Abstract is missing.
- The E-Mail Honeypot System Concept, Implementation and Field Test ResultsErwin P. Rathgeb, Dirk Hoffstadt. 1-6 [doi]
- Standard Approach for Quantification of the ICT Security Investment for Cybercrime PreventionRok Bojanc, Borka Jerman-Blazic. 7-14 [doi]
- Towards Organizational Privacy PatternsJan Porekar, Aljosa Jerman-Blazic, Tomaz Klobucar. 15-19 [doi]
- Spam Mail Reduces Economic EffectsToshihiko Takemura, Hiroyuki Ebara. 20-24 [doi]
- Coordination of a Multi-commodity Supply Chain with Multiple Members Using Flow NetworksKaveh Fayazbakhsh, Mohammadreza Razzazi. 25-30 [doi]
- Design and Implementation Of Embedded Data Acquisition System Based on USB and Flash Multimediacard MemoryZhiyong Zhang, Tiejun Lu, Xiaobin Chu, Yamin Zhang. 31-34 [doi]
- Analysis of Internet Policies and Civil Rights In Italy, Serbia and Burma-Myanmar: A Technological and Legal ApproachMarcella Atzori, Francesco Aymerich, Gianni Fenu, Simone Surcis. 35-41 [doi]
- Who s Afraid of High Def? Institutional Factors Influencing HDTV Diffusion in the NetherlandsEva Baaren, Lidwien van de Wijngaert, Erik Huizer. 42-48 [doi]
- Digital Networks and Sustainability: Do We Need the Government?Radhika Rajagoplan, Runa Sarkar. 49-54 [doi]
- A Multi-issue Negotiation Mechanism with Interdependent Negotiation IssuesAhmad Kardan, Hamed Janzadeh. 55-59 [doi]
- Analysis of Automated Evaluation for Multi-document Summarization Using Content-Based SimilarityLi-Qing Qiu, Bin Pang. 60-63 [doi]
- Monitoring Flexicurity Labour Market Policies in the European UnionAndranik Tangian. 64-69 [doi]
- Knowledge Management for Disparate Etruscan Cultural HeritageJohn McAuley, James D. Carswell. 70-74 [doi]
- View-Point Oriented Manipulation of Concepts: A Matching PerspectiveKambiz Badie, Maryam Tayefeh Mahmoudi. 75-80 [doi]
- Towards a Collection-Based Knowledge Representation: Application to Geo-political Risks and Crisis ManagementFrancis Rousseaux, Kevin Lhoste. 81-87 [doi]
- Mining Medical Databases Using Proposed Incremental Association Rules Algorithm (PIA)Laila Elfangary, Walid Adly Atteya. 88-92 [doi]
- Preliminary Based Service Evaluation for Elderly People and Healthcare Professionals in Residential Home Care UnitsJ. Reerink Boulanger, C. Deroussent. 93-101 [doi]
- Enabling Cross-Usage of Public Health Systems - A Holistic Approach to Ask the Expert Systems and Online CommunitiesÅsa Smedberg. 102-106 [doi]
- Migration from Regional to a National eHealth NetworkKari Harno, Pekka Ruotsalainen, Pirkko Nykänen, Kyösti Kopra. 107-110 [doi]
- A Semantic Double-Buffer Based Approach to Enhance Semantic Web SearchLing Chen, Hai Jin, Sheng Di. 111-116 [doi]
- The Facility Control Markup Language FCMLFrançois Bry, Bernhard Lorenz, Hans Jürgen Ohlbach, Martin Roeder, Marc Weinberger. 117-122 [doi]
- A Uniform Web Service Description Representation for Different ReadersDoris Gälle, Christian Kop, Heinrich C. Mayr. 123-128 [doi]
- Human Rights in the Context of the Digital Society - Input to an Ongoing Discussion on Regulatory IssuesLasse Berntzen, Evika Karamagioli. 129-133 [doi]
- MV-FT: Efficient Implementation for Matrix-Vector Multiplication on FT64 Stream ProcessorJing Du, Fujiang Ao, Xuejun Yang. 134-139 [doi]
- X-Gov Planning: How to Apply Cross Media to Government ServicesLucia Vilela Leite Filgueiras, Danilo O. Correa, João S. Oliveira Neto, Renato P. Facis. 140-145 [doi]
- Multi-source Illumination Approach for Buried Objects ExplorationLamia Hélaoui, Jamel Bel Hadj Tahar, Fethi Choubani. 146-149 [doi]
- Reliable Server Pooling - A Novel IETF Architecture for Availability-Sensitive ServicesThomas Dreibholz, Erwin P. Rathgeb. 150-156 [doi]
- A Password-Based Grid Security InfrastructureZhun Cai. 157-164 [doi]
- Security Arguments for a Class of ID-Based SignaturesZhengwei Guo, Xinzheng He, Baocheng Xun. 165-170 [doi]
- A New Server Selection Strategy for Reliable Server Pooling in Widely Distributed EnvironmentsXing Zhou, Thomas Dreibholz, Erwin P. Rathgeb. 171-177 [doi]
- Analysis of Reverse Traffic in Delay-Based Congestion ControlSheng Wang, Jinshu Su. 178-183 [doi]
- Analysis and Enhancement of Delay-Based Congestion ControlSheng Wang, Jinshu Su. 184-189 [doi]
- Reduced Complexity Decoder for Orthogonal Space-Time Codes When Using QAM ConstellationsAndrei Alexandru Enescu, Silviu Ciochina, Constantin Paleologu. 190-194 [doi]