Abstract is missing.
- Mobile Agents and Their Ontology Serving a Federated Identity PlatformFarah Layouni, Yann Pollet. 1-6 [doi]
- Technologies for the Pseudonymization of Medical Data: A Legal EvaluationThomas Neubauer, Mathias Kolb. 7-12 [doi]
- Important Nonverbal Attributes for Spontaneous Speech RecognitionJana Klecková. 13-16 [doi]
- Evaluation of Tasks Scheduling Algorithms in Multi-core and Multi-queuing Environments Using System MESMS2Bartosz Czajka, Iwona Pozniak-Koszalka. 17-22 [doi]
- Fault Management for Secure Embedded SystemsMiroslav Svéda. 23-28 [doi]
- Improving the Sensitivity of Deadlines with a Specific Asynchronous Scenario for Harmonic Periodic Tasks scheduled by FPPatrick Meumeu Yomsi, Yves Sorel, D. de Rauglaudre, L. George. 29-37 [doi]
- Low Cost RT Process Control Using Windows PLC by MATLAB/Simulink Throw the REX Control System by Secured Wireless NetworkOndrej Krejcar, Petr Konarik. 38-42 [doi]
- Implicit Adaptation of User Preferences in Pervasive SystemsSarah McBurney, Elizabeth Papadopoulou, Nick K. Taylor, M. Howard Williams. 56-62 [doi]
- Power Saving of Real Time Embedded Sensor for Medical Remote MonitoringFrederic Fauberteau, Serge Midonnet, Dan Istrate. 63-67 [doi]
- Modified Multi-layer Feedback Delay Network for Auditory Space SimulationMiroslav BalÃk. 68-73 [doi]
- System Dynamics Based Risk Management for Distributed Information SystemsDenis Trcek. 74-79 [doi]
- Ontology-Based Decision Support for Information Security Risk ManagementAndreas Ekelhart, Stefan Fenz, Thomas Neubauer. 80-85 [doi]
- Multi-sensor Logical Decision Making in the Single Location Surveillance Point SystemMikko Nieminen, Tomi Räty, Mikko Lindholm. 86-90 [doi]
- Authentication and Billing Framework for Service Oriented ArchitectureTripuresh Pandey, Brijmohan Singh, Dharmender Singh Kushwaha, Arun Kumar Misra. 91-95 [doi]
- An Integrated System for Border SurveillanceBarbara Essendorfer, Eduardo Monari, Heiko Wanning. 96-101 [doi]
- Extracting Value from P2P Content DeliveryRaimund K. Ege, Li Yang, Richard Whittaker. 102-107 [doi]
- Authentication Protocol in Mobile RFID NetworkMing-Hour Yang, Jia-Ning Luo. 108-113 [doi]
- Attribute-Based Access Control in an Adaptive Hypermedia SystemPedro Ballesteros, Yezid Donoso. 114-119 [doi]
- A Multiple Criteria Decision-Making Method for Enterprise Supply Chain Finance Cooperative SystemsLiu Xiang. 120-125 [doi]
- Adaptive Real-Time Video Streaming System for Best-Effort IP NetworksLassi Lehikoinen, Tomi Räty. 131-137 [doi]
- Resource Discovery with Dynamic Matchmakers in Ad Hoc GridTariq Abdullah, Lotfi Mhamdi, Behnaz Pourebrahimi, Koen Bertels. 138-144 [doi]
- Runtime Diversity against Quasirandom FaultsAndreas Gerstinger. 145-148 [doi]
- The Integrated Unit for MEMS Based Pressure MeasurementJiri Haze, Radimir Vrba, Michal Pavlik. 149-152 [doi]
- Utilization of the Fuzzy Theory in the Adaptive Hypermedia SystemsAlyne Oliveira da Silva, Fernanda Alonso, Lilian Marcia Ferraz, Valéria Farinazzo Martins Salvador, Rosimeire Aparecida Jeronimo. 153-158 [doi]
- Nine RobotH. Juergen Mueller. 159-162 [doi]
- Support for Programming Embedded Software with Dynamically Typed LanguagesHarald Krapfenbauer, Dominik Ertl, Hermann Kaindl, Jürgen Falb. 163-169 [doi]
- The System for Detecting Lead in SoldersMachan Ladislav, Pavel Steffan. 170-172 [doi]
- FPGA Based High Date Rate Radio Interfaces for Aerospace Wireless Sensor SystemsJulien Henaut, Daniela Dragomirescu, Robert Plana. 173-178 [doi]
- Bandpass Sigma-Delta Modulator for Sensor Signal ProcessingLukas Fujcik, Radimir Vrba. 179-183 [doi]
- Defining Requirements for an Incident Management System: A Case StudyMarko Jäntti. 184-189 [doi]
- Signature Matching Applied to Simulation/Frame DualityVincent Albert, Alexandre Nketsa. 190-196 [doi]
- Production Quality Modeling Based on Regression Rules Extracted from Trained Artificial Neural NetworksYan Ning, Min Li, Jianhong Yang, Kunyin Meng. 197-203 [doi]
- Integrated Circuits 3D Silicon IntegrationT. Chammah, T. Giuma. 204-209 [doi]
- Using Sysml to Describe a New Methodology for Semiautomatic Software Generation from Inferred Behavioral and Data ModelsIgnacio González Alonso, M. P. Almudena GarcÃa Fuente, José Antonio López Brugos. 210-215 [doi]
- Iterative Requirements Engineering and Architecting in Systems EngineeringHermann Kaindl, Edin Arnautovic, Dominik Ertl, Jürgen Falb. 216-221 [doi]
- Collaboration Strategies for Distributed Teams: A Case Study of CAD Systems IntegrationKurt E. Madsen. 222-227 [doi]
- Modeling System Safety Requirements Using Input/Output Constraint Meta-automataZhe Chen, Gilles Motet. 228-233 [doi]
- Use of Magnetic Resonance to Determine the Circumference of Radial Slices of Norway SpruceKarel Bartusek, Eva Gescheidtova, Lucie Homolova, Zdenek Dokoupil. 234-237 [doi]
- Data Processing in Studying the Growth of Early Spruce Embryos, Using MR Imaging TechniquesKarel Bartusek, Eva Gescheidtova, René Kizek, Zdenek Dokoupil. 238-242 [doi]
- Implementation of Intrusion Detection System for Automation Devices within Virtual Automation NetworkRadek Kuchta, Jaroslav Kadlec, Radimir Vrba. 243-246 [doi]
- Whole Brain CT Perfusion MapsPetr Maule, Jana Klecková, Vladimir Rohan. 247-250 [doi]
- Ontology Driven E-GovernmentBernd Stadlhofer, Peter Salhofer, Gerald Tretter. 251-255 [doi]