Abstract is missing.
- Reporting leadership patterns among trajectoriesMattias Andersson, Joachim Gudmundsson, Patrick Laube, Thomas Wolle. 3-7 [doi]
- Distortion-constrained compression of vector mapsAlexander Kolesnikov, Alexander Akimov. 8-12 [doi]
- An OLAP system for network-constrained moving objectsTao Wan, Karine Zeitouni, Xiaofeng Meng. 13-18 [doi]
- Structural similarity in geographical queries to improve query answeringArianna D Ulizia, Fernando Ferri, Anna Formica, Patrizia Grifoni, Maurizio Rafanelli. 19-23 [doi]
- HIS-KCWater: context-aware geospatial data and service integrationJejung Lee, Yugyung Lee, Sanket Shah, James Geller. 24-29 [doi]
- A flexible representation of controllers for physically-based animation of virtual humansRubens Fernandes Nunes, Creto Augusto Vidal, Joaquim B. Cavalcante Neto. 30-36 [doi]
- Applying a component-based framework to develop multi-agent environments: case studyCamila Nunes, Marcílio Ferreira, Hyggo Oliveira de Almeida. 37-41 [doi]
- A customizable multi-agent system for distributed data miningGiuseppe Di Fatta, Giancarlo Fortino. 42-47 [doi]
- Guarding security sensitive content using confined mobile agentsGuido van t Noordende, Frances M. T. Brazier, Andrew S. Tanenbaum. 48-55 [doi]
- A crime simulation model based on social networks and swarm intelligenceVasco Furtado, Adriano Melo, André L. V. Coelho, Ronaldo Menezes. 56-57 [doi]
- Toward a first-order extension of Prolog s unification using CHR: a CHR first-order constraint solver over finite or infinite treesKhalil Djelloul, Thi-Bich-Hanh Dao, Thom W. Frühwirth. 58-64 [doi]
- A framework for prioritized reasoning based on the choice evaluationLuciano Caroprese, Irina Trubitsyna, Ester Zumpano. 65-70 [doi]
- A randomized knot insertion algorithm for outline capture of planar images using cubic splineMuhammad Sarfraz, Aiman Rashid. 71-75 [doi]
- Directed filter for dominant direction fuzzy set in content-based image retrievalGang Zhang, Z. M. Ma, Zhiping Cai. 76-77 [doi]
- Eigen-distribution on assignments for game trees with random propertiesChenGuang Liu, Kazuyuki Tanaka. 78-79 [doi]
- Mass edge detection in mammography based on plane fitting and dynamic programmingEnmin Song, Luan Jiang, Bo Meng, Renchao Jin, Xiangyang Xu, Chih-Cheng Hung. 80-81 [doi]
- Projection function for driver fatigue monitoring with monocular cameraDepei Bao, Zehong Yang, Yixu Song. 82-83 [doi]
- Gradual transition towards autonomic software systems based on high-level communication specificationEdin Arnautovic, Hermann Kaindl, Jürgen Falb, Roman Popp, Alexander Szep. 84-89 [doi]
- Bionic autonomic nervous system and self-healing for NASA ANTS-like missionsMichael G. Hinchey, Yuan-Shun Dai, James L. Rash, Walt Truszkowski, Manish Madhusoodan. 90-96 [doi]
- Applying ontology in architecture-based self-management applicationsYu Zhou, Jian Pan, Xiaoxing Ma, Bin Luo, XianPing Tao, Jian Lu. 97-103 [doi]
- Performance problem localization in self-healing, service-oriented systems using Bayesian networksRui Zhang, Steve Moyle, Steve McKeever, Alan Bivens. 104-109 [doi]
- Self-healing for autonomic pervasive computingShameem Ahmed, Sheikh Iqbal Ahamed, Moushumi Sharmin, Munirul M. Haque. 110-111 [doi]
- Hierarchical alignment graph for gene teams finding on whole genomesHee-Jeong Jin, Hwan-Gue Cho. 113-117 [doi]
- On-the-fly data integration models for biological databasesPavithra G. Naidu, Mathew J. Palakal, Shielly Hartanto. 118-122 [doi]
- Exploiting inter-gene information for microarray data integrationKuan-Ming Lin, Jaewoo Kang. 123-127 [doi]
- Improved structural modeling based on conserved domain clusters and structure-anchored alignmentsFa Zhang, Lin Xu, Zhiyong Liu, Bo Yuan. 128-132 [doi]
- The detection and assessment of possible RNA secondary structure using multiple sequence alignmentXiaoyong Fang, Zhenghua Wang, Zhigang Luo, Bo Yuan, Fan Ding. 133-137 [doi]
- Finding putative core promoter elements with position-dependent consensusesYin-Fu Huang, Yi-Chao Jhan, Sing-Wu Liou. 138-139 [doi]
- An adaptive data prefetching scheme for biosequence database search on reconfigurable platformsXiandong Meng, Vipin Chaudhary. 140-141 [doi]
- Semantic distance of concepts within a unified framework in the biomedical domainHisham Al-Mubaid, Hoa A. Nguyen. 142-143 [doi]
- On construction of a BioGrid platform for parallel bioinformatics applicationsChao-Tung Yang, Tsu-Fen Han, Heng-Chuan Kan. 144-145 [doi]
- A connected component labeling algorithm for grayscale images and application of the algorithm on mammogramsRoshan Dharshana Yapa, Harada Koichi. 146-152 [doi]
- Modeling miRNA dataSarah Lopez, Guoqing Lu, Zhengxin Chen. 158-162 [doi]
- Defining personalized therapies for handheld devicesMarco de Sá, Luís Carriço, Pedro Antunes. 163-164 [doi]
- How sensitive is your personal information?Sabah S. Al-Fedaghi. 165-169 [doi]
- A global marking scheme for tracing cyber attacksYacine Djemaiel, Noureddine Boudriga. 170-174 [doi]
- Deriving cse-specific live forensics investigation procedures from FORZARicci S. C. Ieong, H. C. Leung. 175-180 [doi]
- SIM and USIM filesystem: a forensics perspectiveAntonio Savoldi, Paolo Gubian. 181-187 [doi]
- Global intrusion detection and tolerance in networked systemsAmel Meddeb, Yacine Djemaiel, Noureddine Boudriga. 188-189 [doi]
- A preliminary design for digital forensics analysis of terabyte size data setsLorie M. Liebrock, Nico Marrero, David P. Burton, Ron Prine, E. Cornelius, M. Shakamuri, V. Urias. 190-191 [doi]
- A scalable overlay framework for internet anycasting serviceChi-Jen Wu, Ren-Hung Hwang, Jan-Ming Ho. 193-197 [doi]
- An analytical model for generalized processor sharing scheduling with heterogeneous network trafficXiaolong Jin, Geyong Min. 198-202 [doi]
- Bounded-distance multi-coverage backbones in wireless sensor networksPaulo Sérgio Sausen, Marco Aurélio Spohn, Antonio Marcus Nogueira de Lima, Angelo Perkusich. 203-208 [doi]
- A set of schedulers for grid networksDaniel M. Batista, Nelson L. S. Da Fonseca, Flávio Keidi Miyazawa. 209-213 [doi]
- Scalable coordination for sensor networks in challenging environmentsSangmin Kim, VamsiKrishna Vasireddy, Khaled Harfoush. 214-221 [doi]
- Worldsens: a fast and accurate development framework for sensor network applicationsGuillaume Chelius, Antoine Fraboulet, Eric Fleury. 222-226 [doi]
- Enhancing QoS metrics estimation in multiclass networksSolange Rito Lima, Pedro Sousa, Paulo Carvalho. 227-231 [doi]
- Finding hierarchical heavy hitters in network measurement systemYunqi Li, Jiahai Yang, Changqing An, Hui Zhang. 232-236 [doi]
- VA-TCP: a vertical handoff-aware TCPYu-Chieh Lin, Hsung-Pin Chang. 237-238 [doi]
- Decentralized enforcement of security policies for distributed computational systemsArie Orlovsky, Danny Raz. 241-248 [doi]
- Compact sequential aggregate signaturesYi Mu, Willy Susilo, Huafei Zhu. 249-253 [doi]
- An additive-attack-proof watermarking mechanism for databases copyrights protection using imageXiang Zhou, Min Huang, Zhiyong Peng. 254-258 [doi]
- RAAS: a reliable analyzer and archiver for snort intrusion detection systemMahboobeh Soleimani, Ehsan Khosrowshahi Asl, Mina Doroud, Morteza Damanafshan, Akbar Behzadi, Maghsoud Abbaspour. 259-263 [doi]
- Memory-efficient content filtering hardware for high-speed intrusion detection systemsSungwon Yi, Byoung-Koo Kim, Jintae Oh, Jongsoo Jang, George Kesidis, Chita R. Das. 264-269 [doi]
- POP method: an approach to enhance the security and privacy of RFID systems used in product lifecycle with an anonymous ownership transferring mechanismK. H. S. Sabaragamu Koralalage, Mohammad Reza Selim, Junichi Miura, Yuichi Goto, Jingde Cheng. 270-275 [doi]
- Towards a tamper-resistant kernel rootkit detectorAnh-Quynh Nguyen, Yoshiyasu Takefuji. 276-283 [doi]
- SMask: preventing injection attacks in web applications by approximating automatic data/code separationMartin Johns, Christian Beyerlein. 284-291 [doi]
- Passwords decay, words endure: secure and re-usable multiple password mnemonicsUmut Topkara, Mikhail J. Atallah, Mercan Topkara. 292-299 [doi]
- Using CP-nets as a guide for countermeasure selectionStefano Bistarelli, Fabio Fioravanti, Pamela Peretti. 300-304 [doi]
- Propagating dense systems of integer linear equationsThibaut Feydy, Peter J. Stuckey. 306-310 [doi]
- A CP-LP approach to network management in OSPF routingMats Petter Pettersson, Radoslaw Szymanek, Krzysztof Kuchcinski. 311-315 [doi]
- On the stochastic constraint satisfaction frameworkLucas Bordeaux, Horst Samulowitz. 316-320 [doi]
- A solver for quantified Boolean and linear constraintsLucas Bordeaux, Lintao Zhang. 321-325 [doi]
- Using constraint techniques for a safe and fast implementation of optimality-based reductionYahia Lebbah, Claude Michel, Michel Rueher. 326-331 [doi]
- Injection/withdrawal scheduling for natural gas storage facilitiesAlan Holland. 332-333 [doi]
- Constraint propagation for loose constraint graphsKathryn Francis, Peter J. Stuckey. 334-335 [doi]
- Solving conditional and composite constraint satisfaction problemsMalek Mouhoub, Amrudee Sukpan. 336-337 [doi]
- A machine learning approach to semi-automating workflow staff assignmentLiu Yingbo, Wang Jianmin, Sun Jiaguang. 340-345 [doi]
- Web services choreography and orchestration in Reo and constraint automataSun Meng, Farhad Arbab. 346-353 [doi]
- A self-organising solution to the collective sort problem in distributed tuple spacesMirko Viroli, Matteo Casadei, Luca Gardelli. 354-359 [doi]
- Towards Semantic tuplespace computing: the Semantic web spaces systemLyndon J. B. Nixon, Olena Antonechko, Robert Tolksdorf. 360-365 [doi]
- Extending the ARC model with generative coordinationKevin Marth, Shangping Ren. 366-367 [doi]
- Federated directories of Semantic web servicesMichael Schumacher, Tim Van Pelt, Ion Constantinescu, Alexandre de Oliveira e Sousa, Boi Faltings. 368-369 [doi]
- Capturing data usefulness and privacy protection in K-anonymisationGrigorios Loukides, Jianhua Shao. 370-374 [doi]
- Privacy preserving itemset mining through fake transactionsJun-Lin Lin, Julie Yu-Chih Liu. 375-379 [doi]
- ::::K::::-anonymization incremental maintenance and optimization techniquesTraian Marius Truta, Alina Campan. 380-387 [doi]
- Maintenance of maximal frequent itemsets in large databasesWang Lian, David W. Cheung, Siu-Ming Yiu. 388-392 [doi]
- Dimensionality reduction for long duration and complex spatio-temporal queriesGhazi Al-Naymat, Sanjay Chawla, Joachim Gudmundsson. 393-397 [doi]
- Using hypothesis margin to boost centroid text classifierSongbo Tan, Xueqi Cheng. 398-403 [doi]
- Mining itemsets in the presence of missing valuesToon Calders, Bart Goethals, Michael Mampaey. 404-408 [doi]
- Learning rules with negation for text categorizationPasquale Rullo, Chiara Cumbo, Veronica L. Policicchio. 409-416 [doi]
- FAT-miner: mining frequent attribute treesJeroen De Knijf. 417-422 [doi]
- Exploiting types for improved schema mappingYoungju Son, Hasan M. Jamil, Farshad Fotouhi. 423-429 [doi]
- Integrating gene ontology into discriminative powers of genes for feature selection in microarray dataJianlong Qi, Jian Tang. 430-434 [doi]
- Mining multiple private databases using a kNN classifierLi Xiong, Subramanyam Chitti, Ling Liu. 435-440 [doi]
- Mining and processing category rankingSeung-won Hwang, Hwanjo Yu. 441-442 [doi]
- Optimizing hypergraph transversal computation with an anti-monotone constraintCéline Hébert, Alain Bretto, Bruno Crémilleux. 443-444 [doi]
- Biased box sampling - a density-biased sampling for clusteringAna Paula Appel, Adriano Arantes Paterlini, Elaine P. M. de Sousa, Agma J. M. Traina, Caetano Traina Jr.. 445-446 [doi]
- OLINDDA: a cluster-based approach for detecting novelty and concept drift in data streamsEduardo J. Spinosa, André Carlos Ponce de Leon Ferreira de Carvalho, João Gama. 448-452 [doi]
- A priority random sampling algorithm for time-based sliding windows over weighted streaming dataLongbo Zhang, Zhanhuai Li, Yiqiang Q. Zhao, Yu Min, Zhang Yang. 453-456 [doi]
- RFID data management for effective objects trackingElio Masciari. 457-461 [doi]
- A self-organizing neural network for detecting noveltiesMarcelo Keese Albertini, Rodrigo Fernandes de Mello. 462-466 [doi]
- Incremental discretization, application to data with concept driftCarlos Pinto, Joao Gama. 467-468 [doi]
- General dominant relationship analysis based on partial order modelsZhenglu Yang, Botao Wang, Masaru Kitsuregawa. 470-474 [doi]
- Continuation-passing enactment of distributed recoverable workflowsWeihai Yu, Jie Yang. 475-481 [doi]
- An edit operation-based approach to the inclusion problem for DTDsNobutaka Suzuki. 482-488 [doi]
- Querying and browsing XML and relational data sourcesJames J. Lu, Chia-Hsin Huang, Tyng-Ruey Chuang. 489-493 [doi]
- Horizontal fragmentation as a technique to improve the performance of drill-down and roll-up queriesCristina Dutra de Aguiar Ciferri, Ricardo Rodrigues Ciferri, Diogo Tuler Forlani, Agma J. M. Traina, Fernando da Fonseca de Souza. 494-499 [doi]
- Equivalent disk allocationsAli Saman Tosun. 500-505 [doi]
- Personalized ranking: a contextual ranking approachGae-won You, Seung-won Hwang. 506-510 [doi]
- Developing event-condition-action rules in real-time active databaseYing Qiao, Kang Zhong, Hongan Wang, Xiang Li. 511-516 [doi]
- An efficient indexing structure for content based multimedia retrieval with relevance feedbackJongho Nang, Joohyoun Park. 517-524 [doi]
- Building automatic mapping between XML documents using approximate tree matchingGuangming Xing, Zhonghang Xia, Andrew Ernest. 525-526 [doi]
- An effective cost model for similarity queries in metric spacesGisele Busichia Baioco, Agma J. M. Traina, Caetano Traina Jr.. 527-528 [doi]
- Multidimensional querying in wireless ad hoc networksIlias Michalarias, Christian Becker. 529-530 [doi]
- An adaptive randomized search protocol in peer-to-peer systemsYu Wu, Taisuke Izumi, Fukuhito Ooshita, Hirotsugu Kakugawa, Toshimitsu Masuzawa. 533-537 [doi]
- Evaluation of the QoS of crash-recovery failure detectionTiejun Ma, Jane Hillston, Stuart Anderson. 538-542 [doi]
- Self-organizing broker topologies for publish/subscribe systemsMichael A. Jaeger, Helge Parzyjegla, Gero Mühl, Klaus Herrmann. 543-550 [doi]
- A new adaptive accrual failure detector for dependable distributed systemsBenjamin Satzger, Andreas Pietzowski, Wolfgang Trumler, Theo Ungerer. 551-555 [doi]
- ::::k::::-bound GSI: a flexible database replication protocolJosé Enrique Armendáriz-Iñigo, J. R. Juárez-Rodríguez, José Ramón González de Mendívil, Hendrik Decker, Francesc D. Muñoz-Escoí. 556-560 [doi]
- GReIC data gather service: a step towards P2P production gridsGiovanni Aloisio, Massimo Cafaro, Sandro Fiore, Maria Mirto, Salvatore Vadacca. 561-565 [doi]
- A metadata-based architectural model for dynamically resilient systemsGiovanna Di Marzo Serugendo, John Fitzgerald, Alexander Romanovsky, Nicolas Guelfi. 566-572 [doi]
- SQUARE: scalable quorum-based atomic memory with local reconfigurationVincent Gramoli, Emmanuelle Anceaume, Antonino Virgillito. 574-579 [doi]
- Dynamic adaptation of CORBA component-based applicationsDhouha Ayed, Yolande Berbers. 580-585 [doi]
- Selecting a distributed agreement algorithmRobert John Walters, Peter Henderson, Stephen Crouch. 586-587 [doi]
- Adaptive broadcast by distributed protocol switchingSushanta Karmakar, Arobinda Gupta. 588-589 [doi]
- Dual proximity neighbour selection method for peer-to-peer-based discovery servicePiotr Karwaczynski, Dariusz Konieczny, Jaka Mocnik, Marko Novak. 590-591 [doi]
- New specialist tools for medieval document XML markupGeorg Vogeler, Stefan Gruner, Benjamin Burkard. 594-599 [doi]
- ClassStruggle: a clustering based text segmentationSylvain Lamprier, Tassadit Amghar, Bernard Levrat, Frédéric Saubion. 600-604 [doi]
- A methodology for the separation of foreground/background in Arabic historical manuscripts using hybrid methodsWafa Boussellaa, Abderrazak Zahour, Adel M. Alimi. 605-609 [doi]
- A quantitative method for assessing algorithms to remove back-to-front interference in documentsRafael Dueire Lins, João Marcelo Monte da Silva. 610-616 [doi]
- Automatic web pages categorization with ReliefF and Hidden Naive BayesXin Jin, Rongyan Li, Xian Shen, Rongfang Bie. 617-621 [doi]
- A table-form extraction with artefact removalLuiz Antônio Pereira Neves, João Marques de Carvalho, Jacques Facon, Flávio Bortolozzi. 622-626 [doi]
- A progressive learning method for symbols recognitionSabine Barrat, Salvatore Tabbone. 627-631 [doi]
- Zoning and metaclasses for character recognitionCinthia Obladen de Almendra Freitas, Luiz S. Oliveira, Simone B. K. Aires, Flávio Bortolozzi. 632-636 [doi]
- Off-line signature verification based on forensic questioned document examination approachCesar R. Santos, Flávio Bortolozzi, Luiz S. Oliveira, Edson J. R. Justino. 637-638 [doi]
- A fast algorithm to binarize and filter documents with back-to-front interferenceJoão Marcelo Monte da Silva, Rafael Dueire Lins. 639-640 [doi]
- Using RT-UML for modelling web servicesMaría-Emilia Cambronero, Juan José Pardo, Gregorio Díaz, Valentin Valero. 643-648 [doi]
- Effects of inconsistently masked data using RPT on CF with privacyHuseyin Polat, Wenliang Du. 649-653 [doi]
- A computation environment for automated negotiation: a case study in electronic tourismAlan Silva, José Alencar Neto, Ig Ibert Bittencourt. 654-658 [doi]
- Efficient code size reduction without performance lossLiu Xianhua, Zhang Jiyu, Cheng Xu. 666-672 [doi]
- Engineering active behavior of embedded software to improve performance and evolution: an aspect-oriented approachThomas Gustafsson, Aleksandra Tesanovic, Ying Du, Jörgen Hansson. 673-679 [doi]
- An architectural co-synthesis algorithm for energy-aware network-on-chip designWei-Hsuan Hung, Yi-Jung Chen, Chia-Lin Yang, Yen-Sheng Chang, Alan P. Su. 680-684 [doi]
- Component-based version management for embedded computing system designTien N. Nguyen. 685-692 [doi]
- Energy-efficient disk replacement and file placement techniques for mobile systems with hard disksYoung-Jin Kim, Kwon-Taek Kwon, Jihong Kim. 693-698 [doi]
- Fast, accurate design space exploration of embedded systems memory configurationsJason Hiser, Jack W. Davidson, David B. Whalley. 699-706 [doi]
- Reconfigurable split data caches: a novel scheme for embedded systemsAfrin Naz, Krishna M. Kavi, Jung-Hwan Oh, Pierfrancesco Foglia. 707-712 [doi]
- Exploiting the efficiency of generational algorithms for hardware-supported real-time garbage collectionSylvain Stanchina, Matthias Meyer. 713-718 [doi]
- Evolution of iterated prisoner s dilemma strategies with different history lengths in static and cultural environmentsRichard Brunauer, Andreas Löcker, Helmut A. Mayer, Gerhard Mitterlechner, Hannes Payer. 720-727 [doi]
- A model for terrain coverage inspired by ant s alarm pheromonesRonaldo Menezes, Francisco Martins, Francisca Emanuelle Vieira, Rafael Silva, Márcio Braga. 728-732 [doi]
- Applying genetic algorithms to economy market using iterated prisoner s dilemmaRaymond Chiong. 733-737 [doi]
- A clustering entropy-driven approach for exploring and exploiting noisy functionsShih-Hsi Liu, Marjan Mernik, Barrett R. Bryant. 738-742 [doi]
- Investigating adaptive mutation in the generalized generation gap (G3) algorithm for unconstrained global optimizationJason Teo. 743-744 [doi]
- Three-dimensional segmentation of brain tissues using Markov random fields and genetic algorithmsFlávio Milsztajn, Klaus de Geus. 745-746 [doi]
- Stigmergic optimization in dynamic binary landscapesCarlos Fernandes, Vitorino Ramos, Agostinho C. Rosa. 747-748 [doi]
- A hypermap framework for computer-aided proofs in surface subdivisions: genus theorem and Euler s formulaJean-François Dufourd. 757-761 [doi]
- Semi-mechanization method for a unsolved optimization problem in combinatorial geometryZhenbing Zeng, Meijing Shan. 762-766 [doi]
- Logical and algebraic view of Huzita s origami axioms with applications to computational origamiFadoua Ghourabi, Tetsuo Ida, Hidekazu Takahashi, Mircea Marin, Asem Kasem. 767-772 [doi]
- Towards an homogeneous handling of under-constrained and well-constrained systems of geometric constraintsSimon E. B. Thierry, Pascal Mathis, Pascal Schreck. 773-777 [doi]
- Parallel algorithms on geometric constraint solvingJiang Kun, Gao Yang Lv Xingfeng, Zhan Yang. 778-779 [doi]
- Wellness assistant: a virtual wellness assistant using pervasive computingSheikh Iqbal Ahamed, Munirul M. Haque, Karl Stamm, Ahmed J. Khan. 782-787 [doi]
- An efficient dual caching strategy for web service-enabled PDAsXin Liu, Ralph Deters. 788-794 [doi]
- Energy management for interactive applications in mobile handheld systemsJung-Hi Min, Hojung Cha, Jongho Nang. 795-799 [doi]
- Adaptive middleware architecture for information sharing on mobile phonesR. Shriram, Vijayan Sugumaran. 800-804 [doi]
- Graph-based text representation and knowledge discoveryWei Jin, Rohini K. Srihari. 807-811 [doi]
- NL sampler: random sampling of web documents based on natural language with query hit estimationDaniel Schuster, Alexander Schill. 812-818 [doi]
- Translation disambiguation in web-based translation extraction for English-Chinese CLIRChengye Lu, Yue Xu, Shlomo Geva. 819-823 [doi]
- TUBE (Text-cUBE) for discovering documentary evidence of associations among entitiesHady Wirawan Lauw, Ee-Peng Lim, HweeHwa Pang. 824-828 [doi]
- Log-based indexing to improve web site searchChen Ding, Jin Zhou. 829-833 [doi]
- Text classification based on partial least square analysisXue-Qiang Zeng, Ming-Wen Wang, Jian-Yun Nie. 834-838 [doi]
- Using a knowledge base to disambiguate personal name in web search resultsQuang Minh Vu, Tomonari Masada, Atsuhiro Takasu, Jun Adachi. 839-843 [doi]
- Semi-supervised single-label text categorization using centroid-based classifiersAna Cardoso-Cachopo, Arlindo L. Oliveira. 844-851 [doi]
- Towards a synthetic analysis of user s information need for more effective personalized filtering servicesRanda Kassab, Jean-Charles Lamirel. 852-859 [doi]
- A model for managing collections of patternsBaptiste Jeudy, Christine Largeron, François Jacquenet. 860-865 [doi]
- A cooperative classification mechanism for search and retrieval software componentsTaciana A. Vanderlei, Frederico Araujo Durão, Alexandre C. Martins, Vinicius Cardoso Garcia, Eduardo Santana de Almeida, Silvio Romero de Lemos Meira. 866-871 [doi]
- Why do successful search systems fail for some topicsJacques Savoy. 872-877 [doi]
- Query optimizing on a decentralized web search engineDaze Wang, Ying Zhou, Joseph Davis. 880-881 [doi]
- Using text search for personal photo collections with the MediAssist systemNeil O Hare, Cathal Gurrin, Gareth J. F. Jones, Hyowon Lee, Noel E. O Connor, Alan F. Smeaton. 880-881 [doi]
- On using user query sequence to detect off-topic searchAlana Platt, Nazli Goharian, Saket S. R. Mengle. 882-883 [doi]
- A mobile sensor control method for sparse sensor networksKriengsak Treeprapin, Akimitsu Kanzaki, Takahiro Hara, Shojiro Nishio. 886-890 [doi]
- An efficient TDMA slot assignment protocol in mobile ad hoc networksAkimitsu Kanzaki, Takahiro Hara, Shojiro Nishio. 891-895 [doi]
- Topology information generation methods using a routing table in ad hoc network applicationsTaniguchi Tetsuya, Akimitsu Kanzaki, Takahiro Hara, Shojiro Nishio. 896-900 [doi]
- DAYS mobile: a location based data broadcast service for mobile usersDebopam Acharya, Vijay Kumar, Gi-Chul Yang. 901-905 [doi]
- Automated routing protocol selection in mobile ad hoc networksTaesoo Jun, Christine Julien. 906-913 [doi]
- A mechanism for replicated data consistency in mobile computing environmentsJosé Maria Monteiro, Angelo Brayner, Sérgio Lifschitz. 914-919 [doi]
- A weighted cache replacement policy for location dependent data in mobile environmentsAjey Kumar, Manoj Misra, Anil Kumar Sarje. 920-924 [doi]
- An effective ::::k::::NN search protocol in wireless broadcast environmentsShu-Yu Fu, Chuan-Ming Liu. 925-929 [doi]
- A framework for CORBA interoperability in ad hoc networksLuiz A. Paula Lima Jr., Alcides Calsavara. 930-934 [doi]
- Balancing energy consumption and memory usage in sensor data processingAngelo Brayner, Ronaldo Menezes. 935-939 [doi]
- Towards secure resource sharing for impromptu collaboration in pervasive computingWilliam Claycomb, Dongwan Shin. 940-946 [doi]
- A MOF metamodel for the development of context-aware mobile applicationsCléver Ricardo Guareis de Farias, Marcos M. Leite, Camilo Zardo Calvi, Rodrigo Mantovaneli Pessoa, José Gonçalves Pereira Filho. 947-952 [doi]
- Dual agreement virtual subnet protocol for mobile ad-hoc networksKuo-Qin Yan, Shu-Chin Wang, G. Y. Zheng. 953-954 [doi]
- Quorum-based consistency management among replicas in ad hoc networks with data updateYohei Sawai, Masako Shinohara, Akimitsu Kanzaki, Takahiro Hara, Shojiro Nishio. 955-956 [doi]
- Mining communities of acquainted mobile users on call detail recordsWei-Guang Teng, Ming-Chia Chou. 957-958 [doi]
- ::::IS_SDM::::: an in-network semantic sensor data modelChow Kin Wah, Qing Li. 959-960 [doi]
- Semi-automatic model integration using matching transformations and weaving modelsMarcos Didonet Del Fabro, Patrick Valduriez. 963-970 [doi]
- Implementing a practical declarative logic-based model transformation engineMichael Lawley, Kerry Raymond. 971-977 [doi]
- Automating model transformation by example using inductive logic programmingDániel Varró, Zoltan Balogh. 978-984 [doi]
- Separation of concerns in translational semantics for DSLs in model engineeringThomas Cleenewerck, Ivan Kurtev. 985-992 [doi]
- Transforming system operations interactions into a design class diagramAndrés Vignaga, M. Cecilia Bastarrica. 993-997 [doi]
- Towards an automated test generation for the verification of model transformationsMaher Lamari. 998-1005 [doi]
- Using software product lines to manage model families in model-driven engineeringOrlando Avila-García, Antonio Estévez, E. Victor Sánchez Rebull. 1006-1011 [doi]
- Model transformation for object-relational database developmentJuan M. Vara, Belén Vela, José María Cavero, Esperanza Marcos. 1012-1019 [doi]
- A phasing mechanism for model transformation languagesJesús Sánchez Cuadrado, Jesús García Molina. 1020-1024 [doi]
- Software customization in model driven development of web applicationsAntonio Cicchetti, Davide Di Ruscio, Amleto Di Salle. 1025-1030 [doi]
- A software framework for automated verificationIvo Raedts, Marija Petkovic, Alexander Serebrenik, Jan Martijn E. M. van der Werf, Lou J. Somers, Maarten Boote. 1031-1032 [doi]
- An MDA approach to develop systems based on components and aspectsPedro J. Clemente, Juan Hernández, Fernando Sánchez. 1033-1034 [doi]
- Weaving models in conflict detection specificationsAntonio Cicchetti, Alessandro Rossini. 1035-1036 [doi]
- Mapping visual notations to MOF compliant models with QVT relationsMatthias Erche, Michael Wagner, Christian Hein. 1037-1038 [doi]
- Automatic classification of digestive organs in wireless capsule endoscopy videosJeongKyu Lee, Jung-Hwan Oh, Subodh Kumar Shah, Xiaohui Yuan, Shou Jiang Tang. 1041-1045 [doi]
- Use of hardware Z-buffered rasterization to accelerate ray tracingChih-Chang Chen, Damon Shing-Min Liu. 1046-1050 [doi]
- Improved SVD-DWT based digital image watermarking against watermark ambiguityErkan Yavuz, Ziya Telatar. 1051-1055 [doi]
- Web image annotation by fusing visual features and textual informationVincent S. Tseng, Ja-Hwung Su, Bo-Wen Wang, Yu-Ming Lin. 1056-1060 [doi]
- MOJOHON: a channel-driven communication architecture for applications deployed on the internetDaniel Corrêa Lobato, Matheus Qualio Barbosa, Maria da Graça Campos Pimentel, César A. C. Teixeira. 1061-1066 [doi]
- Exploring OLAP aggregates with hierarchical visualization techniquesSvetlana Mansmann, Marc H. Scholl. 1067-1073 [doi]
- VideoLib: a video digital library with support to spatial and temporal dimensionsAlex Sandro da Cunha Rego, Cláudio de Souza Baptista, Elvis Rodrigues da Silva, Ulrich Schiel, Hugo Feitosa de Figueirêdo. 1074-1078 [doi]
- BWT-based efficient shape matchingDonald A. Adjeroh, U. Kandaswamy, Nan Zhang 0005, Amar Mukherjee, M. T. Brown, Tim Bell. 1079-1085 [doi]
- Large scale news video database browsing and retrieval via information visualizationHangzai Luo, Jianping Fan, Shin ichi Satoh, William Ribarsky. 1086-1087 [doi]
- Fast tracking of hierarchical partitions with approximate kl-divergence for geo-temporal organization of personal imagesAntoine Pigeau, Afshin Nikseresht, Marc Gelgon. 1088-1089 [doi]
- Preattentive processing: using low-level vision psychology to encode information in visualisationsNilma Perera, Albert Goodman, Kathy Blashki. 1090-1091 [doi]
- Featherweight wrap JavaLorenzo Bettini, Sara Capecchi, Elena Giachino. 1094-1100 [doi]
- Variadic templates for C++Douglas Gregor, Jaakko Järvi. 1101-1108 [doi]
- Deriving components from genericityJames Sasitorn, Robert Cartwright. 1109-1116 [doi]
- Modular multiple dispatch with multiple inheritanceEric E. Allen, J. J. Hallett, Victor Luchangco, Sukyoung Ryu, Guy L. Steele Jr.. 1117-1121 [doi]
- Primitives for the dynamic evolution of component-based applicationsManuel Oriol. 1122-1123 [doi]
- On efficient wear leveling for large-scale flash-memory storage systemsLi-Pin Chang. 1126-1130 [doi]
- A fair scheduling scheme for a time-sensitive traffic over the dual-channel wireless networkJunghoon Lee, Mikyung Kang, Abhijit Saha. 1131-1135 [doi]
- Improving the performance of log-structured file systems with adaptive block rearrangementMei-Ling Chiang, Jia-Shin Huang. 1136-1140 [doi]
- Evaluation of interval-based dynamic voltage scaling algorithms on mobile Linux systemHaklin Kimm, Sung Y. Shin, Chang Oan Sung. 1141-1145 [doi]
- CriStore: dynamic storage system for heterogeneous devices in off-site ubiquitous communitiesHyunBin Lee, YongJoo Song, Kyungbaek Kim, Donggook Kim, Daeyeon Park. 1146-1150 [doi]
- LA-TinyOS: a locality-aware operating system for wireless sensor networksTai-Yi Huang, Kai-Yuan Hou, Huang-Yi Yu, Edward T.-H. Chu, Chung-Ta King. 1151-1158 [doi]
- An efficient dynamic memory allocator for sensor operating systemsHong Min, Sangho Yi, Yookun Cho, Jiman Hong. 1159-1164 [doi]
- Towards context-aware and resource-driven self-adaptation for mobile handheld applicationsDavy Preuveneers, Yolande Berbers. 1165-1170 [doi]
- An efficient implementation of RC4 cipher for encrypting multimedia files on mobile devicesHongGeun Kim, Jungkyu Han, Seongje Cho. 1171-1175 [doi]
- A priority assignment strategy of processing elements over an on-chip busYa-Shu Chen, Song-Jian Tang, Shi-Wu Lo. 1176-1180 [doi]
- Shared-stack cooperative threadsBoncheol Gu, Yongtae Kim, Junyoung Heo, Yookun Cho. 1181-1186 [doi]
- A high performance NIDS using FPGA-based regular expression matchingJanghaeng Lee, Sung Ho Hwang, Neungsoo Park, Seong-Won Lee, SungIk Jun, Young-Soo Kim. 1187-1191 [doi]
- Virtual framework for testing the reliability of system software on embedded systemsSung-Kwan Kim, Jongmoo Choi, Donghee Lee, Sam H. Noh, Sang Lyul Min. 1192-1196 [doi]
- Constructing machine emulator on portable microkernelYuki Kinebuchi, Hidenari Koshimae, Tatsuo Nakajima. 1197-1198 [doi]
- Providing context-awareness to virtual file systemYongJoo Song, Daeyeon Park. 1199-1200 [doi]
- SESAME: space-efficient stack allocation mechanism for multi-threaded sensor operating systemsSangho Yi, Hong Min, Seungwoo Lee, Yeongkwun Kim, Injoo Jeong. 1201-1202 [doi]
- RemoteFS: accessing remote file systems for desktop grid computingPrem Uppuluri, Sachin Singh, Uday Joshi. 1203-1204 [doi]
- Software product line evolution method based on ::::kaizen:::: approachMari Inoki, Yoshiaki Fukazawa. 1207-1214 [doi]
- Integration of IT service management into enterprise architectureChristian Braun, Robert Winter. 1215-1219 [doi]
- Towards evolution of strategic IT requirementsAbdul Babar, Karl Cox, Steven J. Bleistein, June M. Verner. 1220-1227 [doi]
- Combining cybernetics and conceptual modeling: the concept of variety in organizational engineeringChristoph Rosenkranz, Roland Holten. 1228-1233 [doi]
- Using control-flow patterns for specifying business processes in cooperative environmentsKelly Rosa Braghetto, João Eduardo Ferreira, Calton Pu. 1234-1241 [doi]
- Supporting effective unexpected exceptions handling in workflow management systemsHernâni Mourão, Pedro Antunes. 1242-1249 [doi]
- Extending business process management to determine efficient IT investmentsThomas Neubauer, Christian Stummer. 1250-1256 [doi]
- Representing organizational competenciesArtur Caetano, João Pombinho, José M. Tribolet. 1257-1262 [doi]
- How to detect semantic business process model variants?Agnes Koschmider, Andreas Oberweis. 1263-1264 [doi]
- Extending the EPC with performance measuresBirgit Korherr, Beate List. 1265-1266 [doi]
- Context-aware feature-oriented modeling with an aspect extension of VDMNaoyasu Ubayashi, Shin Nakajima. 1269-1274 [doi]
- Co-evolving application code and design models by exploiting meta-dataWalter Cazzola, Sonia Pini, Ahmed Ghoneim, Gunter Saake. 1275-1279 [doi]
- Reflective layer activation in ContextLPascal Costanza, Robert Hirschfeld. 1280-1285 [doi]
- Supporting reconfigurable object distribution for customized web applicationsPo-Hao Chang, Gul Agha. 1286-1292 [doi]
- Towards reusable and modular aspect-oriented concurrency controlSérgio Soares, Paulo Borba. 1293-1294 [doi]
- An aspect-generated approach for the integration of applications into gridRosario Giunta, Giuseppe Pappalardo, Emiliano Tramontana. 1295-1296 [doi]
- Implementing type-based constructive negationLunjin Lu. 1299-1306 [doi]
- Towards resource-certified software: a formal cost model for time and its application to an image-processing exampleArmelle Bonenfant, Zezhi Chen, Kevin Hammond, Greg Michaelson, Andrew M. Wallace, Iain Wallace. 1307-1314 [doi]
- Reifying wildcards in Java using the EGO approachMaurizio Cimadamore, Mirko Viroli. 1315-1322 [doi]
- Comparison of two activity analyses for automatic differentiation: context-sensitive flow-insensitive vs. context-insensitive flow-sensitiveJaewook Shin, Paul D. Hovland. 1323-1329 [doi]
- Precise dynamic slicing using execution-summaryAvik Paul, Rajeev Kumar. 1330-1331 [doi]
- A relative cost model for XQuerySoichiro Hidaka, Hiroyuki Kato, Masatoshi Yoshikawa. 1332-1333 [doi]
- Semantically enhanced user modelingPalakorn Achananuparp, Hyoil Han, Olfa Nasraoui, Roberta Johnson. 1335-1339 [doi]
- FCA-based approach for mining contextualized folksonomyHak Lae Kim, Suk-hyung Hwang, Hong-Gee Kim. 1340-1345 [doi]
- Hybrid retrieval from the unified webTrivikram Immaneni, Krishnaprasad Thirunarayan. 1346-1350 [doi]
- A decentralized infrastructure for query answering over distributed ontologiesPeter Haase, Yimin Wang. 1351-1356 [doi]
- Modeling biomedical assertions in the semantic webDeendayal Dinakarpandian, Tuanjie Tong, Yugyung Lee. 1357-1361 [doi]
- Ontology based annotation of text segmentsSamhaa R. El-Beltagy, Maryam Hazman, Ahmed A. Rafea. 1362-1367 [doi]
- Handling heterogeneity in RosettaNet messagesArmin Haller, Paavo Kotinurmi, Tomas Vitvar, Eyal Oren. 1368-1374 [doi]
- Trust-based service provider selection in open environmentsHolger Billhardt, Ramón Hermoso, Sascha Ossowski, Roberto Centeno. 1375-1380 [doi]
- An approach for indexing, storing and retrieving domain knowledgeHao Wu, Hai Jin, Xiaomin Ning. 1381-1382 [doi]
- Verification of web service descriptions using graph-based traversal algorithmsNalaka Gooneratne, Zahir Tari, James Harland. 1385-1392 [doi]
- SNet: skip graph based semantic web services discoveryJianjun Yu, Hao Su, Gang Zhou, Ke Xu. 1393-1397 [doi]
- Instance-based retrieval by analogyNicola Fanizzi, Claudia d Amato, Floriana Esposito. 1398-1402 [doi]
- An approach to evaluating structural pattern conformance of UML modelsDae-Kyoo Kim, Wuwei Shen. 1404-1408 [doi]
- Requirements for information systems model-based testingPedro de Alcântara dos Santos Neto, Rodolfo F. Resende, Clarindo Isaías Pereira da Silva e Pádua. 1409-1415 [doi]
- Regression testing for component-based software via built-in test designChengying Mao, Yansheng Lu, Jinlong Zhang. 1416-1421 [doi]
- Different conceptions in software project risk assessmentMartin Höst, Christin Lindholm. 1422-1426 [doi]
- Formal modelling and verification of a component model using coloured petri nets and model checkingElthon A. S. Oliveira, Hyggo Oliveira de Almeida, Leandro Dias da Silva. 1427-1431 [doi]
- Generalizing recognition of an individual dialect in program analysis and transformationPradeep Varma. 1432-1439 [doi]
- Sensitivity of software system reliability to usage profile changesKim Weyns, Per Runeson. 1440-1444 [doi]
- Design of a simple and effective object-to-relational mapping techniqueFakhar Lodhi, Muhammad Ahmad Ghazali. 1445-1449 [doi]
- A component-based framework for the internet content adaptation domainMarcos Forte, Renato A. T. Claudino, Wanderley Lopes de Souza, Antônio Francisco do Prado, Luiz H. Z. Santana. 1450-1455 [doi]
- Reversing GUIs to XIML descriptions for the adaptation to heterogeneous devicesGiuseppe Di Santo, Eugenio Zimeo. 1456-1460 [doi]
- A framework and a tool for robustness testing of communicating softwareFares Saad-Khorchef, Antoine Rollet, Richard Castanet. 1461-1466 [doi]
- Enhancing adaptive random testing in high dimensional input domainsFei-Ching Kuo, Tsong Yueh Chen, Huai Liu, W. K. Chan. 1467-1472 [doi]
- Extending reusable asset specification to improve software reuseSoojin Park, Sooyong Park, Vijayan Sugumaran. 1473-1478 [doi]
- Integration of well posedness analysis in software engineeringLorie M. Liebrock. 1479-1483 [doi]
- Outlier elimination in construction of software metric modelsVictor K. Y. Chan, W. Eric Wong. 1484-1488 [doi]
- Software reengineering with architecture decompositionLei Wu, Yi Feng, Hua Yan. 1489-1493 [doi]
- Modeling component based embedded systems applications with explicit connectors in UML 2.0Dietmar Schreiner, Karl M. Göschka. 1494-1495 [doi]
- Enhancing traceability using ontologiesRodrigo Perozzo Noll, Marcelo Blois Ribeiro. 1496-1497 [doi]
- Analysis and verification of an automatic document feederBas Ploeger, Lou J. Somers. 1499-1505 [doi]
- Formal verification of security specifications with common criteriaShoichi Morimoto, Shinjiro Shigematsu, Yuichi Goto, Jingde Cheng. 1506-1512 [doi]
- Checking software component behavior using behavior protocols and spinJan Kofron. 1513-1517 [doi]
- Towards security monitoring patternsGeorge Spanoudakis, Christos Kloukinas, Kelly Androutsopoulos. 1518-1525 [doi]
- Integrating a certified memory management runtime with proof-carrying codeNadeem Abdul Hamid. 1526-1533 [doi]
- Mechanized proofs for the parameter abstraction and guard strengthening principle in parameterized verification of cache coherence protocolsYongjian Li. 1534-1535 [doi]
- A Java code annotation approach for model checking software systemsGlauber Ferreira, Emerson Loureiro, Elthon A. S. Oliveira. 1536-1537 [doi]
- Real-time Java processor optimized for RTSJZhiLei Chai, Wenke Zhao, Wenbo Xu. 1540-1544 [doi]
- An implementation and performance analysis of slave-side arbitration schemes for the ML-AHB BusMatrixSoo Yun Hwang, Hyeong Jun Park, Kyoung-Son Jhang. 1545-1551 [doi]
- Unichos: a full system simulator for thin client platformNing Qu, Yulai Zhao, Xuetao Guan, Xu Cheng. 1552-1556 [doi]
- Online resource management in a multiprocessor with a network-on-chipOrlando Moreira, Jacob Jan-David Mol, Marco Bekooij. 1557-1564 [doi]
- Performance monitor unit design for an AXI-based multi-core SoC platformHyun-min Kyung, Gi-Ho Park, Jong Wook Kwak, WooKyeong Jeong, Tae-Jin Kim, Sung-Bae Park. 1565-1572 [doi]
- Evaluating peer-to-peer recommender systems that exploit spontaneous affinitiesGiancarlo Ruffo, Rossano Schifanella. 1574-1578 [doi]
- A protocol to preserve a code of conductCristiano Longo, Paolo Giarrusso. 1579-1585 [doi]
- Fighting pollution dissemination in peer-to-peer networksCristiano P. Costa, Vanessa Soares, Jussara M. Almeida, Virgilio Almeida. 1586-1590 [doi]
- Modeling deceptive information dissemination using a holistic approachYi Hu, Zhichun Xiao, Brajendra Panda. 1591-1598 [doi]
- Certain trust: a trust model for users and agentsSebastian Ries. 1599-1604 [doi]
- Designing a trust chain for a thin client on a live Linux cdMegumi Nakamura, Seiji Munetoh. 1605-1606 [doi]
- A taxonomy of mobile and pervasive applicationsKrista M. Dombroviak, Rajiv Ramnath. 1609-1615 [doi]
- System support for mobile augmented reality servicesHiroaki Kimura, Eiji Tokunaga, Tatsuo Nakajima. 1616-1623 [doi]
- A lightweight indoor location model for sentient artefacts using sentient artefactsFahim Kawsar, Kaori Fujinami, Tatsuo Nakajima. 1624-1631 [doi]
- Engineering intuitive and self-explanatory smart productsErwin Aitenbichler, Fernando Lyardet, Gerhard Austaller, Jussi Kangasharju, Max Mühlhäuser. 1632-1637 [doi]
- Tracking multiple mobile objects using IEEE 802.15.4-based ultrasonic sensor devicesShinyoung Yi, Jiyoung Yi, Hojung Cha. 1638-1639 [doi]
- Modeling web service composition and execution via a requirements-driven approachNanjangud C. Narendra, Bart Orriëns. 1642-1648 [doi]
- Automatic enactment of message exchange pattern for web servicesXinwu Cheng, Lei Li, Jun Wei. 1649-1653 [doi]
- Decentralized authorization and data security in web content deliveryDanfeng Yao, Yunhua Koglin, Elisa Bertino, Roberto Tamassia. 1654-1661 [doi]
- Towards decentralized service orchestrationsUstun Yildiz, Claude Godart. 1662-1666 [doi]
- Semantic deep web: automatic attribute extraction from the deep web data sourcesYoo Jung An, James Geller, Yi-Ta Wu, Soon Ae Chun. 1667-1672 [doi]
- Exploiting bibliographic web services with CiTeXJames D. Palmer. 1673-1676 [doi]
- Modeling business processes in web applications: an analysis frameworkDamiano Distante, Gustavo Rossi, Gerardo Canfora. 1677-1682 [doi]
- IC-service: a service-oriented approach to the development of recommendation systemsAliaksandr Birukou, Enrico Blanzieri, Vincenzo D Andrea, Paolo Giorgini, Natallia Kokash, Alessio Modena. 1683-1688 [doi]
- A petri net semantics for web service choreographyYu Huang, Hanpin Wang. 1689-1690 [doi]
- Towards supporting user interface agility in developing heterogeneous device enabled business processesYaojin Yang, Lasse Pajunen. 1691-1692 [doi]
- Web service orchestration and verification using MSC and CP netsAabhas V. Paliwal, Nabil R. Adam, Christof Bornhövd. 1693-1694 [doi]
- Embedded system for diagnosing dysfunctions in the lower urinary tractDavid Gil Mendez, Antonio Soriano Payá, Daniel Ruiz Fernández, C. Alberto Montejo. 1695-1699 [doi]