Abstract is missing.
- Development of a Test Pattern for Measurement of Color Visual MTF PropertiesNaoyoshi Nameda. 2-5 [doi]
- Wide-Area Real-Time Distributed Computing in a Tightly Managed Optical Grid - An Optiputer VisionK. H. (Kane) Kim. 2-11 [doi]
- Extended Virtual Traditional Japanese Crafting System on CAVETomoyuki Ishida, Akihiro Miyakawa, Kaoru Sugita, Yoshitaka Shibata. 6-9 [doi]
- Kansei Retrieval Method using VPIC of Traditional Japanese Crafting ObjectsKaoru Sugita, Tomoyuki Ishida, Akihiro Miyakawa, Yoshitaka Shibata. 10-13 [doi]
- Construction and Practice of a New Educational Environment with Lecture Recording SystemKazuo Ushijima. 12-15 [doi]
- Utilizing the Mixer Method for Content ManagementSuru Dissanaike, Pierre Wijkman, Mitra Wijkman. 14-17 [doi]
- Graph Containers, Information Delay, and Network VulnerabilityD. Frank Hsu. 16-22 [doi]
- A Personal Tourism Navigation System to Support Traveling Multiple Destinations with Time RestrictionsAtsushi Maruyama, Naoki Shibata, Yoshihiro Murata, Keiichi Yasumoto, Minoru Ito. 18-22 [doi]
- An Improved Nominative Proxy Signature Scheme for Mobile CommunicationJianhong Zhang, Qianhong Wu, Jilin Wang, YuMin Wang. 23-26 [doi]
- A GA-based Multi-purpose Optimization Algorithm for QoS RoutingAkio Koyama, Leonard Barolli, Kazunori Matsumoto, Bernady O. Apduhan. 23-28 [doi]
- Secure Instant Messaging Protocol Preserving Confidentiality against AdministratorHiroaki Kikuchi, Minako Tada, Shohachiro Nakanishi. 27-30 [doi]
- Interfering-aware QoS Multipath Routing for Ad Hoc Wireless NetworkYing-Hong Wang, Hung-Zu Lin, Shu-Min Chang. 29-34 [doi]
- Secret Sharing with Access Structures in a HierarchyChin-Chen Chang, Chu-Hsing Lin, Wei Lee, Pai-Cheng Hwang. 31-34 [doi]
- QoS-Based Synchronous/Asynchronous Data Transmission Model in Group CommunicationSatoshi Itaya, Takuya Tojo, Tomoya Enokido, Rozeta Miho, Makoto Takizawa. 35-40 [doi]
- Secure Signals Transmission Based on Quaternion Encryption SchemeTomoyuki Nagase, Masaya Komata, Takashi Araki. 35-38 [doi]
- High-Speed Stream CipherHong-Sain Ooi. 39-42 [doi]
- A Quality of Service (QoS) Implementation of Internet Cache CoherenceJohn P. Sustersic, Ali R. Hurson. 41-47 [doi]
- A Proposal and its Evaluations of a Re-keying Method for Dynamic Secure Group CommunicationsMirang Park, Naonobu Okazaki, Shoichiro Seno, Kazuyuki Kashima, Kazuyoshi Oshima. 43-49 [doi]
- A Novel Public Watermarking System based on Advanced Encryption SystemKo-Ming Chan, Long-Wen Chang. 48-52 [doi]
- On the Performance of Heuristic H MCOP for Multi-Constrained Optimal-Path QoS RoutingGang Feng. 50-53 [doi]
- Improved Robust Watermarking in DCT Domain for Color ImagesXiaoqiang Li, Xiangyang Xue. 53-58 [doi]
- A Proposal of a Streaming Video System in Best-Effort Networks Using Adaptive QoS Control RulesYuka Kato, Dongmei Jiang, Katsuya Hakozaki. 54-57 [doi]
- Packet Loss Rate Control for Continuous Media over Heterogeneous NetworkRyosuke Igarashi, Kazuo Takahata, Noriki Uchida, Yoshitaka Shibata. 58-61 [doi]
- An Overview of Content-based Image Retrieval TechniquesSagarmay Deb, Yanchun Zhang. 59-64 [doi]
- A Markov Model for Quality of Service of Failure Detectors in the Pressure of Loss BurstsIrineu Sotoma. 62-67 [doi]
- A Powerful 3D Authoring Method Using 2D Image Processing TechniquesHiroaki Nishino, Tsuneo Kagawa, Masaki Hieda, Kouichi Utsumiya. 65-70 [doi]
- Design and Implementation of Multi-User 3D-Virtual Space with QoS Awareness Based on Multi-Agent FrameworkRyosuke Ohmae, Takuo Suganuma, Norio Shiratori. 68-73 [doi]
- Adaptive Digital Image InpaintingTimothy K. Shih, Rong-Chi Chang, Liang-Chen Lu, Wen-Chieh Ko, Chun-Chia Wang. 71-77 [doi]
- QoS Control Function based on User s Information on the 3D Virtual Shared SpaceSatoshi Oikawa, Koji Hashimoto, Yoshitaka Shibata. 74-78 [doi]
- A Self-organizing Technique for Sensor Placement in Wireless Micro-Sensor NetworksTheinLai Wong, Tatsuhiro Tsuchiya, Tohru Kikuno. 78-83 [doi]
- Guard Channel Sharing Strategies in Integrated Voice/Data Mobile NetworksHung-Huan Liu. 79-82 [doi]
- Concurrency Control in Mobile Database SystemsNitin Prabhu, Vijay Kumar, Indrakshi Ray, Gi-Chul Yang. 83-86 [doi]
- ZBP: A Zone-based Broadcasting Protocol for Wireless Sensor NetworksChih-Yung Chang, Kuei-Ping Shih, Shih-Chieh Lee. 84-89 [doi]
- Recovery Protocol for Dynamic Network Reconstruction on Disaster Information SystemHideaki Asahi, Kazuo Takahata, Yoshitaka Shibata. 87-90 [doi]
- MaCC: Supporting Network Formation and Routing in Wireless Personal Area NetworksMakoto Takizawa, Hiroto Aida, Masato Saito, Yoshito Tobe, Hideyuki Tokuda. 90-95 [doi]
- Wireless Sporadic Communication Protocol for Supporting Cluster-to-Base Station CommunicationMasakazu Ono, Chikashi Kato, Sayaka Harada, Hiroaki Higaki. 91-94 [doi]
- Distance Based Location Management in Cellular PCS Network -a Critical StudyDaisuke Senzaki, Hiroshi Mabuchi, Goutam Chakraborty, Masafumi Matsuhara. 95-98 [doi]
- Cache Signatures for Peer-to-Peer Cooperative Caching in Mobile EnvironmentsChi-Yin Chow, Hong Va Leong, Alvin T. S. Chan. 96-101 [doi]
- Towards a Model for Personalized Communication ServicesCláudia M. F. A. Ribeiro, Nelson S. Rosa, Paulo Roberto Freire Cunha. 99-103 [doi]
- Design of Network Management Support System based on Active Information ResourceSusumu Konno, Yukio Iwaya, Toru Abe, Tetsuo Kinoshita. 102-106 [doi]
- Applying XML and XSLT Techniques to a Personalized Distance Learning System for Business Mathematical EducationYukari Shirota. 104-107 [doi]
- Delay-Differentiable Fair Queueing (D2FQ): A Low Complexity Scheduling Algorithm for Packet-Switched NetworksM. L. Yan, C. K. Li. 107-112 [doi]
- Course On-demand Modular Tool for Designing Distance Learning CoursesLun-Ping Hung, Ling-Min Wang, Chia-Ling Ho, Ching-Sheng Wang. 108-111 [doi]
- A Content-Based Image Retrieval System for Outdoor Ecology Learning: A Firefly Watching SystemGwo-Jong Yu, Yuh-Shyan Chen, Kuei-Ping Shih. 112-115 [doi]
- Strategies for Achieving High Performance Incremental Computing on a Network EnvironmentCho-chin Lin. 113-118 [doi]
- Multistory Annotation System: a Novel Application of Distance LearningTimothy K. Shih, Yi-Chun Liao, Han-Bin Chang, Mei-Yen Kuan, George Yee. 116-119 [doi]
- An Overlay Network Architecture for Data Placement Strategies in a P2P Streaming NetworkKan Hung Wan, Chris Loeser. 119-125 [doi]
- An Applicative Distance Education Payment ProtocolWei-Kuei Chen. 120-123 [doi]
- Using RDF/RDFS to support Visualized Online Authoring Tool for TeachersJin-Tan Yang, Chun Yuan Tsai, Mei Sheng Chao, C. Y. Pan, W. C. Horng. 124-130 [doi]
- Improving VoIP Application s Performance over WLAN Using a New Distributed Fair MAC SchemeXin Gang Wang, Geyong Min, John E. Mellor. 126-132 [doi]
- Evaluation of Multi-Agent Model for Community Formation in Network SocietyJun Sawamoto, Kei Mutoh, Hidekazu Tsuji, Hisao Koizumi. 131-136 [doi]
- A Dynamic Mechanism for Determining Relationships in a Partially Ordered User HierarchyChin-Chen Chang, Iuon-Chang Lin, Hui-Min Tsai. 133-138 [doi]
- Distributed Logic Programming using Mobile AgentsTzone I. Wang, Keith L. Clark. 137-142 [doi]
- Development of Security Scanner with High UsabilityMichitaka Yoshimoto, Bhed Bahadur Bista, Toyoo Takata. 139-144 [doi]
- An Agent-Based Consumer Recommendation MechanismYing-Hong Wang, Ren-Junn Hwang, Wen-Nan Wang. 143-148 [doi]
- A Proposal and Implementation of Automatic Detection/Collection System for Cross-Site Scripting VulnerabilityOmar Ismail, Masashi Etoh, Youki Kadobayashi, Suguru Yamaguchi. 145-151 [doi]
- On Agents Cooperative Behavior Based on Potential FieldTakashi Katoh, Kensaku Hoshi, Norio Shiratori. 149-154 [doi]
- Defending against Internet Worm-like InfestationsShou-Chuan Lai, Wen-Chu Kuo, Mu-Cheng Hsie. 152-157 [doi]
- Collaborative Neuro-BDI Agents in Container TerminalsPrasanna Lokuge, Damminda Alahakoon, Parakrama Dissanayake. 155-159 [doi]
- A New Scheme to Protect Confidential ImagesChin-Chen Chang, Ren-Junn Hwang. 158-164 [doi]
- On the Security of an Enhanced Authentication Key Exchange ProtocolMin-Shiang Hwang, Ting Yi Chang, Shu-Chen Lin, Chwei-Shyong Tsai. 160-163 [doi]
- Stream Authentication Scheme for the use over the IP TelephonyShintaro Ueda, Nobutaka Kawaguchi, Hiroshi Shigeno, Ken-ichi Okada. 164-169 [doi]
- FTF · IDF Scoring for Fresh Information RetrievalNobuyoshi Sato, Minoru Uehara, Yoshifumi Sakai. 165-170 [doi]
- Yet Another Attack on a QR-based Password Authentication SystemChin-Chen Chang, Ya-Fen Chang. 170-173 [doi]
- Spatial Video Retrieval Based on the Piecewise MethodYung-Kuan Chan, Chin-Chen Chang. 171-176 [doi]
- A Merging Method of Certification Authorities Without Using Cross-CertificationsSatoshi Koga, Kouichi Sakurai. 174-177 [doi]
- A Vision on Semantic Retrieval in P2P NetworkHao Ding, Ingeborg Sølvberg, Yun Lin. 177-182 [doi]
- A Performance Study of Over-Issuing Delta-CRLs with Distribution PointsAradee Rojanapasakorn, Chanboon Sathitwiriyawong. 178-181 [doi]
- An Identity-based Ring Signature Scheme from Bilinear PairingsChih-Yin Lin, Tzong-Chen Wu. 182-186 [doi]
- A Multi-Agent System for Online Course Content ManagementRyosuke Komatsu, Jianhua Ma, Qun Jin. 183-189 [doi]
- Design and Implementation of a SIP-based VoIP ArchitectureSherali Zeadally, Farhan Siddiqui. 187-190 [doi]
- A Scalable Group Rekeying Scheme using Secret Mask PatternsYaser M. Asem, Atsushi Kara. 190-195 [doi]
- A Next Generation Knowledge Management System ArchitectureSameera Abar, Toru Abe, Tetsuo Kinoshita. 191-195 [doi]
- Architecture for a Peer-to-peer Network with IP MulticastingTetsuya Oh-ishi, Koji Sakai, Hiroaki Matsumura, Akira Kurokawa. 196-199 [doi]
- Role Locks to Prevent Illegal Information Flow among ObjectsRyung Chon, Tomoya Enokido, Vlad Wietrzsk, Makoto Takizawa. 196-201 [doi]
- Can Streaming Of Stored Playback Video Be Supported On Peer to Peer Infrastructure?K. Kalapriya, S. K. Nandy, K. Venkatesh Babu. 200-203 [doi]
- Optimizing Centralized Secure Group Communications with Binary Key Tree RecompositionJen-Chiun Lin, Chien-Hua Tzeng, Feipei Lai, Hung-Chang Lee. 202-207 [doi]
- A Ubiquitous 1-to-k Media Streaming Architecture Using the IPv4/IPv6 Multicast Transition Gateway ApproachChung-Ming Huang, Pei-Chuan Liu. 204-207 [doi]
- Enhancing the Efficiency of (v, r, n)-Fairness Secret Sharing SchemeRen-Junn Hwang, Chin-Chen Chang. 208-212 [doi]
- A Proposal of DNS-Based Adaptive Load Balancing Method for Mirror Server Systems and Its ImplementationHiroshi Yokota, Shigetomo Kimura, Yoshihiko Ebihara. 208-214 [doi]
- A Taxonomy of Broadcast Indexing Schemes for Multi Channel Data Dissemination in Mobile DatabaseAgustinus Borgy Waluyo, Bala Srinivasan, David Taniar. 213-218 [doi]
- Observation and Application of Laser Induced Shock WaveHidetoshi Nose, Hiroshi Maeda, Motonao Nakahara. 215-218 [doi]
- A Scheme of M-ary Multi-Carrier Spread Spectrum Based on Wavelet PacketYing Xiaofan, Chu Zhenyong, Wangyong, Kechu Yi. 219-222 [doi]
- LBSR: Routing Protocol for MANETs with Unidirectional LinksTomonori Asano, Hiroyuki Unoki, Hiroaki Higaki. 219-224 [doi]
- Maximum Likelihood Estimation of Integer Frequency Offset for OFDMChen Chen, Jiandong Li, Gang Han, Min Sheng. 223-226 [doi]
- Hierarchical Route Optimization for Nested Mobile NetworkDongkeun Lee, Keecheon Kim, Moonhae Kim. 225-229 [doi]
- A Graph-based Methodology for Analyzing IP Spoofing AttackVoravud Santiraveewan, Yongyuth Permpoontanalarp. 227-231 [doi]
- Locating Mobile Stations with Statistical Directional Propagation ModelKenneth Man-Kin Chu, Karl R. P. H. Leung, Joseph Kee-Yin Ng, Chun Hung Li. 230-235 [doi]
- Improving Web Server Performance by a Clustering-Based Dynamic Load Balancing AlgorithmLai Kuen Ho, Hau Yee Sit, Kei Shiu Ho, Hong Va Leong, Robert W. P. Luk. 232-235 [doi]
- An Effective Bus-Band Arbiter for Processors CommunicationJih-Fu Tu, Chih-Yung Chen. 236-240 [doi]
- Multimedia Wireless Link Controlled Sharing with Class-based Packet SchedulingYing Weng, Chaohuan Hou. 236-242 [doi]
- Design of A Novel Real-Shared Memory Module for High Performance Parallel Processor System with Shared MemoryZhe Liu, JeoungChill Shim, Hiroyuki Kurino, Mitsumasa Koyanagi. 241-244 [doi]
- Experimental Analysis of Propagation Properties Implementing the Path-Based MeasurementTakuo Nakashima. 243-248 [doi]
- Architectural Design of a DSP Scripting Language for Mobile Multimedia TerminalsKiyotaka Takahashi, Eigo Mori. 245-249 [doi]
- Performance Analysis of Preemptive Resume Scheduling in Mobile TransactionsMuhammad Younas, Irfan Awan, Kuo-Ming Chao. 249-254 [doi]
- One-Way Differential Delay Used for Path Selection on Mobile NetworksKiyoshi Ogawa, Arata Sawai, Noboru Ilda, Takashi Watanabe. 250-255 [doi]
- Mobile Agents and Energy-Efficient Multidatabase DesignYu Jiao, Ali R. Hurson. 255-260 [doi]
- AgentUDM: A Mobile Agent Based Support Infrastructure for Ubiquitous Data MiningT. A. Soe, Shonali Krishnaswamy, Seng Wai Loke, Maria Indrawan, D. Sethi. 256-259 [doi]
- An Efficient Cache Invalidation Strategy in Mobile EnvironmentsPo-Jen Chuang, Ching-Yueh Hsu. 260-263 [doi]
- A Voice Quality Measurement Method for PHS over IP CommunicationToshihiko Wakahara, Meng Yao, Kamugisha Kazaura, Mitsuji Matsumoto, Takao Shimizu. 261-265 [doi]
- Formal Verification of PAP and EAP-MD5 Protocols in Wireless Networks: FDR Model CheckingIl-Gon Kim, Jin-Young Choi. 264-269 [doi]
- A Novel Tool for Network Management Using a WAP InterfaceA. C. Vieira Jr., Manuel L. Anido. 266-272 [doi]
- Mobile Agents as Smart Virtual CounterpartsMohan Baruwal Chhetri, Seng Wai Loke, Shonali Krishnaswamy. 270-273 [doi]
- Parallel PageRank Computation on a Gigabit PC ClusterBundit Manaskasemsak, Arnon Rungsawang. 273-277 [doi]
- A Location-aware Layer 7 Proxy Handoff Mechanism over the Mobile Network EnvironmentChung-Ming Huang, Chao-Hsien Lee, Chung-Yi Lai, Yuan-Tse Yu. 274-278 [doi]
- An Efficient Clustered Architecture for P2P NetworksJuan Li, Son T. Vuong. 278-283 [doi]
- Web Browsing Activity Visualization System for Administrator Assistance Using Users Web Browsing BehaviorSatoshi Togawa, Kazuhide Kanenishi, Yoneo Yano. 279-284 [doi]
- Analysis of Grid Service Composition with BPEL4WSKuo-Ming Chao, Muhammad Younas, Nathan Griffiths, Irfan Awan, Rachid Anane, Chen-Fang Tsai. 284-289 [doi]
- Tele-Lab IT Security: A Means to Build Security Laboratories on the WebJi Hu, Christoph Meinel. 285-288 [doi]
- Distributed Replication and Caching: A Mechanism for Architecting Responsive Web ServicesVlad Ingar Wietrzyk, Robyn Lawson, Ronald Schmid, Vijay K. Khandelwal, Makoto Takizawa, Tomoya Enokido. 289-292 [doi]
- An Autonomic Group CommunicationTomoya Enokido, Makoto Takizawa. 290-295 [doi]
- Development and Evaluation of a Minutes System Focusing on Importance in a MeetingDaishiro Hirashima, Michiru Tanaka, Yoshimi Teshigawara. 293-298 [doi]
- A Group Communication Protocol for Scalable Causal OrderingSatoshi Kawanami, Tomoya Enokido, Makoto Takizawa. 296-302 [doi]
- Topic-Centric Algorithm: A Novel Approach to Web Link AnalysisParicha Ingongngam, Arnon Rungsawang. 299-301 [doi]
- WebTop XML Editor supporting Operations on Views generated by User-Defined StylesHiroshi Yao, Haruhiko Toyama, Satoshi Shirai, Tatsunori Kanai. 302-306 [doi]
- Multi-agent System for Security ServiceElhadi Shakshuki, Zhonghai Luo, Jing Gong, Qian Chen. 303-308 [doi]
- A Balanced Multicast Overlay Protocol - AppcastV. Radha, Ved Prakash Gulati, Arun K. Pujari. 307-312 [doi]
- Supervising Secret-Key Agreements in a Level-Based HierarchyChing-Te Wang, Chu-Hsing Lin, Chin-Chen Chang. 309-314 [doi]
- A Design and Evaluation of Ethernet Links Bundling SystemsHui Guo, Jingli Zhou, Ou Yangkai, Shengsheng Yu. 313-316 [doi]
- Automating Detection of Faults in TCP ImplementationsHiroshi Inamura, Osamu Takahashi, Taro Ishikawa, Hiroshi Shigeno, Ken-ichi Okada. 315-320 [doi]
- Combining Markovian Chains and Real Time Agreement Protocols to Allocate Resources in Wireless SystemsSonia Ben Rejeb, Zièd Choukair, Sami Tabbane. 317-320 [doi]
- Balancing Workload based on Content Types for Scalable Web Server ClustersTzung-Shi Chen, Kuo-Lian Chen. 321-325 [doi]
- Using IC Cards to Remotely Login Passwords without Verification TablesChing-Te Wang, Chin-Chen Chang, Chu-Hsing Lin. 321-326 [doi]
- Chain-packet SwitchingZhen-Xing Wang, He-Ming Wang, Ya-Min Sun. 326-329 [doi]
- A Design of Diffie-Hellman Based Key Exchange Using One-time ID in Pre-shared Key ModelKenji Imamoto, Kouichi Sakurai. 327-333 [doi]
- Multi-Path Transmission based on Overlay NetworkRenjie Pi, Song Junde. 330-334 [doi]
- Dynamic Transcoding Functions by Extended Media StreamKoji Hashimoto, Yoshitaka Shibata. 334-339 [doi]
- IEEE 802.11 Distributed Coordination Function: Performance Analysis and Protocol EnhancementHang Su, Peiliang Qiu. 335-338 [doi]
- Comparison of Power Saving Schemes for Sink Nodes in Wireless Sensor NetworksJean-Lien C. Wu, Shun-Te Wang. 339-342 [doi]
- Optimal Data Rate Control for Video Stream Transmission over Wireless NetworkKazuo Takahata, Noriki Uchida, Yoshitaka Shibata. 340-345 [doi]
- Performance Analysis of IEEE 802.11 WLAN to Support Voice ServiceChangle Li, Jiandong Li, Xuelian Cai. 343-346 [doi]
- A Transparent Rate Adaptation Algorithm for Streaming Video over the InternetL. S. Lam, Jack Y. B. Lee, Soung C. Liew, Wei Wang. 346-351 [doi]
- A New Efficient MAKEP for Wireless CommunicationsJinn-ke Jan, Yi-Hwa Chen. 347-350 [doi]
- On the Traffic Disruption Time and Packet Lost Rate during the Handover Mechanisms in Wireless NetworksRosa Risueño, Pedro Cuenca, Francisco Delicado, Luis Orozco-Barbosa, Antonio Jose Garrido del Solo. 351-354 [doi]
- Requirement Analysis and Implementation of Palm-Based Multimedia Museum Guide SystemsLi-Der Chou, Chia-Hsieh Wu, Shih-Pang Ho, Chen-Chow Lee, Jui-Ming Chen. 352-357 [doi]
- A Packet Scheduling Scheme for Broadband Wireless Networks with Heterogeneous ServicesHaw-Yun Shin, Jean-Lien C. Wu, Yi-Hsien Wu. 355-359 [doi]
- KEITAI-Space: Photo-Based Shared Virtual Space on Cellular PhonesTaro Nakao, Masahiko Tsukamoto, Takefumi Ogawa, Shojiro Nishio. 358-364 [doi]
- A Mobile Agent Security ManagementEung-Gu You, Keum-Suk Lee. 360-365 [doi]
- A New Multicast Technique Supporting Source Mobility for Future Vision Delivery ServiceKatsuhiko Sato, Michiaki Katsumoto, Tetsuya Miki. 365-372 [doi]
- The Key-bits in Turbo Codes and Their ProtectionsZhang Weidang, Yuan Cong, Moon Ho Lee, Sun Rong, Wang Xinmei. 366-369 [doi]
- A Secure Wireless LAN System Retaining PrivacyTadashi Komori, Takamichi Saito. 370-375 [doi]
- A Seamless Handoff for Dual-interfaced Mobile Devices in Hybrid Wireless Access NetworksRiaz Inayat, Reiji Aibara, Kouji Nishimura. 373-378 [doi]
- A Key Assignment Scheme for Controlling Access in Partially Ordered User HierarchiesChin-Chen Chang, Iuon-Chang Lin, Hui-Min Tsai, Hsiao-Hsi Wang. 376-379 [doi]
- The Study of Handoff Prediction Schemes for Resource Reservation in Mobile Multimedia Wireless NetworksLi-Liann Lu, Jean-Lien C. Wu, Wei-Yeh Chen. 379-384 [doi]
- ID-Based Proxy Blind SignatureDong Zheng, Huang Zheng, Kefei Chen, Weidong Kou. 380-383 [doi]
- Provably Secure and ID-Based Group Signature SchemeZewen Chen, Jiwu Huang, Daren Huang, Jianhong Zhang, YuMin Wang. 384-388 [doi]
- m-Roam: A Service Invocation and Roaming Framework for Pervasive ComputingAlvin Chin, Kostas Kontogiannis. 385-392 [doi]
- A User Adaptive Scheduling Multiple Access ProtocolJing Liu, Jiandong Li, Yanhui Chen, Xiaoyan Sun. 389-392 [doi]
- Load Sharing and Session Preservation with Multiple Mobile Routers for Large Scale Network MobilityEun Kyoung Paik, Ho-sik Cho, Thierry Ernst, Yanghee Choi. 393-399 [doi]
- A Class-based Allocation Mechanism for Delay Sensitive Traffic in WLANsFrancisco Delicado, Pedro Cuenca, Luis Orozco-Barbosa, Antonio Jose Garrido del Solo. 393-396 [doi]
- Access Control by using Object Properties and Categorized MethodsKazuteru Matsumoto, Atsushi Hashimoto, Takaichi Yoshida. 397-402 [doi]
- Spi2Java: Automatic Cryptographic Protocol Java Code Generation from spi calculusDavide Pozza, Riccardo Sisto, Luca Durante. 400-405 [doi]
- An Access Control Model Based on Distributed Knowledge ManagementAlexandr Seleznyov, Stephen Hailes. 403-406 [doi]
- Authenticated Autonomous System TracebackVamsi Paruchuri, Arjan Durresi, Rajgopal Kannan, S. Sitharama Iyengar. 406-413 [doi]
- Advanced Semisoft Handoff Method of Cellular IP Access NetworksJoungwoong Lee, Shigetomo Kimura, Yoshihiko Ebihara. 407-412 [doi]
- Adaptable Access Strategies Provide a High Usefulness of the Objects in an Open Distributed EnvironmentRohan Samarasinghe, Yoshihiro Yasutake, Takeshi Kato, Takaichi Yoshida. 413-419 [doi]
- Use of Cryptographic Technologies for Privacy Protection of Watermarks in Internet Retails of Digital ContentsChangjie Wang, Ho-Fung Leung, Shing-Chi Cheung, YuMin Wang. 414-419 [doi]
- Multicast Routing Representation in Ad Hoc Networks Using Fuzzy Petri NetsTzu-Chiang Chiang, Yueh-Min Huang. 420-423 [doi]
- A Service Bundle Authentication Mechanism in the OSGi Service PlatformYoung-Gab Kim, Chang-Joo Moon, Dae-Ha Park, Doo-Kwon Baik. 420-425 [doi]
- Finding Stable Routes in Mobile Ad Hoc NetworksChun-Yen Hsu, Jean-Lien C. Wu, Shun-Te Wang. 424-427 [doi]
- Bandwidth Efficiency of an Image Compression Method for Information HidingChin-Chen Chang, Tzu-Chuen Lu, Yi-Long Liu. 426-432 [doi]
- Mobile Data Management in Ad hoc Wireless NetworksSavio S. H. Tse, Hong Va Leong. 428-431 [doi]
- Performance Improvement for GPRS, WLAN Integration using Ad Hoc NetworksJui-Ming Chen, Li-Der Chou. 432-435 [doi]
- Learning Resource Registry and Discovery SystemDi Wu, Zongkai Yang, Gang Zhao. 433-438 [doi]
- An Exercise in Constructing Secure Mobile Ad hoc Network (SMANET)C. Edward Chow, Paul J. Fong, Ganesh Godavari. 436-440 [doi]
- A Scheduling Method of Distance Learning Classes Including Remote ExperimentsHiroyasu Mitsui, Hiroaki Sugihara, Hisao Koizumi. 439-444 [doi]
- Real-time Processing Method for an Ultra High-Speed Streaming Server Running PC LinuxHiroyuki Kimiyama, Kenji Shimizu, Tetsuo Kawano, Tsuyoshi Ogura, Mitsuru Maruyama. 441-446 [doi]
- Virtual Real-time 3D Object Sharing for Supporting Distance Education and TrainingHiroko Suzuki, Runhe Huang. 445-450 [doi]
- Dynamic Reconfiguration of Telecom Services Architectures According to Mobility and Traffic ModelsAsma Ben Letaifa, Zièd Choukair, Sami Tabbane. 447-450 [doi]
- Research on Web Education System with Personalized NavigationsGuozhen Zhang, Zixue Cheng, Aiguo He, Akio Koyama, Tongjun Huang. 451-456 [doi]
- RED with Optimized Dynamic Threshold Deployment on Shared BufferChengchen Hu, Bin Liu. 451-454 [doi]
- Active Congestion Control Mechanism for Non-Cumulative Layered MulticastingGamal Abdel Shafy Ebrahim, Akmal A. Younis. 455-460 [doi]
- An XML-based Component Specification Model for an Adaptive Middleware of Interactive Digital Television SystemsFrederico Borelli, Adilson B. Lopes, Glêdson Elias da Silveira. 457-463 [doi]
- Design Consideration of the MORBingyang Zhou. 461-464 [doi]
- A Time and Distance - Based Multicast Algorithm for IPv6 Mobile NetworksWu-Hsiao Hsu, Bin-Hau Lee, Ming-Han Liu, Bor-Yeh Shen, Kun-Hua Lin. 464-469 [doi]
- A Component-based Configuration and Management Framework for Open, Distributed Multimedia SystemsAdilson B. Lopes, Frederico Borelli, Glêdson Elias da Silveira, MaurÃcio F. Magalhães. 465-470 [doi]
- Performance Evaluation of an IPv6-capable H323 ApplicationChristos Bouras, Apostolos Gkamas, Dimitris Primpas, Kostas Stamos. 470-475 [doi]
- WKeeper: A Distributed Web Filtering System for IPv6 Home NetworksChao-Ping Yu, Hsien-Wei Hung, Canaan Kao, Nen-Fu Huang, Ko-Shung Chen, Rong-Tai Liu, Yi-Chung Chen. 471-474 [doi]
- Designing a Mobile Phone of the Future: Requirements Elicitation using Photo Essays and ScenariosKentaro Go, Yasuaki Takamoto, John M. Carroll. 475-480 [doi]
- High-performance IPv4/IPv6 Dual-stack Routing LookupZhen-Xing Wang, He-Ming Wang, Ya-Min Sun, Yan-Xiao Zhang, Jiang-Xing Wu. 476-481 [doi]
- Web Metasearching for Mobile Environment using METARIASteven K. M. Chan, Jacky K. H. Shiu. 481-484 [doi]
- A Small IP Forwarding Table Using HashingYeim-Kuan Chang, Wen-Hsin Cheng. 482-487 [doi]
- Research on the Multimedia Remote Educational Support System Using High Resolution Panorama VideoKawamura Noritaka, Yuya Maita, Koji Hashimoto, Yoshitaka Shibata. 485-488 [doi]
- Mobile IPv6 Extensions to support Nested Mobile NetworksZhiJun Gu, Dongmin Yang, Cheeha Kim. 488-492 [doi]
- Distributed Pipelining Processing for Index Updating MethodMinoru Udagawa, Nobuyoshi Sato, Minoru Uehara, Yoshifumi Sakai. 489-492 [doi]
- New Business Models for Improving Marketable Quality and Networking Service of Japanese Laundry CompaniesFumiko Koga, Heihachiro Fukuda. 493-498 [doi]
- A New Normal Walk Model for Mesh PCS NetworksChiu-Ching Tuan, Chen-Chau Yang. 493-498 [doi]
- Information Flow Model and Estimations for Services on the InternetAshraf Uddin Ahmed, Zixue Cheng, Senro Saito. 499-505 [doi]
- Region-based Stage Construction Protocol for Fault tolerant Execution of Mobile AgentSungJin Choi, MaengSoon Baik, HongSoo Kim, JunWeon Yoon, Jin Gon Shon, Chong-Sun Hwang. 499-502 [doi]
- Fault-Tolerant Routing in the Star GraphS. M. Rezazad, Hamid Sarbazi-Azad. 503-506 [doi]
- Mobile Agent Model for Transaction Processing on Distributed ObjectsTomoaki Kaneda, Masashi Shiraishi, Tomoya Enokido, Makoto Takizawa. 506-511 [doi]
- A Framework of Software Rejuvenation for SurvivabilityKhin Mi Mi Aung, Jong Sou Park. 507-510 [doi]
- Dynamic Sub-mesh Protection under Dynamic Traffic Demands in Dense WDM NetworksChen-Shie Ho, Ing-Yi Chen, Sy-Yen Kuo. 511-514 [doi]
- Ubiquitous Sensors based Human Behavior Modeling and Recognition using a Spatio-Temporal Representation of User StatesYoshinori Isoda, Shoji Kurakake, Hirotaka Nakano. 512-517 [doi]
- Public-Device Resource Management Preventing Danger of ExposureKen ichiro Kanehana, Hiroki Saito, Yoshito Tobe. 515-519 [doi]
- A Mathematical Model for Analyzing the Proxy Bidding Method for Mobile Agent-Based Auction ServicesJie Zhang, Henry C. B. Chan. 518-524 [doi]
- A Secure M-Commerce Model Based On Wireless Local Area NetworkXiaohui Li, Weidong Kou. 520-523 [doi]
- A Personal Data Control Mechanism for Digital SocietyTetsuro Kakeshita, Kohei Arai, Mika Ohtsuki. 524-527 [doi]
- Adaptive Image Transmission by Strategic DecompositionHui-Huang Hsu, Timothy K. Shih, Louis H. Lin, Rong-Chi Chang, Huei-Fa Li. 525-530 [doi]
- Goal-Oriented Platform Based on Knowledge-Point: A New Model of Distance Education SystemYang Qing, Yang Yang, Chen Juan. 528-531 [doi]
- Run-time Adjusted Congestion Control for Multimedia: Experimental ResultsGiuseppe De Marco, Maurizio Longo, Fabio Postiglione. 531-536 [doi]
- Generating Digital Signatures on Mobile DevicesYu Lei, Deren Chen, Zhongding Jiang. 532-535 [doi]
- A Secure Steganography Scheme Based on (N, t) ThresholdKai Fan, Weidong Kou. 536-539 [doi]
- Concurrency Control Protocol on Distributed Multimedia ObjectsKeisuke Hasumi, Tomoya Enokido, Makoto Takizawa. 537-542 [doi]
- Functional Networks Based Internet End-to-End Delay DynamicsChanghua Zhu, Changxing Pei, Jiandong Li. 540-544 [doi]
- Evaluation on Scalability of Conference System using Request-RoutingToshiyuki Kawasaki, Koji Okamura. 543-548 [doi]
- An Adaptive Medium Access Control Protocol for Robot Inter-communication in Autonomous Distributed SystemsJunpei Arai, Akio Koyama, Leonard Barolli. 545-550 [doi]
- A Mesh-based Multiple Description Coding Method for Network VideoYangli Wang, Chengke Wu. 549-555 [doi]
- A Sensor-Actuator Map for Organization of Position Sensor Feedback Control for Multiple Links Structure / Wire Driven SystemHitoshi Kino, Shigeru Yabe, Naoki Honjo, Sadao Kawamura. 551-554 [doi]
- A Multi-agent Model of Human Mind Based on Mental Image Directed Semantic Theory for Comprehensible Communication between Humans and RobotsMasato Shiraishi, Masao Yokota. 555-558 [doi]
- Using the Extension Function of XSLT and DSL to Secure XML DocumentsTao-Ku Chang, Gwan-Hwan Hwang. 556-561 [doi]
- Optimal Control of Humanoid Robot in Long DistanceGenci Capi, Yasuo Nasu. 559-562 [doi]
- Securing XML Document Sources and Their DistributionJunqi Zhang, Vijay Varadharajan, Yi Mu. 562-567 [doi]
- Online Training of SVMs for Real-time Intrusion DetectionZonghua Zhang, Hong Shen. 568-573 [doi]
- PrecePt: A Privacy-Enhancing License Management Protocol for Digital Rights ManagementBok-Nyong Park, Jae-Won Kim, Wonjun Lee. 574-579 [doi]
- Security and Privacy Technologies for Distance Education ApplicationsNigel H. Lin, Larry Korba, George Yee, Timothy K. Shih, Hsiau Wen Lin. 580-586 [doi]
- GRAM - A P2P System of Group Revision Assistance ManagementKatsuhiro Takata, Jianhua Ma. 587-592 [doi]
- Improving Data Availability Using Hybrid Replication Technique in Peer-to-Peer EnvironmentsMustafa Mat Deris, B. Nathrah, M. H. Suzuri, M. T. Abu Osman. 593-598 [doi]
- An Enhanced Gnutella P2P Protocol: A Search PerspectiveSai Ho Kwok, K. Y. Chan. 599-604 [doi]
- P2P Live Streaming System with Low Signal InterruptionTakayuki Hama, Koichi Asatani, Hidenori Nakazato, Hideyoshi Tominaga. 605-610 [doi]
- Peer-To-Peer Technology for Interconnecting Web Services in Heterogeneous NetworksTim Schattkowsky, Christoph Loeser, Wolfgang Müller 0003. 611-617 [doi]
- Cross-media Translation Based on Mental Image Directed Semantic Theory toward More Comprehensible Multimedia CommunicationMasao Yokota, Daisuke Hironaka. 618-623 [doi]
- Rich Metadata Searches Using the JXTA Content Manager ServiceXin Xiang, Yuanchun Shi, Ling Guo. 624-629 [doi]
- Implementation and Evaluation of a Tradition Search Engine Using Sensitivity Searching MethodAkihiro Miyakawa, Kaoru Sugita, Tomoyuki Ishida, Yoshitaka Shibata. 630-635 [doi]
- A Distributed Approach to Sub-Ontology ExtractionMehul Bhatt, Andrew Flahive, Carlo Wouters, J. Wenny Rahayu, David Taniar, Tharam S. Dillon. 636-641 [doi]
- A Web-Based Dual Mode Virtual Laboratory Supporting Cooperative LearningYu-Lung Wu, Te Yi Chan, Bin Shyan Jong, Tsong Wuu Lin, Yao Hui Liang. 642-648 [doi]