Abstract is missing.
- New Techniques in Designing Finite Difference Domain Decomposition Algorithm for the Heat EquationWeidong Shen, Shulin Yang. 1-10 [doi]
- A Fast Construction Algorithm for the Incidence Matrices of a Class of Symmetric Balanced Incomplete Block DesignsJu-Hyun Lee, Sungkwon Kang, Hoo-Kyun Choi. 11-19 [doi]
- ILUTP Mem: A Space-Efficient Incomplete LU PreconditionerTzu-Yi Chen. 20-28 [doi]
- Optimal Gait Control for a Biped Locomotion Using Genetic AlgorithmJin-Geol Kim, SangHo Choi, Ki heon Park. 29-38 [doi]
- A Bayes Algorithm for the Multitask Pattern Recognition Problem - Direct and Decomposed Independent ApproachesEdward Puchala. 39-45 [doi]
- Energy Efficient Routing with Power Management to Increase Network Lifetime in Sensor NetworksHyung-Wook Yoon, Bo-Hyeong Lee, Tae-Jin Lee, Min Young Chung. 46-55 [doi]
- New Parameter for Balancing Two Independent Measures in Routing PathMoonseong Kim, Young-Cheol Bang, Hyunseung Choo. 56-65 [doi]
- A Study on Efficient Key Distribution and Renewal in Broadcast EncryptionDeok-Gyu Lee, Im-Yeong Lee. 66-76 [doi]
- Self-Tuning Mechanism for Genetic Algorithms Parameters, an Application to Data-Object Allocation in the WebJoaquín Pérez, Rodolfo A. Pazos, Juan Frausto Solís, Guillermo Rodríguez, Laura Cruz, Graciela Mora O., Héctor J. Fraire H.. 77-86 [doi]
- Digit-Serial AB2 Systolic Array for Division in GF(2:::m:::)Nam-Yeun Kim, Kee-Young Yoo. 87-96 [doi]
- Design and Experiment of a Communication-Aware Parallel Quicksort with Weighted Partition of ProcessorsSangman Moh, Chansu Yu, Dongsoo Han. 97-105 [doi]
- A Linear Systolic Array for Multiplication in GF(2:::m:::) for High Speed Cryptographic ProcessorsSoonhak Kwon, Chang Hoon Kim, Chun-Pyo Hong. 106-116 [doi]
- Price Driven Market Mechanism for Computational Grid Resource AllocationLi Chunlin, Zhengding Lu, Li Layuan. 117-126 [doi]
- A Novel LMS Method for Real-Time Network Traffic PredictionXinyu Yang, Ming Zeng, Zhao Rui, Yi Shi. 127-136 [doi]
- Dynamic Configuration between Proxy Caches within an IntranetVíctor Jesús Sosa Sosa, Juan Gabriel González Serna, Xochitl Landa Miguez, Francisco Verduzco Medina, Manuel A. Valdés Marrero. 137-146 [doi]
- A Market-Based Scheduler for JXTA-Based Peer-to-Peer Computing SystemTan Tien Ping, Gian Chand Sodhy, Chan Huah Yong, Fazilah Haron, Rajkumar Buyya. 147-157 [doi]
- Reducing on the Number of Testing Items in the Branches of Decision TreesHyontai Sug. 158-166 [doi]
- CORBA-Based, Multi-threaded Distributed Simulation of Hierarchical DEVS Models: Transforming Model Structure into a Non-hierarchical OneKi-Hyung Kim, Won-Seok Kang. 167-176 [doi]
- The Effects of Network Topology on Epidemic AlgorithmsJesús Acosta-Elías, Ulises Pineda Rico, Jose Martin Luna-Rivera, Enrique Stevens-Navarro, Isaac Campos-Canton, Leandro Navarro-Moldes. 177-184 [doi]
- A Systematic Database Summary Generation Using the Distributed Query Discovery SystemTae-Wan Ryu, Christoph F. Eick. 185-195 [doi]
- Parallel Montgomery Multiplication and Squaring over GF(2:::m:::) Based on Cellular AutomataKyo-Min Ku, Kyeoung Ju Ha, Wi Hyun Yoo, Kee-Young Yoo. 196-205 [doi]
- A Decision Tree Algorithm for Distributed Data Mining: Towards Network Intrusion DetectionSung Baik, Jerzy W. Bala. 206-212 [doi]
- Maximizing Parallelism for Nested Loops with Non-uniform DependencesSam Jin Jeong. 213-222 [doi]
- Fair Exchange to Achieve Atomicity in Payments of High Amounts Using Electronic CashMagdalena Payeras-Capellà, Josep Lluís Ferrer-Gomila, Llorenç Huguet i Rotger. 223-232 [doi]
- Gossip Based Causal Order Broadcast AlgorithmChaYoung Kim, JinHo Ahn, Chong-Sun Hwang. 233-242 [doi]
- Intermediate View Synthesis from Stereoscopic Videoconference ImagesChaohui Lu, Ping An, Zhaoyang Zhang. 243-250 [doi]
- Extract Shape from Clipart Image Using Modified Chain Code - Rectangle RepresentationChang-Gyu Choi, Yongseok Chang, Jung Hyun Cho, Sung-Ho Kim. 251-260 [doi]
- Control Messaging Channel for Distributed Computer SystemsBoguslaw Cyganek, Jan Borgosz. 261-270 [doi]
- Scene-Based Video Watermarking for Broadcasting SystemsUk-Chul Choi, Yoon-Hee Choi, Dae-Chul Kim, Tae-Sun Choi. 271-280 [doi]
- Distortion-Free of General Information with Edge Enhanced Error Diffusion HalftoningByong-Won Hwang, Tae-Ha Kang, Tae-Seung Lee. 281-290 [doi]
- Enhanced Video Coding with Error Resilience Based on Macroblock Data ManipulationTanzeem Muzaffar, Tae-Sun Choi. 291-300 [doi]
- Filtering of Colored Noise for Signal EnhancementMyung-Eui Lee, Pyung Soo Kim. 301-310 [doi]
- Model-Based Human Motion Tracking and Behavior Recognition Using Hierarchical Finite State AutomataJihun Park, Sunghun Park, Jake K. Aggarwal. 311-320 [doi]
- Effective Digital Watermarking Algorithm by Contour DetectionWon-Hyuck Choi, Hye-jin Shim, Jung-Sun Kim. 321-328 [doi]
- New Packetization Method for Error Resilient Video CommunicationsKook-yeol Yoo. 329-337 [doi]
- A Video Mosaicking Technique with Self Scene Segmentation for Video IndexingYoon-Hee Choi, Yeong Kyeong Seong, Joo-Young Kim, Tae-Sun Choi. 338-347 [doi]
- Real-Time Video Watermarking for MPEG StreamsKyung-Pyo Kang, Yoon-Hee Choi, Tae-Sun Choi. 348-358 [doi]
- A TCP-Friendly Congestion Control Scheme Using Hybrid Approach for Reducing Transmission Delay of Real-Time Video StreamJong-Un Yang, Jeong-Hyun Cho, Sang-Hyun Bae, In-Ho Ra. 359-368 [doi]
- Object Boundary Edge Selection Using Level-of-Detail Canny EdgesJihun Park, Sunghun Park. 369-378 [doi]
- Inverse Dithering through IMAP EstimationMonia Discepoli, Ivan Gerace. 379-388 [doi]
- A Study on Neural Networks Using Taylor Series Expansion of Sigmoid Activation FunctionFevzullah Temurtas, Ali Gulbag, Nejat Yumusak. 389-397 [doi]
- A Study on Neural Networks with Tapped Time Delays: Gas Concentration EstimationFevzullah Temurtas, Cihat Tasaltin, Hasan Temurtas, Nejat Yumusak, Zafer Ziya Ozturk. 398-405 [doi]
- Speech Emotion Recognition and Intensity EstimationMingli Song, Chun Chen, Jiajun Bu, Mingyu You. 406-413 [doi]
- Speech Hiding Based on Auditory WaveletLiran Shen, Xueyao Li, Huiqiang Wang, Rubo Zhang. 414-420 [doi]
- Automatic Selecting Coefficient for Semi-blind WatermarkingSung-kwan Je, Jae-Hyun Cho, Eui-Young Cha. 421-430 [doi]
- Network Probabilistic Connectivity: Optimal StructuresOlga K. Rodionova, Alexey S. Rodionov, Hyunseung Choo. 431-440 [doi]
- Differentiated Web Service System through Kernel-Level Realtime Scheduling and Load BalancingMyung-Sub Lee, Chang-Hyeon Park, Young-Ho Sohn. 441-450 [doi]
- Adaptive CBT/Anycast Routing Algorithm for Multimedia Traffic OverloadKwang-Jae Lee, Won-Hyuck Choi, Jung-Sun Kim. 451-459 [doi]
- Achieving Fair New Call CAC for Heterogeneous Services in Wireless NetworksSungKee Noh, YoungHa Hwang, Ki-Il Kim, Sang-Ha Kim. 460-470 [doi]
- Application of MCDF Operations in Digital Terrain Model ProcessingZhiqiang Ma, Anthony Watson, Wanwu Guo. 471-478 [doi]
- Visual Mining of Market Basket Association RulesKesaraporn Techapichetvanich, Amitava Datta. 479-488 [doi]
- Visualizing Predictive Models in Decision Tree GenerationSung Baik, Jerzy W. Bala, Sung Ahn. 489-495 [doi]
- A Model for Use Case Priorization Using Criticality AnalysisJosé Daniel García, Jesús Carretero, José María Pérez, Félix García. 496-505 [doi]
- Using a Goal-Refinement Tree to Obtain and Refine Organizational RequirementsHugo Estrada, Oscar Pastor, Alicia Martínez, Jose Torres-Jimenez. 506-513 [doi]
- Using C++ Functors with Legacy C LibrariesJan Broeckhove, Kurt Vanmechelen. 514-523 [doi]
- Debugging of Java Programs Using HDT with Program SlicingHoon-Joon Kouh, Ki Tae Kim, Sun-Moon Jo, Weon-Hee Yoo. 524-533 [doi]
- Frameworks as Web ServicesOlivia Graciela Fragoso Diaz, René Santaolaya Salgado, Isaac M. Vásquez Mendez, Manuel A. Valdés Marrero. 534-542 [doi]
- Exception Rules Mining Based on Negative Association RulesOlena Daly, David Taniar. 543-552 [doi]
- A Reduced Codification for the Logical Representation of Job Shop Scheduling ProblemsJuan Frausto Solís, Marco Antonio Cruz-Chavez. 553-562 [doi]
- Action Reasoning with Uncertain ResourcesAlfredo Milani, Valentina Poggioni. 563-573 [doi]
- Software Rejuvenation Approach to Security EngineeringKhin Mi Mi Aung, Jong Sou Park. 574-583 [doi]
- A Rollback Recovery Algorithm for Intrusion Tolerant Intrusion Detection SystemMyung-Kyu Yi, Chong-Sun Hwang. 584-593 [doi]
- Design and Implementation of High-Performance Intrusion Detection SystemByoung-Koo Kim, Ik-Kyun Kim, Ki-Young Kim, Jong-Soo Jang. 594-602 [doi]
- An Authenticated Key Agreement Protocol Resistant to a Dictionary AttackEun-Kyung Ryu, Kee-Won Kim, Kee-Young Yoo. 603-610 [doi]
- A Study on Marking Bit Size for Path Identification Method: Deploying the Pi Filter at the End HostSoon-Dong Kim, Man-Pyo Hong, Dong Kyoo Kim. 611-616 [doi]
- Efficient Password-Based Authenticated Key Agreement ProtocolSung-Woon Lee, Woo-Hun Kim, Hyun-Sung Kim, Kee-Young Yoo. 617-626 [doi]
- A Two-Public Key Scheme Omitting Collision Problem in Digital SignatureSung-Keun Song, Hee Yong Youn, Chang-Won Park. 627-636 [doi]
- A Novel Data Encryption and Distribution Approach for High Security and Availability Using LU DecompositionSung Jin Choi, Hee Yong Youn. 637-646 [doi]
- An Efficient Conference Key Distribution System Based on Symmetric Balanced Incomplete Block DesignYoungjoo Cho, ChangKyun Chi, Ilyong Chung. 647-654 [doi]
- Multiparty Key Agreement Protocol with Cheater Identification Based on Shamir Secret SharingKee-Young Yoo, Eun-Kyung Ryu, Jae-Yuel Im. 655-664 [doi]
- Security of Shen et al. s Timestamp-Based Password Authentication SchemeEun-Jun Yoon, Eun-Kyung Ryu, Kee-Young Yoo. 665-671 [doi]
- ID-Based Authenticated Multiple-Key Agreement Protocol from PairingsKee-Won Kim, Eun-Kyung Ryu, Kee-Young Yoo. 672-680 [doi]
- A Fine-Grained Taxonomy of Security Vulnerability in Active Network EnvironmentsJin S. Yang, Young J. Han, Dong-Soo Kim, Beom H. Chang, Tai-Myung Chung, Jung C. Na. 681-688 [doi]
- A Secure and Flexible Multi-signcryption SchemeSeung-Hyun Seo, Sang Ho Lee. 689-697 [doi]
- User Authentication Protocol Based on Human Memorable Password and Using RSAIkSu Park, Seung Bae Park, ByeongKyun Oh. 698-707 [doi]
- Effective Packet Marking Approach to Defend against DDoS AttackHeeran Lim, Manpyo Hong. 708-716 [doi]
- A Relationship between Security Engineering and Security EvaluationTai-Hoon Kim, Haeng-Kon Kim. 717-724 [doi]
- A Relationship of Configuration Management Requirements between KISEC and ISO/IEC 15408Hae-ki Lee, Jae-sun Shim, Seung Lee, Jong-bu Kim. 725-734 [doi]
- Term-Specific Language Modeling Approach to Text CategorizationSeung-Shik Kang. 735-742 [doi]
- Context-Based Proofreading of Structured DocumentsWon-Sung Sohn, Teuk-Seob Song, Jae-Kyung Kim, Yoon-Chul Choy, Kyong-Ho Lee, Sung-Bong Yang, Francis Neelamkavil. 743-753 [doi]
- Implementation of New CTI Service Platform Using Voice XMLJeong-Hoon Shin, Kwang-Seok Hong, Sung-Kyun Eom. 754-762 [doi]
- Storing Together the Structural Information of XML Documents in Relational DatabasesMin Jin, Byung-Joo Shin. 763-771 [doi]
- Annotation Repositioning Methods in the XML Documents: Context-Based ApproachWon-Sung Sohn, Myeong-Cheol Ko, Hak-Keun Kim, Soon-Bum Lim, Yoon-Chul Choy. 772-782 [doi]
- Isolating and Specifying the Relevant Information of an Organizational Model: A Process Oriented Towards Information System GenerationAlicia Martínez, Oscar Pastor, Hugo Estrada. 783-790 [doi]
- A Weighted Fuzzy Min-Max Neural Network for Pattern Classification and Feature ExtractionHo Joon Kim, Tae-Wan Ryu, Thai T. Nguyen, Joon Shik Lim, Sudhir Gupta. 791-798 [doi]
- The eSAIDA Stream Authentication SchemeYongsu Park, Yookun Cho. 799-807 [doi]
- An Object-Oriented Metric to Measure the Degree of Dependency Due to Unused InterfacesRené Santaolaya Salgado, Olivia Graciela Fragoso Diaz, Manuel A. Valdés Marrero, Isaac M. Vásquez Mendez, Sheila L. Delfín Lara. 808-817 [doi]
- End-to-End QoS Management for VoIP Using DiffServEun-Ju Ha, Byeong-Soo Yun. 818-827 [doi]
- Multi-modal Biometrics System Using Face and SignatureDae Jong Lee, Keun Chang Kwak, Jun Oh Min, Myung-Geun Chun. 828-837 [doi]
- Using 3D Spatial Relationships for Image Retrieval by XML AnnotationSooCheol Lee, Eenjun Hwang, YangKyoo Lee. 838-848 [doi]
- Association Inlining for Mapping XML DTDs to Relational TablesByung-Joo Shin, Min Jin. 849-858 [doi]
- XCRAB: A Content and Annotation-Based Multimedia Indexing and Retrieval SystemSeungmin Rho, SooCheol Lee, Eenjun Hwang, YangKyoo Lee. 859-868 [doi]
- An Efficient Cache Conscious Multi-dimensional Index StructureJeong Min Shim, Seok Il Song, Young Soo Min, Jae Soo Yoo. 869-876 [doi]
- Tracking of Moving Objects Using Morphological Segmentation, Statistical Moments, and Radon TransformMuhammad Bilal Ahmad, Min Hyuk Chang, Seung-Jin Park, Jong-An Park, Tae-Sun Choi. 877-886 [doi]
- Feature Extraction and Correlation for Time-to-Impact Segmentation Using Log-Polar ImagesFernando Pardo, Jose Antonio Boluda, Esther de Ves. 887-895 [doi]
- Object Mark Segmentation Algorithm Using Dynamic Programming for Poor Quality Images in Automated Inspection ProcessDong Joong Kang, Jong-Eun Ha, In-Mo Ahn. 896-905 [doi]
- A Line-Based Pose Estimation Algorithm for 3-D Polyhedral Object RecognitionTae-Jung Lho, Dong Joong Kang, Jong-Eun Ha. 906-914 [doi]
- Initialization Method for the Self-Calibration Using Minimal Two ImagesJong-Eun Ha, Dong Joong Kang. 915-923 [doi]
- Face Recognition for Expressive Face ImagesHyoun-Joo Go, Keun Chang Kwak, Sung-Suk Kim, Myung-Geun Chun. 924-932 [doi]
- Kolmogorov-Smirnov Test for Image ComparisonEugene Demidenko. 933-939 [doi]
- Modified Radius-Vector Function for Shape Contour DescriptionSung Kwan Kang, Muhammad Bilal Ahmad, Jong-Hun Chun, PanKoo Kim, Jong-An Park. 940-947 [doi]
- Image Corner Detection Using Radon TransformSeung-Jin Park, Muhammad Bilal Ahmad, Seung-Hak Rhee, Seung Jo Han, Jong-An Park. 948-955 [doi]
- Analytical Comparison of Conventional and MCDF Operations in Image ProcessingYinghua Lu, Wanwu Guo. 956-963 [doi]
- On Extraction of Facial Features from Color ImagesJin Ok Kim, Jin-Soo Kim, Young Ro Seo, Bum Ro Lee, Chin Hyun Chung, Key Seo Lee, Wha Young Yim, Sang Hyo Lee. 964-973 [doi]
- An Architecture for Mobility Management in Mobile Computing NetworksDohyeon Kim, Beongku An. 974-982 [doi]
- An Adaptive Security Model for Heterogeneous Networks Using MAUT and Simple HeuristicsJongwoo Chae, Ghita Kouadri Mostéfaoui, Mokdong Chung. 983-993 [doi]
- A Hybrid Restoration Scheme Based on Threshold Reaction Time in Optical Burst-Switched NetworksHae-Joung Lee, Kyu-Yeop Song, Won-Ho So, Jing Zhang, Debasish Datta, Biswanath Mukherjee, Young-Chon Kim. 994-1004 [doi]