Abstract is missing.
- Dynamic Process Management of Rapid Virtual Product Design Project in a Virtual Enterprise to Deal with Various UncertaintiesCao Yan, Chen Hua, Zhao Rujia, Zhongyu Lu. 3-9
- XML Based Installation Agriculture Technology Markup Language - IATMLChen Hua, Yuexin Yang, Cao Yan, Bo Sun, Zhao Rujia, Zhongyu Lu. 10-15
- Efficiency of Web Based SAX XML Distributed ProcessingRoger Eggen, Aris Basic. 16-21
- Investigation of Mechanism of Flexible Workflow Based on AgentShaowen Yao, Yi-ming Wu, Joan Lu. 22-30
- MorphBank, The Development of a General Purpose Bioinformatics DatabaseFredrik Ronquist, Gregory A. Riccardi, David Gaitros, Neelima Jammigumpula, Wifredo Blanco. 31-37
- Applying the MVC Diagram for Building Web Applications in StrutsChong-Wei Xu. 38-44
- An Overlay IP Network Architecture and Bandwidth Allocation for Multiparty Multimedia ConferencingGaofeng Yue, Biing-Hwang Juang. 45-51
- Configuration Approach To Improving Online Game Server LoadVictor A. Clincy, Joe Sessum. 52-58
- The e-Traveler s CheckWen-Jung Hsin, Lein Harn. 59-65
- From Slave Devices to Active Network PeersHongQian Karen Lu. 66-74
- A Performance Evaluation of Web Services InfrastructureSanjay P. Ahuja, Raquel Clark. 75-81
- Performance Evaluation of Browser-based SSL VPN GatewaysJens Mache, Tim Likarish. 82-86
- Improvement of e-Learning Materials by Introducing Concepts of Learning Unit and Integrated VisualizationYoshito Yamamoto, Hiroo Hirose. 87-93
- Easy and Effective Computing Environment on the WWWAlan Shimoide, Luping Lin, Tracie-Lynne Hong, Sergio Aragon, Ilmi Yoon. 94-98
- Improving Concept Hierarchy Development for Web Returned Documents Using Automatic ClassificationQuanzhi Li, Xin Chen, Razvan Stefan Bot, Yi-fang Brook Wu. 99-105
- Personal Search Engine: A Case Study of Performance Issues Between Technology and Operating SystemsMatthew Weber, Thomas Jyhcheng Liu. 106-113
- The Benefits of Rich Internet Applications on Network PerformanceLuis Derechin. 114-121
- An Application Program Interface for Securing XML DocumentsTao-Ku Chang, Gwan-Hwan Hwang. 122-128
- Access Control Technique for XML DocumentsSun-Moon Jo, Ki Tae Kim, Hoon-Joon Kouh, Chang-Mo Yang, Weon-Hee Yoo. 129-135
- A Practical XML-Based Enterprise Data Integration PlatformChunghan Chen, Kai H. Chang, Chengliang Wang. 136-141
- XML Specification for Online SurveysDwight Deugo. 142-148
- XML Data Optimum Management with DB: Native-XML (Open-Source) and XML-Enabled (Proprietor)Ainhoa Serna, Jon Kepa Gerrikagoitia, Gorka Gil, Tim Smithers. 149-156
- Improving Sama Group Communication Mechanism for Mobile Agents via a Hop-Ring ProtocolNavid Bazazzadeh, Nasser Yazdani, Hojjat Jafarpour. 157-163
- Mobile Network End Host Remote Monitoring AgentHafiz Farooq Ahmad, Hiroki Suguri, M. Omair Shafiq, Arshad Ali. 164-173
- Programmable Agents for Generic Distributed AuthorisationNick Antonopoulos, James Heather, Roger M. A. Peel. 174-180
- The Role of an Intelliegent Agent for Data Source Selection in the Distributed Server EnvironmentMrutyunjaya Swain, Young Kim. 181-186
- A Web Services Based Mobile Agent SystemWeichang Du, Hui Li. 187-195
- Some Packet Schedulers for Proportional Delay Differentiated Services and Best Effort ServiceYuan-Cheng Lai, Arthur Chang. 196-202
- Fair Scheduling in Wireless Networks with Controlled Compensation for Faulty ChannelsVignesh Kumar, Eric Cole. 203-208
- Queue Management and QoS Routing for Traffic DifferentiationMarília Curado, Ricardo Veludo, Edmundo Monteiro. 209-215
- A Programmable Pipelined Queue for Data Stream MiningMitsuaki Nakasumi. 216-224
- Waveband Switching: A Scalable and Cost Efficient Technique for Optical Network DesignXiaojun Cao, Vishal Anand. 225-230
- WApDM: A Multi-Process Approach for Web Applications DesignSemia Sonia Selmi, Naoufel Kraïem, Henda Hajjami Ben Ghézala. 231-237
- MOBIT: Design and Development of Telemedicine System on Mobile DevicesTarek K. Alameldin, Saeed Iqbal. 238-241
- Design and Configuration of a Network Security and Forensics LabJoseph M. Kizza, Billy Harris, Mike Ward. 242-246
- A Design of a System for Supporting Keyword Search in DHT-based P2P systemYoungsung Son, Donghoon Kang, Bonggwan Cha, Myounghee Jin, Kyongsok Kim. 247-254
- A Network Architecture for Supporting E-LSPs over ATM with QoS GuaranteesSakir Yucel, Rahmi Marasli, Sanjaya Choudhury. 255-261
- A Conceptual Distributed Logic Inference Framework for Internet ComputingNick Antonopoulos, Roger M. A. Peel. 262-268
- Alchemi: A .NET-based Enterprise Grid Computing SystemAkshay Luther, Rajkumar Buyya, Rajiv Ranjan, Srikumar Venugopal. 269-278
- An IPv6 Data Plane for Service Aware Access NetworksTim Stevens, Koert Vlaeminck, Wim Van de Meerssche, Filip De Turck, Bart Dhoedt, Piet Demeester. 279-286
- MPEG-21 Session Mobility on Mobile DevicesFrederik De Keukelaere, Robbie De Sutter, Rik Van de Walle. 287-293
- Contextual Personalization of a Mobile Multimodal ApplicationRemco Poortinga, Alfons H. Salden, Olaf Drögehorn, Jérôme Picault, Makram Bouzid, Michael Sutterer, R. Kernchen, C. Räck, Mateusz Radziszewski, Petteri Nurmi. 294-300
- Cooperating Security Management for Mutually Trusted Secure NetworksShang-Juh Kao, Lai-Ming Shiue. 301-307
- Running-mode Analysis of the SSL ProtocolYuqing Zhang, Xiuying Liu, Bo Yang. 308-311
- Efficient Certificate Status Validation Using Grouping OCSP ServerSeon-Mook Choi, Keum-Suk Lee. 312-318
- An Efficient Multicast Delivery Mechanism Based on Locality in Mobile IPv6 NetworksSulyun Sung, Yuhwa Seo, Sangjin Park, Yongtae Shin. 319-324
- Improvement of Link Failure Restoration Utilising MPLS as a Means to Maintain QoSRobert Simon Sherratt, Michael Asante. 325-331
- A Multiphased Algorithm of Workload Distribution for Software DSM ClustersTyng-Yeu Liang, Yen-Tso Liu, Ce-Kuen Shieh, Ching-Min Huang, Liang-I Chang. 332-338
- SCAR: A Stateless Approach to Achieving Scalable Quality of ServiceDaniel Reid, Michael Katchabaw. 339-347
- Query Generation for Personalized Tracking of InformationFaiza Abbaci, Pascal Francq, Alain Delchambre. 348-353
- Application-Level Multicast Using P2P ProtocolGangbeom Kim, Dongyun Han, Youngsung Son, Kyongsok Kim. 354-360
- Web Computing on the Invariant MeasuresJiu Ding, Zizhong Wang, HuiQing Yang. 361-365
- Problems and Reform Plans of Online Manual with Considering Individual CharacteristicsHiroo Hirose, Kazuaki Nanba. 366-372
- An Experimental Study on Validation Problems with Existing HTML WebpagesShan Chen, Dan Hong, Vincent Y. Shen. 373-379
- Stealthy CiphertextMartina Simova, Mark Stamp, Chris Pollett. 380-388
- AMAYA: A Recommender System for Ambient-Aware RecommendationsStephan Steglich, Christian Räck, Stefan Arbanowski. 389-394
- RMBC: A Rights Management Mechanism for Digital LibrariesYinyan Yu, Zhi Tang. 395-401
- Adaptive Spam mail filteringKyungHee Lee, Jungsik Wyee, Wonil Kim, Minkoo Kim. 402-408
- Learning on the Battlefield: A Case Study on the Development and Implementation of a Knowledge Management System during Operation Iraqi FreedomRonald A. Caro, Mark A. Flournoy, Ossen D Haiti, John Quinn, Paul Sparks. 409-415
- An Implementation of IP Traceback in IPv6 Using Probabilistic Packet MarkingXuan-Hien Dang, Emil Albright. 416-421
- Service Discovery API for Pervasive ComputingBjoern Wuest, Olaf Drögehorn, Klaus David. 422-427
- The Object-Oriented Features in OOWISTharam S. Dillon, Jidong Wang, Hongman Wang, Faye F. Liu. 428-436
- Constructing A Grid Simulation with Differentiated Network Service Using GridSimAnthony Sulistio, Gokul Poduval, Rajkumar Buyya, Chen-Khong Tham. 437-444
- A Large Scale Simulation Study: Impact of Unresponsive Malicious FlowsHyeong-Ah Choi, Debra Tang, Yen-Hung Hu. 445-451
- A Simulator for Fault-Tolerant Public-Resource Computer SystemsHuan-Yu Tu. 452-458
- A Learning Object Transmission Model Based on SOAPDi Wu, Zongkai Yang, Wenqing Cheng. 459-468
- Modeling of End-to-End Transmission of Astronomical Images over Lossy NetworkRobert Jonathan, Helen Boussalis, Charles Liu, Khosrow Rad, Jane Dong. 469-473
- Securing a Bandwidth Broker ArchitectureChristos Bouras, Kostas Stamos. 474-480
- An Agent-Based Approach for Dynamic and Self-Organized Web SitesHanh Pham. 481-487
- An Approach to XML Key Management Specification in X-CertificatorJoan Lu, Nathan Cripps, Che Hua, Cao Yan. 488-493
- Building XML Applications in Science and Technology: Implementing XML-Based Methodology to Viewing Analysed Medical DataJoan Lu, Mumtaz Riaz, Xujing Wang, Che Hua, Cao Yan. 494-499
- Learning Object Farms in Mathematics and Natural SciencesJohn B. Stav, Trond M. Thorseth, Joan Lu. 500-505
- Phishing Attacks - A Socially Engineered Threat to e-BusinessJohnnes Arreymbi. 506-514
- Developing a SAX Filtering Intermediary Service for Protecting SVG Multimedia Contents in a Ubiquitous Publish/Subscribe EnvironmentJinan Fiaidhi, Sabah Mohammed, Madan Garg, Ahmed Sabbir Arif. 515-521
- Distributed Computing and Data Dissemination with Java AgentsStephen F. Kirby. 522-527
- Design and Implementation of QoS Enhancement Streaming System by Using Error Resilient Variable Packet Size Transmission over WirelessLANHye Dong Jung, Je Woo Kim, Jae Gi Son, Doug-Young Suh. 528-534
- Differential Fault AnalysisEltayeb Salih Abuelyaman, Balasubramanian Devadoss. 535