Abstract is missing.
- Business Intelligence An Industrial PerspectiveMeichun Hsu. 3 [doi]
- The IUPS Physiome ProjectPeter J. Hunter. 4 [doi]
- Large-scale Evaluation Infrastructure for Information Access Technologies Enhancement and CreativityNoriko Kando. 6 [doi]
- Active XML Schema Containment Checking Based on Tree Automata TheoryHaitao Ma, Zhongxiao Hao, Yinghui Zhou. 11-16 [doi]
- An Efficient Detection of Conflicting Updates in Valid XMLChangwoo Byun, Ilkook Yun, Seog Park. 17-22 [doi]
- A Journey towards More Efficient Processing of XML Data in (O)RDBMSIrena Mlúnková. 23-28 [doi]
- Schema-Aware Keyword Search over XML StreamsWeidong Yang, Baile Shi. 29-34 [doi]
- SemFilter: A Simple and Efficient Semantic Filtering of XML MessagesJaehoon Kim, Seog Park. 35-40 [doi]
- Ensembles of Region Based ClassifiersSungha Choi, Byungwoo Lee, Jihoon Yang. 41-46 [doi]
- Neural Network for Text Classification Based on Singular Value DecompositionCheng Hua Li, Soon Cheol Park. 47-52 [doi]
- An Efficient Method of Genetic Algorithm for Text Clustering Based on Singular Value DecompositionWei Song, Soon Cheol Park. 53-58 [doi]
- Predicting Coronary Artery Disease from Heart Rate Variability Using Classification and Statistical AnalysisHeon Gyu Lee, Kiyong Noh, Hong Kyu Park, Keun Ho Ryu. 59-64 [doi]
- Deputy Mechanism for OLAP over Imprecise Data and Composite MeasureJunqiang Liu, Min Luo, Xiandi Yang. 65-70 [doi]
- CTU-Mine: An Efficient High Utility Itemset Mining Algorithm Using the Pattern Growth ApproachAlva Erwin, Raj P. Gopalan, N. R. Achuthan. 71-76 [doi]
- An Experimental Study on Feature Subset Selection MethodsChulmin Yun, Donghyuk Shin, Hyunsung Jo, Jihoon Yang, Saejoon Kim. 77-82 [doi]
- Comparison of Two Feature Selection Methods in Intrusion Detection SystemsM. J. Fadaeieslam, Behrouz Minaei-Bidgoli, Mahmood Fathy, Mohsen Soryani. 83-86 [doi]
- Generic Component: A Generic Programming ApproachChen Yewang, Jiang Zhixiong, Zhao Wenyun, Peng Xin. 87-92 [doi]
- Virtual Organization: A New Approach in ITMohammad Reza Nami, Djamshid Tavangarian. 93-98 [doi]
- Effective Processing over Continuous Data StreamMisook Bae, Jun Park, Buhyun Hwang, Jiseung Nam. 99-104 [doi]
- Classification Algorithm Based on Human Social BehaviorArit Thammano, Jittraporn Moolwong. 105-109 [doi]
- A New Trajectory Search Algorithm Based on Spatio-temporal Similarity on Spatial NetworkJae-Woo Chang, Rabindra Bista, Ji Hee Kim, Young-Chang Kim. 110-115 [doi]
- An Efficient Method to Determine the Diagonal Loading Factor for PAM Communication SystemWenlong Liu, Shuxue Ding. 116-121 [doi]
- Dealing with Query Contention Issue in Real-Time Data Warehouses by Dynamic Multi-level CachesZiyu Lin, Dongqing Yang, Guojie Song, Tengjiao Wang. 122-127 [doi]
- The Bump Hunting Method and Its Accuracy Using the Genetic Algorithm with Application to Real Customer DataHideo Hirose, Takahiro Yukizane, T. Deguchi. 128-132 [doi]
- User-Oriented Materialized View SelectionZiyu Lin, Dongqing Yang, Guojie Song, Tengjiao Wang. 133-138 [doi]
- Implementation of the Moonquake DatabaseJunya Terazono. 139-144 [doi]
- Walking Stability by Age A Feature Analysis Based on a Fourteen-Linkage ModelBofeng Zhang, Takehiro Kanno, Wenxi Chen, Gengfeng Wu, Daming Wei. 145-150 [doi]
- A Temporal Meta Database System for 3D ObjectsVo Thi Ngoc Chau, Suphamit Chittayasothorn. 151-156 [doi]
- An Efficient Goalie Strategy Using Twin Hidden Markov ModelsT. Srinivasan, Srikanth P. Srinivasan, Shravan Kumar Alur, Pravin Chandrasekaran. 157-164 [doi]
- A Mechanism for Improving Web Server Performance Using Fuzzy ConceptBumjoo Park, Kiejin Park, Dongmin Shin, Sungsoo Kim. 165-170 [doi]
- Performance Evaluation of TD-Learning Methods for Bandwidth ProvisioningM. Jahanshahi, Mohammad Reza Meybodi. 171-176 [doi]
- A Parallel Downloading Algorithm for Redundant NetworksKe Li, Wanlei Zhou, Shui Yu, Bo Dai. 177-182 [doi]
- Web Image Annotation Based on the Decision Rules Inferred by the Statistical Analysis of Web PagesJoohyoun Park, Giseok Choe, Jongwon Lee, Jongho Nang. 183-188 [doi]
- Semantic Retrieval of Text DocumentsVitaly Klyuev, Vladimir A. Oleshchuk. 189-193 [doi]
- Worrisome Rich-Get-Richer? Not the True Story!Mingda Wu, Qiancheng Jiang, Yan Zhang. 194-199 [doi]
- Component Based Approach to Handle Synonym and Polysemy in FolksonomySun-Sook Lee, Hwan-Seung Yong. 200-205 [doi]
- Automatic Web Services Composition Using Combining HTN and CSPIncheon Paik, Daisuke Maruyama. 206-211 [doi]
- Dynamic Personalization for Book Recommendation System Using Web Services and Virtual Library EnhancementsTakanori Kuroiwa, Subhash Bhalla. 212-217 [doi]
- Web-Based Interface Architecture for the Improvement of Accessibility to Computational Resources on a Cluster SystemHuioon Kim, Kyungwon Chun, Kil Su Jung, Youngjoo Chung. 218-222 [doi]
- A Multi-clustering Hybrid Recommender SystemSutheera Puntheeranurak, Hidekazu Tsuji. 223-228 [doi]
- Proof for Multi-agent Communication of Semantic Web InformationVuong Xuan Tran, Hidekazu Tsuji. 229-234 [doi]
- Semantic Web Based Simulation Service Customization and CompositionTong Zhang, Yunsheng Liu, Yabing Zha. 235-240 [doi]
- Semantic Representation and Ontology Construction in the Question Answering SystemYing-Hong Wang, Wen-Nan Wang, Chu-Chi Huang, Ting-Wei Chang, Yi-Hsiang Yen. 241-246 [doi]
- WebSIS: Semantic Information System Based on Web Service and Ontology for Grid Computing EnvironmentTae-Nyun Kim, Hyung-Lae Kim, Ki-Ho Yi, Chang-Sung Jeong. 247-252 [doi]
- A Semi-automated Negotiation Process to Improve the Usability for Online MarketplacesLung Ngai, Phil Mak, Wancheng Ni, Lianchen Liu, Cheng Wu. 253-258 [doi]
- SiteRank-Based Crawling Ordering Strategy for Search EnginesQiancheng Jiang, Yan Zhang. 259-263 [doi]
- Preserving Consistency Based on Wall-Time Precedence in P2P DVEsLiping Gao, Ning Gu. 264-269 [doi]
- Speech and Song Search on the Web: System Design and ImplementationYuichi Yaguchi, Yoshiyuki Watanabe, Keitaro Naruse, Ryuichi Oka. 270-275 [doi]
- Web Service-Based Dynamic Resource and Job Managements for Large-Scale and Long-Time Grid ComputationsYingwen Song, Yoshio Tanaka, Hiroshi Takemiya, Satoshi Sekiguchi. 279-284 [doi]
- Building Single Fault Survivable Parallel Algorithms for Matrix Operations Using Redundant Parallel ComputationYunfei Du, Panfeng Wang, Hongyi Fu, Jia Jia, Haifang Zhou, Xuejun Yang. 285-290 [doi]
- A Job Management System for a Large Scale Grid SystemYong Woo Lee, Phil Doo Hong. 291-294 [doi]
- Load Balanced Parallel Prime Number Generator with Sieve of Eratosthenes on Cluster ComputersSoonwook Hwang, Kyusik Chung, Dongseung Kim. 295-299 [doi]
- Evaluating the Performance of Basic Linear Algebra Subroutines on a Torus Array ProcessorAhmed S. Zekri, Stanislav G. Sedukhin. 300-305 [doi]
- Evolutionary Programming with Operator AdaptationYong Liu. 306-311 [doi]
- An Integer Partition Based Algorithm for Coalition Structure GenerationVeera Boonjing, Santit Narabin. 312-315 [doi]
- Visualization of Message Races in MPI Parallel ProgramsMi-Young Park, Nguyen Cao Truong Hai, Yong-Kee Jun, Hyuk Ro Park. 316-321 [doi]
- Design of Modular Rendering PipelineTomas Ágoston, Csaba Csuprai, Juraj Onderik, Roman Durikovic. 322-328 [doi]
- A Reliable Data Management Method for Parallel File SystemYan-mei Huo, Kuo Tang, Liang Hu, Kexin Yang, Jiubin Ju. 328-332 [doi]
- Dedicated Disk I/O Strategies for IPTV Live Streaming Servers Supporting Timeshift FunctionsCheng Huang, Chenjie Zhu, Yi Li, Dejian Ye. 333-338 [doi]
- Implementation and Evaluation of Specific Data-Intensive Scientific Applications on the FT64 Stream ProcessorYu Deng, Xuejun Yang, Xiaobo Yan, Ying Zhang, Jing Du. 339-343 [doi]
- A Cluster File System for High Data Availability Using Locality-Aware Partial ReplicationJinseok Kim, Sangman Sim, Sungyong Park. 345-350 [doi]
- A Performance Evaluation Methodology in Virtual EnvironmentsJiyong Jang, Saeyoung Han, Jinseok Kim, Sungyong Park, Seungjo Bae, Young Choon Woo. 351-358 [doi]
- Challenge in QoS Supporting via Integrating Differentiated Service and Multipath Routing on Mobile Ad Hoc NetworkMostafa Esmaeili, Maghsoud Abbaspour, Hamid R. Alipour, H. Mousavi. 359-368 [doi]
- Security and QoS Optimization for Distributed Real Time EnvironmentA. Jalal, Mian Ahmad Zeb. 369-374 [doi]
- An Enhanced Dynamic and Distributed Domain-Based Handoff Scheme for Mobile IPv6Xuebin Ma, Tao Wen, Quan Guo, Gang Wang. 375-380 [doi]
- Modelling and Simulating IPv6 MobilityXu Lei, Yong-Soo Kim, Richard Lai. 381-386 [doi]
- Stochastic Model of Finite Buffer Priority Queuing System with Multi-type Batch Arrival and General RejectionAttila Korösi, Balázs Székely, Csaba Lukovszki. 387-392 [doi]
- Fast Recovery from Hidden Node Collision for IEEE 802.15.4 LR-WPANsShengzhi Zhang, Sang-Jo Yoo. 393-398 [doi]
- Word Indexing for Mobile Device Data RepresentationsHenry Larkin. 399-404 [doi]
- KadStreaming: A Novel Kademlia P2P Network-Based VoD Streaming SchemeJie Wu, Bisheng Liu, Shiyong Zhang, ZhiHui Lv, YiPing Zhong. 405-410 [doi]
- Development of i-appli for Women s Health Information Management SystemTakehiro Kanno, Wenxi Chen, Masumi Kitazawa. 411-416 [doi]
- An Efficient Shared Learning Scheme for Layered Video Streaming over Application Layer MulticastJongmin Park, Seung-Ik Lee, Yangwoo Ko, Dongman Lee. 417-422 [doi]
- A Context-Aware Framework for Mobile Navigation ServiceWonik Choi, Hyunduk Kim, Jinsu Kim, Jinseok Chae. 423-428 [doi]
- A Predictive and Synchronized Neighborhood Tracking Scheme for Mobile Ad Hoc NetworksHui Xu, Jinsung Cho, Sungyoung Lee. 429-434 [doi]
- A Fast Path Recovery Scheme for Publish/Subscribe in Mobile Ad Hoc NetworksSang-chul Moon, Yangwoo Ko, Dongman Lee. 435-440 [doi]
- Scalable and Statistically Secure Fingerprinting Scheme for Mobile Game Content DistributionJae-Min Seol, Seong-Whan Kim. 441-446 [doi]
- Packet Reversed Packet Combining SchemeChandan Tilak Bhunia. 447-451 [doi]
- A Novel Method for Leader Election AlgorithmMehdi Mirakhorli, Amir Azim Sharifloo, Maghsoud Abbaspour. 452-456 [doi]
- Task Allocation Adaptable to Network Topology among CooperativeXiao Zheng, Shiyong Zhang, Chengrong Wu. 457-462 [doi]
- Adapting Superpeer Size Using Particle Swam Optimization for Self-Organizing Superpeer Ring with Loosely Consistent DHTSaeyoung Han, Sungyong Park. 463-468 [doi]
- Overview of LDPC CodesZongjie Tu, Shiyong Zhang. 469-474 [doi]
- Optimal Zero-Correlation Zone Sequence Set Constructed from a Perfect SequenceTakafumi Hayashi. 475-479 [doi]
- Computing the Availability and MTTF of Shared Protection SystemsHirokazu Ozaki, Atsushi Kara. 480-485 [doi]
- Performance of SD-Method Compared with OFDM MethodRongzhen Jin, Naoki Suehiro, Chenggao Han. 486-490 [doi]
- Innovative Mobile Phone Services Based on Next Generation Infrastructure in Japan A SurveyAkira Sasaki, Kazuaki Yamauchi, Wenxi Chen, Michael Cohen, Daming Wei, Zixue Cheng. 491-496 [doi]
- Performance Evaluation of Handling Interrupts Schemes in Gigabit NetworksSalman AlQahtani. 497-502 [doi]
- Performance Comparison of Contention-Based Channel Access Mechanism of IEEE 802.11 and 802.11eMayank Kanthali, Apurva Gaiwak, P. D. Vyavahare. 503-510 [doi]
- Spin-Around: Phase-Locked Synchronized Rotation and Revolution in Multistandpoint panoramic BrowsersMichael Cohen, Ishara Jaysingha, Julián Villegas. 511-516 [doi]
- Control of Navigable Panoramic Imagery with Information Furniture: Chair-Driven 2.5 with Automatic Window DilationMichael Cohen, Kunihiro Doi, Takayuki Hattori, Yorinobu Mine. 517-522 [doi]
- Synæsthetic Music or the Ultimate Ocular HarpsichordJulián Villegas, Michael Cohen. 523-527 [doi]
- A Shader for Virtual X-Ray ImagingShin Hasegawa, Hidetaka Funayama, Daming Wei. 528-533 [doi]
- The Design and Implementation of a Scalable Wireless Video Streaming System Adopting TCP Transmission ModeYing Chai, Dejian Ye. 534-538 [doi]
- Clear P2P IPTV Live Streaming System for Set-Top Box ClientsChenjie Zhu, Dejian Ye. 539-544 [doi]
- A Stochastic Differential Equation Model for Queues on Network Video TrafficWenyan Hu, Dejian Ye. 545-550 [doi]
- Content and Illumination Invariant Blur Measures for Realtime Video ProcessingSebastien Harasse, Laurent Bonnaud, Michel Desvignes. 551-556 [doi]
- Automatic Lung Segmentation in CT Images Using Anisotropic Diffusion and Morphology OperationHyeSuk Kim, Hyo Sun Yoon, Kien Nguyen Trung, Gueesang Lee. 557-561 [doi]
- Flame Temperature Field Measurement Using Improved Generalized Cross Validation MethodYinghui Zhou, Dezhong Zheng. 562-566 [doi]
- Implementation and Evaluation of a High Speed License Plate Recognition System on an FPGATakamasa Kanamori, Hideharu Amano, Masatoshi Arai, Daisuke Konno, Tomomichi Nanba, Yoshiaki Ajioka. 567-572 [doi]
- Motion Estimation for Real Time Transmission on H.264/AVCHyo Sun Yoon, HyeSuk Kim, Miyoung Kim, Anh Nga Lai Thi, Gueesang Lee. 573-576 [doi]
- Reducing Spatial Resolution for MPEG-4 / H.264 Transcoding with Efficient Motion ReusingToan Nguyen Dinh, Jae-Myung Yoo, Sungchan Park, Gueesang Lee, June-Young Chang, Han-Jin Cho. 577-580 [doi]
- Template-Based Adaptive Video Coding Algorithm for High Resolution Laptop Video Conference SystemsChundong Wang, Dejian Ye. 581-586 [doi]
- Gradient Based Error Concealment for H.264 Inter FramesToan Nguyen Dinh, Gueesang Lee. 587-592 [doi]
- Tracking and Motion Analysis of Impact FragmentsNaoto Miura, Hirohide Demura, Naru Hirata, Noriaki Asada. 593-598 [doi]
- Design and Implementation of a Novel P2P-Based VOD System Using Media File Segments Selecting AlgorithmZhiHui Lv, Shiyong Zhang, Jie Wu, Weiming Fu, YiPing Zhong. 599-604 [doi]
- Methods and Technologies for Enhancing and Optimizing Power Plant Inspection ProceduresKamen Kanev, Zixue Cheng, Nikolay N. Mirenkov. 605-609 [doi]
- Design of a Clinical Knowledge Base for Heart Disease DetectionKi-Hyeon Kim, Ho-Jin Choi. 610-615 [doi]
- Performance Evaluation of a Temporal Sequence Learning Spiking Neural NetworkT. Ichishita, Robert H. Fujii. 616-620 [doi]
- Design and Implementation of a Real-Time Video Player on Tiled-Display SystemGiseok Choe, Jeongsoo Yu, Jeonghoon Choi, Jongho Nang. 621-626 [doi]
- On the Interactive Visualization of Very Large Image Data SetsFrank Ekpar, Masaaki Yoneda, Hiroyuki Hase. 627-632 [doi]
- A Leaf Image Retrieval Scheme Based on Partial Dynamic Time Warping and Two-Level FilteringYoonsik Tak. 633-638 [doi]
- Local Binary Patterns on Hexagonal Image StructureXiangjian He, Jianmin Li, Wenjing Jia, Qiang Wu, Tom Hintz. 639-644 [doi]
- A Flexible Non-linear PCA Encoder for Still Image CompressionChuanfeng Lv, Zhiwen Liu, Qiangfu Zhao. 645-650 [doi]
- Influence of Imaging Condition on Matching Point DetectionTomoki Hodokuma, Naru Hirata, Hirohide Demura, Noriaki Asada. 651-655 [doi]
- Identification of Japanese and English Script from a Single Document PageSukalpa Chanda, Umapada Pal, Fumitaka Kimura. 656-661 [doi]
- Word Segmentation for the Sequences Emitted from a Word-Valued SourceTakashi Ishida, Toshiyasu Matsushima, Shigeichi Hirasawa. 662-661 [doi]
- Using Contour Analysis to Improve Feature Extraction in Thai Handwritten Character Recognition SystemsJarernsri L. Mitrpanont, Urairat Limkonglap. 668-673 [doi]
- Statistical Evaluation of Measure and Distance on Document Classification Problems in Text MiningMasayuki Goto, Takashi Ishida, Shigeichi Hirasawa. 674-673 [doi]
- Image Skew Detection for Formulas without Fraction Bars Using Connected Components AnalysisLichun Zhang, Yue Lu, Guoyue Chen, Patrick S. P. Wang. 680-679 [doi]
- Recognition Algorithm for Topographic FeaturesNaoto Harada, Takafumi Hayashi, Naru Hirata, Hirohide Demura, Noriaki Asada. 685-689 [doi]
- Unsupervised Image Segmentation Using Automated Fuzzy c-MeansSupatra Sahaphong, Nualsawat Hiransakolwong. 690-694 [doi]
- Vector Image Segmentation for Content-Based Vector Image RetrievalTakahiro Hayashi, Rikio Onai, Koji Abe. 695-700 [doi]
- Segmentation by Morphological Reconstruction and Non-linear DiffusionJaemyeong Yoo, Toan Nguyen Dinh, Gueesang Lee. 701-708 [doi]
- The Automatic Defense Mechanism for Malicious Injection AttackJin-Cherng Lin, Jan-Min Chen. 709-714 [doi]
- Botnet Detection by Monitoring Group Activities in DNS TrafficHyunsang Choi, Hanwoo Lee, Heejo Lee, Hyogon Kim. 715-720 [doi]
- An Internet Voting Protocol with Receipt-Free and Coercion-ResistantBo Meng. 721-726 [doi]
- Towards Quantization Index Modulation Strategies on Content-Based Watermarking SchemesPedro Martins, Paulo Carvalho. 727-732 [doi]
- Exploiting X.509 Certificate and Multi-agent System Architecture for Role-Based Access Control and Authentication ManagementSomchart Fugkeaw, Piyawit Manpanpanich, Sekpon Juntapremjitt. 733-738 [doi]
- Implementation of an Audio Watermarking System Using CDMA ModulationsSaid Ghnimi, Adnen Cherif. 739-744 [doi]
- DWT-Based Audio Watermarking Resistant to DesynchronizationHai-yan Liu, Xue-feng Zheng, Ying Wang. 745-748 [doi]
- An Effective Trust Establishment Scheme for Authentication in Mobile Ad Hoc NetworksGuojun Wang, Qiong Wang, Jiannong Cao, Minyi Guo. 749-754 [doi]
- Home Network Framework Based on OSGi Service Platform Using SSL Component BundleEun-Ae Cho, Chang-Joo Moon, Dae-Ha Park, Doo-Kwon Baik. 755-760 [doi]
- An Approach for Network Security Analysis Using Logic Exploitation GraphHan-dong Mao, Wei Ming Zhang. 761-766 [doi]
- Information Security: End User Behavior and Corporate CultureSteven Woodhouse. 767-774 [doi]
- A Dataflow Analysis for Mode Set Optimization in DSP Instruction SetsJiho Chu, Youngsun Han, Seon Wook Kim. 775-780 [doi]
- Name-Based Write Barriers in Real-Time JavaM. Teresa Higuera-Toledano. 781-786 [doi]
- Swap-Aware Garbage Collection for NAND Flash Memory Based Embedded SystemsOhhoon Kwon, Kern Koh. 787-792 [doi]
- Deadline Scheduling with Processor Affinity and Feasibility Check on Uniform Parallel MachinesVahid Salmani, Mahmoud Naghibzadeh, Mohsen Kahani. 793-798 [doi]
- System-Level Power Management for Mobile DevicesGerard Bosch i Creus, Petri Niska. 799-804 [doi]
- A Visual Modeling Environment for Embedded Component SystemsTakuya Azumi, Shimpei Yamada, Hiroshi Oyama, Yukikazu Nakamoto, Hiroaki Takada. 805-810 [doi]
- Enabling Reconfigurable SoC in Multimedia ProcessingYing Wang, Weinan Chen, Xiao-Wei Wang, Hong-Jun You, Chenglian Peng. 811-816 [doi]
- A Low-Power Application Specific Instruction Set Processor Using Asynchronous Function UnitsYong Li, Zhiying Wang, Kui Dai. 817-822 [doi]
- Implementation of Architecture Concepts for Hardware Agent SystemsJ. Schneider, M. Naggatz, Rainer G. Spallek. 823-828 [doi]
- Compiler Construction for Lockstep Execution of Multithreaded ProcessorsHuong Giang Nguyen, Seokjoong Hwang, Seon Wook Kim. 829-834 [doi]
- Performance Comparison of Camera Interface Methods in a Mobile HandsetMinyoung Eom, Yeoung-Kyu Lim, Tae Ik Kang. 835-840 [doi]
- Indirect Tag Search Mechanism for Instruction Window Energy ReductionShingo Watanabe, Akihiro Chiyonobu, Toshinori Sato. 841-846 [doi]
- A Control Circuit Synthesis Method for Asynchronous Circuits in Bundled-Data ImplementationTakao Konishi, Naohiro Hamada, Hiroshi Saito. 847-852 [doi]
- Adaptive Optical Proximity Correction Using an Optimization MethodTetsuaki Matsunawa, Hirokazu Nosato, Hidenori Sakanashi, Masahiro Murakawa, Eiichi Takahashi, Tsuneo Terasawa, Toshihiko Tanaka, Osamu Suga, Tetsuya Higuchi. 853-860 [doi]
- An Automatic Tool for Generating Test Cases from the System s RequirementsRosziati Ibrahim, Mohd Zainura Saringat, Noraini Ibrahim, Noraida Ismail. 861-866 [doi]
- An Automatic Software Test-Data Generation Scheme Based on Data Flow Criteria and Genetic AlgorithmsAndreas S. Andreou, Kypros A. Economides, Anastasis A. Sofokleous. 867-872 [doi]
- Generating Wizards for Initializing Software ComponentsHironori Washizaki, Takao Adachi, Yoshiaki Fukazawa. 873-878 [doi]
- A Method to Generate a Feature Model from a Business Process Model for Business ApplicationsJongsu Bae, Sungwon Kang. 879-884 [doi]
- The Value Gap Model: Value-Based Requirements ElicitationSang Won Lim, Taek Lee, Sangsoo Kim, Hoh Peter In. 885-890 [doi]
- Runtime Service Discovery and Reconfiguration Using OWL-S Based Semantic Web ServiceJinhan Kim, Jaejeong Lee, Byungjeong Lee. 891-896 [doi]
- Constructing a Reference Model of a Grouped-Metadata Object and Its Change ModelLiangli Ma, Yongjie Li. 897-902 [doi]
- A Robot Programming Based on Frame Representation of KnowledgeShigeto Aramaki, Tatsuichiro Nagai, Masato Kawamura, Koutarou Yayoshi, Yasutaka Hatada, Tomoaki Tsuruoka. 903-908 [doi]
- Representation and Programming for a Robotic Assembly Task Using an Assembly StructureTatsuichiro Nagai, Shigeto Aramaki, Isao Nagasawa. 909-914 [doi]
- A Method for Solving a Bipartite-Graph Clustering Problem with Sequence OptimizationKeiu Harada, Takuya Ishioka, Ikuo Suzuki, Masashi Furukawa. 915-920 [doi]
- Towards a Formal Framework for Product Line Test DevelopmentSungwon Kang, Jihyun Lee, Myungchul Kim, Woojin Lee. 921-926 [doi]
- A Metamodeling Approach to Tracing Variability between Requirements and Architecture in Software Product LinesMikyeong Moon, Heung Seok Chae, Taewoo Nam, Keunhyuk Yeom. 927-933 [doi]
- A Formal Approach to Verify Mapping Relation in a Software Product LineTonny Kurniadi Satyananda, Danhyung Lee, Sungwon Kang. 934-939 [doi]
- The Design of a Multimedia Protocol Analysis Software EnvironmentTony Tsang, Yong-Soo Kim, Richard Lai. 940-948 [doi]
- A Secure Communication Protocol for Low-Cost RFID SystemJung-Hyun Oh, Hyun Seok Kim, Jin-Young Choi. 949-954 [doi]
- Design of an Aspect-Based Framework to Improve the Dynamic Management of RFID MiddlewareHee-Joung Hwang, Jin-Tak Choi. 955-960 [doi]
- Design and Implementation of an Active RFID System for Fast Tag CollectionWon-Ju Yoon, Sang-Hwa Chung, Seong Joon Lee, Young-Sik Moon. 961-966 [doi]
- Probabilistic Isolation of Malicious Vehicles in Pseudonym Changing VANETsBisheng Liu, YiPing Zhong, Shiyong Zhang. 967-972 [doi]
- ANFIS for Adaptive Personal Space Determination for Ubiquitous RobotsJanaka Chaminda Balasuriya, Chandrajith Ashuboda Marasinghe, Keigo Watanabe. 973-978 [doi]
- Effective Service Decision Using Ambient-Based HHMM in Smart Home SystemJiyong Park, Dohoon Kim, Taek Lee, Hoh Peter In. 979-984 [doi]
- Dynamic Activity Lifecycle Management in Ubiquitous Computing EnvironmentsHokyum Kim, Insuk Park, Soon J. Hyun, Dongman Lee. 985-990 [doi]
- A Matrix-Based Random Key Pre-distribution Scheme for Wireless Sensor NetworksTing Yuan, Shiyong Zhang, YiPing Zhong. 991-996 [doi]
- Distributed Coloring Algorithm for Wireless Sensor Networks and Its ApplicationsRyouhei Kawano, Toshiaki Miyazaki. 997-1002 [doi]
- A Novel Reference Node Selection Algorithm Based on Trilateration for Indoor Sensor NetworksGuangjie Han, Deokjai Choi, Wontaek Lim. 1003-1008 [doi]
- A Two Base Stations Algorithm for Energy Balanced Data Propagation in Smart Home Sensor NetworksBao Nguyen Nguyen, Deokjai Choi. 1009-1014 [doi]
- Game Theoretic Distributed Energy Control in Sensor NetworksJia Zeng, Chundi Mu, Min Jiang. 1015-1019 [doi]
- An Aggregation Tree Constructing Algorithm Based on Energy Consumption AssessmentDayang Sun, Yanheng Liu, Aimin Wang. 1020-1025 [doi]
- A System Architecture for Monitoring Sensor Data StreamYang Koo Lee, Ling Wang, Keun Ho Ryu. 1026-1031 [doi]
- Product Line Approach to Role-Based Middleware Development for Ubiquitous Sensor NetworkWoojin Lee, Sungwon Kang, Danhyung Lee. 1032-1037 [doi]
- e-Petri Net Model for Programming Integrated Network of Wireless Sensor Networks and GridsAdi Mallikarjuna Reddy V, D. Janakiram. 1038-1043 [doi]
- New Join Operator Definitions and Implementation Methods for Sensor NetworksSeungjae Lee, Changhwa Kim, Sangkyung Kim. 1044-1052 [doi]
- An Adaptive Resource Flowing Scheme amongst VMs in a VM-Based Utility ComputingYing Song, Yuzhong Sun, Hui Wang, Xining Song. 1053-1058 [doi]
- Using Moodle and Other Software Tools in EFL Courses in a Japanese IT UniversityJohn Brine, Ian Wilson, Debopriyo Roy. 1059-1064 [doi]
- A Formal Framework for Description of Semantic Web ServicesJiang Zhixiong, Qian Leqiu, Pen Xin. 1065-1070 [doi]
- A Fault Detection Mechanism for Service-Oriented Architecture Based on Queueing TheoryHao-Peng Chen, Cheng Zhang. 1071-1076 [doi]
- Enabling QoS for Service-Oriented Workflow on GRIDLi Guo, Andrew Stephen McGough, Asif Akram, Dave Colling, Janusz Martyniak, Marko Krznaric. 1077-1082 [doi]
- A Messaging Network to Realize an SOA-Based SystemTakafumi Hayashi, Hideyuki Fukuhara, Ryutaroh Fuijta, Toshiaki Miyazaki, Senro Saito. 1083-1088 [doi]
- Ontology Based User Profiling in Personalized Information Service AgentJianguo Pan, Bofeng Zhang, Shufeng Wang, Gengfeng Wu, Daming Wei. 1089-1093 [doi]
- A Development of Ubiquitous Biomedical Interface for Facilitating Medical Device ConnectivityTung Tran, Hwa-Sun Kim, Hune Cho. 1094-1099 [doi]
- Development of P300 Detection Algorithm for Brain Computer Interface in Single TrialHiroyuki Ishita, Motoki Sakai, Ji nei Watanabe, Wenxi Chen, Daming Wei. 1100-1105 [doi]
- Pathological Voice Classification Based on a Single Vowel s Acoustic FeaturesCe Peng, Wenxi Chen, Xin Zhu, Baikun Wan, Daming Wei. 1106-1110 [doi]
- Web Based Injury Surveillance System (WBISS) for Road Traffic InjuriesAchala Upendra Jayatilleke, Chandrajith Ashuboda Marasinghe, Shinji Nakahara, St Nandasara, Achini Jayatilleke, Masamine Jimba. 1111-1115 [doi]
- RßHpred: Prediction of Right-Handed ß-Helix Fold from Protein Sequence Using SVM and Protein ThreadingSiddharth Singh, Krishnan Hajela, Ashwini Kumar Ramani. 1116-1121 [doi]
- Development of Digital Image Surface and Its Application to Derived 12-Lead ECGKunio Takahashi, Daming Wei. 1122-1126 [doi]