Abstract is missing.
- Ontology-Based Requirements Conflicts Analysis in Activity DiagramsChi-Lun Liu. 1-12 [doi]
- Resource Allocation Optimization for GSD ProjectsSupraja Doma, Larry Gottschalk, Tetsutaro Uehara, Jigang Liu. 13-28 [doi]
- Verification of Use Case with Petri Nets in Requirement AnalysisJinqiang Zhao, Zhenhua Duan. 29-42 [doi]
- Towards Guidelines for a Development Process for Component-Based Embedded SystemsRikard Land, Jan Carlson, Stig Larsson, Ivica Crnkovic. 43-58 [doi]
- Effective Project Leadership in Computer Science and EngineeringFerid Cafer, Sanjay Misra. 59-69 [doi]
- Weyuker s Properties, Language Independency and Object Oriented MetricsSanjay Misra. 70-81 [doi]
- Lattice Constant Prediction of A::2::BB O::6:: Type Double PerovskitesAbdul Majid, Muhammad Farooq Ahmad, Tae-Sun Choi. 82-92 [doi]
- A Grid Implementation of Direct Semiclassical Calculations of Rate CoefficientsAlessandro Costantini, Noelia Faginas Lago, Antonio Laganà , FermÃn Huarte-Larrañaga. 93-103 [doi]
- A Grid Implementation of Direct Quantum Calculations of Rate CoefficientsAlessandro Costantini, Noelia Faginas Lago, Antonio Laganà , FermÃn Huarte-Larrañaga. 104-114 [doi]
- A Grid Implementation of Chimere: Ozone Production in Central ItalyAntonio Laganà , Stefano Crocchianti, Alessandro Costantini, Monica Angelucci, Marco Vecchiocattivi. 115-129 [doi]
- MDA-Based Framework for Automatic Generation of Consistent Firewall ACLs with NATSergio Pozo, A. J. Varela-Vaca, Rafael M. Gasca. 130-144 [doi]
- Testing Topologies for the Evaluation of IPSEC ImplementationsFernando Sánchez-Chaparro, José M. Sierra, Oscar Delgado-Mohatar, Amparo Fúster-Sabater. 145-154 [doi]
- Evaluation of a Client Centric Payment Protocol Using Digital Signature Scheme with Message Recovery Using Self-Certified Public KeyMiguel Viedma Astudillo, Jesús Téllez Isaac, Diego Suarez Touceda, Héctor Plaza López. 155-163 [doi]
- Security Vulnerabilities of a Remote User Authentication Scheme Using Smart Cards Suited for a Multi-server EnvironmentYoungsook Lee, Dongho Won. 164-172 [doi]
- Enhancing Security of a Group Key Exchange Protocol for Users with Individual PasswordsJunghyun Nam, Sangchul Han, Minkyu Park, Juryon Paik, Ung-Mo Kim. 173-181 [doi]
- Smart Card Based AKE Protocol Using Biometric Information in Pervasive Computing EnvironmentsWansuck Yi, Seungjoo Kim, Dongho Won. 182-190 [doi]
- A Practical Approach to a Reliable Electronic ElectionKwang-Woo Lee, Yunho Lee, Seungjoo Kim, Dongho Won. 191-203 [doi]
- Security Weakness in a Provable Secure Authentication Protocol Given Forward Secure Session KeyMijin Kim, Heasuk Jo, Seungjoo Kim, Dongho Won. 204-211 [doi]
- Performance of STBC PPM-TH UWB Systems with Double Binary Turbo Code in Multi-user EnvironmentsEun Cheol Kim, Jin Young Kim. 212-225 [doi]
- Performance Evaluation of PN Code Acquisition with Delay Diversity Receiver for TH-UWB SystemEun Cheol Kim, Jin Young Kim. 226-236 [doi]
- Performance Analysis of Binary Negative-Exponential Backoff Algorithm in IEEE 802.11a WLAN under Erroneous Channel ConditionBum-Gon Choi, Sueng Jae Bae, Tae-Jin Lee, Min Young Chung. 237-249 [doi]
- A Resource-Estimated Call Admission Control Algorithm in 3GPP LTE SystemSueng Jae Bae, Jin Ju Lee, Bum-Gon Choi, Sungoh Kwon, Min Young Chung. 250-260 [doi]
- Problems with Correct Traffic Differentiation in Line Topology IEEE 802.11 EDCA Networks in the Presence of Hidden and Exposed NodesKatarzyna Kosek, Marek Natkaniec, Luca Vollero. 261-275 [doi]
- Adaptive and Iterative GSC/MRC Switching Techniques Based on CRC Error Detection for AF Relaying SystemJong Sung Lee, Dong In Kim. 276-285 [doi]
- WiBro Net.-Based Five Senses Multimedia Technology Using Mobile Mash-UpJung-Hyun Kim, Hyeong-Joon Kwon, Kwang-Seok Hong. 286-301 [doi]
- Overlay Ring Based Secure Group Communication Scheme for Mobile AgentsHyun-Su Jang, Kwangsun Ko, Young-woo Jung, Young Ik Eom. 302-313 [doi]
- Enhanced Multiple-Shift Scheme for Rapid Code Acquisition in Optical CDMA SystemsDahae Chong, Taeung Yoon, Youngyoon Lee, Chonghan Song, Myungsoo Lee, Seokho Yoon. 314-324 [doi]
- AltBOC and CBOC Correlation Functions for GNSS Signal SynchronizationYoungpo Lee, Youngyoon Lee, Taeung Yoon, Chonghan Song, Sanghun Kim, Seokho Yoon. 325-334 [doi]
- Performance Enhancement of IEEE 802.11b WLANs Using Cooperative MAC ProtocolJin-Seong Kim, Tae-Jin Lee. 335-344 [doi]
- Authentication Scheme Based on Trust and Clustering Using Fuzzy Control in Wireless Ad-Hoc NetworksSeong Soo Park, Jong-Hyouk Lee, Tai-Myoung Chung. 345-360 [doi]
- On Relocation of Hopping Sensors for Balanced Migration Distribution of SensorsMoonseong Kim, Matt W. Mutka. 361-371 [doi]
- Hybrid Hard/Soft Decode-and-Forward Relaying Protocol with Distributed Turbo CodeTaekhoon Kim, Dong In Kim. 372-382 [doi]
- Design of an Efficient Multicast Scheme for Vehicular Telematics NetworksJunghoon Lee, In-Hye Shin, Hye-Jin Kim, Min-Jae Kang, Sang Joon Kim. 383-392 [doi]
- ODDUGI: Ubiquitous Mobile Agent SystemSungJin Choi, Hyunseung Choo, MaengSoon Baik, HongSoo Kim, EunJoung Byun. 393-407 [doi]
- Determination of the Optimal Hop Number for Wireless Sensor NetworksJin Wang, Young-Koo Lee. 408-418 [doi]
- Localization in Sensor Networks with Fading Channels Based on Nonmetric Distance ModelsViet-Duc Le, Young-Koo Lee, Sungyoung Lee. 419-431 [doi]
- A Performance Comparison of Swarm Intelligence Inspired Routing Algorithms for MANETsJin Wang, Sungyoung Lee. 432-442 [doi]
- Analysis of Moving Patterns of Moving Objects with the Proposed FrameworkIn-Hye Shin, Gyung-Leen Park, Abhijit Saha, Ho-Young Kwak, Hanil Kim. 443-452 [doi]
- A User-Defined Index for Containment Queries in XMLGap-Joo Na, Sang-Won Lee. 453-464 [doi]
- On Optimal Placement of the Monitoring Devices on Channels of Communication NetworkAlexey S. Rodionov, Olga Sokolova, Anastasia Yurgenson, Hyunseung Choo. 465-478 [doi]
- Low Latency Handover Scheme Based on Optical Buffering at LMA in Proxy MIPv6 NetworksSeungtak Oh, Hyunseung Choo. 479-490 [doi]
- A Capacity Aware Data Transport Protocol for Wireless Sensor NetworkMd. Obaidur Rahman, Muhammad Mostafa Monowar, Choong Seon Hong. 491-502 [doi]
- Data Distribution of Road-Side Information Station in Vehicular Ad Hoc Networks (VANETs)Abhijit Saha, Gyung-Leen Park, Khi-Jung Ahn, Chul Soo Kim, Bongkyu Lee, Yoon-Jung Rhee. 503-512 [doi]
- VC-GTS: Virtual Cut-Through GTS Allocation Scheme for Voice Traffic in Multihop IEEE 802.15.4 SystemsJunwoo Jung, Hoki Baek, JaeSung Lim. 513-524 [doi]
- Towards Location-Based Real-Time Monitoring Systems in u-LBSMoonBae Song, Hyunseung Choo. 525-536 [doi]
- A Fast Approximation Algorithm for the ::::k:::: Partition-Distance ProblemYen Hung Chen. 537-546 [doi]
- A PSO - Line Search Hybrid AlgorithmXiming Liang, Xiang Li, Muhammet Fikret Ercan. 547-556 [doi]
- Using Meaning of Coefficients of the Reliability Polynomial for Their Faster CalculationAlexey S. Rodionov, Olga K. Rodionova, Hyunseung Choo. 557-571 [doi]
- A Novel Tree Graph Data Structure for Point DatasetsSaeed Behzadi, Ali A. Alesheikh, Mohammad R. Malek. 572-579 [doi]
- Software Dependability Analysis MethodologyBeoungil Cho, Hyunsang Youn, Eunseok Lee. 580-593 [doi]
- New Approach for the Pricing of Bond Option Using the Relation between the HJM Model and the BGM ModelKisoeb Park, Seki Kim, William T. Shaw. 594-604 [doi]
- Measuring Anonymous Systems with the Probabilistic Applied Pi CalculusXiaojuan Cai, Yonggen Gu. 605-620 [doi]
- YAO: A Software for Variational Data Assimilation Using Numerical ModelsLuigi Nardi, Charles Sorror, Fouad Badran, Sylvie Thiria. 621-636 [doi]
- CNP: A Protocol for Reducing Maintenance Cost of Structured P2PYu Zhang, Yuanda Cao, Baodong Cheng. 637-652 [doi]
- A Research on Instability of Small Flow in SCADA and an Optimizing Design for ControlYouqiang Guo, Zijun Zhang, Xuezhu Pei. 653-663 [doi]
- On-Demand Chaotic Neural Network for Broadcast Scheduling ProblemKushan Ahmadian, Marina L. Gavrilova. 664-676 [doi]
- Mining Spread Patterns of Spatio-temporal Co-occurrences over ZonesFeng Qian, Qinming He, Jiangfeng He. 677-692 [doi]
- Computerized Detection of Pulmonary Nodule Based on Two-Dimensional PCAWook-Jin Choi, Abdul Majid, Tae-Sun Choi. 693-702 [doi]
- Computational Measurements of the Transient Time and of the Sampling Distance That Enables Statistical Independence in the Logistic MapAdriana Vlad, Adrian Luca, Madalin Frunzete. 703-718 [doi]
- Future Personal Health Records as a Foundation for Computational HealthRobert Steele, Amanda Lo. 719-733 [doi]
- SVM Based Decision Analysis and Its Granular-Based SolvingTian Yang, Xinjie Lv, Zaifei Liao, Wei Liu, Hongan Wang. 734-748 [doi]
- Fast Object Tracking in Intelligent Surveillance SystemKi-Yeol Eom, Tae-Ki Ahn, Gyu-Jin Kim, Gyu-Jin Jang, Moon-Hyun Kim. 749-763 [doi]
- A Reliable Skin Detection Using Dempster-Shafer Theory of EvidenceMohammad Shoyaib, Mohammad Abdullah-Al-Wadud, Oksam Chae. 764-779 [doi]
- Video Shot Boundary Detection Using Generalized Eigenvalue DecompositionAli Amiri 0002, Mahmood Fathy. 780-790 [doi]
- Content Quality Assessment Related Frameworks for Social MediaKevin Chai, Vidyasagar Potdar, Tharam S. Dillon. 791-805 [doi]
- Weighted Aspect Moment Invariant in Pattern RecognitionRela Puteri Pamungkas, Siti Mariyam Hj. Shamsuddin. 806-818 [doi]
- Multiple Object Types KNN Search Using Network Voronoi DiagramGeng Zhao, Kefeng Xuan, David Taniar, Maytham Safar, Marina L. Gavrilova, Bala Srinivasan. 819-834 [doi]
- RRPS: A Ranked Real-Time Publish/Subscribe Using Adaptive QoSXinjie Lv, Xin Li, Tian Yang, Zaifei Liao, Wei Liu, Hongan Wang. 835-850 [doi]
- A Dynamic Packet Management in a Protocol ProcessorYul Chu, Amit Uppal, Jae Sok-Son. 851-862 [doi]
- On a Construction of Short Digests for Authenticating Ad Hoc NetworksKhoongming Khoo, Ford-Long Wong, Chu-Wee Lim. 863-876 [doi]
- Learning and Predicting Key Web Navigation Patterns Using Bayesian ModelsMalik Tahir Hassan, Khurum Nazir Junejo, Asim Karim. 877-887 [doi]
- A Hybrid IP Forwarding Engine with High Performance and Low PowerJunghwan Kim, Myeong-Cheol Ko, Hyun-Kyu Kang, Jinsoo Kim. 888-899 [doi]
- Learning Styles Diagnosis Based on Learner Behaviors in Web Based LearningNilüfer Atman, Mustafa Murat Inceoglu, Burak Galip Aslan. 900-909 [doi]
- State of the Art in Semantic Focused CrawlersHai Dong, Farookh Khadeer Hussain, Elizabeth Chang. 910-924 [doi]
- Towards a Framework for Workflow Composition in Ontology Tailoring in Semantic GridToshihiro Uchibayashi, Bernady O. Apduhan, J. Wenny Rahayu, David Taniar, Norio Shiratori. 925-936 [doi]
- Fusion Segmentation Algorithm for SAR Images Based on HMT in Contourlet Domain and D-S Theory of EvidenceYan Wu, Ming Li, Haitao Zong, Xin Wang. 937-951 [doi]