Abstract is missing.
- Development of Scheduler for Real Time and Embedded System DomainM. V. Panduranga Rao, K. Chandrashekar Shet, R. Balakrishna, K. Roopa. 1-6 [doi]
- The Solution Modelling System with Grouped AgentsCai Zhiming, Yin Jun, Huang Liangli. 7-11 [doi]
- Wireless Service Attributes Classification and Matching Mechanism Based on Decision TreeMin Peng, Laurence Tianruo Yang, Wuqing Zhao, Naixue Xiong. 12-17 [doi]
- RFID-Based Locating ManagementXuan Gu, Dong Wang, Huanye Sheng. 18-23 [doi]
- Research on Context-Aware Mobile ComputingLi Han, Jyri P. Salomaa, Jian Ma, Kuifei Yu. 24-30 [doi]
- A Student Experiment Method for Learning the Basics of Embedded Software Development Including HW/SW Co-designHiroyasu Mitsui, Hidetoshi Kambe, Satoshi Endo, Hisao Koizumi. 31-37 [doi]
- A Prototype System to Support the KJ Method by Cooperation between Visually-Impaired Persons and Sighted PersonsHiroaki Yuze, Chaoqun Wang, Shigeki Sugiura, Takeshi Otofuji, Toshiki Aikawa. 38-43 [doi]
- Selecting a Networked Virtual Environment Platform and the Design of a Collaborative e-Learning EnvironmentAndreas Konstantinidis, Thrasyvoulos Tsiatsos. 44-49 [doi]
- Using Incremental Mining to Generate Fuzzy Rules for Real-Time Network Intrusion Detection SystemsMing-Yang Su, Sheng-Cheng Yeh, Kai-Chi Chang, Hua-Fu Wei. 50-55 [doi]
- Monitoring Network Traffic to Detect Stepping-Stone IntrusionJianhua Yang, Byong Lee, Stephen S. H. Huang. 56-61 [doi]
- A GPU-Based Multiple-Pattern Matching Algorithm for Network Intrusion Detection SystemsNen-Fu Huang, Hsien-Wei Hung, Sheng-Hung Lai, Yen-Ming Chu, Wen-Yen Tsai. 62-67 [doi]
- Performance Evaluation for Scheduling Algorithms in WiMAX NetworkJin-Cherng Lin, Chun-Lun Chou, Cheng-Hsiung Liu. 68-74 [doi]
- Empirical Performance Evaluation of Stretched HypercubesSina Meraji, Hamid Sarbazi-Azad. 75-79 [doi]
- Hybrid Traffic Model for Multimedia Network Performance EvaluationPriscila Solís Barreto, Paulo Henrique Portela de Carvalho. 80-85 [doi]
- A Performance Study of Virtual Machine Migration vs. Thread Migration for Grid SystemsPo-Cheng Chen, Cheng-I Lin, Sheng-Wei Huang, Jyh-Biau Chang, Ce-Kuen Shieh, Tyng-Yeu Liang. 86-91 [doi]
- Model-Driven Automation in Grid EnvironmentsCameron Kiddle, Derek Kivi, Rob Simmonds. 92-99 [doi]
- A Clustering Analysis Based Trust Model in Grid Environment Supporting Virtual OrganizationsXudong Ni, Junzhou Luo. 100-105 [doi]
- Designing Fingerprint-Recognition-Based Access Control for Electronic Medical Records SystemsYongNyuo Shin, Yongjun Lee, Woochang Shin, Jinyoung Choi. 106-110 [doi]
- A Workflow-Based Access Control Framework for e-Health ApplicationsGiovanni Russello, Changyu Dong, Naranker Dulay. 111-120 [doi]
- An SSO-Capable Distributed RBAC Model with High Availability across Administrative DomainSekpon Juntapremjitt, Somchart Fugkeaw, Piyawit Manpanpanich. 121-126 [doi]
- DS-MOSD: A Dynamic Selectable Master OSD Model for Large-Scale Object-Based Storage SystemYinliang Yue, Fang Wang, Dan Feng. 127-132 [doi]
- Distributed Databases in Dynamic R-Tree for Vehicle Information SystemsYusuke Murase, Ailixier Aikebaier, Tomoya Enokido, Makoto Takizawa. 133-138 [doi]
- Scalability Analysis for Wireless Sensor Networks Routing ProtocolsLubna K. Alazzawi, Ali M. Elkateeb, Aiyappa Ramesh, Waleed Aljuhar. 139-144 [doi]
- Maxflow Based Routing for Traffic Engineering and Sustained High Bitrate ApplicationsJaiwant Mulik. 145-150 [doi]
- AS Alliance in Inter-Domain RoutingXiangjiang Hu, Peidong Zhu, Kaiyu Cai, Zhenghu Gong. 151-156 [doi]
- A Stochastic Availability Prediction Model for Head Nodes in the HA ClusterYong-Ju Lee, Hag-Young Kim, Cheol-Hoon Lee. 157-161 [doi]
- SOSRAID-6: A Self-Organized Strategy of RAID-6 in the Degraded ModeSuzhen Wu, Dan Feng, Bo Mao, Jianxi Chen, Lingfang Zeng. 162-167 [doi]
- Fault Tolerant Small-World Cellular Neural NetworksKatsuyoshi Matsumoto, Shingo Nomoto, Minoru Uehara, Hideki Mori. 168-172 [doi]
- Parallel Computing of CG Using an Open Source Windows GridKenichi Tanaka, Minoru Uehara, Hideki Mori. 173-180 [doi]
- Script: Simulations from Grid to Ubiquitous ComputingYih-Jiun Lee, Kai-Wen Lien. 181-186 [doi]
- Performance Optimization of Temporal Reasoning for Grid Workflows Using Relaxed Region AnalysisKe Xu, Junwei Cao, Lianchen Liu, Cheng Wu. 187-194 [doi]
- A Case Study of a Linux Grid on Windows Using Virtual MachinesKenichi Tanaka, Minoru Uehara, Hideki Mori. 195-200 [doi]
- Research on Location Service Integration StrategyYongyi Zhao, Jin Li. 201-204 [doi]
- Strongly Instrumented Generic Mobility Architecture (SIGMA)Misbah Mubarak, Sara Sultana, Zarrar Khan, Hafiz Farooq Ahmad, Hajra Batool Asghar, Hiroki Suguri. 205-210 [doi]
- Device Middleware for Heterogeneous Access to Java ServicesAndre Elia Assad, Nelson Souto Rosa. 211-216 [doi]
- Cross-Correlated FEC Scheme for Multimedia Streaming over Wireless LANEunyong Park, Sunyoung Han, Heemin Kim, Kiwon Son. 217-222 [doi]
- A Multi-Purpose Wireless Network Emulator: QOMETRazvan Beuran, Junya Nakata, Takashi Okada, Lan Tien Nguyen, Yasuo Tan, Yoichi Shinoda. 223-228 [doi]
- A Graph Isomorphism Based Authentication Protocol for Access Control in WLANNgoc Bao Tran, Dinh Thuc Nguyen. 229-234 [doi]
- A Method of Project Member Arrangement of Using SOM for a Web CommunityShingo Kawamura, Shinya Toji, Minoru Uehara, Hideki Mori. 235-240 [doi]
- Thoughts on Multi-Disciplinary Inspired Research on Open Network and Information SystemYufeng Wang, Yoshiaki Hori, Kouichi Sakurai. 241-246 [doi]
- Delta Compression for Information Push ServicesJunze Wang, Yi Guo, Benxiong Huang, Jianhua Ma, Yijun Mo. 247-252 [doi]
- Overlay Multicast Architecture Supporting QoS over NGNBoyoung Rhee, Kwangman Koh, Sunyoung Han. 253-258 [doi]
- Efficient QoS Implementation for MPLS VPNMohamed El Hachimi, Marc-Andre Breton, Maria Bennani. 259-263 [doi]
- eMuse: QoS Guarantees for Shared Storage ServersDan Feng, Chengtao Lu, Fang Wang. 264-269 [doi]
- An Optimal Solution of Byzantine Agreement in a Scale Free NetworkKuo-Qin Yan, Shun-Sheng Wang, Shu-Ching Wang. 270-275 [doi]
- A Parallel Computation of the Steiner Tree Algorithm on Server-Client ParadigmRashid Bin Muhammad. 276-280 [doi]
- LRTG: Scheduling Distributed Real-Time Tasks in Unreliable and Untrustworthy SystemsKai Han, Binoy Ravindran, E. Douglas Jensen. 281-287 [doi]
- Resource-Cost Analysis for Massively Multiplayer Online GamesZheng D. Wu. 288-295 [doi]
- Credit Token Based Dynamic Resource Renting and Offering Mechanism for Cognitive Radio WRAN BS Spectrum SharingDan Gao, Jueping Cai, Zan Li, Xing Wei, Rei Chen. 296-300 [doi]
- PTO: A Trust Ontology for Pervasive EnvironmentsMohsen Taherian, Rasool Jalili, Morteza Amini. 301-306 [doi]
- Granularity Considering in a Trust Model for P2P NetworksLi Mingchu, Ren Yizhi, Kouichi Sakurai, Cui Yongrui, Wang Zhihui. 307-312 [doi]
- Trustworthiness and Confidence of Peers in Peer-to-Peer (P2P) NetworkYoshio Nakajima, Alireza Goudarzi Nemati, Tomoya Enokido, Makoto Takizawa. 313-318 [doi]
- Application Level QoS in Multimedia Peer-to-Peer (P2P) NetworksAlireza Goudarzi Nemati, Makoto Takizawa. 319-324 [doi]
- Collaboratively Scheduling to Decrease Inter-AS Traffic in P2P Live StreamingXuping Tu, Hai Jin, Xiaofei Liao, Weidong Wang, Sirui Yang, Qi Huang. 325-330 [doi]
- An Expanded Stochastic Model in DAG SchemesKai Hu, Yan Jiang, Zhibin Yang, Shiran Chen. 331-336 [doi]
- OSS: Efficient Compiler Approach for Selecting Optimal Strip Size on the Imagine Stream ProcessorJing Du, Canqun Yang, Fujiang Ao, Xuejun Yang. 337-342 [doi]
- Hardware Implementation of ADABOOST ALGORITHM and VerificationYuehua Shi, Feng Zhao, Zhong Zhang. 343-346 [doi]
- A New Dynamic Pricing Scheme with Call Admission Control to Reduce Network CongestionMehrdad Manaffar, Hamidreza Bakhshi, Mostafa Pilevari. 347-352 [doi]
- An Adaptive Approach to Manage the Number of Virtual ChannelsMohammad Mirza-Aghatabar, Somayyeh Koohi, Shaahin Hessabi, Dara Rahmati. 353-358 [doi]
- Cell Level Co-Operation for SLA Based Radio Resource ManagementMuhammad Bilal Ali, Muhammad Kamran, Hafiz Farooq Ahmad, Hiroki Suguri, Ali Liaqat. 359-364 [doi]
- The Early Detection of DDoS Based on the Persistent Increment Feature of the Traffic VolumeYing Huang, Xiangsheng Fu, Qiang Hou, Zifan Yu. 365-370 [doi]
- Annulling SYN Flooding Attacks with WhitelistTae Hyung Kim, Young-Sik Choi, Jong Kim, Sung Je Hong. 371-376 [doi]
- Dynamic Detection and Tolerance of Attacks in Storage Area NetworksYacine Djemaiel, Noureddine Boudriga. 377-382 [doi]
- Scheduling Strategy of Subtask DecomposedBenting Wan. 383-386 [doi]
- An Adaptable Application Offloading Scheme Based on Application BehaviorGonzalo Huerta Cánepa, Dongman Lee. 387-392 [doi]
- Efficient Shared Computations over Distributed SitesPedro Nuno San-Bento Furtado. 393-398 [doi]
- PLEXCast: Peer-to-Peer Flexble Broadcast SystemYoshitaka Yokokawa, Koji Hashimoto, Yoshitaka Shibata. 399-406 [doi]
- Design and Implementation of a JXTA-Overlay P2P System and Smart Box EnvironmentKeita Matsuo, Leonard Barolli, Fatos Xhafa, Akio Koyama, Arjan Durresi, Makoto Takizawa. 407-412 [doi]
- The Design of Optimal Period InterleaverYing Wang, Xinjun Du, Hui Li, YuMin Wang. 413-415 [doi]
- An Anonymous and Deniable Conversation for a Thin ClientRen-Chiun Wang, Wen-Shenq Juang, Chin-Laung Lei. 416-421 [doi]
- Fair Exchange Signature SchemesJingwei Liu, Rong Sun, Wenping Ma, Ying Li, Xinmei Wang. 422-427 [doi]
- Aggregate and Separate of Signatures in Wireless NetworkGuoyan Zhang, Shaohui Wang. 428-433 [doi]
- Performance Assessment of Enhanced Just-in-Time Protocol in OBS Networks Taking into Account Control Packet Processing and Optical Switch Configuration TimesJoel J. P. C. Rodrigues, Mário M. Freire. 434-439 [doi]
- Simpler and More Accurate Throughput Analysis of CDMA Pure ALOHA Networks with Variable Length TrafficShu-Ming Tseng, Yu-Chin Kuo, Yueh-Teng Hsu. 440-444 [doi]
- Improvement of SCTP Performance during Handshake ProcessCheng-Feng Tai, Lin-Huang Chang, Ting-Wei Hou. 445-450 [doi]
- A Core Migration Method to Minimize Inter-Destination Delay VariationWu-Hong Tsai, Yuan-Sun Chu. 451-456 [doi]
- Fault Tolerant HAWAII Protocol for IP services in Wireless NetworksR. Gunasundari, S. Shanmugavel, K. Bakyalakshmi. 457-462 [doi]
- Enhanced Chord-Based Routing Protocol Using Neighbors Neighbors LinksDai Bin, Wang Furong, Jianhua Ma, Liu Jian. 463-466 [doi]
- FVE — A Virtual Environment for CollaborationIvan Tomek, Rick Giles, Hai Zhang, Li Di. 467-472 [doi]
- Personalized iDTV Program in Multimedia Home PlatformCin-Shung Yang, Pang-Chieh Wang, Cheng-Liang Lin, Ting-Wei Hou. 473-476 [doi]
- Visual and Physical Feature Analysis for Kansei Retrieval Method in VR Japanese Crafting Presentation SystemAkihiro Miyakawa, Tomoyuki Ishida, Yoshitaka Shibata. 477-482 [doi]
- A New Authentication Method with Distributed Hash Table for P2P NetworkAtsushi Takeda, Kazuo Hashimoto, Gen Kitagata, Salahuddin Muhammad Salim Zabir, Tetsuo Kinoshita, Norio Shiratori. 483-488 [doi]
- WindChimer: The Partially Centralized and Controlled P2P System for Better DiscoveryJedsada Phengsuwan, Naiyana Sahavechaphan. 489-494 [doi]
- Role-Based Access Control in Peer-to-Peer (P2P) SocietiesMasakazu Maruoka, Alireza Goudarzi Nemati, Valbona Barolli, Tomoya Enokido, Makoto Takizawa. 495-500 [doi]
- Construction of Distributed Terminal Management System in Consideration of Hierarchical Subnet in IntranetEiji Sugino, Katsuyoshi Onodera, Norihisa Segawa, Jun Sawamoto. 501-507 [doi]
- Practical Multicast Security Architecture Using Sleep StateHoyoung Lee, Jing Liu, Sunyoung Han. 508-513 [doi]
- An Adaptive Software-Based Deadlock Recovery TechniqueMohammad Mirza-Aghatabar, Arash Tavakkol, Hamid Sarbazi-Azad, Abbas Nayebi. 514-519 [doi]
- Study of a Scheduling Algorithm Based on Simple Network Coding with High Throughput and Low DelayYan Shi, Min Sheng. 520-525 [doi]
- RealNet: A Topology Generator Based on Real Internet TopologyLechang Cheng, Norman C. Hutchinson, Mabo R. Ito. 526-532 [doi]
- Performance Evaluation of Advanced High-Speed Data Transfer Methods in Long-Distance Broadband NetworksMasaaki Noro, Fumiaki Tameshige, Ken-ichi Baba, Shinji Shimojo. 533-540 [doi]
- Performance Evaluation of IEEE 802.15.4 Beacon-Enabled Association ProcessFan Zhang, Furong Wang, Bin Dai, Yafang Li. 541-546 [doi]
- Performance Comparison of ISATAP Implementations on FreeBSD, RedHat, and Windows 2003Vasaka Visoottiviseth, Niwat Bureenok. 547-552 [doi]
- Design and Implementation of Adaptive Streaming Modules for Multipoint Video CommunicationKoji Hashimoto, Yoshitaka Shibata. 553-560 [doi]
- Neighbor-Aware Clusterhead for SNETTarek Sheltami. 561-566 [doi]
- A Fuzzy Approach for Personalized Product Clustering with Flexible Discriminating PowerBunthit Watanapa, Saowaluk Watanapa. 567-572 [doi]
- Research on System Integrative Evaluation Method Based on SurvivabilityWei-Hua Jiang, Jun Du, Feng Liu. 573-577 [doi]
- On Constructing High Performance Overlay for Layered Streaming in Heterogeneous NetworksXin Xiao, Yuanchun Shi, Zhijia Chen, Baopeng Zhang. 578-584 [doi]
- Performance Analysis of Active Target Localization Using TDOA and FDOA Measurements in WSNJiandong Li, Xiaoyan Sun, Pengyu Huang, Jiyong Pang. 585-589 [doi]
- Multi-Layer Traceback under the Hierarchical Tracers DeploymentChun-Hsin Wang, Yen-Chih Chiang. 590-595 [doi]
- Detecting Masqueraders Using High Frequency Commands as SignaturesMing Dong Wan, Han-Ching Wu, Ying-Wei Kuo, James Marshall, Shou-Hsuan Stephen Huang. 596-601 [doi]
- An Automatic Mechanism for Adjusting Validation FunctionJin-Cherng Lin, Jan-Min Chen, Cheng-Hsiung Liu. 602-607 [doi]
- How to Optimize the Cryptographic Symmetric Primitives on Loongson-2E MicroprocessorYong Liu, Zhong Chen, Yu Chen. 608-614 [doi]
- Wireless Sensor Networks for Cultural Property ProtectionJongwoo Sung, Sungjin Ahn, Taesoo Park, Seonghun Jang, Dongheui Yun, Jonggu Kang, Seongeun Yoo, Pohkit Chong, Daeyoung Kim. 615-620 [doi]
- New Computational Intelligence Paradigm for Estimating the Software Project EffortEmad A. El-Sebakhy. 621-627 [doi]
- DGS: Driving Guidance System Based on Wireless Sensor NetworkSeongeun Yoo, Pohkit Chong, Taisoo Park, Youngsoo Kim, Daeyoung Kim, Changsub Shin, Kyungbok Sung, Hyunhak Kim. 628-633 [doi]
- A Communication-Efficient Distributed Clustering Algorithm for Sensor NetworksAmirhosein Taherkordi, Reza Mohammadi, Frank Eliassen. 634-638 [doi]
- SPM: A Security Policy Based on Micropayment in Ad Hoc NetworksYi Wang, Furong Wang, Chunming Rong, Sufang Wang. 639-643 [doi]
- Performance Analysis of Dynamic Group Communication Systems with Intrusion Detection Integrated with Batch Rekeying in Mobile Ad Hoc NetworksJin-Hee Cho, Ing-Ray Chen, Phu-Gui Feng. 644-649 [doi]
- Efficient Hierarchical Key Management Scheme for Access Control in the Mobile AgentYu-Fang Chung, Tzer-Shyong Chen, Chia-Hui Liu, Tzu-Chi Wang. 650-655 [doi]
- Building User Confidence in RFID Technology for Mobile and Retail EnvironmentsHimanshu Pagey. 656-661 [doi]
- Experiments on Building Ubiquitous Robotic Space for Mobile Robot Using Wireless Sensor NetworksTaehong Kim, Young-Guk Ha, Jihoon Kang, Daeyoung Kim, Pohkit Chong, Joo-Chan Sohn. 662-667 [doi]
- An Experimental Network Proxy for Power Managed End NodesPaul Werstein. 668-674 [doi]
- Hardware Reconfiguration Capability for Third Generation Sensor Nodes: Design and ChallengesAli El Kateeb, Lubna Al Azzawi. 675-680 [doi]
- Wireless Sensor Network for Localized Maritime MonitoringPedro N. E. S. Barbosa, Neil M. White, Nick R. Harris. 681-686 [doi]
- Location Information Look-Up for Intelligent Handover DecisionSoohong Park, Minho Lee, Cheolju Hwang. 687-691 [doi]
- Business-Based SMS Mobile SearchBenting Wan. 692-695 [doi]
- Scheduling in Grid DatabasesRogério Luís de Carvalho Costa, Pedro Furtado. 696-701 [doi]
- Energy Optimization for Data Flow in Mobile Ad Hoc Wireless Networks Using Cooperative CommunicationHu Haiyang, Hu Hua. 702-707 [doi]
- Automated Metadata Generation and its Application to Biological Association ExtractionSnehasis Mukhopadhyay, Niranjan Jayadevaprakash. 708-713 [doi]
- Comparative Study of Particle Swarm Approaches for the Prediction of Functionally Important Residues in Protein StructuresHiram Firpi, Eunseog Youn, Sean Mooney. 714-719 [doi]
- Probabilistic Relational Database Applications for Biomedical InformaticsPing-Tsai Chung, Hsin-Hua Hsiao. 720-725 [doi]
- Introducing Variable Gap Penalties into Three-Sequence Alignment for Protein SequencesChe-Lun Hung, Chun-Yuan Lin, Yeh-Ching Chung, Chuan Yi Tang. 726-731 [doi]
- Software Rejuvenation and Reconfiguration for Enhancing Survivability of Sensor NetworksDong Seong Kim, Sazia Parvin, Jong Sou Park. 732-737 [doi]
- An Efficient Tree Structure for Delay Sensitive Data Gathering in Wireless Sensor NetworksSoonmok Kwon, Jeong-gyu Kim, Cheeha Kim. 738-743 [doi]
- Distributed Wireless Links Repair for Maximizing Reliability and Utilization in Multicast MANETBen-Jye Chang, Yan-Min Lin, Ying-Hsin Liang. 744-749 [doi]
- Pervasive and Trustworthy HealthcareKai Wang, Yan Sui, Xukai Zou, Arjan Durresi, Shiaofen Fang. 750-755 [doi]
- 3MOKAN: A Novel Mobility Management Mechanism Based on Keeping Alternative NodesMahmood Hasanlou, Ebrahim Fazli, Ali Movaghar, Hossein Mohammadi. 756-761 [doi]
- Service-Aware Multi-Constrained Routing Protocol with QoS Guarantee Based on Fuzzy LogicJing Zuo, Xuefen Chi, Lin Guan, Hongxia Li. 762-767 [doi]
- Multiple Care-of Addresses Registration and Capacity-Aware Preference on Multi-Rate Wireless LinksJen-Yi Pan, Jing-Luen Lin, Kai-Fung Pan. 768-773 [doi]
- Biological Boundaries and Biological Age: Solutions of Variational ProblemsJacques Demongeot. 774-781 [doi]
- Impact of Fixed Boundary Conditions on the Basins of Attraction in the Flower’s Morphogenesis of Arabidopsis ThalianaJacques Demongeot, Michel Morvan, Sylvain Sené. 782-789 [doi]
- Reduction of Complexity via Operatorial Parametric Formulations for Some Nonlinear Dynamic Problems of BiologyEmmanuel Montseny, Andrei Doncescu. 790-795 [doi]
- Protein Structure Comparison and Alignment Using Residue ContextsTobias Sayre, Rahul Singh. 796-801 [doi]
- Conserved Domain Combination Identification in Human ProteinsSuk Hoon Jung, Desok Kim, Dong-Soo Han. 802-807 [doi]
- Estimation of Possible Reaction States in Metabolic Pathways Using Inductive Logic ProgrammingYoshitaka Yamamoto, Katsumi Inoue, Andrei Doncescu. 808-813 [doi]
- Missing Value Estimation for Time Series Microarray Data Using Linear Dynamical Systems ModelingConnie Phong, Raul Singh. 814-819 [doi]
- Communication Protocols and Message Formats for BLAST Parallelization on Cluster SystemsHong-Soog Kim, Woo-Hyuk Jang, Dong-Soo Han. 820-825 [doi]
- EEG Analysis Using HHT: One Step Toward Automatic Drowsiness ScoringHassan Sharabaty, Bruno Jammes, Daniel Esteve. 826-831 [doi]
- Design and Implementation of a Reference Model for Context Management in Mobile Ad-Hoc NetworksDominique Dudkowski, Harald Weinschrott, Pedro José Marrón. 832-837 [doi]
- Personalized Shopping Assistance Service at Ubiquitous Shop SpaceSomkiat Sae-Ueng, Sineenard Pinyapong, Akihiro Ogino, Toshikazu Kato. 838-843 [doi]
- Design of a Ubiquitous System for Affective Bonding and Support within the FamilySébastien Duval, Christian Hoareau, Hiromichi Hashizume. 844-849 [doi]
- Fundamental Needs in Intelligent Environments: Specificities for Older AdultsSébastien Duval, Christian Hoareau, Hiromichi Hashizume. 850-855 [doi]
- A Data Propagation Using Mobile Terminal in Locally Distributed Ad-Hoc NetworksAkimitsu Kanzaki, Tetsuya Taniguchi, Takahiro Hara, Shojiro Nishio. 856-861 [doi]
- To Share or Not to Share Storage in Mesh Networks: A System Throughput PerspectiveShahram Ghandeharizadeh, Shahin Shayandeh, Tooraj Helmi. 862-867 [doi]
- A Transaction Model for Mobile Atomic TransactionsLars Frank. 868-873 [doi]
- On Effective Data Transmission in Mobile Ad Hoc NetworksMasako Shinohara, Takahiro Hara, Shojiro Nishio. 874-879 [doi]
- Adaptive QoS-Aware Resource Management in Heterogeneous Wireless NetworksI-Shyan Hwang, Bor-Jiunn Hwang, K. Robert Lai, Ling-Feng Ku, Chien-Chieh Hwang. 880-885 [doi]
- TS-Mid: Middleware for Wireless Sensor Networks Based on Tuple SpaceRita de Cássia Acioli Lima, Nelson Souto Rosa, Igor Roberto L. Marques. 886-891 [doi]
- Wireless Sensor Nodes Processor Architecture and DesignAli El Kateeb, Aiyappa Ramesh, Lubna Al Azzawi. 892-897 [doi]
- An Autonomous Algorithm for Construction of Energy-conscious Communication Tree in Wireless Sensor NetworksKatsumi Onodera, Toshiaki Miyazaki. 898-903 [doi]
- Analysis of k-Neigh Topology Control Protocol for Wireless NetworksAbbas Nayebi, Hamid Sarbazi-Azad, Kasra Alishahi. 904-909 [doi]
- Simulation-Based Analysis for GEAR Performance OptimizationIsmat K. Maarouf, Tarek Sheltami. 910-915 [doi]
- An Energy Efficient Routing Scheme in Wireless Sensor NetworksChiu-Kuo Liang, Yu-Jie Huang, Jian-Da Lin. 916-921 [doi]
- TPSF+C: A Two-Phase On-Demand Scatternet Formation Algorithm Considering Route StabilityCheng-Zen Yang, Chun-Ta Lin, I-Hsuan Huang. 922-927 [doi]
- PRODUCE: A Probability-Driven Unequal Clustering Mechanism for Wireless Sensor NetworksJung Hwan Kim, Sajjad Hussain Chauhdary, WenCheng Yang, Dong-Sub Kim, Myong-Soon Park. 928-933 [doi]
- Distributed Data Aggregation in Multi-sink Sensor Networks Using a Graph Coloring AlgorithmRyouhei Kawano, Toshiaki Miyazaki. 934-940 [doi]
- An Efficient Cross-Layer Based Flooding Algorithm with Retransmission Node Selection for Wireless Sensor NetworksSeung-Joon Choi, Ki-Hyuk Kwon, Sang-Jo Yoo. 941-948 [doi]
- The Effects of Mobility and Redundancy on Wireless Video Streaming over MANETsLei Chen, Chung-wei Lee. 949-953 [doi]
- eSeagull: Design of Mobile P2P File Sharing System at SeaHuafeng Wu, Chaojian Shi, Xi Zhou, Haiguang Chen, Chuanshan Gao. 954-959 [doi]
- Evaluation of Multi-Channel Flooding for Inter-Vehicle CommunicationEiji Takimoto, Yoshihisa Kondo, Satoko Itaya, Ryutaro Suzuki, Sadao Obana. 960-965 [doi]
- An Efficient Tree-Based Tag Identification Protocol for RFID SystemsKuo-Hui Yeh, N. W. Lo, Enrico Winata. 966-970 [doi]
- ETSP: An Energy-Efficient Time Synchronization Protocol for Wireless Sensor NetworksKhurram Shahzad, Arshad Ali, N. D. Gohar. 971-976 [doi]
- A New MAC Protocol for Avoiding Needless Transmission Deferment Induced by Missed RTS/CTS HandshakeDaishi Inoue, Tetsuya Shigeyasu, Hiroshi Matsuno, Norihiko Morinaga. 977-982 [doi]
- A Node Self Similarity Approach for Interoperability Testing of Ad Hoc Routing ProtocolsStéphane Maag, Cyril Grepet. 983-988 [doi]
- An Integrated ISV Call Management Strategy in Heterogeneous Wireless NetworksI-Shyan Hwang, Bor-Jiunn Hwang, Ruey-Rong Su, K. Robert Lai, Chyi-Jy Lin. 989-994 [doi]
- Total Least-Squares Solution of Active Target Localization Using TDOA and FDOA Measurements in WSNXiaoyan Sun, Jiandong Li, Pengyu Huang, Jiyong Pang. 995-999 [doi]
- Development of Tea Ceremony e-Learning Environment within Immersive Projection TechnologyYusuke Gotoh, Yasuo Ebara, Tomoki Yoshihisa, Koji Koyamada, Masanori Kanazawa. 1000-1005 [doi]
- VR BBS Using Immersive Virtual EnvironmentSatoshi Oonuki, Tetsuro Ogi. 1006-1011 [doi]
- High-Resolution Presentation Environment Using Multi DisplaysGo Chiba, Tomoyuki Ishida, Yoshitaka Shibata. 1012-1016 [doi]
- Evaluation Experiment on Eye-to-Eye Contact in Remote Communication with Tiled Displays EnvironmentsYasuo Ebara, Nobuyuki Kukimoto, Koji Koyamada. 1017-1022 [doi]
- Proposal of Multimodal Communications System Using Tele-Immersion TechnologyTomoyuki Ishida, Akihiro Miyakawa, Yoshitaka Shibata. 1023-1028 [doi]
- Image Compression Suitable for High Dynamic Range Image RenderingHironori Kaida, Masahiro Okuda. 1029-1033 [doi]
- Virtual Reality Interaction System between User and Avatar with Distributed ProcessingShunji Uchino, Norihiro Abe, Hiroshi Takada, Tetsuya Yagi, Hirokazu Taki, Shoujie He. 1034-1039 [doi]
- Asynchronous Collaborative Virtual Environment Support System by Using Revision Tree Presentation MethodHiroki Ogasawara, Yoshitaka Shibata. 1040-1045 [doi]
- Finding Friend Groups in BlogosphereShih Ta Kuan, Bang Ye Wu, Wan-Jui Lee. 1046-1050 [doi]
- Quality of Life Supporters Employing Music TherapyNikolay N. Mirenkov, Kamen Kanev, Hiroshi Takezawa. 1051-1056 [doi]
- An Information System Development Method Based on the Link of Business Process Modeling with Executable UML Modeling and its Evaluation by PrototypingTsutomu Okawa, Tsukasa Kaminishi, Syuichi Hirabayashi, Hisao Koizumi, Jun Sawamoto. 1057-1064 [doi]
- An Interactive Video Course Platform with Authoring and Playback SystemsHan-Bin Chang, Timothy K. Shih, Hui-Huang Hsu, Chun-Chia Wang. 1065-1070 [doi]
- A Lecture Scene Playback System Using Digital Picture-Card Show for Distance LearningNobuo Funabiki, Aki Mouri, Walaa Hassan, Toru Nakanishi. 1071-1076 [doi]
- A Rate Control Method for Subjective Video Quality on Mobile Data TerminalsYuka Kato. 1077-1082 [doi]
- Analysis of Ad Hoc Network Performance in Emergency Communication ModelsKoichi Gyoda, Nam Hoang Nguyen, Kazunori Okada, Osamu Takizawa. 1083-1088 [doi]
- Disaster Information Service System for Relief Activities Using Ad-Hoc Network A Network Construction Algorithm and Results of Field ExperimentsKanae Sakamoto, Misako Urakami, Tetsuya Shigeyasu, Hiroshi Matsuno. 1089-1094 [doi]
- A Scheme for Damage Information Gathering Based on Micro Perspective in Sensor NetworksTakahiro Fujiwara, Takashi Watanabe. 1095-1100 [doi]
- Performance Evaluation of Large Scale Disaster Information System over Japan Gigabit NetworkHiroyuki Echigo, Yoshitaka Shibata. 1101-1106 [doi]
- Development of the Universal Safety Information Registration System for Vulnerable People Using a Mobile PhoneHiroaki Yuze, Zhengyi Zhang, Yuki Yoshida, Takashi Kawada, Chaoqun Wang. 1107-1112 [doi]
- Web-Based Support Coordination by Using WIDIS - Case Study of Chuesu-oki Earthquake in 2007Nobuhiro Sawano, Tsuyoshi Hoshikawa, Takayuki Obata. 1113-1117 [doi]
- Ballooned Wireless Mesh Network for Emergency Information SystemYoshitaka Shibata, Yosuke Sato, Naoki Ogasawara, Go Chiba. 1118-1122 [doi]
- Pinpointing the Place of Origin of a Cellular Phone Emergency Call Using Active RFID TagsOsamu Takizawa, Masafumi Hosokawa, Ken ichi Takanashi, Yasushi Hada, Akihiro Shibayama, Byeong-pyo Jeong. 1123-1128 [doi]
- Disaster Communication Network by Combination of Different Wireless LANsKazuo Takahata, Shinya Takada, Yoshitaka Shibata. 1129-1133 [doi]
- Current Situation of Digitalized Ship Navigation System for SafetyNobuhiro Sawano. 1134-1137 [doi]
- Structure of the Thai Web GraphKulwadee Somboonviwat, Shinji Suzuki, Masaru Kitsuregawa. 1138-1143 [doi]
- Improving Thai Academic Web Page Classification Using Inverse Class Frequency and Web Link InformationVerayuth Lertnattee, Thanaruk Theeramunkong. 1144-1149 [doi]
- Wikipedia Mining for Huge Scale Japanese Association Thesaurus ConstructionKotaro Nakayama, Masahiro Ito, Takahiro Hara, Shojiro Nishio. 1150-1155 [doi]
- Associating Faces and Names in Japanese Photo News Articles on the WebAkio Kitahara, Taichi Joutou, Keiji Yanai. 1156-1161 [doi]
- Mining and Visualizing the Evolution of the Web Graph StructureMasashi Toyoda. 1162 [doi]
- Hybrid Content-Based Trademark Retrieval Using Region and Contour FeaturesZhiling Hong, Qingshan Jiang. 1163-1168 [doi]
- A Question Answering System for the Operation of Software ApplicationsAtsushi Fujii, Seiji Takegata. 1169-1174 [doi]
- BibPro: A Citation Parser Based on Sequence Alignment TechniquesChien-Chih Chen, Kai-Hsiang Yang, Hung-Yu Kao, Jan-Ming Ho. 1175-1180 [doi]
- A Data Warehousing Approach to Discover Knowledge in Peer-to-Peer ApplicationMin-Feng Wang, Jui-Hwa Feng, Meng-Feng Tsai. 1181-1186 [doi]
- Retrieval of Personal Web Documents by Extracting Subjective ExpressionsTakahiro Hayashi, Koji Abe, Rikio Onai. 1187-1192 [doi]
- Efficient Management of Semi-Persistent Data for the Evolving WebKai Cheng, Xiaodong You, Yanchun Zhang. 1193-1198 [doi]
- What s Going on in Search Engine Rankings?Yasuaki Yoshida, Takanori Ueda, Takashi Tashiro, Yu Hirate, Hayato Yamana. 1199-1204 [doi]
- Constructing a Global Ontology by Concept Mapping Using Wikipedia ThesaurusMinghua Pei, Kotaro Nakayama, Takahiro Hara, Shojiro Nishio. 1205-1210 [doi]
- An Integrated Method for Web Resource CategorizationMinghua Pei, Kotaro Nakayama, Takahiro Hara, Shojiro Nishio. 1211-1216 [doi]
- A New Centroid-Based Classifier for Text CategorizationLifei Chen, Yanfang Ye, Qingshan Jiang. 1217-1222 [doi]
- An Efficient Feature Selection Using Hidden Topic in Text CategorizationZhiwei Zhang, Xuan Hieu Phan, Susumu Horiguchi. 1223-1228 [doi]
- A Document Clustering Method Based on Hierarchical Algorithm with Model ClusteringHaojun Sun, Zhihui Liu, Lingjun Kong. 1229-1233 [doi]
- A Weak-Tie Based Regularity Analysis of Mobile ClickstreamsToshihiko Yamakami. 1234-1239 [doi]
- A Graphic Reputation Analysis System for Mining Japanese Weblog Based on both Unstructured and Structured InformationGuangwei Wang, Kenji Araki. 1240-1245 [doi]
- Exploiting Frequent Episodes in Weighted Suffix Tree to Improve Intrusion Detection SystemMin-Feng Wang, Yen-Ching Wu, Meng-Feng Tsai. 1246-1252 [doi]
- An Energy Efficient Routing Based on OLSR in Wireless Ad Hoc and Sensor NetworksSaoucene Mahfoudh, Pascale Minet. 1253-1259 [doi]
- Intelligent MANET Routing SystemN. H. Saeed, M. F. Abbod, H. S. Al-Raweshidy. 1260-1265 [doi]
- Special Evaluation: A Practical Simulation-Based Method for Accurate Performance Evaluation of Routing Protocols in Wireless Sensor NetworksEhsan Ahvar, Mahmood Fathy. 1266-1271 [doi]
- Secure Routing Protocol with Malicious Nodes Detection for Ad Hoc NetworksChu-Hsing Lin, Wei-Shen Lai, Yen-Lin Huang, Mei-Chun Chou. 1272-1277 [doi]
- On Backoff Timer Scheduling for Smart-DCF and Performance EvaluationSiwaruk Siwamogsatham. 1278-1284 [doi]
- Capacity Issues in Meshed High Data Rate WPANsS. A. Mahmud, S. Khan, Qiang Ni, H. S. Al-Raweshidy. 1285-1290 [doi]
- TCP Quick-Adjust by Utilizing Explicit Link Characteristic InformationJi Zhang, Jouni Korhonen, Soohong Park, David Pearce. 1291-1298 [doi]
- Spillover-Partitioning Call Admission Control for Revenue Optimization with QoS Guarantees for Multiple Service Classes in Mobile Wireless NetworksOkan Yilmaz, Ing-Ray Chen, Gregory Kulczycki, William B. Frakes. 1299-1304 [doi]
- Simulation Study of a Connection-Oriented Internet Service Based on a Queueing ModelZhanqiang Huo, Naishuo Tian, Wuyi Yue, Shunfu Jin. 1305-1310 [doi]
- Performance Analysis of Heuristic Algorithms for Lifetime-Aware Directional Multicasting in Wireless Ad Hoc NetworksSong Guo, Mianxiong Dong, Minyi Guo. 1311-1316 [doi]
- An Analytical Study of Wireless Error Models for Bluetooth NetworksHao-Hsiang Hung, Ling-Jyh Chen. 1317-1322 [doi]
- Outlier Detection in Cellular Network Data ExplorationMikko Multanen, Kimmo Raivio, Pasi Lehtimäki. 1323-1328 [doi]
- A Novel License Distribution Mechanism in DRM SystemQingcheng Li, Jin Zhang, Xiaoli Gong, Zhenhua Zhang. 1329-1334 [doi]
- WiMax SecurityMahmoud Nasreldin, Heba Aslan, Magdy El-Hennawy, Adel El-Hennawy. 1335-1340 [doi]
- Integrating Mobile Applications into RFID Based B2B SystemsTudor Joan Cerlinca, Cristina Turcu, Marius Cristian Cerlinca. 1341-1345 [doi]
- A Survey of RFID Authentication ProtocolsYawer Yousuf, Vidyasagar Potdar. 1346-1350 [doi]
- High Complexity Control Gates with Advanced RFID Features for Production Process MonitoringVasile Gaitan, Cornel Turcu, Alexandru Goloca. 1351-1356 [doi]
- A Critical Analysis of RFID Security ProtocolsAtif Sharif, Vidyasagar Potdar. 1357-1362 [doi]
- Transparently Adding Security Properties to Service OrchestrationStéphanie Chollet, Philippe Lalanda, André Bottaro. 1363-1368 [doi]
- A Service Component Deployment Architecture for e-BankingJosé L. Ruiz, Juan C. Dueñas, Félix Cuadrado. 1369-1374 [doi]
- Third-Party-Initiated Context-Aware Real-Time Charging and Billing on an Open SOA PlatformFrank Bormann, Stephan Flake, Jürgen Tacken, Carsten Zoth. 1375-1380 [doi]
- A Context Aware Service-Oriented Maintenance System for the B2B SectorElmar Zeeb, Steffen Prüter, Frank Golatowski, Frank Berger. 1381-1386 [doi]
- WS-BPEL Process Compiler for Resource-Constrained Embedded SystemsHendrik Bohn, Andreas Bobek, Frank Golatowski. 1387-1392 [doi]
- Service-Orientation and Flexible Service Binding in Distributed Automation and Control SystemsAndre Pohl, Heiko Krumm, Felix Holland, Franz-Josef Stewing, Ingo Lück. 1393-1398 [doi]
- A Case Study on Software Evolution towards Service-Oriented ArchitectureFélix Cuadrado, Boni García, Juan C. Dueñas, Hugo A. Parada G.. 1399-1404 [doi]
- Design of an SLA-Driven QoS Management Platform for Provisioning Multimedia Personalized ServicesXiaorong Li, Stephen John Turner, Kok Heng Tong, Hoong-Maeng Chan, Terence Hung. 1405-1409 [doi]
- A Method for the Formal Representation of the Boolean Conditions of Orchestrated ServicesCorina Popescu, Jose L. Martinez Lastra. 1410-1415 [doi]
- NFP Ontology for Discovery and Sharing Web Services in Distributed RegistriesWitold Abramowicz, Konstanty Haniewicz, Monika Kaczmarek, Raúl Palma, Dominik Zyskowski. 1416-1421 [doi]
- An Open Source Platform for the Integration of Distributed ServicesFélix Cuadrado, Juan C. Dueñas, José L. Ruiz, Jesús Bermejo, Miguel García. 1422-1427 [doi]
- Modeling and Quantifying the Impact of P2P File Sharing Traffic on Traditional Internet TrafficYaNing Liu, Hongbo Wang, Yu Lin, Shiduan Cheng. 1428-1433 [doi]
- Protocol Specification for Conflict Free MANET Address Allocation MechanismsSudath Indrasinghe, Rubem Pereira, John Haggerty. 1434-1439 [doi]
- A New Service Level Agreement Model for Best-Effort Traffics in IP over WDMHung-Yi Chang, Pi-Chung Wang, Chia-Tai Chan, Chun-Liang Lee. 1440-1443 [doi]
- A New Approach of Fuzzy-Clustered Channel Assignment Method Promoting Hierarchical Cellular Network PerformanceKenvi Wang, Tong-Tai Chiang, Lin-Yi Peng, Madjid Merabti. 1444-1449 [doi]
- Scalable Video Coding of H.264/AVC Video Streaming with QoS-Based Active Dropping in 802.16e NetworksJen-Chun Chiang, Hsiang-Fu Lo, Wei-Tsong Lee. 1450-1455 [doi]
- Packet Size Variability in Real Time Transmission of Smoothed MPEG-4 StreamsRubem Pereira, Ella Grishikashvili Pereira. 1456-1461 [doi]
- Ternary CAM Compaction for IP Address LookupYi-Ting Fang, Tzung-Chian Huang, Pi-Chung Wang. 1462-1467 [doi]
- Telecom Alarm Prioritization Using Neural NetworksStefan Wallin, Leif Landen. 1468-1473 [doi]
- Digital Certificate Mobile Agent Technologies in Distance LearningDong-liang Lee, Lawrence Y. Deng. 1474-1479 [doi]
- Quality Control Schemes for Industrial Production by Workers’ Motion CaptureNobuyoshi Sato, Yoshitoshi Murata. 1480-1485 [doi]
- Developing of an Ontological Focused-Crawler for Ubiquitous ServicesSheng-Yuan Yang. 1486-1491 [doi]
- TWAREN Optical Network Laboratory and Lightpath Control SystemShu-Cheng Lin, Hui-Min Tseng, Yi-Cheng Chang, Hui-Lan Lee, Te-Lung Liu, Chu-Sing Yang, C. Eugene Yeh. 1492-1498 [doi]
- Concurrent Error Detection in Digit-Serial Normal Basis Multiplication over GF(2m)Chiou-Yng Lee. 1499-1504 [doi]
- Practical Design of Intelligent Living-Space Based on Blue-Tooth SystemChun-Liang Hsu, Teng-Yaw Hsu, Kuan-Yen Ho, Wei-Bin Wu. 1505-1510 [doi]
- Interface Implementation Using Ajax for Web-Based Instruction Set SimulatorHideaki Yanagisawa, Minoru Uehara, Hideki Mori. 1511-1516 [doi]
- Semantic Analysis and Video Event Mining in Sports VideoLawrence Y. Deng, Yi-Jen Liu. 1517-1522 [doi]
- On the Security of an Identity-Based Aggregate Signature SchemeWun-She Yap, Swee-Huay Heng, Bok-Min Goi. 1523-1528 [doi]
- The Security System Design in Online Game for u EntertainmentHangbae Chang, Jong Hyuk Park, Hongsuk Kang. 1529-1533 [doi]
- Key Distribution Scheme Using Matched Filter Resistant against DoS AttackRyuzou Nishi, Yoshiaki Hori, Kouichi Sakurai. 1534-1539 [doi]
- Investigating Secure Framework for Hybrid Multipath Ad Hoc NetworkBinod Vaidya, Byung-Lok Cho, Jong-An Park, Seung Jo Han. 1540-1545 [doi]
- Intra Domain Route Optimization for UbiquitousHye-Young Kim, Young-Sik Jeong, Laurence Tianruo Yang. 1546-1550 [doi]
- A Map Matching Algorithm for Car Navigation Systems that Predict User DestinationKoichi Miyashita, Tsutomu Terada, Shojiro Nishio. 1551-1556 [doi]
- An Investigation of Distance-Based Proxy Mobile Client Selection Schemes for NetLMMJong-Hyouk Lee, Yeong-Deok Kim, Tai-Myoung Chung. 1557-1560 [doi]
- Efficient Distributed Sensor Dispatch in Mobile Sensor NetworkNguyen Hoang Viet, Ngo Anh Vien, SeungGwan Lee, TaeChoong Chung. 1561-1566 [doi]
- Adaptive Scheduling Mechanisms toward Intelligent Services in Mobile and Wireless RFID EnvironmentsChing-Hsien Hsu, Jong Hyuk Park, Chia-Hao Yu. 1567-1572 [doi]
- Implementation of Ubiquitous Personal Study Using Web 2.0 Mash-up and OSS TechnologiesHong Chen, Nozomi Ikeuchi, Qun Jin. 1573-1578 [doi]
- Selecting News and Elders in Unstructured Peer-to-Peer Network under ChurnYanxiang He, Haowen Liu, Naixue Xiong, Laurence Tianruo Yang. 1579-1584 [doi]
- Information Hiding Based on Image MorphingHiroyuki Nakamura, Qiangfu Zhao. 1585-1590 [doi]
- Enhanced Yoking Proof Protocols for RFID Tags and Tag GroupsJung-Sik Cho, Sang-Soo Yeo, Suchul Hwang, Sang-Yong Rhee, Sung Kwon Kim. 1591-1596 [doi]
- Data Integration in Oil and Gas at Norwegian Continental ShelfKari Anne Haaland Thorsen, Chunming Rong. 1597-1602 [doi]
- Reputation of Communities of Web Services - Preliminary InvestigationSaid Elnaffar, Zakaria Maamar, Hamdi Yahyaoui, Jamal Bentahar, Philippe Thiran. 1603-1608 [doi]
- Bilateral Bargaining Game and Fuzzy Logic in the System Handling SLA-Based WorkflowDang Minh Quan, Jörn Altmann. 1609-1614 [doi]
- Facilitating the Flexible Modeling of Human-Driven Workflow in BPELWei Shi, Jian Wu, Shaolin Zhou, Ling Zhang, Yuyu Yin, Zhaohui Wu. 1615-1624 [doi]
- A Long Interval Method to Identify Regular Monthly Mobile Internet UsersToshihiko Yamakami. 1625-1630 [doi]
- A Paradigm Shift in the Design of Mobile ApplicationsLuiz Lima Jr, Alcides Calsavara. 1631-1635 [doi]
- Design of a Context-Aware Mobile Guiding ApplicationShou-Chih Lo, Jeng-Long Chiang, Shun-Ren Yang, Wen-Tsuen Chen. 1636-1641 [doi]
- Overview of Topic Map Construction ApproachesNebrasse Ellouze, Mohamed Ben Ahmed, Elisabeth Métais. 1642-1647 [doi]
- Explaining Answers from Agent Communication of Semantic Web InformationVuong Xuan Tran, Hidekazu Tsuji. 1648-1653 [doi]
- Mathematical Ontology and a Software Tool for Semantic Retrieval of Exercise ProblemsNoriko Kitani, Shûichi Yukita. 1654-1659 [doi]
- Agent Based Semantic Interoperability between Agents and Semantic Web LanguagesSaman Iftikhar, Hafiz Farooq Ahmad, Hiroki Suguri. 1660-1665 [doi]
- Grid Resource Management System and Semantic Information SystemHyung-Lae Kim, Tae-Nyun Kim, Chang-Sung Jeong. 1666-1671 [doi]
- A Survey of Opportunistic NetworksChung-Ming Huang, Kun-Chan Lan, Chang-Zhou Tsai. 1672-1677 [doi]
- Towards a Usenet-Like Discussion System for Users of Disconnected MANETsJulien Haillot, Frédéric Guidec. 1678-1683 [doi]
- Incentives for Opportunistic NetworksJussi Kangasharju, Andreas Heinemann. 1684-1689 [doi]
- Geographical Routing in Intermittently Connected Ad Hoc NetworksErik Kuiper, Simin Nadjm-Tehrani. 1690-1695 [doi]
- A Proposed Scheme for Epidemic Routing with Active Curing for Opportunistic NetworksJonah P. Tower, Thomas D. C. Little. 1696-1701 [doi]
- Performance Study of Routing Schemes in Delay Tolerant NetworksChien-Shiu Lin, Wei-Shyh Chang, Ling-Jyh Chen, Cheng-Fu Chou. 1702-1707 [doi]
- Efficient Publish/Subscribe-Based Multicast for Opportunistic Networking with Self-Organized Resource UtilizationJanico Greifenberg, Dirk Kutscher. 1708-1714 [doi]
- Opportunistic Data Dissemination Using Real-World User Mobility TracesAndreas Heinemann, Jussi Kangasharju, Max Mühlhäuser. 1715-1720 [doi]