Abstract is missing.
- Simulating the network dynamics in market-oriented overlay networksYutaka Okaie, Tadashi Nakano. 1-4 [doi]
- Towards comprehensive integration management of business continuity, records and knowledgeXiaomi An, Wang Wang. 5-10 [doi]
- Robustness analysis of a new distributed scheduling approach - Relprox model using MosixSuhaas Kaul, Udita Shukla, S. Karthik Sriharsha, Vishal Sonkar, Krishna Kant. 11-16 [doi]
- A hot backup sip server system based on VRRPQingwei Yang, Zukuan Wei, Jae-Hong Kim. 17-20 [doi]
- On identification of pseudo uniform grounds based on similarity of settlement historyK. Saitou, S. Sakurai, H. Suzuki. 21-26 [doi]
- Fault detection for high availability RAID systemZhiming Liu, Jichang Sha, Xiaohua Yang, Yaping Wan. 27-32 [doi]
- Neighbor-aware dynamic backoff algorithm for wireless multihop ad hoc networksChien-Min Wu, Hui-Kai Su, Wang-Hsai Yang, Yueh-Sheng Chien, Pai-Kun Huang. 33-38 [doi]
- A practical incentive towards efficient data sharing in large scale enterpriseSaumay Pushp, Priya Ranjan. 45-50 [doi]
- A new service reservation approach for workflow managementJiazao Lin, Yi Yang, Zhili Zhao, Caihong Li, Lian Li, Xining Li. 51-56 [doi]
- Feature based opinion mining of online free format customer reviews using frequency distribution and Bayesian statisticsNaveed Anwer, Ayesha Rashid, Syed Hassan. 57-62 [doi]
- Data mining based fragmentation technique for distributed data warehouses environment Using predicate construction techniqueTekaya Karima, Abdelaziz Abdellatif, Habib Ounalli. 63-68 [doi]
- Research on technologies of Event Graph based Parallel Discrete Event SimulationWei Xia, Xiaodong Mu, Yiping Yao, Bing Wang, Fei Xing. 69-74 [doi]
- Construction of an efficient ring-tree-based Peer-to-Peer streaming platformNen-Fu Huang, Yih-Jou Tzang, Hong-Yi Chang, Chih-Shun Ma. 75-80 [doi]
- Capacity and quality improvement in reversible image watermarking approachShahidan M. Abdullah, Azizah A. Manaf, Mazdak Zamani. 81-85 [doi]
- Addressing secure data routing scheme for heterogeneous sensor networksPardeep Kumar, Md. Iftekhar Salam, Sanggon Lee, Hoon Jae Lee. 86-90 [doi]
- Implementing FFT using SPMD style of OpenMPTien-hsiung Weng, Sheng-Wei Huang, Won Woo Ro, Kuan-Ching Li. 91-96 [doi]
- REMO: A RGPS-based requirements modeling process for service oriented ArchitectureBo Hu, Keqing He, Peng Liang, Rong Li. 97-102 [doi]
- Application of SOA-based Business Process Management in Outage Management SystemBo Wu, Lei Wang. 103-106 [doi]
- A location-based push service architecture with clustering methodTongyu Zhu, Yuan Zhang, Fei Wang, Weifeng Lv. 107-112 [doi]
- A collaborative performance tuning approach for Portal-based web sitesShanping Li, Jiaqi Tong. 113-117 [doi]
- An efficient service search strategy in decentralized e-business environmentsWei He, Yongqing Zheng, Li-zhen Cui. 118-122 [doi]
- A remote data disaster recovery system model based on UndoLin Guo, Zhi-hai Yu, Hai-Bo Li, Lejun Zhang, Jianpei Zhang. 123-128 [doi]
- Vehicle routing planning for logisticsWei-You Liu, Shan-Ping Chuang. 129-132 [doi]
- Approach on modeling crosscutting features in concurrent systemYang Su, Jun Qin. 133-138 [doi]
- Extracting traversing features at requirements level from software legacy systemYang Su. 139-144 [doi]
- Understanding crosscutting concerns from various perspectives in software reverse engineeringYang Su. 145-150 [doi]
- A calendar oriented service for smart homeYuan-Chih Yu, Shing-chern D. You, Dwen-Ren Tsai. 151-156 [doi]
- Speed and rotor flux estimation of induction motors based on extended kalman filterZhang Wei, Jian Jun Luo. 157-160 [doi]
- The study of network layer topology discovery algorithm for optimization problem based on SNMPXiaoping Li, Jinghui Chen, Yinxing Li, Qiong Xu. 161-163 [doi]
- A node cooperation based random linear network coding algorithm for wireless sensor networksXiaoping Li, Hu Xu, Hao Lu. 164-168 [doi]
- The application of one-time password technology in the security of electronic accounting systemYinxiang Li, Xiaoping Li, Xinxin Sun, Xu Qiong. 169-171 [doi]
- Research on the S / KEY one-time password authentication system and its application in banking and financial systemsYinxiang Li, Xiaoping Li, Lizhi Zhong, Yuhuan Jing. 172-175 [doi]
- The key technology of the next generation distance education mobile platformXiaoping Li, Kai Wu. 176-178 [doi]
- Research of mobile IP tunneling mechanismXiaoping Li, Kai Wu. 179-182 [doi]
- Classification students with learning disabilities using Naïve Bayes Classifier and Decision TreeNittaya Muangnak, Wannapa Pukdee, Thapani Hengsanunkun. 189-192 [doi]
- Study of ecological sustainable development for urban built environment based on GIS and RSJing Luo, Xiao-chun Jin, Anrong Dang. 193-196 [doi]
- FDAE: A failure detector for asynchronous eventsAlfonso Farruggia, Marco Ortolani, Giuseppe Lo Re. 197-202 [doi]
- End-to-end performance measurement model on DiffServ domain in IPv6 networkJuan Zhou, Yi Wang, Gang Hu. 203-206 [doi]
- Computer-assisted audit techniques based on an enhanced rough set modelPing-Feng Pai, Ming-Fu Hsu, Ming-Chieh Wang. 207-212 [doi]
- The most frequent closed sequence miningPanida Songram, Sasitorn Kaewman. 213-217 [doi]
- Knowledge-first web services an E-Government examplePeter Salhofer, Bernd Stadlhofer. 218-223 [doi]
- Data Quality issues in Accounting Information Systems Adoption - Theory buildingManirath Wongsim, Jing Gao. 224-230 [doi]
- A dynamic navigation scheme for vehicular ad hoc networksYan-Jing Wu, Wei-Cheng Sung. 231-235 [doi]
- VoIP network forensic analysis with digital evidence procedureI-Long Lin, Yun-Sheng Yen, Bo-Lin Wu, Hsiang-Yu Wang. 236-241 [doi]
- Providing every student with an iPad as a means of helping develop Korean EFL Digital LiteracyRobert C. Meurant. 242-247 [doi]
- A dynamic ID-based authentication schemeTien Dung Nguyen, Aymen Abdullah Al-Saffar, Eui-nam Huh. 248-253 [doi]
- Performance enhancement of tunneling protocol in mobile network with mobile routerRama Mohan Babu K. N, Prathima Mabel J, K. N. Balasubramanya Murthy, Mamatha. 254-257 [doi]
- Open real-time tracking teaching approach for undergraduates in Chinese MainlandYang Shen, Huijuan Fu, Xiaodong Ren, Shangru Wu. 258-261 [doi]
- Information security risks in a customer service call center infrastructure. Guidelines for security managersManuel Tupia. 262-264 [doi]
- Cardinality constraint analyse and implementation in access control modelZhikun Zhang, Youping Geng, Jianguo Xiao. 265-267 [doi]
- A soft handover approach using multiple network interfaces for QoS supportInwhee Joe, Juhyeon Han. 268-271 [doi]
- Mobility management for mobile sinks using soft handover in large-scale sensor fieldsInwhee Joe, Sang-Woo Kim. 272-275 [doi]
- A method to support multiple interfaces a mobile node in next generation wireless networkHyun Jong Kim, Seong Gon Choi. 276-281 [doi]
- An analysis of hidden node problem in IEEE 802.11 multihop networksJangkeun Jeong, Hyuntai Kim, Sangtae Lee, Jitae Shin. 282-285 [doi]
- A secure examination management system on InternetBo Sun, Zhiyi Fang, Lingxi Zhou, Binbin He. 286-289 [doi]
- Recognizing human actions using bag-of-features and Intersection Kernel Support Vector MachinesJia Liu, Weidong Zhong, Min-Qing Zhang, Xiaoyuan Yang. 290-293 [doi]
- An approach for tracking privacy disclosureFeng Gao, Jingsha He, Xu Wu. 294-299 [doi]
- Hierarchical structure based service semantic relationship discoveryAnping Zhao, Yu Yu, Yuhui Qiu. 300-305 [doi]
- IT capability, strategic flexibility and enterprise performance: The empirical evidence from the manufacturing enterprises in Pearl River DeltaWeihong Xie, Luan Jiang, Yongjian Wang, Guangyu Zhang. 306-311 [doi]
- Emergency service warning system using SIP for integrated mediaNarongrit Waraporn, Tuul Triyason, Chinnapong Angsuchotmetee, Patchara Tilkanont. 312-317 [doi]
- Utility-based k-anonymizationQingming Tang, Yingjie Wu, Shangbin Liao, Xiaodong Wang. 318-323 [doi]
- Leakage-resilient identity-based encryption schemeXizhao Luo, Peide Qian, Yanqin Zhu, Shangping Wang. 324-329 [doi]
- The design of storage structure for sequence in incremental sequential patterns miningJiaxin Liu, Shuting Yan, Jiadong Ren. 330-334 [doi]
- Interoperability between a relational data model and an RDF data modelMi Young Choi, Chang-Joo Moon, Doo-Kwon Baik, Young-Jun Wie, Joong-Hee Park. 335-340 [doi]
- A comparison of data encryption algorithms with the proposed algorithm: Wireless securityShadi Masadeh, Shadi Aljawarneh, Nedal Turab, Aymen M. Abuerrub. 341-345 [doi]
- A comparative study for fast-flux service networks detectionJiayan Wu, Liwei Zhang, Jian Liang, Sheng Qu, Zhiqiang Ni. 346-350 [doi]
- Blink: Large-scale P2P network monitoring and visualization system using VM introspectionRuo Ando, Youki Kadobayashi, Yoichi Shinoda. 351-358 [doi]
- Design of conceptual search engine using hierarchy of attributes and conceptsSang C. Suh, Sri Ganesh Anaparthi, Gayatri Appana. 359-365 [doi]
- A diversity-guided heuristic-based genetic algorithm for triangulation of Bayesian networksXuchu Dong, Haihong Yu, Dantong Ouyang, Yuxin Ye, Yonggang Zhang. 366-369 [doi]
- The research of information security risk assessment method based on fault treeHuang Xiao Tao, Cai Liang, Wu Chi, Huang Li Qun. 370-375 [doi]
- Research of Flex-based WebGIS applicationZukuan Wei, Jae-Hong Kim, JingRong Zhao. 376-380 [doi]
- A deployment platform the SDP using enablers in presence serviceJae Hyoung Cho, Jae-Oh Lee. 381-384 [doi]
- A study new challenge for billing system in converged service platformSoo-Duek Kim, Seon-Ho Park, ChangSup Keum, Tai-Myoung Chung. 390-395 [doi]
- A study on secure and fair escrow services for digital commerceMin-Hua Shao, Shu-Hui Wen. 396-401 [doi]
- An efficient key pre-distribution scheme for wireless sensor network using public key cryptographyMd. Iftekhar Salam, Pardeep Kumar, Hoon Jae Lee. 402-407 [doi]
- An advanced approach for vehicle routing problem with time windowsC.-Y. Lee, S. W. Lin, K. C. Ying, M. R. Yang. 408-411 [doi]
- Research of ship oil spill risk monitoring & evaluation system in Shanghai Yangshan Port water areaSun Yongming, Han Houde. 412-416 [doi]
- Vector map digital watermarking using anglesJungyeop Kim. 417-423 [doi]
- The Bound of bandwidth requirement in circuit-based switching optical ring networksChuan-Kang Liu. 424-427 [doi]
- Capturing order book dynamics with Kalman filtersJian Jiang, Wing Lon Ng. 428-433 [doi]
- Automated DCI compliance test system for Digital Cinema EntitiesTaehyun Kim, Dongho Won, Kwang-Woo Lee, Hogab Kang, Seungjoo Kim. 434-439 [doi]
- On the SaaS servers and their service-selection strategiesSuresh Byanjankar, Pinata Winoto, Woojin Paik. 440-445 [doi]
- Fractal attractor based digital signatureNadia M. G. Al-Saidi, Mohamad Rushdan Md. Said. 446-449 [doi]
- Study on the random characteristics of joint FBC and CFO in an asynchronous MC-CDMA systemJoy Iong-Zong Chen, Kao-Ming Liu, Meng-Ta Lu, Yu-Ju Liu, Ching-Chuan Chiu. 450-454 [doi]
- Trusted business system model using context sensitivenessChandrasekaran Subramaniam, Sankarbharathy Ponnusamy, Agilan Ravi, Hanumanth Praveen Ravindran. 455-460 [doi]
- Cross referencing algorithm for identifying group completeness in RFID systemChong-Yen Lee, Hau-Dong Tsui, Ching-Bang Ya, Hsin-Ju Lin, Yuei-Dah Wang. 461-465 [doi]
- High frequency trading strategy using the Hilbert transformA. Kablan, W. L. Ng. 466-471 [doi]
- An advanced H.264/AVC CAVLC decoding architecture for low power implementationByung-Yup Lee, Kwang-Ki Ryoo. 484-487 [doi]
- Biological cell communications technology: An architecture overviewTadashi Nakano, Tatsuya Suda. 488-490 [doi]
- Secure health monitoring using medical wireless sensor networksPardeep Kumar, Young-Dong Lee, Hoon Jae Lee. 491-494 [doi]
- IT applications in Healthcare Information System - A case study of medical center in TaiwanNai-Wen Kuo. 495-500 [doi]
- Design and realization of mobile government information services platform based on SMSFayu Wang, Hua Zhang, Guangping Xu. 501-504 [doi]
- The study of video conference transmission security as an example on Windows LiveChung-Hsin Liu, Wu-Fan Hsu. 505-508 [doi]
- The safety design of the laboratory monitoring systemChung-Hsin Liu, Po-Cheng Teng. 509-513 [doi]
- The analysis on the effectiveness for the handoff of WLAN and BluetoothChung-Hsin Liu, Sheng-Shiang Chang. 514-519 [doi]
- The study for the WLAN with ZigBee positioning systemChung-Hsin Liu, Jian-Yun Lo. 520-525 [doi]
- CSCW-based supply chain performance analysis systemYanping Wang, Bo Sun, Guannan Qu. 526-529 [doi]
- CSCW based customer relationship management systemNaiji Ren, Zhiyi Fang, Hongyu Sun, Bo Sun, Yang Zhao. 530-535 [doi]
- A system design of the Tahe s forest -fire -prevention management systemXindan Gao, Nihong Wang, Jun Li. 536-539 [doi]
- Modeling Chinese stock markets volatilityShu Quan Lu, Shiyu Xie, Takao Ito. 540-541 [doi]
- The outliers of Chinese stock marketsShu Quan Lu, Takao Ito. 542-546 [doi]
- The earthwork plan application of 3D Geospatial dataJin-nyung Lee, Moo-uk Pyun, Byung-kil Lee, Yang-dam Eo. 547-552 [doi]
- A novel scheduling for (m, k)-firm streams in wireless sensor networksKi-Il Kim. 553-556 [doi]
- Automatic damaged-function alternation among wireless sensor nodesToshiaki Miyazaki, Daiki Shitara. 557-562 [doi]
- Internal forwarding scheme for consistent event transmission in distributed multi-user systemsMingyu Lim. 563-568 [doi]
- Direction to support ubiquitous city input/output system with geospatial imageSun-woong Kim, Shin Kim, Tae-Woong Jung, Mu-wook Pyeon, Seong-Pil Kong, Yang-dam Eo. 569-574 [doi]
- Development platform in the design of embedded automotive electronicsSantiago Otero, Francisco Poza, Miguel Angel Domínguez, Perfecto Mariño Espiñeira. 575-580 [doi]
- U-forest based service model derived strategyTae-Woong Jung, Sang Moo Lee, Mu-wook Pyeon, Jee-Hee Koo. 581-585 [doi]
- Maintenance system of mail sorting machineJeong-Hyun Park, Hoyon Kim, Jong-heung Park. 586-591 [doi]
- A hierarchical approach to traffic anomaly detection using image processing techniqueChi-Yoon Jeong, Beom-Hwan Chang, Jung-Chan Na. 592-594 [doi]
- Degree and resource-constrained routing algorithm for application layer multicast in ad hoc networksJuan Wang, Zheng Qin, Jinxue Zhang. 595-599 [doi]
- Fire monitoring system based on Open Map APIKyung Jun Gil, Radius Bhayu Prasetiyo, Hyun-Ju Park, Sang Boem Lim, Yang-dam Eo. 600-605 [doi]
- An analysis model of botnet tracking based on ant colony optimization algorithmPing Wang, Tzu Chia Wang, Pu-Tsun Kuo, Chin Pin Wang. 606-611 [doi]
- AODV protocol with scheduling priority flow in MAC layer (AODV-SPF)So-Tsung Chou, Hann-Tzong Chern, Cheng-Mu Shiao. 612-617 [doi]
- A hybrid algorithm applied to classify unbalanced dataC.-Y. Lee, M. R. Yang, L.-Y. Chang, Z. J. Lee. 618-621 [doi]
- Combining Gradientfaces, principal component analysis, and Fisher linear discriminant for face recognitionChih-Jen Lee, Tzu-Yin Chen, Jenn-Dong Sun, Tai-Ning Yang, Allen Y. Chang. 622-625 [doi]
- Fingerprint identification using local Gabor filtersChih-Jen Lee, Tai-Ning Yang, Chun-Jung Chen, Allen Y. Chang, Sheng-Hsuan Hsu. 626-631 [doi]
- Two-dimensional bar code mobile commerce - Implementation and performance analysisChung-Hsin Liu, Chia-Hong Chou. 632-635 [doi]
- The study of Botnet attack on VoIPChung-Hsin Liu, You-Sheng Li. 636-640 [doi]
- Towards a holistic customer experienceNai-Wen Kuo. 641-644 [doi]
- Information security issue of enterprises adopting the application of cloud computingChang-Lung Tsai, Uei-Chin Lin, Allen Y. Chang, Chun-Jung Chen. 645-649 [doi]
- Technology Acceptance of videoconferencingAllen Y. Chang, Cheng-Hua Liu, Jenn-Dong Sun, Chang-Lung Tsai. 650-652 [doi]
- Using threshold method to separate the edge, coating and body of tongue in automatic tongue diagnosisC. C. Wei, C. H. Wang, S. W. Huang. 653-656 [doi]
- On the faulty sensor identification algorithm of wireless sensor networks under the PMC diagnosis modelTzu-Liang Kung, Hsing-Chung Chen, Jimmy J. M. Tan. 657-661 [doi]
- Novel dummy sequence generator for PAPR reduction by DSI in OFDM systemsShu-Hong Lee. 662-664 [doi]
- An enhanced Three-party Encrypted Key Exchange protocol using digital time-stampHsing-Chung Chen, Hsien-Yun Chuang, Tzu-Liang Kung, Yung-Fa Huang. 665-670 [doi]
- Performance of an MMSE based indoor localization with wireless sensor networksYung-Fa Huang, You-Ting Jheng, Hsing-Chung Chen. 671-675 [doi]
- Integrated baby-care recommender platform based on hybrid commonsense reasoning and case-based reasoning algorithmsChen-Shu Wang, Chun-Yi Li. 676-681 [doi]
- An automated semantic annotation based-on Wordnet ontologyChe-Yu Yang, Hua-Yi Lin. 682-687 [doi]
- Exploring stock market dynamism in multi-nations with genetic algorithm, support vector regression, and optimal technical analysisDeng-Yiv Chiu, Shin-Yi Chian. 694-699 [doi]
- A personalized healthcare service on aged stroke-precautionYuan-Chu Hwang, Weng-Ting Lin. 700-703 [doi]
- Game-based digital learning system assists and motivates C programming language learnersWen-Chih Chang, Yu-Min Chou, Kuen-Chi Chen. 704-709 [doi]
- Applied Social Network Anaysis to Project CurriculumWen-Chih Chang, Hsiao-Wen Lin, Lai-Chi Wu. 710-715 [doi]
- Exploring the distribution and relationship between MSN and the physical worldWen-Chih Chang, Te-Hua Wang, Yen-Ching Huang. 716-721 [doi]
- A framework of PBL strategy integrated in LMS and a ubiquitous learning environmentD. T. Ku, Chiung-Sui Chang. 722-726 [doi]
- Item selection strategic via social network analyzeMing-Hsiung Ying, Hao-Hsuan Huang. 727-732 [doi]
- IT/IM academic network in Taiwan via social networks analyze of conference committeesChen-Shu Wang, Yu-Chieh Li. 733-737 [doi]
- Adaptive signal management using event processing networksCesar D. Velandia-Brinez, S. Don, Na-Yun Cho, Eunmi Choi, Dugki Min. 738-745 [doi]
- CAOWL-SAI: Context aware OWL based semantic association inferenceSaqib Nazir, Muhammad Tanvir Afzal, Muhammad Abdul Qadir, Hermann A. Maurer. 746-751 [doi]
- Selected mapping applied scheme for PAPR reduction in OFDM communication systemsGwo-Ruey Lee, Chia-Hsin Cheng, Ho-Lung Hung. 752-755 [doi]
- An interference cancellation scheme-based carrier frequency offset estimation for OFDM uplink transmissionsHo-Lung Hung, Chien-Chi Chao, You-Hao Lin, Shih-Ping Huang, Chin-Hung Wu, Gwo-Ruey Lee. 756-760 [doi]