Abstract is missing.
- Survey of Security Requirements, Attacks and Network Integration in Wireless Mesh NetworksHassen Redwan, Ki-Hyung Kim. 3-9 [doi]
- Privacy-Preserving Practical Convex Hulls ProtocolYouwen Zhu, Liusheng Huang, Wei Yang, Zhili Chen, Lingjun Li, Zhenshan Yu, Yonglong Luo. 10-16 [doi]
- A Practical Three-Dimensional Privacy-Preserving Approximate Convex Hulls ProtocolDong Li, Liusheng Huang, Wei Yang, Youwen Zhu, Yonglong Luo, Zhili Chen, Lingjun Li, Yun Ye. 17-23 [doi]
- Dynamic Spectrum Allocation MAC Protocol Based on Cognitive Radio for QoS SupportInwhee Joe, Seonbong Son. 24-29 [doi]
- An Energy Efficient Weight-Clustering Algorithm in Wireless Sensor NetworksLu Cheng, Depei Qian, Weiguo Wu. 30-35 [doi]
- Tracking and Repairing Damaged Databases Using Before Image TableMeiyi Xie, Hong Zhu, Yucai Feng, Guanrong Hu. 36-41 [doi]
- Access Graph Based Risk Assessment Model for Network Information SystemXiaochun Xiao, Huan Wang, Gendu Zhang. 42-48 [doi]
- A Distributed Workflow Management System Model and Its Scheduling AlgorithmChangsong Ding, Zhoujun Hu, Zhigang Hu, Xi Li. 51-58 [doi]
- Evolutionary Testing of Unstructured Programs Using a Testability Transformation ApproachSheng Jiang, Yansheng Lu. 59-66 [doi]
- MP-Templates Operating Toolkit in Movie-Based ProgrammingDmitry A. Vazhenin, Alexander Vazhenin. 67-74 [doi]
- Design of General User Interface for Automatic Web Service CompositionHaruhiko Takada, Incheon Paik. 75-78 [doi]
- Spatial Data Compression Techniques for GMLYuzhen Li, Takashi Imaizumi, S. Sakata, H. Sekiya, Jihong Guan. 79-84 [doi]
- An Energy Efficient, Low Cost, Hybrid Storage System Based on UtilityLingfang Zeng, Dan Feng, Bharadwaj Veeravalli, Qingsong Wei. 87-95 [doi]
- TSPSCDP: A Time-Stamp Continuous Data Protection Approach Based on Pipeline StrategyJingning Liu, Tianming Yang, Zuoheng Li, Ke Zhou. 96-102 [doi]
- Study and Optimize the Process of Batch Small Files ReplicationLiang Xiao, Qiang Cao, Changsheng Xie, Chuanwen Wu. 103-111 [doi]
- A Duplicate-Aware Data ReplicationJianfeng Zhu, Leihua Qin, Dong Zeng, Jinli Zhou. 112-117 [doi]
- A Novel Hybrid system for Large-Scale Chinese Text Classification ProblemZhong Gao, Guanming Lu, Daquan Gu. 121-124 [doi]
- An Approach to Implementing an Intelligent Web SearchVitaly Klyuev. 125-130 [doi]
- A Schema Matching Method Based on Partial Functional DependenciesGuo-hui Li, Xiao-Kun Du, Fang-Xiao Hu, Jian-qiang Du. 131-138 [doi]
- The Axiomatic Semantics of PDFDXiaolei Gao, Huaikou Miao. 139-146 [doi]
- XenLR: Xen-based Logging for Deterministic ReplayHaikun Liu, Hai Jin, Xiaofei Liao, Zhengqiu Pan. 149-154 [doi]
- VNIX: Managing Virtual Machines on ClustersXuanhua Shi, Haoyu Tan, Song Wu, Hai Jin. 155-162 [doi]
- Hand Tracking by Particle Filtering with Elite Particles Mean ShiftShengtong Zhong, Fei Hao. 163-167 [doi]
- A New Technique of Modeling Acoustic Echo and its Implementation Using FPGAAmin Mohamed Nassar, Ashraf Mohamed Ali. 168-180 [doi]
- Towards Better Content Visibility in Video Recommender SystemsNalin Chakoo, Rahul Gupta, Jayaprada Hiremath. 181-185 [doi]
- Optimizing Two-Dimensional Continuous Dynamic Programming for Cell Broadband Engine ProcessorsTakahiro Machino, Shin-ya Iwazaki, Yuichi Okuyama, Junji Kitamichi, Kenichi Kuroda, Ryuichi Oka. 186-193 [doi]
- Economical Solution for an Easy to Use Interactive WhiteboardZhixun Wang, James Louey. 197-203 [doi]
- A Segment Extraction Algorithm Based on Polygonal Approximation for On-Line Chinese Character RecognitionXinqiao Lu, Xiaojuan Liu, Guoqiang Xiao, Enmin Song, Ping Li, Qiaoling Luo. 204-207 [doi]
- An Invariant Pattern Recognition System Using the Bayesian Inference on Hierarchical Sequences with Pre-processingZunyi Tang, Wenlong Liu, Shuxue Ding. 208-213 [doi]
- Head Pose Recognition with NNC-TreesJie Ji, Kei Sato, Naoki Tominaga, Qiangfu Zhao. 214-219 [doi]
- Inducing NNTrees Suitable for Hardware ImplementationHirotomo Hayashi, Qiangfu Zhao. 220-225 [doi]