QuantizationS. Rahul, J. Vignesh, S. Santhosh Kumar, M. Bharadwaj, N. Venkateswaran. 183-184 [doi]
- A Neural Solution for Signal Detection In Non-Gaussian NoiseDilip Gopichand Khairnar, Shabbir N. Merchant, Uday B. Desai. 185-189 [doi]
- Structurally Efficient Video Codec for Wireless Mobile ApplicationsPremkumar Elangovan, Gaoyong Luo, Geoff Lawday. 190-195 [doi]
- Design of a Low Power Multiply-Accumulator for 2D Convolution in Video Processing ApplicationsHau T. Ngo, Vijayan K. Asari. 196-201 [doi]
- Octree-Based 3D Animation Compression with Motion Vector SharingJinghua Zhang, Jinsheng Xu, Huiming Yu. 202-207 [doi]
- Input Fuzzy Modeling for the Recognition of Handwritten Hindi NumeralsMadasu Hanmandlu, J. Grover, Vamsi Krishna Madasu, Shantaram Vasikarla. 208-213 [doi]
- Pattern based Residual Coding for H.264 EncoderManoranjan Paul, M. Manzur Murshed. 214-218 [doi]
- Polygonal Approximation of 2-D Binary ImagesSeema H. Jadhav, B. S. Tarle, L. M. Waghmare. 219-223 [doi]
- Image Resolution Enhancement Using a Hopfield Neural NetworkShuangteng Zhang, Yihong Lu. 224-228 [doi]
- Hypergraphs for Near-lossless Volumetric CompressionLuc Gillibert, Alain Bretto. 229-233 [doi]
- Color Image Compression on Spiral Architecture using Optimized Domain Blocks in Fractal CodingNileshsingh V. Thakur, O. G. Kakde. 234-242 [doi]
- A Probabilistic Approach to Source Code Authorship IdentificationJay Kothari, Maxim Shevertalov, Edward Stehle, Spiros Mancoridis. 243-248 [doi]
- Efficient Spam Email Filtering using Adaptive OntologySeongwook Youn, Dennis McLeod. 249-254 [doi]
- Neural Networks in CultivationDangeti Ravi Shankar, Akhil Kodali, Pradeep Beerla, D. V. S. Mohan Nimai. 255-260 [doi]
- Exploration of Autism Expert SystemsSampathkumar Veeraraghavan, Karthik Srinivasan. 261-264 [doi]
- Results of Real Time Simulation of Medical Knowledge Technology (MKT) System for Medical Diagnosis on Distributed Knowledge NodesNarongrit Waraporn. 265-270 [doi]
- Practical Challenges Facing Communities of Interest in the Net-Centric Department of DefenseC. L. Connors, M. A. Malloy. 271-276 [doi]
- A Novel Multi-agent Framework for the Design of Home AutomationWen-Hui Chen, Wen-Shang Tseng. 277-281 [doi]
- Agent Autonomy: Social Integrity and Social IndependenceMarcus J. Huber. 282-290 [doi]
- Search Reverse Nearest Neighbor Query On AirInHo Jang, SangKeun Lee. 291-296 [doi]
- CoCA: A Collaborative Context-Aware Service Platform for Pervasive ComputingDejene Ejigu, Vasile-Marian Scuturici, Lionel Brunie. 297-302 [doi]
- S-MARKS: A Middleware Secure by Design for the Pervasive Computing EnvironmentSheikh Iqbal Ahamed, Munirul M. Haque, K. M. Ibrahim Asif. 303-310 [doi]
- Education and Training for Troubleshooting in Automotive ChassisJanus S. Liang. 311-316 [doi]
- Design Engineering Educational Framework Using ShareFast: A Semantic Web-Based E-Learning SystemKazuo Hiekata, Hiroyuki Yamato, Piroon Rojanakamolsan, Wataru Oishi. 317-322 [doi]
- Lectures for Mobile Devices, Evaluating iPod/PDA-casting Technology and PedagogyKenneth Hoganson, David Lebron. 323-328 [doi]
- An L-Tree Based Analysis of E-lessonsAzita Bahrami. 329-334 [doi]
- Acquiring Information Technology Skills by Freshmen Students at Kuwait University: The Language FactorSamir N. Hamade. 335-340 [doi]
- Web Accessibility and Information Systems CurriculumMohammad Eyadat, Dorothy Fisher. 341-346 [doi]
- Description and composition of services for distant learning and research activitiesOussama Kassem Zein, Yvon Kermarrec. 347-354 [doi]
- Comparing the Specification of a Near-Real Time Commanding System Using Statecharts and AADLSudhanwa Kholgade, Jamie White, Hassan Reza. 355-360 [doi]
- Association Rule Discovery of Privacy InformationKazem Taghva, Pavankumar Bondugula, Darshana Gala. 361-365 [doi]
- A Model-Based Approach for Testing GUI Using Hierarchical Predicate Transition NetsHassan Reza, Sandeep Endapally, Emanuel S. Grant. 366-370 [doi]
- Discovery of Association Rules in Temporal DatabasesAbdullah Uz Tansel, Susan P. Imberman. 371-376 [doi]
- Implementation of Unsupervised and Supervised Learning Systems for Multilingual Text CategorizationChung-Hong Lee, Hsin-Chang Yang. 377-382 [doi]
- Binary Classification by SVM based neural Trees and Nonlinear SVMsMani Arun Kumar, Madan Gopal. 383-387 [doi]
- Quality Metrics for Object-Based Data Mining ApplicationsMark Smith, Alireza Khotanzad. 388-392 [doi]
- Extracting Document Structure to Facilitate a Knowledge Base Creation for The UML Superstructure SpecificationMehrdad Nojoumian, Timothy C. Lethbridge. 393-400 [doi]
- A Data mining approach for resolving cases of Multiple Parsing in Machine Aided Translation of Indian LanguagesS. D. Samantaray. 401-405 [doi]
- Analysis of Subspace-based Face Recognition Techniques under Changes in Imaging FactorsRabia Jafri, Hamid R. Arabnia. 406-413 [doi]
- Concordance Analysis of DEXA DataRay R. Hashemi, Alexander A. Tyler, Christopher Childers, Arthur Chausmer. 414-419 [doi]
- Process Capability for a Non-Normal Quality Characteristics DataS. Ahmad, Mali Abdollahian, Panlop Zeephongsekul. 420-424 [doi]
- Process Capability Analysis for Non-Normal Quality Characteristics Using Gamma DistributionS. Ahmad, Mali Abdollahian, Panlop Zeephongsekul. 425-430 [doi]
- SEQUENCE PACKAGE ANALYSIS: A New Natural Language Understanding Method for Intelligent Mining of Recordings of Doctor-Patient Interviews and Health-Related BlogsAmy Neustein. 431-438 [doi]
- Query Modifications Patterns During Web SearchingBernard J. Jansen, Amanda Spink, Bhuva Narayan. 439-444 [doi]
- An Abandoned Web Page Finds its AudienceTerrence A. Brooks, Brian P. Flaherty. 445-450 [doi]
- An Architecture for Web Services Authentication and Authorization in a Maritime EnvironmentAnya Kim, Amitabh Khashnobish, Myong H. Kang. 451-456 [doi]
- Design and Implementation of JSwitch: a Web-based Transaction Coordination FrameworkJuan A. Correa-Colon, Manuel Rodriguez-Martinez. 457-462 [doi]
- A Virtual Catalog Generated from Web Pages of Vendors for Comparative ShoppingAli Ghobadi, Masood Rahgozar. 463-468 [doi]
- Using Web Search Logs to Identify Query Classification TermsIsak Taksa, Sarah Zelikovitz, Amanda Spink. 469-474 [doi]
- Mining Web Logs to Improve WebGIS Application Response TimesRichard D. Holowczak, Isak Taksa, Ilan Levine. 475-480 [doi]
- Multimedia Chinese Web Search Engines: A SurveyYun-Ke Chang, Amanda Spink. 481-486 [doi]
- Construction of Semantic Web-based Knowledge Using Text ProcessingHanmin Jung, Seungwoo Lee, In-Su Kang, HeeKwan Koo, Won-Kyung Sung. 487-492 [doi]
- Towards Web Browsing for Visually Impaired PeopleGaël Dias, Bruno Conde. 493-496 [doi]
- Presenting a Rule Based Loan Evaluation Expert SystemMahmood Houshmand, Mohammad Daneshvar Kakhki. 497-502 [doi]
- Development of a Model-Based Dynamic Recurrent Neural Network for Modeling Nonlinear SystemsMarc Karam, Mohamed A. Zohdy. 503-506 [doi]
- Securing Agent-Oriented Systems: An Argumentation and Reputation-based ApproachJamal Bentahar, John-Jules Ch. Meyer, Bernard Moulin. 507-515 [doi]
- Vehicle Recognition Using Curvelet Transform and SVMFarhad Mohamad Kazemi, Saeed Samadi, Hamid Reza Pourreza, Mohammad R. Akbarzadeh-Totonchi. 516-521 [doi]
- Memory Garbage Collection for an Object-Oriented ProcessorC.-Y. Ho, W. Y. Lo, Anthony S. Fong. 522-527 [doi]
- A Study of Dynamic Branch Predictors: Counter versus PerceptronC.-Y. Ho, K. F. Chong, Chi-Hang Yau, Anthony Shi-Sheung Fong. 528-536 [doi]
- An ICT Technical Reference Model for Iran UniversitiesA. R. Ali Ahmadi, Farzad Soltani, Majid Gheitasi. 537-542 [doi]
- Information Technology and Business Performance in Agile Manufacturing: An Empirical Study in Textile IndustryMuammer Zerenler. 543-549 [doi]
- Authority, Deontics and Joint IntentionsMarcus J. Huber, Sanjeev Kumar, Sean A. Lisse, David McGee. 550-555 [doi]
- Incorporating a New Hash Function in OpenPGP and SSL/TLSChristina N. Michael, Xiao Su. 556-561 [doi]
- Design For a Patient-Centric Medical Information System Using XML Web ServicesElridge D Mello, Jerzy W. Rozenblit. 562-567 [doi]
- Efficient and Lightweight File System for Desktop GridsSachin Singh, Uday Joshi, Prem Uppuluri. 568-576 [doi]
- Detecting Blood Clots using Neural NetworksLeon Sanders, Yenumula B. Reddy. 577-582 [doi]
- Overfitting in protein name recognition on biomedical literature and method of preventing it through use of transductive SVMMasaki Murata, Tomohiro Mitsumori, Kouichi Doi. 583-588 [doi]
- Partial Geometric Hashing for Retrieving Similar Interaction Protein Using ProfileYasuhiro Kiuchi, Tomonobu Ozaki, Takenao Ohkawa. 589-596 [doi]
- Enhanced Component Reuse with Atomic Domains: Application ScenariosHisham M. Haddad, Mauricio Jose Ordoñez. 597-602 [doi]
- Software Reuse: Research and PracticeSajjan G. Shiva, Lubna Abou Shala. 603-609 [doi]
- Engineering Documents into XML File FormatsChia-Chu Chiang. 610-615 [doi]
- AETA: Algorithm Explanation Teaching AgentBrian Demmings, Elhadi Shakshuki, Tomasz Müldner. 616-621 [doi]
- User Interface Prototype for User-Centered Interface DesignChang-Mog Lee, Jeong-Ok Kim, Ok-Bae Chang. 622-627 [doi]
- A Tool Support for Design and Validation of Communication Protocol using State Transition DiagramsYoungJoon Byun. 628-636 [doi]
- Negotiation Strategies for Agent-based Meeting Scheduling SystemElhadi Shakshuki, Hsiang-Hwa Koo, Darcy G. Benoit. 637-642 [doi]
- RUP Extension for the Development of Secure SystemsCarlos Eduardo de Barros Paes, Celso Massaki Hirata. 643-652 [doi]
- Integration of Multilevel Security Features Into Loosely Coupled Inter-Organizational WorkflowsNirmal Gami, Boleslaw Mikolajczak. 653-657 [doi]
- Determining a Central Controlling Processor with Fault Tolerant Method in Distributed SystemMehdi EffatParvar, MohammadReza EffatParvar, Akbar Bemana, Mehdi Dehghan. 658-663 [doi]
- Optimal Parallel Merging by CountingHazem M. Bahig, Hatem M. Bahig. 664-669 [doi]
- Sorting by Block-Interchanges and Signed ReversalsCleber V. G. Mira, Joao Meidanis. 670-676 [doi]
- Super Iterator A design pattern for Algorithm and Data structure collectionsAndre Oboler, Charles Twardy, David W. Albrecht. 677-678 [doi]
- Research Documentation Guidelines - Capturing knowledge, improving researchAndre Oboler, Ian Sommerville. 679-684 [doi]
- SERT: Software Tool for Generating Student Engagement ReportsJudith Ann Ouimet, Sermsak Buntha, Sergiu M. Dascalu. 685-692 [doi]
- On Irregular Behaviours of Interactive StacksWalter Dosch, Gongzhu Hu. 693-700 [doi]
- ArchKriti : A Software Architecture Based Design and Evaluation Tool SuiteV. Vallieswaran, Bernard Menezes. 701-706 [doi]
- High-Level Design of a Request Driven Sender ComponentWalter Dosch, Annette Stümpel. 707-714 [doi]
- A Model Checking based Test Case Generation Framework forWeb ServicesYongyan Zheng, Jiong Zhou, Paul Krause. 715-722 [doi]
- A Novel VLSI Divide and Conquer Implementation of the Iterative Array MultiplierThomas Poonnen, Adly T. Fam. 723-728 [doi]
- On the Physicl Layout of PRDT-Based NoCsGuoqiang Yang, Mei Yang, Yulu Yang, Yingtao Jiang. 729-733 [doi]
- Multi-path Routing for Mesh/Torus-Based NoCsYaoting Jiao, Yulu Yang, Ming He, Mei Yang, Yingtao Jiang. 734-742 [doi]
- Location Based Security Architecture Based on Smart Client Model For Mobile EnvironmentSung-Seok Kang, Young Sang Kim, Hyo-Sun Kim, Young Joong Lee, Ki Cheol Jang. 743-746 [doi]
- Untraceability of Group Signature Schemes based on Bilinear Mapping and Their ImprovementHaeryong Park, Hyun Kim, Kilsoo Chun, Jaeil Lee, Seongan Lim, Ikkwon Yie. 747-753 [doi]
- Protection AgainstWeb-based Password PhishingChik-How Tan, Joseph Chee Ming Teo. 754-759 [doi]
- Using Shibboleth for Authorization and Authentication to the Subversion Version Control Repository SystemLinh Ngo, Amy W. Apon. 760-765 [doi]
- A Simple Shill Bidding AgentJarrod Trevathan, Wayne Read. 766-771 [doi]
- An Improved Signcryption Scheme and Its VariationRaylin Tso, Takeshi Okamoto, Eiji Okamoto. 772-778 [doi]
- Research Directions in Quantum CryptographyRajni Goel, Moses Garuba, Anteneh Girma. 779-784 [doi]
- Comparative Analysis of Email Filtering TechnologiesMoses Garuba, Jiang Li, Legand L. Burge III. 785-789 [doi]
- Preventing parameterized vulnerability in Web based applicationsMoses Garuba, Jiang Li. 790-793 [doi]
- The Security Threat Posed by Steganographic Content on the InternetRajni Goel, Moses Garuba, Chunmei Liu, Trang Nguyen. 794-798 [doi]
- Detecting Collusive Shill BiddingJarrod Trevathan, Wayne Read. 799-808 [doi]
- Securing MPLS Networks with Multi-path RoutingSahel Alouneh, Abdeslam En-Nouaary, Anjali Agarwal. 809-814 [doi]
- Crypanalysis of Kuo and Chen s Threshold Proxy Signature Scheme Based on the RSAFengying Li, Qingshui Xue, Zhenfu Cao. 815-818 [doi]
- Developing Web 2.0 Applications for Semantic Web of TrustOmer Mahmood. 819-824 [doi]
- Semantically Secure Authenticated Encryption Scheme and the Same Scheme for Ad-hoc Group Called a RingJi-Seon Lee, Jik Hyun Chang. 825-830 [doi]
- Secure Network Authentication with PassTextRoman V. Yampolskiy. 831-836 [doi]
- Human Computer Interaction Based Intrusion DetectionRoman V. Yampolskiy. 837-842 [doi]
- Materialized View Selection in Data WarehousingChandrashekhar A. Dhote, M. S. Ali. 843-847 [doi]
- Multiresolution based Kernel Fisher Discriminant Model for Face RecognitionDattatray V. Jadhav, Raghunath S. Holambe. 848-853 [doi]
- Analysis of a Traffic-Groomed Optical Network with Alternate RoutingAlicia Nicki Washington, Harry G. Perros. 854-862 [doi]
- Client/Server Access: Satellite-ATM Connectivity Using a Knowledge Management ApproachTerry C. House. 863-867 [doi]
- A Phase Substitution Technique for DEMA of Embedded Cryptographic SystemsCatherine H. Gebotys, Brian A. White. 868-869 [doi]
- Decoupling Relational Database from Object Oriented LayersFabio Dias Fagundez, Ricardo Niederberger Cabral, Gustavo Melim do Carmo. 870-871 [doi]
- iDENTM Smartphone Embedded Software TestingWei Hoo Chong. 872-873 [doi]
- A Quick and Energy Efficient Algorithm to Maximize Lifetime of Wireless Sensor NetworksSajid Hussain, Richard Peters, Obidul Islam. 874-875 [doi]
- Performance Analysis of Error Control Codes for Wireless Sensor NetworksGopinath Balakrishnan, Mei Yang, Yingtao Jiang, Yoohwan Kim. 876-879 [doi]
- Exponentially Aggressive Preservation of Nearly Depleted Nodes for Wireless Sensor NetworksShinya Ito, Kenji Yoshigoe. 880-882 [doi]
- Simulation of Localized Performance-Guided Reconfiguration of Distributed Sensor NetworksParag P. Joshi, Thomas C. Jannett. 883-884 [doi]
- Improving Mobile Banking Security Using SteganographyMohammad Shirali-Shahreza. 885-887 [doi]
- An Efficient Periodic Broadcasting Scheme for Mobile Video-on-Demand SystemYi Qi Gui, Eysuk Jung, Young Choi, Hwang Kyu Choi. 888-889 [doi]
- Classification of Mobile Internet User Behaviors using Qualitative Transition PatternsToshihiko Yamakami. 890-892 [doi]
- Fast explicit formulae for genus 2 hyperelliptic curves using projective coordinatesThomas Wollinger, Vladyslav Kovtun. 893-897 [doi]
- Enhanced Current-Balanced Logic (ECBL): An Area Efficient Solution to Secure Smart Cards against Differential Power AttackAmir Khatibzadeh, Catherine H. Gebotys. 898-899 [doi]
- Power Analysis Attacks on ECC Randomized AutomataFan Zhang. 900-901 [doi]
- A Formal Interactivity Model for aWeb CommunityChima Adiele. 902-903 [doi]
- A Novel Vector-based Keyword Extracting ToolTien N. Nguyen. 904-905 [doi]
- Creating an Effective Infrastructure to Develop GISEmília de Menezes, Adilson Marques da Cunha. 906-907 [doi]
- SuperCache: A Mechanism to Minimize the Front End LatencyAllan Zhang, Sumi Helal. 908-914 [doi]
- Cellular Nonlinear Network with Spin Wave BusAlexander Khitun, Mingqiang Bao, Jooyoung Lee, Kang L. Wang, D. W. Lee, S. Wang. 915-919 [doi]
- Topology and Binary Routing Schemes of A PRDT-Based NoCXinming Duan, Yulu Yang, Mei Yang, Lei Li, Yingtao Jiang. 920-924 [doi]
- A Smart Card Mediated Mobile Platform for Secure E-Mail CommunicationGeylani Kardas, Ebru Celikel. 925-928 [doi]
- Design and Implementation of a High Performance MPI for Large Scale Computing SystemD. Prabu, V. Vanamala, Sanjeeb Kumar Deka, R. Sridharan, B. B. Prahlada Rao, N. Mohanram. 929-932 [doi]
- Pre-processing of On-line Signals in Noisy EnvironmentsAlan McCabe, Jarrod Trevathan. 933-936 [doi]
- NeuroFuzzy Agent Programming for Processing of EEG/ECG/EMG WaveformsG. Tholkappia Arasu, V. Palanisamy. 937-938 [doi]
- Vehicle Recognition Based on Fourier, Wavelet and Curvelet Transforms - a Comparative StudyFarhad Mohamad Kazemi, Saeed Samadi, Hamid Reza Pourreza, Mohammad R. Akbarzadeh-Totonchi. 939-940 [doi]
- Efficient Location Management Scheme using MLR considering Local UsagesEui-Jong Jeong, Goo Yeon Lee. 941-942 [doi]
- uKey: A Unified Key Management and Authentication Automation Middleware For Heterogeneous SystemJinsuo Zhang, Stacey Franklin Jones. 943-944 [doi]
- Design of a RFID Transponder for Application on SecutiryKun-Yo Liu, Tim Yao. 945-946 [doi]
- On the Dominator Colorings in Bipartite GraphsRalucca Gera. 947-952 [doi]
- Goal Oriented Templates to Dynamically Assess KnowledgeJesús Ubaldo Quevedo-Torrero, Alma Delia Rodríguez-Bernal. 953-954 [doi]
- Individuation Learning Components in Intelligent Education GamesFengyuan Xu, Zhiyi Fang. 955-956 [doi]
- Mobile Interface for Domain Specific Machine Translation Using Short Messaging ServiceAvinash J. Agrawal, Manoj B. Chandak. 957-958 [doi]
- Utilizing the Fuzzy Logic Model to Develop the Arab Management System PerformanceMazin AlHadidi. 959-960 [doi]
- A Distributed Geometric Routing Algorithm for Ad HocWireless NetworksRashid Bin Muhammad. 961-963 [doi]
- PAD: A Design Space Exploration Model For Reconfigurable SystemsKang Sun, Xuezeng Pan, Jimin Wang, Lingdi Ping. 964-965 [doi]
- Data Fusion Support for Intrusion Detection and PreventionMohsen Beheshti, Richard A. Wasniowski. 966 [doi]
- Erratic Cryptosystem for Elevated Message SecurityF. Sheeja Mary. 967-969 [doi]
- Mobility Aware Transmission Power Control in Mobile Ad-hoc NetworkSangKwon Moon, YongJoo Song, Keuntae Park, Daeyeon Park. 970 [doi]
- Generating a Proxy Signature on a Confidential MessageJi-Seon Lee, Jik Hyun Chang. 971 [doi]
- Modeling and Evaluating the Scalability of Instruction Fetching in Superscalar ProcessorsMojtaba Shakeri, Abolfazl Toroghi Haghighat, Mohammad K. Akbari. 972 [doi]
- Proposing a Conceptual Model for Organizational Memory Constructs in Dynamic Virtual OrganizationsLeila Beig, Atefeh Ghavamifar. 973 [doi]
- A Multi-Objective Evolutionary Algorithm Based Optimization Model for Network-on-Chip SynthesisRabindra Ku. Jena, Gopal Ku. Sharma. 977-982 [doi]
- Runtime Partial Reconfiguration for Embedded Vector ProcessorsMuhammad Z. Hasan, Sotirios G. Ziavras. 983-988 [doi]
- FPGA-based Vector Processing for Matrix OperationsHongyan Yang, Sotirios G. Ziavras, Jie Hu. 989-994 [doi]
- SPA resistant Elliptic Curve Cryptosystem using Addition ChainsAndrew Byrne, Nicolas Meloni, Francis M. Crowe, William P. Marnane, Arnaud Tisserand, Emanuel M. Popovici. 995-1000 [doi]
- The Apparatus and Enabling of a Code Balanced SystemTony Benavides, Justin Treon, Weide Chang. 1001-1007 [doi]
- Compact FPGA-based systolic array architecture suitable for vision systemsGriselda Saldaña, Miguel Arias-Estrada. 1008-1013 [doi]
- Gray Code Chaining: A High Performance Hashing Algorithm for Limited Storage ApplicationsMitchell Loeb, Alan L. Tharp. 1014 [doi]
- Efficient Finite Field Processor for GF(2^163) and its VLSI ImplementationBijan Ansari, Huapeng Wu. 1021-1026 [doi]
- A Fault tolerant mechanism for handling Permanent and Transient Failures in a Network on ChipMuhammad Ali, Michael Welzl, Sven Hessler. 1027-1032 [doi]
- On Design and Analysis of a Feasible Network-on-Chip (NoC) ArchitectureJun Ho Bahn, Seung Eun Lee, Nader Bagherzadeh. 1033-1038 [doi]
- Implementation and Performance Analysis of an IPv6 Multicast Forwarder for the IXP2400 Network ProcessorWoojin Park, Inho Kim, Kyungsoo Lim, Sinam Woo, Sunshin An. 1039-1044 [doi]
- Performance Evaluation of Cache Memory Organizations in Embedded SystemsMohsen Soryani, Mohsen Sharifi, Mohammad Hossein Rezvani. 1045-1050 [doi]
- A System for Semantically Enhanced, Multifaceted, Collaborative Access: Requirements and ArchitectureJawed I. A. Siddiqi, Babak Akhgar, Nazaraf Shah, Fazilatur Rahman, Nahum Korda, Raphael Attias, Maria Teresa Andrade, Judy Dori, Boas Hashavia, Norbert Benamou. 1051-1056 [doi]
- On the Design of a Parallel Link Using Rigid-Flex PCB TechnologyGünter Knittel. 1057-1062 [doi]
- Composite Burst Assembly and Lower Real-Time Class Utilization Threshold in Optical Burst Switching As Means of Overcoming Effects of Self-SimilarityChandana Watagodakumbura, Henry Praluyanto. 1063-1070 [doi]
- Some properties of superline digraphsDaniela Ferrero. 1073-1076 [doi]
- Computational Power of the Quantum Turing AutomataSina Jafarpour, Mohammad Ghodsi, Keyvan Sadri, Zuheir Montazeri. 1077-1082 [doi]
- Adaptive Pattern Movement for Mobile GamesRon Coleman. 1083-1088 [doi]
- A Bottleneck Eliminating Approximate Algorithm for PON LayoutSamee Ullah Khan, Munib Ahmed. 1089-1094 [doi]
- Analyzing the Characteristics of Gnutella OverlaysYong Wang, Xiao-chun Yun, Yifei Li. 1095-1100 [doi]
- Investigation of Effective Factors on e-Readiness of Iranian Manufacturing SMEsMohammad Fathian, Babak Amiri. 1101-1106 [doi]
- Dependabilities in a High-performance Quantum Real-time Distributed SystemYao-Hsin Chou, I-Ming Tsai, Chin-Shyurng Fahn, Shi-Jinn Horng, Sy-Yen Kuo. 1107-1112 [doi]
- Collaborative Pricing for e-Service Bundle Delivery: A FrameworkWei-Lun Chang, Soe-Tsyr Yuan. 1113-1118 [doi]