Abstract is missing.
- Website quality in the Australian Electronic Marketspace: Application of the Webqual InstrumentSukunesan Sinnappan, Jamie Carlson, Punidha Banu Sukunesan. 1-7
- Building Wireless Access to Rural Areas of NepalBinod Vaidya. 19-26
- Predicting the Internet Use with Attitudes, Self-efficacy and Behavioral Intentions: An Empirical Study in Brunei DarussalamAfzaal H. Seyal, Mohd. Noah Abd. Rahman. 32-40
- Community Informatics Systems: A Construct for Addressing the Digital DivideWal Taylor, Stewart Marshall. 41-47
- Career Incentives in the IS WorkplaceRodney Turner. 48-52
- Generalized Regression Neural Network Predictors for Lossless EEG Signal CompressionNatarajan Sriraam, C. Eswaran. 53-55
- Intelligent Agents-mediated Approach for Experimental Knowledge of Healthcare Enterprise through CBR-adaptation TechniqueZafar Iqbal Hashmi, Yu-N Cheah, Syed Zahid Hassan, Syed Sibte Raza Abidi. 56-60
- Data Classification with an Improved Weightless Neural NetworkWeng-Kin Lai, George Coghill. 61-65
- Phoneasy: A Software Agent for Mobile Phone Company in MalaysiaNorazlina Khamis, Koh Wai Wah. 66-69
- Towards Solving Time Gap Problems through the Optimization of Packet Capture TechniqueMohd Nizam Omar, Mohd Aizaini Maarof, Subariah Ibrahim. 76-81
- Realization of Generalized RBF NetworkLee Nung Kion, Wang Dian Hui. 82-88
- Comparing Frequency-based and Linguistic Structure-based methods for Selecting Malay Stop WordsNoor Aida Abdullah. 89-92
- An Agent-based Design Pattern for Decoupling Views of E-business SystemFaiz Moh d Alshrouf, Aman Jantan. 93-100
- Internet Mediated, Multi Layer Medical Terminologies Retriever: Towards We-based UMLS Thesauri and Semantic Search EngineSelvakumar Manickam, Leong Wan Sun, Tan Poh Suan. 106-111
- Sharing, Evaluating and Organizing E-mail: The KM-mail ApproachKee Guan Lim, Yu-N Cheah. 112-117
- New Knowledge through the Power of DesignKhairul Aidil Azlin Abd. Rahman, Kazuo Sugiyama, Makoto Watanabe. 118-124
- MAS-based Knowledge Management Framework for HomeHailing Wang, Ruwei Dai. 125-130
- Multi Level and Multi Language Database Coding System for Data Normalization of Veterinary DatabasesMohd Termizi Ghazali, Achmad Rully, Yoshiyori Urano. 131-139
- 3D Visualisation DatabasesNurul Fazmidar Mohd. Noor, S. Mohd Arif. 140-148
- From COBOL to SQL through Program Transformation and XMLFarid Meziane, Jamilia Aliwa. 149-155
- Rotation Invariance in Color-spatial Based Image RetrievalWang Hui Hui, Narayanan Kulathuramaiyer. 156-161
- Shape Feature Representation for Content Based Image RetrievalChiew Kang Leng, Wang Yin Chai. 162-167
- Building Effective Online Learning Applications for Digital Visual Effects SubjectMohamad Izani Zainal Abidin, Aishah Abdul Razak, Juhanita Jiman. 173-180
- Augmented Reality Application in Tutoring System for ReadingWan Nurhayati Wan Ab. Rahman, Tim Ritchings. 194-198
- Assessing Social Presence in Tertiary Computer ConferencingKian-Sam Hong. 199-202
- Blended Learning Environment: Student Viewpoint Toward Interactivity with the Offshore Lecturer and Their PeerKimberly Lam, Penney McFarlane, Anne Fuller. 203-209
- Speech Processing Technology in Interactive English Language Tutorial: A Formal EvaluationSarina Sulaiman, Ismail bin Haji Abdullah. 210-218
- Knowledge-based Augmented Reality Training and Learning Environment (KARTLE) for Computer Accessory Maintenance AssistanceGiap Weng Ng, Tim Ritchings. 219-224
- Classroom Teaching and Learning: The Need for Flexibility and Collaboration in Multimedia CreationJamiran Bin Salam, Achmad Rully, Yoshiyori Urano. 225-229
- Student Modeling of Web Based Intelligent Tutoring SystemPutra Sumari, Muhammad Rafie Mohd. Arshad, Zurida Ishak. 230-233
- Enforcing Multilevel Security Policies for Network FirewallCahyo Crysdian, Abdul Hanan Abdullah, Mohd Aizaini Maarof. 244-246
- Secret Keys Multiplication for Scalable Group Re-KeyingYaser Mohamed, Atsushi Kara. 247-251
- Object-relational Mapping Service ArchitectureTong-Ming Lim, Sai Peck Lee. 252-255
- Attack on Intrusion Detection System Host: Simulation and AnalysisAliza Yusny Daud, Mohd Aizaini Maarof, Norliza Katuk, Anazida Zainal. 256-260
- Design Metrics and the Adaptation of Web-page content Chunks for PDAsS. D. Scott, Y. H. Koh. 261-268
- Secure Groups Communication Using Mobile Agents TechnologiesMuhammad Aiman Mazlan, Azman Samsudin, Rahmat Budiarto. 269-274
- Attacks on ATM Authentication Protocols Proposed at WEC2002Raphael Chung-Wei Phan. 275-277
- Towards Generic Zero Knowledge Protocal for Blind Watermark DetectionHang Hui Patrick Then, Wang Yin Chai. 278-282