Abstract is missing.
- Constructing Comprehensive Behaviors: A Simulation StudyThomas C. Henderson, Xinwei Xue. 1-8
- Modeling Arrival Flight Traffic Using Arena®Charles J. Kim, Daniel A. Akinbodunse, Chibuike Nwakamma. 9-14
- Computational Model of Temperatures in a Covered Water Body Responding to Solar InsolationJ. Rhoads, J. Faulk, Nelson L. Passos. 15-20
- A Computerized Ecological Assessment of Families of Beetles from the Chihuahuan Desert of West TexasM. Shipley, S. Middleton, Nelson L. Passos. 21-25
- Precision Localization in Monte Carlo Sensor NetworksThomas C. Henderson, Edward Grant, Kyle Luthy, Leonardo Mattos, Matt Craver. 26-31
- Design of a Virtual Private Network for the Real-time Control of the Cameroon Power NetworkEmmanuel Tanyi, Jules Tsochounie, Marcellin Nkenlifack, Thierry Noulamo. 32-37
- Monte Carlo Sensor NetworksThomas C. Henderson, Brandt Erickson, Travis Longoria, Edward Grant, Kyle Luthy, Leonardo Mattos, Matt Craver. 38-43
- A Decision Tree Based Classification Model to Automate Trip Purpose DerivationTerry Griffin, Yan Huang. 44-49
- Implementing Reusable Components for Embedded Automotive Applications: An Approach Using Graphical Tools at UTC Fuel CellsHaiying Ren, William C. Rogers. 50-54
- Event Processing Software for Intelligent Security Monitoring and Alarm SystemJames H. Graham, Jason Walton. 55-60
- Application of Object Oriented Performance Model To Aspects of a Health Care Management SystemAmal Abdel-raouf, Reda A. Ammar, Howard A. Sholl. 61-66
- Toward an Algorithm Understanding Approach for Legacy Systems RenovationJérémie Hattat, Laurent Deruelle, Henri Basson, Pascal Flament, Sylvain Breuzard. 67-72
- System for Testing and Validating Complex VoIP SoftwareTeck-Kuen Chua, David C. Pheanis. 73-78
- Object-Oriented Software Testing Using UML ModelsBenzir Md Ahmed, Vijayakumar Shanmugasundaram. 79-84
- Dynamic Component Deployment and (Re) Configuration Using a Unified FrameworkAbdelmadjid Ketfi, Noureddine Belkhatir. 85-90
- Using UML to Model Distributed System ArchitecturesMara Nikolaidou, Nancy Alexopoulou, Anargyros Tsadimas, Alexandros Dais, Dimosthenis Anagnostopoulos. 91-96
- A New Generalized Cellular Automata: Architecture and VLSI Circuital ImplementationDianxun Shuai, Li Luo, Xing Wang, Rongrong Liu, Wenlan Wang. 97-102
- Enhancing the Accuracy of O-GEHL Branch Predictor: Analysis and ApproachEkkasit Tiamkaew, Angkul Kongmunvattana. 103-108
- A Matrix Processor for Math-intensive ApplicationsStanislav Sedukhin, Mostafa I. Soliman. 109-114
- Enhanced Distributed Processor Sharing Through the Use of Mini-ServersReid Kaiser, Mary Jane Willshire. 115-120
- A Complex Dynamic Model for Cancer Growth and MetastasisMarc Colangelo, Phedias Diamandis, Jon Stone. 121-128
- Intelligent Agent Technique in Age Related MeasurementsM. Burgin, Maurice E. Cohen, Donna L. Hudson. 129-134
- Disulphide Connectivity Prediction in Proteins Based on Secondary Structures and Cysteine SeparationRaju Balakrishnan. 135-140
- Use of Ontology-Based Multi-Agent Systems in the Biomedical DomainMaja Hadzic, Elizabeth Chang. 141-145
- Integrating Data Changes with Data from Data Service ProvidersUwe Heinkel, Carmen Constantinescu, Bernhard Mitschang. 146-151
- OLAP Application Development for Multiple Versions Query in Multidimensional Database SystemsJarernsri L. Mitrpanont, Somchart Fugkeaw. 152-157
- A System for Multimedia Information Management and RetrievalVincenzo Moscato, Antonio Picariello, Antonio Maria Rinaldi. 158-163
- RFID: The Emergence of a Billion Dollar IndustryVijayakumar Shanmugasundaram, Cody Marshall, Nawang Bajracharya. 164-168
- Secure SCADA Communications, Monitoring and Control over the InternetSandip C. Patel, James H. Graham, Patricia A. S. Ralston, Roberto Tantalean-Carrasco. 169-174
- Practical Methods for Deadline Scheduling using Process Residual TimeSarah Tasneem, Howard A. Sholl, Reda A. Ammar. 175-180
- Intelligent Systems for Water Level PredictionCarl Steidley, Alexey L. Sadovski, Philippe Tissot, Ray Bachnak, Zack Bowles. 181-185
- A Multivariate State-Space Model of the Southern Grid of the Cameroonian Power SystemEmmanuel Tanyi, Jules Tsochounie. 186-191
- A Survey of QoS Computation for Web Service ProfilingWitold Abramowicz, Agata Godlewska, Julia Gwizdala, Tomasz Jakubowski, Monika Kaczmarek, Marek Kowalkiewicz, Dominik Zyskowski. 192-197
- mGrid: A Lightweight Computational Grid based on JiniPing-Jer Yeh, Shang-Chien Shen, Shyan-Ming Yuan. 198-203
- Managing the Network Usage of ApplicationsChi-Huang Chiu, Shyan-Ming Yuan. 204-208
- A Conceptual Architecture of Distributed Web Services for Service EcosystemsChen Wu, Elizabeth Chang. 209-214
- Combining Classification Algorithms Using Demspter s Rule of CombinationHuseyin Aygun, Esref Adali. 215-218
- Feature Selection by Evolutionary Computing: Application on Diagnosis by Pattern Recognition ApproachO. Ondel, Emmanuel Boutleux, G. Clerc. 219-225
- Defect Detection in Textile Fabrics Using Gabor Wavelet NetworksK. L. Mak, P. Peng. 226-231
- Mining Weighted Support Affinity PatternsUnil Yun, John J. Leggett. 232-237
- RP-Aided Design in Architectural StudioNaai-Jung Shih. 238-243
- How Soccer Playing Robots Learn to See - The Vision System of the Vienna CubesH. Wahl, R. K. Pucher, A. Hofmann, A. Mense. 244-248
- A Framework and a Methodology for the Design and Development of Collaborative Systems and PlatformsWaleed W. Smari, William K. McQuay, Seung-yun Kim, Ashish Godbole. 249-256
- A Design and Implementation of Wireless Presentation SystemMing-Chun Cheng, Shyan-Ming Yuan. 257-262
- Limn Matrix: A Tool for Visualizing Large, Distributed, High-Dimension Data SetsJing Zhang, Di Cook, Les Miller. 263-268
- Mutually Coupled Higher Order and Composite Network Filter DesignAboudou S. Akambi, Aldo M. Scandurra, Bruce P. Johnson. 269-273
- PCI-EXPRESS Transaction Layer and Application Layer of A 3-Port SwitchAshraf El-Nakhal, Behnam S. Arad. 274-279
- Graph Partitioning for Circuit TestabilityHassan Farhat. 280-284
- Lebanese Colloquial Arabic Speech RecognitionRamzi A. Haraty, Omar el Ariss. 285-291
- A Practical Payroll System Design that Aimed at Small Business ManagementEl Amine Slaoui, Mike Marrone, Desislava Nikolova, Wenying Feng. 292-297
- Modified RSA in the Domains of Gaussian Integers and Polynomials Over Finite FieldsAbdul Nasser El-Kassar, Ramzi A. Haraty, Y. A. Awad, Narayan C. Debnath. 298-303
- Fuzzy Set Based Software Measurement and EstimationMark Burgin, Narayan C. Debnath. 304-309
- Hardware Realization of Fuzzy CMAC Based on Discrete Incremental ClusteringAbdul Wahab, Yu Changbin. 310-315
- An Adaptive Fuzzy Inference Fitness Function for Evolutionary Robot LearningSupriya Bhat, Edward Grant, Gordon K. Lee. 316-321
- Intelligent System for Cutting Tool Selection and Its Tool LifeDeok Hee Nam, Harpreet Singh. 322-317
- Investigation of the Effects of Noise and Plant Parameter Variations for an Adaptive Neuro Fuzzy Inference Controller with Evolutionary TuningJay Kothari, Gordon K. Lee. 328-331
- Mozart to Metallica: A Comparison of Musical Sequences and SimilaritiesStuart Cunningham, Vic Grout, Harry Bergen. 332-339
- Walking Tree Method for Stereo VisionTai Hsu, Paul Cull. 340-343
- A New Algorithm for Order-Independent ClusteringMa Li, Abdul Wahab, Chai Quek. 344-349
- Diagnosis System of a Set Converter-Induction Machine-Load by Pattern Recognition ApproachO. Ondel, Emmanuel Boutleux, G. Clerc. 350-357
- Distributed and Scalable Vision System for Quality Control of CherriesV. Delligeon, G. Mahe, Christophe Rosenberger, P. B. Bro, Waleed W. Smari. 358-365
- CCFDP: Collaborative Click Fraud Detection and Prevention SystemLi Ge, Mehmed M. Kantardzic, Darren King. 366-371
- FPGA Based Implementation of MD5 Message-Digest Algorithm for IPSEC AuthenticationBala Krishnan D. Achie, Ajaykrishna Sreehari, Parimal Patel. 372-375
- A Secure One-Time Password Authentication Using Cellular AutomataHee-Jung Yoon, Jun-Cheol Jeon, Kee-Won Kim, Kee-Young Yoo. 376-381
- Improved Design and Implementation of Network Intrusion Detection System for Gigabit Network Traffic Using FPGAParimal Patel, Ashok Kumar Tummala, Hari Babu Ramineni, Wei-Ming Lin. 382-386
- New Authentication Scheme with No Verification TableHye-Jin Yang, Jun-Cheol Jeon, Kee-Won Kim, Kee-Young Yoo. 387-389
- Integrating Hardware and Software in Early Research in Computer ScienceHassan Farhat. 390-394
- Roadmap for Training Processes Using E-Learning SystemsEduardo Islas, Miguel Pérez, Guillermo Rodriguez, Israel Paredes, Ivonne Ávila, Miguel Mendoza. 395-401
- Experiences Using Defect Checklists in Software Engineering EducationKendra Cooper, Sheila Liddle, Sergiu Dascalu. 402-409
- Database Tools to Administer ProgrammingLandCurt D. Hill, Vijayakumar Shanmugasundaram. 410