Abstract is missing.
- Computer Immunology and Neural Network Models for Masquerader DetectionYingbing Yu, James H. Graham. 1-6
- Multivariate-based Data Reduction for Pattern RecognitionDeok Hee Nam, Harpreet Singh. 7-12
- Tuning an Adaptive Neural Network Fuzzy Inference Controller Using Evolutionary LearningJay Kothari, Edward Grant, Gordon K. Lee. 13-16
- Adjusting Web Caching Computers to Reduce Communication Channel AllocationR. Zuck, A. Williams, B. Kair, H. Bui, Catherine Stringfellow, Nelson L. Passos. 17-20
- QoS Provisioning in Wireless Cellular Networks for Multimedia ApplicationsSaleh H. Al-Sharaeh, Isa Garba. 21-24
- Coupling On-line Game Implementation and Problem Solving: A Very Viable ApproachJoel A. Rosiene, Carolyn Pe Rosiene. 25-29
- Self-Resonant Frequency of Passive Chip ComponentsAboudou S. Akambi, Bruce P. Johnson. 30-33
- A PID Controller for Real-Time DC Motor Speed Control using the C505C MicrocontrollerSukumar Kamalasadan, Abhiman Hande. 34-39
- Run-ahead Crash Recovery for Shared Virtual Memory SystemsAngkul Kongmunvattana. 40-45
- Automated Error-Prevention and Error-Detection Tools for Assembly LanguageLance G. Johnson, David C. Pheanis. 46-50
- Optimum Retiming Of Multi-Dimensional Data Flow Graphs With Variable Processing OrderRatnesh Verma, Dongming Peng. 51-56
- A Common Interval Searching Algorithm for Protein Sequence ComparisonXiaolu Huang, Hesham H. Ali. 57-62
- A Scheme for the Segmentation of Text, Image Areas in Compound Documents for Efficient CompressionS. R. Subramanya. 63-66
- Multicasting Secret Images using a Knapsack-like Cipher SystemShiuh-Jeng Wang. 67-72
- Security Considerations in DNP3 SCADA SystemsSandip C. Patel, James H. Graham. 73-78
- A Systematic Approach to Network Security AssessmentMehdi Rasti, Davood Sarramy, Mahmood Khaleghi. 79-84
- Design and Implementation of AES (Rijndael) AlgorithmChirag Parikh, Parimal Patel. 85-89
- Analyzing Early Requirements in an E-Commerce System with a Goal and Agent Oriented ApproachZhi Liu. 90-95
- Knowledge Discovery in Schizophrenia using Association RulesAbdelaziz Ouali, Amar Ramdane-Cherif, Nicole Lévy, Marie-Odile Krebs. 96-102
- Online Voting System for Student Body ElectionVijayakumar Shanmugasundaram, Paul Juell, Harry Vanderschoot, Carol Tschakert. 103-108
- An Architecture for a Hardware Implementation of the OSPF ProtocolMohamed Abou-Gabal, Raymond Peterkin, Dan Ionescu. 109-114
- Architecture for Context-driven Packet Payload Processing EngineSumit N. Vora, Parimal Patel. 115-119
- Adaptive Data Forwarding Techniques for Energy Conservation in Wireless Sensor NetworksKavitha Gundappachikkenahalli, Hesham H. Ali. 120-125
- Reducing Communication Overhead in 3D Mesh Networks for Unicast and Path-based Multiple MulticastsDavid R. Surma. 126-131
- A Novel Approach for Improving QoS Using Genetic Optimization AlgorithmAhmed H. Salem, Adel Said Elmaghraby, Anup Kumar, Rammohan K. Ragade. 132-137
- Prototyped Embedded Application for IGMP Version 2 ProtocolApurva Mistry, Parimal Patel. 138-142
- Block Identification for Reducing Blocking Artefact in MPEG-1 Video Coded Images Using Statistical Inference and Performance Measurement Using Block Impairment Metric (BIM)Morshed U. Chowdhury, Sid Ray, Thao Pham. 143-147
- Implementation of the DFT Using Radix-2 and Paired Transform AlgorithmsNarayanam Ranganadh, Parimal Patel, Artyom M. Grigoryan. 148-153
- Invisible Digital Watermarking of Remotely Sensed Satellite Images - A New ApproachStephen Krebsbach, William Perrizo. 154-159
- A Distance-based Outlier Detection Method Using P-TreeDongmei Ren, Kirk Scott, Baoying Wang, William Perrizo. 160-164
- A P-Tree based Outlier Detection MethodDongmei Ren, Baoying Wang, William Perrizo. 165-170
- A New Fast Fault Tolerant Scheduling Approach in Distributed SystemsMohana Desiraju, Hesham H. Ali. 171-176
- A Cluster-based Outlier Detection Method without Pre-ClusteringDongmei Ren, Baoying Wang, William Perrizo. 177-180
- Parameter Reduction for Density-based Clustering on Large Data SetsBaoying Wang, William Perrizo. 181-186
- Task Scheduling Algorithm with Duplication for Distributed ComputingSreekar Pasham, Wei-Ming Lin. 187-193
- Web Access Clustering using Tolerance RelationFu-Shing Sun, Chun-Hung Tzeng. 193