129 | -- | 146 | Kai-Di Chang, Chi-Yuan Chen, Jiann-Liang Chen, Han-Chieh Chao. Challenges to Next Generation Services in IP Multimedia Subsystem |
147 | -- | 162 | Kezhong Liu, Ji Xiong. A Fine-grained Localization Scheme Using A Mobile Beacon Node for Wireless Sensor Networks |
163 | -- | 176 | Anour F. A. Dafa-Alla, Ho-Sun Shon, Khalid E. K. Saeed, Minghao Piao, Unil Yun, Kyung Joo Cheoi, Keun Ho Ryu. IMTAR: Incremental Mining of General Temporal Association Rules |
177 | -- | 184 | Lukman Sharif, Munir Ahmed. The Wormhole Routing Attack in Wireless Sensor Networks (WSN) |
185 | -- | 196 | Seong-Hee Bae, Jaejoon Kim. Development of Personal Information Protection Model using a Mobile Agent |
197 | -- | 208 | Pin Ng, Richard Y. K. Fung, Ray W. M. Kong. Incremental Model-based Test Suite Reduction with Formal Concept Analysis |
209 | -- | 218 | Sang Hyun Lee, Sung-Eui Cho, Kyung-li Moon. Fast Fuzzy Control of Warranty Claims System |
219 | -- | 234 | Beatriz Neto, Lúcia Abrunhosa Fernandes, Claudia Werner, Jano Moreira de Souza. Developing Digital Games through Software Reuse |
235 | -- | 252 | Ruchika Malhotra, Arvinder Kaur, Yogesh Singh. A Regression Test Selection and Prioritization Technique |
253 | -- | 260 | Ui-Jin Jang, Hyung-Min Lim, Yong-Tae Shin. A License Audit Model for Secure DRM Systems in IP-based Environments |
261 | -- | 268 | Gyeong-Sic Jo, Yong-Guk Kim. Recognition of Human Facial Expression in a Video Image using the Active Appearance Model |