Abstract is missing.
- Getting in Touch with Your Feelings about Software ArchitectureRob Wojcik. 2-4 [doi]
- A Grid Scheduling Algorithm for Bag-of-Tasks Applications Using Multiple Queues with DuplicationYoung Choon Lee, Albert Y. Zomaya. 5-10 [doi]
- A VQ compression algorithm for a multiprocessor system with a global sort collective functionAkiyoshi Wakatani. 11-16 [doi]
- Model the MPI Performance for non-Contiguous DataThuy T. Le. 17-22 [doi]
- Optimized Algorithm for Computing Invariants of Ordinary Petri NetsChong-Fatt Law, Bah-Hwee Gwee, Joseph S. Chang. 23-28 [doi]
- Radiative Heat Transfer Simulation Using Programmable Graphics HardwareHiroyuki Takizawa, Noboru Yamada, Seigo Sakai, Hiroaki Kobayashi. 29-37 [doi]
- An Empirical Study to Investigate Software Estimation Trend in Organizations Targeting CMMI^SMMehwish Nasir, Hafiz Farooq Ahmad. 38-43 [doi]
- Decoupling Metrics for Services CompositionKai Qian, Jigang Liu, Frank Tsui. 44-47 [doi]
- Improving Accuracy of Multiple Regression Analysis for Effort Prediction ModelKazunori Iwata, Toyoshiro Nakashima, Yoshiyuki Anan, Naohiro Ishii. 48-55 [doi]
- An Approach to Analyzing the Windows and Linux Security ModelsXinyue Song, Michael Stinson, Roger Y. Lee, Paul B. Albee. 56-62 [doi]
- A Hierarchical Packet Scheduler for Differentiated Services in High-Speed NetworksChin-Chi Wu, Hsien-Ming Wu, Chiou Moh, Woei Lin. 63-68 [doi]
- Design of Customer-based AQM Routers to Achieve Fair Inter-server Bandwidth AllocationHsien-Ming Wu, Chin-Chi Wu, Woei Lin. 69-74 [doi]
- Reducing the Requirement in FEC Codes via Capillary RoutingEmin Gabrielyan, Roger D. Hersch. 75-82 [doi]
- Security Gateway for Accessing IPv6 WLANChih-Mou Shih, Shang-Juh Kao. 83-88 [doi]
- Topology Discovery for Coexisting IPv6 and IPv4 NetworksI-Ping Hsieh, Shang-Juh Kao. 89-95 [doi]
- A Distributed Topic Map Architecture for Enterprise Knowledge ManagementAxel Korthaus, Stefan Henke, Markus Aleksy, Martin Schader. 96-102 [doi]
- Using Dynamic Slicing to Analyze Change Impact on Role Type based Component Composition ModelTie Feng, Jonathan I. Maletic. 103-108 [doi]
- Mapping COSA Software Architecture Concepts into UML 2.0Tahar Khammaci, Adel Smeda, Mourad Oussalah. 109-114 [doi]
- Multi-Agent Testing Architecture for Monitoring and Analyzing the Performance of Web ApplicationsHuiming Yu, Jin Zhang, Jinsheng Xu. 115-120 [doi]
- Analyzing Security Interoperability during Component IntegrationEbenezer A. Oladimeji, Lawrence Chung. 121-129 [doi]
- Fault Tolerant Non-trivial Repeating Pattern Discovering for Music DataYu-lung Lo, Chun-Yu Chen. 130-135 [doi]
- A Study for Forecasting Water Supply Demand in the Area-K Waterworks Service AreaYukio Maruyama, Hisashi Yamamoto. 136-141 [doi]
- Incorporating Heterogeneous XML Formats Using Relational DatabaseSungchul Hong, Yeong-Tae Song. 142-147 [doi]
- Text Classification by Combining Grouping, LSA and kNNNaohiro Ishii, Tsuyoshi Murai, Takahiro Yamada, Yongguang Bao. 148-154 [doi]
- Enhanced Facilitated Application Specification Techniques (eFAST)Karim Dad, Atif Neuman Jamil. 155-159 [doi]
- Representing Security Goals, Policies, and ObjectsEbenezer A. Oladimeji, Sam Supakkul, Lawrence Chung. 160-167 [doi]
- Software Engineering for Pervasive Computing: An Outlook for Educational ReformGilda Pour. 168-173 [doi]
- A Study on the Application of Six Sigma Tools to PSP/TSP for Process ImprovementYoungkyu Park, Hyuncheol Park, Ho-Jin Choi, Jongmoon Baik. 174-179 [doi]
- TUG: An Executable Specification LanguageChia-Chu Chiang. 180-186 [doi]
- Measuring the Benefits of Summarizing Quantitative Information in Pervasive Computing SystemsFaraz Rasheed, Young-Koo Lee, Sungyoung Lee. 187-192 [doi]
- Mining Association Rules from Data with Missing Values by Database Partitioning and MergingTakahiko Shintani. 193-200 [doi]
- An Extended Cellular Automata Model for Data Mining of Land Development DataGongzhu Hu, Yichun Xie. 201-207 [doi]
- K-Interleaving Rendezvous Overlay Network Construction SchemeKhaled Ragab, Yoshihiro Oyama, Akinori Yonezawa. 208-213 [doi]
- Session Initiation Protocol (SIP) based Event Notification System Architecture for Telemedicine ApplicationsAnwar Sadat, Golam Sorwar, Morshed U. Chowdhury. 214-218 [doi]
- Hoarding and prefetching for mobile databasesMariano Cravo Teixeira Neto, Ana Carolina Salgado. 219-224 [doi]
- Enhancing the Horizons of Mobile Computing with Mobile Agent ComponentsGilda Pour, Nivedita Laad. 225-230 [doi]
- A Framework for Developing Wireless Mobile Online ApplicationsChong-Wei Xu. 231-237 [doi]
- A Method to Generate C# Code from MDA/PSM for Enterprise ArchitectureDeuk Kyu Kum, Soo Dong Kim. 238-243 [doi]
- Eliciting an Enhancive Maintenance Model in Three Organisations in GhanaMira Kajko-Mattsson, Michael Bosu. 244-251 [doi]
- Searching Pareto Solutions of Bi-objective NVP System Design Problem with Breadth First Search MethodHidemi Yamachi, Hisashi Yamamoto, Yasuhiro Tsujimura, Yasushi Kambayashi. 252-258 [doi]
- Project Automation: Case study on the NeOSS ProjectYong-kee Jeong, Jun-Suk Oh, Hyun-Min Lim. 259-264 [doi]
- Raising Local Density for Object Reconstruction using Auxiliary PointsBin Shyan Jong, Pai-Feng Lee, Juin-Ling Tseng. 265-270 [doi]
- On History-Sensitive Models of Interactive QueuesWalter Dosch, Wuttipong Ruanthong. 271-279 [doi]
- Application Services Based on Personal Data OntologyYu-Chen Chen, Shang-Juh Kao. 280-285 [doi]
- Content Validating the B2E Portal User Satisfaction InstrumentDewi Rooslani Tojib, Ly Fie Sugianto. 286-291 [doi]
- New Network Management System with Communication Control of the ClientKazuya Odagiri, Rihito Yaegashi, Masaharu Tadauchi, Naohiro Ishii. 292-298 [doi]
- A Web- and Problem-Based Learning System in Artificial IntelligenceVictor R. L. Shen, Tong-Ying Juang. 299-304 [doi]
- Enhancing Undergraduates' Capabilities of Practice and Innovation to Meet the Regional NeedsYanqin Zhu, Jiweni Yang, Qiaoming Zhu. 305-309 [doi]
- A New Approach to Persian/Arabic Text SteganographyMohammad Hassan Shirali-Shahreza, Mohammad Shirali-Shahreza. 310-315 [doi]
- Collage SteganographyMohammad Shirali-Shahreza, Sajad Shirali-Shahreza. 316-321 [doi]
- Fast Polygonal Approximation Based on Genetic AlgorithmsYao-Hong Tsai. 322-326 [doi]
- Image Features Extraction for Multimedia Database Content DescriptionShu-Sheng Hao. 327-332 [doi]
- Irregular Patch for Image SynthesisChangzhen Xiong, Jing Huang, Dongxu Qi, Jiancheng Zou. 333-337 [doi]
- Gradient Non-Linearity Correction of MR Images for Functional RadiosurgeryTom S. Lee, Keith E. Schubert, Reinhard W. Schulte. 338-344 [doi]
- A New Computer Architecture Using a New Program Driving MethodXiaobo Li, Xiangdong Cui, Xiaoqiang Ni, Chiyuan Ma, Jingfei Jiang, Huiping Zhou, Zhou Zhou, Ke Luo, Jiangsha Deng. 345-349 [doi]
- Analysis and Performance Results of a fluid dynamics Application on MASA Stream ProcessorMei Wen, Nan Wu 0003, Changqing Xun, Wei Wu, Chunyuan Zhang. 350-354 [doi]
- Efficient BISR Techniques for Word-Oriented Embedded Memories with Hierarchical RedundancyShyue-Kung Lu, Chun-Lin Yang, Han-Wen Lin. 355-360 [doi]
- Performance of PGA (Programmable Graph Architecture) for Matrix MultiplicationsMuling Peng, Sreekanth Ramani, K. Wendy Tang, A. Yavuz Oruç. 361-367 [doi]
- Program Analysis and Testing of Database ApplicationsSpyridon K. Gardikiotis, Nicos Malevris. 368-373 [doi]
- Towards Destructive Software TestingKiumi Akingbehin. 374-377 [doi]
- Enabling Multiple Conferences in Recordable Virtual CollaborationMeekyeong Kim, Chuleui Hong, Yeong-Tae Song. 378-382 [doi]
- Software Source Code CorrelationRobert Zeidman. 383-392 [doi]
- Writing Use-Case with a Minimal Set of WordsTakao Osaki, Atsushi Kobayashi, Takuo Kato. 393-398 [doi]
- Mapping between Temporal Scripts of Animation Component and SMIL Document using UML Sequence DiagramYan Ha, Roger Y. Lee. 399-404 [doi]
- Generating Java Skeletal Code with Design Contracts from Specifications in a Subset of Object ZSowmiya Ramkarthik, Cui Zhang. 405-411 [doi]
- Index Fund Optimization Using GA Based on Coefficients of DeterminationYukiko Orito, Jun Takano, Manabu Takeda, Hisashi Yamamoto. 412-417 [doi]
- Acoustic Pressure Minimization Using H2 ControlWen-Kung Tseng, Shun-Cheng Lien. 418-423 [doi]
- Adaptive Sampling via Histogram Equalization using an Active Walker ModelOladipo O. Fadiran, Péter Molnár, Lance M. Kaplan. 424-432 [doi]
- Information Relevance Management Model - A New Strategy in Information Security Management in the Outsourcing IndustryYulin Dai, Shiying Li 0001, Yi Luo 0001. 433-438 [doi]
- Research on the Intelligent Network Storage Platform for the Military Information SourceLianxing Jia, Zhifeng Chen, Chenhui Li, Dan Feng. 439-443 [doi]
- Improving the Usability of a Virtual Assembly Environment with the Integration of Multi-sensory FeedbackYing Zhang, Adrian R. L. Travis, Terrence Fernando, Hannan Xiao. 444-451 [doi]
- Behavior Coordination Mechanism for Intelligent HomeMinkyoung Kim, Hyun Kim. 452-457 [doi]
- Solving Distributed Mutual Exclusion using Cooperating Mobile AgentsF. Ahmad, Nicola Santoro, Amiya Nayak, Nishith Goel, Alok R. Patnaik, Alka Srivastava. 458-463 [doi]
- Towards successful automated negotiations based on Neural NetworksIoannis V. Papaioannou, Ioanna Roussaki, Miltiades E. Anagnostou. 464-472 [doi]
- Browser Compatible XLink ProcessingTseng-Chang Yen, Felix Hsu, Shang-Juh Kao. 473-478 [doi]
- Integration of QoS Queuing Schedules to QoS Caching SchemesYong Zhang, Wenying Feng, Richard T. Hurley. 479-484 [doi]
- Web-Based System for Electronic Navigational Charts Using GML and SVGSeung Chul Kam, Seong-Dae Lee, Hyu Chan Park, Xiaofang Zhou. 485-491 [doi]
- Modeling the Network of Loyalty-Profit Chain In Chemical IndustryCarl Lee, Tim Rey, Olga Tabolina, James Mentele, Tim Pletcher. 492-499 [doi]
- Empirical Validation of Test-Driven Pair Programming in Game DevelopmentShaochun Xu, Vaclav Rajlich. 500-505 [doi]
- Web-Based Intelligent Tutoring Systems in K-12 SettingsKausalai Kay Wijekumar, James Spielvogel. 506-510 [doi]