Abstract is missing.
- A Metric-Based Multi-Agent System for Software Project ManagementChing-Seh Wu, Wei-Chun Chang, Ishwar K. Sethi. 3-8 [doi]
- A Research of Cognitive Models for CGF in Tank MemberQing Xue, Yang Wei, Zhiwu Tang, Guohui Zhang. 9-14 [doi]
- Distributed Feedback Mechanism for Just-In-Time Scheduling ProblemWei Weng, Shigeru Fujimura. 15-20 [doi]
- Modeling Instability in a New Framework of Interval Valued Process AlgebraJie Zhou, Yixiang Chen. 21-26 [doi]
- A Heuristic Address Assignment Algorithm Based on Probability in a NetworkShu Wang, Changjia Chen. 29-33 [doi]
- A Method for Dynamic Software Updating in Real-Time SystemsHabib Seifzadeh, Ali Asghar Pourhaji Kazem, Mehdi Kargahi, Ali Movaghar-Rahimabadi. 34-38 [doi]
- A Multi-variable Algorithm for Placing Phi-nodesHongtu Ma, Rongcai Zhao, Ling Liang, Xun Li. 39-43 [doi]
- Searching Algorithm with Granularity Changing and the GNSS Integer Ambiguity EstimationXiaoping Chen, Rongle Kang. 44-47 [doi]
- Analysis and Design of an Improved R-learningWei Chen, Zhenkun Zhai, Xiong Li, Jing Guo. 48-52 [doi]
- Improving and Extending SMR Technique for Solving Monotonic ProblemsAtieh Mirshahvalad, Majid Noorhosseini. 59-64 [doi]
- Maximizing the Accrued Utility of an Isochronal Soft Real-Time System Using Genetic AlgorithmsAli Asghar Pourhaji Kazem, Habib Seifzadeh, Mehdi Kargahi, Ali Movaghar-Rahimabadi, Shahriar Lotfi. 65-69 [doi]
- Multi-objective Optimization of Power Control and Resource Allocation for Cognitive Wireless NetworksYujun Bao, Hong Jiang, Yu Qing Huang, Rongchun Hu. 70-74 [doi]
- A Novel Parameter Learning Algorithm for a Self-constructing Fuzzy Neural Network DesignYuan Yao, Kailong Zhang, Xinshe Zhou. 77-81 [doi]
- Adaptative Instructional Planning Using Workflow and Genetic AlgorithmsRobson da Silva Lopes, Márcia Aparecida Fernandes. 87-92 [doi]
- On Color Texture Generating Based on Simplified KIII ModelChen Jian-zhou, Zhang Jin, Fang Chen, Zhao Li-juan, Hans Liljenström. 93-96 [doi]
- Optimal Design of Cognitive Radio Wireless Parameters based on Non-dominated Neighbor Distribution Genetic AlgorithmJinghui Ma, Hong Jiang, Yongchun Hu, Yujun Bao. 97-101 [doi]
- Research of Knowledge-based Automatic Model Selection StrategyYanghe Feng, Chaofan Dai. 102-106 [doi]
- Solving Global Unconstrained Optimization Problems by Symmetry-BreakingXiaohui Ji, Feifei Ma, Jian Zhang. 107-111 [doi]
- A Novel Approach Based on PCNNs Template for Fingerprint Image ThinningDacheng Xu, Bailiang Li, Anton Nijholt. 115-119 [doi]
- A Parallel Algorithm for Computer Simulation of Electrocardiogram Based on MPIWenfeng Shen, Weijia Lu, Daming Wei, Weimin Xu, Xin Zhu, Shizhong Yuan. 120-123 [doi]
- Entropy-based Criteria Dealing with the Ties Problem in Gene SelectionFeng Yang, K. Z. Mao. 124-129 [doi]
- Exploring the Spatial Distribution of Bird Habitat with Cluster AnalysisMingJie Tang, Yuanchun Zhou, Peng Cui, Haiting Zhang, Liang Hu, YuanSheng Hou, Baoping Yan. 130-135 [doi]
- Parallelizing the Protein Threading Problem in a Hybrid Peer-to-Peer Based High Performance Computing PlatformFei Luo, Lin Chen. 136-141 [doi]
- Protein Secondary Structure Prediction Using Large Margin MethodsBuzhou Tang, Xuan Wang, Xiaolong Wang. 142-146 [doi]
- A Max-plus Network CalculusBaohua Fan, Heying Zhang, Wenhua Dou. 149-154 [doi]
- A New Suggestion for Data ClusteringSunil Bhooshan, Vinay Kumar, Gaurav Gayawar, Sah Geetansh Krishna, Kapil Sachdeva. 155-160 [doi]
- A Novel NAT Traversal Mechanism in the Heterogeneous EnvironmentBo Wang, Xiangmin Wen, Sun Yong, Zhen Wei. 161-165 [doi]
- An Efficient Search Algorithm for REIK Overlay NetworkJingjing Song, Jiguo Yu, Zhaojun Xiang. 166-170 [doi]
- Application of Security Ontology to Context-Aware Alert AnalysisHui Xu, Debao Xiao, Zheng Wu. 171-176 [doi]
- Detection Probability Analysis of Cooperative Spectrum Sensing in Rayleigh Fading ChannelsJia Zhu, Baoyu Zheng. 177-182 [doi]
- Fast Reroute upon Multi-homed Domains Link FailuresHailong Ma, Yunfei Guo, Jianwei Zhang. 183-187 [doi]
- HPRP: Hierarchical Probabilistic Routing Protocol for Wireless Mesh NetworkRui Zhang 0013. 188-193 [doi]
- Improved DCCP Congestion Control for Wireless Sensor NetworksLiu Yong-Min, Jiang Xin-hua, Nian Xiao-Hong, Lu Wu-Yi. 194-198 [doi]
- Model-Driven Dependability Analysis of Virtualization SystemsXu Zhang, Chuang Lin, Xiangzhen Kong. 199-204 [doi]
- Modeling of Hybrid-service in Broadband Wireless Communication SystemXiaowei Qin, Leixin Mai, Xuchu Dai. 205-209 [doi]
- New Smith Predictor and FRBF Neural Network Control for Networked Control SystemsWencai Du, Feng Du. 210-215 [doi]
- Performance Analysis of Cognitive Radio Networks against Secondary User s PoliciesMin Zhang, Shengming Jiang, Gang Wei, Hongjiang Wang. 216-221 [doi]
- Performance Analysis of IEEE 802.11 DCF in Multi-hop Ad Hoc NetworksLiying Xie, Gang Wei, Hongjiang Wang, Zaijin Xie. 222-227 [doi]
- Polynomial Time Construction Algorithm of BCNC for Network Coding in Cyclic NetworksJiaqing Huang, Liang Wang, Wenqing Cheng, Hui Li. 228-233 [doi]
- Quality of Protection with Performance Analysis in IP Multimedia SubsystemKai Wang, Chuang Lin, Fangqin Liu. 234-239 [doi]
- Research on Optimizing Embedding Space Dimension in Network Coordinate SystemChang-you Xing, Ming Chen. 240-245 [doi]
- A Fault Tolerant Bufferless Optical Interconnection NetworkQi Xingyun, Feng Quanyou, Chen Yongran, Dou Qiang, Dou Wenhua. 249-254 [doi]
- A New Adaptive Flow Control for Mesh-based Network-on-Chip (NoC)Minghua Tang, Xiaola Lin. 255-260 [doi]
- Efficient Approximate Algorithm for Hardware/Software PartitioningWu Jigang, Ting Lei, Thambipillai Srikanthan. 261-265 [doi]
- Efficient Heuristic Algorithm for Rapid Custom-Instruction SelectionTao Li, Wu Jigang, Siew Kei Lam, Thambipillai Srikanthan, Xicheng Lu. 266-270 [doi]
- Floating-point to Fixed-point Transformation Using Extreme Value TheoryLinsheng Zhang, Yan Zhang, Wenbiao Zhou. 271-276 [doi]
- Transaction Level Modeling for Early Verification on Embedded System DesignMaman Abdurohman, Kuspriyanto K., Sarwono Sutikno, Arif Sasongko. 277-282 [doi]
- A New Anomaly Detection Method Based on Rough Set Reduction and HMMFanping Zeng, Kaitao Yin, Minghui Chen, Xufa Wang. 285-289 [doi]
- High-Availability Decentralized Multi-Agent Key Recovery SystemKanokwan Kanyamee, Chanboon Sathitwiriyawong. 290-294 [doi]
- Lightweight Public Key Infrastructure and Service Relation Model for Designing a Trustworthy ONSJing Sun, Huiqun Zhao, Huibing Xiao, Gongzhu Hu. 295-300 [doi]
- Object-oriented Case Representation and Its Application in IDSQian Quan, Zhang Rui, Che Hong-Yi. 301-306 [doi]
- Security Enhancing Compiler for Localization Schemes in Pervasive Sensor NetworksJi Young Chun, Yong Ho Kim, Jung Yeon Hwang, Dong-Hoon Lee. 307-312 [doi]
- Strongly Unforgeable Signature Scheme without One-Time KeyWatcharee Tantikittipisut, Nol Premasathian. 313-316 [doi]
- Transmission Performance Simulation of Broadcast Encryption Schemes with Pay-TV System Implementation ConsiderationYichun Zhang, Jinliang Wan. 317-322 [doi]
- Users Behavior Character Analysis and Classification Approaches in Enterprise NetworksTao Qin, Xiaohong Guan, Yi Long, Wei Li. 323-328 [doi]
- An Efficient Algorithm to Mine Unordered TreesYun Li, Xin Guo, Yunhao Yuan, Jia Wu, Ling Chen. 331-336 [doi]
- A General Framework: Combining Statistical Models and Network Structure for Deep Content MiningChengli Zhao, Xue Zhang, Dongyun Yi. 337-341 [doi]
- Application of Gray Level Variation Statistic in Gastroscopic Image RetrievalChengyu Wu, Xiaoying Tai. 342-346 [doi]
- Challenges for Sentence Level Opinion Detection in BlogsMalik Muhammad Saad Missen, Mohand Boughanem, Guillaume Cabanac. 347-351 [doi]
- Extracting Relations from Chinese Web Documents Using Kernel MethodsJing Qiu, Lejian Liao. 352-356 [doi]
- Feature Selection Algorithm Based on Association Rules Mining MethodJianwen Xie, Jianhua Wu, Qingquan Qian. 357-362 [doi]
- Feature-Based Data Stream ClusteringMohsen Jafari Asbagh, Hassan Abolhassani. 363-368 [doi]
- Hidden Topic Analysis Based Formal Framework for Finding Experts in Metadata CorpusHao Wu, Yijian Pei, Jiang Yu. 369-374 [doi]
- Identifying Structures with Informative Dimensions in StreamsVasudha Bhatnagar, Sharanjit Kaur, Neelima Gupta. 375-382 [doi]
- Incremental Naïve Bayesian Spam Mail Filtering and Variant Incremental TrainingPhimphaka Taninpong, Sudsanguan Ngamsuriyaroj. 383-387 [doi]
- Integrating Search and Sharing: User-Centric Collaborative Information SeekingRoman Y. Shtykh, Qun Jin. 388-393 [doi]
- MVGL Analyser for Multi-classifier Based Spam Filtering SystemMd. Rafiqul Islam, Wanlei Zhou, Morshed U. Chowdhury. 394-399 [doi]
- PLSA-Based Query ExpansionLi Wei-jiang, Zhao Tie-jun, Zang Wen-mao. 400-405 [doi]
- Radius-Distance Based Semi-Supervised AlgorithmZheng-Hua Qi, Geng Yang, Xun-Yi Ren. 406-410 [doi]
- Study on Hydrology Time Series Prediction Based on Wavelet-neural NetworksZhu Yuelong, Qian Jihong, Fan Qingsong, Wan Dingsheng, Li Shijin. 411-415 [doi]
- Temporal Pattern Recognition in Video Clips DetectionAihua Zheng, Jixin Ma, Bin Luo, Miltos Petridis, Sulan Zhai, Jin Tang. 416-421 [doi]
- Using Hoarding to Increase Availability in Shared File SystemsJochen Hollmann, Per Stenström. 422-429 [doi]
- Weight Balanced Linear Programming SVM on Skewed Distribution and its EvaluationYuxiang Mao, Daming Wei. 430-435 [doi]
- Autonomic Success in Database Management SystemsBasit Raza, Abdul Mateen, Tauqeer Hussain, Mian M. Awais. 439-444 [doi]
- Autonomicity in Universal Database DB2Abdul Mateen, Basit Raza, Tauqeer Hussain, Mian M. Awais. 445-450 [doi]
- Cluster Based Partition for Multi-dimensional Range Query in DAS ModelJieping Wang, Xiaoyong Du. 451-456 [doi]
- Efficient Processing of XML Twig Queries with All PredicatesXiaoshuang Xu, Yucai Feng, Feng Wang. 457-462 [doi]
- Exhaustive Greedy Algorithm for Optimizing Intermediate Result Sizes of Join QueriesAreerat Trongratsameethong, Jarernsri L. Mitrpanont. 463-468 [doi]
- On the Soundness Property for SQL Queries of Fine-grained Access Control in DBMSsJie Shi, Hong Zhu, Ge Fu, Tao Jiang. 469-474 [doi]
- Querying Heterogeneous Relational Database using SPARQLJinpeng Wang, Zhuang Miao, Yafei Zhang, Bo Zhou. 475-480 [doi]
- A Model-Driven Approach for Generating Business Processes and Process Interaction SemanticsChenting Zhao, Zhenhua Duan, Man Zhang. 483-488 [doi]
- A Novel Fault-tolerant Particle Swarm Optimization Scheduler for Scheduling Independent Task in Grid Computing EnvironmentMehdi Nikkhah, Mohammad Hosein Yektaie, Amir Masoud Rahmani, Mohammad Nikkhah. 489-493 [doi]
- A Novel Trust Model Based on Bayesian Network for Service-Oriented GridChangsong Ding, Yi Fu, Zhigang Hu, Peng Xiao. 494-499 [doi]
- Algorithms for Scheduling Distributed Tasks of Ordered Communication on a Realistic Model of Heterogeneous GridsCho-chin Lin, Chih-Hsuan Hsu. 500-505 [doi]
- Enabling Grid Interoperability by Extending HPC-driven Job Management with an Open Standard Information ModelM. Shahbaz Memon, Morris Riedel, A. Shiraz Memon, Achim Streit, Felix Wolf. 506-511 [doi]
- Scientific Workflow Model for Provenance Analysis Based on Many-sorted High-Level NetsNing Li, Jinqiang Hu. 512-515 [doi]
- Triplet Based Multi-core Interconnection Network and its Computational EfficiencyHaroon-Ur-Rashid Khan, Shi Feng, Ji Weixing. 516-521 [doi]
- Bayesian Inference on QGARCH Model Using the Adaptive Construction SchemeTetsuya Takaishi. 525-529 [doi]
- Comparing the Feature Selection Using the Distributed Non-overlap Area Measurement Method with Principal Component AnalysisSang-Hong Lee, Dong-Kun Shin, Zhen-Xing Zhang, Joon S. Lim. 530-534 [doi]
- ERP Systems Development: Enhancing Organization s Strategic Control through Monitoring AgentsFabio Mulazzani, Barbara Russo, Giancarlo Succi. 535-542 [doi]
- Model Concept to Determine the Optimal Maturity of IT Service Management ProcessesJan-Helge Deutscher, Carsten Felden. 543-548 [doi]
- On the Singularity of Valuating IT Security InvestmentsThomas Neubauer, Christian Hartl. 549-556 [doi]
- A Max Modular Support Vector Machine and Its Variations for Pattern ClassificationHui-Cheng Lian. 559-564 [doi]
- A Method for Removing the Impulse in Image ProcessingLijie Zhang, Haili Yin. 565-567 [doi]
- A Motion Attention Model Based Rate Control Algorithm for H.264/AVCZhi Liu, Hongbo Yan, Liquan Shen, Yongfang Wang, Zhaoyang Zhang. 568-573 [doi]
- A Noise Insensitive Cluster Validity Measure for Pattern ClassificationGang Chen, Xiaoyong Guo, Tai Hu. 574-578 [doi]
- An Image Encryption Algorithm Based on N-Dimension Affine TransformationFangchao Wang, Sen Bai, Guibin Zhu, Zhenghui Song. 579-585 [doi]
- Border Detection and Cancer Propagation on Spectral Bands of Malignant Melanoma Using Six Sigma ThresholdGopalakrishnan Sethumadhavan, Srinivasan Sankaran. 586-592 [doi]
- Efficient Video Watermarking Using Motion Estimation ApproachAree Ali Mohammed, Jamal Ali Hussein. 593-598 [doi]
- Dynamic Background Modeling for Foreground SegmentationShaoqiu Xu. 599-604 [doi]
- Fingerprint Skeleton Extraction Based on Improved Principal CurveChi Ma, Hongyun Zhang, Duoqian Miao, Xuedong Zhang. 605-610 [doi]
- Salient Object Extraction Based on Region Saliency RatioZhongmin Han, Zhi Liu, Zhaoyang Zhang, Yu Lu, Weiwei Li, Hongbo Yan. 611-615 [doi]
- Selecting Relevant EEG Signal Locations for Personal Identification Problem Using ICA and Neural NetworkPreecha Tangkraingkij, Chidchanok Lursinsap, Siripun Sanguansintukul, Tayard Desudchit. 616-621 [doi]
- Technique of Large-scale Image Set Construction Based on Web Image Searching EngineRan Li, Weiguang Xu, Jianjiang Lu, Yafei Zhang, Zining Lu. 622-626 [doi]
- Three-Dimensional Reconstruction Using Enhanced Shape from Stereo TechniqueOsama Hosam, Xingming Sun. 627-632 [doi]
- A General Attack against Several Group SignaturesZhengjun Cao, Lihua Liu. 635-640 [doi]
- A Hybrid Branch-and-Bound Strategy for Hardware/Software PartitioningWu Jigang, Baofang Chang, Thambipillai Srikanthan. 641-644 [doi]
- A Note on the Upper Bound of Dimension of Bivariate Spline Space over TriangulationLijuan Chen, Aiqing Wang, Mingzhu Li. 645-649 [doi]
- An Efficient Fusion Algorithm on Conflicting EvidenceJinyuan Yang, Xinhan Huang, Min Wang. 650-654 [doi]
- Dynamic Routing Strategies Based on Local Topological Information of Scale-free NetworkWei Shi, Zheng Zhao. 655-659 [doi]
- Facial Metrical and Caricature-Pattern-Based Learning in Neural Network System for Face RecognitionJakarin Smitaveja, Kingkarn Sookhanaphibarn, Chidchanok Lursinsap. 660-665 [doi]
- Performance Analysis of Generalized Well-formed WorkflowZuoxian Nie, Xin-hua Jiang, Jian-cheng Liu, Hai-yan Yang. 666-671 [doi]
- Research on Numerical Module Identification ApproachesQuan Shan, Yan Chen. 672-676 [doi]
- The Game Analysis of Price Competition on Different RationalityBin Wang, Zhimin Li, Silian Sui, Yuhua Qin. 677-679 [doi]
- Animating the Brush-writing Process of Chinese Calligraphy CharactersLijie Yang, Xiaoshan Li. 683-688 [doi]
- Rule-Based Publish-Subscribe Mechanism for Real-time ApplicationsXin Li, Zhiping Jia, Xinjie Lu, Haiyang Wang. 689-694 [doi]
- Spatial Navigation with Consistency Maintenance SystemToshiyuki Maeda. 695-700 [doi]
- Study of Intelligent Control System for Ship Autopilot DesignMinghui Wang, Yongquan Yu, Bi Zeng. 701-705 [doi]
- Symbolic Reachability Computation of a Class of Nonlinear SystemsMing Xu, Liangyu Chen, Zhi-Bin Li. 706-710 [doi]
- A Common Acquaintance Immunization Strategy for Complex NetworkPan Liu, Huaikou Miao, Qing Li. 713-717 [doi]
- Autogeneration of Database Applications from XML Metadata for Web-Based Data EntryKexiao Liao, Peter Kisuule, John Ehrlinger, Jie Dai. 718-723 [doi]
- BackupIT: An Intrusion-Tolerant Cooperative Backup SystemSérgio Raymundo Loest, Marcelo Cheminn Madruga, Carlos Alberto Maziero, Lau Cheuk Lung. 724-729 [doi]
- Bloggers Social Presence Framing and Blog Visitors ResponsesHsiu-Ju Chen. 730-735 [doi]
- Building the Semantic Relations-Based Web Services Registry through Services MiningShizhan Chen, Zhiyong Feng, Hui Wang, Tao Wang. 736-743 [doi]
- Research on Fault-tolerant Mechanism of Integrating Water-Domain Oriented Computing ResourcesLing Shang, Zhijian Wang, Xiaohong Zhang, Junjie Wang, Zhizhong Liu. 744-749 [doi]
- Monitoring End-to-End Quality of Service in a Video Streaming SystemLassi Lehikoinen, Tomi Räty. 750-754 [doi]
- The Design and Realization of Unicode Based Minorities Character Online Processing SystemKurban Ubul, Askar Hamdulla, Winira Musajan, Abdiryim Raxidin, Patigul Mamat. 755-760 [doi]
- A MAC Protocol for Cooperative Wireless NetworksKefei Lu, Xiaodong Cai, Xudong Wang. 763-768 [doi]
- An Efficient Replica Location Method in Hierarchical P2P NetworksXin Sun, Kan Li, Yushu Liu. 769-774 [doi]
- An Energy Efficient MAC Protocol for WSNsZheng Guan, Dongfeng Zhao. 775-779 [doi]
- An Energy-Efficient Data Gathering Protocol for Wireless Sensor NetworksJun Yang 0009, Deyun Zhang, Yunyi Zhang. 780-785 [doi]
- Cross-Layer Service Discovery Using Multi-Path for Wireless EnvironmentsMoon Jeong Kim, Young Ik Eom. 786-790 [doi]
- Degradation of MIMO UWB-IR Transceiver in Poisson ModelsXu Huang. 791-796 [doi]
- Genetic Algorithm Based Length Reduction of a Mobile BS Path in WSNsLiang He, Jingdong Xu, Yuntao Yu, Miao Li, Wenyao Zhao. 797-802 [doi]
- Implementation of Geocast Enhanced AODV-UU in Linux TestbedMuhammad Asim Mubarik, Shoab Ahmad Khan, Syed Ayad Hassan, Naveed Sarfraz. 803-807 [doi]
- New Delay Optimum Quasi-Othogonal Space-Time Block Codes with Full Spatial DiversityChanghyeon Chae, Hyunae Min, Junho Kim, Taejin Jung. 808-811 [doi]
- Novel Protocol and Its Implementation QKD in Wi-Fi NetworksXu Huang, Shirantha Wijesekera, Dharmendra Sharma. 812-817 [doi]
- ODMRP-LR: ODMRP with Link Failure Detection and Local Recovery MechanismMarjan Naderan Tahan, Amir Darehshoorzadeh, Mehdi Dehghan. 818-823 [doi]
- Packet Loss Pattern and Parametric Video Quality Model for IPTVFenghua You, Wei Zhang, Jun Xiao. 824-828 [doi]
- Reducing Web Latency in Mobile NetworkXiaohui Chen, Weidong Wang, Guo Wei. 829-833 [doi]
- Throughput Analysis of Wireless Multi-hop Chain NetworksFangqin Liu, Chuang Lin, Hao Wen, Peter D. Ungsunan. 834-839 [doi]
- Transaction of Service Composition in Pervasive Computing and Its Correctness Analysis Based on ASMRuonan Rao, Jiankun Wu, Dejun Wang, Linpeng Huang. 840-845 [doi]
- Ubiquitous Services for Senior Citizens - Living Process Detection and MiddlewareAntero Metso, Petri Pulli, Seamus Hickey, Xiaosong Zheng. 846-851 [doi]
- ZD-AOMDV: A New Routing Algorithm for Mobile Ad-Hoc NetworksNastooh Taheri Javan, Reza Kiaeifar, Bahram Hakhamaneshi, Mehdi Dehghan. 852-857 [doi]
- An Eliminating Causal Ambiguity Approach to Reactive SystemsHouguang Yue. 861-866 [doi]
- Detecting Race Conditions in One-Sided Communication of MPI ProgramsMi-Young Park, Sang-Hwa Chung. 867-872 [doi]
- Fair Slack-Reclamation for Scheduling Periodic TasksYoulin Ruan, Gan Liu, Jianjun Han. 873-875 [doi]
- Implementation of Recurrence Calculation on a Heterogeneous Multicore ProcessorAkiyoshi Wakatani. 876-881 [doi]
- LAOVM: Lightweight Application-Oriented Virtual Machine for Thread MigrationXiaofei Liao, Yifan Yue, Hai Jin, Haikun Liu. 882-887 [doi]
- A Framework to Support Interoperability among Web Service RegistriesCheng Zeng, Keqing He, Bing Li. 891-896 [doi]
- A New Model of Software Life Cycle Processes for Consistent Design, Development, Management, and Maintenance of Secure Information SystemsDaisuke Horie, Toshio Kasahara, Yuichi Goto, Jingde Cheng. 897-902 [doi]
- A QoS-oriented Optimization Model for Web Service GroupXiaopeng Deng, Chunxiao Xing. 903-909 [doi]
- A Simple Method for Filtering Image SpamPeizhou He, Xiangming Wen, Wei Zheng. 910-913 [doi]
- An Empirical Performance Metrics Measurement and Analysis of Software Platforms for Implementation of Web ServicesK. Velmurugan, M. A. Maluk Mohamed. 914-920 [doi]
- Current Practice, Problems and Factors in COSD Application - A Component Users PerspectiveHazleen Aris, Faridah Hani Mohamed Salleh, Zailani Ibrahim, Siti Salwah Salim. 921-926 [doi]
- Automatic Construction of Complete Abstraction by Abstract InterpretationJunyan Qian, Lingzhong Zhao, Guoyong Cai, Tianlong Gu. 927-932 [doi]
- Detecting Design Patterns Using Source Code of Before Applying Design PatternsHironori Washizaki, Kazuhiro Fukaya, Atsuto Kubo, Yoshiaki Fukazawa. 933-938 [doi]
- Effectiveness of Stakeholder Identification Methods in Requirements Elicitation: Experimental Results Derived from a Methodical ReviewCarla Pacheco, Ivan Garcia. 939-942 [doi]
- MUPRET: An Ontology-Driven Traceability Tool for Multiperspective Requirements ArtifactsNamfon Assawamekin, Thanwadee Sunetnanta, Charnyote Pluempitiwiriyawej. 943-948 [doi]
- MuTT: A Multi-Threaded Tracer for Java ProgramsDapeng Liu, Shaochun Xu. 949-954 [doi]
- Reliability Analysis of Component Software Based on Testing Data TransformationChunyan Hou, Gang Cui, Hongwei Liu, Xiaozong Yang. 955-960 [doi]
- Research on Test Suite Reduction Using Attribute Relevance AnalysisFanping Zeng, Ling Li, Juan Li, Xufa Wang. 961-966 [doi]
- Risky Module Estimation in Safety-Critical SoftwareYoung-Mi Kim, Choong-Heui Jeong, A-Rang Jeong, Hyeon Soo Kim. 967-970 [doi]
- Service Discovery and Substitution According to Inheritance of Behavior with Invariant AnalysisJiDong Ge, Hao Hu, Jian Lu. 971-976 [doi]
- Simplifying Buffer Overflow Detection Using Site-Safe ExpressionsShikun Chen, Zhoujun Li. 977-982 [doi]
- Software Development Process Monitoring Based on Nominal TransformationFengyu Zhao, Xin Peng, Wenyun Zhao. 983-988 [doi]
- Software Reliability Assurance Using a Framework in Weapon System Development: A Case StudyDalju Lee, Jongmoon Baik, Ju-Hwan Shin. 989-995 [doi]
- Study on the Automatic Test Framework Based on Three-tier Data Driven MechanismTao Wu, Yanling Wan, Yishan Xi, Chuanbo Chen. 996-1001 [doi]
- Development Based on MDA, of Ubiquitous Applications Domain Product LinesRaphael Pereira de Oliveira, Antônio Francisco do Prado, Wanderley Lopes de Souza, Mauro Biajiz. 1005-1010 [doi]
- A Systematic Framework for Grammar TestingLixiao Zheng, Haiming Chen. 1013-1019 [doi]
- Validating Requirements Model of a B2B SystemYin Ling, Liu Jing, Xiaoshan Li. 1020-1025 [doi]
- Model Checking Service Component Composition by SPINZuohua Ding, Mingyue Jiang, Jing Liu. 1029-1034 [doi]
- Model Checking UML Activity Diagrams in FDRDong Xu, Huaikou Miao, Nduwimfura Philbert. 1035-1040 [doi]
- On the Capability Compliance of Annotated Process ModelPing Gong, Keqing He. 1041-1046 [doi]
- A Coverage-Driven Constraint Random-Based Functional Verification Method of Pipeline UnitYingpan Wu, Lixin Yu, Wei Zhuang, Jianyong Wang. 1049-1054 [doi]
- A Study of Matrix Data on Reading and Writing Method in SimulationWang Lei, Lu XianLiang. 1055-1060 [doi]
- A 5-Parameter Bundle Adjustment Method for Image MosaicXianyong Fang, Bin Luo, Haifeng Zhao, Yiwen Zhang. 1063-1067 [doi]
- A Framework for Real-time Local Free-Form DeformationJiacheng Li, Gengliang Wang, Yue Chen. 1068-1073 [doi]
- A General 3D Campus Navigator SystemJing Wang, Zhi Lin. 1074-1078 [doi]
- A Logical and Graphical Operation of a Graph-Based Data ModelTeruhisa Hochin, Hiroki Nomiya. 1079-1084 [doi]
- A Novel Rate Control Scheme for H.264/AVC Based on Scene ChangeKan Chang, Bo Yang, Juan Luo. 1085-1089 [doi]
- Adding SVC Spatial Scalability to Existing H.264/AVC VideoRavin Sachdeva, Sumit Johar, Emiliano Mario Piccinelli. 1090-1095 [doi]
- Dealing with Telephone Fraud Using CAPTCHAHua Zhang, Xiangming Wen, Peizhou He, Wei Zheng. 1096-1099 [doi]
- Depth Adaptive Video StitchingWei Zeng, Hongming Zhang. 1100-1105 [doi]
- Efficient Estimation of Multiple Illuminant Directions Using C-means Clustering and Self-correction for Augmented RealityJintao Ma, Ya Zhou, Qun Hao, Yang Zhang. 1106-1110 [doi]
- Image Inpainting Algorithm Based on Successive EliminationRanran Zhang, Youdong Ding, Shuhan Wei. 1111-1114 [doi]
- Point Matching Estimation for Moving Object Tracking Based on Kalman FilterWei Zeng, Guibin Zhu, Yao Li. 1115-1119 [doi]
- SaViT: Technique for Visualization of Digital Home SafetyPushpa Kumar, Nary Subramanian, Kang Zhang. 1120-1125 [doi]
- Shot Boundary Detection and Keyframe Extraction Based on Scale Invariant Feature TransformGentao Liu, Xiangming Wen, Wei Zheng, Peizhou He. 1126-1130 [doi]
- Texture Retrieval by Scale and Rotation Invariant Directional Empirical Mode DecompositionMingliang Hou, Cunhua Li, Yong Zhang. 1131-1135 [doi]
- A SAM-Based Evolution Model of Ontological User ModelJianguo Pan, Bofeng Zhang, Gengfeng Wu. 1139-1143 [doi]
- A Web Service Adapter with Contract-Oriented MethodologyJunhuai Li, Yile Wang, Jing Zhang, Zhuobin Zhang. 1144-1149 [doi]
- A Web Service Composition Method Based on Interface MatchingTao He, Huaikou Miao, LiPing Li. 1150-1154 [doi]
- Analyzing Reliability of Time Constrained Service CompositionGuisheng Fan, Huiqun Yu, Liqiong Chen, Dongmei Liu. 1155-1160 [doi]
- M-Filter: Semantic XML Data Filtering System for Multiple QueriesEi Chaw Htoon, Thi Thi Soe Nyunt. 1167-1171 [doi]
- Monitoring BPEL-Based Web Service Composition Using AOPMingjie Sun, Bixin Li, Pengcheng Zhang. 1172-1177 [doi]
- Multi-Tier Security Feature Modeling for Service-Oriented Application IntegrationFengyu Zhao, Xin Peng, Wenyun Zhao. 1178-1183 [doi]
- A Heuristic QoS-Aware Service Selection Approach to Web Service CompositionDongmei Liu, Zhiqing Shao, Caizhu Yu, Guisheng Fan. 1184-1189 [doi]
- Performance of Web Caching in High Density Mobile NetworksXiaohui Chen, Weidong Wang, Guo Wei. 1190-1193 [doi]
- Understanding the Search Interfaces of the Deep Web Based on Domain ModelXiaojie Yuan, Huibin Zhang, ZongYun Yang, Yanlong Wen. 1194-1199 [doi]
- User-interface Design of Web Application Using Object-ZBin Zhu, Huaikou Miao, Bo Song. 1200-1204 [doi]
- Validating XML Constraints Using AutomataZijing Tan. 1205-1210 [doi]