Abstract is missing.
- Modeling Redundancy: Quantitative and Qualitative ModelsAli Mili, Lan Wu, Frederick T. Sheldon, Mark Shereshevsky, Jules Desharnais. 1-8 [doi]
- A Contribution to the Formal Checking of Multi-Agents SystemsFaiza Belala, A. Boucherit. 9-16 [doi]
- Synchronized Transitions Preemptive Time Petri Nets: A new model towards specifying multimedia requirementsAbdelkrim Abdelli, Nadjib Badache. 17-24 [doi]
- Adaptive Search in a Semi-Structured Peer-to-Peer SystemChristof Squarr, Jens Bruhn, Guido Wirtz. 25-32 [doi]
- Formal Specification of Design Patterns and Their InstancesToufik Taibi, Fathi Taibi. 33-36 [doi]
- QoS Assurance of Handover TCP Flows in a DiffServ-enabled Mobile Wireless Access NetworkLi Huang, Muhammad Jaseemuddin, Hesham El-Sayed. 37-44 [doi]
- QoS Management and Real Time Agreement Protocols for Resource Reservation for Multimedia Mobile Radio NetworkSonia Ben Rejeb, Zièd Choukair, Sami Tabbane. 45-53 [doi]
- QoS Extensions to Mobile Ad Hoc Routing Supporting Real-Time ApplicationsKároly Farkas, Dirk Budke, Bernhard Plattner, Oliver Wellnitz, Lars Wolf. 54-61 [doi]
- Enhanced Class-based Packet Scheduling Policy for QoS Provisioning in Multimedia Cellular NetworksTarek Bejaoui, Nidal Nasser, Véronique Vèque. 62-69 [doi]
- ATHOMIC: Architecture managing Tcp Handoff Over Mobile Ip ConnectionsJalel Ben-Othman, Lynda Mokdad, Octavio Ramirez Rojas. 70-73 [doi]
- A CAD Tool for Scalable, Variable Architecture Floating-Point Adder GeneratorA. J. Al-Khalili. 74-79 [doi]
- High-Speed Redundant Modulo 2n-1 AdderF. Kharbash, G. M. Chaudhry. 80-87 [doi]
- Low Power Hierarchical Multiplier and Carry Look-Ahead ArchitectureHimanshu Thapliyal, Neela Gopi, K. K. Pavan Kumar, M. B. Srinivas. 88-92 [doi]
- Pipelining GF(P) Elliptic Curve Cryptography ComputationAdnan Abdul-Aziz Gutub, Mohammad K. Ibrahim, Ahmad Kayali. 93-99 [doi]
- Novel Reversible Multiplier Architecture Using Reversible TSG GateHimanshu Thapliyal, M. B. Srinivas. 100-103 [doi]
- Parallel Online Ranking of Web PagesYasser Ganjisaffar, Kyumars Sheykh Esmaili, M. Ghodsi, Hassan Abolhassani. 104-109 [doi]
- Internet Traffic Modeling Using Integer-Valued Time SeriesZikuan Liu, Jalal Almhana, Vartan Choulakian, Robert McGorman. 110-117 [doi]
- Parallel Implementation of the PML Algorithm for Truncating Finite-Difference Time-Domain GridsOmar Ramadan, Oyku Akaydin. 118-122 [doi]
- On Compactly Encoding With Differential CompressionFouad B. Chedid, Pauline G. Mouawad. 123-129 [doi]
- A Priority-Based MLFQ Scheduler for CPU Power SavingMuhammad Kashif, Tarek Helmy, Emad A. El-Sebakhy. 130-134 [doi]
- Fusion of Thermal and Visual Images for efficient Face Recognition using Gabor FilterJahanzeb Ahmad, Usman Ali, Rashid Jalal Qureshi. 135-139 [doi]
- Face and Fingerprint biometrics Integration Model for Person Identification Using Gabor FilterIftikhar Ali, Usman Ali, Muhammad Imran Shahzad, Abdul Waheed Malik. 140-143 [doi]
- Ragged-Edge Array Coding for Reliable and Efficient Storage ArraysQutaibah M. Malluhi, M. F. Malouhi. 144-150 [doi]
- An Experimental and Industrial Experience: Avoiding Denial of Service via Memory ProfilingSaeed Abu-Nimeh, Suku Nair, Marco F. Marchetti. 151-158 [doi]
- Embedded Vision Module for Robot-soccerAndrzej Sluzek, Phung Khoi Duy Minh. 159-162 [doi]
- Regression Testing Web Services-based ApplicationsAbbas Tarhini, Hacène Fouchal, Nashat Mansour. 163-170 [doi]
- A Categorization Scheme for Semantic Web Search EnginesKyumars Sheykh Esmaili, Hassan Abolhassani. 171-178 [doi]
- Automated Context-Aware Adaptation of Web Service ExecutionsNanjangud C. Narendra, Srinivas Gundugola. 179-187 [doi]
- DaSIAn: A Tool for Estimating the Impact of Database Schema Modifications on Web ApplicationsSpyridon K. Gardikiotis, Nicos Malevris. 188-195 [doi]
- Web Service discovery based on Quality of ServiceYannis Makripoulias, Christos Makris, Yannis Panagis, Evangelos Sakkopoulos, Poulia Adamopoulou, Athanasios K. Tsakalidis. 196-199 [doi]
- Restricted Shortest Path Routing with Concave CostsPejman Khadivi, Shadrokh Samavi, Hossein Saidi. 200-207 [doi]
- Loss rates bounds for IP switches in MPLS networksHind Castel-Taleb, Lynda Mokdad, Nihal Pekergin. 208-214 [doi]
- On the Fault Patterns Properties in the Torus NetworksM. Hoseiny Farahabady, Farshad Safaei, Ahmad Khonsari, Mahmood Fathy. 215-220 [doi]
- Fair Channel Quality-Based Scheduling Scheme for HSDPA SystemBader Al-Manthari, Nidal Nasser, Hossam S. Hassanein. 221-227 [doi]
- A New MPLS-based Local Failure Recovery for Multicast CommunicationOmar Banimelhem, Anjali Agarwal, J. William Atwood. 228-231 [doi]
- A Reconfigurable Gaussian/Triangular Basis Functions Computation CircuitMuhammad Taher Abuelma atti, Abdullah Shwehneh. 232-239 [doi]
- Comparison of Multipliers Architectures through Emulation and Handle-C FPGA ImplementationMahmoud Al-Qutayri, Hassan R. Barada, Ahmed Al-Kindi. 240-247 [doi]
- An Optimized Design Approach for Squaring Large Integers Using Embedded Hardwired MultipliersShuli Gao, Noureddine Chabini, Dhamin Al-Khalili, J. M. Pierre Langlois. 248-254 [doi]
- High Speed Hardware Implementation of a Heuristic 2D Rectangle Placement AlgorithmAmina Y. Maarouf, Issam W. Damaj. 255-261 [doi]
- Accurate Total Static Leakage Current Estimation in Transistor StacksHussam Al-Hertani, Dhamin Al-Khalili, Come Rozon. 262-265 [doi]
- Computational Analysis of Mass Spectrometry Data Using Novel Combinatorial MethodsAhmed Fadiel, Michael A. Langston, Xinxia Peng, Andy D. Perkins, Hugh S. Taylor, Ozge Tuncalp, D. Vitello, Paul H. Pevsner, Frederick Naftolin. 266-273 [doi]
- A New Recombination Scheme for Diploid Genetic AlgorithmsMayada F. Abdul Halim, Abbas F. Abdul-Kader. 274-280 [doi]
- Evaluation of Breast Cancer Tumor Classification with Unconstrained Functional Networks ClassifierEmad A. El-Sebakhy, Kanaan A. Faisal, Tarek Helmy, Farag Azzedin, A. Al-Suhaim. 281-287 [doi]
- Modification of Mammograms for Early Diagnosis of Breast Cancer Using Wavelet and Neural NetworksA. R. Zolghadrasli, Zahra Maghsoodzadeh. 288-295 [doi]
- Protein Secondary Structure Reduction Methods Significantly Affect Prediction AccuracySaad Osman Abdalla Subair, Safaai Deris. 296-299 [doi]
- Avoiding Denial of Service via Stress TestingSaeed Abu-Nimeh, Suku Nair, Marco F. Marchetti. 300-307 [doi]
- Hidden Field Equations Cryptosystem PerformancesOmessaad Hamdi, Ammar Bouallegue, Sami Harari. 308-311 [doi]
- A Trust Framework for Pervasive Computing EnvironmentsSteven T. Wolfe, Sheikh Iqbal Ahamed, Mohammad Zulkernine. 312-319 [doi]
- Trust Ontology for Service-Oriented EnvironmentFarookh Khadeer Hussain, Elizabeth Chang, Tharam S. Dillon. 320-325 [doi]
- Secure Mobile Agent System for E-Business ApplicationsA. Kannammal, V. Ramachandran, N. Ch. S. N. Iyengar. 326-329 [doi]
- Software Defect Prediction Using Regression via ClassificationStamatia Bibi, Grigorios Tsoumakas, Ioannis Stamelos, Ioannis P. Vlahavas. 330-336 [doi]
- Compositional specification of event-based software architectural stylesImen Loulou, Ahmed Hadj Kacem, Mohamed Jmaiel, Khalil Drira. 337-344 [doi]
- Software Product Line Engineering and Dynamic Customization of a Radio Frequency Management SystemHassan Gomaa, Mazen Saleh. 345-352 [doi]
- Comprehensive Software Development ModelMuhammad Sibghatullah Siddiqui, Syed Jafar Hussain. 353-360 [doi]
- The Branding Analysis PatternHuáscar A. Sánchez, Mohamed E. Fayad. 361-364 [doi]
- DEPICT: A High-Level Formal Language For Modeling Constraint Satisfaction ProblemsAbdulwahed M. Abbas, Edward P. K. Tsang, Ahmad H. Nasri. 365-368 [doi]
- Performance Evaluation of Reservation Medium Access Control in IEEE 802.16 NetworksAhmed Doha, Hossam S. Hassanein, Glen Takahara. 369-374 [doi]
- An Uplink Performance Evaluation for Roaming-Based Multi-Operator WCDMA Cellular NetworksSalman A. Al Qahtani, Uthman Baroudi. 375-380 [doi]
- Architecture and Performance Analysis of the Multicast Balanced Gamma Switch for Broadband Communications1Cheng Li, Ramachandran Venkatesan, Howard M. Heys. 381-388 [doi]
- Access Channel Performance in CDMA2000Mohamed El-Tarhuni. 389-393 [doi]
- Performance Evaluation in Cellular (CDMA) System Using Smart Antenna with Adaptive Sectoring MethodA. R. Zolghadrasli, Arif Hussain Baba, Sh. Golbahar Haghighi, Basharat Amin Shah. 394-397 [doi]
- System Performance Analysis of Synchronous Hybrid Direct Sequence-Slow Frequency Hopping Spread Spectrum Multiple Access Communications System Using Support Vector MachinesMohammad A. Khan, Dingrong Shao. 398-401 [doi]
- Novel Heuristic and Genetic Algorithms for the VLSI Test Coverage ProblemWalid Ibrahim, Amr El-Chouemi, Hesham El-Sayed. 402-408 [doi]
- Exciting Stuck-Open faults in CMOS Circuits Using ILP TechniquesFadi A. Aloul, Assim Sagahyroon, Bashar Al-Rawi. 409-414 [doi]
- Femto Joule Switching for Nano ElectronicsValeriu Beiu, Jabulani Nyathi, Snorre Aunet, Mawahib H. Sulieman. 415-423 [doi]
- Multiplexing Schemes in Single-Electron TechnologyMawahib H. Sulieman, Valeriu Beiu. 424-428 [doi]
- Semi-Algorithmic Test Pattern GenerationHadi Shahriar Shahhoseini, Babak Hosseini Kazerouni. 429-432 [doi]
- A Highly Adaptive Acoustic Echo Cancellation Solution for VoIP Conferencing SystemsUmar Iqbal Choudhry, JongWon Kim, Hong Kook Kim. 433-436 [doi]
- A Scalable Sequential Pattern Mining AlgorithmJiahong Wang, Yoshiaki Asanuma, Eiichiro Kodama, Toyoo Takata. 437-444 [doi]
- Performance Comparison of Pattern Discovery Methods on Web Log DataMurat Ali Bayir, Ismail H. Toroslu, Ahmet Cosar. 445-451 [doi]
- FastLMFI: An Efficient Approach for Local Maximal Patterns Propagation and Maximal Patterns Superset CheckingShariq Bashir, Abdul Rauf Baig. 452-459 [doi]
- The N-tree: an Indexing Technique for Nearest-Neighbor QueriesFaïza Najjar, Hassenet Slimani. 460-467 [doi]
- Multi-Channel Communication for Wireless DatabaseShane Emmons, Mudasser F. Wyne. 468-471 [doi]
- An Improved Current Mirror CellMunir A. Al-Absi. 472-474 [doi]
- Formal Methods in the Enhancement of the Data Security Protocols of Mobile AgentsRaja Al-Jaljouli. 475-483
- Access control with prohibitions and obligationsPhilippe Balbiani, Fatima Harb, Ali Kaafarani. 484-492 [doi]
- The Best Irreducible Pentanomials For A Mastrovito GF MultiplierMohsen Bahramali, Hadi Shahriar Shahhoseini. 493-499 [doi]
- Predicting the Dynamic Nature of RiskOmar Khadeer Hussain, Elizabeth Chang, Farookh Khadeer Hussain, Tharam S. Dillon, Ben Soh. 500-507 [doi]
- Trust Relationships and Reputation Relationships for Service Oriented EnvironmentsFarookh Khadeer Hussain, Elizabeth Chang, Tharam S. Dillon. 508-510 [doi]
- Design of an Embedded Device for Surface Roughness MeasurementTarik Ozkul. 511-514 [doi]
- Towards Intentional Agents to Manipulate Belief, Desire and Commitment DegreesAdel Saadi, Zaïdi Sahnoun. 515-520 [doi]
- Agent Design Patterns Framework for MaSE/POAD MethodologyRadziah Mohamad, Safaai Deris, Hany H. Ammar. 521-528 [doi]
- GeneCity: A Multi Agent Simulation Environment for Hereditary DiseasesDemetrios Eliades, Andreas L. Symeonidis, Pericles A. Mitkas. 529-536 [doi]
- An Innovative Self-Configuration Approach for Networked Systems and ApplicationsHuoping Chen, Salim Hariri, Fahd Rasul. 537-544 [doi]
- Stable Analysis PatternsHaitham S. Hamza, Mohamed E. Fayad. 545-548 [doi]
- Power Efficient Algorithms for Computing Fast Fourier Transform over Wireless Sensor NetworksTurkmen Canli, Ajay Gupta, Ashfaq Khokhar. 549-556 [doi]
- Power Allocation and Coding for Image Transmission over Wireless ChannelsAkram Bin Sediq, Mohamed El-Tarhuni. 557-564 [doi]
- An Energy Efficient MAC Approach for Mobile Wireless Sensor NetworksPrasad Raviraj, Hamid Sharif, Michael Hempel, Song Ci. 565-570 [doi]
- Efficient Service Discovery forWireless Mobile Ad Hoc NetworksYu Yang, Hossam S. Hassanein, Afzal Mawji. 571-578 [doi]
- Toward the Mobile Grid: Service Provisioning in a Mobile Dynamic Virtual OrganizationMartin Waldburger, Burkhard Stiller. 579-583 [doi]
- Development of Hybrid Classification Methodology for Mining Skewed Data Sets - A Case Study of Indian Customs DataAnuj Kumar, Vishnuprasad Nagadevara. 584-591 [doi]
- Mining N-most Interesting Itemsets using Support-Ordered TriesMuhammad Umer Arshad, Muhammad Naeem Ayyaz. 592-599 [doi]
- Evaluation of Cluster Analysis Algorithms Enhanced by Using R*-TreesJiaxiong Pi, Yong Shi, Zhengxin Chen. 600-607 [doi]
- Functionally Classifying Genes from Microarray Data Using Linear and Non-linear Data ProjectionJahangheer S. Shaik, Mohammed Yeasin. 608-615 [doi]
- Distributed Computing for Formation Flying MissionsAbdul-Halim Jallad, Tanya Vladimirova. 616-620 [doi]
- A Novel Corner Detector Approach using Sliding RectanglesAsif Masood, Muhammad Sarfraz. 621-626 [doi]
- Online Learning: Evolving in Real Time a neural net Controller of 3D-robot-arm. Track and EvolveAhmed Lehireche, Abdellatif Rahmoun. 627-632 [doi]
- The vMatrix: Equi-Ping Game Server Placement For Pre-Arranged First-Person-Shooter Multiplayer MatchesAmr Awadallah, Mendel Rosenblum. 633-640 [doi]
- Reputation Relationship and Its Inner Relationships for Service Oriented EnvironmentsFarookh Khadeer Hussain, Elizabeth Chang, Tharam S. Dillon. 641-646 [doi]
- Topological Properties of Stretched GraphsPooya Shareghi, Hamid Sarbazi-Azad. 647-650 [doi]
- An Automated System For Real Time Fault Localization in Optical NetworksChedly Ben Yahya. 651-655 [doi]
- The Indeterministic Behavior of Scoped Memory in Real-Time JavaM. Teresa Higuera-Toledano. 656-664 [doi]
- Cache Optimization for Embedded Systems Running H.264/AVC Video DecoderAbu Asaduzzaman, Imad Mahgoub. 665-672 [doi]
- A Probability-Based Instruction Combining Method for Scheduling in VLIW ProcessorsReza Iraji, Hamid Sarbazi-Azad. 673-679 [doi]
- Serpent Cryptography on Static and Dynamic Reconfigurable HardwareIssam Damaj, May Itani, Hassan B. Diab. 680-684 [doi]
- Refactoring Tools and Complementary TechniquesMartin Drozdz, Derrick G. Kourie, Bruce W. Watson, Andrew Boake. 685-688 [doi]
- TOPER: A Tool Using Integrated Knowledge Reporting and Usability MethodsOsama K. Alshara. 689-696 [doi]
- CoMet: A Tool Using CUMM to Measure Unused Component MembersHamdan Msheik, Alain Abran, Hamid Mcheick, Dimitrios Touloumis, Adel Khelifi. 697-703 [doi]
- Using Change Propagation Probabilities to Assess Quality Attributes of Software Architectures 1Israr Pasha Shaik, Walid Abdelmoez, Rajesh Gunnalan, Ali Mili, Christopher P. Fuhrman, Mark Shereshevsky, A. Zeid, Hany H. Ammar. 704-711 [doi]
- Session Management for Collaborative Applications in Interactive GridHui Wang, Hai Jin, Pingpeng Yuan, Liping Pang. 712-715 [doi]
- An Adaptive Multi-Guard Channel Scheme for Multi-Class Traffic in Cellular NetworksMuhammed Salamah. 716-723 [doi]
- An Uplink Admission Control for 3G and Beyond Roaming Based Multi-Operator Cellular Wireless Networks with Multi-ServicesSalman A. Al Qahtani, Uthman Baroudi. 724-729 [doi]
- A Survey of Advances in Multi-User Detection in DS-CDMASyed Ismail Shah, Muhammad Naeem, Asrar U. H. Sheikh, Habibullah Jamal, Jamil Ahmad. 730-737 [doi]
- Throughput of ARQ Protocols Over Nakagami and MIMO Block Fading ChannelsSalam A. Zummo. 738-743 [doi]
- Distributed fault management protocol for Heterogeneous NetworksGeorge Deprez, M. Padmaraj, Suku Nair. 744-747 [doi]
- An Object-Oriented Configurable Framework for Real-time Database Simulation EnvironmentSanjay Tanwani, Ashwani K. Ramani. 748-755 [doi]
- An Overview of MOA, a Multi-Class Overload Architecture for Real-time Database Systems: Framework and AlgorithmsLeila Baccouche. 756-763 [doi]
- Classification Rules for Pre-Analysis Filtering of Web TransactionsOmar H. Karam, Ahmad M. Hamad, Wedad H. Riad. 764-770 [doi]
- Towards ontology-based semantic web from data-intensive web: A reverse engineering approachSidi Mohamed Benslimane, Mimoun Malki, Ahmed Lehireche. 771-778 [doi]
- WAP and Push Technology Integrated into Mobile Commerce ApplicationsJihad Qaddour. 779-785 [doi]
- Evolutionary Colorization of Grayscale ImagesBara a Ali Attea, Amina Dahim Aboud. 786-791 [doi]
- Robust Color Video DenoisingTamer F. Rabie. 792-798 [doi]
- Constructing Precise Geometric Models of Virtual Environunents using Image based View SynthesisA. Ajith, Naren Athmaraman. 799-805 [doi]
- Study of Reneging Behavior in Batched Multimedia ServiceVrinda Tokekar, Sanjiv Tokekar, Ashwani K. Ramani. 806-813 [doi]
- An Extended Media Service Framework for Multiparty Collaborative EnvironmentsSangwoo Han, Namgon Kim, Jaeyoun Kim, JongWon Kim. 814-817 [doi]
- A Wireless Embedded System for the Tracking of Stolen VehiclesMohammed A. Mustafa, Mohammad Behnam, Mohamed El-Tarhuni. 818-825 [doi]
- Grid overlay for remote E-health monitoringWail M. Omar, Bassam Ahmad, A. Taleb-Bendiab. 826-833 [doi]
- Formal development method of control systems using the event-based B approach Case study : A parcel sorting deviceOlfa Mosbahi, Jacques Jaray, Leila Jemni Ben Ayed. 834-841 [doi]
- A System for Web Retrieval of Images and the Corresponding AnnotationsHiroshi Idehara, Noriyuki Fujimoto, Hiroshi Takeno. 842-850 [doi]
- Practical Fair-Exchange E-Payment Protocol for Anonymous Purchase and Physical DeliveryQing Zhang 0002, Konstantinos Markantonakis, Keith Mayes. 851-858 [doi]
- Allocation and Re-Allocation of Data in a Grid using an Adaptive Genetic AlgorithmHamed Siefoddini, Khaled El-Fakih, Jalal Kawash, Nashat Mansour. 859-866 [doi]
- Towards a Model-Based Unification of Mobile PlatformsLászló Lengyel, Tihamer Levendovszky, Gergely Mezei, Bertalan Forstner, Hassan Charaf. 867-874 [doi]
- A Complex Applications Framework Supporting Tolerant Dynamic Vehicle DispatchingIlham Benyahia, Jean-Yves Potvin, Ying Xu. 875-881 [doi]
- Enhancements of PECOS Embedded Real-Time Component Model for Autonomous Mobile Robot ApplicationDayang N. A. Jawawi, Safaai Deris, Rosbi Mamat. 882-889 [doi]
- Can Cohesion Predict Fault Density?Adam Abubakar, Jarallah AlGhamdi, Moataz Ahmed. 890-893 [doi]
- The Adoption of eCommerce Communications and Applications Technologies in Small Businesses in New ZealandNabeel A. Y. Al-Qirim. 894-897 [doi]
- On the Optimal Deployment of Heterogeneous Sensing DevicesRabie Ramadan, Khaled Abdelghany, Hesham El-Rewini. 898-905 [doi]
- Differentiated Survivability in Ethernet-Based MAN/WANMaher Ali, Girish Chiruvolu, An Ge, M. Padmaraj, Suku Nair, Marco F. Marchetti. 906-910 [doi]
- Supporting Disconnected Operations in Mobile ComputingJemal H. Abawajy, Mustafa Mat Deris. 911-918 [doi]
- Performance of MIP/WLAN in Rapid Mobility EnvironmentsJun Tian, Abdelsalam Helal. 919-927 [doi]
- A Secure Framework for Distributed Agents SystemLamia H. Khalid, Hilal M. Yousif Al-Bayatti, Sarab M. Hameed. 928-931 [doi]
- On The Performance of Directional MAC Protocols in Wireless Ad-Hoc NetworksYuxin Pan, Walaa Hamouda, Ahmed K. Elhakeem. 932-935 [doi]
- Contextual ECATNets Semantics in Terms of Conditional Rewriting LogicNadia Zeghib, Kamel Barkaoui, Mohamed Bettaz. 936-943 [doi]
- Arabic Search Engines Improvement: A New Approach using Search Key Expansion Derived from Arabic Synonyms StructureHayder K. Al Ameed, Shaikha O. Al Ketbi, Amna A. Al Kaabi, Khadija S. Al Shebli, Naila F. Al Shamsi, Noura H. Al Nuaimi, Shaikha S. Al Muhairi. 944-951 [doi]
- Crime Hot-Spots Prediction Using Support Vector MachineKeivan Kianmehr, Reda Alhajj. 952-959 [doi]
- Learning acyclic rules based on Chaining Genetic ProgrammingWing-Ho Shum, Kwong-Sak Leung, Man Leung Wong. 960-967 [doi]
- A Proxy Pre-fetch Scheme for Consistent SMIL Presentation DeliveryAbdelkrim Abdelli, Nadjib Badache. 968-975 [doi]
- ARAB_TTS: An Arabic Text To Speech SynthesisZouhir Zemirli. 976-979 [doi]
- ICE: A System for Identification of Conflicts in ExamsHicham Hage, Esma Aïmeur. 980-987 [doi]
- Building e-Partnership: d-Library Services for eLearningAhmed Taha. 988-993 [doi]
- On-Line Content Analysis System using e-Learning Time DataMaomi Ueno, Keizo Nagaoka. 994-1002 [doi]
- Authoring web-based learning scenarios based on the IMS learning design: Preliminary evaluation of the ask learning designer toolkitDemetrios G. Sampson, Pythagoras Karampiperis, Panayiotis Zervas. 1003-1010 [doi]
- Semantically Meaningful Unit - SMU; An Openly Reusable Learning Object for UREKA Learning-Object Taxonomy & Repository Architecture - ULTRAImran Ihsan, Mobin Uddin Ahmed, Mohib ur Rehman, Muhammad Abdul Qadir, Nadeem Iftikhar. 1011-1018 [doi]
- Educational additions to an Open Source Virtual Learning Environment (VLE) for the Greek Schools NetworkAvgoustos A. Tsinakos, Jon Papaioannou. 1019-1022 [doi]
- Classification of Software and Hardware Bio-inspired SystemsDjamel Meslati, Labiba Souici-Meslati, Said Ghoul. 1023-1028 [doi]
- Adapting WordNet to the Medical Domain using Lexicosyntactic Patterns in the Ohsumed CorpusAdil Toumouth, Ahmed Lehireche, Dominic Widdows, Mimoun Malki. 1029-1036 [doi]
- An Experiment in Automatic Conversion of Legacy Java Programs to C#Mohammad El-Ramly, Rihab Eltayeb, Hisham A. Alla. 1037-1045 [doi]
- Communicating Requirements for ERP Tendering, the Case of International OrganizationsIldemaro Araujo. 1046-1054 [doi]
- An Aspect-Oriented Approach in Early Requirements EngineeringAbdelkrim Amirat, Djamel Meslati, Mohamed Tayeb Laskri. 1055-1058 [doi]
- MPLS Network Topology Design Using Genetic AlgorithmsEl-Sayed M. El-Alfy. 1059-1065 [doi]
- A Genetic-Driven Instruction Set for High Speed Network ProcessorsHossein Mohammadi, Nasser Yazdani. 1066-1073 [doi]
- Dynamic adapting of Scalable TCP congestion control parametersMohamed Tekala, Robert Szabo. 1074-1081 [doi]
- An Efficient Intra Prediction Mode Decision Algorithm for H.263 To H.264 TranscodingMehdi Jafari, Shohreh Kasaei. 1082-1089 [doi]
- A Discrete Optimal Broadcasting Protocol in an IP NetworkAchraf Gazdar, Abdelfattah Belghith. 1090-1096 [doi]
- An Architecture for a Context-aware Service Broker in Ubiquitous Computing EnvironmentsYasser Ganjisaffar, Hassan Abolhassani, Rasool Jalili. 1097-1100 [doi]
- Available trust and security in wireless networksSemir Daskapan, J. J. Van Bergen, Marnix Kaart. 1101-1105 [doi]
- An Ontology-based Model for Mobile Agents Adaptation in Pervasive EnvironmentsNejla Amara-Hachmi. 1106-1109 [doi]
- A Privacy Preferences Architecture for Context Aware ApplicationsAmr Ali Eldin, René W. Wagenaar. 1110-1113 [doi]
- Interoperability and Security Issues of Grid Services for Ubiquitous ComputingDebasish Jana, Amritava Chaudhuri, Abhijit Datta, Bijan Bihari Bhaumik. 1114-1117 [doi]
- Parallel I/O Scheduling in the Presence of Data Duplication on Multiprogrammed Cluster Computing SystemsJemal H. Abawajy. 1118-1125 [doi]
- FuFaIR: a Fuzzy Farsi Information Retrieval SystemAmir Nayyeri, Farhad Oroumchian. 1126-1130 [doi]
- Extending UML to Guide Design Pattern ReuseNadia Bouassida, Hanêne Ben-Abdallah. 1131-1138 [doi]
- Productivity and Stability with Application Service SoftwareErick K. Ahrens, Hans Nehme, Michael Pulliam. 1139-1142 [doi]
- Requirements for Evaluating Architectural StabilityRami Bahsoon, Wolfgang Emmerich. 1143-1146 [doi]
- Defining Patterns Using UML ProfilesNarayan C. Debnath, Ana Gabriela Garis, Daniel Riesco, German Montejano. 1147-1150 [doi]
- Supporting the SPEM with a UML Extended Workflow MetamodelNarayan C. Debnath, Daniel Riesco, Manuel Pérez Cota, J. Baltasar García Perez-Schofield, Daniel Romero, Marcelo Uva. 1151-1154 [doi]
- A Comparative Analysis of Maintainability Approaches for Web ApplicationsEmad Ghosheh, Jihad Qaddour, Matthew Kuofie, Sue Black. 1155-1158 [doi]
- Improving Software Quality through Requirements Traceability ModelsAhmed M. Salem. 1159-1162 [doi]
- Role Based Approach to Data Access in Adhoc NetworksQurban A. Memon, Mohammad Shakeel Laghari. 1163-1166 [doi]
- Games over BluetoothAqib Mumtaz, Faisal Tehseen Shah. 1167-1170 [doi]
- Primitive Operations of Hyper-Graph Data Model for Distributed Database IntegrationSrikrishnan Sundaresan, Gongzhu Hu. 1171-1174 [doi]
- Embedding Rules in a Pre-Hospital Mobile DatabaseNada Hashmi, Dan Corwin, Dan Myung, Mark Gaynor, Valmeek Kudesia, Will Tollefsen, Shankaranarayanan Ganesan, Steve Moulton. 1175-1179 [doi]
- Hierarchical Approach to Select Feature Vectors for Classification of Text DocumentsNagesh Kapalavayi, S. N. Jayaram Murthy, Gongzhu Hu. 1180-1183 [doi]