3269 | -- | 3299 | Csilla Farkas, Alexander Brodsky, Sushil Jajodia. Unauthorized inferences in semistructured databases |
3300 | -- | 3331 | Jongik Kim. Advanced structural joins using element distribution |
3332 | -- | 3346 | Jianxi Fan, Xiaohua Jia, Xiaola Lin. Complete path embeddings in crossed cubes |
3347 | -- | 3378 | Jin-Wook Baek, Heon Young Yeom. A timed mobile agent planning approach for distributed information retrieval in dynamic network environments |
3379 | -- | 3392 | Lei Qian, H. John Caulfield. What can we do with a linear optical logic gate? |
3393 | -- | 3408 | Chin-Chen Chang, Chih-Yang Lin, Yu-Zheng Wang. New image steganographic methods using run-length approach |
3409 | -- | 3425 | Nen-Chung Wang, Tzung-Shi Chen. Task migration in all-port wormhole-routed 2D mesh multicomputers |
3426 | -- | 3430 | Chien-Yuan Chen. An efficient parity detection technique using the two-moduli set {2:::::::h::::::: - 1, 2:::::::h::::::: + 1} |