Abstract is missing.
- Performance Enhancement of Web Server SystemSarah Tasneem, Reda A. Ammar, Lester Lipsky, Howard Sholl. 1-6
- Network End-to-End Link Performance Analysis using Internet2 Diagnostic TesterSanjoy Chowdhury, Jiang B. Liu. 7-12
- Comparing Strategies for Evaluating Older Adults to Improve Web AccessibilityAlfred Taylor Sr., Les Miller, Sree Nilakanta. 13-18
- Hybrid Vector Filtering for Noise Detection and Removal in Color ImagesDung Dang, Wenbin Luo. 19-25
- Contactless Palmprint Recognition Using Gabor FilterA. Poinsot, F. Yang, M. Paindavoine. 25-30
- Performance Study for Instantaneous Blind Audio Source Separation AlgorithmsAmr E. Mahmoud, Medhat Hussien, Mohamed I. Eladawy, Reda A. Ammar. 31-37
- Practical Methods for Preventing Data Anomalies in High Level Normal FormsTennyson X. Chen, Martin D. Meyer, Ganapathi Nanthini. 38-43
- Augmenting Historical Research with Databases: A Case Study of 16th Century Elizabethan MilitaryMichael Bauer, William Acres. 44-50
- Enhancing SQL with Set-Comparison OperatorsJing Zhang, Wen-Chi Hou, Feng Yu, Dunren Che. 51-56
- Single Event Upset Detection and Correction in Virtex-4 and Virtex-5 FPGAsBradley F. Dutton, Charles E. Stroud. 57-62
- Built-in Self-Test for Memory Resources in Virtex-4 Field Programmable Gate ArraysBrooks R. Garrison, Daniel T. Milton, Charles E. Stroud. 63-68
- A Neighborhood Dependent Approach (NDA) for a Power-Aware Design of a Real-Time Video Enhancement SystemHau T. Ngo, Robert J. Voigt, Vijayan K. Asari. 69-74
- A New Efficient Low Cost Pseudo-LRU Cache Line Replacement AlgorithmD. Gille. 75-80
- A Novel Floorplanning for Hierarchical VLSI DesignChia-Pin R. Liu. 81-86
- An Accelerated Iterative Convergence Scheme for Papoulis-Gerchberg AlgorithmTsung-Ming Lo, Kuang-Shyr Wu. 87-91
- Loop Fusion Technique with Minimal Memory Cost via RetimingMeilin Liu, Edwin Hsing-Mean Sha, Chun Xue, Meikang Qiu. 92-98
- Reliable Agent Based Monitoring SystemAdina Morariu, Silviu Folea, Honoriu Valean. 99-104
- Dynamic Cost Minimization of Multi-Class Jobs in Computational GridsSatish Penmatsa, Venkata P. Mantena. 105-110
- Comparison of Strategies for Serving Two Streams of JobsFeng Zhang, Lester Lipsky, Sarah Tasneem, Steve Thompson. 111-116
- YASIC: Yet-Another Software Integrity Checker for Security-Critical Wireless Sensor NetworksSangho Yi, Jaeheung Lee, Hong Min, Yookun Cho, Jiman Hong. 117-121
- Deployment Strategy Effect on Maximizing the Lifetime of Wireless Sensor NetworksSaleh H. Al-Sharaeh, Ahmed A. Sharieh, Rana K. AbuElayyan. 122-127
- Rural Wireless Mesh Networks in Africa: An Experimental StudyJonathan D. Backens, Min Song, Lutz Engels. 128-133
- IP Payload Compression for Higher ThroughputBikrant Neupane, George H. Hamer. 134-138
- An Information Theoretic Model for Protocol Graph Based Anomaly AnalysisGuangzhi Qu. 139-144
- End-to-End QoS-based Admission Control and APNs Interaction Framework with NegotiationR. Singh, N. Kumar, Verma S.. 145-150
- Control and Audit of Information Systems in Small and Medium EnterprisesV. Uma, D. Illangovan. 151-155
- Intrusion Detection System for SCADA NetworksAleksey Ashikhmin, James Graham, Ahmed Desoky, Benjamin Arazi. 156-161
- Towards Reconfigurable Hardware for Cryptographic BenchmarkingRobert S. Fourney, Michael S. VanBemmel. 162-167
- Usability of the Pen Input Device on a Menu with Force FieldsClay R. Smith, Narayan C. Debnath. 168-173
- Design of Lab Assistant Module for UTPB-CLTSCheri Whalen, Ilhyun Lee, Haesun Lee. 174-178
- Comparison of Touchpad Force Field Results: A Current ExperimentClay Smith, Narayan C. Debnath. 179-184
- Simple Quality Evaluation Framework of E-Government ServicesBaisakhi Chakraborty, Ranjan Kumar Maji, Narayan C. Debnath. 185-190
- A Novel Bandwidth-Efficient Multicasting Protocol for Wide Area NetworksB. Gupta, S. R. Sivada, S. Rahimi, S. T. Adusumalli. 191-197
- A Novel Recovery Approach for Distributed SystemsB. Gupta, D. Che, S. Rahimi. 198-203
- A New QoS Routing Protocol for Mobile Ad-Hoc NetworkR. Nikolaev, B. Gupta. 204-208
- Super-Recursive Algorithms in Testing Distributed SystemsM. Burgin, Narayan C. Debnath. 209-214
- Word Classification: An Experimental Approach with Naïve BayesWei Ding, Hisham Al-Mubaid, Srikanth Kotagiri. 215-221
- A Tree-Based Classification of High and Low Error-Severity Modules Using the CK MetricsRaed A. Shatnawi. 222-226
- Nearest Shrunken Centroid as Feature Selection of Microarray DataMyungsook Klassen, Nyunsu Kim. 227-232
- Multiple Branch Prediction with PerceptronsJongbok Lee. 233-238
- A Three State Fast Vector Quantization Algorithm Based on Code Vector Activity DetectionMohammed M. Elhenawy, Mohsen M. Tantawy. 239-244
- Developing a Performance Evaluation Tool for Distributed Problem-Solving StrategiesNorman Carver, Elham Sahebkar Khorasani, Shahram Rahimi. 245-251
- Learning and Representing Causal Relationships with Bayesian NetworksCarlos Perez, Eman El-Sheikh. 252-257
- A Performance Study of Connection-Oriented Time WarpAli S. Al-Humaimidi, Hussam M. Soliman Ramadan. 258-263
- Measuring Software Evolution with Changing Lines of CodeNikolaus Baer, Robert Zeidman. 264-170
- Impact of Computing on the World Economy: A Position PaperFrederick Harris, Gordon Lee, Stuart Rubin, T. C. Ting, Billy Gaston, Gongzhu Hu. 271-277
- File System Call Accounting: Measuring Different WorkloadsRandy R. Appleton. 278-283