Abstract is missing.
- Parallel Image Understanding on a Multi-DSP SystemMuhammet Fikret Ercan. 1-12 [doi]
- Parallel Solution of High Speed Low Order FDTD on 2D Free Space Wave PropagationMohammad Khatim Hasan, Mohamed Othman, Zulkifly Abbas, Jumat Sulaiman, Fatimah Ahmad. 13-24 [doi]
- Visibility Computations - Scanline Algorithms and TechniquesMizanur Rahman. 25-37 [doi]
- Adaptive Scheduling of Parallel Computations for SPMD TasksMikhail Panshenskov, Alexander Vakhitov. 38-50 [doi]
- Determining the Visibility of a Planar Set of Line Segments in O(n log log n) TimeFrank Dévai, Marina L. Gavrilova. 51-62 [doi]
- An Efficient Identity-Based Ring Signature Scheme and Its ExtensionJianhong Zhang. 63-74 [doi]
- Changes of Cyber-Terrorism: Autonomous Terrors and Counter-MeasuresIn-Jung Kim, Cheol Won Lee, Eul-Gyu Im. 75-84 [doi]
- Keystroke Pressure-Based Typing Biometrics Authentication System Using Support Vector MachinesWahyudi Martono, Hasimah Ali, Momoh-Jimoh E. Salami. 85-93 [doi]
- An Attack Classification Mechanism Based on Multiple Support Vector MachinesJungtaek Seo. 94-103 [doi]
- An Efficient Iteration Decoding Stopping Criterion for Turbo CodesByoung-Sup Shim, Hyoung-Keun Park, Sun-Youb Kim, Yu-Chan Ra. 104-112 [doi]
- Efficient an Implementation Method Research of a Smart Card Atomic OperationEun A. Jun, Seok Won Jung, Jeom Goo Kim, Jong In Lim. 113-121 [doi]
- Mobile Agent Based Intrusion Detection System Adopting Hidden Markov ModelDo Hyeon Lee, Doo-young Kim, Jae-Il Jung. 122-130 [doi]
- Location-Aided Secure Routing Scheme in Mobile Ad Hoc NetworksDo Hyeon Lee, Sun Choi, Ji-hyeon Choi, Jae-Il Jung. 131-139 [doi]
- A Design of Fair Blind Signatures Protocol Using PVNIOTJeom Goo Kim, Do Hyeon Lee, Jeog-bae Lee. 140-147 [doi]
- An Access Control Using SPKI Certificate in Peer-to-Peer EnvironmentJeom Goo Kim, Do Hyeon Lee. 148-156 [doi]
- Security and Test Environment for SIPGeuk Lee, Seok Tae Kim, Inkyu Han, Chang-Yong Lee, Seon-Ho Park, Do Won Yi, Jung-Min Oh. 157-165 [doi]
- Simulation Based Nodal Analysis for Effects Based OperationsGang Taek Lee, Dong Hwi Lee, Kuinam J. Kim. 166-176 [doi]
- A Stable Evidence Collection Procedure of a Volatile Data in ResearchYong Ho Kim, Dong Hwi Lee, Kuinam J. Kim. 177-184 [doi]
- Intelligence Report and the Analysis Against the Phishing Attack Which Uses a Social Engineering TechniqueDong Hwi Lee, Kyong Ho Choi, Kuinam J. Kim. 185-194 [doi]
- Energy-Efficient Distance Based Clustering Routing Scheme for Wireless Sensor NetworksYoung-Ju Han, Seon-Ho Park, Jung-Ho Eom, Tai-Myoung Chung. 195-206 [doi]
- An Automatic Mobile Web Generation Method from PC Web Using DFS and W-DFSDaeHyuck Park, Euisun Kang, Younghwan Lim. 207-215 [doi]
- Cross-Layer Design for Reducing Handoff Latency in Mobile NetworkWoo Jin Jung, Hyung Joo Ki, Tae-Jin Lee, Hyunseung Choo, Min Young Chung. 216-225 [doi]
- Quick Paging IP Scheme Using Residence Pattern of Mobile NodeSukyoung Ahn, Youngsong Mun. 226-236 [doi]
- An Efficient Macro Mobility Scheme Supporting Reactive Fast Handover Mode in HMIPv6Kyunghye Lee, Youngsong Mun. 237-246 [doi]
- Access Scheduling on the Control Channels in TDMA Wireless Mesh NetworksHongju Cheng, Xiaohua Jia, Hai Liu. 247-260 [doi]
- An Enhanced Bandwidth Reservation Scheme Based on Road Topology Information for QoS Sensitive Multimedia Wireless Cellular NetworksMaher Al-Sanabani, Subramaniam Shamala, Mohamed Othman, Zuriati Zukarnain. 261-274 [doi]
- Energy Efficient LEACH with TCP for Wireless Sensor NetworksJungrae Kim, Ki-Young Jang, Hyunseung Choo, Won Kim. 275-285 [doi]
- Route Optimization with Additional Destination-Information in Mobile NetworksJeonghoon Park, Sangho Lee, Youho Lee, Hyunseung Choo. 286-295 [doi]
- Requirements Change Management on Feature-Oriented Requirements TracingSangim Ahn, Kiwon Chong. 296-307 [doi]
- A Comparison Between Complexity and Temporal GIS Models for Spatio-temporal Urban ApplicationsMajeed Pooyandeh, Mohammad Saadi Mesgari, Abbas Alimohammadi, Rouzbeh Shad. 308-321 [doi]
- Crawling the Content Hidden Behind Web FormsManuel Álvarez, Juan Raposo, Alberto Pan, Fidel Cacheda, Fernando Bellas, Victor Carneiro. 322-333 [doi]
- Simple Performance Model for Differentiated Services in Mobile IPv6 NetworksMisun Kim, Youngsong Mun. 334-345 [doi]
- Multi-site Distributed Software Development: Issues, Solutions, and ChallengesPornpit Wongthongtham, Elizabeth Chang, Tharam S. Dillon. 346-359 [doi]
- A Design and Implementation of Transcoder for Displaying Diagram Data of Multimedia Title on Web BrowserDaeHyuck Park, Euisun Kang, Younghwan Lim. 360-369 [doi]
- A Recommender System Based on Multi-featuresMaria F. Trujillo, Marta Millán, Edward Ortiz. 370-382 [doi]
- Hybrid Intrusion Detection System for Wireless Sensor NetworksTran Hoang Hai, Faraz Idris Khan, Eui-nam Huh. 383-396 [doi]
- A Site-Ranking Algorithm for a Small Group of SitesKijoo Kim, MunSu Kang, YoungSik Choi. 397-405 [doi]
- Cognitive Model of Schema as Complex SystemKang Soo Tae, An Ryeol Jeong, Kang-Soo You. 406-414 [doi]
- Improved Fast Handover Protocol Using HMIPv6 Based on IEEE 802.16e NetworkGyodu Koo, Ki-Sung Yu, Minki Noh, Youngsong Mun. 415-423 [doi]
- Advanced Macro Mobility Handover Supporting Fast Handover in HMIPv6Kyunghye Lee, Youngsong Mun. 424-433 [doi]
- New Fast Algorithm for Constructing Concept LatticeYajun Du, Zheng Pei, Haiming Li, Dan Xiang, Kai Li. 434-447 [doi]
- Measuring the Usability of Software Applications: Metrics for ::::Behaviorness::::Amalina Farhi Ahmad Fadzlah, Aziz Deraman. 448-454 [doi]
- An Efficient Information Dissemination for Publish/Subscription System on GridBo-Hyun Seok, Pill-Woo Lee, Eui-nam Huh, Ki-Moon Choi, Kang Soo Tae. 455-468 [doi]
- On Dynamic Multicast Trees for Stormless Binding Update in Network MobilityMoonseong Kim, Sungchang Lee, Hyunseung Choo. 469-478 [doi]
- Authentication Scheme Using Mobile IPv4 in VPN IntranetYoungsong Mun, Miyoung Kim. 479-488 [doi]
- Implementation and Attacks Analysis of a HoneypotCláudia J. Barenco Abbas, L. Javier García-Villalba, Victoria López López. 489-502 [doi]
- An Enhanced One-Round Pairing-Based Tripartite Authenticated Key Agreement ProtocolMeng-Hui Lim, Sanggon Lee, Youngho Park, Hoonjae Lee. 503-513 [doi]
- Integrating Identity Based Cryptography with Cryptographically Generated Addresses in Mobile IPv6Zhen Cao, Hui Deng, Yuanchen Ma, Po Hu. 514-525 [doi]
- Supporting Mobility in GKM over Ad-Hoc Network Using a Decentralized and Spontaneous AlgorithmJuan Hernández-Serrano, Josep Pegueroles, Miguel Soriano. 526-539 [doi]
- Using Adaptative Encryption for Ubiquitous EnvironmentsAntonio Izquierdo, Joaquín Torres Márquez, José María Sierra, Mildrey Carbonell. 540-548 [doi]
- Estimation of TTP Features in Non-repudiation ServiceMildrey Carbonell, José María Sierra, Jose Antonio Onieva, Javier Lopez, Jianying Zhou. 549-558 [doi]
- TLKMS: A Dynamic Keys Management Scheme for Large-Scale Wireless Sensor NetworksHuanzhao Wang, Dongwei Luo, Yufei Guo, Qingping Zhao. 559-572 [doi]
- Fuzzy Security Parameter Determining Method for the Commutative Cipher Based Filtering in Sensor NetworksHae Young Lee, Tae Ho Cho. 573-583 [doi]
- Design and Implementation of Wireless Sensor Based-Monitoring System for Smart FactorySeok-Cheol Lee, Tae Gun Jeon, Hyun-Suk Hwang, Chang Soo Kim. 584-592 [doi]
- Energy Efficient Route Recovery Methods for Wireless Sensor Networks Using Hybrid CheckpointingKwangMo Jung, Joong-Jin Kook, Kwang-Soon Choi, Seong-Dong Kim, Sangwon Min. 593-601 [doi]
- AM-GM Difference Based Adaptive Sampling for Monte Carlo Global IlluminationQing Xu, Mateu Sbert, Miquel Feixas, Jianfeng Zhang. 602-611 [doi]
- Data-Driven Feature Control Models for Creating Virtual FacesYu Zhang. 612-626 [doi]
- Variable Neighbourhood Texture Synthesis with Patch InitialisationMinh Tran, Amitava Datta. 627-638 [doi]
- Multi-Resolution Protein ModelDeok-Soo Kim, Bohyung Lee, Chung In Won, Donguk Kim, Joonghyun Ryu, Youngsong Cho, Chong-Min Kim, Sunghoon Lee, Jonghwa Bhak. 639-652 [doi]
- Modeling Origami for Computational Construction and BeyondTetsuo Ida, Hidekazu Takahashi, Mircea Marin, Fadoua Ghourabi. 653-665 [doi]
- A Ghost Cell-Based Data Structure for Multiresolution MeshesRui Rodrigues, José F. M. Morgado, Frutuoso G. M. Silva, Abel J. P. Gomes. 666-679 [doi]
- Bézier Curve and Surface Fitting of 3D Point Clouds Through Genetic Algorithms, Functional Networks and Least-Squares ApproximationAkemi Gálvez, Andrés Iglesias, Angel Cobo, Jaime Puig-Pey, Jesús Espinola. 680-693 [doi]
- Markov-Gibbs Random Field Modeling of 3D Skin Surface Textures for Haptic ApplicationsNazr-e-Batool, Ahmad Fadzil M. Hani, Vooi Voon Yap. 694-705 [doi]
- Elliptic Polygon Based 2D Sketch Interface for 3D Shape MatchingJaeho Lee, Joon Young Park, Young Choi. 706-715 [doi]
- View Synthesis of the New Viewpoint Based on Contour InformationZhi-ping Hu, Yuan-jun He, Zong-ying Uo. 716-726 [doi]
- DTIWeb: A Web-Based Framework for DTI Data Visualization and ProcessingFerran Prados, Imma Boada, Miquel Feixas, A. Prats, G. Blasco, S. Pedraza, J. Puig. 727-740 [doi]
- A New Way to Re-using PathsQing Xu, Mateu Sbert. 741-750 [doi]
- A Routing Scheme of Mobile Sink in Sensor NetworksJongchan Lee, Miyoung Hwang, Sangjoon Park, HaeSuk Jang, Byunggi Kim. 751-763 [doi]
- Explicit Routing Designation (ERD) Method the Cache Information in Nested Mobile NetworksJiyoung Song, Sangjoon Park, Jongchan Lee, Hyunjoo Moon, Byunggi Kim. 764-777 [doi]
- Performance Analysis of TCP Downstream Between Heterogeneous Terminals in an Infrastructure NetworkJi Hong Kim, Yong-Hyun Kim, Youn-Sik Hong, Ki-Young Lee. 778-789 [doi]
- An Administration Structure for the OLSR ProtocolVinicius M. Pacheco, Ricardo Staciarini Puttini. 790-803 [doi]
- Obstacle Mobility Model Based on Activity Area in Ad Hoc NetworksHamideh Babaei, Mahmood Fathy, Morteza Romoozi. 804-817 [doi]
- A XML Script-Based Testing Tool for Embedded SoftwaresJongbae Moon, Donggyu Kwak, Yongyun Cho, Sangjoon Park, Jongchan Lee. 818-828 [doi]
- A Context-Adaptive Workflow Language for Ubiquitous Computing EnvironmentsYongyun Cho, Kyoungho Shin, Jongsun Choi, Jaeyoung Choi. 829-838 [doi]
- A Semantic Interoperable Context Infrastructure Using Web ServicesEunhoe Kim, Jaeyoung Choi. 839-848 [doi]
- An Effective Detection Method for Clustering Similar XML DTDs Using Tag SequencesHyun-Joo Moon, Jae-Woo Yoo, Jongmyung Choi. 849-860 [doi]
- An Automatic Correction Tool for Relational Algebra QueriesJosep Soler, Imma Boada, Ferran Prados, Jordi Poch, Ramón Fabregat. 861-872 [doi]
- Study on the Nonlinearity of the Nonstationary Impulse Signal Using Reassigned Time-Frequency AnalysisTae-Gun Jeong. 873-882 [doi]
- Development of Systematic Design Automation System for Hemming Die Manufacturing ProcessSeoung Soo Lee, Ho-Yeon Ryu, Keun-Sang Park, Hyo Sang Jung. 883-894 [doi]
- Numerical Simulation of the Lateral Frequency Response of a Thin Cantilever Beam-Like Structure by Using the Finite Element ModelDojoong Kim, Tae-Gun Jeong. 895-906 [doi]
- On the Ink Transfer Process in Gravure PrintingSuhong Ahn, Yang Na. 907-918 [doi]
- A Study on the Optimal Taper Tension Control in a Roll to Roll MachineChangwoo Lee, Jangwon Lee, Keehyun Shin. 919-930 [doi]
- On-Line Measurement of Wrinkle Using Machine VisionHoang Minh To, Dong Keun Shin, Sung-Lim Ko. 931-940 [doi]
- An Effective Visualization and Analysis Method for Edge MeasurementAndrey Toropov. 941-950 [doi]
- The Analysis of Film Flow Around Rotating Roller Partially Immersed InkSeung-Hwan Yu, Soojin Kang, Kwan-Soo Lee, Sukkee Um. 951-960 [doi]
- An Automated Design System of Press Die Components Using 3-D CAD LibraryC. W. Kim, C. H. Park, S.-S. Lee. 961-974 [doi]
- Security Analysis of TORA Routing ProtocolVee Liem Chee, Wei-Chuen Yau. 975-986 [doi]
- A Privacy Protecting UMTS AKA Protocol Providing Perfect Forward SecrecyDaeyoung Kim, Younggang Cui, Sangjin Kim, Heekuck Oh. 987-995 [doi]
- Secure Mobile Content Delivery Using Dynamic Group Key Agreement with Batch VerificationSeokhyang Cho, Kiwon Song, Dongsub Cho, Dongho Won. 996-1007 [doi]
- An Enhanced ID-Based Deniable Authentication Protocol on PairingsMeng-Hui Lim, Sanggon Lee, Youngho Park, Hoonjae Lee. 1008-1017 [doi]
- Design of Hybrid Network Discovery Module for Detecting Client Applications and ActiveX ControlsKyounghee Ko, Pilyong Kang, Wontae Sim. 1018-1027 [doi]
- An Efficient Re-keying Scheme for Cluster Based Wireless Sensor NetworksFaraz Idris Khan, Hassan Jameel, Syed Muhammad Khaliq-ur-rehman Raazi, Adil Mehmood Khan, Eui-nam Huh. 1028-1037 [doi]
- Secure Protocol for Fast Authentication in EAP-Based Wireless NetworksRafael Marín López, Santiago Zapata Hernandez, Antonio F. Gómez-Skarmeta. 1038-1051 [doi]
- Using Return Routability for Authentication of Fast Handovers in Mobile IPv6Youngsong Mun, Kyunghye Lee, Seonggeun Ryu, Teail Shin. 1052-1061 [doi]
- Enhancement for Security of Peer-to-Peer by Expanding CGA MechanismSeonggeun Ryu, Youngsong Mun. 1062-1071 [doi]
- A Simplified Anonymous Dynamic Source Routing Protocol for Ad-Hoc NetworksChunum Kong, Hyunseung Choo, Won Kim. 1072-1084 [doi]
- Proactive Code Verification Protocol in Wireless Sensor NetworkYoung-Geun Choi, Jeonil Kang, DaeHun Nyang. 1085-1096 [doi]
- A Trust Management Model for PACS-GridHyun-Sook Cho, Bong-Hwan Lee, Kyu-Won Lee. 1097-1106 [doi]
- N-Dimensional Grid-Based Key Predistribution in Wireless Sensor NetworksJong-Myoung Kim, Young-Ju Han, Seon-Ho Park, Tai-Myoung Chung. 1107-1120 [doi]