Abstract is missing.
- Two Sides of Structuring Multi-Functional Software Systems: Function Hierarchy and Component ArchitectureManfred Broy. 3-12 [doi]
- Software Processes Improvement and Specifications for Embedded SystemsDong Jun, Lin Rui, He Yi-min. 13-18 [doi]
- Design Opportunity Tree of Capability Improve for Level-up and Software Process ImprovementEun-ser Lee, Haeng-Kon Kim, Sun-myoung Hwang. 19-24 [doi]
- Analysis the priority of security requirement items for the process improvement by ISO/IEC 15504 and ISO/IEC 15408Eun-ser Lee, Haeng-Kon Kim, Sun-myoung Hwang. 25-30 [doi]
- Two-stage Process Analysis Using the Process-based Performance Measurement Framework and Process SimulationKwan Hee Han, Jin-Gu Kang. 31-37 [doi]
- Construction of a Real-time Urban Inundation Analysis System based on UIS using SWMMKi-Uk Kim, Sung-Woo Park, Seonghyun Shin, Hyun-Suk Hwang, Tae Gun Jeon, Chang Soo Kim. 38-46 [doi]
- An On-board Switch Scheme Based on DiffServLi Song, Ai-jun Liu, Yi-fei Ma. 47-53 [doi]
- An Energy-Efficient Clustering Using a Round-Robin Method in a Wireless Sensor NetworkDo-Hyun Nam, Hongki Min. 54-60 [doi]
- UPnP based Service Discovery and Service Violation Handling for Distributed Fault Management in WBEM-based Network ManagementShahnaza Tursunova, Young-Tak Kim. 61-67 [doi]
- An Efficient Energy Consumption Scheme Considering Coverage and Connectivity Problem in Wireless Sensor NetworksTae Young Byun. 68-72 [doi]
- A Performance Analysis of MANET Multicast Routing Algorithms with Multiple SourcesSang-Chul Kim, Keehyun Shin. 73-82 [doi]
- A Semantic-Features-Calculation Based Model Mapping Approach for Web Information SystemsGuodong Huang, Li Chen, Jinkui Hou. 83-90 [doi]
- A Quality Chain Modeling Methodology for Ternary Web Services Quality ViewYoungkon Lee, Gwyduk Yeom. 91-97 [doi]
- An Internet Query Language based on Intuitionistic Linear LogicKeehang Kwon, JaeWoo Kim, Jang-Wu Jo. 98-100 [doi]
- OWL-T: An Ontology-based Task Template Language for Modeling Business ProcessesVuong Xuan Tran, Hidekazu Tsuji. 101-108 [doi]
- Human Interaction Web ModelMuhammad Alamzaib Shafi, Athar Mohsin Zaidi, Abdur Rehman. 109-113 [doi]
- A Fuzzy AHP approach to evaluating e-commerce websitesYiwen Liu, Young-Jik Kwon, Byeongdo Kang. 114-124 [doi]
- Deriving Queuing Network Model for UML for Software Performance PredictionHyunsang Youn, Suhyeon Jang, Eunseok Lee. 125-131 [doi]
- Load Balancing Method Using Connection Pool in RFID MiddlewareSung-Mee Park, Jeong-Hwan Song, Chae-Soo Kim, Jung-Ja Kim. 132-137 [doi]
- Permutable Queue as a 1-in-N-out Message RouterGongzhu Hu. 138-148 [doi]
- A Synchronization of Secure Sensor terminal by GPS time informationJanghong Yoon. 149-152 [doi]
- Implementation and Performance Evaluation of Socket and RMI based Java Message Passing SystemsSeungJun Bang, JinHo Ahn. 153-159 [doi]
- Communication Networks for Interoperability and Reliable Service in Substation Automation SystemHyo-Sik Yang, Hyun-Soo Jang, Yong-Won Kim, Un-Sig Song, Sang-Sig Kim, Byung-Tae Jang, Byung-Seok Park. 160-168 [doi]
- New Developments on Recurrent Neural Networks TrainingSuwat Pattamavorakun, Suwarin Pattamavorakun. 169-176 [doi]
- A Particle Swarm Social Model for Multi-Agent Based Insurgency Warfare SimulationXiaohui Cui, Thomas E. Potok. 177-183 [doi]
- Determination the Number of Hidden Nodes of Recurrent Neural Networks for River Flow and Stock Price ForecastingSuwarin Pattamavorakun, Suwat Pattamavorakun. 184-194 [doi]
- PostB: The Post-condition Extension onto the B-MethodShuaiqiang Wang, Ying Li, Guodong Huang. 195-202 [doi]
- A Formal Approach to Designing Anonymous SoftwareYoshinobu Kawabe, Hideki Sakurada. 203-212 [doi]
- Implementation and Evaluation of an Automatic Visualization Tool PGT for Programming EducationYoshihiro Kita, Tetsuro Katayama, Shigeyuki Tomita. 213-220 [doi]
- SAT based Verification Tool for Labeled Transition SystemSachoun Park, Gihwon Kwon. 221-226 [doi]
- A Preliminary Formal Specification of Virtual Organization Creation with RAISE Specification LanguageMohammad Reza Nami, Mohsen Sharifi, Abbas Malekpour. 227-232 [doi]
- Extending the Service Domain of Interactive ComponentsWalter Dosch. 233-244 [doi]
- An Efficient Resource Reservation and QoS Provisioning Mechanism Based on mSCTP for Next Generation NetworkByoung-Ho Ahn, Dae Young Kim, Kuk-Hyun Cho, Si-Ho Cha, Minho Jo. 245-252 [doi]
- Hierarchical Node Clustering Approach for Energy Savings in WSNsSi-Ho Cha, Minho Jo, Jong-Eon Lee, Dae Young Kim, Seokjoong Kang, Kuk-Hyun Cho, Nobok Lee, Younghyun Kim. 253-259 [doi]
- Optimum Sensing Technique and Approach for Low Power Consumption NetworkHamid Jabbar, Taewan Kim, Jin-Suk Kang, Jangho Lee, Hyosik Yang, Mee Young Sung, Gyung-Leen Park, Taikyeong Jeong. 260-263 [doi]
- XML Auto-Transformation System for Ubiquitous Port using RFID TechnologyJaehong Ahn, Kyeongrim Ahn, Kyoungrog Yi, Jin-Wook Chung. 264-267 [doi]
- Enhanced Range finding Algorithms for Equidistance Stereo Catadioptric MirrorsYoung-Ho Choi, Min-goo Kang. 268-273 [doi]
- Caustics Effects with Photo-Realistic Rendering on Movie(‘Cars’)Jong Seo Kim, Kang-Soo You, Hoon-Sung Kwak. 274-280 [doi]
- A Design of User-Initiative Voice Web Using RSS and VoiceXMLHyeong-Joon Kwon, Kwang-Seok Hong. 281-288 [doi]
- Kernel based Learning Suitable for Text CategorizationTaeho Jo, Malrey Lee. 289-292 [doi]
- A User context awareness Model for mobile environment processingHyogun Yoon, Eungyeong Kim, Malrey Lee. 293-296 [doi]
- A Study on the Improved Collaborative Filtering Algorithm for Recommender SystemHee-Choon Lee, Seok-Jun Lee, Young-Jun Chung. 297-304 [doi]
- Design of Knowledge Discovery Agent based on Self Adaptive ComponentsGu-Beom Jeong, Guk-Boh Kim. 305-314 [doi]
- Functional Extension for Solving the Loophole Problem of DACS SchemeKazuya Odagiri, Rihito Yaegashi, Masaharu Tadauchi, Naohiro Ishii. 315-322 [doi]
- Efficient User Support with DACS SchemeKazuya Odagiri, Rihito Yaegashi, Masaharu Tadauchi, Naohiro Ishii. 323-330 [doi]
- Software architecture for a pattern based Question Answering systemXiaoli Liu, Guoqing Wu, Min Jiang, Min Yang, Weiming Wang. 331-336 [doi]
- Runtime Support for Advanced Component ConceptsTomás Bures, Petr Hnetynka, Frantisek Plasil, Jan Klesnil, Ondrej Kmoch, Tomas Kohan, Pavel Kotrc. 337-345 [doi]
- Web Service Security model Using CBD ArchitectureEun-Ju Park, Haeng-Kon Kim, Roger Y. Lee. 346-352 [doi]
- Development of Object-Oriented Modeling Tool for the Design of Industrial Control LogicKwan Hee Han, Jun Woo Park. 353-358 [doi]
- A Implementation of Object Oriented Database SecurityPremchand B. Ambhore, B. B. Meshram, V. B. Waghmare. 359-365 [doi]
- Profiling system of XML multimedia documents based on UML DiagramsYan Ha, Roger Y. Lee. 366-373 [doi]
- Precise Dynamic Impact Analysis with Dependency Analysis for Object-oriented ProgramsLulu Huang, Yeong-Tae Song. 374-384 [doi]
- Evaluation and Application of MVFs in Coverage for Coverage-Based NHPP SRGM FrameworksTakaji Fujiwara, Joong-Yang Park, Jae-Heung Park. 385-392 [doi]
- A Concept Lattice Approach for Requirements Validation with UML State Machine ModelPin Ng. 393-400 [doi]
- Requirements Specification: What Strategy Under What ConditionsJaroslav Král, Michal Zemlicka. 401-408 [doi]
- Achieving Managerial Goals in Business Process Components Design Using Genetic AlgorithmsWararat Rungworawut, Twittie Senivongse, Karl Cox. 409-418 [doi]
- A Path Selection Algorithm with Energy Efficiency for Wireless Sensor NetworksInwhee Joe. 419-423 [doi]
- A Novel Anti-Collision Algorithm with Optimal Frame Size for RFID SystemInwhee Joe, Juno Lee. 424-428 [doi]
- Implementation of ebXML Message Transaction supported on a Security and Reliability for Effective e-BusinessChangryul Jung, B. N. Sudhakar, Sungkeun Lee, Jin-Gwang Koh. 429-436 [doi]
- An Efficient Rank-based Image Transformation Scheme using Entropy Coding in Gray-Level ImagesEun-Cheon Lim, Choon-Bo Shim, Kang-Soo You. 437-444 [doi]
- A Comparison of Grid Computing systems and Globus by the application of auditingSaeed Parsa, Najmeh Torabian. 445-450 [doi]
- CodeSnippets Plug-in to Eclipse: Introducing Web 2.0 Tagging to Improve Software Developer RecallAndrew Forward, Timothy Lethbridge, Dwight Deugo. 451-460 [doi]
- CASS: A Context-Aware Simulation System for Smart HomeJoonseok Park, Mikyeong Moon, Seongjin Hwang, Keunhyuk Yeom. 461-467 [doi]
- RFID Business Aware Framework for Business Process in the EPC NetworkSeongjin Kim, Mikyeong Moon, Seonghun Kim, Sunmee Yu, Keunhyuk Yeom. 468-475 [doi]
- An Adaptive Software Framework based on Service CompositionChanwoo Yoo, Woosung Jung, Donghun Park, Byungjeong Lee, Heechern Kim, Chisu Wu. 476-484 [doi]
- A Development of HL7 Middleware for Medical Device CommunicationTung Tran, Hwa-Sun Kim, Hune Cho. 485-492 [doi]
- An ITIL-based IT Service Management Model for Chinese UniversitiesZhen Wang, Xin-yu Zhang. 493-497 [doi]
- Discrete Continuity of Information System, Knowledge System, and e-Business SystemJae Young Choi, Ki Joon Choi. 498-502 [doi]
- Performance Improvement of Bankruptcy Prediction using Credit Card Sales Information of Small & Micro BusinessJongsik Yoon, Young S. Kwon, Tae Hyup Roh. 503-512 [doi]
- Implantable Wireless Sensor Network to Monitor the Deep Body Temperature of BroilersHyun Ho Yang, Yeong Hwan Bae, Wongi Min. 513-517 [doi]
- Comparative Analysis and Design of Wired and Wireless Integrated Networks for Wireless Sensor NetworksMeong-hun Lee, Hyun Yoe. 518-522 [doi]
- Design of efficient routing method for USN based Large-scale Glass GreenhousesHyun-joong Kang, Meong-hun Lee, Hyun Yoe. 523-528 [doi]
- The Design of Large Scale U-IT Application USN by USN MiddlewareHui-dong Ju, Hyuk-jin Lim, Hyun Yoe. 529-533 [doi]
- Template based High Performance ALE-TSOAP Message CommunicationSuhyun Kim, Daeyoung Kim, Jongwoo Sung, Tomas Sanchez Lopez. 534-544 [doi]
- Automatic Test Generation for Dynamic Data StructuresRuilian Zhao, Qing Li. 545-549 [doi]
- RVERL: Run-time Verification of Real-time and Reactive Programs using Event-based Real-Time Logic ApproachSaeed Jalili, Mehdi MirzaAghaei. 550-557 [doi]
- An Agent-based Approach for the Maintenance of Database ApplicationsSpyridon K. Gardikiotis, Vasilios S. Lazarou, Nikolaos Malevris. 558-568 [doi]
- Design of Real-Time Embedded Music SystemSungmin Choi, Hoon Oh. 569-576 [doi]
- Automatic Detection of Design Pattern for Reverse EngineeringHakjin Lee, Hyunsang Youn, Eunseok Lee. 577-583 [doi]
- Dead Code Elimination in CTOCKi Tae Kim, Je-Min Kim, Weon-Hee Yoo. 584-588 [doi]
- A Study on an Efficient Searching Method of Multimedia ContentsJung-Tae Kim, Soon-Han Bae, Dong-Wook Lee. 589-598 [doi]
- Application of Mobile Information System in Vehicle InsuranceJin Da Wei, Li Yi Peng. 599-603 [doi]
- A Simulation Testing Platform of Ad Hoc NetworkHuang Xuyong, Miao Shihong, Liu Pei. 604-609 [doi]
- A Context-aware System Architecture using Personal Information based on OntologyHyun-Suk Hwang, Seonghyun Shin, Ki-Uk Kim, Seok-Cheol Lee, Chang Soo Kim. 610-615 [doi]
- A Study on the Circular Sensing Model with a Low Power Profile in Wireless Sensor NetworksSeok-Cheol Lee, Sam-bum Shin, Hyun-Suk Hwang, Chang Soo Kim. 616-624 [doi]
- Design of VY: A Mini Visual IDE for the Development of GUI in Embedded DevicesLe Yang, Yongsun Choi, Changjun Seo, Tongfeng Yang, MinSung Kim. 625-632 [doi]
- Practical Patching for Efficient Bandwidth Sharing in VOD SystemsKyung-Sook Lee, Sook-Jeong Ha, Ihn-Han Bae. 633-638 [doi]
- Virtual Reality Based on Stereotypical RUPERT for Stroke Functional Rehabilitative Training ScenariosXuhui Chen, Chaolin Ma, Shaochun Xu, Jiping He. 639-644 [doi]
- Design and Implementation of effective Brain-wave Data Base(DB) building system using the five sensesSang-Hyeon Jin, Hyeong-Oh Kwon, Jung-A Lee, Jeong-Hoon Shin. 645-654 [doi]
- A Synopsis Model for Deterministic Behavioral Specifications of an Adaptable AgentDussadee Praserttitipong, Peraphon Sophatsathit. 655-661 [doi]
- Reengineering Class Hierarchies into 3D Bridge FormChang-Moon Hyun. 662-666 [doi]
- A Formal Approach to Test the Robustness of Embedded Systems using Behaviour AnalysisAntoine Rollet, Fares Saad-Khorchef. 667-674 [doi]
- Design and Implementation of Control Point under the Home Network EnvironmentsOh-Hyun Kwon, Sung-Min Cho. 675-678 [doi]
- Communication of Business s and Software EngineersDavid Dupuis, Roger Y. Lee, Haeng-Kon Kim. 679-688 [doi]
- New Database Operators for Sensor NetworksSeungjae Lee, Changhwa Kim, Sangkyung Kim. 689-696 [doi]
- An Interest-Diffused Clustering Routing Algorithm by Bitmap in Wireless Sensor NetworksSangjoon Jung, Younky Chung. 697-701 [doi]
- Self-Organizing Clusters for Routing Algorithm by Diffusing an Interest in Wireless Sensor NetworksSangjoon Jung. 702-710 [doi]
- Toward an elastic service based framework for Enterprise Application IntegrationO. R. Bagheri, R. Nasiri, M. H. Peyravi, P. Khosraviyan Dehkordi. 711-719 [doi]
- A Dynamic Coupling for Reusable and Efficient Software SystemMisook Choi, Jongsuk Lee. 720-726 [doi]
- An Approach to Analyzing Commonality and Variability of Features using Ontology in a Software Product Line EngineeringSoon-Bok Lee, Jin-Woo Kim, Chee-Yang Song, Doo-Kwon Baik. 727-734 [doi]
- Taguchi Larger-the-Best Software Quality MetricsKiumi Akingbehin. 735-742 [doi]
- A Pattern Recognition-Based Multi-Modal HCI Using 3 Sensory ChannelsJung-Hyun Kim, Kue-Bum Lee, Kwang-Seok Hong. 743-750 [doi]
- Implementation of a 3-Dimensional Game for developing balanced BrainwaveBeom-Soo Shim, Sung-Wook Lee, Jeong-Hoon Shin. 751-758 [doi]
- An Implementation of Multi-Modal Game Interface Based on PDAsKue-Bum Lee, Jung-Hyun Kim, Kwang-Seok Hong. 759-768 [doi]
- Using Chemical Cellular Automata in Simulation of Chemical MaterialsFarshad Kyoomarsi, Javad Akbari Torkestani, Pooya Khosravyan Dehkordy, Mohammad Hosseyn Peyravi. 769-773 [doi]
- An Optimized Time-constraint Job Distribution Scheme in Group based P2P NetworksYong-Hyuk Moon, Jae-Hoon Nah, Jong-Soo Jang, Chan-Hyun Youn. 774-781 [doi]
- Anomaly-based Fault Detection System in Distributed SystemByoung uk Kim, Salim Hariri. 782-789 [doi]
- A Binding Framework Using the Dynamic Component Exchange Technique for Heterogeneous ServicesGwyduk Yeom, Jeonggeum Lee, Choong Kyo Jeong, Youngkon Lee. 790-798 [doi]
- Comparative Analysis of Neural Network Techniques Vs Statistical Methods in Capacity PlanningNalini Vasudevan, Gowri C. Parthasarathy. 799-806 [doi]
- A Framework for the Use of Six Sigma Tools in PSP/TSPYoungkyu Park, Ho-Jin Choi, Jongmoon Baik. 807-814 [doi]
- Errors Estimation Models for Embedded Software Development ProjectsKazunori Iwata, Toyoshiro Nakashima, Yoshiyuki Anan, Naohiro Ishii. 815-822 [doi]
- Evaluation of Ontology Development Methodology with CMM-iJeong Ah Kim, Seung Young Choi. 823-827 [doi]
- A Case Study: CRM Adoption Success Factor Analysis and Six Sigma DMAIC ApplicationZhedan Pan, Hoyeon Ryu, Jongmoon Baik. 828-838 [doi]
- TODD: Test-Oriented Development and DebuggingOliver Dagenais, Dwight Deugo. 839-846 [doi]
- Rigorous Vertical Software System Testing In IDEKwang Ik Seo, Eun Man Choi. 847-854 [doi]
- Detection of Bugs by Compiler Optimizer Using Macro Expansion of FunctionsD. T. V. Ramakrishna Rao. 855-862 [doi]
- Using Bounded Model Checking with BOGORTaehoon Lee, Mintaek Cho, Gihwon Kwon. 863-870 [doi]
- A UML Profile for Knowledge-Based Systems ModellingMohd Syazwan Abdullah, Richard F. Paige, Chris Kimble, Ian D. Benest. 871-878 [doi]
- Simulation-based Model Mapping ApproachJinkui Hou, Huahong Yu, Guodong Huang. 879-886 [doi]
- An Empirical Assessment of the Perception of Computer Security between US and Korea : Focused on RootkitsHa Jin Hwang. 887-894 [doi]
- The SAFE Management System Model Based on Context Automatic AwarenessKook-Hee Han, Yiwen Liu, Young-Jik Kwon, Byeongdo Kang, Roger Y. Lee. 895-902 [doi]
- Study on the Web Service Composition and Connection PatternsSang-Yong Byun. 903-910 [doi]
- A Study of Walking Motion for Game Character with a Player’s Emotional Factors AppliedHyunah Kang, Mijin Kim. 911-916 [doi]
- A Real Time Network Game System Based on Retransmission of N-based Game Command History for Revising Packet ErrorsSeong-Hoo Kim, Bong Joon Choi, Mi-Sook Jung, Kyoo Seok Park. 917-923 [doi]
- An Efficient Expression on Cartoon Rendering Scheme in Game CharactersJong Seo Kim, Kang-Soo You, Hoon-Sung Kwak. 924-928 [doi]