Abstract is missing.
- Deletion Techniques for the ND-tree in Non-ordered Discrete Data SpacesHyun-Jeong Seok, Qiang Zhu, Gang Qian, Sakti Pramanik, Wen-Chi Hou. 1-6
- The Electronic Medical Record: A Temporal Multimedia DatabaseDonna L. Hudson, Maurice E. Cohen. 7-12
- Using Shape Patterns for Clustering Unstructured Text DocumentsDurga Toshniwal, Rishiraj Saha Roy. 13-18
- Natural-Inspired Data Clustering: A Hybridization between Ant Clustering and Particle Swarm OptimizationMohammed E. El-Telbany, Samah Rafat, Sultan H. Aljahdali. 19-25
- Gene Function PredictionAmal Shehan Perera, William Perrizo. 26-31
- Military Route Planning in Battle Field Simulations for a Multi-Agent SystemSharad Sharma. 32-36
- BCI++: A New Framework for Brain Computer Interface ApplicationPaolo Perego, Luca Maggi, Sergio Parini, Giuseppe Andreoni. 37-41
- Denotational Semantics for Social Communication among AgentsAlejandro Garcés, Ricardo Quirós, Miguel Chover, Hebert Pérez-Rosés, Ianisse Quinzán, Pilar Espinosa. 42-46
- Using Mapping Relations for XML Schema MediationMarwan Sabbouh, Daniel J. Hebert, Caleb Wan, Scott Bennett, Dan Potter. 47-54
- Processing Schema-Optimized XPath Filters by Deterministic AutomataPanu Silvasti, Seppo Sippu, Eljas Soisalon-Soininen. 55-60
- An Application for Tree Detection Using Satellite Imagery and Vegetation DataDavid T. Brown, Roger V. Hoang, Matthew R. Sgambati, Frederick C. Harris Jr.. 61-66
- Software Development Aspects of a Mobile Food Ordering SystemHrishikesh Kulkarni, Sergiu M. Dascalu, Frederick C. Harris Jr.. 67-72
- Student s Aid: A Touchscreen DeviceBen Seelbinder, Sergiu M. Dascalu. 73-78
- WiELD-CAVE: Wireless Ergonomic Lightweight Device for use in the CAVEKelvin Parian, Joshua Hegie, Andrew Kimmel, Sergiu M. Dascalu, Frederick C. Harris Jr.. 79-84
- Towards a Change Propagation Process in Software ArchitectureMohamed Oussama Hassan, Laurent Deruelle, Henri Basson. 85-90
- A Hybrid Heuristic Approach To Optimize Rule-Based Software Quality Estimation ModelsDanielle Azar, Haidar M. Harmanani, Rita Korkmaz. 91-98
- Rearchitecting Meta-modeling Foundation: A Formal ApproachPooyan Jamshidi, Fereidoon Shams, Sedigheh Khoshnevis, R. Teimourzadegan, A. Nikravesh. 99-104
- A Survey on Model Driven Software DevelopmentCobra Rahmani, Mansour Zand, Harvey P. Siy, Satish Mahadevan Srinivasan. 105-110
- Modeling and Verification of Dynamic Behavior in UML Models: A Graph Transformation ApproachElhillali Kerkouche, Allaoua Chaoui, El-Bay Bourennane, Ouassila Labbani. 111-118
- Supporting Tool Reuse with Model TransformationZekai Demirezen, Yu Sun, Jeffrey G. Gray, Frédéric Jouault. 119-125
- Composite Service MetaModelAnthony A. Hock-koon, Mourad Oussalah. 126-131
- Test Suites Effectiveness from Sequence Diagrams and Function Call TreesPranshu Gupta, David A. Gustafson. 132-137
- Data Warehouse Development Using MDA and 2TUPMoez Essaidi, Aomar Osmani. 138-143
- SQL-Guard Design PatternAhmed A. Bahjat, Hamoud Al-Jamaan, Mohammad Al-Shayeb. 144-148
- Experimental Study on Item-based P-Tree Collaborative Filtering Algorithm for NetflixTingda Lu, William Perrizo, Yan Wang, Gregory H. Wettstein, Amal Shehan Perera. 149-154
- An Improved Wave Planning Technique For Material-To-Man Order Picking OperationKemal Taljanovic, Adnan Salihbegovic. 155-160
- Robustness Testing on Composed Timed SystemsHacène Fouchal, Antoine Rollet, Abbas Tarhini. 161-167
- A Strategy to Derive RSL Specification from Feature ModelsNarayan C. Debnath, Laura Felice, Maria Carmen Leonardi, María Virginia Mauco, German Montejano, Daniel Riesco. 168-173
- Management Automation Specified by SPEM Work Breakdown Element using Workflow TechnologyDaniel Riesco, German Montejano, Narayan C. Debnath, Manuel Pérez Cota. 174-179
- Specifying Requirements for Real-Time SystemsSatish Srinivasan, Scott Lancaster, Mansour Zand, Cobra Rahmani. 180-184
- Adoption of Technology Acceptance Model (TAM) to Electronic Commerce: A Statistical Meta-Analysis ApproachGhassan Filimban, Sultan Aljahdali. 185-193
- Combination of a MANET Data Communication Protocol with a Service Discovery Protocol for Mobile Ad Hoc Networks in a FrameworkNarayan C. Debnath, Afsaneh Rahbar, Mehran Mohsenzadeh. 194-199
- New Techniques and Algorithms for Text Steganography through Hindi TextS. Changder, Narayan C. Debnath. 200-204
- Security Requirements Engineering: The Mobile Phones ContextDaniel D. Hein, Hossein Saiedian. 205-210
- Checking for Liskov Substitution Principle Compliance in Java ProgramsBrahma Dathan. 211-216
- Towards a Framework for Automated Random Testing of Aspect-Oriented ProgramsReza Meimandi Parizi, Abdul Azim Abdul Ghani, Rusli Abdulla, Rodziah Binti Atan. 217-223
- A Metaheuristic to Solve a Traveling Salesman ProblemWu-Hsien Shen, Chwen-Tzeng Su. 224-229
- Optimizing Network Deployment of Formally-Specified Distributed SystemsCarleton Coffrin, Laurent D. Michel, Alexander A. Shvartsman, Elaine L. Sonderegger, Pascal Van Hentenryck. 230-237
- (m, k)-frame: A Method to Control the Quality of Service in Distributed Multimedia SystemsBechir Alaya, Claude Duvallet, Bruno Sadeg. 238-243
- Internal Corporative Security: Protocols Preventing Leakage of Sensitive Information and Assuring Authorized Network Traffic in the Domain of Gaussian IntegersBoris S. Verkhovsky, Roberto D. Rubino. 244-249
- Evolutionary Nearest Neighbour Classification FrameworkAmal Shehan Perera, D. G. Niroshini Dayaratne, William Perrizo. 250-255
- The Universality of Nearest Neighbor Sets in Classification and PredictionWilliam Perrizo, Gregory H. Wettstein, Amal Shehan Perera, Tingda Lu. 256-259
- An Empirical Study of the Effectiveness of Partial Antirandom TestingJames D. McCaffrey. 260-265
- A Machine Learning Approach for Watermarking in Dithered Halftone ImagesChing-Tang Hsieh, Yeh-Kuang Wu, Kuo-Ming Hung, Chih-Yu Chang. 266-270
- A Lip Segmentation Using New Threshold Method Towards An Automatic Speech Recognition SystemChing-Tang Hsieh, Chih-Yu Chang, Min-Nan Hsiao. 271-274
- Speech Emotion Profiiling for Inter and Intra-Cultural AssessmentNorhaslinda Kamaruddin, Abdul Wahab. 275-280
- Facial Image Aging Synthesis Based on the Log-Gabor WaveletChing-Tang Hsieh, Yu-Cheng Lee, Min-Nan Hsiao. 281-284
- Face Recognition Based Presentation Checking SystemChing-Tang Hsieh, Chang-Chu Chen, Min-Nan Hsiao. 285-288
- EEG Signals for Emotion RecognitionAbdul Wahab, Norhaslinda Kamaruddin, Lavan Palaniappan. 289-294
- PSO accelerated 3D face angle searching system for face recognitionChing-Tang Hsieh, Meng-Shian Shih, Min-Nan Hsiao. 295