Abstract is missing.
- Keynote I: High dimensional data analysis in Computer VisionDavid Suter. 1 [doi]
- Keynote II: Ubiquitous/pervasive intelligence: Visions and challengesLaurence Tianruo Yang. 2 [doi]
- Keynote III: Detection and traceback of DDoS attacksWanlei Zhou. 3 [doi]
- Keynote IV: Dynamic mobility managementAlbert Y. Zomaya. 4 [doi]
- Linear mesh deformation with snake constraintQiuer Xu, Xiuzi Ye, Sanyuan Zhang, Yin Zhang. 5-11 [doi]
- Triangulation of Implicit Surfaces Based on Particle SystemYuanfeng Zhou, Caiming Zhang, Pengbo Bo, Weitao Li. 12-17 [doi]
- A new volume-data resampling method for shear-warp rendering algorithmZenghai Hu, Caiming Zhang, Yuanfeng Zhou. 18-23 [doi]
- A software environment for practical graph applicationsWei Lai. 24-29 [doi]
- An improved method of parallax mappingRongHua Gao, Baocai Yin, Dehui Kong, Zhang Yong, Huilin Si. 30-34 [doi]
- Using grid for accelerating density-based clusteringShaaban Mahran, Khaled Mahar. 35-40 [doi]
- Fast variable block motion estimation based on adaptive search for H.264/AVC systemShih-Chang Hsia, Po-Yi Hong. 41-46 [doi]
- Sequence-based SOM: Visualizing transition of dynamic clustersKen-ichi Fukui, Kazumi Saito, Masahiro Kimura, Masayuki Numao. 47-52 [doi]
- A fast algorithm for cofactor implication checking and its application for knowledge discoveryShin-ichi Minato. 53-58 [doi]
- +, α)-sensitive k-anonymity: A new enhanced privacy protection modelXiaoxun Sun, Hua Wang, Jiuyong Li, Traian Marius Truta, Ping Li. 59-64 [doi]
- A hybrid approach to automatic text summarizationTe-Ming Chang, Wen-Feng Hsiao. 65-70 [doi]
- Dimension reduction using least squares regression in multi-labeled text categorizationCheong Hee Park. 71-76 [doi]
- Mining top-k closed itemsets using best-first searchPanida Songram, Veera Boonjing. 77-82 [doi]
- An extended exponential index scheme for Multi-disk broadcast in a single wireless channelKiyoung Park, Sungwon Jung. 83-88 [doi]
- The analysis of research fields of chinese natural science funds based on text classificationYanzhong Dang, Zhaoguo Xuan, Li Chen. 89-94 [doi]
- The study on Detecting Near-Duplicate WebPagesYujuan Cao, Zhendong Niu, Weiqiang Wang, Kun Zhao. 95-100 [doi]
- Parallel high-dimensional index structure for content-based information retrievalJaewoo Chang, Ahreum Lee. 101-106 [doi]
- Materialization-based query processing algorithms on road networksAhreum Lee, Ahreum Kim, Jaewoo Chang. 107-112 [doi]
- A new implementation of similar segment search in an arbitrary number of time-seriesKosuke Sugai, Masahide Sugiyama. 113-118 [doi]
- Detecting and tracing plagiarized documents by reconstruction plagiarism-evolution treeChang-Keon Ryu, Hyong-Jun Kim, Seung-Hyun Ji, Gyun Woo, Hwan-Gue Cho. 119-124 [doi]
- KLNCC: A new nonlinear correlation clustering algorithm based on KL-divergenceChaofeng Sha, Xipeng Qiu, Aoying Zhou. 125-130 [doi]
- Cost-sensitive semi-supervised classification using CS-EMZhenxing Qin, Shichao Zhang, Li Liu, Tao Wang. 131-136 [doi]
- Dynamic information integration using object deputy modelJunqiang Liu, Xiaoling Guan. 137-142 [doi]
- An indexing scheme for efficient camera angle invariant image retrievalYoonsik Tak, Eenjun Hwang. 143-148 [doi]
- Application of calendar-based temporal classification to forecast customer load patterns from load demand dataHeon Gyu Lee, Bum Ju Lee, Jin-Ho Shin, Long Jin, Cheng Hao Jin, Keun Ho Ryu. 149-154 [doi]
- Constraint optimization for a system of relational databasesSoumya Burugu, Praveen Madiraju, Hamidah Ibrahim. 155-160 [doi]
- Design issues of XTQ languageXuhui Li, Mengchi Liu. 161-166 [doi]
- Schemaless approach of mapping XML document into Relational DatabaseIbrahim Dweib, Ayman Awadi, Seif Elduola Fath Elrhman, Joan Lu. 167-172 [doi]
- Using CBIR and semantics in 3D-model retrievalRaoul Pascal Pein, Milton Amador, Joan Lu, Wolfgang Renz. 173-178 [doi]
- An extensible query language for content based image retrieval based on LuceneRaoul Pascal Pein, Joan Lu, Wolfgang Renz. 179-184 [doi]
- Extending dependencies with conditions for data cleaningWenfei Fan. 185-190 [doi]
- Identifying insightful salinity and temperature variations in ocean dataYo-Ping Huang, Li-Jen Kao, Frode Eika Sandnes. 191-196 [doi]
- A new join-less approach for co-location pattern miningLizhen Wang, Yuzhen Bao, Joan Lu, Jim Yip. 197-202 [doi]
- A bank customer credit evaluation based on the decision tree and the simulated annealing algorithmYi Jiang, Yan Chen, Zhimin Zeng, Xiangjian He. 203-206 [doi]
- Power consumption reduction scheme focusing on the Depth of Speculative ExecutionHideki Oshima, Ryotaro Kobayashi, Kazuki Shimura, Toshio Shimada. 207-212 [doi]
- A multi-service Token Bucket Algorithm for MAC QoS system in HFC access networkXiaotong Zhang, Peiya Li, Qin Wang, Chong Li. 213-217 [doi]
- FARS: A page replacement algorithm for NAND flash memory based embedded systemsOhhoon Kwon, Hyokyung Bahn, Kern Koh. 218-223 [doi]
- A new reliability evaluation method for embedded systemJie Yu, Xuehai Zhou. 224-230 [doi]
- Implementation and evaluation of an on-device customizable user interface for smart devicesEigo Okada, Xiaojin Sun, Mitsuko Sato, Yukikazu Nakamoto. 231-236 [doi]
- Efficient multiplierless channel filters for multi-standard SDRDouglas L. Maskell, A. Prasad Vinod. 237-242 [doi]
- A modified interactive oriented scheduler for GUI-based embedded systemsLi Lo, Liang-Teh Lee, Huang-Yuan Chang. 243-248 [doi]
- Learn adaptive dynamic policy under mixed multi-agent environmentXiao Zheng, Shiyong Zhang. 249-254 [doi]
- Array processor featuring an effective FIFO-based data stream managementToshiaki Miyazaki, Yusuke Nomoto, Yuka Sato, Stanislav G. Sedukhin. 255-260 [doi]
- Detection of first races for debugging message-passing programsMi-Young Park, Sang-Hwa Chung. 261-266 [doi]
- Model-guided strip size selection for minimal execution time on imagine stream processorJing Du, Yuhua Tang, Fujiang Ao, Tao Tang, Xuejun Yang. 267-272 [doi]
- Novel management architecture for large-scale server clusterZhenghua Xue, Xiaoshe Dong, Shengqun Fan. 273-278 [doi]
- Using MPI to execute a FuzzyCLIPS application in parallel in heterogeneous computing systemsChao-Chin Wu, Lien Fu Lai, Yu-Shuo Chang. 279-284 [doi]
- A flow-based prediction scheme to manage resources in enterprise data centersHyunsik Choi, Kwonyong Lee, Sungyong Park. 285-290 [doi]
- Acceleration of a finite-difference method with general purpose GPUs - Lesson learnedAna Balevic, Lars Rockstroh, Wenbin Li, Jürgen Hillebrand, Sven Simon, Andreas Tausendfreund, Stefan Patzelt, Gert Goch. 291-294 [doi]
- An efficient scheduling algorithm for grid computing with periodical resource reallocationCho-chin Lin, Chun-Wei Shih. 295-300 [doi]
- Analysis of planar mirror catadioptric stereo systems based on epipolar geometryHsien-Huang P. Wu, Soon-Lin Chen, Ping-Kuo Weng, Ying-Yih Wu. 301-306 [doi]
- A multiple expert algorithm for the binarization of Korean Identity card imagesIn Seop Na, Sang-Cheol Park, Ji Woong Kim, Soo-Hyung Kim. 307-311 [doi]
- Nose detection based feature extraction on both normal and abnormal 3D facesWenhao Zhu, Yanyun Wang, Baogang Wei. 312-316 [doi]
- A performance study on deterministic label graph matching algorithmYintang Dai, Shiyong Zhang. 317-320 [doi]
- SVM based ASM for facial landmarks locationChunhua Du, Qiang Wu, Jie Yang, Zheng Wu. 321-326 [doi]
- Feature detection of electrical feeder lines with galloping motionHisato Aota, Yuichi Yaguchi, Ryuichi Oka. 327-332 [doi]
- Low-complexity text extraction in Korean signboards for mobile applicationsToan Nguyen Dinh, Jonghyun Park, Gueesang Lee. 333-337 [doi]
- Image retrieval based on semantics of intra-region color propertiesAtul Sajjanhar, Guojun Lu, Dengsheng Zhang, Wanlei Zhou, Yi-Ping Phoebe Chen. 338-343 [doi]
- Sand grains tracking in dense grain image sequencesChunli Wang, Dapeng Chai, Rui Ma, Xiaohui Lin, Chun Wang. 344-349 [doi]
- Learning graph neighborhood topological order for image and manifold morphological processingOlivier Lézoray, Abderrahim Elmoataz, Vinh-Thong Ta. 350-355 [doi]
- A new method for image resizingCaiqing Zhang, Caiming Zhang, Xuemei Li. 356-360 [doi]
- Gabor phase embedding of Gait Energy Image for identity recognitionXiaochao Yang, Tianhao Zhang, Yue Zhou, Jie Yang. 361-366 [doi]
- An improved two-layer SOM classifier for handwritten numeral recognitionShujing Lu, Xiao Tu, Yue Lu. 367-371 [doi]
- A hierarchically combined classifier for license plate recognitionLihong Zheng, Xiangjian He, Qiang Wu, Wenjing Jia, Bijan Samali, Marimuthu Palaniswami. 372-377 [doi]
- Periodic hidden Markov model-based workload clustering and characterizationNing Li, Shun-Zheng Yu. 378-383 [doi]
- Watermarking of ordered dither halftone images by bit interleavingBrian K. Lien, Chao-Yi Chang. 384-389 [doi]
- ABDM: An extended flexible delegation model in RBACMin Li, Hua Wang. 390-395 [doi]
- Using a mobile device to enhance customer trust in the security of remote transactionsThair Attallah Al-Dala'in, Suhuai Luo, Peter Summons. 396-401 [doi]
- Trusted Email protocol: Dealing with privacy concerns from malicious email intermediariesJulian Jang, Surya Nepal, John Zic. 402-407 [doi]
- Identity Management Architecture: A new directionPeter White. 408-413 [doi]
- Data privacy and integrity appropriate for disk protectionFangyong Hou, Dawu Gu, Nong Xiao, Yuhua Tang. 414-419 [doi]
- Random password generation of OTP system using changed location and angle of fingerprint featuresByungRae Cha, Kyungjun Kim, HyunShik Na. 420-425 [doi]
- Developing an effective watermarking algorithm for video retrievalMohd Afizi Mohd Shukran. 426-431 [doi]
- An overview of recent advances in intrusion detectionMohd Fadzli Marhusin, David Cornforth, Henry Larkin. 432-437 [doi]
- Efficient labeling scheme of XML data considering update operationsDong Chan An, Seog Park. 438-443 [doi]
- Group decision making based on computing with linguistic variables and an example in information system selectionChen-Tung Chen, Hui-Ling Cheng. 444-449 [doi]
- Architecture for migratory adaptive user interfacesTakuto Yanagida, Hidetoshi Nonaka. 450-455 [doi]
- Modeling and knowledge representation of machine element design for intelligent design support systemsZhihua Zhang. 456-461 [doi]
- Gender and cultural differences in adoption of e-business infrastructure in UAEFahim Akhter. 462-465 [doi]
- Concurrency control in Web service orchestrationJuha Puustjärvi. 466-472 [doi]
- A new method on the detection of near-replicas of web pagesJia-heng Zheng, Li-xia Wei, Hongye Tan. 473-478 [doi]
- Primary content extraction with Mountain ModelLidong Bing, Yexin Wang, Yan Zhang, Hui Wang. 479-484 [doi]
- Tag-based user modeling using formal concept analysisYun Zhang, Boqin Feng. 485-490 [doi]
- Object oriented regular expressionsHenry Larkin. 491-496 [doi]
- A new session management method for efficient mobile access to web applicationsMunakata Satoshi, Kunio Saito, Masahiro Hiji. 497-502 [doi]
- A semantic approach for more robust and efficient service discoveryPrakash Kadel, Ji-Ae Shin, Ho-Jin Choi. 503-508 [doi]
- Optimizations for query index updating in finite automaton based XML stream filtering systemsYongrui Qin, Weiwei Sun, Ping Yu 0001, Zhuoyao Zhang. 509-514 [doi]
- Online conference system for collaborative work to make thematic mapsManabu Kanzawa, Naru Hirata, Hirohide Demura, Noriaki Asada. 515-519 [doi]
- A compressing method for genome sequence cluster using sequence alignmentKwang Su Jung, Nam Hee Yu, Seung-Jung Shin, Keun Ho Ryu. 520-525 [doi]
- Extraction of exudates and blood vessels in digital fundus imagesGiri Babu Kande, Satya Savithri Tirumala, P. Venkata Subbaiah. 526-531 [doi]
- Investigating the binding area of protein surface using MCL algorithmKwang Su Jung, Ki Jin Yu, Yong Je Chung, Keun Ho Ryu. 532-537 [doi]
- Wavelet shrinkage applications of EEG-ECG-based human-computer interfaceMotoki Sakai, Daming Wei. 538-543 [doi]
- Walking stability analysis by age based on Dynamic Time WarpingBofeng Zhang, Ke Yan, Susu Jiang, Daming Wei. 544-548 [doi]
- 2CP for multipoint-to-point video streamingJung-shan Chien, Sheng-Ching Lin, Ray-I Chang, Chia-Hui Wang. 549-554 [doi]
- Popularity and prefix aware interval caching for multimedia streaming serversOhhoon Kwon, Hyokyung Bahn, Kern Koh. 555-560 [doi]
- A new computation-aware scheme for motion estimation in H.264Chia-Yu Chang, Jin-Jang Leou, Shyi-Shiun Kuo, Hsuan-Ying Chen. 561-565 [doi]
- Low latency overlay construction for peer-to-peer live streamingXinggong Zhang, Yan Pang, Zongming Guo. 566-570 [doi]
- An embedded compression algorithm integrated with Motion JPEG2000 system for reduction of off-chip video memory bandwidthChang-Hoon Son, Seong-Mo Park, Young-Min Kim. 571-576 [doi]
- Here and there: Experiencing co-presence through mixed reality-mediated collaborative design systemRui Wang, Xiangyu Wang. 577-582 [doi]
- Fast spotter: An approximation algorithm for continuous dynamic programmingYuichi Yaguchi, Keitaro Naruse, Ryuichi Oka. 583-588 [doi]
- An adaptive video watermarking technique based on DCT domainCheng-Han Yang, Hui-Yu Huang, Wen-Hsing Hsu. 589-594 [doi]
- A parallel architecture for GFA modeling in video codingAbdel Ejnioui, Paul Bao. 595-600 [doi]
- PeerCDN: A novel P2P network assisted streaming content delivery network schemeJie Wu 0003, ZhiHui Lu, Bisheng Liu, Shiyong Zhang. 601-606 [doi]
- TCP-friendly streaming video system with error-resilient coding over wireless vertical handover environmentJae-Young Pyun, Ho-Jin Choi. 607-612 [doi]
- Enhancement of PAPR reduction using dynamic PTS algorithm in multiple antennas systemGuo-Fang Dong, Fei Gao, Jing Fan, Zi-bin Zhao. 613-617 [doi]
- Challenges and recent advances in QoS provisioning in wireless mesh networksShivanajay Marwaha, Jadwiga Indulska, Marius Portmann. 618-623 [doi]
- Performance analysis of an adaptive backoff scheme for Ad Hoc networksJing Fan, Fei Gao, Wan-Sheng Wang, Guo-Fang Dong. 624-629 [doi]
- Performance study of video streaming in commercial UMTS networkRachod Patachaianand, Kumbesan Sandrasegaran. 630-633 [doi]
- An approach to select the best spanning tree in Metro Ethernet networksGhasem Mirjalily, Mohammad Hadi Karimi Tafti, Fazlollah Adibniya, Shahram Rajai. 634-639 [doi]
- Cooperative channel operation MAC protocol for WLAN based indoor cognitive radio network systemsNan Hao, Jae-Kark Choi, Sang-Jo Yoo. 640-645 [doi]
- Fast group scanning scheme with dynamic neighbor base station list in IEEE 802.16e networksJae-Kark Choi, Nan Hao, Sang-Jo Yoo. 646-651 [doi]
- Fuzzy logic based modelling and analysis of network trafficAbul Rahman, Paul Kennedy, Andy Simmonds, Jenny Edwards. 652-657 [doi]
- Towards fair P2P auctions over MANETsInes Doghri, Hella Kaffel Ben Ayed. 658-663 [doi]
- Applying graph coloring in resour ce coordination for a high-density wireless environmentLi Zheng, Doan B. Hoang. 664-669 [doi]
- Pyro implementation of swarm-bots exploring target objects in an area with irregular barriersByung-Joon Lee, Hyun-Ju Jung, Gyun Woo, Sung-Youb Jung, Joon-Key Jeon. 670-675 [doi]
- Improving the performance of MPEG-4 transmission in IEEE 802.15.3 WPANWei-Tsong Lee, Fong-Hao Liu, Hsiang-Fu Lo. 676-681 [doi]
- Mobility management using movement feature for next generation cellular networksDaisuke Senzaki, Goutam Chakraborty. 682-687 [doi]
- Asynchronous mobileweb services: Concept and architectureFahad Aijaz, Bilal Hameed, Bernhard Walke. 688-693 [doi]
- A novel formal framework for secure dynamic services compositionDong-Hong Xu, Yong Qi, Di Hou, Gong-Zhen Wang, Ying Chen. 694-699 [doi]
- Multi run ICA and surface EMG based signal processing system for recognising hand gesturesGanesh R. Naik, Dinesh Kant Kumar, Marimuthu Palaniswami. 700-705 [doi]
- Protecting web services with Service Oriented Traceback ArchitectureAshley Chonka, Wanlei Zhou, Yang Xiang. 706-711 [doi]
- A Gnutella inspired ubiquitous service discovery framework for pervasive computing environmentTianyin Xu, Baoliu Ye, Mitsunori Kubo, Arata Shinozaki, Sanglu Lu. 712-717 [doi]
- Towards a software diagnosis method based on rough set reasoningChengying Mao, Xiaohua Hu, Yansheng Lu. 718-723 [doi]
- An analysis of software process improvement for sustainable development in ThailandSuphak Suwanya, Werasak Kurutach. 724-729 [doi]
- Dynamic pull-down menu organization in run-time by analyzing menu selection behaviorsYoung Jin Ro, Ho-Jin Choi, Danhyung Lee, In-Young Ko. 730-735 [doi]
- An approach to non-functional requirements analysis at software architecture levelSima Emadi, Fereidoon Shams. 736-741 [doi]
- Software usability architecturesAnastasis A. Sofokleous. 742-747 [doi]
- Constructing a chaos proofing pre-development framework to manage chaos in a chaos-prone systems development environmentMarini Othman, Abdullah Mohd Zin, Abdul Razak Hamdan. 748-753 [doi]
- Trace anonymity in the OTS/CafeOBJ methodWeiqiang Kong, Kazuhiro Ogata, Jian Cheng, Kokichi Futatsugi. 754-759 [doi]
- Automated generation of product use case scenarios in product line developmentWoo-seok Choi, Sungwon Kang, Ho-Jin Choi, Jongmoon Baik. 760-765 [doi]
- Non-functional property specifications for WRIGHT ADLBasem Suleiman, Vladimir Tosic, Eldar Aliev. 766-771 [doi]
- UMLSlicer: A tool for modularizing the UML metamodel using slicingJung Ho Bae, Heung Seok Chae. 772-777 [doi]
- A new parameterized string matching algorithm by combining bit-parallelism and suffix automataRajesh Prasad, Suneeta Agarwal. 778-783 [doi]
- Utilizing semantic Web 2.0 for self-reconfiguration of SOA based agent applications in Intelligent Service RobotsJaejeong Lee, Jinhan Kim, Byungjeong Lee, Chisu Wu. 784-789 [doi]
- Extending ATAM to assess product line architectureTaeho Kim, In-Young Ko, Sungwon Kang, Danhyung Lee. 790-797 [doi]
- Module-based large-scale software evolution based on complex networksTao Chen, Qing Gu, Shusen Wang, Xiaoan Chen, Daoxu Chen. 798-803 [doi]
- The Research of zero packet loss hand-off mechanism in SIP-based wireless networksChing-Lung Chang, Jing-Chao Yang. 804-808 [doi]
- A context representation and management mechanism towards ubiquitous intelligenceLuo Sun, Peng Dai, Linmi Tao, Guangyou Xu. 809-814 [doi]
- Analysis and improvement of the Dynamic Load Balancing of Overlay-based WSNHang Qin, Zhongbo Wu. 815-820 [doi]
- MTT-Mobicast : Maneuvering Target Tracking Mobicast protocol for wireless ad hoc sensor networksYi Wang, Jun Yang 0009, Xinyu Yang, Deyun Zhang. 821-826 [doi]
- Prediction revision strategies for data transmission in wireless sensor networksJun Yang 0009, Yi Wang, Deyun Zhang. 827-832 [doi]
- Time-based insertion methods for monitoring sensor dataYang Koo Lee, Ling Wang, Young Jin Jung, Hi-Seok Kim, Keun Ho Ryu. 833-838 [doi]
- Combining hierarchical segmentation and shape context based recognitionFenglei Yang, Yue Lu, Ye Duan. 839-844 [doi]
- Robust background extraction scheme using histogram-wise for real-time tracking in urban traffic videoAnh-Nga Lai, Hyo Sun Yoon, Gueesang Lee. 845-850 [doi]
- A visualization system of source codes using FOLMin-Jung Bae, Jeong-Hoon Ji, Gyun Woo. 851-856 [doi]
- Motion-based object detection using 3D wave digital filtersSam Schauland, Jörg Velten, Anton Kummert. 857-861 [doi]
- Evaluation of a method to solve the perspective-two-point problem using a three-axis orientation sensorLoic Merckel, Toyoaki Nishida. 862-867 [doi]
- An FPGA implementation of 30Gbps security module for GPON systemsTruong Quang Vinh, Ju-Hyun Park, Young-Chul Kim 0001, Kwang-Ok Kim. 868-872 [doi]
- An efficient verification of quantum circuits under a practical restrictionShigeru Yamashita, Shin-ichi Minato, D. Michael Miller. 873-879 [doi]
- Layer assignment considering manufacturability in X-architecture clock treeChia-Chun Tsai, Wei-Shi Lin, Jan-Ou Wu, Chung-Chieh Kuo, Trong-Yen Lee. 880-885 [doi]
- Arithmetic precision of the Generalized Hebbian Algorithm for hardware implementationKaai Kojima, Yuichi Okuyama, Kenichi Kuroda. 886-890 [doi]
- Implementation of a combined autocorrelation method for real-time tissue elasticity imaging on FPGADaisuke Ohwada, Yuichi Okuyama, Kenichi Kuroda. 891-897 [doi]