Abstract is missing.
- Aeolus: Reconcilable Key Management Mechanism for Secure Group Communication in GridYunfa Li, Xianghua Xu, Jian Wan, Hai Jin, Zongfen Han. 1-7 [doi]
- Persistent Workflow on the GridLamine M. Aouad, Nhien-An Le-Khac, M. Tahar Kechadi. 8-14 [doi]
- Optimizing the Execution Time of the SLA-based Workflow in the Grid with Parallel Processing TechnologyDang Minh Quan, Jörn Altmann, Laurence Tianruo Yang. 15-20 [doi]
- VGID: A Virtual Hierarchical Distributed Grid Information DatabaseHaihui Zhang, Xingshe Zhou, Zhiyi Yang, Xiaojun Wu, Ning Fu. 21-26 [doi]
- GA-Based Job Scheduling Strategies for Fault Tolerant Grid SystemsChao-Chin Wu, Kuan-Chou Lai, Ren-Yi Sun. 27-32 [doi]
- Runtime Prediction Based Grid Scheduling of Parameter Sweep JobsSam Verboven, Peter Hellinckx, Frans Arickx, Jan Broeckhove. 33-38 [doi]
- An Adaptive Chunk Self-Scheduling Scheme on Service GridPeifeng Li, Qin Ji, Yuhua Zhang, Qiaoming Zhu. 39-44 [doi]
- Crossing Heterogeneous Grid Systems with a Single Sign-On Scheme Based on a P2P LayerYuan-Chin Wen, Chia-Hung Chen, Sheng-De Wang. 45-51 [doi]
- A Small World Architecture for P2P NetworksYuhua Liu, Hongcai Chen, Chun Yang, Huaqiang Pan. 52-56 [doi]
- Extending HLA/RTI to WAN Based on Grid ServiceLiu Hong, Hu Wan, Yu Wang 0005, Xueguang Chen, Deqing Zou. 57-62 [doi]
- Study on Network Architecture for Traffic Information Collection Systems Based on RFID TechnologyMijeom Kim, Jinsoo Park, Jaeyoung Oh, Hakjin Chong, Yoonkee Kim. 63-68 [doi]
- A Formal Approach to Verify Grid Service Composition Based on Interaction PatternWencai Guo, Chuang Lin. 69-74 [doi]
- Design and Implementation of Job Migration Policies in P2P Grid SystemsShih-Jie Lin, Min-Chun Huang, Kuan-Chou Lai, Kuo-Chan Huang. 75-80 [doi]
- Five Dimension Environmental Data Resource Brokering on Computational Grids and Scientific CloudsGiulio Giunta, Giuliano Laccetti, Raffaele Montella. 81-88 [doi]
- BonjourGrid as a Decentralised Job SchedulerHeithem Abbes, Christophe Cérin, Mohamed Jemni. 89-94 [doi]
- A Policy-Based Accountability Tool for Grid Computing SystemsAnna Cinzia Squicciarini, Wonjun Lee, Elisa Bertino, Carol X. Song. 95-100 [doi]
- An Online Credential Management Service for InterGrid ComputingJemal H. Abawajy. 101-106 [doi]
- Security of Mobile Agent-Based Web ApplicationsChung-Ming Ou, Chung-Ren Ou, Yao-Tien Wang. 107-112 [doi]
- Zero-Configuration Security Module for LAMP Application SystemShann-Chiuen Wu, Yung-Chung Ku, Tzao-Lin Lee. 113-116 [doi]
- Integration and Implementation of Secured IP Based Surveillance NetworksCharles C. Castello, Jeffrey Fan, Te-Shun Chou, Hong-Ming Kuo. 117-122 [doi]
- Trusted Assessment of Web Services Based on a Six-Dimensional QoS ModelNan Guo, Tian-han Gao, Bin Zhang. 123-127 [doi]
- Efficient Decoding of Systematic (41, 21, 9) Quadratic Residue CodeYan-Haw Chen, Chong-Dao Lee, Chih-Hua Chien, S. H. Tai. 128-133 [doi]
- Deciding the Number of Color Histogram Bins for Vehicle Color RecognitionKu-Jin Kim, Sun-Mi Park, Yoo-Joo Choi. 134-138 [doi]
- Modeling the Examinee Ability on the Computerized Adaptive Testing Using Adaptive Network-Based Fuzzy Inference SystemCha-Hwa Lin, Kai-Pei Chen, Chih-Hung Tsai. 139-144 [doi]
- P2P Service-Oriented Community Coordinated Multimedia: Modeling Multimedia Applications as Web Services and ExperienceJiehan Zhou, Mika Rautiainen, Mika Ylianttila. 145-149 [doi]
- A Novel Approach to Quantify Novelty Levels Applied on Ubiquitous Music DistributionMarcelo Keese Albertini, Kuan-Ching Li, Rodrigo Fernandes de Mello. 150-155 [doi]
- Markov Chain-Based Trust Model for Analyzing Trust Value in Distributed Multicasting Mobile Ad Hoc NetworksBen-Jye Chang, Szu-Liang Kuo, Ying-Hsin Liang, De-Yu Wang. 156-161 [doi]
- An Overlay Multicast Protocol for Multimedia Applications in Mobile Ad Hoc NetworksMarjan Naderan Tahan, Hamid R. Rabiee, Fatemeh Saremi, Zeinab Iranmanesh. 162-167 [doi]
- Hierarchical Genetic Algorithms for Channel Allocation in Wireless NetworksYao-Tien Wang, Chung-Ming Ou, Hsiang-Fu Yu. 168-173 [doi]
- An Adjustable Target Coverage Method in Directional Sensor NetworksUei-Ren Chen, Bo-Sheng Chiou, Jyun-Ming Chen, Woei Lin. 174-180 [doi]
- Discovering and Selecting Reliable Service in Mobile Ad Hoc NetworksWeiyu Chen, Weiwei Sun, Jiaqi Dong, Zhuoyao Zhang, Yingxiao Xu. 181-186 [doi]
- Efficient Broadcast Authentication in Wireless Sensor NetworksZhiqiang Du, Kun Wang, Lihua Zhou. 187-192 [doi]
- Distributed Fuzzy Score-Based Clustering Algorithm for Mobile Ad Hoc NetworksSahar Adabi, Sam Jabbehdari, Ali Rezaee, Sepideh Adabi. 193-198 [doi]
- An Efficient Rekeying Scheme for Multicast and Broadcast (M&B) in Mobile WiMAXHung-Min Sun, Shih-Ying Chang, Shuai-Min Chen, Chien-Chien Chiu. 199-204 [doi]
- Secure and Efficient Handover Schemes for Heterogeneous NetworksHung-Min Sun, Shuai-Min Chen, Yao-Hsin Chen, Heng-Jeng Chung, I-Hung Lin. 205-210 [doi]
- Dynamic Subscription Permission: Extending the Depth of Demand-Controlled FloodingDoug Lundquist, Aris M. Ouksel. 211-216 [doi]
- Modeling and Analyzing the Instantaneous Stability for Application Layer MulticastJijun Cao, Jinshu Su, Chunqing Wu. 217-224 [doi]
- A Novel Radio Resource Management Scheme with HPWRR Scheduling Algorithm in Link Adaptive Mobile WiMAX NetworkBor-Jiunn Hwang, I-Shyan Hwang, Bo-Feng Guo, Ruey-Rong Su. 225-230 [doi]
- A Novel Hierarchical Network Selection Strategy with Adaptive QoS Level Scheme in 2-Tier Multi-rate Mobile WiMAX NetworksBor-Jiunn Hwang, I-Shyan Hwang, Shao-Jyun Wun. 231-236 [doi]
- A DHCPv6 Based IPv6 Autoconfiguration Mechanism for Subordinate MANETShubhranshu Singh, Ashutosh Bhatia. 237-242 [doi]
- Performance Analysis of SLTC - A Stable Path, Low Overhead, Truthful and Cost Efficient Routing Protocol in MANETs with Selfish NodesFatemeh Saremi, Hamid Mousavi, Ali Movaghar. 243-250 [doi]
- Parallel Loop Self-Scheduling for Heterogeneous Cluster Systems with Multi-core ComputersChao-Chin Wu, Lien Fu Lai, Po-Hsun Chiu. 251-256 [doi]
- Scheduling Deadline-Constrained Checkpointing on Virtual ClustersBlaise Omer Yenke, Jean-François Méhaut, Maurice Tchuente. 257-264 [doi]
- Web Services for MPI-Based Parallel Applications on a Rocks ClusterPitch Sajjipanon, Sudsanguan Ngamsuriyaroj. 265-270 [doi]
- Effectively Deploying Virtual Machines on ClusterSong Wu, Jinyan Yuan, Wei Gao, Xuanhua Shi, Hai Jin. 271-276 [doi]
- A Cost Model for Participating Roles Based on Choreography SemanticsRavi Shankar Pandey, Banshidhar D. Chaudhary. 277-283 [doi]
- On Novel Economic-Inspired Centrality Measures in Weighted NetworksYufeng Wang, Akihiro Nakao. 291-296 [doi]
- Building Quick Service Query List Using Wordnet for Automated Service CompositionKaijun Ren, Jinjun Chen, Nong Xiao, Junqiang Song, Jinyang Li. 297-302 [doi]
- Enterprise Interaction Ontology for Change Impact Analysis of Complex SystemsAman Kumar, Preethi Raghavan, Jay Ramanathan, Rajiv Ramnath. 303-309 [doi]
- Design and Implementation of a Low Cost DNS-Based Load Balancing Solution for the SIP-Based VoIP ServiceJenq-Shiou Leu, Hui-Ching Hsieh, Yen-Chiu Chen, Yuan-Po Chi. 310-314 [doi]
- Timing Constraints Specification and Verification for Web Service CompositionsGuilan Dai, Rujuan Liu, Chongchong Zhao, Changjun Hu. 315-322 [doi]
- A Study in the Affect and Cognition of Consumers on Blog UsageYung-Chih Yen, Tung-Lin Chuang, Chia-Chen Yen, Jih-Shih Hsu. 323-328 [doi]
- Combinatorial Reverse Auction Based on Lagrangian RelaxationFu-Shiung Hsieh, Shih-Min Tsai. 329-334 [doi]
- On Information Lifecycle ManagementSabah S. Al-Fedaghi. 335-342 [doi]
- Dynamic Reliable Service Routing in Enterprise Service BusBin Wu, Shijun Liu, Lei Wu. 349-354 [doi]
- Decentralized Execution of Composite Service in MANETsWeiwei Sun, Zhuoyao Zhang, Weiyu Chen, Bo Peng, Yingxiao Xu. 355-360 [doi]
- Composite Service Recovery Based on LSP Tunnel RecoveryYingxiao Xu, Weiwei Sun. 361-366 [doi]
- Computer-Aided Privacy Requirements Elicitation TechniqueSeiya Miyazaki, Nancy R. Mead, Justin Zhan. 367-372 [doi]
- Autonomic Model for Service-Aware StorageZhaobin Liu, Wenyu Qu, Keqiu Li. 373-377 [doi]
- Scenario Analysis of the Mobile Voice Services MarketHannu Verkasalo, Kim Lindqvist, Heikki Hämmäinen. 378-384 [doi]
- A Hybrid Method for k-AnonymizationJun-Lin Lin, Meng-Cheng Wei, Chih-Wen Li, Kuo-Chiang Hsieh. 385-390 [doi]
- An Integrated Telecom and IT Service Delivery PlatformXu Shao, Teck Yoong Chai, Teck Kiong Lee, Lek Heng Ngoh, Luying Zhou, Markus Kirchberg. 391-396 [doi]
- Semantic Web Service Discovery and Composition Based on AI Planning and Web Service Modeling OntologySayed Gholam Hassan Tabatabaei, Wan Mohd Nasir Wan-Kadir, Suhaimi Ibrahim. 397-403 [doi]
- A New Approach to Web Services CharacterizationYan Liu, Mingguang Zhuang, Qingling Wang, Guannan Zhang. 404-409 [doi]
- Using Logically Hierarchical Meta Web Services to Support Accountability in Mashup ServicesAli Khalili, Shahriar Mohammadi. 410-415 [doi]
- The Process Conducting and Member Audit in the Distributed Enterprise ModelingCai Zhiming, Yin Jun. 416-420 [doi]
- Service-Oriented Reliable Problem Solving Environment for Scientific ComputationCancan Liu, Weimin Zhang, Zhigang Luo, Hai Liu, Lin Xiao. 421-426 [doi]
- Virtual Prairie: Going Green with Volunteer ComputingMalek Smaoui, Marc Garbey, Cendrine Mony. 427-434 [doi]
- Provision of Pedagogical Resources in Service-Oriented Instructional EnvironmentsI-Ching Chen, Shueh-Cheng Hu, Dong-Her Shih. 435-438 [doi]
- Influencing Models in Automated One-to-Many NegotiationKapil Kapani, Arobinda Gupta. 439-444 [doi]
- Abstract State Machine Models for Basic Service-Oriented ArchitecturesMarkus Kirchberg. 445-452 [doi]
- The Development of a Ubiquitous Geographic Information Service by Using Service-Oriented ArchitectureSheng-Ming Wang, Fu-Mei Chen. 453-457 [doi]
- Resource Selection Strategies for a CNP-Based Resource Management ModelChien-Min Wang, Hsi-Min Chen, Chun-Chen Hsu, Jonathan Lee. 458-463 [doi]
- A Tale of Clouds: Paradigm Comparisons and Some Thoughts on Research IssuesLijun Mei, Wing Kwong Chan, Tsun-Him Tse. 464-469 [doi]
- Resource Sharing by Multilingual Expression ServicesMasaki Gotou, Hirofumi Yamaki, Daisuke Yanagisawa, Masamitsu Ukai, Masahiro Tanaka, Toru Ishida. 470-475 [doi]
- Modeling Web Services Composition with Transaction Extension for Performance EvaluationYanxiang He, Liang Zhao, Zhao Wu, Fei Li. 476-481 [doi]
- Online Optimization in Application Admission Control for Service Oriented SystemsHadi Bannazadeh, Alberto Leon-Garcia. 482-487 [doi]
- http: //mba.nuu.edu.tw/academic/news.php?Sn=138 Model E-contract Update by Coloured Activity NetHong Feng Lai, J. L. Hong, Wang Han Jeng. 488-493 [doi]
- Efficient Dynamic Policy Monitoring in Service Oriented ArchitecturesHakan Hacigümüs. 494-499 [doi]
- Minimized Domain Knowledge for SOA-Based InteroperabilityAzin Dehmoobad, Kamran Sartipi. 500-506 [doi]
- Web 2.0 Toolbar: Providing Web 2.0 Services for Existence Web PagesMing-Chih Hsieh, Yung-Wei Kao, Shyan-Ming Yuan. 507-512 [doi]
- A Web Mining Architectural Model of Distributed Crawler for Internet Searches Using PageRank AlgorithmAnimesh Tripathy, Prashanta. K. Patra. 513-518 [doi]
- SHTM: A Semantic Hierarchy Transaction Model for Web Services TransactionsYingyuan Xiao, Hua Zhang. 519-523 [doi]
- A Formal Basis for Cross-Checking ebXML BPSS Choreography and Web Service OrchestrationWing Lok Yeung. 524-529 [doi]
- Adaptive Learning Sequencing for Course Customization: A Web Service ApproachIvan Madjarov, Abdelkader Bétari. 530-535 [doi]
- Towards Service Supervision for Public Web ServicesMasahiro Tanaka, Yohei Murakami, Toru Ishida. 536-541 [doi]
- WAGA: A Flexible Web-Based Framework for Grid ApplicationsXuanhua Shi, Zhao Chen, Hai Jin, Song Wu, Ke-fan. 542-547 [doi]
- Modeling and Analysis of a Web Service Firewall Using Coloured Petri NetsZobeideh Aliannezhadi, Mohammad Abdollahi Azgomi. 548-553 [doi]
- Timing Failures Detection in Web ServicesNuno Laranjeiro, Marco Vieira, Henrique Madeira. 554-559 [doi]
- EADRM: A Framework for Explanation-Aware Distributed Reputation Management of Web ServicesWanita Sherchan, Shonali Krishnaswamy, Seng Wai Loke. 560-567 [doi]
- An Optimal Web Services Integration Using Greedy StrategyWen Ouyang, Min-Lang Chen. 568-573 [doi]
- PSMP: A Fast Self-Healing and Self-Organizing Pervasive Service Management Protocol for Smart Home EnvironmentsChun-Feng Liao, Ya-Wen Jong, Li-Chen Fu. 574-579 [doi]
- Design of MyServer: A Residential Server in Smart Home SystemsWei-Chung Teng, Yu-Chun Pao, Sheng-Luen Chung. 580-586 [doi]
- Analysis of Context-Aware Network Selection Schemes for Power SavingsPravin Pawar, Bert-Jan van Beijnum, Hermie Hermens, Dimitri Konstantas. 587-594 [doi]
- Hide and Not Easy to Seek: A Hybrid Weaving Strategy for Context-Aware Service Provision in a Smart HomeChing-Hu Lu, Yung-Ching Lin, Li-Chen Fu. 595-600 [doi]
- An RFID Encoding Method for Supply Chain ManagementKuen-Fang Jea, Jen-Ya Wang. 601-606 [doi]
- Varying Pseudonyms-Based RFID Authentication Protocols with DOS Attacks ResistanceHung-Yu Chien. 607-614 [doi]
- DOS Attacks on Varying Pseudonyms-Based RFID Authentication ProtocolsHung-Yu Chien. 615-622 [doi]
- The Design of Intelligent Sensor Network Based on Grid StructureFu-Chien Kao, Yun-Sheng Tsai, Andy S. Chiou, Shinping R. Wang, Chang-Yu Huang. 623-630 [doi]
- Adding Quality of Service Extensions to the Associativity Based Routing Protocol for Mobile Ad Hoc Networks (MANET)Ayman Mansour Murad, Bassam Al-Mahadeen, Nuha Mansour Murad. 631-637 [doi]
- Secure and Survivable Group Communication over MANET Using CRTDH Based on a Virtual Subnet ModelAminul Haque Chowdhury, Muhammad Ikram, Ki-Hyung Kim. 638-643 [doi]
- Improving the Survivability of WSNs with Biological Characters Based on Rejuvenation TechnologyWei Wei, Yong Qi, Xin He, Wei Wang, Ruidong Li, Hui He. 644-649 [doi]
- AIR: Agent and Ontology-Based Information Retrieval Architecture for Mobile GridYue-Shan Chang, Yu-Cheng Luo, Pei-Chun Shih. 650-655 [doi]
- The Mechanism and Requirements for Detecting the Cross-Service AttackSeung-Hee Oh, Deok-Gyu Lee, Jongwook Han. 656-661 [doi]
- Understanding Cyber Trust Using a Triadic Functioning AnalysisWen-Kung Lin, Chieh-Peng Lin, Chou-Kang Chiu. 662-667 [doi]
- Effective Security Safeguard Selection Process for Return on Security InvestmentDo-Hoon Kim, Taek Lee, Hoh Peter In. 668-673 [doi]
- Towards the Interoperability between GTRS and EUMEDGRIDHeithem Abbes, Roberto Barbera, Mohamed Jemni, Sadok Mazigh. 674-679 [doi]
- A Passive Geographical Routing Protocol in VANETGuangtao Xue, Jinsheng Feng, Minglu Li. 680-685 [doi]
- Efficient Bit-Parallel Multipliers in Composite FieldsChiou-Yng Lee, Pramod Kumar Meher. 686-691 [doi]
- Implementation of a Security Access Control Model for Inter-organizational Healthcare Information SystemsHongmei Chi, Edward L. Jones, Lang Zhao. 692-696 [doi]
- Research on Ontology Component Description Model Based on the Semantic WebWenjing Li, Yucheng Guo, Weizhi Liao, Rongwei Hang. 697-702 [doi]
- Hierarchical Routing Architecture for Integrating IPv4 and IPv6 NetworksHuai-Jen Liu, Pang-Shih Liu. 703-706 [doi]
- An Load Balancing Strategy of FTP Server-Cluster Based on JXTALinlan Liu, Jian Shu, Binquan Chen, Shuangjian Liang. 707-711 [doi]
- An Integrated Service Model for Telecare SystemChin-Hsing Chen, Wen-Tzeng Huang, You-Yin Chen, Yuan-Jen Chang. 712-717 [doi]
- How "Hard Science" and Engineering Enhance Service-Dominant EconomyMorrakot Raweewan, William G. Ferrell Jr.. 718-723 [doi]
- A Staged Capability Improvement Model for Software Small and Medium Enterprises (SMEs)A. A. Moiz Qyser, Ramachandram Sirandas, Asshar Farhan. 724-729 [doi]
- Detecting Media Format Support of the Media Renderer with Microsoft DirectShowChih-Yung Wang, Chun-Yi Tsai, Tzao-Lin Lee. 730-732 [doi]
- The Skills of Electronic Commerce for Students in Departments of Business Management in University Science and Technological SchoolsChun-Mei Chou, Chien-Hua Shen, Yu-Je Lee. 733-738 [doi]
- A 3D Model Retrieval System Using the Derivative Elevation and 3D-ARTJau-Ling Shih, Ting-Yen Huang, Yu-Chen Wang. 739-744 [doi]
- On the Studies of Syllable Segmentation and Improving MFCCs for Automatic Birdsong RecognitionChih-Hsun Chou, Pang-Hsin Liu, Bingjing Cai. 745-750 [doi]
- Fusion of Static and Transitional Information of Cepstral and Spectral Features for Music Genre ClassificationChang-Hsing Lee, Jau-Ling Shih, Kun-Ming Yu, Hwai-San Lin, Ming-Hui Wei. 751-756 [doi]
- Extending BPEL2.0 for Grid-Based Scientific Workflow SystemsHuajian Zhang, Xiaoliang Fan, Ruisheng Zhang, Jiazao Lin, Zhili Zhao, Lian Li. 757-762 [doi]
- A Fuzzy-Based Adaptive Agent for Grid ServicesAli Rezaee, Amir Masoud Rahmani, Sahar Adabi. 763-768 [doi]
- MIFAS: Medical Image File Accessing System in Co-allocation Data GridsChao-Tung Yang, Chiu-Hsiung Chen, Ming-Feng Yang, Wen-Chung Chiang. 769-774 [doi]
- A Network Bandwidth-Aware Job Scheduling with Dynamic Information Model for Grid Resource BrokersChao-Tung Yang, Fang-Yie Leu, Wen-Jen Hu. 775-780 [doi]
- Performance Comparison of Load Balancing Algorithms through Code Migration in Distributed Desktop Computing GridsMakoto Yoshida, Kenji Sakamoto. 781-788 [doi]
- Interorganizational Workflow Collaboration Based on Local Process ViewsDonghui Lin, Toru Ishida. 789-794 [doi]
- Nash Equilibrium: Better Strategy for Agents CoordinationLasheng Yu, Emmanuel Masabo, Chantal Mutimukwe. 795-800 [doi]
- RSQS: Resource-Saving Multi-query Scheduling in Wireless Sensor NetworksYuan Zheng, Ming Liu, Jiannong Cao. 801-806 [doi]
- Using Frequent Workload Patterns in Resource Selection for Grid JobsTyng-Yeu Liang, Siou-Ying Wang, I-Han Wu. 807-812 [doi]
- Modelling the Sharing of Resources across Collaborative SessionsBruce Spencer, Sandy Liu. 813-818 [doi]
- Implementation of a Diskless Cluster Computing Environment in a Computer ClassroomChao-Tung Yang, Wen-Feng Hsieh, Hung-Yen Chen. 819-824 [doi]
- Hiding Information Employing Reduplicating EmbeddingChin-Feng Lee, Lin-Yi Chuang, Chin-Chen Chang. 825-828 [doi]
- Highly Efficient ID-Based Ring Signature from PairingsHung-Yu Chien. 829-834 [doi]
- Cryptanalysis and Improvement of an Efficient Remote Mutual Authentication and Key Agreement Jian Wang, Haihang Wang, Chengxiang Tan. 835-840 [doi]
- Invalidation of Mailing List Address to Block Spam MailsKenichi Takahashi, Akihiro Sakai, Kouichi Sakurai. 841-846 [doi]
- Zero-Configuration Personal Firewall for DLNA DMSShann-Chiuen Wu, Yung-Chung Ku, Tzao-Lin Lee. 847-850 [doi]
- Modeling the Trust with ECT in E-auction LoyaltyChwen-Yea Lin, Chien-Chung Tu, Kwoting Fang. 851-855 [doi]
- Intrusion Resistant SOAP Messaging with IAPFNavya Sidharth, Jigang Liu. 856-862 [doi]
- Planning Locative Media within Physical Space and Collaborative WorkspaceRung-Huei Liang, Yin-Huan Chen. 863-868 [doi]
- A Rule-Based Event Handling ModelYingwei Luo, Xiaolin Wang, Xinpeng Liu, Zhou Xing, Xiao Pang, Haibo Wang. 869-875 [doi]
- Clothing Identification Based on Edge InformationKu-Jin Kim, Sun-Mi Park, Yoo-Joo Choi. 876-880 [doi]
- Implementing Speech-Recognition Microprocessor into Intelligent Control-System of Home-ApplianceChun-Liang Hsu, Sheng-Yuan Yang, Wei-Bin Wu. 881-885 [doi]
- Implementation and Evaluation of Minimal UPnP Scheduled RecordingChun-Yi Tsai, Tzao-Lin Lee. 886-889 [doi]
- The Spacecraft Automatic Testing System Based on WorkflowDan Yu, Gang Ye, Shilong Ma, Naixue Xiong, Laurence Tianruo Yang. 890-895 [doi]
- Design and Implementation of a Videotext Extractor on Dual-Core PlatformChih-Lun Fang, Tsung-Han Tsai, Ren-Chih Kuo. 896-900 [doi]
- A New Dynamic Access Control in Wireless Sensor NetworksHui-Feng Huang, Kuo-Ching Liu. 901-906 [doi]
- Development of a Novel Bidirectional Control Telecare System over a Wireless Sensor Network and the InternetYou-Yin Chen, Wen-Tzeng Huang, Chin-Hsing Chen, Yuan-Jen Chang. 907-913 [doi]
- An Effective Link Adaptation Method in Cooperative Wireless NetworksKarim Djouani, Jun Chen, Abdellah Akharraz, Kamel Barkaoui. 914-919 [doi]
- A Distributed Prefix Allocation Scheme for Subordinate MANETAshutosh Bhatia, Shubhranshu Singh. 920-925 [doi]
- Binary Countdown for Quality of Service in Ad Hoc and Sensor NetworksChi-Hsiang Yeh. 926-930 [doi]
- Fairness-Based Scheduling Algorithm for TDD Mode IEEE 802.16 Broadband Wireless Access SystemsSheng-Tzong Cheng, Bo-Fu Chen, Chih-Lun Chou. 931-936 [doi]
- The Study of the Handoff for the Wireless NetworkChung-Hsin Liu. 937-941 [doi]
- Zigbee- Research into Integrated Real-Time Located SystemsChung-Hsin Liu, Chih-Chieh Fan. 942-947 [doi]
- An Optimization Method to Develop AAA Architectures with MIPv6 Mobility SupportWenjing Ma, Mei Song, Yong Zhang, Xin Lin, Huan Zhang. 948-952 [doi]
- USB Device Sharing Server for Office EnvironmentCherng-Ying Ing, Tzao-Lin Lee. 953-956 [doi]
- Using Data Mining Techniques in Development of MURA Geometric Prediction Module for Large Area PhotomaskWen-Hsing Kao, Jason C. Hung, Victoria Hsu. 957-962 [doi]
- Application and Evaluation of Wireless Transmission Technique at Construction Job-siteLee-kuo Lin, Chiu-Ching Tuan, Che-jen Cnen. 963-968 [doi]
- A Unified Framework for Digital Content Management Business Model-Ring-Tone Download as Case StudyDengwen Wei, Zaobin Gan, Xiongbo Xia. 969-974 [doi]
- An Institutional Analysis on the Vicissitudes of a Micro-payment PlatformJen Wel Chen, Dershing Luo, Ching-Cha Hsieh. 975-980 [doi]
- Providing Service Innovation for Creative LifeKang-Lin Peng, Ming-Chu Lin. 981-986 [doi]
- Using Support Vector Machine and Sequential Pattern Mining to Construct Financial Prediction ModelShuchuan Lo, Chingching Lin, Yao-Chang Chuang. 993-998 [doi]
- A Stochastic Performance Model Supporting Time and Non-time QoS Matrices for Web Service CompositionZhao Wu, Yanxiang He, Haowen Liu, Liang Zhao, Hua Shen. 999-1004 [doi]
- A Case Study on the Multicriteria Selection of Software ComponentsThomas Neubauer, Jan Pichler, Christian Stummer. 1005-1012 [doi]
- Developing Continuous Audit and Integrating Information Technology in E-businessChun-Hsiu Yeh, Tsui-Ping Chang, Wei-Cheng Shen. 1013-1018 [doi]
- Modeling the Mediating Role of Online Social Capital in Social Support and Service IT UsageYuan Hui Tsai, Chieh-Peng Lin, Chou-Kang Chiu. 1019-1023 [doi]
- The Internet Service Provider's Dilemma: User Friendly Design or Robust Security Mechanism?Chung-Chi Shen, Jyh-Shen Chiou. 1024-1025 [doi]
- A Service-Oriented Modeling Technique for Domain-Specific SoftwareChangjun Hu, Feng Jiao, Chongchong Zhao, Huayu Li. 1026-1031 [doi]
- Service-Oriented Enterprise Cooperation: Modeling Method and SystemHuiping Lin, Sheng Liu, Yushun Fan. 1032-1037 [doi]
- MPaySmart: A Customer Centric Approach in Offering Efficient Mobile Payment ServicesVahid Rahimian, Jafar Habibi. 1038-1043 [doi]
- Customers Perception on Attitude Towards E-auctionChien-Chung Tu, Chwen-Yea Lin, Kwoting Fang. 1044-1048 [doi]
- Developing the Continuous Assurance Embedded Continuous Audit Web ServicesChun-Hsiu Yeh, Tsui-Ping Chang, Wei-Cheng Shen. 1049-1054 [doi]
- Ontology-Supported Portal Architecture for Scholar s WebpagesSheng-Yuan Yang, Chun-Liang Hsu. 1055-1060 [doi]
- Generating Semantic Web Services Using Lattices and SAWSDLPhi Nguyen, Sam Chung. 1061-1068 [doi]
- A Pragmatics Web Service Oriented Approach to Understanding the Semantics of ConceptsZhai Sheping, Wang Hai, Wei Juanli. 1069-1074 [doi]
- Web-Oriented Architectures: On the Impact of Web 2.0 on Service-Oriented ArchitecturesGunnar Thies, Gottfried Vossen. 1075-1082 [doi]
- A Minimum Coverage Dynamic Adaptive Method for Concurrent Web Service CompositionZhengdong Zhu, Xuehan Dong, Yahong Hu, Weiguo Wu, Zengzhi Li. 1083-1088 [doi]
- ScriptOrc: A Specification Language for Web Service ChoreographyA. K. Bhattacharjee, R. K. Shyamasundar. 1089-1096 [doi]
- A SOAP-Based Streaming Content Delivery Framework for Multimedia Web ServicesGibson Lam, David Rossiter. 1097-1102 [doi]
- Web Service Selection Based on Analytical Network Process ApproachManish Godse, Rajendra M. Sonar, Shrikant Mulik. 1103-1108 [doi]
- A Framework of Web Services Description and Discovery Based on OWL-S and Domain OntologyChangjun Hu, Huayu Li, Xiaoming Zhang. 1109-1113 [doi]
- Algorithms for Transmission Power Control in Biomedical Wireless Sensor NetworksAshay Dhamdhere, Vijay Sivaraman, Vidit Mathur, Shuo Xiao. 1114-1119 [doi]
- Energy-Efficient and Traffic-Dispersive Event Contour Tracking in Multi-sink Wireless Sensor NetworksJehn-Ruey Jiang, Jih-Wei Wu, Guan-Shien Du. 1120-1126 [doi]
- Enhancing the Key Pre-distribution Scheme on Wireless Sensor NetworksTzu-Hsuan Shan, Chuan-Ming Liu. 1127-1131 [doi]
- A Gradient-Based Dynamic Load Balance Data Forwarding Method for Multi-sink Wireless Sensor NetworksRei-Heng Cheng, Shiuan-Yea Peng, Chiming Huang. 1132-1137 [doi]
- Adaptive Collision Avoidance through Implicit Acknowledgments in WSNsDaniele Messina, Marco Ortolani, Giuseppe Lo Re. 1138-1143 [doi]
- Non-deterministic Geographic Forwarding in Mobile Ad Hoc NetworksIsraat Tanzeena Haque. 1144-1149 [doi]
- Hop-by-Hop TCP over MANETYao-Nan Lien, Yi-Fan Yu. 1150-1155 [doi]
- Improving the Bandwidth Consumption of File Sharing in Mobile Networks through ClusteringUlf Wehling, Steffen Rothkugel. 1156-1161 [doi]
- A Cross-Layer Link Adaptation Algorithm for IEEE 802.11 WLAN with Multiple NodesChiapin Wang, Tsungnan Lin. 1162-1167 [doi]
- On Achieving Maximum Channel Utilization for IEEE 802.11n WLANYaw-Wen Kuo, Tung-Lin Tsai. 1168-1172 [doi]
- Partitioning Scheme Based on Convolution Characteristic Values of RSS Measuring from APsChi-Kuang Hwang, Hung-Min Yuan. 1173-1176 [doi]
- An Empirical Study of Sellers Information Manipulation in the Online Auction MarketChe-hui Lien, Jyh-Jeng Wu. 1177-1180 [doi]
- Content-Based Trust Mechanism for E-commerce SystemsYu Zhang, Huajun Chen, Xiaohong Jiang, Hao Sheng, Linhua Zhou, Tong Yu. 1181-1186 [doi]
- The Influence of Passion and Compulsive Buying on Online Auction AddictionChih-Chien Wang, Yu-Tzu Chen. 1187-1192 [doi]
- The Strategic Impact of Inter-organizational Information Systems - A Dynamic Capabilities AnalysisYing-Hueih Chen, I-Chieh Hsu, Yu-Chung Chen. 1193-1198 [doi]
- Analyzing Security of RFID Tag Reading Protocols Based on Binary Tree TraversalGen-Yih Liao, Hsiu-Fen Hsieh. 1199-1201 [doi]
- A Study on the Interface Usability of B2C Hypermarket E-commerce WebsiteHui-Jiun Hu, Jen Yen, Shing-Sheng Guan. 1202-1207 [doi]
- Applying Context-Aware RBAC to RFID Security Management for Application in Retail BusinessMei-Yu Wu, Chih-Kun Ke, Wen-Ling Tzeng. 1208-1212 [doi]
- Mining Negative Sequential Patterns for E-commerce RecommendationsSue-Chen Hsueh, Ming-Yen Lin, Chien-Liang Chen. 1213-1218 [doi]
- Service Availability of Systems with Failure PreventionFelix Salfner, Katinka Wolter. 1219-1224 [doi]
- Introducing Role-Based Access Control to a Secure Virtual Machine Monitor: Security Policy Enforcement Mechanism for Distributed ComputersManabu Hirano, Takahiro Shinagawa, Hideki Eiraku, Shoichi Hasegawa, Kazumasa Omote, Kouichi Tanimoto, Takashi Horie, Kazuhiko Kato, Takeshi Okuda, Eiji Kawai, Suguru Yamaguchi. 1225-1230 [doi]
- A Service-Oriented Framework for Quantitative Security Analysis of Software ArchitecturesYanguo Liu, Issa Traoré, Alexander M. Hoole. 1231-1238 [doi]
- Contract-Based Security Monitors for Service Oriented Software ArchitectureAlexander M. Hoole, Issa Traoré. 1239-1245 [doi]
- Beyond Smart: Enabling Cognition in a Wireless Home Network EnvironmentChi-Yi Lin, Szu-Chi Wang. 1246-1251 [doi]
- A Study and Implementation of Vulnerability Assessment and Misconfiguration DetectionChing-Huang Lin, Chih-Hao Chen, Chi-Sung Laih. 1252-1257 [doi]
- A Flexible Framework for Semi-automatic Web Services CompositionGexin Li, Haijiang Hai, Zhiwen Hu. 1258-1262 [doi]
- A Novel Network Selection Algorithm in Next Generation Heterogeneous Network for Modern Service IndustryHao Hu, Wenan Zhou, Shu Zhang, Junde Song. 1263-1268 [doi]
- Exploring a Semantic Publish/Subscribe Middleware for Event-Based SOAJianfeng Qian, Jianwei Yin, Dongcai Shi, Jinxiang Dong. 1269-1275 [doi]
- Service Behavioral Adaptation Based on Dependency GraphBin Wu, ShuiGuang Deng, Jian Wu, Ying Li, Li Kuang, Jianwei Yin. 1276-1281 [doi]
- Proxy-Based Web Service SecurityJian Wu, Zhimin Huang. 1282-1288 [doi]
- OTJFast: Processing Ordered XML Twig Join FastJinhua Jiang, Gang Chen, Lidan Shou, Ke Chen. 1289-1294 [doi]
- A CAVLC-Based Blind Watermarking Method for H.264/AVC Compressed VideoLihua Tian, Nanning Zheng, Jianru Xue, Tao Xu. 1295-1299 [doi]
- A Flexible Transformation Scheme between the OR of BPMN and Link of BPELLin Bai, Jun Wei. 1300-1307 [doi]
- Verifying Consistency of Web Services BehaviorYuyu Yin, Ying Li, ShuiGuang Deng, Wu Jian. 1308-1314 [doi]
- Effective Sigma-Delta Background Estimation for Video Background GenerationFan-Chei Cheng, Yu-Kumg Chen. 1315-1321 [doi]
- RGB Intensity Based Variable-Bits Image SteganographyMohammad Tanvir Parvez, Adnan Abdul-Aziz Gutub. 1322-1327 [doi]
- Removable Visible Watermarking in JPEG Compression DomainFu-Hao Yeh, Greg C. Lee, Y. T. Lin. 1328-1331 [doi]
- Threshold Secret Image Sharing by Chinese Remainder TheoremShyong Jian Shyu, Ying-Ru Chen. 1332-1337 [doi]
- Redundant Picture Coding Using Residual-Adaptive Polyphase Downsampling for H.264 Error ResiliencyJie Jia, Hae-Kwang Kim. 1338-1343 [doi]
- Laundering and Repackaging of Multimedia Content in Content Distribution SystemsAlain Durand, Marc Joye, Mohamed Karroumi. 1344-1351 [doi]
- Content Based Image Retrieval Using Localized Line Segment GroupingsNishat Ahmad, Youngan An, Jongan Park. 1352-1357 [doi]
- The Study of Intrusion Prediction Based on HsMMZhang Zhengdao, Peng Zhumiao, Zhou Zhiping. 1358-1363 [doi]
- Privacy Concealments: Detective Strategies Unveiling Cyberstalking on InternetDa-Yu Kao, Shiuh-Jeng Wang, Kush Mathur, Saransh Jain, Frank Fu-Yuan Huang. 1364-1368 [doi]
- Signcryption Scheme with Standardized Verification AlgorithmRaylin Tso. 1369-1374 [doi]
- A Restricted Undeniable Designated Verifier SignatureAtsushi Koide, Raylin Tso, Takeshi Okamoto, Eiji Okamoto. 1375-1380 [doi]
- Improvement of a Dynamic Accumulator at ICICS 07 and Its Application in Multi-user Keyword-Based Retrieval on Encrypted DataPeishun Wang, Huaxiong Wang, Josef Pieprzyk. 1381-1386 [doi]
- Measuring the Effectiveness and the Fairness of Relation Hiding SystemsAndreas Pashalidis. 1387-1394 [doi]
- Machine-to-Machine Technology Applied to Integrated Video Services Via Context TransferShu-Ching Wang, Tzu-Chih Chung, Kuo-Qin Yan. 1395-1400 [doi]
- A QoS Routing Protocol Supporting Unidirectional Links in MANETsWushi Dong, Niansheng Chen, Qiang Sun. 1401-1405 [doi]
- Design and Implementation of Campus Gate Control System Based on RFIDTing-Kuo Liu, Chung-Huang Yang. 1406-1411 [doi]
- A Dynamic Competition Analysis on the Personal Computer Shipments in Taiwan Using Lotka-Volterra ModelSu-Yun Chiang, Gwo-Gauang Wong, Yiming Li, Hsiao-Cheng Yu. 1412-1417 [doi]
- Prediction Model for Warranty Costs: A Case Study of a LCD Monitor CompanyLouis Y. Y. Lu, Chih-Chyi Chiang. 1418-1423 [doi]
- A Symbiosis Model for New Product Development through Open Innovation ProcessChia-Han Yang, Joseph Z. Shyu, Yimin Li. 1424-1429 [doi]
- An Automatic Stock Market Forecasting and Portfolio Selection Mechanism Based on VPRS, ARX and Grey SystemKuang Yu Huang, Chuen-Jiuan Jane. 1430-1435 [doi]
- Distance Effect and Cognitive Proximity: A Study of Space Competition Strategy in Tourism IndustryChing Chang, Shih-Ming Ou, Zong-Wei Zhu. 1436-1440 [doi]
- The Impact of Enterprise Resource Planning Systems on the Efficiency of Taiwanese FirmsBi-Huei Tsai. 1441-1446 [doi]
- Equal Area Estimation of Three-Parameter Logistic Model for Item Response TheoryShih-Ching Lo. 1447-1452 [doi]
- Visual and Operational Impacts of Variable Speed Limit Signs on Bus Drivers on Freeways Using Driving SimulatorChien-Yen Chang, Chai-Chun Li. 1453-1458 [doi]
- A Computerized Feature Reduction Using Cluster Methods for Accident Duration Forecasting on FreewayYing Lee, Chien-Hung Wei. 1459-1464 [doi]
- Material Acquisitions in Academic LibrariesTsu-Feng Ho, Shyong Jian Shyu, Yi-Ling Wu. 1465-1470 [doi]
- A Dynamic, Real Time and Non-interference Quantitative Measurement Technique on Diagnosing Instructional Condition for Adaptive E-learningPi-Shan Hsu, Te-Jeng Chang, Chien Pen Chuang, Ming-Hsiung Wu. 1471-1476 [doi]
- A Study of Web 2.0 Website Usage Behavior Using TAM 2Mei-Ying Wu, Han-Ping Chou, Yung-Chien Weng, Yen-Han Huang. 1477-1482 [doi]
- Data Hiding Scheme Using Covering Codes in Halftone Images Based on Error DiffusionRuey-Ming Chao, Yu-An Ho, Yen-Ping Chu. 1483-1488 [doi]
- An Improved Time-Bound Hierarchical Key Assignment SchemeQingyu Xu, Mingxing He, Lein Harn. 1489-1494 [doi]
- A Tender Algorithm of Improved Distributed System Resource ManagementWei Xiong, Xu Xianbing. 1495-1499 [doi]
- A Color Clustering Algorithm for Cloth ImageXinrong Hu, Naixue Xiong, Shuqin Cui, Wang Hui, Jianchun Wang. 1500-1505 [doi]
- Web Service Programs Described in a Rule-Based LanguageShuichi Nakanishi, Muneyuki Shimokura, Tadashi Ohta. 1506-1511 [doi]
- Design and Implementation of Embedded SNMP Network Management Manager in Web-Based ModeXinyi Wu, Yong Zhu, Xiaolong Deng. 1512-1516 [doi]
- MPACP: An Approach for Automatic Matching of Parallel Application Communication PatternsChao Ma, Yanxiang He, Naixue Xiong. 1517-1522 [doi]
- Research on Mobile-Agent Based Data Access Model in Pervasive Computing EnvironmentLi Fan, Jiang WeiJian. 1523-1526 [doi]
- Ubiquitous Business Model by Seamless Integration of Photo and Location InformationJeong-In Ju, Jong Chul Lee, Kyoung Jun Lee. 1527-1532 [doi]
- Design of Tag Match Advertising System and the Evaluation of the Business ModelJungho Jun, Kyoung Jun Lee. 1533-1537 [doi]
- Innovative Call Routing: Concept and Experimental ObservationsHui-Na Chua, Patrick Legrand, Karyn Wei-Ju Khoo, Simon Ringland, Bruno Legat. 1538-1543 [doi]
- A Weight-Based Dynamic Replica Replacement Strategy in Data GridsWuqing Zhao, Xianbin Xu, Naixue Xiong, Zhuowei Wang. 1544-1549 [doi]
- A Two-Stage Image Segmentation Method Based on Watershed and Fuzzy C-MeansYong Zhu, Naixue Xiong, Ruhan He. 1550-1555 [doi]
- Web-Based Request Behavior ComprehensionWeiguang Kong. 1556-1559 [doi]
- Verifying Consistency of Web Services Behavior Using Type TheoryYuyu Yin, Jianwei Yin, Ying Li, ShuiGuang Deng. 1560-1567 [doi]
- X-ray Image Enhancement Based on Wavelet TransformJiao Feng, Naixue Xiong, Shuoben Bi. 1568-1573 [doi]
- Study on Weaving Process at Software Architectural levelYoucong Ni, Shi Ying, Jing Wen, Linlin Zhang, Peng Ye, Jiajing Zhang. 1574-1577 [doi]
- Loop Detection for Energy-Aware High Performance Embedded ProcessorsNara Yang, Gilsang Yoon, Jeonghwan Lee, Intae Hwang, Cheolhong Kim, Jong Myon Kim. 1578-1583 [doi]
- Garment Image Retrieval on the Web with Ubiquitous Camera-PhoneRuhan He, Kaiming Liu, Naixue Xiong, Yong Zhu. 1584-1589 [doi]
- ABSRP- A Service Discovery Approach for Vehicular Ad Hoc NetworksBrijesh Kadri Mohandas, Amiya Nayak, Kshirasagar Naik, Nishith Goel. 1590-1594 [doi]
- Access Gateway Discovery and Selection in Hybrid Multihop Relay Vehicular NetworkShang-Pin Sheng, Ben-Yue Chang, Hung-Yu Wei. 1595-1599 [doi]
- Routing and Address Assignment Using Lane/Position Information in a Vehicular Ad Hoc NetworkTakashi Kato, Kohei Kadowaki, Takahiro Koita, Kenya Sato. 1600-1605 [doi]
- Destination Discovery Oriented Position Based Routing in VANETEric Hsiao-Kuang Wu, Pratap Kumar Sahu, Jagruti Sahoo. 1606-1610 [doi]
- LMAM: A Lightweight Mutual Authentication Mechanism for Network Mobility in Vehicular NetworksMing-Chin Chuang, Jeng Farn Lee. 1611-1616 [doi]
- An SDR-Based Wireless Communication Gateway for Vehicle NetworksBoncheol Gu, Junyoung Heo, Sangchul Oh, Namhoon Park, Gwangil Jeon, Yookun Cho. 1617-1622 [doi]
- Realistic Simulation of V2X Communication ScenariosTobias Queck, Björn Schünemann, Ilja Radusch, Christoph Meinel. 1623-1627 [doi]
- Virtual Access Points for Stream Based Traffic DisseminationDaniel Câmara, Nikolaos Frangiadakis, Fethi Filali, Antonio Alfredo Ferreira Loureiro, Nick Roussopoulos. 1628-1632 [doi]
- Optimizing Pseudonym Updation for Anonymity in VANETSBrijesh Kumar Chaurasia, Shekhar Verma. 1633-1637 [doi]