Abstract is missing.
- Evaluation methodology for virtual reality software toolsEduardo Islas, Miguel Pérez, Benjamín Zayas Pérez, Carlos Espinosa, Rita Beltran, Evelyn Vega. 1-7
- Image compression of facial photographs based on BTC/TSVQ local processingM. Mohy Mahmoud, Amr Goneid, Suhair Amer. 8-13
- A novel method for person identification by comparing retinal patternsRezwanur Rahman, Morshed U. Chowdhury, S. M. Raiyan Kabir, M. Rezwan Khan. 14-17
- Achieving near-optimal distortion reduction with invisible watermarking RSSI algorithmsStephen Krebsbach, George Hamer. 18-23
- ModVis: An information visualization tool for gene module discoveryJustin Molineaux, Jianhua Xuan, Ting Gong, Yitan Zhu, Eric P. Hoffman, Robert Clarke, Yue Wang. 24-31
- Research of the novel fast dynamic target detection methodLingjia Gu, Shuxu Guo, Jin Duan, Wenbo Jing, Ruizhi Ren. 32-36
- Adaptive coverage in heterogeneous sensor networkMahmuda Naznin, Kendall E. Nygard. 37-40
- A COTS framework for sensor fusion using dynamic bayesian networks in livestock productionJens A. Hansen, Thomas D. Nielsen, Henrik Schiøler. 41-47
- Computer-aided item selection for the cycle counting procedureKemal Taljanovic, Mehmed M. Kantardzic. 48-53
- Performance modeling of hierarchical memoriesMarwan S. Sleiman, Lester Lipsky, Kishori M. Konwar. 54-59
- Modeling the dynamic load in distributed control systems (DCS)Ahmed M. Mohamed, S. A. Younies. 60-65
- Task-migration support for parallel computing on shared virtual memory clustersAngkul Kongmunvattana. 66-71
- A novel parallel hardware and software solution for a large-scale biologically realistic cortical simulationFrederick C. Harris Jr., Mark C. Ballew, Jason Baurick, James Frye, Lance Hutchinson, James G. King, Philip H. Goodman, Rich Drewes. 72-77
- Scheduling multi-dimensional loops in a computer clusterK. Mayfield, A. Joseph, S. Black, H. Bui, Nelson L. Passos. 78-82
- A comparative study of replacement algorithms used in the scalable asynchronous cache consistency schemeRamzi A. Haraty, Lana Turk. 83-88
- Combining spatial data from multiple data sourcesHsine-Jen Tsai, Les L. Miller, Hua Ming, Rebecca Wemhoff, Sarah Nusser. 89-94
- Statistical steganography and steganalysis of database tablesGeorge Hamer, Stephen Krebsbach. 95-101
- Clustering via a kernel fuzzy connectivity matrixCarl G. Looney. 102-107
- Classification rule extraction approach based on homogeneous training samplesPrabhat Mahanti, Dhirendra Kumar Swami, Mohammed Al-Fayoumi. 108-113
- Knowledge discovery on multi-relations distributed databasesMehdi Owrang, Les L. Miller. 114-119
- A feature recognition approach for mold machiningXiaoming Ding, Liping Zhang, Yiqiang Lu, Ridong Jiang. 120-125
- Surveillance of a complex heterogeneous system using software agents - case study on a hydroelectric power plant chainHonoriu Valean, Liviu Miclea, Szilárd Enyedi. 126-131
- Enhancing information security risk management with data mining and fuzzy logic techniquesMariana Hentea. 132-139
- Application of soft solutions for signal analysisDonna L. Hudson, Maurice E. Cohen. 140-144
- A telephone communication agent for agent/user interactionAhmed Kamel. 145-150
- Material processing for ADI data using neuro fuzzy systemDeok Hee Nam, Harpreet Singh, Susil K. Putatunda. 151-156
- Efficiently evolving multiple robots using distributed genetic algorithmsEkkasit Tiamkaew, Jirakhom Ruttanavakul. 157-161
- A three poled model for web applicationsHamzeh K. Al Shaar, Ramzi A. Haraty. 162-166
- Complexity issues in control software design: A practical perspectiveVic Grout, Stuart Cunningham. 167-174
- A multiobjective evolutionary approach for constrained joint source code optimizationNaeem Zafar Azeemi. 175-180
- An empirical study of the boundary values of the object-oriented metricsRaed Shatnawi, Wei Li. 181-186
- Simple factory design pattern by auto-registration and applicationsJie Cao, Shashi S. Marikunte. 187-192
- Measuring class cohesion: An empirical approachPrabhat Kumar Mahanti, Rajnish Kumar, Vandana Bhattacherjee. 193-198
- ZoneLib: A simulink library for modeling zone divided climate dynamicsJan Jakob Jessen, Henrik Schiøler. 199-204
- Analysis of fused deposition modeling partsG. Arumaikkannu, M. Sreeramulu, S. Gowri. 205-210
- Computer virus signature model for detection engineKongkiat Hirankerd, Pattarasinee Bhattarakosol. 211-217
- Usability of agentsheets for creating educational simulationKyu Han Koh, Sundeep Gopalaswamy, Ananth Srirangarajan, Jingren Jin, Cheryl D. Seals. 218-223
- Teaching programming with animated 3D scenesBarrett M. Shiff. 224-229
- A virtual reality system for hydroelectric generating unit maintenance training and understandingP. Alcides Jr., Manoel R. Filho, Fábio V. Bezerra, Marcos A. Souza, Pebertli A. Barata, Messias A. Nascimento, Marcelo S. Hounsell. 230-235
- Introducing synchronisation in deterministic network modelsHenrik Schiøler, Jan Jakob Jessen, Jens Dalsgaard, Kim Guldstrand Larsen. 236-243
- Security enhancement for SCADA communication protocols using augmented vulnerability treesSandip C. Patel, James H. Graham, Patricia A. S. Ralston. 244-251
- A constrained version of a clustering algorithm for switch placement and interconnection in large networksVic Grout, Stuart Cunningham. 252-257
- Congestion detection and control with real-time streaming mediaTeck-Kuen Chua, David C. Pheanis. 258-263
- A simulation of power management algorithm in wireless transmission to guarantee QoSAhmed H. Salem, Anup Kumar, Adel Said Elmaghraby. 264-270
- Security-enhanced remote terminal units for SCADA networksJeffrey L. Hieb, James H. Graham. 271-276
- A process modeling system aimed at large-scale collaborative design over networksThomas Wisniewski, Wenying Feng. 277-282
- Design and description of a tool towards a software engineering experimentNarayan C. Debnath, Nripendra Rai, Haesun K. Lee, Ilhyun Lee. 283-288
- An autotester for the modified commission functionNarayan C. Debnath, Joyati Debnath, Mark Burgin, Joshua Wilson, Joseph Cropper. 289-294
- OQL-based data mining query languageRekha Bhowmik. 295-300
- A new modeling notation for system design and workflow patternsThomas Wisniewski, Wenying Feng. 301-306
- Integration of multidisciplinary specialized applications using componentsJosé Alfredo Sánchez López, Dionisio A. Suárez Cerda, Agustín Quintero Reyes. 307-311
- A case study of monitoring construction operations using automated position tracking systemY. Y. Su, Liang Y. Liu. 312-317
- Designing of building black-boxes to support disaster rescue and recoveryMin-Hsuan Tsai, Liang Y. Liu, Feniosky Peña-Mora. 318-323
- Transistor-mapped binary decision diagram for CMOS circuitsChia-Pin R. Liu. 324-329
- Co-evolutionary robotics using two kinds of neural networksMasaya Yoshikawa, Hidekazu Terai. 330-334
- Fault detection and isolation using artificial neural networksIn Soo Lee, Gordon K. Lee. 335-340
- Humidity estimation using neural network from sensor dataKirthi L. Sreenivasan, Thomas Philip, Sunil K. Khijwania, Jagdish P. Singh. 341-345
- Security concerns with mobile IPv6Y. Chen, R. Vaughn, R. Ramkumar. 346-351
- A security engineering process for vulnerability assessmentWei Li. 352-357
- Securing wireless networks with enhanced WEPRamzi A. Haraty, Walid El Horr. 358-363
- Advanced remote password authentication and key agreement using smart cardRui Jiang, Aiqun Hu, Xiaohui Yang. 364-370