Abstract is missing.
- Framework of Integrated System for the Innovation of Mold Manufacturing Through Process Integration and CollaborationBo Hyun Kim, Sung-Bum Park, Gyu-Bong Lee, So Young Chung. 1-10 [doi]
- A Study on Automated Design System for a Blow MouldYong Ju Cho, Kwang Yeol Ryu, Seok Woo Lee. 11-19 [doi]
- Development of an Evaluation System of the Informatization Level for the Mould Companies in KoreaYong Ju Cho, Sung Hee Lee. 20-32 [doi]
- Framework of a Collaboration-Based Engineering Service System for Mould IndustryChang-Ho Lee, Yong Ju Cho. 33-44 [doi]
- Meta-modelling Syntax and Semantics of Structural Concepts for Open Networked EnterprisesMohamed Bouhdadi, Youssef Balouki, El maati Chabbar. 45-54 [doi]
- Component Specification for Parallel Coupling InfrastructureJay Walter Larson, Boyana Norris. 55-68 [doi]
- Real-Time Navigation for a Mobile Robot Based on the Autonomous Behavior AgentLu Xu, Liguo Zhang, Yangzhou Chen. 69-80 [doi]
- Concurrent Subsystem-Component Development Model (CSCDM) for Developing Adaptive E-Commerce SystemsLiangtie Dai, Wanwu Guo. 81-91 [doi]
- A Quantitative Approach for Ranking Change Risk of Component-Based SoftwareChengying Mao. 92-103 [doi]
- Relating Software Architecture Views by Using MDARogelio N. Limón Cordero, Isidro Ramos Salavert. 104-114 [doi]
- Update Propagation Technique for Data GridMohammed Radi, Ali Mamat, Mustafa Mat Deris, Hamidah Ibrahim, Subramaniam Shamala. 115-127 [doi]
- A Spatiotemporal Database Prototype for Managing Volumetric Surface Movement Data in Virtual GISMohd Shafry Mohd Rahim, Abdul Rashid Mohamed Shariff, Shattri Mansor, Ahmad Rodzi Mahmud, Daut Daman. 128-139 [doi]
- Query Distributed Ontology over Grid EnvironmentNgot Phu Bui, SeungGwan Lee, TaeChoong Chung. 140-153 [doi]
- CSP Transactors for Asynchronous Transaction Level Modeling and IP ReuseLilian Janin, Doug Edwards. 154-168 [doi]
- A Robust Real-Time Message Scheduling Scheme Capable of Handling Channel Errors in Wireless Local Area NetworksJunghoon Lee, Mikyung Kang, Gyung-Leen Park, In-Hye Shin, Hanil Kim, Sang-Wook Kim. 169-178 [doi]
- Design and Implementation of a Tour Planning System for Telematics UsersJunghoon Lee, Eui-young Kang, Gyung-Leen Park. 179-189 [doi]
- Ionospheric F-Layer Critical Frequency Estimation from Digital Ionogram AnalysisNipon Theera-Umpon. 190-200 [doi]
- Study of Digital License Search for Intellectual Property Rights of S/W Source CodeByungRae Cha, Kyungjun Kim, Dongseob Lee. 201-212 [doi]
- Creating Numerically Efficient FDTD Simulations Using Generic C++ ProgrammingIlya Valuev, A. Deinega, A. Knizhnik, B. Potapkin. 213-226 [doi]
- Mutual Authentication Protocol for RFID Tags Based on Synchronized Secret Information with MonitorSong Han, Vidyasagar Potdar, Elizabeth Chang. 227-238 [doi]
- Non-linear Least Squares Features Transformation for Improving the Performance of Probabilistic Neural Networks in Classifying Human Brain Tumors on MRIPantelis Georgiadis, Dionisis Cavouras, Ioannis Kalatzis, Antonis Daskalakis, George C. Kagadis, Koralia Sifaki, Menelaos Malamas, George Nikiforidis, Ekaterini Solomou. 239-247 [doi]
- Adaptive Scheduling for Real-Time Network Traffic Using Agent-Based SimulationMoutaz Saleh, Zulaiha Ali Othman. 248-261 [doi]
- Defining Security Architectural Patterns Based on ViewpointsDavid G. Rosado, Carlos Gutiérrez, Eduardo Fernández-Medina, Mario Piattini. 262-272 [doi]
- A New Nonrepudiable Threshold Proxy Signature Scheme with Valid Delegation PeriodMin-Shiang Hwang, Shiang-Feng Tzeng, Chun-Ta Li. 273-284 [doi]
- Two-Stage Interval Krawczyk-Schwarz Methods with Applications to Nonlinear Parabolic PDEHartmut Schwandt. 285-297 [doi]
- Red-Black EDG ::::SOR:::: Iterative Method Using Triangle Element Approximation for 2D Poisson EquationsJumat Sulaiman, Mohamed Othman, Mohammad Khatim Hasan. 298-308 [doi]
- Performance of Particle Swarm Optimization in Scheduling Hybrid Flow-Shops with Multiprocessor TasksMuhammet Fikret Ercan, Yu-Fai Fung. 309-318 [doi]
- Branch-and-Bound Algorithm for Anycast Flow Assignment in Connection-Oriented NetworksKrzysztof Walkowiak. 319-329 [doi]
- Quasi-hierarchical Evolutionary Algorithm for Flow Optimization in Survivable MPLS NetworksMichal Przewozniczek, Krzysztof Walkowiak. 330-342 [doi]
- An Exact Algorithm for the Minimal Cost Gateways Location, Capacity and Flow Assignment Problem in Two-Level Hierarchical Wide Area NetworksPrzemyslaw Ryba, Andrzej Kasprzak. 343-352 [doi]
- Implementing and Optimizing a Data-Intensive Hydrodynamics Application on the Stream ProcessorYing Zhang, Gen Li, Xuejun Yang. 353-366 [doi]
- On Disconnection Node Failure and Stochastic Static Resilience of P2P Communication NetworksFarshad Safaei, Mahmood Fathy, Ahmad Khonsari, N. Talebanfard. 367-378 [doi]
- An Efficient Sequence Alignment Algorithm on a LARPBSDavid Semé, Sidney Youlou. 379-387 [doi]
- An Effective Unconditionally Stable Algorithm for Dispersive Finite Difference Time Domain SimulationsOmar Ramadan. 388-397 [doi]
- A Novel Congestion Control Scheme for Elastic Flows in Network-on-Chip Based on Sum-Rate OptimizationMohammad Sadegh Talebi, Fahimeh Jafari, Ahmad Khonsari, Mohammad Hossien Yaghmaee. 398-409 [doi]
- 3D Bathymetry Reconstruction from Airborne Topsar Polarized DataMaged Marghany, Mazlan Hashim, Arthur P. Cracknell. 410-420 [doi]
- A Parallel FDTD Algorithm for the Solution of Maxwell s Equations with Nearly PML Absorbing Boundary ConditionsOmar Ramadan. 421-430 [doi]
- Application of Modified ICA to Secure Communications in Chaotic SystemsShih-Lin Lin, Pi-Cheng Tung. 431-444 [doi]
- Zero Memory Information Sources Approximating to Video Watermarking AttacksMihai Mitrea, O. Dumitru, Françoise J. Prêteux, Adriana Vlad. 445-459 [doi]
- On Statistical Independence in the Logistic Map: A Guide to Design New Chaotic Sequences Useful in CryptographyAdriana Vlad, Adrian Luca, Bogdan Badea. 460-474 [doi]
- FVM- and FEM-Solution of Elliptical Boundary Value Problems in Different Coordinate SystemsGünter Bärwolff. 475-485 [doi]
- Digital Simulation for Micro Assembly Arranged at Rectangular Pattern in Micro FactoryMurali Subramaniyam, Sangho Park, Sung-il Choi, Seokho Jang, Joon-Yub Song. 486-494 [doi]
- A New Quantized Input RLS, QI-RLS, AlgorithmAli Amiri 0002, Mahmood Fathy, Mahmood Amintoosi, H. Sadoghi. 495-506 [doi]
- Decentralized Replica Exchange Parallel Tempering: An Efficient Implementation of Parallel Tempering Using MPI and SPRNGYaohang Li, Michael Mascagni, Andrey Gorin. 507-519 [doi]
- Approximation Algorithms for 2-Source Minimum Routing Cost ::::k:::: -Tree ProblemsYen Hung Chen, Gwo-Liang Liao, Chuan Yi Tang. 520-533 [doi]
- On the Expected Value of a Number of Disconnected Pairs of Nodes in Unreliable NetworkAlexey S. Rodionov, Olga K. Rodionova, Hyunseung Choo. 534-543 [doi]
- Linearization of Stream Ciphers by Means of Concatenated AutomataAmparo Fúster-Sabater, Pino Caballero-Gil. 544-554 [doi]
- Effective Quantification of Gene Expression Levels in Microarray Images Using a Spot-Adaptive Compound Clustering-Enhancement-Segmentation SchemeAntonis Daskalakis, Dionisis Cavouras, Panagiotis Bougioukos, Spiros Kostopoulos, Pantelis Georgiadis, Ioannis Kalatzis, George C. Kagadis, George Nikiforidis. 555-565 [doi]
- Biomarker Selection, Employing an Iterative Peak Selection Method, and Prostate Spectra Characterization for Identifying Biomarkers Related to Prostate CancerPanagiotis Bougioukos, Dionisis Cavouras, Antonis Daskalakis, Ioannis Kalatzis, George Nikiforidis, Anastasios Bezerianos. 566-574 [doi]
- Classic Cryptanalysis Applied to Exons and Introns PredictionManuel Aguilar R., Héctor J. Fraire H., Laura Cruz Reyes, Juan Javier González Barbosa, Graciela Mora Guadalupe Castilla V., Claudia Gómez Santillán. 575-584 [doi]
- Chronic Hepatitis and Cirrhosis Classification Using SNP Data, Decision Tree and Decision RuleDong Hoi Kim, Saangyong Uhmn, Young Woong Ko, Sung Won Cho, Jae Youn Cheong, Jin Kim. 585-596 [doi]
- Reconstruction of Suboptimal Paths in the Constrained Edit Distance Array with Application in CryptanalysisSlobodan Petrovic, Amparo Fúster-Sabater. 597-610 [doi]
- Solving a Practical Examination Timetabling Problem: A Case StudyMasri Ayob, Ariff Md. Ab. Malik, Salwani Abdullah, Abdul Razak Hamdan, Graham Kendall, Rong Qu. 611-624 [doi]
- A Geometric Design of Zone-Picking in a Distribution WarehouseYing-Chin Ho, Hui-Ming Wee, Hsiao-Ching Chen. 625-636 [doi]
- Routing Path Generation for Reliable Transmission in Sensor Networks Using GA with Fuzzy Logic Based Fitness FunctionJin Myoung Kim, Tae Ho Cho. 637-648 [doi]
- A Heuristic Local Search Algorithm for Unsatisfiable Cores ExtractionJianmin Zhang, ShengYu Shen, Sikun Li. 649-659 [doi]
- ontoX - A Method for Ontology-Driven Information ExtractionBurcu Yildiz, Silvia Miksch. 660-673 [doi]
- Improving the Efficiency and Efficacy of the K-means Clustering Algorithm Through a New Convergence ConditionJoaquín Pérez Ortega, Rodolfo A. Pazos Rangel, Laura Cruz Reyes, Gerardo Reyes Salgado, Rosy Basave T., Héctor J. Fraire H.. 674-682 [doi]
- Modelling Agent Strategies in Simulated Market Using Iterated Prisoner s DilemmaRaymond Chiong. 683-696 [doi]
- A Local Search Algorithm for a SAT Representation of Scheduling ProblemsMarco Antonio Cruz-Chavez, Rafael Rivera-López. 697-709 [doi]
- A Context-Aware Solution for Personalized En-route Information Through a P2P Agent-Based ArchitectureJosé Santa, Andrés Muñoz, Antonio F. Gómez-Skarmeta. 710-723 [doi]
- A Survey of Revenue Models for Current Generation Social Software s SystemsKevin Chai, Vidyasagar Potdar, Elizabeth Chang. 724-738 [doi]
- Context-Driven Requirements AnalysisJongmyung Choi. 739-748 [doi]
- Performance Analysis of Child/Descendant Queries in an XML-Enabled DatabaseEric Pardede, J. Wenny Rahayu, David Taniar, Ramanpreet Kaur Aujla. 749-762 [doi]
- Diagonal Data Replication in Grid EnvironmentRohaya Latip, Hamidah Ibrahim, Mohamed Othman, Md Nasir Sulaiman, Azizol Abdullah. 763-773 [doi]
- Efficient Shock-Capturing Numerical Schemes Using the Approach of Minimised Integrated Square Difference Error for Hyperbolic Conservation LawsAppanah Rao Appadu, Muhammad Zaid Dauhoo, S. D. D. V. Rughooputh. 774-789 [doi]
- Improvement on Real-Time Face Recognition Algorithm Using Representation of Face and Priority Order MatchingTae-eun Kim, Chin Hyun Chung, Jin Ok Kim. 790-797 [doi]
- Modeling a Legged Robot for Visual ServoingZelmar Echegoyen, Alicia D Anjou, Manuel Graña. 798-810 [doi]
- Information Extraction in a Set of Knowledge Using a Fuzzy Logic Based Intelligent AgentJorge Ropero, Ariel Gómez, Carlos León, Alejandro Carrasco. 811-820 [doi]
- Efficient Methods in Finding Aggregate Nearest Neighbor by Projection-Based FilteringYanmin Luo, Hanxiong Chen, Kazutaka Furuse, Nobuo Ohbo. 821-833 [doi]
- On Multicast Routing Based on Route Optimization in Network MobilityJong-ki Kim, Kisoeb Park, Moonseong Kim. 834-843 [doi]
- An Effective XML-Based Sensor Data Stream Processing Middleware for Ubiquitous ServiceHun-Soon Lee, Seung-Il Jin. 844-857 [doi]
- Opportunistic Transmission for Wireless Sensor Networks Under Delay ConstraintsCa Van Phan, Kikyung Baek, Jeong Geun Kim. 858-871 [doi]
- Workflow-Level Parameter Study Support for Production GridsPéter Kacsuk, Zoltan Farkas, Gabor Hermann. 872-885 [doi]
- Certificate Issuing Using Proxy and Threshold Signatures in Self-initialized Ad Hoc NetworkJeonil Kang, DaeHun Nyang, Abedelaziz Mohaisen, Young-Geun Choi, KoonSoon Kim. 886-899 [doi]
- XWELL: A XML-Based Workflow Event Logging Mechanism and Language for Workflow Mining SystemsMin-Jae Park, Kwang-Hoon Kim. 900-909 [doi]
- Workcase-Oriented Workflow Enactment Components for Very Large Scale WorkflowsJae-Kang Won, Kwang-Hoon Kim. 910-919 [doi]
- A Workcase-Based Distributed Workflow Architecture and Its Implementation Using Enterprize Java Beans FrameworkHyung-Jin Ahn, Kwang-Hoon Kim. 920-928 [doi]
- Building Web Application Fragments Using Presentation FrameworkJunghwa Chae. 929-940 [doi]
- Three-Dimensional Bursting Simulation on Two Parallel SystemsSiham Tabik, Luis F. Romero, Ester M. Garzón, Inmaculada García, J. I. Ramos. 941-949 [doi]
- PAR Reduction Scheme for Efficient Detection of Side Information in OFDM-BLAST SystemMyung-Sun Baek, Sang-Tae Kim, Young-Hwan You, Hyoung-Kyu Song. 950-957 [doi]
- Fuzzy PI Controller for Turbojet Engine of Unmanned AircraftMin Seok Jie, Eun Jong Mo, Kang Woong Lee. 958-967 [doi]
- Implementation of QoS-Aware Dynamic Multimedia Content Adaptation SystemSooCheol Lee, Daesub Yoon, Oh-Cheon Kwon, Eenjun Hwang. 968-977 [doi]
- Experience of Efficient Data Transformation Solution for PCB Product AutomationJung-Soo Han, Gui-Jung Kim. 978-986 [doi]
- Performance Evaluation for Component RetrievalJung-Soo Han. 987-996 [doi]
- The Clustering Algorithm of Design Pattern Using Object-Oriented RelationshipGui-Jung Kim, Jung-Soo Han. 997-1006 [doi]
- Modeling Parametric Web Arc Weight MeasurementWookey Lee, Seungkil Lim, Taesoo Lim. 1007-1016 [doi]
- Performance Analysis of EPC Class-1 Generation-2 RFID Anti-collision ProtocolJeong Geun Kim, Woo Jin Shin, Ji Ho Yoo. 1017-1026 [doi]
- Worst-Case Evaluation of Flexible Solutions in Disjunctive Scheduling ProblemsMohamed Ali Aloulou, Christian Artigues. 1027-1036 [doi]
- The Search for a Good Lattice Augmentation Sequence in Three DimensionsTiancheng Li, Ian Robinson. 1037-1045 [doi]
- Tracing Illegal Users of Video: Reconsideration of Tree-Specific and Endbuyer-Specific MethodsHyun-Ho Kang, Brian M. Kurkoski, Kazuhiko Yamaguchi, Kingo Kobayashi. 1046-1055 [doi]
- Rendering of Translucent Objects Based Upon PRT TechniquesZhang Jiawan, Gao Yang, Sun Jizhou, Jin Zhou. 1056-1065 [doi]
- An Image-Adaptive Semi-fragile Watermarking for Image Authentication and Tamper DetectionHengfu Yang, Xingming Sun, Bin Wang, Zheng Qin. 1066-1075 [doi]
- Identification of Fuzzy Set-Based Fuzzy Systems by Means of Data Granulation and Genetic OptimizationKeon-Jun Park, Sung-Kwun Oh, Hyun-Ki Kim, Witold Pedrycz, Seong-Whan Jang. 1076-1085 [doi]
- Public Key Encryption with Keyword Search Based on K-Resilient IBEDalia Khader. 1086-1095 [doi]
- Efficient Partially Blind Signatures with Provable SecurityQianhong Wu, Willy Susilo, Yi Mu, Fangguo Zhang. 1096-1105 [doi]
- Study on Grid-Based Special Remotely Sensed Data Processing NodeJianqin Wang, Yong Xue, Yincui Hu, Chaolin Wu, Jianping Guo, Lei Zheng, Ying Luo, Ruizhi Sun, Guangli Liu, YunLing Liu. 1106-1113 [doi]
- Novel Algorithms for Quantum Simulation of 3 ::::D:::: Atom-Diatom Reactive ScatteringAshot Gevorkyan, Gabriel G. Balint-Kurti, Alexander V. Bogdanov, Gunnar Nyman. 1114-1123 [doi]
- An Algorithm for Rendering Generalized Depth of Field Effects Based on Simulated Heat DiffusionTodd J. Kosloff, Brian A. Barsky. 1124-1140 [doi]
- Fingerprint Template Protection Using Fuzzy VaultDaesung Moon, Sungju Lee, Seunghwan Jung, Yongwha Chung, Miae Park, Okyeon Yi. 1141-1151 [doi]
- Design and Application of Optimal Path Service System on Multi-level Road NetworkYumin Chen, Jianya Gong, Chenchen wu. 1152-1164 [doi]
- Spatio-temporal Similarity Measure Algorithm for Moving Objects on Spatial NetworksJae-Woo Chang, Rabindra Bista, Young-Chang Kim, Yong-Ki Kim. 1165-1178 [doi]
- Efficient Text Detection in Color Images by Eliminating Reflectance ComponentMi Young Choi, Hyung-Il Choi. 1179-1186 [doi]
- Enhanced Non-disjoint Multi-path Source Routing Protocol for Wireless Ad-Hoc NetworksMoon Jeong Kim, Dong-Hoon Lee, Young Ik Eom. 1187-1196 [doi]