Abstract is missing.
- A New Energy Efficient Target Detection Scheme for Pervasive ComputingThanh Hai Trinh, Hee Yong Youn. 1-8 [doi]
- A Load Balance Based On-Demand Routing Protocol for Mobile Ad-Hoc NetworksLiqiang Zhao, Xin Wang, Azman Osman Lim, Xiangyang Xue. 9-16 [doi]
- Handover Control Function Based Handover for Mobile IPv6Guozhi Wei, Anne Wei, Ke Xu, Hui Deng. 17-24 [doi]
- Unified Error Control Framework with Cross-Layer Interactions for Efficient H.264 Video Transmission over IEEE 802.11e Wireless LANJeong-Yong Choi, Jitae Shin. 25-32 [doi]
- A Novel Control Plane Model of Extensible RoutersKun Wu, Jianping Wu, Ke Xu. 33-40 [doi]
- AM-Trie: A High-Speed Parallel Packet Classification Algorithm for Network ProcessorBo Zheng, Chuang Lin. 41-48 [doi]
- Speedup Requirements for Output Queuing Emulation with a Sliding-Window Parallel Packet SwitchChia-Lung Liu, Woei Lin, Chin-Chi Wu. 49-56 [doi]
- Combining Cross-Correlation and Fuzzy Classification to Detect Distributed Denial-of-Service AttacksWei Wei, Yabo Dong, Dongming Lu, Guang Jin. 57-64 [doi]
- Convergence of the Fixed Point Algorithm of Analytical Models of Reliable Internet Protocols (TCP)Debessay Fesehaye Kassa, Sabine Wittevrongel. 65-72 [doi]
- A Peer-to-Peer Approach to Semantic Web Services DiscoveryYong Li, Sen Su, Fangchun Yang. 73-80 [doi]
- Multicast Routing Protocol with Heterogeneous and Dynamic ReceiversHuimei Lu, Hongyu Hu, Quanshuang Xiang, Yuanda Cao. 81-86 [doi]
- Using Case-Based Reasoning to Support Web Service CompositionRuixing Cheng, Sen Su, Fangchun Yang, Yong Li. 87-94 [doi]
- Secure OWL QueryBaowen Xu, Yanhui Li, Jianjiang Lu, Dazhou Kang. 95-103 [doi]
- Efficient Population Diversity Handling Genetic Algorithm for QoS-Aware Web Services SelectionChengwen Zhang, Sen Su, Junliang Chen. 104-111 [doi]
- A New Algorithm for Long Flows Statistics-MGCBFMingzhong Zhou, Jian Gong, Wei Ding. 112-119 [doi]
- Estimating Original Flow Length from Sampled Flow StatisticsWeijiang Liu, Jian Gong, Wei Ding, Yanbing Peng. 120-127 [doi]
- Easily-Implemented Adaptive Packet Sampling for High Speed Networks Flow MeasurementHongbo Wang, Yu Lin, Yuehui Jin, Shiduan Cheng. 128-135 [doi]
- Multi-layer Network Recovery: Avoiding Traffic Disruptions Against Fiber FailuresAnna Urra, Eusebi Calle, José-Luis Marzo. 136-143 [doi]
- An Algorithm for Estimation of Flow Length Distributions Using Heavy-Tailed FeatureWeijiang Liu, Jian Gong, Wei Ding, Guang Cheng. 144-151 [doi]
- Performance Evaluation of Novel MAC Protocol for WDM/Ethernet-PONBokrae Jung, HyunHo Yun, Jaegwan Kim, Mingon Kim, Minho Kang. 152-155 [doi]
- An Efficient Mobility Management Scheme for Two-Level HMIPv6 NetworksXuezeng Pan, Zheng Wan, Lingdi Ping, Fanjun Su. 156-159 [doi]
- Analysis of Packet Transmission Delay Under the Proportional Fair Scheduling PolicyJin-Hee Choi, Jin-Ghoo Choi, Chuck Yoo. 160-163 [doi]
- Precise Matching of Semantic Web ServicesYonglei Yao, Sen Su, Fangchun Yang. 164-167 [doi]
- Evolving Toward Next Generation Wireless Broadband InternetSeung-Que Lee, Namhun Park, Choong-Ho Cho, Hyong-Woo Lee, Seungwan Ryu. 168-171 [doi]
- A Decision Maker for Transport Protocol ConfigurationJae-Hyun Hwang, Jin-Hee Choi, Chuck Yoo. 172-175 [doi]
- On the Generation of Fast Verifiable IPv6 AddressesQianli Zhang, Xing Li. 176-179 [doi]
- A MAC Protocol to Reduce Sleep Latency and Collisions in Wireless Sensor NetworkJinsuk Pak, Jeongho Son, Kijun Han. 180-183 [doi]
- IC Design of IPv6 Routing Lookup for High Speed NetworksYuan-Sun Chu, Hui-Kai Su, Po-Feng Lin, Ming-Jen Chen. 184-187 [doi]
- GPU Accelerated Smith-WatermanYang Liu, Wayne Huang, John Johnson, Sheila Vaidya. 188-195 [doi]
- A Graphics Hardware Accelerated Algorithm for Nearest Neighbor SearchBenjamin Bustos, Oliver Deussen, Stefan Hiller, Daniel A. Keim. 196-199 [doi]
- The Development of the Data-Parallel GPU Programming Language CGiSPhilipp Lucas, Nicolas Fritz, Reinhard Wilhelm. 200-203 [doi]
- Spline Surface Intersections Optimized for GPUsSverre Briseid, Tor Dokken, Trond Runar Hagen, Jens Olav Nygaard. 204-211 [doi]
- A GPU Implementation of Level Set Multiview StereoPatrick Labatut, Renaud Keriven, Jean-Philippe Pons. 212-219 [doi]
- Solving the Euler Equations on Graphics Processing UnitsTrond Runar Hagen, Knut-Andreas Lie, Jostein R. Natvig. 220-227 [doi]
- Particle-Based Fluid Simulation on the GPUKyle Hegeman, Nathan A. Carr, Gavin S. P. Miller. 228-235 [doi]
- Spiking Neurons on GPUsFabrice Bernhard, Renaud Keriven. 236-243 [doi]
- SONA: An On-Chip Network for Scalable Interconnection of AMBA-Based IPsEui Bong Jung, Han Wook Cho, Neungsoo Park, Yong Ho Song. 244-251 [doi]
- Semi-automatic Creation of Adapters for Legacy Application Migration to Integration Platform Using KnowledgeJan Pieczykolan, Bartosz Kryza, Jacek Kitowski. 252-259 [doi]
- A Self-configuration Mechanism for High-Availability ClustersHocheol Sung, Sunyoung Han, Bok-Gyu Joo, Chee-Wei Ang, Wang-Cho Cheng, Kim-Sing Wong. 260-263 [doi]
- Development of Integrated Framework for the High Temperature Furnace DesignYu Xuan Jin, Jae-Woo Lee, Karpjoo Jeong, Jonghwa Kim, Hoyon Hwang. 264-271 [doi]
- A Distributed Real-Time Tele-operation System Based on the TMO ModelingHanku Lee, Segil Jeon. 272-279 [doi]
- A Sharing and Delivery Scheme for Monitoring TMO-Based Real-Time SystemsYoon Seok Jeong, Tae Wan Kim, Chun-Hyon Chang. 280-288 [doi]
- An Algorithm for the Generalized ::::k::::-Keyword Proximity Problem and Finding Longest Repetitive Substring in a Set of StringsInbok Lee, Sung-Ryul Kim. 289-292 [doi]
- A Grid-Based Flavonoid Informatics PortalHaiGuo Xu, Karpjoo Jeong, Seunho Jung, Hanku Lee, Segil Jeon, Kum Won Cho, Hyunmyung Kim. 293-300 [doi]
- Computer Construction of Quasi Optimal Portfolio for Stochastic Models with Jumps of Financial MarketsAleksander Janicki. 301-307 [doi]
- A New Computational Method of Input Selection for Stock Market Forecasting with Neural NetworksWei Huang, Shouyang Wang, Lean Yu, Yukun Bao, Lin Wang. 308-315 [doi]
- Short-Term Investment Risk Measurement Using VaR and CVaRVirgilijus Sakalauskas, Dalia Kriksciuniene. 316-323 [doi]
- Computational Asset Allocation Using One-Sided and Two-Sided Variability MeasuresSimone Farinelli, Damiano Rossello, Luisa Tibiletti. 324-331 [doi]
- Stock Trading System Based on Formalized Technical Analysis and Ranking TechniqueSaulius Masteika, Rimvydas Simutis. 332-339 [doi]
- Deriving the Dependence Structure of Portfolio Credit Derivatives Using Evolutionary AlgorithmsSvenja Hager, Rainer Schöbel. 340-347 [doi]
- Stochastic Volatility Models and Option PricesAkvilina Valaityte, Eimutis Valakevicius. 348-355 [doi]
- Extraction of Interesting Financial Information from Heterogeneous XML-Based DataJuryon Paik, Young Ik Eom, Ung-Mo Kim. 356-363 [doi]
- A Hybrid SOM-Altman Model for Bankruptcy PredictionEgidijus Merkevicius, Gintautas Garsva, Stasys Girdzijauskas. 364-371 [doi]
- Learning and Inference in Mixed-State Conditionally Heteroskedastic Factor Models Using Viterbi ApproximationMohamed Saidane, Christian Lavergne. 372-379 [doi]
- Constructing a P2P-Based High Performance Computing PlatformHai Jin, Fei Luo, Xiaofei Liao, Qin Zhang, Hao Zhang. 380-387 [doi]
- LDMA: Load Balancing Using Decentralized Decision Making Mobile AgentsM. Aramudhan, V. Rhymend Uthariaraj. 388-395 [doi]
- A Hybrid Scheme for Object Allocation in a Distributed Object-Storage SystemFang Wang, Shunda Zhang, Dan Feng, Hong Jiang, Lingfang Zeng, Song Lv. 396-403 [doi]
- Survive Under High Churn in Structured P2P Systems: Evaluation and StrategyZhiyu Liu, Ruifeng Yuan, Zhenhua Li, Hongxing Li, Guihai Chen. 404-411 [doi]
- Analyzing Peer-to-Peer Traffic s Impact on Large Scale NetworksMao Yang, Yafei Dai, Jing Tian. 412-419 [doi]
- Analyzing the Dynamics and Resource Usage of P2P File Sharing by a Spatio-temporal ModelRiikka Susitaival, Samuli Aalto, Jorma T. Virtamo. 420-427 [doi]
- Understanding the Session Durability in Peer-to-Peer Storage SystemJing Tian, Yafei Dai, Hao Wang, Mao Yang. 428-435 [doi]
- Popularity-Based Content Replication in Peer-to-Peer NetworksYohei Kawasaki, Noriko Matsumoto, Norihiko Yoshida. 436-443 [doi]
- A New Method for Crude Oil Price Forecasting Based on Support Vector MachinesWen Xie, Lean Yu, Shanying Xu, Shouyang Wang. 444-451 [doi]
- Credit Risk Evaluation Based on LINMAPTai-yong Mou, Zongfang Zhou, Yong Shi. 452-459 [doi]
- Logic Mining for Financial DataG. Felici, M. A. Galante, L. Torosantucci. 460-467 [doi]
- Mining Both Associated and Correlated PatternsZhongmei Zhou, Zhaohui Wu, Chunshan Wang, Yi Feng. 468-475 [doi]
- A New Multi-criteria Convex Quadratic Programming Model for Credit AnalysisGang Kou, Yi Peng, Yong Shi, Zhengxin Chen. 476-484 [doi]
- Multiclass Credit Cardholders Behaviors Classification MethodsGang Kou, Yi Peng, Yong Shi, Zhengxin Chen. 485-492 [doi]
- Hybridizing Exponential Smoothing and Neural Network for Financial Time Series PredicationKin Keung Lai, Lean Yu, Shouyang Wang, Wei Huang. 493-500 [doi]
- Assessment the Operational Risk for Chinese Commercial BanksLijun Gao, Jianping Li, Jianming Chen, Weixuan Xu. 501-508 [doi]
- Pattern Recognition for MCNs Using Fuzzy Linear ProgrammingJing He, Wuyi Yue, Yong Shi. 509-516 [doi]
- Comparisons of the Different Frequencies of Input Data for Neural Networks in Foreign Exchange Rates ForecastingWei Huang, Lean Yu, Shouyang Wang, Yukun Bao, Lin Wang. 517-524 [doi]
- Automatic Differentiation of C++ Codes for Large-Scale Scientific ComputingRoscoe A. Bartlett, David M. Gay, Eric T. Phipps. 525-532 [doi]
- A Sensitivity-Enhanced Simulation Approach for Community Climate System ModelJong G. Kim, Elizabeth C. Hunke, William H. Lipscomb. 533-540 [doi]
- Optimal Checkpointing for Time-Stepping Procedures in ADOL-CAndreas Kowarz, Andrea Walther. 541-549 [doi]
- On the Properties of Runge-Kutta Discrete AdjointsAdrian Sandu. 550-557 [doi]
- Source Transformation for MATLAB Automatic DifferentiationRahul V. Kharche, Shaun A. Forth. 558-565 [doi]
- The Data-Flow Equations of Checkpointing in Reverse Automatic DifferentiationBenjamin Dauvergne, Laurent Hascoët. 566-573 [doi]
- Linearity Analysis for Automatic DifferentiationMichelle Mills Strout, Paul D. Hovland. 574-581 [doi]
- Hybrid Static/Dynamic Activity AnalysisBarbara Kreaseck, Luis Ramos, Scott Easterday, Michelle Mills Strout, Paul D. Hovland. 582-590 [doi]
- Automatic Sparsity Detection Implemented as a Source-to-Source TransformationRalf Giering, Thomas Kaminski. 591-598 [doi]
- Lattice Properties of Two-Dimensional Charge-Stabilized Colloidal CrystalsPavel Dyshlovenko, Yiming Li. 599-606 [doi]
- Self-consistent 2D Compact Model for Nanoscale Double Gate MOSFETsS. Kolberg, Tor A. Fjeldly, Benjamín Iñíguez. 607-614 [doi]
- Neural Network Based MOS Transistor Geometry Decision for TSMC 0.18µ Process TechnologyMutlu Avci, Tülay Yildirim. 615-622 [doi]
- Vlasov-Maxwell Simulations in Singular GeometriesFranck Assous, Patrick Ciarlet Jr.. 623-630 [doi]
- Fast Rigorous Analysis of Rectangular Waveguides by Optimized 2D-TLMAyhan Akbal, Hasan H. Balik. 631-637 [doi]
- A New Approach to Spectral Domain Method: Functional ProgrammingHasan H. Balik, Bahadir Sevinc, Ayhan Akbal. 638-644 [doi]
- Optimized Design of Interconnected Bus on Chip for Low PowerDonghai Li, Guang-Sheng Ma, Gang Feng. 645-652 [doi]
- A Conservative Approach to SystemC ParallelizationBastien Chopard, Philippe Combes, Julien Zory. 653-660 [doi]
- Modular Divider for Elliptic Curve Cryptographic Hardware Based on Programmable CAJun-Cheol Jeon, Kee-Won Kim, Jai-Boo Oh, Kee-Young Yoo. 661-668 [doi]
- A General Data Grid: Framework and ImplementationWu Zhang, Jian Mei, Jiang Xie. 669-676 [doi]
- Path Following by SVDLuca Dieci, Maria Grazia Gasparo, Alessandra Papini. 677-684 [doi]
- Comparing Leja and Krylov Approximations of Large Scale Matrix ExponentialsLuca Bergamaschi, Marco Caliari, Angeles Martinez, Marco Vianello. 685-692 [doi]
- Combined Method for Nonlinear Systems of EquationsPeng Jiang, Geng Yang, Chunming Rong. 693-699 [doi]
- A General Family of Two Step Runge-Kutta-Nyström Methods for ::::y::::::: ::: = ::::f::::(::::x::::, ::::y::::) Based on Algebraic PolynomialsBeatrice Paternoster. 700-707 [doi]
- Schur Decomposition Methods for the Computation of Rational Matrix FunctionsT. Politi, M. Popolizio. 708-715 [doi]
- Piecewise Constant Perturbation Methods for the Multichannel Schrödinger EquationVeerle Ledoux, Marnix Van Daele, Guido Vanden Berghe. 716-723 [doi]
- State Dependent Symplecticity of Symmetric MethodsFelice Iavernaro, Brigida Pace. 724-731 [doi]
- On the Solution of Skew-Symmetric Shifted Linear SystemsTiziano Politi, Alessandro Pugliese. 732-739 [doi]
- Search Based Software EngineeringMark Harman. 740-747 [doi]
- Modular Monadic Slicing in the Presence of PointersZhongqiang Wu, Yingzhou Zhang, Baowen Xu. 748-756 [doi]
- Modified Adaptive Resonance Theory Network for Mixed Data Based on Distance HierarchyChung-Chian Hsu, Yan-Ping Huang, Chieh-Ming Hsiao. 757-764 [doi]
- Checking for Deadlock, Double-Free and Other Abuses in the Linux Kernel Source CodePeter T. Breuer, Simon Pickin. 765-772 [doi]
- Generating Test Data for Specification-Based Tests Via Quasirandom SequencesHongmei Chi, Edward L. Jones, Deidre W. Evans, Martin Brown. 773-780 [doi]
- Support Vector Machines for Regression and Applications to Software Quality PredictionXin Jin, Zhaodong Liu, Rongfang Bie, Guoxing Zhao, Jixin Ma. 781-788 [doi]
- Segmentation of Software Engineering Datasets Using the M5 AlgorithmDaniel Rodríguez, Juan J. Cuadrado, Miguel Ángel Sicilia Urbán, Roberto Ruiz. 789-796 [doi]
- A Web User Interface of the Security Requirement Management Database Based on ISO/IEC 15408Daisuke Horie, Shoichi Morimoto, Jingde Cheng. 797-804 [doi]
- Domain Requirements Elicitation and Analysis - An Ontology-Based ApproachYuqin Lee, Wenyun Zhao. 805-813 [doi]
- Integrative Computational Frameworks for Multiscale Digital Human Modeling and SimulationRichard C. Ward, Line C. Pouchard, James J. Nutaro. 814-821 [doi]
- Multi-scale Modeling of Trauma InjuryCelina Imielinska, Andrzej Przekwas, X. G. Tan. 822-830 [doi]
- Investigation of the Biomechanic Function of Cruciate Ligaments Using Kinematics and Geometries from a Living Subject During Step Up/Down Motor TaskLuigi Bertozzi, Rita Stagni, Silvia Fantozzi, Angelo Cappello. 831-838 [doi]
- Optimization Technique and FE Simulation for Lag Screw Placement in Anterior Column of the AcetabulumRuofeng Tong, Shenghui Liao, Jinxiang Dong. 839-846 [doi]
- Model of Mechanical Interaction of Mesenchyme and Epithelium in Living TissuesJirí Kroc. 847-854 [doi]
- Three-Dimensional Virtual Anatomic Fit Study for an Implantable Pediatric Ventricular Assist DeviceArielle Drummond, Timothy Bachman, James F. Antaki. 855-861 [doi]
- Soft Computing Based Range Facial Recognition Using EigenfaceYeung-hak Lee, Chang-Wook Han, Tae-Sun Kim. 862-869 [doi]
- A Privacy Algorithm for 3D Human Body ScansJoseph Laws, Yang Cai 0002. 870-877 [doi]
- The Study of the Detection and Tracking of Moving Pedestrian Using Monocular-VisionChang Hao-li, Shi Zhong-ke, Fu Qing-hua. 878-885 [doi]
- An Implementation of Real Time-Sentential KSSL Recognition System Based on the Post Wearable PCJung-Hyun Kim, Yong-Wan Roh, Kwang-Seok Hong. 886-893 [doi]
- Patient Modeling Using Mind Mapping Representation as a part of Nursing Care PlanHye-Young Ahn, Eunja Yeon, Eunmi Ham, Woojin Paik. 894-901 [doi]
- A Technique for Code Generation of USN Applications Based on Nano-QplusKwangyong Lee, Woojin Lee, Juil Kim, Kiwon Chong. 902-909 [doi]
- A Study on the Indoor Real-Time Tracking System to Reduce the Interference ProblemHyung Su Lee, Byunghun Song, Hee Yong Youn. 910-917 [doi]
- A Task Generation Method for the Development of Embedded SoftwareZhigang Gao, Zhaohui Wu, Hong Li. 918-921 [doi]
- Active Shape Model-Based Object Tracking in Panoramic VideoDaehee Kim, Vivek Maik, Dongeun Lee, Jeongho Shin, Joon Ki Paik. 922-929 [doi]
- Interworking of Self-organizing Hierarchical Ad Hoc Networks and the InternetHyukjoon Lee, Seung Hyong Rhee, Dipankar Raychaudhuri, Wade Trappe. 930-937 [doi]
- A Dependable Communication Network for e-TextilesNenggan Zheng, Zhaohui Wu, Lei Chen 0005, Yanmiao Zhou, Qijia Wang. 938-945 [doi]
- EAR-RT: Energy Aware Routing with Real-Time Guarantee for Wireless Sensor NetworksJunyoung Heo, Sangho Yi, Geunyoung Park, Yookun Cho, Jiman Hong. 946-953 [doi]
- A Design of Energy-Efficient Receivers for Cluster-Head Nodes in Wireless Sensor NetworksHyungkeun Lee, Hwa-sung Kim. 954-961 [doi]
- An Error Control Scheme for Multicast Video Streaming on the Last Hop Wireless LANsJunghoon Lee, Mikyung Kang, Gyung-Leen Park, Hanil Kim, Cheolmin Kim, Seongbaeg Kim. 962-969 [doi]
- Design of a Fast Handoff Scheme for Real-Time Media Application on the IEEE 802.11 Wireless LANMikyung Kang, Junghoon Lee, Jiman Hong, Jinhwan Kim. 970-978 [doi]
- Accuracy Enhancement by Selective Use of Branch History in Embedded ProcessorJong Wook Kwak, Seong Tae Jhang, Chu Shik Jhon. 979-986 [doi]
- A Novel Method of Adaptive Repetitive Control for Optical Disk DriversKyungbae Chang, Gwitae Park. 987-990 [doi]
- A Real Time Radio Link Monitoring Using CSIHyukjun Oh, Jiman Hong. 991-998 [doi]
- Adaptive Encoding of Multimedia Streams on MPSoCJulien Bernard, Jean-Louis Roch, Serge De Paoli, Miguel Santana. 999-1006 [doi]
- A Mechanism to Make Authorization Decisions in Open Distributed Environments Without Complete Policy InformationChiu-Man Yu, Kam-Wing Ng. 1007-1014 [doi]
- A Reputation-Based Grid Information ServiceJemal H. Abawajy, Andrzej M. Goscinski. 1015-1022 [doi]
- Transparent Resource Management with Java RM APIArkadiusz Janik, Krzysztof Zielinski. 1023-1030 [doi]
- Resource Discovery in Ad-Hoc GridsRafael Moreno-Vozmediano. 1031-1038 [doi]
- JIMS Extensions for Resource Monitoring and Management of Solaris 10Krzysztof Zielinski, Marcin Jarzab, Damian Wieczorek, Kazimierz Balos. 1039-1046 [doi]
- An Agent Based Semi-informed Protocol for Resource Discovery in GridsAgostino Forestiero, Carlo Mastroianni, Giandomenico Spezzano. 1047-1054 [doi]
- Replica Based Distributed Metadata Management in Grid EnvironmentHai Jin, Muzhou Xiong, Song Wu, Deqing Zou. 1055-1062 [doi]
- Data Replication Techniques for Data-Intensive ApplicationsJaechun No, Chang Park, Sung Soon Park. 1063-1070 [doi]
- Managing Data Using Neighbor Replication on Triangular-Grid StructureAli Mamat, Mustafa Mat Deris, Jemal H. Abawajy, Suhaila Ismail. 1071-1077 [doi]