Abstract is missing.
- Cost Framework for a Heterogeneous Distributed Semi-structured EnvironmentTianxiao Liu, Tuyet-Tram Dang-Ngoc, Dominique Laurent. 1-11 [doi]
- Cost-Based Vertical Fragmentation for XMLSven Hartmann, Hui Ma, Klaus-Dieter Schewe. 12-24 [doi]
- Efficiently Crawling Strategy for Focused Searching EngineLiu Huilin, Kou Chunhua, Wang Guangxing. 25-36 [doi]
- QoS-Guaranteed Ring Replication Management with Strong ConsistencyWei Fu, Nong Xiao, Xicheng Lu. 37-49 [doi]
- A Mobile Database Sharing Protocol to Increase Data Availability in Mobile EnvironmentsHien Nam Le, Mads Nygård. 50-61 [doi]
- Mining Recent Frequent Itemsets over Data Streams with a Time-Sensitive Sliding WindowLong Jin, Duckjin Chai, Jun Wook Lee, Keun Ho Ryu. 62-73 [doi]
- Mining Web Transaction Patterns in an Electronic Commerce EnvironmentYue-Shi Lee, Show-Jane Yen. 74-85 [doi]
- Mining Purpose-Based Authorization Strategies in Database SystemJie Song, Daling Wang, Yubin Bao, Ge Yu, Wen Qi. 86-98 [doi]
- RSP-DS: Real Time Sequential Pattern Analysis over Data StreamsHo Seok Kim, Jae-Jyn Shin, Yong-Il Jang, Gyoung Bae Kim, Hae-Young Bae. 99-110 [doi]
- Investigative Queries in Sensor NetworksMadhan Karky Vairamuthu, Sudarsanan Nesamony, Maria E. Orlowska, Shazia W. Sadiq. 111-121 [doi]
- A Taxonomy-Based Approach for Constructing Semantics-Based Super-Peer NetworksBaiyou Qiao, Guoren Wang, Kexin Xie. 122-134 [doi]
- A Comparative Study of Replica Placement Strategies in Data GridsQaisar Rasool, Jianzhong Li, George S. Oreku, Ehsan Ullah Munir, Donghua Yang. 135-143 [doi]
- A Workload Balancing Based Approach to Discourage Free Riding in Peer-to-Peer NetworkYijiao Yu, Hai Jin. 144-155 [doi]
- QoS-Based Services Selecting and Optimizing Algorithms on GridQing Zhu, Shan Wang, Guorong Li, Guangqiang Liu, Xiaoyong Du. 156-167 [doi]
- Bayesian Method Based Trusted Overlay for Information Retrieval over NetworksShunying Lü, Wei Wang, Yan Zhang. 168-173 [doi]
- Managing a Geographic Database from Mobile Devices Through OGC Web ServicesNieves R. Brisaboa, Miguel Rodríguez Luaces, José R. Paramá, Jose Ramon Rios Viqueira. 174-179 [doi]
- Real-Time Creation Method of Personalized Mobile Web Contents for Ubiquitous Contents AccessSeunghyun Han, Dongyeop Ryu, Younghwan Lim. 180-185 [doi]
- The Golden Mean Operator Scheduling Strategy in Data Stream SystemsHuafeng Deng, Yunsheng Liu, Yingyuan Xiao. 186-191 [doi]
- Continuous Skyline Tracking on Update Data StreamsLi Tian, Le Wang, Aiping Li, Peng Zou, Yan Jia. 192-197 [doi]
- A Hybrid Algorithm for Web Document Clustering Based on Frequent Term Sets and k-MeansLe Wang, Li Tian, Yan Jia, Weihong Han. 198-203 [doi]
- OMSI-Tree: Power-Awareness Query Processing over Sensor Networks by Removing Overlapping RegionsWei Zha, Sang Hun Eo, Byeong-Seob You, Dong-Wook Lee, Hae-Young Bae. 204-210 [doi]
- On Studying Front-Peer Attack-Resistant Trust and Reputation Mechanisms Based on Enhanced Spreading Activation Model in P2P EnvironmentsYufeng Wang, Yoshiaki Hori, Kouichi Sakurai. 211-216 [doi]
- A Load Balancing Method Using Ring Network in the Grid DatabaseYong-Il Jang, Ho Seok Kim, Sook-Kyoung Cho, Young-Hwan Oh, Hae-Young Bae. 217-222 [doi]
- Design and Implementation of a System for Environmental Monitoring Sensor NetworkYang Koo Lee, Young Jin Jung, Keun Ho Ryu. 223-228 [doi]
- Policy Based Scheduling for Resource Allocation on GridSunghoon Cho, Moo-hun Lee, Jang-uk In, Bong-hoi Kim, Eui-in Choi. 229-234 [doi]
- Characterizing DSS Workloads from the Processor PerspectiveDawei Liu, Shan Wang, Biao Qin, Weiwei Gong. 235-240 [doi]
- Exploiting Connection Relation to Compress Data GraphJun Zhang, Zhaohui Peng, Shan Wang, Jiang Zhan. 241-246 [doi]
- Indexing the Current Positions of Moving Objects on Road NetworksKyoung Soo Bok, Ho Won Yoon, Dong Min Seo, Su Min Jang, Myoung-Ho Kim, Jae Soo Yoo. 247-252 [doi]
- DBMSs with Native XML Support: Towards Faster, Richer, and Smarter Data ManagementMin Wang. 253-254 [doi]
- A Personalized Re-ranking Algorithm Based on Relevance FeedbackBihong Gong, Bo Peng, Xiaoming Li. 255-263 [doi]
- An Investigation and Conceptual Models of Podcast MarketingShuchih Ernest Chang, Muharrem Cevher. 264-275 [doi]
- A User Study on the Adoption of Location Based ServicesShuchih Ernest Chang, Ying-Jiun Hsieh, Tzong-Ru Lee, Chun-Kuei Liao, Shiau-Ting Wang. 276-286 [doi]
- Email Community Detection Using Artificial Ant Colony ClusteringYan Liu, QingXian Wang, Qiang Wang, Qing Yao, Yao Liu. 287-298 [doi]
- EviRank: An Evidence Based Content Trust Model for Web Spam DetectionWei Wang, Guosun Zeng, Mingjun Sun, Huanan Gu, Quan Zhang. 299-307 [doi]
- A Novel Factoid Ranking Model for Information RetrievalYoucong Ni, Wei Wang. 308-316 [doi]
- Dynamic Composition of Web Service Based on Coordination ModelLimin Shen, Feng Li, Shangping Ren, Yunfeng Mu. 317-327 [doi]
- An Information Retrieval Method Based on Knowledge ReasoningXiang Mei, Junliang Chen, Xiangwu Meng, Meng Xu. 328-339 [doi]
- Research on Personalized Recommendation Algorithm in E-Supermarket SystemFeng Xiong, Qi Luo. 340-347 [doi]
- XML Normal Forms Based on Constraint-Tree-Based Functional DependenciesTeng Lv, Ping Yan. 348-357 [doi]
- Untyped XQuery CanonizationNicolas Travers, Tuyet-Tram Dang-Ngoc, Tianxiao Liu. 358-371 [doi]
- Web Search Tailored Ontology Evaluation FrameworkDarijus Strasunskas, Stein L. Tomassen. 372-383 [doi]
- An Overview of the Business Process Maturity Model (BPMM)Jihyun Lee, Danhyung Lee, Sungwon Kang. 384-395 [doi]
- Process Mining: Extending ::::alpha:::: -Algorithm to Mine Duplicate Tasks in Process LogsJiafei Li, Dayou Liu, Bo Yang. 396-407 [doi]
- A Distributed Genetic Algorithm for Optimizing the Quality of Grid WorkflowHongxia Tong, Jian Cao, Shensheng Zhang. 408-419 [doi]
- Safety Analysis and Performance Evaluation of Time WF-netsWei Song, Wan-Chun Dou, Jinjun Chen, Shaokun Fan. 420-432 [doi]
- Dual Workflow Nets: Mixed Control/Data-Flow Representation for Workflow Modeling and VerificationShaokun Fan, Wan-Chun Dou, Jinjun Chen. 433-444 [doi]
- Bridging Organizational Structure and Information System Architecture Through ProcessVladimír Modrák. 445-455 [doi]
- Relation-Driven Business Process-Oriented Service DiscoveryYu Dai, Lei Yang, Bin Zhang. 456-466 [doi]
- Workflow Message Queue s Performance Effect Measurements on an EJB-Based Workflow Management SystemHyung-Jin Ahn, Kiwon Lee, Taewook Kim, Haksung Kim, Ilkyeun Ra. 467-478 [doi]
- RFID Application Model and Performance for Postal LogisticsJeong-Hyun Park, Boo-Hyung Lee. 479-484 [doi]
- An Organization and Task Based Access Control Model for Workflow SystemBaoyi Wang, Shaomin Zhang. 485-490 [doi]
- A Method of Web Services Composition Based on Service AllianceChunming Gao, Liping Wan, Huowang Chen. 491-496 [doi]
- Toward a Lightweight Process-Aware MiddlewareWeihai Yu. 497-503 [doi]
- Automatic Generation of Web Service Workflow Using a Probability Based Process-Semantic RepositoryDong Yuan, Miao Du, Haiyang Wang, Li-zhen Cui. 504-509 [doi]
- A Three-Dimensional Customer Classification Model Based on Knowledge Discovery and Empirical StudyGuoling Lao, Zhaohui Zhang. 510-515 [doi]
- QoS-Driven Global Optimization of Services Selection Supporting Services Flow Re-planningChunming Gao, Meiling Cai, Huowang Chen. 516-521 [doi]
- SOA-Based Collaborative Modeling Method for Cross-Organizational Business Process IntegrationHongjun Sun, Shuangxi Huang, Yushun Fan. 522-527 [doi]
- Model Checking for BPEL4WS with TimeChunming Gao, Jin Li, Zhoujun Li, Huowang Chen. 528-533 [doi]
- A Version Management of Business Process Models in BPMSHyerim Bae, Eunmi Cho, Joonsoo Bae. 534-539 [doi]
- Research on Architecture and Key Technology for Service-Oriented Workflow Performance AnalysisBo Liu, Yushun Fan. 540-545 [doi]
- The Study on Internet-Based Face Recognition System Using Principal Component AnalysisMyung A. Kang, Jong-Min Kim. 546-553 [doi]
- Semantic Representation of RTBAC: Relationship-Based Access Control ModelSong-hwa Chae, Wonil Kim. 554-563 [doi]
- A Code-Based Multi-match Packet Classification with TCAMZhiwen Zhang, Mingtian Zhou. 564-572 [doi]
- Home Network Device Authentication: Device Authentication Framework and Device Certificate ProfileYun-kyung Lee, Deok-Gyu Lee, Jong-Wook Han, Kyo-Il Chung. 573-582 [doi]
- P-IDC: Information Security and Consideration in Building Internet Data Centers for Pervasive EnvironmentJae-min Yang, Jong-Geun Kim, Jong-in Im. 583-592 [doi]
- Improvement of an Authenticated Key Agreement ProtocolYongping Zhang, Wei Wei, Tianjie Cao. 593-601 [doi]
- A Mechanism for Securing Digital Evidences in Pervasive EnvironmentsJae-Hyeok Jang, Myung-Chan Park, Young-Shin Park, Byoung-Soo Koh, Yong-Rak Choi. 602-611 [doi]
- A Secure Chaotic Hash-Based Biometric Remote User Authentication Scheme Using Mobile DevicesEun-Jun Yoon, Kee-Young Yoo. 612-623 [doi]
- Adapting Web Services Security Standards for Mobile and Wireless EnvironmentsNelly A. Delessy, Eduardo B. Fernández. 624-633 [doi]
- Coexistence Proof Using Chain of Timestamps for Multiple RFID TagsChih-Chung Lin, Yuan-Cheng Lai, J. D. Tygar, Chuan-Kai Yang, Chi-Lung Chiang. 634-643 [doi]
- A Design of Authentication Protocol for Multi-key RFID TagJiyeon Kim, Jongjin Jung, Hoon Ko, Boyeon Kim, Susan Joe, Yongjun Lee, Yunseok Chang, Kyoonha Lee. 644-653 [doi]
- An Efficient Fragile Watermarking for Web Pages Tamper-ProofChia-Chi Wu, Chin-Chen Chang, Shang-Ru Yang. 654-663 [doi]
- Classification of Key Management Schemes for Wireless Sensor NetworksHwaseong Lee, Yong Ho Kim, Dong-Hoon Lee, Jongin Lim. 664-673 [doi]
- An Efficient Algorithm for Proportionally Fault-Tolerant Data MiningTianding Chen. 674-683 [doi]
- SOGA: Fine-Grained Authorization for Self-Organizing GridMing Guo, Yong Zhu, Yuheng Hu, Weishuai Yang. 684-693 [doi]
- Permission-Centric Hybrid Access ControlSejong Oh. 694-703 [doi]