Abstract is missing.
- Software Architectures for Task-Oriented ComputingDavid Garlan. 3 [doi]
- Issues and Models of Security Oriented SystemsC. V. Ramamoorthy. 4 [doi]
- A Rate Control Protocol for High Speed Streaming VideoXiaogang Yang, Baosong Shan, Yaping Yang. 7-12 [doi]
- Collaboration between Security Devices toward improving Network DefenseSourour Meharouech, Adel Bouhoula, Tarek Abbes. 13-18 [doi]
- Trust Mechanism in Distributed Access Control Model of P2P NetworksLei Wang, Yanqin Zhu, Lanfang Jin, Xizhao Luo. 19-24 [doi]
- Convergence Analysis of Jacobi Iterative Method Using Logarithmic Number SystemPeng Huang, Daniel H. Y. Teng, Khan Wahid, Seok-Bum Ko. 27-32 [doi]
- Effective RTL Method to Develop On-Line Self-Test Routine for the Processors Using the Wavelet TransformAmin Asghari, Seied Ahmad Motamedi, Sepehr Attarchi. 33-38 [doi]
- Comparison between New Quantum Approaches for Finding the Minimum or the Maximum of an Unsorted Set of IntegersMir Shahriar Emami, Mohammad Reza Fattahi, Hossein Keshmiri. 41-46 [doi]
- Evaluation on Quantum Computation and Classic Parallel Approaches for Finding Estimation of the Length of Shortest Path in a Weighted GraphMir Shahriar Emami, Mohammad Reza Fattahi, Hossein Keshmiri. 47-54 [doi]
- A Real-Time Interactive Visualization System for DNS Amplification Attack ChallengesHuiming Yu, Xiangfeng Dai, Thomas Baxley, Jinsheng Xu. 55-60 [doi]
- Radix Plus Length Based Insert SortYongcheng Zhang. 61-66 [doi]
- An Integer Linear Programming Approach for Dedicated Machine ConstraintHuy Nguyen Anh Pham, Arthur M. D. Shr, Peter P. Chen. 69-74 [doi]
- Efficient Complex Event Processing over RFID Data StreamXingyi Jin, Xiaodong Lee, Ning Kong, Baoping Yan. 75-81 [doi]
- Tabu Search Solution for Fuzzy Linear ProgrammingM. Hadi Mashinchi, M. Reza Mashinchi, M. Mashinchi. 82-87 [doi]
- Temperature Control for the Thermal Cycling of Polymerase Chain ReactionJinhe Wang, Nan Zhang. 88-92 [doi]
- A Parallel Algorithm for Closed Cube ComputationJinguo You, Jianqing Xi, Pingjian Zhang, Hu Chen. 95-99 [doi]
- An Efficient Structural Index for Graph-Structured DataYingjie Fan, Chenghong Zhang, Shuyun Wang, Xiulan Hao, Yunfa Hu. 100-106 [doi]
- (t, lambda)-Uniqueness: Anonymity Management for Data PublicationQiong Wei, Yansheng Lu, Qiang Lou. 107-112 [doi]
- Autonomic Computing in SQL ServerAbdul Mateen, Basit Raza, Tauqeer Hussain, Mian M. Awais. 113-118 [doi]
- Cross-Channel Customer MappingJayanta Basak, Sunil Goyal. 119-126 [doi]
- DBPowder-mdl: Mapping Description Language between Applications and DatabasesTadashi Murakami. 127-132 [doi]
- Dimensionality Reduction in Hyperbolic Data Spaces: Bounding Reconstructed-Information LossDuc A. Tran, Khanh Vu. 133-139 [doi]
- Entropy Based Clustering of Data Streams with Mixed Numeric and Categorical ValuesShuyun Wang, Yingjie Fan, Chenghong Zhang, Hexiang Xu, Xiulan Hao, Yunfa Hu. 140-145 [doi]
- Information Analysis for Enabling Optimal Utilization of Service Delivery Channels in Indian BanksHemalatha Diwakar, Alka Vaidya. 146-151 [doi]
- Privacy-Preserving Data Publishing Based on De-clusteringQiong Wei, Yansheng Lu, Qiang Lou. 152-157 [doi]
- Schema Versioning in Multi-temporal XML DatabasesZouhaier Brahmia, Rafik Bouaziz. 158-164 [doi]
- Subspace Clustering of High Dimensional Data StreamsShuyun Wang, Yingjie Fan, Chenghong Zhang, Hexiang Xu, Xiulan Hao, Yunfa Hu. 165-170 [doi]
- Synchronizer - A Web-Based Application to Enhance Capabilities of NEESCentral Web PortalThuy T. Le, Syeda Naema Hashmi, Kurt McMullin. 171-176 [doi]
- A Fast and Accurate Iris Recognition Method Using the Complex Inversion Map and 2DPCASepehr Attarchi, Karim Faez, Amin Asghari. 179-184 [doi]
- A Novel Image Text Extraction Method Based on K-Means ClusteringYan Song, Anan Liu, Lin Pang, Shouxun Lin, Yongdong Zhang, Sheng Tang. 185-190 [doi]
- Attention Model Based SIFT Keypoints Filtration for Image RetrievalKe Gao, Shouxun Lin, Yongdong Zhang, Sheng Tang, Huamin Ren. 191-196 [doi]
- Content-Based Classifying Traditional Chinese Calligraphic ImagesZhong Gao, Guanming Lu, Daquan Gu, Chun He. 197-201 [doi]
- Region-Based Image Fusion Approach Using Iterative AlgorithmYingjie Zhang, Liling Ge. 202-207 [doi]
- Three Dimensional Face Recognition Using SVM ClassifierMir Hashem Mousavi, Karim Faez, Amin Asghari. 208-213 [doi]
- A Novel Detection Method of Filled Pause in Mandarin Spontaneous SpeechYanxiong Li, Qianhua He, Tao Li. 217-222 [doi]
- Research of English-Chinese Alignment at Word Granularity on Parallel CorporaYang Xu, Houfeng Wang, Xue-qiang Lü. 223-228 [doi]
- Objective Types for the Valuation of Secure Business ProcessesThomas Neubauer, Johannes Heurix. 231-236 [doi]
- On-Line Network Reachability Analysis Using Forward Information Base EmulationYoung Dae Kim, Chan Kyou Hwang, Jae-Hyoung Yoo. 237-240 [doi]
- Secure E-cheques for Joint Accounts with Collective Signing Using Forward-Secure Multi-signature SchemeN. R. Sunitha, B. B. Amberker, Prashant Koulgi. 241-246 [doi]
- Verification of Unstructured Workflows via Propositional LogicQianhui Althea Liang, J. Leon Zhao. 247-252 [doi]
- Agent Based Architecture for Secure Access from Multiple HospitalsSun K. Yoo, Jun Choe, Do Yoon Kim. 255-258 [doi]
- P2P Distributed Intrusion Detections by Using Mobile AgentsDayong Ye, Quan Bai, Minjie Zhang, Zhen Ye. 259-265 [doi]
- An Adaptive Index of XML for Frequent Branching Path QueriesYingjie Fan, Chenghong Zhang, Shuyun Wang, Xiulan Hao, Yunfa Hu. 269-275 [doi]
- Email Categorization Using (2+1)-Tier Classification AlgorithmsMd. Rafiqul Islam, Wanlei Zhou, Morshed U. Chowdhury. 276-281 [doi]
- Identity-Based Conference Key Distribution Scheme Using Sealed LockYongquan Cai, Xiuying Li. 282-286 [doi]
- SIMPA: A SIP-Based Mobile Payment ArchitectureGe Zhang, Feng Cheng 0002, Christoph Meinel. 287-292 [doi]
- A Document Clustering Method Based on One-Dimensional SOMYan Yu, Pilian He, Yushan Bai, Zhenlei Yang. 295-300 [doi]
- A Genetic Algorithm for Finding Minimal Multi-homogeneous Bézout NumberDongshu Yan, Jintao Zhang, Bo Yu, Changtong Luo, Shaoliang Zhang. 301-305 [doi]
- An Effective Data Classification Algorithm Based on the Decision Table GridHongjie Liu, Boqin Feng, Jianjie Wei. 306-311 [doi]
- An Extensive Empirical Study of Feature Selection for Text CategorizationLi-Qing Qiu, Ru-Yi Zhao, Gang Zhou, Sheng-Wei Yi. 312-315 [doi]
- An Improved Condensing AlgorithmXiulan Hao, Chenghong Zhang, Hexiang Xu, Xiaopeng Tao, Shuyun Wang, Yunfa Hu. 316-321 [doi]
- Efficient Projection for Compressed SensingVo Dinh Minh Nhat, Duc Vo, Subhash Challa, Sungyoung Lee. 322-327 [doi]
- Ensemble Methods for Ontology Learning - An Empirical Experiment to Evaluate Combinations of Concept Acquisition TechniquesRicardo Gacitua, Peter Sawyer. 328-333 [doi]
- Low Dimensional Reproduction Strategy for Real-Coded Evolutionary AlgorithmsChangtong Luo, Shaoliang Zhang, Bo Yu. 334-339 [doi]
- Machine Learning Approach for Ontology Mapping Using Multiple Concept Similarity MeasuresRyutaro Ichise. 340-346 [doi]
- Optimizing Text Summarization Based on Fuzzy LogicFarshad Kyoomarsi, Hamid Khosravi, Esfandiar Eslami, Pooya Khosravyan Dehkordy, Asghar Tajoddin. 347-352 [doi]
- A Solution Framework on Fundamentals in Model TransformationYucong Duan, Kyo Chul Kang, Yuqing Gu. 355-360 [doi]
- EESM for IEEE 802.16e: WiMaXShahid Mumtaz, Atílio Gameiro, Jonathan Rodriguez. 361-366 [doi]
- Lessons Learned from Implementing WS-Coordination and WS-AtomicTransactionIvan Silva Neto, Francisco Reverbel. 367-372 [doi]
- Observations on Liner Prediction Based Blind Source Extraction AlgorithmsMin Gan, Hongfa Wang, Guoying Yue, Nan Xie, Haibo Zhang. 373-376 [doi]
- Research and Application of Information Granulation Based on Extension MethodMinghui Wang, Yongquan Yu, Bi Zeng. 377-381 [doi]
- Sensor Data Collection of the Single Location Surveillance Point SystemTomi Räty, Johannes Oikarinen, Mikko Nieminen, M. Lindholm. 382-387 [doi]
- A Novel Enterprise Mobile E-mail System Using the SyncML ProtocolJing Xie, Dan Yu, Shilong Ma. 391-396 [doi]
- Design and Implementation of Wireless Sensor Network for Ubiquitous Glass HousesMeong-hun Lee, Ki-bok Eom, Hyun-joong Kang, Chang-Sun Shin, Hyun Yoe. 397-400 [doi]
- Distributed Detection in Wireless Sensor NetworksSheng-Tzong Cheng, Szu-Yun Li, Chia-Mei Chen. 401-406 [doi]
- An Empirical Analysis of Intel Thread Checker for Detecting Races in OpenMP ProgramsYoung-Joo Kim, Daeyoung Kim, Yong-Kee Jun. 409-414 [doi]
- Execution Time Analysis of a Parallel Steiner Tree Algorithm on Server-Client Model of ComputationRashid Bin Muhammad. 415-420 [doi]
- Exponential Integral Methods for Burgers EquationJing-jun Zhao, Shu-xin Bao, Yu Li. 421-426 [doi]
- Finite-State Modeling and Testing of Image Based Authentication SystemNitin, Durg Singh Chauhan, Vivek Kumar Sehgal, Ankit Mahanot, Pallavi Singh, Sohit Ahuja, Utkarsh Shrivastava, Manisha Rana, Vineet Punjabi, Shivam Vinay, Nakul Sharma. 427-432 [doi]
- Gauging the OpenSourceMark Benchmark in Measuring CPU PerformanceFadi N. Sibai. 433-438 [doi]
- Parallel Sorting on the Biswapped NetworkWenhong Wei, Wenjun Xiao, Zhen Zhang. 439-443 [doi]
- Predicate Detection Modality and Semantics in Three Partially Synchronous ModelsChunbo Chu, Monica Brockmeyer. 444-450 [doi]
- Control Network Programming Illustrated: Solving Problems with Inherent Graph-Like RepresentationKostadin Kratchanov, Emilia Golemanova, Tzanko Golemanov. 453-459 [doi]
- An Effort-Based Approach to Measure Completeness of an Entity-Relationship ModelTauqeer Hussain, Mian M. Awais. 463-468 [doi]
- A Value-Added Predictive Defect Type Distribution Model Based on Project CharacteristicsYoungki Hong, Jongmoon Baik, In-Young Ko, Ho-Jin Choi. 469-474 [doi]
- Monitoring Software Projects with Earned Value Analysis and Use Case PointJinhua Li, Zhibing Ma, Huanzhen Dong. 475-480 [doi]
- A Mechanical Approach for Deriving Algorithmic ProgramsHaihe Shi, Jinyun Xue, Dawei Du. 483-487 [doi]
- Engineering Education - A Great Challenge to Software EngineeringJaroslav Král, Michal Zemlicka. 488-495 [doi]
- Generating Algorithms plus Loop Invariants by Formal DerivationHaihe Shi, Dawei Du, Jinyun Xue. 496-501 [doi]
- Manual Specific Testing and Quality Evaluation for Embedded SoftwareSeon-Jae Jang, Hae Geun Kim, Youn-Ky Chung. 502-507 [doi]
- Mobile GUI Testing Tool based on Image FlowOh-Hyun Kwon, Sun-Myung Hwang. 508-512 [doi]
- On the Precision and Accuracy of Impact Analysis TechniquesLile Hattori, Dalton Serey Guerrero, Jorge C. A. de Figueiredo, João Brunet, Jemerson Damásio. 513-518 [doi]
- Quantitative Process Improvement in XP Using Six Sigma ToolsSajid Ibrahim Hashmi, Jongmoon Baik. 519-524 [doi]
- Static Analysis of the Disassembly against Malicious Code Obfuscated with Conditional JumpsChao Dai, Jianmin Pang, Rongcai Zhao, Xiaojun Ma. 525-530 [doi]
- Two-Dimensional Framework for Analyzing Variabilities in Software Product LinesMikyeong Moon, Heung Seok Chae, Junseok Park, Keunhyuk Yeom. 531-536 [doi]
- Reconstructing Control Flow in Modulo Scheduled LoopsMiao Wang, Rongcai Zhao, Jianmin Pang, Guoming Cai. 539-544 [doi]
- Recovering Variable-Argument Functions from Binary ExecutablesWen Fu, Rongcai Zhao, Jianmin Pang, Jingbo Zhang. 545-550 [doi]
- A New Operational Framework for Benchmarking the SAN ProductsPrabu Dorairaj, Devi Prasad Bhukya, Lakshminarayana Prasad Kantam, Kishor Arumilli. 553-560 [doi]
- A Strategic Test Process Improvement Approach Using an Ontological Description for MND-TMMHoyeon Ryu, Dong-Kuk Ryu, Jongmoon Baik. 561-566 [doi]
- Enhancing Data Flow Testing of Classes through Design by ContractYogesh Singh, Anju Saha. 567-574 [doi]
- Security Analysis and Implementation of JUIT—Image Based Authentication System Using Kerberos ProtocolNitin, Durg Singh Chauhan, Vivek Kumar Sehgal, Ankit Mahanot, Pallavi Singh, Sohit Ahuja, Utkarsh Shrivastava, Manisha Rana, Vineet Punjabi, Shivam Vinay, Nakul Sharma. 575-580 [doi]
- The Utilization of User Sessions in TestingIzzat Mahmoud Alsmadi. 581-585 [doi]
- Queuing Network Performance Model for Evaluation of CMP-Based VoIP SPSJiuzhen Jin, Jianmin Pang, Zheng Shan, Rongcai Zhao. 589-594 [doi]
- Relevance-Feedback Image Retrieval Based on Multiple-Instance LearningDuc A. Tran, S. R. Pamidimukkala, Phuong Nguyen. 597-602 [doi]
- An Efficient Approach for QoS-Aware Service Selection Based on a Tree-Based AlgorithmMinhyuk Oh, Jongmoon Baik, Sungwon Kang, Ho-Jin Choi. 605-610 [doi]
- Coordination Behavioral Structure: A Web Services Coordination Model in Dynamic EnvironmentYongwang Zhao, Dianfu Ma, Min Liu, Chunyang Hu. 611-617 [doi]
- Designing Fault Tolerant Web Services Using BPELJim Lau, Lau Cheuk Lung, Joni da Silva Fraga, Giuliana Santos Veronese. 618-623 [doi]
- Verification for Time Consistency of Web Service FlowRujuan Liu, Changjun Hu, Chongchong Zhao, Zhong Gao. 624-629 [doi]
- On the Dynamic Ant Colony Algorithm Optimization Based on Multi-pheromonesYa-mei Xia, Jun-liang Chen, Xiang-wu Meng. 630-635 [doi]
- A New Negotiation Mechanism for Agent-Based Lecture Allocation SystemsYoshihito Saito, Takayuki Fujimoto, Tokuro Matsuo. 639-644 [doi]
- RDF-Based Approach to Data Transform CompositionJungmin Shin, Joachim Hammer, Herman Lam. 645-648 [doi]
- Building a Service-Oriented Ontology for Wireless Sensor NetworksJeong Hee Kim, Hoon Kwon, Do-Hyeon Kim, Ho-Young Kwak, Sang Joon Lee. 649-654 [doi]
- Research Process Support with Organizational Flow in e-ScienceDukyun Nam, June Hawk Lee, Soonwook Hwang, Young-Kyoon Suh, Byungsang Kim. 655-660 [doi]
- A Design on Collaborative-Cooperative Document Edit System Based on Cognitive AnalysesTakayuki Fujimoto, Muhammad Dzulqarnain bin Muhammad Nasir, Tokuro Matsuo. 661-666 [doi]
- A New Approach on Interactive SOA Security Model Based on AutomataHamidreza Amouzegar, Shahriar Mohammadi, Mohammad Jafar Tarokh, Anahita Naghilouye Hidaji. 667-671 [doi]
- Mobile Mapping Service Using Scalable Vector Graphics on the Human GeographicJin-Suk Kang, Yonghee You, Mee Young Sung, Taikyeong T. Jeong, Jongan Park. 672-677 [doi]
- Analysis of E-bank Innovation in China Using a Hypercube ModelHaibo Zhu, Ying Zou. 678-683 [doi]
- Developing Accessible Applications with User-Centered ArchitectureSabina Jeschke, Helmut Vieritz, Olivier Pfeiffer. 684-689 [doi]
- Web Page Dependent Vision Based Segementation for Web SitesPyungkwan Ko, Sanggil Kang, Harshit Kumar. 690-694 [doi]
- Robust RoutingHimanshu Agrawal, Andrew Jennings, Mark Gregory, Daud Channa. 695-700 [doi]