Abstract is missing.
- Assessment of a Mobile Agent Based Routing Protocol for Mobile Ad-hoc NetworksLei Liang, Peter Graham. 1-5 [doi]
- Sentient Networks: A New Dimension in Network CapabilityB. S. Manoj, R. Hegde, Bhaskar D. Rao, Ramesh R. Rao. 6-11 [doi]
- A Cell-Based Approach for Evolutionary Component Repositories for Intelligent Service RobotsHyung-Min Koo, In-Young Ko. 12-17 [doi]
- Rank Theorems for Forward Secrecy in Group Key Management ProtocolsAmjad Gawanmeh, Sofiène Tahar. 18-23 [doi]
- A Secure Group Agreement (SGA) Protocol for Peer-to-Peer ApplicationsAmy Beth Corman, Peter Schachte, Vanessa Teague. 24-29 [doi]
- Service Provider Implementation of SIP Regarding SecurityVesselin Tzvetkov, Holger Zuleger. 30-35 [doi]
- A Service Architecture for Countering Distributed Denial of Service AttacksFareed Zaffar, Gershon Kedem. 36-42 [doi]
- Effective Caching in Wireless Sensor NetworkMd. Ashiqur Rahman, Sajid Hussain. 43-47 [doi]
- A Location Mechanism with Mobile Reference Nodes in Wireless Sensor NetworksYing-Hong Wang, Chih-Peng Hsu, Chien-Min Lee, Kuo-Feng Huang, Ting-Wei Chang. 48-55 [doi]
- Efficient Battery Management for Sensor LifetimeMalka Halgamuge. 56-61 [doi]
- Coordination Protocols of Multiple Actuator Nodes in a Multi-Actuator/Multi-Sensor ModelKeiji Ozaki, Naohiro Hayashibara, Makoto Takizawa. 62-67 [doi]
- Multi-Agent Coordination Mechanism Based on Indirect InteractionSatoshi Kurihara, Kensuke Fukuda, Shin-ya Sato, Toshiharu Sugawara. 68-72 [doi]
- Self-Healing in Distributed Network EnvironmentsAndreas Rott. 73-78 [doi]
- On the Miscollaboration of Congestion Control Mechanisms at the Transport and the Network LayersAgeliki Tsioliaridou, Christos V. Samaras, Vassilis Tsaoussidis. 79-84 [doi]
- Detecting Stepping-Stone with Chaff PerturbationsHan-Ching Wu, Shou-Hsuan Stephen Huang. 85-90 [doi]
- Ontology Based Grid Information InteroperationSheng Di, Hai Jin, Shengli Li, Ling Chen, Li Qi, Chengwei Wang. 91-96 [doi]
- A Coverage and Connectivity Method to Cluster Topology in Wireless Sensor NetworksYing-Hong Wang, Chin-Yung Yu, Ping-Fang Fu. 97-102 [doi]
- An Update Propagation Strategy for Delay Reduction and Node Failure Tolerance in Peer-to-Peer NetworksToshiki Watanabe, Takahiro Hara, Yuki Kido, Shojiro Nishio. 103-108 [doi]
- Efficient Mediated Certificates Public-Key Encryption Scheme without PairingsChen Yang, Furong Wang, Xinmei Wang. 109-112 [doi]
- BER Analysis of a GMSK System Using Decision FeedbackXiandeng He, Changxing Pei, Changhua Zhu, Jiandong Li. 113-118 [doi]
- An Improved Approach to Secure Authentication and SigningDavid Argles, Alex Pease, Robert John Walters. 119-123 [doi]
- The Pursuit Automaton Approach for Estimating All-Pairs Shortest Paths in Dynamically Changing NetworksSudip Misra, B. John Oommen. 124-129 [doi]
- Cross Layer Routing for Reliable Connections in IP over WDM NetworksI-Hsuan Peng, Kuo-Wei Peng, Yen-Wen Chen. 130-135 [doi]
- New Algorithms for the Minimum-Cost Single-Source Unsplittable Flow ProblemChao Peng, Yasuo Tan, Laurence Tianruo Yang. 136-141 [doi]
- A Scalable and Efficient Client Emulation Method for IP Multicast Performance EvaluationMasafumi Watari, Atsushi Tagami, Teruyuki Hasegawa, Shigehiro Ano. 142-147 [doi]
- Implementation and Field Experiments of a Remote Medical-Care Supporting SystemAkio Koyama, Junpei Arai, Satoshi Sasaki, Takuya Numajiri, Leonard Barolli. 148-153 [doi]
- Performance Evaluation of a New Teleconference System by High Definition Omni-Directional Video TransmissionYosuke Sato, Yuya Maita, Koji Hashimoto, Yoshitaka Shibata. 154-159 [doi]
- Adaptive Video Streaming over P2P Multi-Hop PathJinfeng Zhang, Jianwei Niu, Rui He, Jian Ma. 160-165 [doi]
- Common-Cause Failure Analysis for Dynamic Hierarchical SystemsAkhilesh Shrestha, Liudong Xing. 166-171 [doi]
- Quasi-Orthogonal Time Division Multiplexing and Its Applications under Rayleigh Fading ChannelsEnchang Sun, Bin Tian, Yongchao Wang, Kechu Yi. 172-176 [doi]
- Assessment of Code Quality through Classification of Unit Tests in VeriNeCDominik Jungo, David Buchmann, Ulrich Ultes-Nitsche. 177-182 [doi]
- Specification Synthesis for Monitoring and Analysis of MANET ProtocolsNatalia Stakhanova, Samik Basu, Wensheng Zhang, Xia Wang, Johnny Wong. 183-187 [doi]
- A Traffic Classification Algorithm for Intrusion DetectionTarek Abbes, Adel Bouhoula, Michaël Rusinowitch. 188-193 [doi]
- A New Approach to Early Detection of an Unknown WormYuuki Yamada, Takashi Katoh, Bhed Bahadur Bista, Toyoo Takata. 194-198 [doi]
- Online and Offline Presence Information Integrated with RFID and Instant Messaging AgentHiroaki Kikuchi, Yuichi Nakamura. 199-202 [doi]
- Conditional Random Fields for Intrusion DetectionKapil Kumar Gupta, Baikunth Nath, Kotagiri Ramamohanarao. 203-208 [doi]
- WiMP-SCTP: Multi-Path Transmission Using Stream Control Transmission Protocol (SCTP) in Wireless NetworksChung-Ming Huang, Ching-Hsien Tsai. 209-214 [doi]
- Sizing Router Buffers for Large-Scale TCP/IP NetworksHiroyuki Hisamatsu, Go Hasegawa, Masayuki Murata. 215-219 [doi]
- Recovery Protocols for Replicated Databases - A SurveyLuis H. García-Muñoz, José Enrique Armendáriz-Iñigo, Hendrik Decker, Francesc D. Muñoz-Escoí. 220-227 [doi]
- Self-Similar Property for TCP Traffic under the Bottleneck RestrainmentTakuo Nakashima, Toshinori Sueyoshi. 228-233 [doi]
- Sharing Software Components Using a Service-Oriented, Distributed and Secure InfrastructureJoao Paulo F. de Oliveira, Michael Schuenck, Glêdson Elias da Silveira. 234-239 [doi]
- Enhancing IR with User-Centric Integrated Approach of Interest Change Driven Layered Profiling and User ContributionsRoman Y. Shtykh, Qun Jin. 240-245 [doi]
- A New Mutable Nonlinear Transformation Algorithm for S-boxAtsushi Watanabe, Hiroshi Haruki, Shun Shimotomai, Takeshi Saito, Tomoyuki Nagase, Yoshio Yoshioka, Yoshiei Hasegawa. 246-251 [doi]
- A Computational Approach to TSP Performance Prediction Using Data MiningPaula Cecilia Fritzsche, Dolores Rexachs, Emilio Luque. 252-259 [doi]
- Evaluation of Open-Domain Question Answering Systems within a Time ConstraintElisa Noguera, Fernando Llopis, Antonio Ferrández, Alberto Escapa. 260-265 [doi]
- Towards Answering How do I Questions Using ClassificationKelvin Wu, Lei Yu, Michal Cutler. 266-271 [doi]
- Arabic Sign Language Recognition an Image-Based ApproachM. Mohandes, S. I. Quadri, Mohamed Deriche. 272-276 [doi]
- Morphological Zerotree Compression Coding Based on Integer Wavelet Transform for Iris ImageYuanning Liu, Xiaodong Zhu, Lingge Sui, Zhen Liu. 277-282 [doi]
- Examining the Feasibility of Metasearch Based on Results of Human Judgements on Thai QueriesShisanu Tongchim, Virach Sornlertlamvanich, Hitoshi Isahara. 283-288 [doi]
- WaveQ: Combining Wavelet Analysis and Clustering for Effective Image RetrievalDany Gebara, Reda Alhajj. 289-294 [doi]
- Using Two-Stage Concept-Based Singular Value Decomposition Technique as a Query Expansion StrategyXuheng Xu, Xiaodan Zhang, Xiaohua Hu. 295-300 [doi]
- A New Method of Cluster-Based Topic Language Model for Genomic IRJian Wen, Zhoujun Li, Lijuan Zhang, Xiaohua Hu, Huowang Chen. 301-306 [doi]
- Mining Visual Knowledge for Multi-Lingual Image RetrievalMasashi Inoue. 307-312 [doi]
- Proactive Documents--A New Paradigm to Access Document Information from Various ContextsKarlheinz E. S. Toni. 313-320 [doi]
- Filtering Spam Using Kolmogorov Complexity EstimatesL. M. Spracklin, Lawrence V. Saxton. 321-328 [doi]
- A Semi-Automatic Framework for Mining ERP PatternsJiawei Rong, Dejing Dou, Gwen A. Frishkoff, Robert Frank, Allen D. Malony, Don M. Tucker. 329-334 [doi]
- Effectiveness of Multi-Perspective Representation Scheme on Support Vector MachinesJia Zeng, Reda Alhajj. 335-340 [doi]
- An Investigation of Chip-Level Hardware Support for Web MiningKin Fun Li, Darshika G. Perera. 341-348 [doi]
- Learning Relations and Information Extraction Rules for Protein AnnotationJee-Hyub Kim, Melanie Hilario. 349-354 [doi]
- ClusTex: Information Extraction from HTML PagesFatima Ashraf, Reda Alhajj. 355-360 [doi]
- Extracting Significant Phrases from TextYuan J. Lui, Richard Brent, Ani Calinescu. 361-366 [doi]
- Hybrid Clustering of Large Text DataJacob Kogan. 367-372 [doi]
- Reduction in Dimensions and Clustering Using Risk and Return ModelSayed W. Qaiyumi, Daniel Stamate. 373-378 [doi]
- Using Web Directories for Similarity Measurement in Personal Name DisambiguationQuang Minh Vu, Tomonari Masada, Atsuhiro Takasu, Jun Adachi. 379-384 [doi]
- Privacy-Preserving Two-Party K-Means Clustering via Secure ApproximationChunhua Su, Feng Bao, Jianying Zhou, Tsuyoshi Takagi, Kouichi Sakurai. 385-391 [doi]
- A Parallel Mining Algorithm for Closed Sequential PatternsTian Zhu, Sixue Bai. 392-395 [doi]
- Fast and Efficient Implementation of AES via Instruction Set ExtensionsAdam J. Elbirt. 396-403 [doi]
- Reducing the Complexity in the Distributed Multiplication Protocol of Two Polynomially Shared ValuesPeter Lory. 404-408 [doi]
- Efficient Conjunctive Keyword-Searchable EncryptionEun-Kyung Ryu, Tsuyoshi Takagi. 409-414 [doi]
- Advanced Packet Filter Placement Strategies for Carrier-Grade IP-NetworksBirger Tödtmann, Erwin P. Rathgeb. 415-423 [doi]
- Obligations for Role Based Access ControlGansen Zhao, David W. Chadwick, Sassa Otenko. 424-431 [doi]
- Effective Storage Security in Incompletely Trusted EnvironmentChunming Rong, Won-Chol Kim. 432-437 [doi]
- An Efficient Scheme for User Authentication in Wireless Sensor NetworksCanming Jiang, Bao Li, Haixia Xu. 438-442 [doi]
- Using Social Network Theory Towards Development of Wireless Ad Hoc Network TrustSameer Pai, Tanya Roosta, Stephen B. Wicker, Shankar Sastry. 443-450 [doi]
- Detecting Anomaly Node Behavior in Wireless Sensor NetworksQinghua Wang, Tingting Zhang. 451-456 [doi]
- Mobile Jamming Attack and its Countermeasure in Wireless Sensor NetworksHung-Min Sun, Shih-Pu Hsu, Chien-Ming Chen. 457-462 [doi]
- Random Oracle Instantiation in Distributed Protocols Using Trusted Platform ModulesVandana Gunupudi, Stephen R. Tate. 463-469 [doi]
- Information Security Threats and Access Control Practices in Norwegian BusinessesJanne Merete Hagen, Tormod Kalberg Sivertsen, Chunming Rong. 470-476 [doi]
- Context-Aware Security Policy for the Service DiscoverySlim Trabelsi, Laurent Gomez, Yves Roudier. 477-482 [doi]
- Adapting the UCON_ABC Usage Control Policies on CORBASec InfrastructureLau Cheuk Lung, Marcelo Shinji Higashiyama, Rafael R. Obelheiro, Joni da Silva Fraga. 483-488 [doi]
- Enforcing Fine-Grained Authorization Policies for Java Mobile AgentsGiovanni Russello, Changyu Dong, Naranker Dulay. 489-496 [doi]
- A Decentralized Authorization ArchitectureFeike W. Dillema, Simone Lupetti, Tage Stabell-Kulø. 497-504 [doi]
- Conflict Detection and Resolution in Context-Aware AuthorizationAmir Reza Masoumzadeh, Morteza Amini, Rasool Jalili. 505-511 [doi]
- Authenticated Broadcast Encryption SchemeChik-How Tan, Joseph Chee Ming Teo, Jens-Are Amundsen. 512-518 [doi]
- Leveraging Identity-Based Cryptography for Node ID Assignment in Structured P2P SystemsSunam Ryu, Kevin R. B. Butler, Patrick Traynor, Patrick Drew McDaniel. 519-524 [doi]
- A Certified Email Protocol Using Key ChainsJan Cederquist, Muhammad Torabi Dashti, Sjouke Mauw. 525-530 [doi]
- Heuristics for Improving Cryptographic Key Assignment in a HierarchyAnne V. D. M. Kayem, Patrick Martin, Selim G. Akl. 531-536 [doi]
- An Identity-Based Key Management Framework for Personal NetworksKhaled Masmoudi, Hossam Afifi. 537-543 [doi]
- Identity-Based and Inter-Domain Password Authenticated Key Exchange for Lightweight ClientsFord-Long Wong, Hoon Wei Lim. 544-550 [doi]
- A New and Efficient Key Management Scheme for Content Access Control within Tree HierarchiesH. Ragab Hassen, Abdelmadjid Bouabdallah, Hatem Bettahar. 551-556 [doi]
- Detecting Coordinated Distributed Multiple AttacksSrinivas Mukkamala, Krishna Yendrapalli, Ram B. Basnet, Andrew H. Sung. 557-562 [doi]
- Finding Logically Consistent Resource-Deception Plans for Defense in CyberspaceNeil C. Rowe. 563-568 [doi]
- Intrusion Detection for Encrypted Web AccessesAkira Yamada, Yutaka Miyake, Keisuke Takemori, Ahren Studer, Adrian Perrig. 569-576 [doi]
- Relative Entropy-Based Filtering of Internet Worms by Inspecting TCP SYN Retry PacketsByungseung Kim, Saewoong Bahk. 577-582 [doi]
- Kernel and Application Integrity Assurance: Ensuring Freedom from Rootkits and Malware in a Computer SystemLifu Wang, Partha Dasgupta. 583-589 [doi]
- HTTPS Hacking ProtectionThawatchai Chomsiri. 590-594 [doi]
- Towards an Aspect Oriented Approach for the Security Hardening of CodeAzzam Mourad, Marc-André Laverdière, Mourad Debbabi. 595-600 [doi]
- An Online/Offline Signature Scheme Based on the Strong RSA AssumptionPing Yu, Stephen R. Tate. 601-606 [doi]
- Authenticating Feedback in Multicast Applications Using a Novel Multisignature Scheme Based on Cubic LFSR SequencesSaikat Chakrabarti 0002, Santosh Chandrasekhar, Mukesh Singhal, Kenneth L. Calvert. 607-613 [doi]
- A Robust and Efficient Mechanism to Distribute Certificate Revocation Information Using the Grid Monitoring ArchitectureDaniel Kouril, Ludek Matyska, Michal Procházka. 614-619 [doi]
- Privacy Rights Management for Privacy Compliance SystemsRonggong Song, Larry Korba, George Yee. 620-625 [doi]
- The All-or-Nothing Anti-Theft Policy - Theft Protection for Pervasive ComputingJakob Illeborg Pagter, Michael Østergaard Pedersen. 626-631 [doi]
- On the Contribution of Preamble to Information Hiding in Mimicry AttacksHilmi Günes Kayacik, A. Nur Zincir-Heywood. 632-638 [doi]
- Detecting Protein-Domains DNA-Motifs Association in Saccharomyces cerevisiae Regulatory NetworksNawar Malhis, Kelvin Xi Zhang, B. F. Francis Ouellette. 639-644 [doi]
- A Spatial Indexing Approach for Protein Structure ModelingWendy Osborn. 645-650 [doi]
- Dealing with Some Conceptual Data Model Requirements for Biological DomainsJosé Antônio Fernandes de Macêdo, Fabio Porto, Sérgio Lifschitz, Philippe Picouet. 651-656 [doi]
- A Greedy Correlation-Incorporated SVM-Based Algorithm for Gene SelectionMingjun Song, Sanguthevar Rajasekaran. 657-661 [doi]
- Investigation of Relationships among Excavate Taxa Using a New Quartet-Based Phylogenetic Analysis MethodMonther Tarawneh, Bing Bing Zhou, Pinghao Wang, Albert Y. Zomaya. 662-667 [doi]
- Markov Models to Classify M. tuberculosis SpoligotypesGeorges Valétudie, Jacky Desachy, Christophe Sola. 668-671 [doi]
- A Graph Based Approach to Discover Conserved Regions in DNA and Protein SequencesSantan Challa, Parimala Thulasiraman. 672-677 [doi]
- Attractive Feature Reduction Approach for Colon Data ClassificationMohammed Al-Shalalfa, Reda Alhajj. 678-683 [doi]
- Biological Sequence Clustering and Classification with a Hybrid Method and Dynamic ProgrammingWei-bang Chen, Chengcui Zhang, Xin Chen. 684-689 [doi]
- Biological Systems Analysis Using Inductive Logic ProgrammingAndrei Doncescu, Yoshitaka Yamamoto, Katsumi Inoue. 690-695 [doi]
- Database-Driven Grid Computing with GridBASEHans De Sterck, Chen Zhang, Aleks Papo. 696-701 [doi]
- Parallel Contour Matching and 3D Partial Retrieval in Bio-Image DatabaseYong Li, Xiujuan Chen, Saeid Belkasim, Yi Pan. 702-706 [doi]
- Computational Methods for Analysis of Cryptic Recombination in the Performance of Genomic Recombination Detection SoftwareJamal Alhiyafi, Cavitha Sabesan, Shiyong Lu, Melphine Harriott, Deborah Jurczyszyn, Raquel P. Ritchie, Felicitas S. Gonzales, Jeffrey L. Ram. 707-712 [doi]
- A Grid System for the Ingestion of Biological Data into a Relational DBMSMaria Mirto, Massimo Cafaro, Sandro Fiore, Giovanni Aloisio. 713-718 [doi]
- A Circular Hamming Distance, Circular Gumbel Distribution, RNA Relics and Primitive GenomeJacques Demongeot, Andrés Moreira. 719-726 [doi]
- Kinetic Analysis of Ligand-Receptor Complex Formation with the Aid of Computer SimulationHiroshi Kobayashi, Ryuzo Azuma, Akihiko Konagaya. 727-732 [doi]
- Application of Double Clustering to Gene Expression Data for Class PredictionMohammed Al-Shalalfa, Reda Alhajj. 733-738 [doi]
- Efficiency of Hybrid Normalization of Microarray Gene Expression: A Simulation StudyMehdi Pirooznia, Youping Deng. 739-744 [doi]
- Crick s Hypothesis Revisited: The Existence of a Universal Coding FrameJean-Louis Lassez, Ryan A. Rossi, Axel E. Bernal. 745-751 [doi]
- Sim-PowerCMP: A Detailed Simulator for Energy Consumption Analysis in Future Embedded CMP ArchitecturesAntonio Flores, Juan L. Aragón, Manuel E. Acacio. 752-757 [doi]
- An Inter-Core Communication Enabled Multi-Core Simulator Based on SimpleScalarRongrong Zhong, Yongxin Zhu, Weiwei Chen, Mingliang Lin, Weng-Fai Wong. 758-763 [doi]
- Synthetic Trace-Driven Simulation of Cache MemoryRahman Hassan, Antony Harris, Nigel P. Topham, Aristides Efthymiou. 764-771 [doi]
- A Real-Time Scheduling Algorithm with Buffer Optimization for Embedded Signal Processing SystemsNan Guan, Mingsong Lv, Qingxu Deng, Ge Yu. 772-777 [doi]
- Reliability-Driven Scheduling of Periodic Tasks in Heterogeneous Real-Time SystemsWei Luo, Xiao Qin, Kiranmai Bellam. 778-783 [doi]
- A Flexible Scheduling Framework for Deeply Embedded SystemsKarsten Walther, Jörg Nolte. 784-791 [doi]
- Exploring Functional Unit Design Space of VLIW Processors for Optimizing Both Performance and Energy ConsumptionAbhishek Pillai, Wei Zhang, Laurence Tianruo Yang. 792-797 [doi]
- An Area-Efficient Approach to Improving Register File Reliability against Transient ErrorsMallik Kandala, Wei Zhang, Laurence Tianruo Yang. 798-803 [doi]
- Hardware-Software Cosynthesis of Multiprocessor Embedded ArchitecturesGul N. Khan, Usman Ahmed. 804-810 [doi]
- Detecting VLIW Hard Errors Cost-Effectively through a Software-Based ApproachAbhishek Pillai, Wei Zhang, Dimitrios Kagaris. 811-815 [doi]
- Embedded Intelligent Intrusion Detection: A Behavior-Based ApproachAdrian P. Lauf, Richard A. Peters, William H. Robinson. 816-821 [doi]
- High-Flexibility Rekeying Processor for Key Management in Secure MulticastAbdulhadi Shoufan, Ralf Laue 0002, Sorin A. Huss. 822-829 [doi]
- A Soft-Core for Pattern RecognitionC. Gonzalez-Concejero, V. Rodellar, Agustín Álvarez Marquina, E. Martinez de Icaya, Pedro Gómez Vilda. 830-834 [doi]
- Fault Tolerance in Small World Cellular Neural Networks for Image ProcessingKatsuyoshi Matsumoto, Hideki Mori, Minoru Uehara. 835-839 [doi]
- An Improved RAIM Scheme for Processing Multiple Outliers in GNSSJunjie Ni, Yongxin Zhu, Wei Guo. 840-845 [doi]
- Coordinate Magnetic Routing for Mobile Sinks Wireless Sensor NetworksShih-Hao Chang, Madjid Merabti, Hala M. Mokhtar. 846-851 [doi]
- Conflict Free Address Allocation Mechanism for Mobile Ad Hoc NetworksSudath Indrasinghe, Rubem Pereira, John Haggerty. 852-857 [doi]
- Scalable Automaton Matching for High-Speed Deep Content InspectionYing-Dar Lin, Kuo-Kun Tseng, Chen-Chou Hung, Yuan-Cheng Lai. 858-863 [doi]
- Mobile Event Monitoring Protocol for Wireless Sensor NetworksFaycal Bouhafs, Madjid Merabti, Hala M. Mokhtar. 864-869 [doi]
- MAC Address Translation for Enabling Scalable Virtual Private LAN ServicesPi-Chung Wang, Chia-Tai Chan, Po-Yen Lin. 870-875 [doi]
- Real Time Scheduling for Audio and Video StreamsRubem Pereira, Ella Pereira. 876-881 [doi]
- A New Low Cost Sessions-Based Misbehaviour Detection Protocol (SMDP) for MANETTarag Fahad, Djamel Djenouri, Robert Askwith, Madjid Merabti. 882-887 [doi]
- A Toolkit for Virtual Large-Scale Storage in a Learning EnvironmentMinoru Uehara. 888-893 [doi]
- A Fuzzy-Based and Simulated IP Network Traffic Engineering Promoting Multi-Service PerformanceKenvi Wang, Lin-Yi Peng, Tsung-Mao Chen, Szu-Yu Chen. 894-899 [doi]
- Multi-Purpose Models for QoS MonitoringStefan Wallin, Viktor Leijon. 900-905 [doi]
- Low-Complexity Parallel Systolic Architectures for Computing Multiplication and Squaring over FG(2:::m:::)Chiou-Yng Lee, Yung-Hui Chen. 906-911 [doi]
- Buffer Management for Multimedia QoS Control over HSDPA DownlinkSuleiman Y. Yerima, Khalid Al-Begain. 912-917 [doi]
- Planning and Design of TWAREN: Advanced National Research and Education Network in TaiwanTe-Lung Liu, C. Eugene Yeh. 918-922 [doi]
- A Control Plane Architecture to Enhance Network Appliance Agility through Autonomic FunctionalityE. C. L. Watts, Madjid Merabti, A. Taleb-Bendiab. 923-928 [doi]
- Constructing Enterprise Information Network Security Risk Management Mechanism by Using OntologyFong-Hao Liu. 929-934 [doi]
- Bridging the Gap between Networked Appliances and Virtual WorldsPaul Fergus, David Llewellyn-Jones, Madjid Merabti, Abdennour El Rhalibi. 935-940 [doi]
- Making Embedded Software Development More Efficient with SOADaniel Barisic, Martin Krogmann, Guido Stromberg, Peter Schramm. 941-946 [doi]
- Service-Oriented Device Communications Using the Devices Profile for Web servicesFrançois Jammes, Antoine Mensch, Harm Smit. 947-955 [doi]
- Service-Oriented Architectures for Embedded Systems Using Devices Profile for Web ServicesElmar Zeeb, Andreas Bobek, Hendrik Bohn, Frank Golatowski. 956-963 [doi]
- Bilateral Service Mapping Approaches between the Different Service Oriented Architectures Web Services and UPnPMarkus Zajac, Brigitte Oesterdiekhoff, Chris Loeser, Hendrik Bohn. 964-969 [doi]
- Fuzzy Logic Based Admission Control for Multimedia Streams in the UPnP QoS ArchitectureMichael Ditze, Matthias Grawinkel. 970-976 [doi]
- Architecture and Models for Self-Adaptability of Transport ProtocolsNicolas Van Wambeke, François Armando, Christophe Chassot, Ernesto Exposito. 977-982 [doi]
- Convergent Online Charging for Context-Aware Mobile ServicesFrank Bormann, Stephan Flake, Jürgen Tacken. 983-988 [doi]
- Comparative Evaluation of Converged Service-Oriented ArchitecturesDavy Preuveneers, Julien Pauty, Dimitri Van Landuyt, Yolande Berbers, Wouter Joosen. 989-994 [doi]
- Conceptual Framework for a Comprehensive Service Management MiddlewareFarhana Zulkernine, Patrick Martin. 995-1000 [doi]
- An Analysis of Web Services Mediation Architecture and Pattern in SynapseChen Wu, Elizabeth Chang. 1001-1006 [doi]
- An User-Driven Slight Ontology Framework Based on Meta-Ontology for Change ManagementLina Fang, Shengqun Tang, Yan Yang, Ruliang Xiao, Ling Li, Xinguo Deng, Yang Xu, Youwei Xu. 1007-1014 [doi]