Abstract is missing.
- Plenary Panel Session A: Grand Challenges in Distributed Computing SystemsStephen S. Yau. 3 [doi]
- Energy Efficient Detections of Critical Events in Wireless Sensor NetworksYunhuai Liu, Yanmin Zhu, Lionel M. Ni. 4-10 [doi]
- Design and Evaluation of a Dynamic Continuous Media Streaming Supporting Method on the Basis of Logical Grid Hierarchy for MANETsIhn-Han Bae, Kyung-Sook Lee. 11-15 [doi]
- An Adaptive Polling Scheme Supporting Audio/Video Streaming in Wireless LANsYaw-Chung Chen, Han-Ru Yeh. 16-22 [doi]
- Towards Role-Based Authorization for OSGi Service EnvironmentsGail-Joon Ahn, Hongxin Hu, Jing Jin. 23-29 [doi]
- Performance Analysis of Service Composition Using Ordinary Differential EquationsZuohua Ding, Lujuan Xiao, Jueliang Hu. 30-36 [doi]
- The BCD View Model: Business Analysis View, Service Composition View and Service Design View for Service Oriented Software Design and DevelopmentJoonseok Park, Mikyeong Moon, Keunhyuk Yeom. 37-43 [doi]
- Event-Based Data Dissemination on Inter-Administrative Domains: Is it Viable?Roberto Baldoni, Leonardo Querzoni, Sirio Scipioni. 44-50 [doi]
- Human-Intention Driven Self Adaptive Software Evolvability in Distributed Service EnvironmentsHua Ming, Katsunori Oyama, Carl K. Chang. 51-57 [doi]
- Why MoodleAjlan Al-Ajlan, Hussein Zedan. 58-64 [doi]
- Distributed Scientific Workflow Management for Data-Intensive ApplicationsSerge S. Shumilov, Yan Leng, Mahmoud El-Gayyar, Armin B. Cremers. 65-73 [doi]
- Developing Service-Based Software Systems with QoS Monitoring and AdaptationStephen S. Yau, N. Ye, Hessam S. Sarjoughian, D. Huang. 74-80 [doi]
- Progressive Ripple-Based Service Discovery for High Response Time in Autonomous Decentralized Community SystemKhalid Mahmood Malik, Yuji Horikoshi, Satoshi Niki, Xiaodong Lu, Kinji Mori. 81-87 [doi]
- GSON: A Group Based Hierarchically Structured Overlay NetworkRui Wang, Qinglin Zhu, Depei Qian, Danfeng Zhu. 88-94 [doi]
- A Credit Evaluation Model for Computational Grid NodesTao Wang, Xingshe Zhou, Yun-lan Wang, Jian Hu. 95-98 [doi]
- Design and Implementation of an Information Service for Cross-Grid Computing EnvironmentsChao-Tung Yang, Tsui-Ting Chen, Keng-Yi Chou, William C. Chu. 99-105 [doi]
- Developing a Security Robot in Service-Oriented ArchitectureYinong Chen, S. Abhyankar, L. Xu, W. T. Tsai, Marcos Garcia-Acosta. 106-111 [doi]
- Structured Service Composition Execution for Mobile Web ApplicationsHeiko Pfeffer, Louay Bassbouss, Stephan Steglich. 112-118 [doi]
- SOV: Service Oriented Virtualization Model for Medical Image GridAobing Sun, Hai Jin, Qin Zhang, Ran Zheng. 119-125 [doi]
- Reliability Analysis of Component-Based Software Based on Rewrite LogicDong Wang, Ning Huang. 126-132 [doi]
- XMML: A Visual Metamodeling Language for Domain-Specific Modeling and its Application in Distributed SystemsHua Zhou, Xingping Sun, Zhihong Liang, Hongwei Kang, Qing Duan, Hongji Yang. 133-139 [doi]
- The Causal Order is StrictJeremiah James, Supratik Mukhopadhyay. 140-143 [doi]
- An Extended MM-Path Approach to Component-Based Web Application TestingJingxian Gu, Lei Xu 0003, Baowen Xu, Hongji Yang. 144-150 [doi]
- Towards a Simple Secured Searching Protocol for Future RFID ApplicationsMd Sazzad Hossain, Sheikh Iqbal Ahamed. 151-157 [doi]
- Using Historical Role to Speed up Subsequent NegotiationsYizhu Zhao, Hongwei Lu. 158-164 [doi]
- A Delegation Framework for Access Control in WfMS Based on Tasks and RolesPu Jian, Hwai-jung Hsu, Feng-Jian Wang. 165-171 [doi]
- An Architecture for Guaranteeing Real-Time Databases Available CeaselesslyYing-yuan Xiao. 172-177 [doi]
- Well-Balanced Allocation Strategy for Multi-Cluster Computing EnvironmentsChao-Tung Yang, Hao-Yu Tung, Keng-Yi Chou, William C. Chu. 178-184 [doi]
- A Distributed Approach for Multi-Domain Simulation of Mechatronic SystemsTibor Farkas, Andreas Hinnerichs, Carsten Neumann. 185-191 [doi]
- Cognitive Distributed Networks in Environmental e-ScienceRamesh Bharadwaj, Supratik Mukhopadhyay, Manuel Peralta, Krishna Shenai, Subhashis Majumder. 192-198 [doi]
- Approach to Supporting Continuity of Usage in Location-Based Access ControlMaria Luisa Damiani, Elisa Bertino, Claudio Silvestri. 199-205 [doi]
- Intrusion Detection Using Third-Parties SupportMasakazu Fujii, Kenichi Takahashi, Yoshiaki Hori, Kouichi Sakurai. 206-212 [doi]
- Using Multi-Core Processors to Support Network Security ApplicationsYang Xiang, Wanlei Zhou. 213-218 [doi]
- ERAP: ECC Based RFID Authentication ProtocolSheikh Iqbal Ahamed, Farzana Rahman, Md. Endadul Hoque. 219-225 [doi]
- BlueCRM: A New Trend of Customer Relationship Management SystemsMohammed Alawairdhi, Hongji Yang, Mousa Al-Akhras. 226-232 [doi]
- APRIX: A Master-Slave Operating System Architecture for Multiprocessor Embedded SystemsJimin Kim, Minsoo Ryu. 233-237 [doi]
- Plenary Panel Session B: Future Trends of Distributed Computing SystemsHongji Yang. 238 [doi]