Abstract is missing.
- Integrated Multi Mobile Object Scheme for Ubiquitous Sensor NetworkSung Won Kim, Eun-Ha Song, Dong-Hwan Park, Hyeon Park, Sangjoon Park, Young-Sik Jeong. 1-6 [doi]
- Hybrid Immune Detector Maturation Algorithm with LifeCycle ModelJungan Chen, Feng Liang, Wenxin Chen. 1-6 [doi]
- Towards a Performance Evaluation Model for Database DesignsRasha Osman, Irfan Awan, Michael E. Woodward. 1-6 [doi]
- Distributed Markov Chain Monte Carlo Particle FilteringDanling Wang, Qin Zhang, John Morris. 1-5 [doi]
- A Fine-Grained Localization Scheme Using a Mobile Beacon Node for Wireless Sensor NetworksKezhong Liu, Ji Xiong, Yongqiang Cui, Dong Han. 1-6 [doi]
- Approximation Algorithms for Optimizing Privacy and UtilityPranav Khaitan, Korra Sathya Babu, Sanjay Kumar Jena, Banshidhar Majhi. 1-6 [doi]
- Characteristic of Korea SW Process Certification ModelSun-Myung Hwang. 1-4 [doi]
- A Two-Tier Approach to Grid Workflow SchedulingDietmar Sommerfeld, Harald Richter. 1-7 [doi]
- Model-Directed Multi-Level Parallelization for Multi-Task Programs on the Cell BEMiao Wang, Nicolas Benoit, François Bodin. 1-6 [doi]
- Fuzzy Curvelet Based Fully Automated Segmentation of Brain from MR ImagesM. Arfan Jaffar, Qurat-ul-Ain Aini, Sohail Masood, Amjad Iqbal, Arshad Javed, Anwar M. Mirza. 1-6 [doi]
- A Paillier Based Threshold Signature SchemeChuan Chen, Ke-Wei Lv, Yi-Xin Zhu. 1-6 [doi]
- An Approach of Splitting Web Sequential Access Log for Accurate Web RecommendationKwangHo Yoon, Jaekwang Kim, Seunghoon Lee, Jee-Hyong Lee. 1-5 [doi]
- Project Risk Assessment for Customer Relationship Management Using Adaptive Nero Fuzzy Inference System (ANFIS)Seyed Hossein Iranmanesh, Seyed Mostafa Alem, Eisa Maleki Berneti. 1-7 [doi]
- Energy Efficient Cooperative MIMO Communication for Uncorrelated Data Transmission at Wireless Sensor NetworkMohammad Rakibul Islam, Jinsang Kim. 1-6 [doi]
- Signaling Cost Analysis of Mobility Protocols Using City Section Mobility ModelMd. Shohrab Hossain, Mohammed Atiquzzaman. 1-6 [doi]
- Automatic Generation of Interesting GamesZahid Halim, Abdul Rauf Baig. 1-6 [doi]
- Multiratecast in Wireless Fault Tolerant Sensor and Actuator NetworksXuehong Liu, Arnaud Casteigts, Nishith Goel, Amiya Nayak, Ivan Stojmenovic. 1-6 [doi]
- A Method for Immiscible Fluid SimulationYounghee Kim, Soo Hyoung Pyo, Bonki Koo. 1-4 [doi]
- Energy Efficient Privacy Preserved Data Gathering in Wireless Sensor Networks Having Multiple SinksHayretdin Bahsi, Albert Levi. 1-8 [doi]
- Group Key Management Using Device ID in Ad-hoc NetworkJong Sik Moon, Im-Yeong Lee, Seo-Il Kang. 1-6 [doi]
- A Model-Driven Scrum Process for Service-Oriented Software Reengineering: mScrum4SOSRSam Chung, Daehee Won, Seung-Ho Baeg, Sangdeok Park. 1-8 [doi]
- Trusted P2P Group InteractionRachid Anane, Steven Marrocco, Behzad Bordbar. 1-8 [doi]
- A Time Influence Analysis for Web Page Recommender SystemChen-Chung Chi, Nai-Lung Tsao, Chin-Hwa Kuo. 1-6 [doi]
- Static Analysis of Java Source Code to Generate Security-Relevant Behavior Model Based on Extended Pushdown AutomatonXudong Zheng, Jinglei Ren, Xiaojuan Zheng, Yonglong Wei, Chen Sun. 1-6 [doi]
- Modeling and Analysis of the Execution Context in WS-BPELZhao Wu, Naixue Xiong, Lei Yuan, Xiong Wei, Jong Hyuk Park. 1-6 [doi]
- Review on Mobile Workforce Management System for Electricity Supply IndustriesFaridah Hani Mohamed Salleh, Zaihisma Che Cob, Mohana Shanmugam, Siti Salbiah Mohamed Shariff. 1-5 [doi]
- An Artificial Vision-Based Lane Detection AlgorithmNadra Ben Romdhane, Mohamed Hammami, HanĂȘne Ben-Abdallah. 1-6 [doi]
- Multi Agent Based Mine Detection and Route Planning Using Learning Real Time A* AlgorithmKashif Zafar, Abdul Rauf Baig, Shahzad Badar Qazi, Hasnat Naveed. 1-7 [doi]
- Feature Weighting Information-Theoretic Co-Clustering for Document ClusteringYunming Ye, Xutao Li, Biao Wu, Yan Li. 1-6 [doi]
- Impossible Collision Based Side-Channel Attacks on HIGHT with Reduced Masked RoundsYuseop Lee, Jongsung Kim, Pil Joong Lee, Yeonjung Kang, Hyangjin Lee. 1-4 [doi]
- Design and Implementation of IPsec on a Bare PCN. Kazemi, Alexander L. Wijesinha, Ramesh K. Karne. 1-8 [doi]
- Mining Comparative Sentences from Korean Text Documents Using Sentential Structure Analysis Combined with Machine Learning TechniquesYeong Hyeon Gu, Seong-Joon Yoo. 1-6 [doi]
- A Path Switching Scheme for SCTP Based on Round Trip DelayFang-Yie Leu, Yong-Lon Chen. 1-6 [doi]
- Improved Query Plans for Unnesting Nested SQL QueriesPranav Khaitan, Satish Kumar M, Korra Sathya Babu, Sanjay Kumar Jena. 1-6 [doi]
- A Soft Computing Approach to Rainfall Intensity Classification Using TRMM/TMI DataShan-Tai Chen, Hong-Zhe Luo, Tsung-Chun Li, Wann-Jin Chen. 1-6 [doi]
- A Hierarchical Approach to Landmarks Detection in Taekwondo Poomsae VideosMunther Abualkibash, James Gedney, Yongbom Kim, JeongKyu Lee. 1-6 [doi]
- Routing in the Presence of Groups in Mobile Ad Hoc NetworksMadhusoodan Parthasarathy, Min Sik Kim. 1-8 [doi]
- Automatic Testing of Financial Charting Software Component: A Case Study on Point and Figure ChartK. Y. Sim, C. S. Low, Fei-Ching Kuo. 1-7 [doi]
- Target Identification of an Antibacterial Compound from Data Mining of 2-D Gel ImagesKuo-Yuan Hwa, Di-Shuan Chiang, Chen-Wen Yao. 1-6 [doi]
- An Improved Algorithm for Completely Hiding Sensitive Association Rule SetsShan-Tai Chen, Shih-Min Lin, Chi-Yii Tang, Guei-Yu Lin. 1-6 [doi]
- Extracting Content from Web Pages Using the Sliding WindowLiu Yang, Chunping Li, Ming Gu. 1-6 [doi]