Abstract is missing.
- Analysis of Sound Features for Music Timbre RecognitionXin Zhang, Zbigniew W. Ras. 3-8 [doi]
- Context-Aware Multimedia Middleware Solutions for Counteracting IEEE 802.11 Performance AnomalyPaolo Bellavista, Antonio Corradi, Luca Foschini. 9-16 [doi]
- An Efficient Task Dispatching Method in Heterogeneous NetworksChing-Hsien Hsu, Tai-Lung Chen. 17-22 [doi]
- Securing the Pharmaceutical Supply Chain using RFIDBrian King, Xiaolan Zhang 0003. 23-28 [doi]
- A proposal of efficient scheme of key management using ID-based encryption and BiometricsAkitoshi Izumi, Yoshifumi Ueshige. 29-34 [doi]
- An Approach of Program Analysis Prevention for Information ProtectionKenichi Takahashi, Zhaoyu Liu, Kouichi Sakurai. 35-40 [doi]
- Autonomy, Heterogeneity and Trust in Mobile P2P environmentsJari Veijalainen. 41-47 [doi]
- A Neighbor Caching Mechanism for Handoff in IEEE 802.11 Wireless NetworksChung-Sheng Li, Yung-Chih Tseng, Han-Chieh Chao. 48-53 [doi]
- PKTown: A Peer-to-Peer Middleware to Support Multiplayer Online GamesHai Jin, Hong Yao, Xiaofei Liao, Sirui Yang, Wei Liu, Yong Jia. 54-59 [doi]
- SRMT: A Lightweight Encryption Scheme for Secure Real-time Multimedia TransmissionEuijin Choo, Jehyun Lee, Heejo Lee, Giwon Nam. 60-65 [doi]
- A Predictive Fault Tolerance Agent based on Ubiquitous Computing for A Home Study SystemEung Nam Ko. 66-71 [doi]
- Sensor Node Activity Scheduling ApproachJemal H. Abawajy, Saeid Nahavandi, Fahed Al-Neyadi. 72-77 [doi]
- An Efficient Clustering Algorithm for 2D Multi-density Dataset in Large DatabaseYing Xia, Guoyin Wang, Song Gao. 78-82 [doi]
- A Common Interest Share Model for On-line Peer CommunitiesDennis Muhlestein, SeungJin Lim. 83-88 [doi]
- User Authentication for Multi Domain in Home Network EnvironmentsDeok-Gyu Lee, Jong-Wook Han, Jong Hyuk Park. 89-96 [doi]
- Multi Layer Approach to Defend DDoS Attacks Caused by SpamDhinaharan Nagamalai, Beatrice Cynthia Dhinakaran, Jae Kwang Lee. 97-102 [doi]
- Note-Taking on the ipodFrode Eika Sandnes, Yo-Ping Huang. 103-107 [doi]
- A Meta Data Model of Context Information for Dynamic Service Adaptation on User Centric EnvironmentOkJoo Choi, Yongik Yoon. 108-113 [doi]
- An new approach of ambulatory urodynamic system for measuring the abdominal pressureChul-Gyu Song, Jong Chan Kim, Jeong-Hwan Seo, Keo-Sik Kim, Yang Soo An. 114-119 [doi]
- Energy Analysis of Multimedia Video Decoding on Mobile Handheld DevicesChu-Hsing Lin, Jung-Chun Liu, Chun-Wei Liao. 120-125 [doi]
- Mobile Healthcare System based on Collaboration between JADE and OSGi for ScalabilityNam-Ho Kim, Yi-Seok Jeong, Sang-Hwan Ryu, Dong Ryeol Shin. 126-129 [doi]
- An Efficient Management Algorithm for Gateway Readers in the WarehouseByung-Kook Son, Jun-Hwan Lee, Kyung-Lang Park, Shin-Dug Kim. 130-134 [doi]
- Detection of People and Tracking Test Bed Using Multiple SensorsTatsuya Yamazaki, Kentaro Kayama, Seiji Igi. 135-140 [doi]
- Controlling CPU Usage for Processes with Execution Resource for Mitigating CPU DoS AttackToshihiro Tabata, Satoshi Hakomori, Kazutoshi Yokoyama, Hideo Taniguchi. 141-152 [doi]
- An Energy-Efficient Sensor Routing with low latency, scalability in Wireless Sensor NetworksHayoung Oh, Kijoon Chae. 147-152 [doi]
- A Predictive Location Based Relaying scheme for hybrid Cellular and Ad-hoc SystemsTae Sung Kim, Kang Jin Yoon, Young Yong Kim. 153-158 [doi]
- Mobility Management Using Frequently Visited Location DatabaseJae-Woo Lee. 159-163 [doi]
- Towards High Quality Mobile Services for Senior Citizens in Smart Living EnvironmentsXiaosong Zheng, Petri Pulli. 164-170 [doi]
- The Real-Time Compression Layer for Flash Memory in Mobile Multimedia DevicesW. T. Huang, C. T. Chen, C.-H. Chen. 171-176 [doi]
- Digital Photo Annotation in Ubiquitous Computing EnvironmentChull Hwan Song, Seong-Joon Yoo. 177-182 [doi]
- An Enhanced Fast Handover Scheme with Temporal Reuse of CoAs and PBP in IPv6-Based Mobile NetworksHayoung Oh, Kibaek Yoo, Chong-kwon Kim, Woo-Jin Yang, Tae-il Kim, Hae Won Jung. 183-189 [doi]
- Propose of U-CRM system displaying powerful efficiency in RFID Computing environmentSeungjeong Yang, Jongtae Rhee. 190-195 [doi]
- PIS-CC RBAC: Patient Information Service based on CC-RBAC in Next Generation Hospital considering Ubiquitous Intelligent EnvironmentJong Hyuk Park, Deok-Gyu Lee. 196-200 [doi]
- An Energy-Efficient Key Management Protocol For Large-Scale Wireless Sensor NetworksKwang-Jin Paek, Jongwan Kim, Chong-Sun Hwang, Ui-Sung Song. 201-206 [doi]
- A Model to Support Mobile Users in Wireless Sensor NetworksSang-Sik Kim, Kwang-Ryul Jung, Ki-Il Kim, Aesoon Park. 207-213 [doi]
- Effective Elimination of Redundant Packets in Wireless Sensor NetworksHyo Jung Yun, Ki Nam Kim, Eul-Gyu Im, Yong Ho Song. 214-219 [doi]
- A Memory and Performance Optimized Architecture of Deblocking Filter in H.264/AVCKyeong-Yuk Min, Jong-Wha Chong. 220-225 [doi]
- International Phoneticizing Engine Technology through Language Independent Lexical AcquisitionIn-sung Woo, Chwa-cheul Shin, Heung-soon Kang, Seong-soo Hong, Suk-dong Kim. 226-231 [doi]
- Address Internetworking between WSNs and Internet supporting Web ServicesJeong Hee Kim, Do-Hyeon Kim, Ho-Young Kwak, Yung-Cheol Byun. 232-240 [doi]
- User-Friendly Extendibility of Two Temporal Data Models to Spatiotemporal Data ModelsSeo-Young Noh, Shashi K. Gadia. 241-246 [doi]
- J2MEMicroDB: a new Open Source lightweight Database Engine for J2ME Mobile DevicesMarc Alier Forment, Pablo Casado Arias, Maria José Casany. 247-252 [doi]
- A Novel Architecture for Embedded Database Management System on ChipTianzhou Chen. 253-259 [doi]
- Design and Implementation of a Real-Time Fault-Tolerant Object Group ModelMyungseok Kang, Hagbae Kim. 260-265 [doi]
- SFilter : Schema based Filtering System for XML StreamsDaewook Lee, Hyoseop Shin, Joonho Kwon, Weidong Yang, Sukho Lee. 266-271 [doi]
- Supporting Dynamic Workflows in a Ubiquitous EnvironmentMinsoo Lee, Hyejung Yoon, Hyoseop Shin. 272-277 [doi]
- Implementation of Ontology Based Context-Awareness Framework for Ubiquitous EnvironmentKi-Chul Lee, Jung Hoon Kim, Jee-Hyong Lee, Keon-Myong Lee. 278-282 [doi]
- Study on Sorting of A Parallel Computer Using Protocol in Ubiquitous EnvironmentChang-Duk Jung, You-Keon Park. 283-288 [doi]
- Value-based Predicate Filtering of Streaming XML DataJoonho Kwon, Praveen Rao, Bongki Moon, Sukho Lee. 289-293 [doi]
- TagPlus: A Retrieval System using Synonym Tag in FolksonomySun-Sook Lee, Hwan-Seung Yong. 294-298 [doi]
- A Conceptual Framework for Ubiquitously Sharing Heterogeneous Patient Information among Autonomous Healthcare ProvidersFahad Al-Naydi, Jemal H. Abawajy, Mustafa Mat Deris. 299-306 [doi]
- Design and Implementation of Secure Communication Channels over UPnP NetworksJiunn-Jye Lee, Chun-Ying Huang, Li-Yuan Lee, Chin-Laung Lei. 307-312 [doi]
- A Lightweight Key Agreement Protocol with User Anonymity in Ubiquitous Computing EnvironmentsRen-Chiun Wang, Wen-Shenq Juang, Chen-Chi Wu, Chin-Laung Lei. 313-318 [doi]
- A Reconfigurable Software Distribution Framework for Smart Living EnvironmentsIng-Yi Chen, Chao-Chi Huang. 319-324 [doi]
- Pave the Way to Future Smart Living Space - Cross-layer Enhanced AAA for 4G Core NetworkTin Yu Wu, Diego Chung, Chi-Yuan Chen, Han-Chieh Chao. 325-330 [doi]
- Enhanced UPnP Control and Management in a Campus NetworkWally Chen, Sy-Yen Kuo, Han-Chieh Chao. 331-335 [doi]
- A Study of Ubiquitous Monitor with RFID in an Elderly Nursing HomeYaw-Jen Lin, Mei-Ju Su, Sao-Jie Chen, Suh-Chin Wang, Chiu-I Lin, Heng-Shuen Chen. 336-340 [doi]
- Ubiquitous Multimedia Information Delivering Service for Smart HomeJenq-Muh Hsu, Wei-Juing Wu, I-Ray Chang. 341-346 [doi]
- A Novel MAC Protocol for Wireless Ad Hoc Networks with Power ControlZhitang Li, Jun Fan, Wei Nie, Li Wang, Yuan Chen. 347-352 [doi]
- A Model of Location Management Based on Broadcasting Visitor LocationJae-Woo Lee. 353-360 [doi]
- Fuzzy Audio Similarity Measures Based on Spectrum Histograms and Fluctuation PatternsKlaas Bosteels, Etienne E. Kerre. 361-365 [doi]
- An Efficient Voice Transcription Scheme for Music RetrievalByeong-jun Han, Seungmin Rho, Eenjun Hwang. 366-371 [doi]
- A New and Scalable Certification Path Discovery Model in the Emerging Global PKIZhiwei Gao, Ping Luo, Zhimin Gu, Hongjun Liu. 372-380 [doi]
- A Heterogeneous Authorization Policy Management Mechanism for Grid EnvironmentsChiu-Man Yu, Kam-Wing Ng. 381-386 [doi]
- Feedback Credibility Issues In Trust Management SystemsSoon Keow Chong, Jemal H. Abawajy. 387-394 [doi]
- Design Opportunity Tree for Requirement Management and Software Process ImprovementEun-ser Lee, Je-Min Bae. 395-400 [doi]
- Fault Tolerant Mechanism in Dynamic Multi-homed IPv6 Mobile NetworksWon-Tae Kim, Jung-Gyu Jang, Je-Man Park, Yong-Jin Park. 401-406 [doi]
- Aspect Mining Using Method Call TreeLiping Qu, Daxin Liu. 407-412 [doi]
- A Model for Information Retrieval Agent System Based on Keywords DistributionJae-Woo Lee. 413-418 [doi]
- Process Management AgentJeong Ah Kim, Seung Yong Choi. 419-424 [doi]
- A Context-Aware Workflow System Supporting a User s Dynamic Service Demands in Ubiquitous EnvironmentsJongsun Choi, Yongyun Cho, Jaeyoung Choi. 425-430 [doi]
- A XML-based Testing Tool for Embedded SoftwaresDongkyu Kwack, Yongyun Cho, Jaeyoung Choi, Chae Woo Yoo. 431-438 [doi]
- Optimal Integrated Operation Strategy for Highway Tollgate using Micro SimulationKyung-Chul Park, Sung-Mo Rhee, Hae-Sook Shin. 439-445 [doi]
- A Sensitivity of Delay Difference between the Linear Traffic Model and the Kinematic Traffic ModelWoo-Young Ahn, Seon-Ha Lee. 446-453 [doi]
- Interference Cancellation Technique on Wireless Packet Communication SystemYoung An Kim, Choong Seon Hong. 454-458 [doi]
- A Travel Time Estimation Algorithm Based on Point and Interval Detector Data over the National Highway SectionSunghyun Kim, Kangwon Lim, Youngin Lee. 459-464 [doi]
- Research of the performance improvement in traffic accident detecting system within the cross roadSungjun Yoo, Youngchan Kim, Dongyoung Lee. 465-470 [doi]
- Applying Rough Set Theory to Find Relationships between Personal Demographic Attributes and Long Distance Travel Mode ChoicesWeijie Wang, Moon Namgung. 471-476 [doi]
- A Policy Decision Process for Construction of Public Transportation City Model: Case Study of Jeju, KoreaSeunglim Kang, Seongkwan Mark Lee. 477-483 [doi]
- Analysis of Communication Channel Establishment in a Transit Signal Priority SystemChin-Woo Tan, Meng Li, Sungsu Park, Peter Lau, Hongchao Liu, Wei-Bin Zhang. 484-491 [doi]
- Causal Analysis of the Relationship of Excursion Behavior with Information Usage in the Fuji Five Lakes AreaHyun Kim, Kazuo Nishii, Kuniaki Sasaki, O. Esmael, Yeon-Kyu Kim. 492-499 [doi]
- UPnP-Based Telematics Service Discovery for Local Hot-SpotsDong-Kyun Kim, Sang-Jeong Lee. 500-506 [doi]
- Coherent Detection Method with Compensation at Transmitter in Time Division Duplex SystemYoung An Kim, Choong Seon Hong. 506-511 [doi]
- Autonomous Decentralized Synchronization System for Inter-Vehicle Communication in Ad-hoc NetworkYoung An Kim, Choong Seon Hong. 512-517 [doi]
- Integrated Information Systems for Highway Safety Management: Conceptual Design for InteroperabilitySeongkwan Mark Lee, Sung-Gheel Jang, Tschangho John Kim, Seunglim Kang. 518-523 [doi]
- A Motion of the Leading Vehicle at Signalized IntersectionsWoo-Young Ahn, Hwang-Bae Kim. 524-529 [doi]
- Comparison of Travel Time Estimation Using Analysis and Queuing Theory to Field Data Along FreewaysJiyoun Yeon, Byungkon Ko. 530-538 [doi]
- Population Moments of a Birth and Death Diffusion Model with Immigration and General Catastrophe ProcessBasel M. Al-Eideh. 539-541 [doi]
- Management system for Customized Individual Service using User Behavior Pattern Analysis Algorithm on HomeNetworkKyung-Sang Sung, Jae Young Choi, Hae-Seok Oh. 542-547 [doi]
- A Novel Wavelet Medical Image Fusion MethodHong Zhang, Lei Liu, Nan Lin. 548-553 [doi]
- Consistency Management for Data Grid in OptorSim SimulatorGhalem Belalem, Yahya Slimani. 554-560 [doi]
- EHM-Based Web Pages Fuzzy Clustering AlgorithmYi-Ouyang Yi-Ouyang, Yun-Ling Yun-Ling, AnDing-Zhu AnDing-Zhu. 561-566 [doi]
- A Study on Improved RFID Authentication SchemeDae-Hee Seo, Jang-Mi Baek, Jiang Li, Soo-Young Kang, Im-Yeong Lee, Hyung-Geun Oh. 567-572 [doi]
- A novel simplification algorithm for point-sampled surfacesRenfang Wang, Sanyuan Zhang, Xiuzi Ye. 573-578 [doi]
- Development of an Automatic People-Counting and Environment Monitoring System Based on Wireless Sensor Network in Real Time; To realize in Korea MountainsByungrak Son, Yong-Sork Her, Kyuwon Shim, Jung-Gyu Kim. 579-584 [doi]
- Congestion Control Based on Priority Drop for H.264/SVCXiaogang Yang, Jiqiang Liu, Ning Li. 585-589 [doi]
- An Approach to Video Key-frame Extraction Based on Rough SetTing Wang, Yu Wu, Long Chen. 590-596 [doi]
- Isotope Programming Model: a Kind of Program Model for Context-Aware ApplicationXi Min, Zhao Jizhong, Qi Yong, He Hui, Li Ming, Wei Wei. 597-602 [doi]
- Reputation-based Trust in Wireless Sensor NetworksHaiguang Chen, Huafeng Wu, Xi Zhou, Chuanshan Gao. 603-607 [doi]
- Ontology-driven Generation of 3D Animations for Training and MaintenanceSalvatore Parisi, Jochen Bauch, Jan Berssenbrügge, Rafael Radkowski. 608-614 [doi]
- Multi-agent Based Architecture of Context-aware SystemsChun-Dong Wang, Xiu-Feng Wang. 615-619 [doi]
- ScalableWeb News Adaptation To Mobile Devices Using Visual Block Segmentation for Ubiquitous Media ServicesEunshil Lee, Jinbeom Kang, Jeahyun Park, Joongmin Choi, Jaeyoung Yang. 620-625 [doi]
- Parameterized Freeform Shape Design and DeformationHongzheng Liu, Lei Chen, Xiuzi Ye, Xiang Pan, Qiuer Xu. 626-632 [doi]
- Hardware Support for Arithmetic Units of Processor with Multimedia ExtensionLibo Huang, Ming-che Lai, Kui Dai, Hong Yue, Li Shen. 633-637 [doi]
- Application of Stratified Lattice Structures in Assessment of KnowledgeSylvia B. Encheva, Sharil Tumin. 638-643 [doi]
- A Mathematical Trust Model in E-CommerceWang Ping, Qiu Jing. 644-649 [doi]
- A Near Optimal Communication Algorithm for Distributed Computing over Heterogeneous Sensor NetworksYu Gu, Hengchang Liu, Baohua Zhao. 650-655 [doi]
- Audio-Signal Authenticating System Based on Asymmetric Signature SchemesChing-Te Wang, Chiu-Hsiung Liao, Tung-Shou Chen. 656-661 [doi]
- A Research Proposal to Address the Learning Strategies Used by Second Language Students in Accessing Online ResourcesRobert C. Meurant. 662-667 [doi]
- The Performance Evaluations and Enhancements of GIS Web ServicesSeung-Jun Cha, Yun-Young Hwang, Yoon-Seop Chang, Kyung-Ok Kim, Kyu-Chul Lee. 668-673 [doi]
- Ant-based Energy Aware Disjoint Multipath Routing Algorithm in MANETsZhengyu Wu, Hantao Song, Shaofeng Jiang, Xiaomei Xu. 674-679 [doi]
- A Grid-based Stable Backup Routing Algorithm in MANETsZhengyu Wu, Hantao Song, Shaofeng Jiang, Xiaomei Xu. 680-685 [doi]
- A Method of Object Recognition which Applicable to the Real-Time Processing Using Adaptive FactorsJun-Cheol Lee, Sang-Ryul Ryu, Se-Yul Lee, Jeong-Hyun Cho, Sung-Ho Kim. 686-691 [doi]
- FD/I-Based personalized recommendation in Context-aware ApplicationYun Bai, Juan Yang, Yuhui Qiu. 692-697 [doi]
- A Flexible Trust-Based Access Control Mechanism for Security and Privacy Enhancement in Ubiquitous SystemsPho Duc Giang, Le Xuan Hung, Sungyoung Lee, Young-Koo Lee, Heejo Lee. 698-703 [doi]
- Influence of SFM to objective assessment of compressed imageNuntapong Yamsang, Somkait Udomhunsakul. 704-709 [doi]
- An Automatic Method for Extracting and Classifying Defect in Optical Photomask ImagesYoungmin Ha, Hong Jeong. 710-716 [doi]
- Security Issues in Wireless Mesh NetworksMuhammad Shoaib Siddiqui, Choong Seon. 717-722 [doi]
- A Peer-to-Peer Resource Sharing System with Data Grid Technology for Mobile DevicesChao-Tung Yang, Chun-Jen Chen, Ching-Hsien Hsu. 723-728 [doi]
- A Modified Non-Sieving Quadratic Sieve For Factoring Simple Blur IntegersQingfeng Huang, Zhitang Li, Yejing Zhang, Chuiwei Lu. 729-732 [doi]
- On Clustering Multimedia Time Series Data Using K-Means and Dynamic Time WarpingVit Niennattrakul, Chotirat Ann Ratanamahatana. 733-738 [doi]
- Music Information Retrieval Using a GA-based Relevance FeedbackSeungmin Rho, Eenjun Hwang, Minkoo Kim. 739-744 [doi]
- A Swarm Intelligence inspired Autonomic Routing Scenario in Ubiquitous Sensor NetworksJin Wang, Brian J. d Auriol, Young-Koo Lee, Sungyoung Lee. 745-750 [doi]
- Real-time Stereo Vision FPGA Chip with Low Error RateSungchan Park, Hong Jeong. 751-756 [doi]
- A Consolidation Model of Web Application Servers toward a Simplified Computing GridMinHwan Ok, Kyung-soo Lee. 757-761 [doi]
- Protection of Sensitive Data based on Reducts in a Distributed Knowledge Discovery SystemSeunghyun Im, Zbigniew W. Ras. 762-766 [doi]
- A Preliminary Survey of the Use of Cell Phones, Electronic Dictionaries, SMS, Email, Computers and the Internet by Korean College EFL Students with Respect to Patterns of L1: L2 Language Use and the Associated Language Learning Strategies Used in AcceRobert C. Meurant. 767-772 [doi]
- A Framework for XML Web Services Retrieval with RankingKyong-Ha Lee, Mi-Young Lee, Yun-Young Hwang, Kyu-Chul Lee. 773-778 [doi]
- USD Protocol: Ubiquitous Service Discovery Protocol on Infrastructure-based architecture for Ubiquitous Fashionable ComputerSangKwon Moon, JaeSub Kim, Daeyeon Park. 779-784 [doi]
- Multimedia Approach for Traffic Noise MonitoringAndrzej Czyzewski, Piotr Dalka. 785-790 [doi]
- General Platform of Location based Services in Ubiquitous EnvironmentYing Xia, Hae-Young Bae. 791-795 [doi]
- Semantic-based Similarity Computation for XML DocumentIn-sang Song, Ju-ryun Paik, Ung-Mo Kim. 796-803 [doi]
- Energy Consumption of Swarm Intelligence inspired Routing Algorithms in MANETsJin Wang, Brian J. d Auriol, Xiaoling Wu, Young-Koo Lee, Sungyoung Lee. 803-806 [doi]
- Maximum Likelihood Study for Sound Pattern Separation and RecognitionXin Zhang, Krzysztof Marasek, Zbigniew W. Ras. 807-812 [doi]
- A Stern-based Collusion-Secure Software Watermarking Algorithm and Its ImplementationJieqing Ai, Xingming Sun, Yunhao Liu, Ingemar J. Cox, Guang Sun, Yi Luo. 813-818 [doi]
- Rules for Processing and Manipulating Scalar Music TheoryRory A. Lewis, Zbigniew W. Ras. 819-824 [doi]
- The Separated Speech Signals Combined the Hybrid Adaptive Algorithms by Using Power Spectral Density and Total Harmonic DistortionYu-Jen Chen, Gwo-Jiun Horng, Gwo-Jia Jong. 825-830 [doi]
- Member Failure Recovery Mechanism Using Context Ontology for Community ComputingMinsoo Kim, Minkoo Kim. 831-836 [doi]
- An Illumination Identification System for the AIBO RobotMichael S. Zehmeister, Yang Sok Kim, Byeong Ho Kang. 837-842 [doi]
- A Study on a highly-reliable Multi-path Configuration protocol in Ubiquitous Network by MANETYang-Min Lee, Bong-Soon Kang, Jae-Kee Lee. 843-849 [doi]
- Privacy-Preserving DBSCAN Clustering Over Vertically Partitioned DataWeijiang Xu, Liusheng Huang, Yonglong Luo, Yifei Yao, Weiwei Jing. 850-856 [doi]
- Mobile User Drop Out Ratio Observation with Time zone and Day-of-week Regularity AnalysisToshihiko Yamakami. 857-861 [doi]
- On the Obliquity of UbiquityRobert C. Meurant. 862-867 [doi]
- An Energy Efficient Broadcasting Recovering Mechanism Based On ZBPXiao-Yi Lu, Zhen Fu, In-Sook Lee, Myong-Soon Park. 868-873 [doi]
- Zero-Knowledge-Based User Authentication Technique in Context-aware SystemChun-Dong Wang, Li-Chun Feng, Qiang Wang. 874-879 [doi]
- Design Issues of Semantic Service Discovery for Ubiquitous ComputingReen-Cheng Wang, Yao-Chung Chang, Ruay Shiung Chang. 880-885 [doi]
- MobileWeb 2.0: Lessons from Web 2.0 and Past Mobile Internet DevelopmentToshihiko Yamakami. 886-890 [doi]
- A Feature Interaction Conflicts Detection Engine for Pervasive Networked EnvironmentH. K. Low, D. Chieng, A. K. Mustapha, Y. C. Ngeow, E. Goh. 891-896 [doi]
- Multi-way Hierarchic Classification of Musical Instrument SoundsAlicja Wieczorkowska, Zbigniew W. Ras, Xin Zhang, Rory A. Lewis. 897-902 [doi]
- An Efficient Multi-server Password Authenticated Key Agreement Scheme Using Smart CardsLanlan Hu, Xinxin Niu, Yixian Yang. 903-907 [doi]
- A Context-Aware Architecture for Smart Space EnvironmentE. Goh, D. Chieng, A. K. Mustapha, Y. C. Ngeow, H. K. Low. 908-913 [doi]
- Web-based Device Workflow Management EngineY. C. Ngeow, D. Chieng, A. K. Mustapha, E. Goh, H. K. Low. 914-919 [doi]
- A Complete Set of Protocols for Distributed Key Management in Clustered Wireless Sensor NetworksAbraham Jibi, K. S. Ramanatha. 920-925 [doi]
- System for Creating Games in Augmented EnvironmentsLukasz Wilczynski, Krzysztof Marasek. 926-931 [doi]
- Simple ossiculoplasty surgery simulation using haptic deviceKonstanty Kalicki, Filip Starzynski, Anna Jenerowicz, Krzysztof Marasek. 932-936 [doi]
- Query Predicate Preprocessing in Wireless Sensor NetworksMin Meng, Hui Xu, Byeong-Soo Jeong, Sungyoung Lee, Xiaobo Fan. 937-940 [doi]
- Auction Incentive Mechanism in P2PHong Taoliu, Zhixing Huang, Yun Bai, Yuhui Qiu. 941-945 [doi]
- MidCASE : A Service Oriented Middleware Enabling Context Awareness for Smart EnvironmentYuebin Bai, Haixing Ji, Qingmian Han, Jun Huang, Depei Qian. 946-951 [doi]
- Analysis of Privacy Disclosure in DNS QueryFangming Zhao, Yoshiaki Hori, Kouichi Sakurai. 952-957 [doi]
- A Novel Distributed Wireless VoIP Server Based on SIPYuebin Bai, Syed Aminullah, Qingmian Han, Ding Wang, Tan Zhang, Depei Qian. 958-962 [doi]
- A Conference Key Distribution Scheme Using Interpolating PolynomialsChin-Chen Chang, Chu-Hsing Lin, Chien-Yuan Chen. 963-967 [doi]
- The Optimal Multi-objective Optimization Using PSO in Blind Color Image FusionYifeng Niu, Lincheng Shen. 970-975 [doi]
- Metaphysics and MultimediaRobert C. Meurant. 976-981 [doi]
- An Efficient Key-Lock-Pair Mechanism Based on Division AlgorithmHui-Feng Huang, Chin-Chen Chang. 982-986 [doi]
- Handwritten Signature Extraction from Watermarked Images using Genetic CrossoverSamir Kumar Bandyopadhyay, Debnath Bhattacharyya, Poulami Das. 987-991 [doi]
- A New Collision Arbitration Algorithm for FM0 Code in RFID ApplicationsYoung Gil Kim, A. J. Han Vinck. 992-994 [doi]
- Construction of an Agent-based Fault-Tolerant Object Group ModelMyungseok Kang, Hagbae Kim. 995-998 [doi]
- An Improved Support Vector Regression Based on ClassificationChang-An Wu, Hong-Bing Liu. 999-1003 [doi]
- VMDFS: The Design Architecture, Model and Paging LatencySusmit Bagchi. 1004-1009 [doi]
- NTS6: IPv6 based Network Topology Service System of CERNET2Lin Cong, Bo Yang, Yang Chen, Guohan Lu, Beixing Deng, Xing Li, Ye Wang. 1010-1015 [doi]
- The Approximation Operators Within Formal ContextsMing-Wen Shao. 1016-1020 [doi]
- Automatic Query Type Classification for Web Image RetrievalKeke Cai, Jiajun Bu, Chun Chen, Peng Huang. 1021-1026 [doi]
- A model based approach to communication protocol s self-adaptationNicolas Van Wambeke, François Armando, Christophe Chassot, Ernesto Exposito. 1024-1029 [doi]
- Location-aware Communications in Smart SpacesIchiro Satoh. 1027-1034 [doi]
- Buyer-Seller Watermarking Protocols with Off-line Trusted PartiesChun-I Fan, Ming-Te Chen, Wei-Zhe Sun. 1035-1040 [doi]
- Two Threshold Multisignature Schemes from Bilinear PairingsGuowen Li, Jia Yu, Rupeng Li, Daxing Li. 1041-1045 [doi]
- Building Scalable and Robust Architecture for Ubiquitous Sensor Networks with the help of Design PatternsSyed Obaid Amin, Muhammad Shoaib Siddiqui, Choong Seon Hong. 1046-1050 [doi]
- A New Identity-Based Blind Signature Scheme with Batch VerificationsRupeng Li, Jia Yu, Guowen Li, Daxing Li. 1051-1056 [doi]
- Key-Insulated Group Signature Scheme with Selective RevocationRupeng Li, Xianghua Du, Guowen Li, Jia Yu, Daxing Li. 1057-1063 [doi]
- A Multimedia Learning System Using HMMs to Improve Phonemic Awareness for English PronunciationYen-Shou Lai, Hung-Hsu Tsai, Pao-Ta Yu, Jenq-Muh Hsu. 1064-1069 [doi]
- Approach of the Secure Communication Mechanism in Aero-wireless EnvironmentKihong Kim, Jinkeun Hong, Jongin Lim. 1070-1075 [doi]
- A Study on the Methodology for Testing of RFID system at LibrarySe-Kyoung Youm, Ji-Hoon Kim, Sung-Ku Cho. 1076-1079 [doi]
- New Approach for Reducing DAD delay using Link Layer Assistance in Mobile IPv6Sungro Yoon, Jiwoong Jeong, Chong-kwon Kim, Woo-Jin Yang, Tae-il Kim, Hae Won Jung. 1080-1085 [doi]
- A function-based on-chip communication design in the heterogeneous multi-core architectureTianzhou Chen, Guobing Chen, Hongjun Dai, Qingsong Shi. 1086-1092 [doi]
- A Grid Based Simulation Environment for Mobile Distributed ApplicationsDawit Mengistu, Paul Davidsson, Lars Lundberg. 1093-1099 [doi]
- A Scheduling Mechanism Considering Simultaneous Running of Grid Tasks and Local Tasks in the Computational GridZhan Gao, Siwei Luo, Ding Ding. 1100-1105 [doi]
- Stream Algorithm for 4*4 Integer Transform in H.264Haiyan Li, Chunyuan Zhang, Ju Ren, Li Li, Dong Liu. 1106-1111 [doi]
- Semi-Fragile Watermarking for Image Authentication and Tamper Detection Using HVS ModelHengfu Yang, Xingming Sun. 1112-1117 [doi]
- A Study for License Distribution Mechanism using Accumulated Device Identifier in DRM systemBohyun Wang, Byungwook Lee. 1118-1123 [doi]
- Architectural Adaptability Management for Mobile Cooperative SystemsKarim Guennoun, Khalil Drira, Christophe Chassot. 1130-1135 [doi]
- Targeted Secret Disclosures in Visual-based Watermarking Concealment SystemsShiuh-Jeng Wang, Jian-Yi Lin, Hung-Jui Ke, Yao-Han Chang. 1136-1142 [doi]
- Work in Progress: Performance and Reliability of Radio Frequency Identification (RFID) Library SystemPaul Golding, Vanesa Tennant. 1143-1146 [doi]
- A Real Time Voice Transmission Method for Voice Privacy between CDMA Mobile Network and PSTNYong-Seok Park, Jaehwan Ahn, Choon-Soo Kim, Jae-Cheol Ryou. 1147-1152 [doi]
- Human-Centered Event Description for Ubiquitous Service ComputingJae-Yoon Jung, Yoo-Suk Hong, Tae Wan Kim, Jinwoo Park. 1153-1157 [doi]
- Designing, Developing, and Evaluating Context-Aware SystemsYoosoo Oh, Albrecht Schmidt, Woontack Woo. 1158-1163 [doi]
- Resource-Aware Routing Algorithms for Multi-hop Cellular NetworksYongsuk Park, Eun-Sun Jung. 1164-1167 [doi]
- Intelligent Methods and Procedures of Countermeasure DesignSun-Myung Hwang. 1168-1171 [doi]
- Special Checklist for Security Requirements in Software Development SiteSun-Myung Hwang. 1172-1176 [doi]
- A Vulnerability Check in System BlockSun-Myung Hwang. 1177-1180 [doi]
- Traffic Flow Forecasting Based on Pattern Recognition to Overcome Memoryless PropertyTaehyung Kim, Hyoungsoo Kim, Cheol Oh, Bongsoo Son. 1181-1186 [doi]
- An Intelligent Intrusion Detection and Response System Using Hybrid Ward Hierarchical Clustering AnalysisEmmanuel Hooper. 1187-1192 [doi]
- An Intelligent Intrusion Detection and Response System Using Network Quarantine Channels: Firewalls and Packet FiltersEmmanuel Hooper. 1193-1198 [doi]
- Study on developing a security violation response checklist for the improvement of internet security management systemsHoesung Ki, Seong-Jin Ahn. 1199-1204 [doi]
- A Policy of Copyright Protection Using Authentication Key Based on Digital WatermarkingJae-Woo Lee. 1205-1209 [doi]
- An Enhanced Password Authentication Scheme Providing Password Updating without Smart CardsChin-Chen Chang, Hao-Chuan Tsai, Yi-Hui Chen. 1210-1215 [doi]
- Automatic 3D Face Reconstruction based on Single 2D ImageYepeng Guan. 1216-1219 [doi]
- Automatic Salience-Based Hypermetric Rhythm RetrievalBozena Kostek, Jaroslaw Wójcik. 1220-1226 [doi]
- AWorkflow Language for Context-Aware ServicesKyoungho Shin, Yongyun Cho, Jaeyoung Choi, Chae Woo Yoo. 1227-1232 [doi]
- Designing Tag Based Status Identification Control System to Provide Information From uHealthcare Environment1239-1243 [doi]
- Embedded Morphological Dilation and Variable Run Length Wavelet CodingYinghong Zhou, Zhengming Ma. 1244-1248 [doi]
- SVM Based Classification of Seven Nature Objects for Anytime, Anywhere Digital Photo AnnotationChull Hwan Song, Seong-Joon Yoo. 1249-1254 [doi]