Abstract is missing.
- Bridging Calculus and Statistics: Null - Hypotheses Underlain by Functional EquationsAlexander Vaninsky. 1-5 [doi]
- Application of Indirect Field Oriented Control with Optimum Flux for Induction Machines DrivesS. Grouni, R. Ibtiouen, M. Kidouche, O. Touhami. 7-12 [doi]
- Urban Cluster Layout Based on Voronoi DiagramXinqi Zheng, Shuqing Wang, Meichen Fu, Lu Zhao, Shujia Yang. 13-18 [doi]
- A Reconfigurable Design and Architecture of the Ethernet and HomePNA3.0 MACM. Khalily Dermany, M. Hossein Ghadiry. 19-23 [doi]
- Automatic Translation of a Process Level Petri-Net to a Ladder DiagramYuval Cohen, Ming-En Wang, Bopaya Bidanda. 25-29 [doi]
- Software Quality PerceptionRadoslaw Hofman. 31-37 [doi]
- An Offline Fuzzy Based Approach for Iris Recognition with Enhanced Feature DetectionS. R. Kodituwakku, M. I. M. Fazeen. 39-44 [doi]
- A Logic for Qualified SyllogismsDaniel G. Schwartz. 45-50 [doi]
- Improved Induction Tree Training for Automatic Lexical CategorizationM. Daniela López De Luise, M. Soffer, F. Spelanzon. 51-53 [doi]
- Comparisons and Analysis of DCT-based Image Watermarking AlgorithmsIhab Amer, Pierre Hishmat, Wael M. Badawy, Graham A. Jullien. 55-58 [doi]
- A Tool for Robustness Evaluation of Image Watermarking AlgorithmsIhab Amer, Tarek Sheha, Wael M. Badawy, Graham A. Jullien. 59-63 [doi]
- Implementation of Efficient seamless non-broadcast Routing algorithm for Wireless Mesh NetworkGhassan Kbar, Wathiq Mansoor. 65-71 [doi]
- Investigations into Implementation of an Iterative Feedback Tuning Algorithm into MicrocontrollerGrayson Himunzowa. 73-78 [doi]
- Comparative Study of Distance Functions for Nearest NeighborsJanett Walters-Williams, Yan Li. 79-84 [doi]
- Is Manual Data Collection Hampered by the Presence of Inner Classes or Class Size?Steve Counsell, George Loizou, Rajaa Najjar. 91-97 [doi]
- An Empirical Study of Removed Classes in Java Open-Source SystemsAsma Mubarak, Steve Counsell, Robert M. Hierons. 99-104 [doi]
- Aspect Modification of an EAR Application :::a:::Ilona Bluemke, Konrad Billewicz. 105-110 [doi]
- A Model of Organizational Politics Impact on Information Systems SuccessIsmail M. Romi, Ibrahim A. Awad, Manal Elkordy. 111-115 [doi]
- An Efficient Randomized Algorithm for Real-Time Process Scheduling in PicOS Operating SystemTarek Helmy, Anifowose Fatai, El-Sayed Sallam. 117-122 [doi]
- Managing in the Virtual World: How Second Life is Rewriting the Rules of "Real Life" BusinessDavid C. Wyld. 123-128 [doi]
- Unified Multimodal Search Framework for Multimedia Information RetrievalUmer Rashid, Iftikhar Azim Niaz, Muhammad Afzal Bhatti. 129-136 [doi]
- Informational analysis involving application of complex information systemClébia Ciupak, Adolfo Alberto Vanti, Antonio José Balloni, Rafael Espin. 137-141 [doi]
- Creation of a 3D Robot Model and its Integration to a Microsoft Robotics Studio SimulationM. Alejandra Menéndez O., D. Sosa G., Miguel Arias-Estrada, A. Espinosa M., J. E. Lara R.. 143-146 [doi]
- A Proposed Framework for Collaborative Design in a Virtual EnvironmentJason S. Breland, Mohd Fairuz Shiratuddin. 147-152 [doi]
- System Development by Process Integrated Knowledge ManagementMargareth Stoll, Dietmar Laner. 153-158 [doi]
- An Application of Lunar GIS with Visualized and Auditory Japan's Lunar Explorer "Kaguya" DataShin-ichi Sobue, Hiroshi Araki, Seiichi Tazawa, Hirotomo Noda, Izumi Kamiya, Aya Yamamoto, Takeo Fujita, Ichiro Higashiizumi, Hayato Okumura. 159-163 [doi]
- Platform Independent Unit Tests GeneratorSarunas Packevicius, Andrej Usaniov, Eduardas Bareisa. 177-179 [doi]
- Fuzzy Document Clustering Approach using WordNet Lexical CategoriesTarek F. Gharib, Mohammed M. Fouad, Mostafa M. Aref. 181-186 [doi]
- The Study on the Penalty Function of the Insurance Company When the Stock Price Follows Exponential Lévy ProcessZhao Wu, Wang Ding-cheng, Zeng Yong. 187-190 [doi]
- Studies on SEE Characteristic and Hardening Techniques of CMOS SRAM with Sub-micro Feature SizesXing-hua He, Cong Zhang, Yong-Liang Zhang, Huan zhang Lu. 191-196 [doi]
- Automating The Work at The Skin and Allergy Private Clinic : A Case Study on Using an Imaging Database to Manage Patients RecordsMohammad AbdulRahman AlGhalayini. 197-208 [doi]
- Automating The Work at KSU Scientific Council : A Case Study on Using an Imaging Database to Manage the Weekly Scientific Council MeetingsMohammad AbdulRahman AlGhalayini. 209-215 [doi]
- Automating The Work at KSU Rector's Office : A Case Study on Using an Imaging Database System to Manage and Follow-up Incoming / Outgoing DocumentsMohammad AbdulRahman AlGhalayini. 217-222 [doi]
- Using Clinical Decision Support Software in Health Insurance CompanyR. Konovalov, Deniss Kumlander. 223-226 [doi]
- A new Artificial Vision Method for Bad Atmospheric ConditionsM. Curila, S. Curila, O. Novac, Mihaela Novac. 227-231 [doi]
- Study and Analysis of the Internet Protocol Security and Its Impact on Interactive CommunicationsArshi Khan, Seema Ansari. 239-243 [doi]
- Investigating Software Requirements Through Developed Questionnaires To Satisfy The Desired Quality Systems (Security Attribute Example)Sherif M. Tawfik, Marwa M. Abd-Elghany. 245-250 [doi]
- Learning Java with Sun SPOTsCraig Caulfield, Stanislaw Paul Maj, David Veal. 251-256 [doi]
- Semi- and Fully Self-Organised TeamsDeniss Kumlander. 257-261 [doi]
- Stochastic Network Planning MethodZsolt Tibor Kosztyán, Judit Kiss. 263-268 [doi]
- Web-based Service Portal in HealthcarePetr Silhavy, Radek Silhavy, Zdenka Prokopova. 269-272 [doi]
- Decomposition of Head-Related Transfer Functions into Multiple Damped and Delayed SinusoidalsKenneth John Faller, Armando Barreto, Malek Adjouadi. 273-278 [doi]
- Voiced/Unvoiced Decision for Speech Signals Based on Zero-Crossing Rate and EnergyRajesh Bachu, S. Kopparthi, B. Adapa, Buket D. Barkana. 279-282 [doi]
- A Survey of Using Model-Based Testing to Improve Quality Attributes in Distributed SystemsAhmad A. Saifan, Jürgen Dingel. 283-288 [doi]
- Contributions in Mineral Floatation Modeling and SimulationBrana Liliana Samoila, M. D. Marcu. 289-294 [doi]
- Selecting the Optimal Recovery Path in Backup SystemsV. G. Kazakov, S. A. Fedosin. 295-299 [doi]
- Telemedicine Platform Enhanced visiophony solution to operate a Robot-CompanionThierry Simonnet, A. Couet, P. Ezvan, O. Givernaud, Paul Hillereau. 301-305 [doi]
- Some Practical Payments Clearance AlgorithmsDeniss Kumlander. 307-312 [doi]
- Using LSI and its variants in Text ClassificationShalini Batra, Seema Bawa. 313-316 [doi]
- On Optimization of Coefficient-Sensitivity and State-Structure for Two Dimensional (2-D) Digital SystemsGuoliang Zeng. 317-322 [doi]
- Encapsulating connections on SoC designs using ASM++ chartsSantiago De Pablo, Luis Carlos Herrero, Fernando Martínez, Alexis B. Rey. 323-328 [doi]
- Performance Effects of Concurrent Virtual Machine Execution in VMware Workstation 6Richard J. Barnett, Barry Irwin. 329-333 [doi]
- Towards Enterprise Integration Performance Assessment based on Category TheoryVictoria Mikhnovsky, Olga Ormandjieva. 335-340 [doi]
- Health Information Systems Implementation: Review of change management issuesPaulo Teixeira. 347-350 [doi]
- Cache Memory Energy Exploitation in VLIW ArchitecturesNagm Mohamed, Nazeih Botros, Mohamad Alweh. 351-355 [doi]
- A Comparison of LBG and ADPCM Speech Compression TechniquesRajesh Bachu, Jignasa Patel, Buket D. Barkana. 357-360 [doi]
- LCM: A new approach to parse XML documents through loose coupling between XML document design and the corresponding application codeVaddadi P. Chandu. 361-366 [doi]
- A Framework to Analyze Software Analysis TechniquesJoseph Catanio. 367-372 [doi]
- Economic Path Scheduling for Mobile Agent System on Computer NetworkEmmanuel A. Olajubu. 373-377 [doi]
- A Database-Based and Web-Based Meta-CASE SystemErki Eessaar, Rünno Sgirka. 379-384 [doi]
- On Dijkstra's Algorithm for Deadlock DetectionYouming Li, Ardian N. Greca, James Harris. 385-387 [doi]
- Analysis of Ten Reverse Engineering ToolsJussi Koskinen, Tero Lehmonen. 389-394 [doi]
- The GeneSEZ approach to model-driven software developmentTobias Haubold, Georg Beier, Wolfgang Golubski, Nico Herbig. 395-400 [doi]
- JADE: A Graphical Tool for Fast Development of Imaging ApplicationsAlberto Chávez-Aragón, Leticia Flores-Pulido, Edgar Alfredo Portilla-Flores, Oleg Starostenko, G. Rodríguez-Gómez. 401-406 [doi]
- A View on Power Efficiency of Multimedia Mobile ApplicationsMarius Marcu, Dacian Tudor, Sebastian Fuicu. 407-412 [doi]
- Trinary Encoder, Decoder, Multiplexer and Demultiplexer Using Savart Plate and Spatial Light ModulatorAmal K. Ghosh, Souradip Singha Roy, Sudipta Mandal, Amitabha Basuray. 413-418 [doi]
- A Case Study on Using A Knowledge Management Portal For Academic Departments ChairmenMohammad A. AlHarthi, Mohammad A. ALGhalayini. 425-430 [doi]
- Configurable Signal Generator Implemented on Tricore MicrocontrollersM. Popa, I. Silea, M. Banea. 431-436 [doi]
- Mathematic Model of Digital Control System with PID Regulator and Regular Step of Quantization with Information Transfer via the Channel of Plural AccessG. V. Abramov, A. E. Emelyanov, A. L. Ivashin. 437-442 [doi]
- Autonomic Printing Infrastructure for the EnterpriseRiddhiman Ghosh, Andre Rodrigues, Keith Moore, Ricardo Pianta, Mohamed Dekhil. 443-447 [doi]
- Investigating the Effects of Trees and Butterfly Barriers on the Performance of Optimistic GVT AlgorithmAbdelrahman Elleithy, Syed Sajjad Rizvi, Khaled M. Elleithy. 449-453 [doi]
- Implementation of Tree and Butterfly Barriers with Optimistic Time Management Algorithms for Discrete Event SimulationSyed Sajjad Rizvi, Dipali Shah, Aasia Riasat. 455-460 [doi]
- Improving Performance in Constructing specific Web Directory using Focused Crawler: An Experiment on Botany DomainMadjid Khalilian, Farsad Zamani Boroujeni, Norwati Mustapha. 461-466 [doi]
- "Security Theater" in the Pediatric Wing: The Case for RFID Protection for Infants in HospitalsDavid C. Wyld. 467-470 [doi]
- Creating a Bootable CD with Custom Boot Options that contains Multiple DistributionsJames D. Feher, Kumud Bhandari, Benjamin York. 471-475 [doi]
- Architecture of COOPTO Remote Voting SolutionRadek Silhavy, Petr Silhavy, Zdenka Prokopova. 477-479 [doi]
- A Framework for Developing Applications Based on SOA in Mobile Environment with Security ServicesJohnneth de Sene Fonseca, Zair Abdelouahab. 481-486 [doi]
- Towards a New Paradigm of Software Development: an Ambassador Driven Process in Distributed Software CompaniesDeniss Kumlander. 487-490 [doi]
- An Equivalence Theorem for the Specification of Asynchronous Communication Systems (SACS) and Asynchronous Message Passing System (AMPS)A. V. S. Rajan, A. S. Bavan, Geetha Abeysinghe. 491-496 [doi]
- A Framework for Decision Support Systems Based on Zachman FrameworkS. Shervin Ostadzadeh, Jafar Habibi, S. Arash Ostadzadeh. 497-502 [doi]
- In - line determination of heat transfer coefficients in a plate heat exchangerS. Silva Sotelo, R. J. Romero Domínguez. 503-507 [doi]
- Model Based Control Design Using SLPS Simulink PSpice Interface Saeid Moslehpour, Ercan K. Kulcu, Hisham Alnajjar. 509-516 [doi]
- Design of RISC Processor Using VHDL and CadenceSaeid Moslehpour, Chandrasekhar Puliroju, Akram Abu-aisheh. 517-525 [doi]
- The Impact of Building Information Modeling on the Architectural Design ProcessP. F. Moreira, Neander F. Silva, Ecilamar M. Lima. 527-531 [doi]
- An OpenGL-based Interface to 3D PowerPoint-like Presentations of OpenGL ProjectsSerguei A. Mokhov, Miao Song. 533-538 [doi]
- Aspects Regarding the Implementation of Hsiao Code to the Cache Level of a Memory Hierarchy with Fpga Xilinx CircuitsO. Novac, St. Vari-Kakas, F. I. Hathazi, M. Curila, S. Curila. 539-543 [doi]
- Distributed Environment Integrating Tools for Software TestingAnna Derezinska, Krzysztof Sarba. 545-550 [doi]
- Epistemic Analysis of Interrogative Domains using CuboidsCameron Hughes, Tracey Hughes. 551-555 [doi]
- Dynamical Adaptation in Terrorist Cells/NetworksDil Muhammad Akbar Hussain, Zaki Ahmed. 557-562 [doi]
- Three-dimensional Computer Modeling and Architectural Design Process - A Comparison StudyMiguel C. Ramirez, Neander F. Silva, Ecilamar M. Lima. 563-568 [doi]
- Using Decision Structures for Policy Analysis in Software Product-line Evolution - A Case StudyNita Sarang, Mukund A. Sanglikar. 569-574 [doi]
- Fusion of Multimedia Document Intra-Modality Relevancies using Linear Combination ModelUmer Rashid, Iftikhar Azim Niaz, Muhammad Afzal Bhatti. 575-580 [doi]
- An Interval-based Method for Text ClusteringHanh Pham. 581-587 [doi]
- A GVT Based Algorithm for Butterfly Barrier in Parallel and Distributed SystemsSyed Sajjad Rizvi, Shalini Potham, Khaled M. Elleithy. 589-593 [doi]