Abstract is missing.
- Pragmatic Computing - A Semiotic Perspective to Web ServicesKecheng Liu. 3-15 [doi]
- Utility Computing: Reality and BeyondIvan I. Ivanov. 16-29 [doi]
- A Novel Grid-Based Micropayment System for Heterogeneous Multi-party AccountingManel Abdelkader, Noureddine Boudriga, Mohammad S. Obaidat. 30-54 [doi]
- Bidding Agents That Perpetrate Auction FraudJarrod Trevathan, Alan McCabe, Wayne Read. 57-71 [doi]
- A Platform for Mobile Service Provisioning Based on SOA-IntegrationMichael Decker, Rebecca Bulander. 72-84 [doi]
- A Hybrid Data Mining Approach for Credit Card Usage Behavior AnalysisChieh-Yuan Tsai. 85-97 [doi]
- Critical Success Factors of Internet Shopping: The Case of JapanKanokwan Atchariyachanvanich, Hitoshi Okada, Noboru Sonehara. 98-109 [doi]
- An Adaptive Knowledge-Based Approach for Detecting Fraud across Different e-Government DomainsPanos Alexopoulos, Kostas Kafentzis, Nicholas Athanassiadis, Xanthi Benetou, Tassos Tagaris, Carol Jollie, Panos Georgolios. 110-121 [doi]
- Timing to Block Scanning Malwares by Using Combinatorics Proliferation ModelKazumasa Omote, Takeshi Shimoyama, Satoru Torii. 125-138 [doi]
- Securing Biometric Templates Where Similarity Is Measured with Set IntersectionDaniel Socek, Vladimir Bozovic, Dubravko Culibrk. 139-151 [doi]
- Score Equalization in SVM Multimodal Fusion for Person RecognitionPascual Ejarque, Javier Hernando. 152-161 [doi]
- Remote Algorithmic Complexity Attacks against Randomized Hash TablesNoa Bar-Yosef, Avishai Wool. 162-174 [doi]
- Securing Real-Time Sessions in an IMS-Based ArchitecturePaolo Cennamo, Antonio Fresa, Maurizio Longo, Fabio Postiglione, Anton Luca Robustelli, Francesco Toro. 175-187 [doi]
- IPSec Database Query AccelerationAlberto Ferrante, Satish Chandra 0007, Vincenzo Piuri. 188-200 [doi]
- Detection of Spoofed MAC Addresses in 802.11 Wireless NetworksKai Tao, Jing Li, Srinivas Sampalli. 201-213 [doi]
- K2 Stream CipherShinsaku Kiyomoto, Toshiaki Tanaka, Kouichi Sakurai. 214-226 [doi]
- Two Types of Key-Compromise Impersonation Attacks against One-Pass Key Establishment ProtocolsKonstantinos Chalkias, Foteini Baldimtsi, Dimitris Hristu-Varsakelis, George Stephanides. 227-238 [doi]
- Reliable Intersection Computation within Malicious EnvironmentsStefan Böttcher, Sebastian Obermeier. 239-253 [doi]
- A Security Hardening Language Based on Aspect-OrientationAzzam Mourad, Marc-André Laverdière, Mourad Debbabi. 254-266 [doi]
- Facial Expression Synthesis and AnalysisHao Wang. 269-283 [doi]
- Multi-sequence H.264/AVC Rate Control Based on the Linear ModelGrzegorz Pastuszak, Andrzej Pietrasiewicz. 284-292 [doi]
- Non Parametric Stochastic Expectation Maximization for Data ClusteringGilles Bougenière, Claude Cariou, Kacem Chehdi, Alan Gay. 293-303 [doi]
- Mapping Phonetic Features for Voice-Driven Sound SynthesisJordi Janer, Esteban Maestre. 304-314 [doi]
- The MiSPOT System: Personalized Publicity and Marketing over Interactive Digital TVMartín López Nores, José Juan Pazos Arias, Yolanda Blanco-Fernández, Jorge García Duque, Ricardo Tubio-Pardavila, Marta Rey-López. 315-327 [doi]
- Knowledge Engineering Aspects of Affective Bi-Modal Educational ApplicationsEfthymios Alepis, Maria Virvou, Katerina Kabassi. 328-339 [doi]
- Design of a Password-Based EAP MethodAndrea Manganaro, Mingyur Koblensky, Michele Loreti. 343-355 [doi]
- Bit and Power Allocation Strategies for OFDM Systems over Time-Varying ChannelsXiang Gao, Mort Naraghi-Pour. 356-370 [doi]
- Mobile Applications to a Pervasive WorldHiata Anderson de Oliveira Coelho, Ricardo de Oliveira Anido. 371-383 [doi]
- Multi-service Networks: A New Approach to End-to-End Topology ManagementAnne-Marie Bosneag, David Cleary. 384-396 [doi]