Abstract is missing.
- A Real-time Quadtree Searchless Fractal Image Compression DeviceSongpol Ongwattanakul, Xianwei Wu, David Jeff Jackson. 1-5
- A New Searchless Two-Level IFS Fractal Image Encoding MethodXianwei Wu, David Jeff Jackson, Hui-Chuan Chen. 6-10
- Video Mosaics Based on Steepest Descent AlgorithmChing-Tang Hsieh, Eugene Lai, Sung-Yi Chen. 11-14
- Image Coding Based on One-step Wavelet TransformQiang Bo, Jeff A. Shafer, Waleed W. Smari, John G. Weber, Frank A. Scarpino. 15-20
- Adaptive Image Compression with Neural-Net Predictor Optimized by Quasi-Simulated AnnealingSatoshi Mizuta. 21-24
- Morphological Image Processing Using Custom Instructions on Distributed Nios ProcessorsHaichen Ren, David Jeff Jackson. 25-28
- Angular Histograms for Shape RetrievalAtul Sajjanhar, Guojun Lu, Dengsheng Zhang. 29-31
- Image Retrieval Using Modified Generic Fourier DescriptorsAtul Sajjanhar, Guojun Lu, Dengsheng Zhang. 32-35
- A Real-Time 2-D Pattern Recognition using Spatial Circular Cross-CorrelationZoubir Hamici. 36-41
- Comparative Experiments on Clustering ValiditiesCrystal Z. Huang, Carl G. Looney. 42-46
- On Estimation Of 3D Hand Position Using Stereo VisionMaria B. Teruel, Oksana Kubushyna, Ramzi W. Elkhater, Evangelos A. Yfantis, Richard Boyle. 47-50
- Contrast-detail Analysis of a CMOS-based Digital X-ray Imaging SystemQirong Zhang, Yuhua Li, Ben Steele, Wei R. Chen, Xizeng Wu, John Cheung, Hong Liu. 51-54
- A Study of a Generalization of a Card ProblemZhizhang Shen, Timothy Healy. 55-58
- Modeling Methods for Coastal Environmental StudiesCarl Steidley, Alexey L. Sadovski, Rafic Bachnak, Kelly Torres Knott. 59-64
- Scalability of Agent-Based Onion Routing NetworkRonggong Song, Larry Korba. 65-69
- Fire Emergency Building Evacuation: A Computer Simulation ModelMohammed E. Haque, Shashikala Balasubramanian. 70-74
- Efficient Parallel Simulation of Direct Methanol Fuel Cell ModelsSanguthevar Rajasekaran, Reda A. Ammar, K. Reifsnider, Luke E. K. Achenie, Ahmed M. Mohamed, G. Zhang, M. Ahmed. 75-78
- Virtual Ethnography: a Computer-Based ApproachNatalie Ardet, Matthias Thome. 79-82
- An Application of Knowledge Discovery Techniques on Stock MarketYihua Philip Sheng, Wen-Chi Hou, Zhong Chen. 83-86
- A Flexible Integration Model for Web-based E-Commerce TransactionsChima Adiele, Sylvanus A. Ehikioya. 87-91
- RPM: A Remote PC Power Management ToolThao Phuong Nguyen, Du Zhang. 92-95
- A Tool for Text SummarizationAteendra Sudarshak Balasingham, Du Zhang. 96-99
- A Platform for Studying and Facilitating Two-Handed InteractionTong Du, Michael Wainer. 100-104
- Real Time Fabric Fault DetectionAmal Abdel-raouf, Reda A. Ammar, Howard A. Sholl, Salwa M. Nassar. 105-108
- Metamodel Code Generation for a Model Driven ArchitectureStefan Mitterdorfer, Egon Teiniker, Christian Kreiner, Zsolt Kovács, Reinhold Weiss. 109-112
- A Test Case Generator for Three-variable Functions: Object-Oriented Design and ImplementationNarayan C. Debnath, Joshua Wilson, Joseph Cropper, Mark Burgin, Hamid R. Abachi. 113-117
- Measuring Software MaintenanceMark Burgin, Narayan C. Debnath. 118-121
- Qualitative Evaluation of Information Systems Using Kiviat GraphsCyril S. Ku. 122-126
- Reasoning in Collaboration Diagrams by Description LogicsHiroyuki Nakanishi, Takao Miura, Isamu Shioya. 127-130
- A Deterministic-Heuristic Load Balancing Methodology for MPIABMeha Sabharwal, Shahram Rahimi, Raheel Ahmad, Ajay Narayanan. 131-135
- Software Design Method for Agent Systems from ScenariosKazunori Matsumoto, Shinichi Honiden. 136-141
- Reasoning with Negation and SetsJames D. Jones. 142-144
- A Theory of Probabilistic Decision Making for Intelligent SystemsKazunori Matsumoto, Kenichi Torii. 145-150
- Consequential Intelligent Agent SystemsDonna L. Hudson, Maurice E. Cohen. 151-154
- Updating Z Ordered Representations of Data SetsKirk Scott. 155-158
- A Task Graph Set for Evaluation of Reconfigurable Hardware Scheduling AlgorithmsSin Ming Loo, J. D. Winningham. 159-163
- Parallel Thinning on RmeshJohn Jing-Fu Jenq, Wing Ning Li. 164-167
- Alleviation of the Impact of the Apex Nodes on Routing in the Pyramid StructuresZhizhang Shen. 168-171
- Convergence Properties of Genetic AlgorithmsHong-Kyu Lee, Gordon K. Lee. 172-176
- Learning Object Oriented Programming by Creating VisualizationsPaul Juell, Vijayakumar Shanmugasundaram. 177-183
- Decision Tree Induction for Dynamic, High-Dimensional Data Using P-TreesAnne Denton, William Perrizo. 184-187
- Building Agent Community for Web Service IntegrationCheng-Hsiung Hung, Jason Jen-Yen Chen. 188-192
- Annotating Linguistic Data with ImageSpace for the Preservation of Endangered LanguagesShiyong Lu, Rong Huang, Farshad Fotouhi. 193-196
- A Light-weight Distributed Web Search Engine: Distributed Web Crawling PartYihua Philip Sheng, Zhong Chen, Shahram Rahimi, Srinivas Mandalapu. 197-200
- Fault-Tolerance Implementation on P2P Data MiningRex E. Gantenbein, Jung P. Kim, Chang Oan Sung, Charlie Y. Shim. 201-204
- Reliable High-Speed Communication Module for Linux Cluster File System Using M-VIASung Y. Shin, ChanGon Yoo, Chih-Cheng Hung. 205-208
- Ickpt: An Efficient Incremental Checkpointing Using Page Writing Fault - Focusing on the Implementation in Linux KernelSangho Yi, Junyoung Heo, Yookun Cho, Jiman Hong, Jongmoo Choi, Gwangil Jeon. 209-212
- A Methodology for Developing an Adjustable Security Design Metric by Mapping Software Testing into Security TestingCharlie Y. Shim, Chang Oan Sung, Jung Y. Kim, Jinoo Park. 213-215
- Reliable Transformation between Java RMI and CORBA ProgramsHaklin Kim. 216-219
- Pre-fetching and Pre-releasing Based LRU for Efficient/Reliable Cache ManagementYounghun Ko, Hyunseung Choo, Jaehyoun Kim. 220-223
- Dynamic Cache Partition Strategy for Reliable Buffer Cache ManagementJaesun Jin, Hyunseung Choo, Jaehyoun Kim. 224-228
- Reliable Ontology Enhanced Medical Information RetrievalInjoo Jeong, Louis Green, Yeong Kwun Kim, Martha W. Evens. 229-232
- Artificial Neural Network-Based Human Target Detection Using Noninvasive Penetrating Radar DataJohn M. Weiss, Chad Hartsel, Bernt Askildsen, Scott Thompson. 233-236
- Application of Process Control for Improving Performance of FMS Systems Using X-Tree Multibus Advanced Parallel Computer SystemsHamid R. Abachi, Mali Abdollahian, Narayan C. Debnath. 237-240
- History Abstractions of a Sequential Memory ComponentWalter Dosch, Annette Stümpel. 241-247
- An FPGA-Based Area Efficient Tri-port Registerfile Design for RISC-Style Processor ImplementationsDavid Jeff Jackson, William A. Stapleton, Kenneth G. Ricks, David Minor. 248-251
- The Instruction Execution Mechanism for Responsive Multithreaded ProcessorTstomu Itou, Nobuyuki Yamasaki. 252-255
- Optically Interconnected Intelligent RAM Multiprocessor: Gigascale Opto-IRAMChung-Seok (Andy) Seo, Abhijit Chatterjee, Timothy J. Drabik. 256-260
- SPA: A Scalable Per-Address Branch PredictorAngkul Kongmunvattana, Ekkasit Tiamkaew. 261-265
- An Intelligent Automated Surveillance System for Parked VehiclesJosh Hight, Chenyi Hu. 266-269
- Functionally Distributed Control Architecture for Robot SystemsTetsuya Taira, Nobuyuki Yamasaki. 270-273
- Capacity Analysis of Scheduled Video Delivery ServiceWei Shu, Min-You Wu. 274-277
- Efficient Ranking of Keyword Queries Using P-treesFei Pan, Imad Rahal, Yue Cui, William Perrizo. 278-281
- Component Specification to test Component-based SoftwareSupaporn Kansomkeat, Wanchai Rivepiboon. 282-285
- Data Sharing over the Internet and Web under ADO.NETDavid Zhang, Gongzhu Hu. 286-289
- Multi-dimensional Nearest Neighbor Search with Non-Uniform Data SetsYongsong Shi, Wen-Chi Hou, Chih-Fang Wang. 290-293
- Object-Oriented Implementation of a Rule-Based System for XML Query OptimizerDunren Che. 294-297
- Performance Analysis of Two-Phase Locking: Data Contention vs. Resource ContentionYu Wang, Wen-Chi Hou, Chih-Fang Wang, Dunren Che. 298-301
- Garbage Collection Schemes for Shared Memory MultiprocessorsKhayri A. M. Ali, Fatma A. Omara, Osama A. Elshakankiry. 302-307
- Locating Services for Intelligent Mobile AgentsLei Song, Xining Li. 308-312
- Nearly Dynamic Task Model Scheduling with Aperiodic TasksHaesun K. Lee, Ilhyun Lee. 313-316
- Design Automation Method for Software Development in Complex Embedded SystemsYing Qiao, Luqi, Lynn Zhang. 317-320
- A Distributed Multiagent Architecture Representing a Virtual MarketplaceSherif A. Elfayoumy, Stanley Jefson, Sanjay P. Ahuja. 321-324
- Comparative Evaluation of Fair-Share CPU Scheduling Algorithms Under Multiprogrammed WorkloadsAngkul Kongmunvattana, Clifton A. Frazier. 325-329
- Mechanism Design for Proxy Placement on Overlay NetworksMin-You Wu, Wei Shu. 330-333
- A UML-Based Approach for Testing Web ApplicationsManish Nilawar, Sergiu M. Dascalu. 334-339
- ImageSpace: an Image Ontology Creation and Annotation Tool for the Semantic WebRong Huang, Shiyong Lu, Farshad Fotouhi. 340-343
- A Dynamic Intermobile Host Bridging ProtocolElsa Valeroso Poh, Jody Grassel. 344-347
- Optimal Trees for the Parametric Fixed Charge Shortest Paths ProblemFred J. Rispoli, Steven Cosares. 348-351
- An Efficient Multicast Routing Scheme For Cellular NetworksY. Cao, Namdar Mogharreban, Ziping Liu, Bidyut Gupta. 352-357
- Location Discovery in Ad Hoc Sensor NetworksSeungjin Park, Anshu Bhatia. 358-361
- An Efficient Dynamic Clustering Protocol for MANETV. Doraiswamy, R. Jandhyala, B. Gupta. 362-367
- An Object-Oriented Approach to Support Faster Retrieve and Manipulation of Spatial DataMd. Saidul Hossain, M. Alamgir. 368-373
- Cachecast Networks and its Proxy PlacementMin-You Wu, Yan Zhu, Wei Shu. 374-377
- Assessment of Compression Effects on Digital Microscopic Images of Tumor SamplesYuShan Li, Yuriy Gusev, Zoltan Laszik, Son Do, Daniel Brackett, Yongshen Ni, John Y. Cheung. 378-381
- A Real-Time Ad Hoc Packet Matching Technique for Hardware-Based Network Intrusion Detection SystemsWei-Ming Lin, Ramu Madhavaram, Parimal Patel, Fred Hudson. 382