Abstract is missing.
- Multimedia Oriented Component ModelEmmanuel Bouix, Marc Dalmau, Philippe Roose, Franck Luthon. 3-8 [doi]
- Designing Secure Wireless Mobile Ad Hoc NetworksVenkatesan Balakrishnan, Vijay Varadharajan. 5-8 [doi]
- Effect of Mobility on the Critical Transmitting Range for Connectivity in Wireless Ad Hoc NetworksGuanghui Zhang, Jiandong Li, Yanhui Chen, Jing Liu. 9-12 [doi]
- Design of a Hierarchical Group to Realize a Scalable GroupYasutaka Nishimura, Tomoya Enokido, Makoto Takizawa. 9-14 [doi]
- Cost-Efficient QoS Routing Protocol for Mobile Ad Hoc NetworksWenzhu Zhang, Jiandong Li, Xuan Wang. 13-16 [doi]
- A Novel Sliding Weighted Fair Queueing Scheme for Multimedia TransmissionYun-Sheng Yen, Weimin Chen, Jia-Cheng Zhuang, Han-Chieh Chao. 15-20 [doi]
- Signal Strength-Based Routing Protocol for Mobile Ad Hoc NetworksSan-Yuan Wang, Jia-Yu Liu, Chun-Chien Huang, Mao-Yuan Kao, Yi-Ho Li. 17-20 [doi]
- Synchronous and Multiplexed Time Slots and Radio Blocks Allocation for Mobile Packet Data NetworksChen-Nien Tsai, Kai-Wei Ke, Ho-Ting Wu. 21-24 [doi]
- Maximum-Revenue Multicast Routing and Partial Admission Control for Multirate Multimedia DistributionHsu-Chen Cheng, Frank Yeong-Sung Lin. 21-26 [doi]
- CRMA: A Novel Multiple Access Protocol for Power Efficient Wireless LANHe Hong, Jiandong Li, Min Sheng. 25-28 [doi]
- A High-Performance Multimedia Streaming Model on Multi-Source Streaming Approach in Peer-to-Peer NetworksSatoshi Itaya, Tomoya Enokido, Makoto Takizawa. 27-32 [doi]
- An Analysis of Relationship between Video Contents and Subjective Video Quality for Internet BroadcastingYuka Kato, Atsushi Honda, Katsuya Hakozaki. 31-34 [doi]
- Fault Tolerant Routing and Broadcasting in de Bruijn NetworksNgoc Chi Nguyen, Vo Dinh Minh Nhat, Sungyoung Lee. 35-40 [doi]
- A Multi-Agent Framework for a P2P Data Sharing FacilityS. Misbah Deen. 35-40 [doi]
- A Switched Ethernet Protocol for Hard Real-Time Embedded System ApplicationsAlimujiang Yiming, Toshio Eisaka. 41-44 [doi]
- Multi-Agent Based Network Management Task Decomposition and SchedulingBo Liu, Junzhou Luo, Wei Li. 41-46 [doi]
- The Advanced International Case Study Using High Speed InternetKazuhisa Nakagawa, Koji Okamura. 45-48 [doi]
- A Proposal of Multi-Agent System Development Framework for Cooperative Problem Solving and Its Experimental EvaluationJun Sawamoto, Hidekazu Tsuji, Dilmurat Tilwaldi, Hisao Koizumi. 47-52 [doi]
- Hybrid CIP/M&M for Micro-Mobility Management under the Multilayer Wireless NetworkYing-Hong Wang, Hui-Min Huang, Huang-Yi Li. 51-54 [doi]
- A Model of Multi-Agent System Based on Immune EvolutionGuangzhu Chen, Zhishu Li, Daohua Yuan, Nimazhashi. 53-58 [doi]
- An Algorithm of Dynamic Resource Reservation for Multimedia Wireless CommunicationYing-Hong Wang, Kuo-Jan Tseng, Yi Hsieh. 55-59 [doi]
- Using a Learning Mechanism in Matchmaking Process of Agents Negotiation in Multi-Agent SystemsEmad Farazmand, Afsaneh Shokoufi, Caro Lucas, Farzad Habibipour. 59-64 [doi]
- IEEE 802.11 MAC Protocol over Wireless Mesh Networks: Problems and PerspectivesTzu-Jane Tsai, Ju-Wei Chen. 60-63 [doi]
- MCDA: An Efficient Multi-Channel MAC Protocol for 802.11 Wireless LAN with Directional AntennaChih-Yung Chang, Hao-Chun Sun, Chen-Chi Hsieh. 64-67 [doi]
- Multi-Signature with Anonymous Threshold Subliminal Channel for Ad Hoc EnvironmentsZhenjie Huang, Dan Chen, YuMin Wang. 67-71 [doi]
- A New Wireless Networking System for Rescue Activities in Disasters -- System Overview and Evaluation of Wireless NodeMakoto Kamegawa, Mai Kawamoto, Tetsuya Shigeyasu, Misako Urakami, Hiroshi Matsuno. 68-71 [doi]
- A Study of Recent Research Trends and Experimental Guidelines in Mobile Ad Hoc NetworksChyi-Ren Dow, P. J. Lin, Sheng-Chang Chen, J. H. Lin, Shiow-Fen Hwang. 72-77 [doi]
- A Lossless Medical Image Compression Scheme Using Modified S-Tree StructureChi-Shiang Chan, Chin-Chen Chang. 75-78 [doi]
- Evaluation of Inter-Vehicle Ad Hoc Communication ProtocolMasashi Saito, Jun Tsukamoto, Takaaki Umedu, Teruo Higashino. 78-83 [doi]
- Detecting and Restoring System of Tampered Image Based on Discrete Wavelet Transformation and Block Truncation CodingChing-Lin Wang, Ren-Hung Hwang, Tung-Shou Chen, Hsiu-Yueh Lee. 79-82 [doi]
- A DCT-Domain System for Hiding Fractal Compressed ImagesChin-Chen Chang, Chi-Lung Chiang, Ju Yuan Hsiao. 83-86 [doi]
- A Route Reconstruction Method Based on Support Group Concept for Mobile Ad Hoc NetworksFumiaki Sato, Tadanori Mizuno. 84-89 [doi]
- A Feature-Based Scalable Codec for Image CompressionLun-Chia Kuo, Sheng-Jyh Wang. 87-90 [doi]
- Dynamical Construction of a Core-Based Group-Shared Multicast Tree in Mobile Ad Hoc NetworksBing-Hong Liu, Ming-Jer Tsai, Wei-Chei Ko. 90-95 [doi]
- A New Look at Coding and Decoding Algorithm for SFC-OFDM SystemWeihong Fu, Weidong Kou. 91-94 [doi]
- Low Complexity Multiple Description Coding Method for Wireless VideoYangli Wang, Chengke Wu. 95-98 [doi]
- Incremental Design of a State Machine Specification for Mobile and Real-Time Systems Goichi Itabashi, Kaoru Takahashi, Yasushi Kato, Takuo Sugamma, Norio Shiratori. 99-104 [doi]
- Cooperative Learning and Web Applications: A Case StudyNicoletta Sala. 101-104 [doi]
- On the Power-Aware Resource Allocation for Linear-Pipelined Real-Time TasksChun-Chao Yeh. 105-110 [doi]
- An Intelligent Semantic Agent for e-Learning Message CommunicationYing-Hong Wang, Wen-Nan Wang, Yi-Hsiang Yen. 105-108 [doi]
- WEB-Based Environment for Programming and Distance LearningDmitry A. Vazhenin, Alexander Vazhenin, Ying-Hong Wang. 109-112 [doi]
- Real-Time Multiple Tracking Using a Combined TechniqueHui-Huang Hsu, Timothy K. Shih, Chia-Tong Tang, Yi-Chun Liao. 111-116 [doi]
- An Adaptive Communication System for User s Resource EnvironmentKoji Hashimoto, Yoshitaka Shibata. 113-116 [doi]
- A Dynamic Pruning and Feature Selection Strategy for Real-Time TrackingD. Frank Hsu, Damian M. Lyons. 117-124 [doi]
- A Web-Based Remote Experiment System with Individualized Assessment of LearnersHiroyasu Mitsui. 117-120 [doi]
- Efficient Secret Sharing with Access Structures in a HierarchyChu-Hsing Lin, Wei Lee. 123-126 [doi]
- Fast Pattern Detection in Stream DataSimon Sheu, Chang-Yeng Cheng, Alan Chang. 125-130 [doi]
- Dynamic Key Generations for Secret Sharing in Access StructuresChu-Hsing Lin, Wei Lee, Chien-Sheng Chen. 127-130 [doi]
- Estimations on the Security Aspect of Brand s Electronic Cash SchemeChang Yu Cheng, Jasmy Yunus, Kamaruzzaman Seman. 131-134 [doi]
- Multi-Modal Information Retrieval with a Semantic View MechanismQing Li, Jun Yang, Yueting Zhuang. 133-138 [doi]
- Secure One-Round Tripartite Authenticated Key Agreement Protocol from Weil PairingChu-Hsing Lin, Hsiu-Hsia Lin. 135-138 [doi]
- Linguistic Interpretation of Human Motion Based on Mental Image Directed Semantic TheoryMikio Amano, Daisuke Hironaka, Seio Oda, Genci Capi, Masao Yokota. 139-144 [doi]
- A Simple Forward Secure Blind Signature Scheme Based on Master Keys and Blind SignaturesYeu-Pong Lai, Chin-Chen Chang. 139-144 [doi]
- Integration of Security Parameters in the Service Level Specification to Improve QoS Management of Secure Distributed Multimedia ServicesSandrine Duflos, Valérie Gay, Brigitte Kervella, Eric Horlait. 145-148 [doi]
- OWL-Based Approach for Semantic InteroperabilitySeksun Suwanmanee, Djamal Benslimane, Philippe Thiran. 145-150 [doi]
- A Secure Modular Exponential Algorithm Resists to Power, Timing, C Safe Error and M Safe Error AttacksChih-Chung Lu, Shau-Yin Tseng, Szu-Kai Huang. 151-154 [doi]
- An Intelligent Semantic Model for the Design of Consistent Online SMIL PresentationsAnthony Y. Chang. 151-156 [doi]
- Genetic Algorithm to Improve SVM Based Network Intrusion Detection SystemDong Seong Kim, Ha-Nam Nguyen, Jong Sou Park. 155-158 [doi]
- Applying Word Sense Disambiguation to Question Answering System for e-LearningJason C. Hung, Ching-Sheng Wang, Che-Yu Yang, Mao-Shuen Chiu, George Yee. 157-162 [doi]
- Apply Data Mining to Defense-in-Depth Network Security SystemNen-Fu Huang, Chia-Nan Kao, Hsien-Wei Hung, Gin-Yuan Jai, Chia-Lin Lin. 159-162 [doi]
- Designing an Enhanced PC Cluster System for Scalable Network ServicesYi-Hsing Chang, J. Wey Chen. 163-166 [doi]
- Charge-Based Flooding Algorithm for Detecting Multimedia Objects in Peer-to-Peer Overlay NetworksKenichi Watanabe, Tomoya Enokido, Makoto Takizawa, K. H. (Kane) Kim. 165-170 [doi]
- Improved Genetic Algorithm to Solve Preplanned Backup Path on WDM NetworksYih-Fuh Wang, Chien-Hsun Chen. 167-174 [doi]
- A Multiplatform P2P System: Its Implementation and ApplicationsNobuhiro Nakamura, Souichirou Takahama, Leonard Barolli, Jianhua Ma, Kaoru Sugita. 171-176 [doi]
- Distributed Agent-Based Real Time Network Intrusion Forensics System Architecture Design Wei Ren, Hai Jin. 177-182 [doi]
- Mobile Intelligent Agent Technologies to Support VoIP Seamless MobilityChen-Han Lin, Jen-Shun Yang, Ko-Ching Wu. 177-180 [doi]
- A Behavioral Model Based on Meme and Qualia for Multi-Agent Social BehaviorYusuke Mizuno, Shohei Kato, Atsuko Mutoh, Hidenori Itoh. 181-184 [doi]
- Application of Policing Mechanisms for Broadband Networks: Issues and DifficultiesTakahide Gouda, Leonard Barolli, Kaoru Sugita, Akio Koyama, Arjan Durresi, Giuseppe De Marco. 183-188 [doi]
- Reliability Estimation of Mobile Agent Systems Using the Monte Carlo ApproachMosaab Daoud, Qusay H. Mahmoud. 185-188 [doi]
- Trade-Off Based Negotiation of Traffic Conditioning and Service Level Agreements in DiffServ NetworksMarco Comuzzi, Chiara Francalanci, Paolo Giacomazzi. 189-194 [doi]
- An Agent-Based Approach to Composite Mobile Web ServicesWassam Zahreddine, Qusay H. Mahmoud. 189-192 [doi]
- A Distributed Ontology Framework in the Semantic Grid EnvironmentAndrew Flahive, J. Wenny Rahayu, David Taniar, Bernady O. Apduhan. 193-196 [doi]
- An Ontology-Based e-Learning System for Network SecurityYoshihito Takahashi, Tomomi Abiko, Eriko Negishi, Goichi Itabashi, Yasushi Kato, Kaoru Takahashi, Norio Shiratori. 197-202 [doi]
- Heterogeneous Distributed Parallel Programming for Coordination in Software DevelopmentChia-Chu Chiang. 199-202 [doi]
- Low-Power Way-Predicting Cache Using Valid-Bit Pre-Decision for Parallel ArchitecturesHsin-Chuan Chen, Jen-Shiun Chiang. 203-206 [doi]
- Applying Petri Nets to Model SCORM Learning Sequence Specification in Collaborative LearningHsiau Wen Lin, Wen-Chih Chang, George Yee, Timothy K. Shih, Chun-Chia Wang, Hsuan-Che Yang. 203-208 [doi]
- An Enhanced Parallel Loop Self-Scheduling Scheme for Cluster EnvironmentsChao-Tung Yang, Kuan-Wei Cheng, Kuan-Ching Li. 207-210 [doi]
- An Object Based Authoring Tool for Creating SCORM Compliant CourseJun-Ming Su, Shian-Shyong Tseng, Jui-Feng Weng, Kuan-Ting Chen, Yi-Lin Liu, Yi-Ta Tsai. 209-214 [doi]
- On Construction of a Visualization Toolkit for MPI Parallel Programs in Cluster EnvironmentsKuan-Ching Li, Hsun-Chang Chang, Chao-Tung Yang, Liria Matsumoto Sato, Chung-Yuan Yang, Yin-Yi Wu, Mao-Yueh Pel, Hsiang-Kai Liao, Min-Chieh Hsieh, Chia-Wen Tsai. 211-214 [doi]
- Constructing Knowledge Bases for e-Learning Using Protege 2000 and Web ServicesMike Hogeboom, Fuhua Lin, Larbi Esmahi, Chunsheng Yang. 215-220 [doi]
- Implementation of Visuel MPI Parallel Program Performance Analysis Tool for Cluster EnvironmentsKuan-Ching Li, Hsun-Chang Chang, Chao-Tung Yang, Li-Jen Chang, Hsiang-Yao Cheng, Liang-Teh Lee. 215-218 [doi]
- Dynamic Load Balance in Parallel Merge Sorting over Homogeneous ClustersArmando De Giusti, Marcelo R. Naiouf, Franco Chichizola, Laura C. De Giusti. 219-222 [doi]
- On the Distributed Management of SCORM-Compliant Course ContentsSheng-Tun Li, Chu-Hung Lin. 221-226 [doi]
- A Call Admission Control Algorithm for Long-Lived and Short-Lived Streaming MediaYi-jung Lo, Zsehong Tsai. 225-228 [doi]
- Throughput Driven, Highly Available Streaming Stored Playback Video Service over a Peer-to-Peer NetworkK. Kalapriya, S. K. Nandy. 229-234 [doi]
- Virtual Traditional Japanese Crafting System Using JGNII in Collaborative Work EnvironmentTomoyuki Ishida, Akihiro Miyakawa, Yoshitaka Shibata. 229-234 [doi]
- Experimental Result of Feature Extraction Method for Digital Traditional Japanese Crafting SystemKaoru Sugita, Tomoyuki Ishida, Akihiro Miyakawa, Leonard Barolli, Yoshitaka Shibata. 235-240 [doi]
- Scalefactor Based Bit Shift FGS Audio CodingFang-Chu Chen, Te-Ming Chiu. 235-238 [doi]
- A Dual Pyramid Watermarking for JPEG-2000Yu-Cheng Fan, Hen-Wai Tsao. 239-242 [doi]
- An Interactive Virtual Space Presentation System Considering Users BackgroundToshitada Ishii, Yoshitaka Shibata. 241-246 [doi]
- A Remote Authentication Scheme Preserving User AnonymityHung-Yu Chien, Che-Hao Chen. 245-248 [doi]
- mPATH: An Interactive Visualization Framework for Behavior HistoryMasaki Ito, Jin Nakazawa, Hideyuki Tokuda. 247-252 [doi]
- An Improved Low Computation Cost User Authentication Scheme for Mobile CommunicationChia-Yin Lee, Chu-Hsing Lin, Chin-Chen Chang. 249-252 [doi]
- An Image Authentication Scheme Considering Privacy #8212; A First Step towards Surveillance Camera AuthenticationNobutaka Kawaguchi, Shintaro Ueda, Naohiro Obata, Hiroshi Shigeno, Ken-ichi Okada. 253-256 [doi]
- Telemedicine with Digital Video Transport System in Asia-Pacific AreaNaoki Nakashima, Koji Okamura, Joon-Soo Hahm, Young-Woo Kim, Hiroshi Mizushima, Haruyuki Tatsumi, Byung-In Moon, Ho-Seong Han, Yong-Jin Park, Jae-Hwa Lee, Sung-Kwan Youm, Chul-Hee Kang, Shuji Shimizu. 253-257 [doi]
- An Efficient Multi-Server Password Authenticated Key Agreement Scheme Using Smart Cards with Access ControlChin-Chen Chang, Jui-Yi Kuo. 257-260 [doi]
- An Efficient Algorithm Based on Simulated Annealing for Multicast Routing with Delay and Delay Variation ConstraintsKun Zhang, Heng Wang, Feng-Yu Liu. 261-266 [doi]
- Authenticated Encryption Schemes with Message Linkage for Threshold SignaturesChi-Hsiung Huang, Chia-Yin Lee, Chu-Hsing Lin, Chin-Chen Chang, Kuo-Lun Chen. 261-264 [doi]
- An Improved Scheme for Unilateral Asymmetric Smart Card AuthenticationLanjun Dang, Weidong Kou, Yuxia Xiao. 265-268 [doi]
- Hamming Distance and Hop Count Based Classification for Multicast Network Topology InferenceHui Tian, Hong Shen. 267-272 [doi]
- A Web-Based Bookmark Tool with Ontological Approach for Knowledge Sharing of Special Interest GroupsJin-Tan David Yang, Wu Lin Lee, Chun-Yen Tsai. 271-276 [doi]
- Bandwidth Fragmentation Avoided QoS Multicast Routing by Employing Admission ControlBo Rong, Maria Bennani, Michel Kadoch, Ahmed K. Elhakeem. 273-278 [doi]
- Location-Based-Service Roaming Based on Web ServicesChun-Te Wu, Hsing Mei. 277-280 [doi]
- Logical Key Tree Based Secure Multicast Protocol with Copyright ProtectionWen-Tsuen Chen, Ho-Ling Hsu, Jeng-Long Chiang. 279-284 [doi]
- Performance Comparison of a Web Cache Simulation FrameworkL. G. Cárdenas, José A. Gil, Josep Domènech, Julio Sahuquillo, Ana Pont. 281-284 [doi]
- Privacy Preserving Web-Based QuestionnaireJunji Nakazato, Kenji Fujimoto, Hiroaki Kikuchi. 285-288 [doi]
- On Architecture for SLA-Aware Workflows in Grid EnvironmentsDang Minh Quan, Odej Kao. 287-292 [doi]
- Using the ACM Technique to Refine Protein Spots in 2DGE ImagesJeanne Chen, Tung-Shou Chen, Tzu-Hsin Tsai, Hui-Fang Tsai, Mingli Hsieh, Shih-Shan Tang. 289-292 [doi]
- S-WFMS: A Service-Based Workflow Management System in Grid EnvironmentMingkui Yang, Hongbing Liang, Bin Xu. 293-297 [doi]
- Using Peer-to-Peer Communication to Improve the Performance of Distributed Computing on the InternetKasame Tritrakan, Veera Muangsin. 295-298 [doi]
- Implementation and Evaluation of a Java Based Computational Grid for Bioinformatics ApplicationsChao-Tung Yang, Yi-Chun Hsiung, Heng-Chuan Kan. 298-303 [doi]
- Apply Incremental Classification for a P2P MOD SystemTien-Chin Wang, Tsung-Han Chang, Tsung Hung Chen, Peter Wang. 299-302 [doi]
- Support for Efficiently Processing Complex Queries over a P2P SubstratePedro Furtado. 303-306 [doi]
- Integrating Grid with Intrusion DetectionFang-Yie Leu, Jia-Chun Lin, Ming-Chang Li, Chao-Tung Yang, Po-Chi Shih. 304-309 [doi]
- MixCast: A New Group Communication Model in Large-Scale NetworkYusong Lin, Binqiang Wang, Zongmin Wang. 307-310 [doi]
- A Single-Computer Grid Gateway Using Virtual MachinesStephen Childs, Brian A. Coghlan, David O Callaghan, Geoff Quigley, John Walsh. 310-315 [doi]
- An Interoperability Design Model: Lessons Learned in Computer Communication StandardizationToshihiko Yamakami. 311-314 [doi]
- Periodic Contention-Free Multiple Access for Power Line Communication NetworksYu-Ju Lin, Haniph A. Latchman, Jonathan C. L. Liu, Richard E. Newman. 315-318 [doi]
- A Probabilistic Signal-Strength-Based Evaluation Methodology for Sensor Network DeploymentSheng-Po Kuo, Yu-Chee Tseng, Fang-Jing Wu, Chun-Yu Lin. 319-324 [doi]
- Performance Issues of Grid Computing Based on Different Architecture Cluster Computing PlatformsHsun-Chang Chang, Kuan-Ching Li, Yaw-Ling Lin, Chao-Tung Yang, Hsiao-Hsi Wang, Liang-Teh Lee. 321-324 [doi]
- Optimizing the Access Performance and Data Freshness of Distributed Cache Objects Considering User Access PatternRohan Samarasinghe, Yoshihiro Yasutake, Takaichi Yoshida. 325-328 [doi]
- Optimal Energy-Efficient Routing for Wireless Sensor NetworksChih-Wei Shiou, Frank Yeong-Sung Lin, Hsu-Chen Cheng, Yean-Fu Wen. 325-330 [doi]
- Improving TCP Performance during Soft Vertical HandoffHaijie Huang, Jianfei Cai. 329-332 [doi]
- Aggregate Sum Retrieval in Sensor Network by Distributed Prefix Sum Data CubeLok Hang Lee, Man Hon Wong. 331-336 [doi]
- A High-Performance Computational Resource Broker for Grid Computing EnvironmentsChao-Tung Yang, Po-Chi Shih, Kuan-Ching Li. 333-336 [doi]
- Nodes Localization through Data Fusion in Sensor NetworkRen C. Luo, Ogst Chen, Liang Chao Tu. 337-342 [doi]
- Improving End-to-End Performance by Active Queue ManagementChin-Fu Ku, Sao-Jie Chen, Jan-Ming Ho, Ray-I Chang. 337-340 [doi]
- An Efficient Dynamic Power Management Policy on Sensor NetworkRen C. Luo, Liang Chao Tu, Ogst Chen. 341-344 [doi]
- Geometric Broadcast Protocol for Sensor and Actor NetworksArjan Durresi, Vamsi Paruchuri. 343-348 [doi]
- A DDRR-Based Scheduler to Achieve Proportional Delay Differentiation in Terabit NetworkChin-Chi Wu, Hsien-Ming Wu, Chia-Lung Liu, Woei Lin. 347-350 [doi]
- An Algorithm for Discovering Physical Topology in Single Subnet IP NetworksYuzhao Li, Changxing Pei, Changhua Zhu, Jiandong Li. 351-354 [doi]
- A Hierarchical Dynamic Monitoring Mechanism for Mobile Agent LocationYing-Hong Wang, Huan-Chao Keh, Tsang-Ching Hu, Cheng-Horng Liao. 351-356 [doi]
- Evaluation and Analysis of the Sliding-Window Parallel Packet SwitchChia-Lung Liu, Woei Lin, Chin-Chi Wu. 355-358 [doi]
- PICC: A Secure Mobile Agent Framework Based on Garbled CircuitMin Yang, Shao-yin Huang, Zhi Wang, Zunping Cheng, Dilin Mao, Chuanshan Gao. 357-362 [doi]
- 3D-VOQ Switch Design and EvaluationDing-Jyh Tsaur, Xian-Yang Lu, Chin-Chi Wu, Woei Lin. 359-362 [doi]
- On-Demand Routing for Bluetooth Scatternets Subject to Device MobilityChorng-Horng Yang, Jian-Wei Ruan. 363-366 [doi]
- An Agent-Based Middleware for Communication Service on Ad Hoc NetworkGen Kitagata, Yu Matsushima, Daisuke Hasegawa, Tetsuo Kinoshita, Norio Shiratori. 363-367 [doi]
- Progressive Multilayer Reconfiguration for Software DSM Systems in Non-Dedicated ClustersJyh-Biau Chang, Tyng-Yeu Liang, Ce-Kuen Shieh. 367-370 [doi]
- Design and Implementation of Transactional Agents for Manipulating Distributed ObjectsYouhei Tanaka, Tomoya Enokido, Makoto Takizawa. 368-373 [doi]
- A New Scheduling Algorithm: Jumping Virtual ClockLain-Chyr Hwang, San-Yuan Wang, Steen J. Hsu, Yong-Hua Huang. 373-376 [doi]
- An Agent Architecture for e-Services Privacy Policy ComplianceGeorge Yee, Larry Korba. 374-379 [doi]
- A Message Interchange Protocol Based on Routing Information Protocol in a Virtual WorldJui-Fa Chen, Wei-Chuan Lin, Hua-Sheng Bai, Shih-Yao Dai. 377-384 [doi]
- A Scheme for Authentication and Authorization in a Grid ApplicationHeping Hu, Hanbing Yao. 383-387 [doi]
- Vision Based Adaptive Traffic Signal Control System DevelopmentLawrence Y. Deng, Nick C. Tang, Dong-liang Lee, Chin Thin Wang, Ming Chih Lu. 385-388 [doi]
- An Efficient ID-Based Deniable Authentication Protocol from PairingsTianjie Cao, Dongdai Lin, Rui Xue. 388-391 [doi]
- Multiple License Plate Detection for Complex BackgroundChing-Tang Hsieh, Yu-Shan Juan, Kuo-Ming Hung. 389-392 [doi]
- Authentication and Key Agreement Protocol for UMTS with Low Bandwidth ConsumptionChung-Ming Huang, Jian Wei Li. 392-397 [doi]
- A Technical Comparison of IPSec and SSLAbdelNasir Alshamsi, Takamichi Saito. 395-398 [doi]
- Reducing Security Overhead for Mobile NetworksFangguo Zhang, Yi Mu, Willy Susilo. 398-403 [doi]
- An Efficient Hierarchical Key Management Scheme Using Symmetric EncryptionsChu-Hsing Lin, Wei Lee, Yi-Kang Ho. 399-402 [doi]
- A Protocol for Designated Confirmer Signatures Based on RSA Cryptographic AlgorithmsLi Ping, Yaping Lin. 403-406 [doi]
- Development of Security Scanner with High Portability and UsabilityMichitaka Yoshimoto, Bhed Bahadur Bista, Toyoo Takata. 407-410 [doi]
- Interest-Based Lookup Protocols for Mobile Ad Hoc NetworksYi-Chung Chen, Jang-Ping Sheu. 407-413 [doi]
- Delegation Depth Control in Trust-Management SystemFan Hong, Xian Zhu, Shaobin Wang. 411-414 [doi]
- Constructing Energy-Efficient Multicast Trees with Delay Constraints in Ad Hoc NetworksWen-Lin Yang. 414-419 [doi]
- Automation of Grid Service Code Generation with AndroMDA for GT3Sachio Mizuta, Runhe Huang. 417-420 [doi]
- A Power Saving MAC Protocol by Increasing Spatial Reuse for IEEE 802.11 Ad Hoc WLANsKuei-Ping Shih, Chih-Yung Chang, Chien-Min Chou, Szu-Min Chen. 420-425 [doi]
- Decision Tree Construction for Data Mining on Grid Computing EnvironmentsChao-Tung Yang, Shu-Tzu Tsai, Kuan-Ching Li. 421-424 [doi]
- Theoretical Consideration of Adaptive Fault Tolerance Architecture for Open Distributed Object-Oriented ComputingRodrigo Lanka, Kentaro Oda, Takaichi Yoshida. 425-428 [doi]
- A Biologically Inspired QoS Routing Algorithm for Mobile Ad Hoc NetworksZhenyu Liu, Marta Z. Kwiatkowska, Costas C. Constantinou. 426-431 [doi]
- Distribution of Data and Remote Invocation of ProgramsTomasz Müldner, Zhonghai Luo, Elhadi Shakshuki. 429-432 [doi]
- Performance Analysis of Radio Resource Allocation for Multimedia Traffic in Cellular NetworksWei-Yeh Chen, Jean-Lien C. Wu. 432-437 [doi]
- Combining Applications and Databases Integration Approaches in a Common Distributed Genomic PlatformPierre-Emmanuel Gros, Joan Hérisson, Nicolas Férey, Rachid Gherbi. 433-438 [doi]
- A Practical Modelling Notation for Secure Distributed ComputationYih-Jiun Lee, Peter Henderson. 439-442 [doi]
- Scalable Request Routing with Next-Neighbor Load Sharing in Multi-Server EnvironmentsChung-Min Chen, Yibei Ling, Marcus Pang, Wai Chen, Shengwei Cai, Yoshihisa Suwa, Onur Altintas. 441-446 [doi]
- A Temporal Order Resolution Algorithm in the Multi-server Time Stamp Service FrameworkPei-Yih Ting. 445-448 [doi]
- Interoperability of MANET and 4G RAN Routing in Terms of Energy ConservationHarri Paloheimo, Antti Ylä-Jääski. 447-452 [doi]
- A TCP-Physical Cross-Layer Congestion Control Mechanism for the Multirate WCDMA System Using Explicit Rate Change NotificationLi-Chun Wang, Ching-Hao Lee. 449-452 [doi]
- Symbol Error Probability for Rectangular M-QAM OFDM Transmission over Rayleigh Fading ChannelsRainfield Y. Yen, Hong-Yu Liu. 453-456 [doi]
- Zone-Based Routing Algorithm for Congestion Control over the InternetAshraf Uddin Ahmed, Senro Saito, Zixue Cheng. 453-458 [doi]
- An Approximation Solution for the 2-Median Problem on Two-Dimensional MeshesSavio S. H. Tse, Francis Chi-Moon Lau. 457-460 [doi]
- An Ear-Decomposition Based Approach for Survivable Routing in WDM NetworksSing-Ling Lee, Jung-Chun Liu, YuChing Chen. 459-464 [doi]
- Two New Approaches for Orphan DetectionMohsen Jahanshahi, K. Mostafavi, M. S. Kordafshari, M. Gholipour, Abolfazl Toroghi Haghighat. 461-464 [doi]
- Load Balance Based Network Bandwidth Allocation for Delay Sensitive ServicesYan Shi, Zengji Liu, Zhiliang Qiu, Min Sheng. 465-470 [doi]
- A Parallel Tabu Search Approach Based on Genetic Crossover OperationYi He, Yuhui Qiu, Guangyuan Liu, Kaiyou Lei. 467-470 [doi]
- Sparse Equation Systems in Heterogeneous Clusters of ComputersFernando Tinetti, Walter J. Aróztegui, Antonio Quijano. 471-474 [doi]
- A CAC Scheme for Multimedia Applications Based on Fuzzy LogicLeonard Barolli, Mimoza Durresi, Kaoru Sugita, Arjan Durresi, Akio Koyama. 473-478 [doi]
- A Memory-Efficient Huffman Decoding AlgorithmPi-Chung Wang, Yuan-Rung Yang, Chun-Liang Lee, Hung-Yi Chang. 475-479 [doi]
- Physical Rate Based Admission Control for HCCA in IEEE 802.11e WLANsDeyun Gao, Jianfei Cai, Liren Zhang. 479-483 [doi]
- Fast Calculation Algorithm of the Undetected Errors Probability of CRC CodesRen-Der Lin, Wen-Shyen Chen. 480-483 [doi]
- QoS-Oriented Hybrid Admission Control in IEEE 802.11 WLANChanghua Zhu, Changxing Pei, Jiandong Li, Weidong Kou. 484-487 [doi]
- Service-Oriented Workflow ModelYueping Jin, Zhaohui Wu, ShuiGuang Deng, Zhen Yu. 484-488 [doi]
- Robust Video Communication Based on Source Modeling and Network Congestion ControlSong Xiao, Chengke Wu, Jechang Jeong. 488-491 [doi]
- Resequencing Schemes for Selective-Repeat ARQ and Their PerformanceToshihiro Shikama, Tadanori Mizuno. 491-494 [doi]
- Supporting the Conceptual Modeling of Web Applications: The MODE ProjectMario A. Bochicchio, Nicola Fiore. 495-500 [doi]
- A Method of Inverse Filter Design Based on Cepstrum MeasureChun-yan Gu, Hong-feng Yi, Ke-Chu Yi, Li-jun Jin. 495-498 [doi]
- A New Design for Efficient t-out-n Oblivious Transfer SchemeHui-Feng Huang, Chin-Chen Chang. 499-502 [doi]
- CoLab: A Flexible Collaborative Web Browsing ToolGuillermo de Jesús Hoyos-Rivera, Roberta Lima-Gomes, Jean-Pierre Courtiat. 501-506 [doi]
- A Tree-Structured Persistence Server for Data Management of Collaborative ApplicationsChien-Min Wang, Hsi-Min Chen, Gen-Cher Lee, Shun-Te Wang, Shyh-Fong Hong. 503-506 [doi]
- Automatic Generation of the C# Code for Security Protocols Verified with Casper/FDRChul-Wuk Jeon, Il-Gon Kim, Jin-Young Choi. 507-510 [doi]
- User-Centric Adaptation of Structured Web Documents for Small DevicesWai Yip Lum, Francis Chi-Moon Lau. 507-512 [doi]
- A Hierarchical and Multi-Model Based Algorithm for Lead Detection and News Program Narrative ParsingJin-Hau Kuo, Jen-Bin Kuo, Hsuan-Wei Chen, Ja-Ling Wu. 511-514 [doi]
- A Framework for Automatic and Dynamic Composition of Personalized Web ServicesWassam Zahreddine, Qusay H. Mahmoud. 513-518 [doi]
- Web-Based Energy-Efficient Cache Invalidation in Wireless Mobile EnvironmentYeim-Kuan Chang, Ming-Hong Hong, Yi-Wei Ting. 519-524 [doi]
- Molecular Metal Wires and Molecular SwitchesShie-Ming Peng. 519 [doi]
- Advanced Ubiquitous Media for Creative CyberspaceJhing-Fa Wang. 520 [doi]
- A Study of Information Services Based on Personal BelongingsNaoki Shimizu, Riko Yagiu, Masashi Saito. 523-528 [doi]
- Fragmented Patching: New VOD Technique That Supports Client MobilityKatsuhiko Sato, Michiaki Katsumoto, Tetsuya Miki. 527-532 [doi]
- Smart Retrieval and Sharing of Information Resources Based on Contexts of User-Information RelationshipsWai-Kwong Wing, Francis Chi-Moon Lau, Cho-Li Wang. 529-534 [doi]
- A Low-Complexity Iterative Detector for COFDM in Mobile ChannelsShu-Ming Tseng, Teng-Chuan Lin, Kuan-Fu Huang. 533-537 [doi]
- Modeling the Query Intention with GoalsChiung-Hon Leon Lee, Alan Liu. 535-540 [doi]
- On Building a Data Broadcasting System for Mobile DatabasesAgustinus Borgy Waluyo, Gabriel Goh, David Taniar, Bala Srinivasan. 538-543 [doi]
- Human Readable Genetic Rules for Scene Boundary DetectionMinaz J. Parmar, Marios C. Angelides. 541-546 [doi]
- Automatic Decomposition of Java Program for Implementation on Mobile TerminalsTakaaki Umedu, Shigeharu Urata, Akio Nakata, Teruo Higashino. 544-549 [doi]
- Design Smart NNTrees Based on the R4-RuleQiangfu Zhao. 547-551 [doi]
- Minimizing Memory Utilization of Task Sets in SmartOSEKWei Chen, Zhaohui Wu, Xiang Wang. 552-558 [doi]
- MDP-Based Fast Handoff with Reducing Waste Rate Method for Management Radio Resource in 3GPP Cellular NetworksBen-Jye Chang. 553-558 [doi]
- Providing Location Services within a Radio Cellular Network Using Ellipse Propagation ModelJunYang Zhou, Kenneth Man-Kin Chu, Joseph Kee-Yin Ng. 559-564 [doi]
- Reconfigurable Context-Sensitive Bio-Bridge Middleware for Smart Bio-LaboratoriesWei-Khing For, Xiaoming Bao, Woon-Seng Gan, See-Kiong Ng. 561-566 [doi]
- EM Vector Channel Estimation and V-BLAST/PIC Detection for Multiuser Long-Code MIMO CDMA in Multipath Rayleigh Fading ChannelsShu-Ming Tseng, Hung-Chieh Yu, Chi-Lung Chang, Yuan-Ching Tseng, Kuen-Cherng Lin. 565-569 [doi]
- A Personalized Ubiquitous Education Support Environment by Comparing Learning Instructional Requirement with Learner s BehaviorZixue Cheng, Shengguo Sun, Mizuo Kansen, Tongjun Huang, Aiguo He. 567-573 [doi]
- A Signal-to-Interference Ratio Based Downlink Scheduling Scheme for WCDMA Mobile Communication SystemJen-Shun Yang, Chien-Chao Tseng, Ray-Guang Cheng. 570-575 [doi]
- Smart Hyperspaces and Project UbikidsJianhua Ma, Bernady O. Apduhan, Laurence Tianruo Yang. 574-579 [doi]
- Performance Analysis on Location Tracking in PCS NetworksPo-Jen Chuang, Shien-Da Chang. 576-582 [doi]
- The Non-Specific Intelligent Guided-View System Based on RFID TechnologyHungPin Chao. 580-585 [doi]
- An Efficient Decryption Method for RSA CryptosystemRen-Junn Hwang, Feng-Fu Su, Yi-Shiung Yeh, Chia-Yao Chen. 585-590 [doi]
- Pseudo-Surface Based Network Camera Smart ControlAiguo He, Zixue Cheng, Tongjun Huang, Yue Zhao. 586-590 [doi]
- Adaptive Policy Trigger Mechanism for OBSSDan Feng, Lingfang Zeng, Fang Wang, Lingjun Qin, Qun Liu. 591-595 [doi]
- ID-Based Ring Authenticated EncryptionTianjie Cao, Dongdai Lin, Rui Xue. 591-596 [doi]
- Key Agreement Protocol Based on Weil PairingSheng-Hua Shiau, Ren-Junn Hwang, Ming-Fuu Lin. 597-602 [doi]
- Sensor Inter-Vehicle Communication for Safer HighwaysMimoza Durresi, Arjan Durresi, Leonard Barolli. 599-604 [doi]
- Privacy-Enhanced Internet StorageWilly Susilo, Fangguo Zhang, Yi Mu. 603-608 [doi]
- An Architecture of Network Imprinting for Personal but Wide Area ApplicationsTeruaki Yokoyama, Katsuyoshi Iida, Suguru Yamaguchi. 605-609 [doi]
- Convertible Undeniable Partially Blind SignaturesZhenjie Huang, Zhixiong Chen, YuMin Wang. 609-614 [doi]
- Identity Location Decoupling in Pervasive Computing NetworksStephen Herborn, Roksana Boreli, Aruna Seneviratne. 610-615 [doi]
- Improvement to the Anticollision Protocol Specification for 900MHz Class 0 Radio Frequency Identification TagMamatha Nanjundaiah, Vipin Chaudhary. 616-620 [doi]
- Fast Similarity Search in String DatabasesSimon Sheu, Alan Chang, Webber Huang. 617-622 [doi]
- Grouping Proof for RFID TagsJunichiro Saito, Kouichi Sakurai. 621-624 [doi]
- Research of the Chinese Meta-search Engine Model Based on Intelligent AgentHao-ming Wang, Boqin Feng. 623-628 [doi]
- A Scalable Group Communication Protocol with Global ClockSatoshi Kawanami, Takeshi Nishimura, Tomoya Enokido, Makoto Takizawa. 625-630 [doi]
- Ad Hoc Image Retrieval Using Hierarchical Semantic-Based IndexBo Yang, Ali R. Hurson. 629-634 [doi]
- Using Privacy Policies to Protect Privacy in UBICOMPGeorge Yee. 633-638 [doi]
- The Evaluations of FTF-IDF Scoring for Fresh Information RetrievalNobuyoshi Sato, Minoru Uehara, Yoshifumi Sakai. 635-640 [doi]
- A Framework of Social Interaction Support for Ubiquitous LearningGuozhen Zhang, Qun Jin, Man Lin. 639-643 [doi]
- A Fast URL Lookup Engine for Content-Aware Multi-Gigabit SwitchesNen-Fu Huang, Rong-Tai Liu, Chih-Hao Chen, Ying-Tsuen Chen, Li-Wen Huang. 641-646 [doi]
- A Scheme for Testing Privacy State in Pervasive Sensor NetworksYingpeng Sang, Hong Shen. 644-648 [doi]
- A Proxy Automatic Signature Scheme Using a Compiler in Distributed Systems for (Unknown) Virus DetectionShin-Jia Hwang, Kuang-Hsi Chen. 649-654 [doi]
- Identity-Based Ring Signcryption Schemes: Cryptographic Primitives for Preserving Privacy and Authenticity in the Ubiquitous WorldXinyi Huang, Willy Susilo, Yi Mu, Futai Zhang. 649-654 [doi]
- Trends and Issues for Security of Home-Network Based on Power Line CommunicationRyuzou Nishi, Hitoshi Morioka, Kouichi Sakurai. 655-660 [doi]
- Shared Protection Based on Matrix Decomposition in Tropical Semi-RingsJános Tapolcai, Pin-Han Ho, Xiaohong Jiang, Susumu Horiguchi. 655-660 [doi]
- Personal Firewall for Pocket PC 2003: Design & ImplementationWilly Susilo, Russell James Ang, Cameron Allen George McDonald, Jianyong Huang. 661-666 [doi]
- Distributed Branch-and-Bound Scheme for Solving the Winner Determination Problem in Combinatorial AuctionsSatoshi Fujita, Shigeaki Tagashira, Chen Qiao, Masaya Mito. 661-666 [doi]
- Connecting Components with Soft System Buses: A New Methodology for Design, Development, and Maintenance of Reconfigurable, Ubiquitous, and Persistent Reactive SystemsJingde Cheng. 667-672 [doi]
- The Categorisation of Hidden Web Databases through Concept Specificity and CoverageYih-Ling Hedley, Muhammad Younas, Anne E. James. 671-376 [doi]
- Adaptive Power Management for Mobile Agent-Based Information RetrievalYu Jiao, Ali R. Hurson. 675-680 [doi]
- Performance Analysis Mobility Management in Heterogeneous Wireless NetworksIrfan-Ullah Awan, Yue Li, Demetres D. Kouvatsos. 677-682 [doi]
- Reinforcement Learning in Neuro BDI Agents for Achieving Agent s Intentions in Vessel Berthing ApplicationsPrasanna Lokuge, Damminda Alahakoon. 681-686 [doi]
- The Design of a Secure and Pervasive Multimodal Web SystemS. Ernest Chang. 683-688 [doi]
- Agent-Based Knowledge Acquisition in Network Management DomainSameera Abar, Hideaki Hatori, Toru Abe, Tetsuo Kinoshita. 687-692 [doi]
- Improving Query Answering in Peer-to-Peer Data SearchingAláa Qasim Al-Namiy, Faris S. Majeed. 689-694 [doi]
- On Design of Agent Home Scheme for Prefetching Strategy in DSM SystemsSsu-Hsuan Lu, Chun-Chieh Yang, Hsiao-Hsi Wang, Kuan-Ching Li. 693-698 [doi]
- Preserving Composition in XML Object Relational StorageEric Pardede, J. Wenny Rahayu, David Taniar. 695-700 [doi]
- Galaxy DS: Directory Service for Service Composition Based on Smart Space StructureJun ichi Yura, Jin Nakazawa, Hideyuki Tokuda. 699-704 [doi]
- ISWIVE: An Integrated Semantic Web Interactive Visualization EnvironmentIng-Xiang Chen, Chun-Lin Fan, Pang-Hsiang Lo, Li-Chia Kuo, Cheng-Zen Yang. 701-706 [doi]
- Efficient Key Management Based on the Subset Difference Method for Secure Group CommunicationYuichi Nakamura, Hiroaki Kikuchi. 707-712 [doi]
- Semantic Web Technologies for Context-Aware Museum Tour Guide ApplicationsShih-Chun Chou, Wen-Tai Hsieh, Fabien L. Gandon, Norman M. Sadeh. 709-714 [doi]
- Secure OLSRFan Hong, Liang Hong, Cai Fu. 713-718 [doi]
- An Improved RSA-Based Access Control Scheme for Hierarchical GroupsJiali Cao, Zheng-an Yao. 719-723 [doi]
- Fuzzy Matchmaking for Web ServicesKuo-Ming Chao, Muhammad Younas, Chi-Chun Lo, Tao-Hsin Tan. 721-726 [doi]
- An AES S-Box to Increase Complexity and Cryptographic AnalysisJingmei Liu, Baodian Wei, Xiangguo Cheng, Xinmei Wang. 724-728 [doi]
- Web-Page Adaptation Framework for PC & Mobile Device CollaborationHui-Na Chua, Simon D. Scott, Y. W. Choi, Peter Blanchfield. 727-732 [doi]
- ART2-Based Genetic WatermarkingYing-Lan Chang, Koun-Tem Sun, Yueh-Hong Chen. 729-734 [doi]
- Extracting Social Knowledge in the Intelligent Conversational Channel for Agent CommunicationS. M. F. D. Syed Mustapha. 733-738 [doi]
- Impact of Document Types on the Performance of Caching Algorithms in WWW Proxies: A Trace Driven Simulation StudyRachid El Abdouni Khayari, Michael Best, Axel Lehmann. 737-742 [doi]
- Agent-Mediated e-Commerce SystemElhadi Shakshuki, Saad Abu-Draz. 739-744 [doi]
- Single Stream Image and Stream Network Prefetch in Streaming Media Proxy CachingHai Jin, Chao Xie, Kaiqin Fan, Rong Hu, Yunfa Li. 743-748 [doi]
- iHITS: Extending HITS for Personal Interests ProfilingZiming Zhuang. 747-751 [doi]
- An Improved Preemption Policy for Higher User SatisfactionIftekhar Ahmad, Joarder Kamruzzaman, Srinivas Aswathanarayaniah. 749-754 [doi]
- Developing Innovative Web Information Systems through the Use of Web Data Extraction TechnologyNor Adnan Yahaya, Goh Poh Gin, Wai-Choon Chan. 752-757 [doi]
- Concurrency Control Using Role Ordering (RO) SchedulerTomoya Enokido, Makoto Takizawa. 755-760 [doi]
- A 2-Dimensional Evolution Model of Value-Added Mobile Internet ServicesToshihiko Yamakami. 758-761 [doi]
- Round-Robin with FCFS Preemption: A Simple MAC Scheduling Scheme for Bluetooth PiconetLi-Hsing Yen, Chi-Hung Liao. 761-766 [doi]
- Mining Sequential Mobile Access Patterns Efficiently in Mobile Web SystemsVincent Shin-Mu Tseng, Kawuu Weicheng Lin. 762-767 [doi]
- Agent Frameworks in FCVWElhadi Shakshuki, Ivan Tomek, Omkarnath Prabhu. 768-773 [doi]
- An Enhanced User-Dependent Perfect-Scheduling Multiple Access Protocol for Wireless Packet NetworkJing Liu, Jiandong Li, Lei Zhou, Guanghui Zhang. 769-774 [doi]
- An Architecture for Automated QoS Resolution in Wireless SystemsBehzad Bordbar, Rachid Anane. 774-779 [doi]
- Fast Mode Decision for H.264/AVC Based on Macroblock CorrelationHong Zhu, Chengke Wu, Yangli Wang, Yong Fang. 775-780 [doi]
- Performance of Concatenated FEC under Fading Channel in Wireless-MAN OFDM SystemShuenn Gi Lee. 781-785 [doi]
- Deploying Secure Cryptographic Services in Multi-Domain IPv6 NetworksGabriel López Millán, Félix J. García Clemente, Manuel Gil Pérez, Gregorio Martínez Pérez, Antonio F. Gómez-Skarmeta. 785-789 [doi]
- Group Partition and Restoration Strategies for Survivable WDM NetworksChen-Shie Ho, Sy-Yen Kuo, Shih-Yi Yuan. 786-791 [doi]
- Binding Updates for Mobile Networks by Using Multicast Mechanism in IPv6 EnvironmentYen-Wen Chen, Ji-Min Shih. 790-795 [doi]
- Fast and Scalable Multi-TCAM Classification Engine for Wide Policy Table LookupNen-Fu Huang, Kwei-Bor Chen, Whai-En Chen. 792-797 [doi]
- An IPv6 Enabled Packet Engine Design for Home/SOHO RoutersMingshou Liu, Cheng-Hsien Hsu, Shi-Hong Kuo, Hsang-Chi Tsai. 796-800 [doi]
- No Administration Protocol (NAP) for IPv6 Router Auto-ConfigurationGuillaume Chelius, Eric Fleury, Laurent Toutain. 801-806 [doi]
- R-M/TCP: Protocol for Reliable Multi-Path Transport over the InternetKultida Rojviboonchai, Toru Osuga, Hitoshi Aida. 801-806 [doi]
- Improving the Ramping up Behavior of TCP Slow StartRung-Shiang Cheng, Hui-Tang Lin, Wen-Shyang Hwang, Ce-Kuen Shieh. 807-812 [doi]
- Global Connectivity for Mobile IPv6-Based Ad Hoc NetworksChiung-Ying Wang, Cheng-Ying Li, Ren-Hung Hwang, Yuh-Shyan Chen. 807-812 [doi]
- Conditional Drop Probability of RED Mechanism with UDP and TCP TrafficYung-Chung Wang. 813-820 [doi]
- Tunneling IPv6 through NAT with Teredo MechanismShiang-Ming Huang, Quincy Wu, Yi-Bing Lin. 813-818 [doi]
- Development of IPv6-IPv4 Translation Mechanisms for SIP-Based VoIP ApplicationsWhai-En Chen, Chia-Yung Su, Jui-Hung Weng. 819-823 [doi]
- Effects of Network Characteristics on Task Performance in a Desktop CVE SystemLing Chen. 821-826 [doi]
- Design of an IPv6 SOHO Router Based on Embedded Linux SystemJenq-Muh Hsu, Chian-Fei Hsu, Chung-Ming Huang. 827-832 [doi]
- Traffic Aggregation Based SIP over MPLS Network ArchitectureBo Rong, Jacques Lebeau, Maria Bennani, Michel Kadoch, Ahmed K. Elhakeem. 827-832 [doi]
- Design, Implementation and Evaluation of Routing Protocols for IPv6 Anycast CommunicatioSatoshi Doi, Shingo Ata, Hiroshi Kitamura, Masayuki Murata. 833-838 [doi]
- An Analysis on Adaptive Parallel Downloading MethodJunichi Funasaka. 835-840 [doi]
- Design and Implementation of IPv6 Anycast Routing Protocol: PIA-SMSatoshi Matsunaga, Shingo Ata, Hiroshi Kitamura, Masayuki Murata. 839-844 [doi]
- A Constraint-Based Performance Comparison of Hypercube and Star Multicomputers with FailuresS. M. Rezazad, Hamid Sarbazi-Azad. 841-846 [doi]
- The Development of Global IPv6 Products: An ExplorationShu-Fen Tseng, Hsi-Chieh Lee, Te-Ching Kung, Shou-Lien Chou, Jing-Yi Chen. 845-850 [doi]
- 2-State Alternator for Uniform Rings with Arbitrary SizeTzong-Jye Liu, Chia-Lin Lee. 847-852 [doi]
- Implementing RADIUS and Diameter AAA Systems in IPv6-Based ScenariosRafael Marín López, Gregorio Martínez Pérez, Antonio F. Gómez-Skarmeta. 851-855 [doi]
- Lattice-Based Precedence of Moderate Lock Modes on ObjectsYosuke Sugiyama, Tomoya Enokido, Makoto Takizawa. 853-858 [doi]
- A Dual (IP4/IPv6) Durable Storage Commercial ServiceEduardo Jacob, Juan José Unzilla, Maria Victoria Higuero, Purificación Sáiz, Marina Aguado, Christian Pinedo. 856-861 [doi]
- Design and Implementation of a Server-Aided PKI Service (SaPKILiang Cai, Xiaohu Yang, Chun Chen. 859-864 [doi]
- Market-Oriented Multiple Resource Scheduling in Grid Computing EnvironmentsChia-Hung Chien, Paul Hsueh-Min Chang, Von-Wun Soo. 867-872 [doi]
- Scalable Collision Detection for Massively Multiplayer Online GamesGraham Morgan, Kier Storey. 873-878 [doi]
- Grid Services MediationMuhammad Younas, Kuo-Ming Chao, Rachid Anane, S. Y. Yan, P. J. Lovett, Anthony N. Godwin. 879-884 [doi]
- Characterizing Ad Hoc B2B Applications Using Ontologies and Complex SystemsRosa Gil, Jaime Delgado, Zièd Choukair. 885-892 [doi]
- Correctness Proof Obligation for CoCTelS Telecom Services Composition ModelZièd Choukair. 893-900 [doi]
- Learning Opponent s Eagerness with Bayesian Updating Rule in a Market-Driven Negotiation ModelYoshizo Ishihara, Runhe Huang, Kwang Mong Sim. 903-908 [doi]
- CAM-Based Huffman Decoding Made Power EfficientPi-Chung Wang, Chun-Liang Lee, Yuan-Rung Yang, Hung-Yi Chang. 909-914 [doi]
- Designing a Space-Oriented System for Ubiquitous Outdoor Kid s Safety CareKatsuhiro Takata, Yusuke Shina, Jianhua Ma, Bernady O. Apduhan. 915-920 [doi]
- Fault-Tolerant Group Membership Protocols Using Physical Robot MessengersRami Yared, Xavier Défago, Takuya Katayama. 921-926 [doi]
- Relational Database Operations Modeling with UMLShuxin Yin, Indrakshi Ray. 927-932 [doi]
- A Prediction-Based and Cost-Based Replica Replacement Algorithm Research and SimulationTeng Ma, Junzhou Luo. 935-940 [doi]
- A RS-SISO Algorithm for Serially Concatenated Continuous Phase ModulationJinhua Sun, Jiandong Li, Lijun Jin. 941-946 [doi]
- A Reversible Data Hiding Scheme with Modified Side Match Vector QuantizationChin-Chen Chang, Wei-Liang Tai, Min-Hui Lin. 947-952 [doi]
- Vulnerability Profile for LinuxRatsameetip Wita, Yunyong Teng-Amnuay. 953-958 [doi]
- A Simple Protocol Offering Both Atomic Consistent Read Operations and Sequentially Consistent Read OperationsMichel Raynal, Matthieu Roy, Ciprian Tutu. 961-966 [doi]
- Integration of Specification-Based and CR-Based Approaches for GUI TestingWoei-kae Chen, Tung-Hung Tsai, Hung-Hsing Chao. 967-972 [doi]
- An Identity-Based Signature and Its Threshold VersionXiangguo Cheng, Jingmei Liu, Xinmei Wang. 973-977 [doi]
- Simultaneous Divisor Class Addition-Subtraction Algorithm and Its Applications to Hyperelliptic Curve CryptosystemXinxin Fan, YuMin Wang. 978-983 [doi]
- HSM: A Fast Packet Classification AlgorithmBo Xu, Dongyi Jiang, Jun Li. 987-992 [doi]
- Java Application s Packet Eavesdropper for Content Delivery NetworkTzu-Chi Huang, Ce-Kuen Shieh, Yu-Ben Miao. 993-998 [doi]
- Optical-Drop Wavelength Assignment Problem for Wavelength Reuse in WDM Ring Metropolitan Area NetworksNobuo Funabiki, Megumi Isogai, Toru Nakanishi, Teruo Higashino. 999-1004 [doi]
- Matching TCP Packets and Its Application to the Detection of Long Connection Chains on the InternetJianhua Yang, Shou-Hsuan Stephen Huang. 1005-1010 [doi]
- Global Indexing Scheme for Location-Dependent Queries in Multi Channels Mobile Broadcast EnvironmentAgustinus Borgy Waluyo, Bala Srinivasan, David Taniar. 1011-1016 [doi]