Abstract is missing.
- Performance enhancement for IEEE 802.11e networks by adaptive adjustment of the HCCA/EDCA ratioWei Kuang Lai, Chin-Shiuh Shieh, Chih-Shiuan Jiang. 1-6 [doi]
- Machanisms for the maintenance of MP proxy tables in IEEE 802.11s mesh networksShih Tsung Liang. 7-11 [doi]
- Wi-Fi based radio map for location sensing by hypothesizing existence of barriersMasaaki Kuwabara, Nobuhiko Nishio. 12-17 [doi]
- Proposal and evaluation of multiple gateways distribution method for wireless mesh networkMasashi Ito, Toshihiro Shikama, Akira Watanabe. 18-25 [doi]
- ARP-like direct link transmission scheme in WLANYuh-Chung Lin, Wei Kuang Lai, Feng-Jung Liu. 26-31 [doi]
- Two-phase mobile transaction validation in wireless broadcast environmentsMiseon Choi, Wonik Park, Young-Kuk Kim. 32-38 [doi]
- Web search and information credibility analysis: bridging the gap between Web1.0 and Web2.0Katsumi Tanaka. 39-44 [doi]
- An efficient hash-based searching for specimens in the museum s exhibitPaiTzu Chang. 45-50 [doi]
- Towards an integrated framework for querying collection of heterogeneous dataSujeet Pradhan. 51-57 [doi]
- Pivoted table index for querying product-property-value informationHyunja Lee, Junho Shim. 58-62 [doi]
- Object-name search by visual appearance and spatio-temporal descriptionsShun Hattori, Katsumi Tanaka. 63-70 [doi]
- Concept vector extraction from Wikipedia category networkMasumi Shirakawa, Kotaro Nakayama, Takahiro Hara, Shojiro Nishio. 71-79 [doi]
- Web services provision: solutions, challenges and opportunities (invited paper)Qing Li, An Liu, Hai Liu, Baoping Lin, Liusheng Huang, Naijie Gu. 80-87 [doi]
- A multi-stage collaborative filtering approach for mobile recommendationLi-Hua Li, Fu-Ming Lee, Yu-Chun Chen, Chieh-Yu Cheng. 88-97 [doi]
- Dynamic load balancing in RCAN content addressable networkDjelloul Boukhelef, Hiroyuki Kitagawa. 98-106 [doi]
- COS: client oriented scheduling for multi-channel on-demand broadcastKai Liu, Victor C. S. Lee. 107-114 [doi]
- Small knowledge: a concept of enhanced bookmarks with personal contextAkiko Hino, Katsumi Tanaka. 115-122 [doi]
- Metadata management for integration and analysis of earth observation dataAkira Takahashi, Masashi Tatedoko, Hiroko Kinutani, Masatoshi Yoshikawa. 123-130 [doi]
- Efficient valid scope computation for location-dependent spatial queries in mobile and wireless environmentsKen C. K. Lee, Wang-Chien Lee, Hong Va Leong, Brandon Unger, Baihua Zheng. 131-140 [doi]
- A fuzzy quantization approach to image retrieval based on color and textureXinzhong Zhu, Jianmin Zhao, Jie Yuan, Huiying Xu. 141-149 [doi]
- The effects of personality factors on participation in online learningIwen Huang. 150-156 [doi]
- The design and implementation of an extensible network backup system in realtimeNishimura Satoshi, Sano Mutsuo, Ikeda Katsuo. 157-163 [doi]
- Quantitative evaluation between rival planning systems with dosimetric indicesPei-Ju Chao, Tsair-Fwu Lee, Te-Jen Su, Fu-Min Fang. 164-167 [doi]
- Automatic vehicle parking system using gyroscopeChih-Yen Wu, Shih Hao Huang, Peng-Liang Peng, Gwo-Jia Jong. 168-171 [doi]
- Implementation of hierarchical GAF, a cooperative power saving scheme for sensor networksTakashi Osawa, Tokuya Inagaki, Susumu Ishihara. 172-179 [doi]
- ATMOS: A middleware for Transparent MObile ad-hoc networking SystemsSho Fujita, Hiroshi Esaki. 180-184 [doi]
- Message routing on potential-fields in forwarding-based DTNsHideya Ochiai, Hiroshi Esaki. 185-193 [doi]
- Efficient location-aided flooding scheme initiated by receiver for MANETsNgoc Duy Pham, Hyunseung Choo. 194-199 [doi]
- Connectivity-based clustering with stretching technique in MANETsKhac Tiep Mai, Dongkun Shin, Hyunseung Choo. 200-206 [doi]
- Robustness-set in watermarking embedding systems using codebook classificationsWen-Ya Chiang, Shiuh-Jeng Wang, Chi-Yao Weng, Cheng-Hsing Yang. 207-215 [doi]
- Counteract SYN flooding using second chance packet filteringChu-Hsing Lin, Fuu-Cheng Jiang, Wei-Shen Lai, Wei-Yuah Lee, Wei-Cheng Hsu. 216-220 [doi]
- Secure RFID authentication scheme for EPC class Gen2Dae-Hee Seo, Jang-Mi Baek, Dong-Sub Cho. 221-227 [doi]
- A reversible data hiding scheme based on dual steganographic imagesChin-Feng Lee, Kuo-Hui Wang, Chin-Chen Chang, Yu-Lin Huang. 228-237 [doi]
- A new method for intrusion detection on hierarchical wireless sensor networksRung Ching Chen, Chia-Fen Hsieh, Yung-Fa Huang. 238-245 [doi]
- An information hiding scheme by applying the dynamic programming strategy to LSB matching revisitedChi-Shiang Chan, Ching-Yun Chang. 246-250 [doi]
- Enhancement of the RFID security method with ownership transferHsing-Bai Chen, Wei-Bin Lee, Yong-Hong Zhao, Yin-Long Chen. 251-254 [doi]
- RBAC-based access control for privacy protection in pervasive environmentsKyu Il Kim, Won Gil Choi, Eun-Ju Lee, Ung-Mo Kim. 255-259 [doi]
- An effective approach to adaptive bandwidth allocation with QoS enhanced on IP networksMong-Fong Horng, Yau-Hwang Kuo, Liang-Chien Huang, Yi-Ting Chien. 260-264 [doi]
- New synchronization schemes for UWB systemsDahae Chong, Sangho Ahn, Youngpo Lee, Seokho Yoon. 265-271 [doi]
- Performance of double binary turbo coded UWB systems with antenna diversityEun Cheol Kim, Jin Young Kim. 272-277 [doi]
- A preliminary study on common radio resource management in heterogeneous wireless networksChoongyong Shin, Jinsung Cho. 278-282 [doi]
- Performance analysis of STBC-UWB systems with double binary turbo codeJae Sung Park, Jin Young Kim. 283-289 [doi]
- An anonymous communication model for privacy-enhanced location based service using an echo agentEun-Ae Cho, Chang-Joo Moon, Hyun-Soo Im, Doo-Kwon Baik. 290-297 [doi]
- Resource allocation algorithm considering a priority of service classes for WiMedia UWB systemKwang-Chun Go, Jae-Hyun Kim, Seong-Hwan Oh, Kyeong-Deok Moon, Kwang-Il Lee. 298-301 [doi]
- Simplified sum-product algorithm using piecewise linear function approximation for low complexity LDPC decodingJae Hee Han, Myung Hoon Sunwoo. 302-308 [doi]
- The design of e-traveler s check with efficiency and mutual authenticationChin-Chen Chang, Shih-Chang Chang. 309-316 [doi]
- The triple-watermarking algorithm with multiple description coding over lossy communication networksShu-Chuan Chu, Lakhmi C. Jain, Hsiang-Cheh Huang, Jeng-Shyang Pan. 317-326 [doi]
- DCT-based reversible data hiding schemeChia-Chen Lin, Pei-Feng Shiu. 327-335 [doi]
- Embedding secret messages based on chaotic map and Huffman codingKuo-Nan Chen, Chin-Feng Lee, Chin-Chen Chang. 336-341 [doi]
- An efficient block-based lossless information hiding techniqueTzu-Chuen Lu, Ying-Hsuan Huang. 342-347 [doi]
- Merging element fuzzy cognitive mapsXiangfeng Luo, Yi Du, Fangfang Liu, Zhian Yu, Weimin Xu. 348-355 [doi]
- Bilinear-pairing-based remote user authentication schemes using smart cardsAl-Sakib Khan Pathan, Choong Seon Hong. 356-361 [doi]
- Evaluation of the expressions of robotic emotions of the emotional robot, Mung Eun Ho Kim, Sonya S. Kwak, Jeonghye Han, Yoon Keun Kwak. 362-365 [doi]
- Research works on cluster computing and storage area networkMasato Oguchi. 366-375 [doi]
- A modeling method based on CCS for workflowLi Zhao, Qing Li, Xiaoli Liu, Nanshan Du. 376-384 [doi]
- A high-efficient inter-domain data transferring system for virtual machinesDingding Li, Hai Jin, Yingzhe Shao, Xiaofei Liao. 385-390 [doi]
- VMFence: a customized intrusion prevention system in distributed virtual computing environmentHai Jin, Guofu Xiang, Feng Zhao, Deqing Zou, Min Li, Lei Shi. 391-399 [doi]
- Host-based traceback; tracking bot and C&C serverKeisuke Takemori, Masahiko Fujinaga, Toshiya Sayama, Masakatsu Nishigaki. 400-405 [doi]
- Scalable server system based on virtual machine duplication in wide areaYuko Kamiya, Toshihiko Shimokawa, Norihiko Yoshida. 406-410 [doi]
- A multimodality image registration framework for synchronous visualization of radiotherapy plans with longitudinal imaging studiesChang-yu Wang, Tsair-Fwu Lee, Chun-Hsiung Fang. 411-415 [doi]
- The plasma free space optical model for ubiquitous systemsBrian J. d Auriol, Yu Niu, Sungyoung Lee, Young-Koo Lee. 416-425 [doi]
- A new data structure for asynchronous periodic pattern miningJieh-Shan Yeh, Szu-Chen Lin. 426-431 [doi]
- Keyword search considering user s preference in P2P networksTomomi Miyazaki, Toshiki Watanabe, Akimitsu Kanzaki, Takahiro Hara, Shojiro Nishio. 432-440 [doi]
- Real time extraction of related terms by bi-directional lexico-syntactic patterns from the webHiroaki Ohshima, Katsumi Tanaka. 441-449 [doi]
- An efficient clustering framework for relevant web informationOk-Ran Jeong, Sang-Won Lee. 450-456 [doi]
- Efficient serial episode mining with minimal occurrencesHideyuki Ohtani, Takuya Kida, Takeaki Uno, Hiroki Arimura. 457-464 [doi]
- A recommendation method considering users time series contextsKenta Oku, Shinsuke Nakajima, Jun Miyazaki, Shunsuke Uemura, Hirokazu Kato. 465-470 [doi]
- XML data partitioning strategies to improve parallelism in parallel holistic twig joinsImam Machdi, Toshiyuki Amagasa, Hiroyuki Kitagawa. 471-480 [doi]
- Cyclic delay diversity for V-BLAST OFDM systemKwang Yoon Kim, Jin Young Kim. 481-487 [doi]
- Noise insensitive sampling frequency offset estimation methods for DVB-T/H systemsKyung Hoon Won, Jung-Su Han, Hyung-Jin Choi, BonYoung Koo. 488-493 [doi]
- New schemes of carrier frequency offset estimation for DVB systemsYoungyoon Lee, Taeung Yoon, Sanghun Kim, Seokho Yoon. 494-498 [doi]
- An enhanced ECCM method using OFCDM in WiBro systemMyung Jin Chung, Jung-Su Han, Hyung-Jin Choi, Seok-Joong Kim. 499-503 [doi]
- An area reduction method for digital filter using redundancy of SD number systemSang-Hun Yoon, Jin-Doo Jeong, Jong-Wha Chong. 504-508 [doi]
- A new filtering method for chirp spread spectrumYeong-Sam Kim, Jong-Wha Chong. 509-512 [doi]
- Peak power control algorithm for multi-processor SoCJaehwan Kim, SungHwan Park, JongWha Chong. 513-515 [doi]
- Representative slice method for viscous fluid registration of three-dimensional whole-body human imagesSoichiro Tokuhisa, Kunihiko Kaneko. 516-523 [doi]
- Developing embodied agent-based user interface by using interactive drama markup languageZeng-Wei Hong, Kai-Yi Chin, Jim-Min Lin. 524-528 [doi]
- Exploiting idle CPU cores to improve file access performanceTakanori Ueda, Yu Hirate, Hayato Yamana. 529-535 [doi]
- A credibility analyzing method of geographical objects from digital mapsDaisuke Kitayama, Ryong Lee, Kazutoshi Sumiya. 536-543 [doi]
- MDS: a novel method for class imbalance learningLong-Sheng Chen, Chun-Chin Hsu, Yu-Shan Chang. 544-549 [doi]
- Real-valued feature indexing for music databasesYu-lung Lo, Ling-yi Tsai. 550-556 [doi]
- A lightweight key renewal scheme for clustered sensor networksGicheol Wang, Deokjai Choi, Daewook Kang. 557-565 [doi]
- Reporter node determination of replicated node detection in wireless sensor networksYuichi Sei, Shinichi Honiden. 566-573 [doi]
- Localization of the mobile agent using indirect Kalman filter in distributed sensor networksJi-Wook Kwon, Mun-Soo Park, Dongkyoung Chwa. 574-579 [doi]
- Energy efficient filtering method in sensor networksSoo Young Moon, Tae Ho Cho. 580-585 [doi]
- An m-EVBT algorithm for energy efficient routing in wireless sensor networksJaekwang Kim, KwangHo Yoon, Seunghoon Lee, Je-hee Jung, Jee-Hyong Lee. 586-591 [doi]
- An anti-collision algorithm without idle cycle using 4-ary tree in RFID systemYongHwan Kim, Sungsoo Kim, SeongJoon Lee, KwangSeon Ahn. 592-596 [doi]
- Adaptive threshold determination method for the dynamic filtering in wireless sensor networks using fuzzy logicSang-Jin Lee, Hae Young Lee, Tae Ho Cho. 597-601 [doi]
- Energy consumption analysis of reputation-based trust management schemes of wireless sensor networksRiaz Ahmed Shaikh, Young-Koo Lee, Sungyoung Lee. 602-606 [doi]
- An efficient method of image identification by combining image featuresJaekyong Jeong, Chijung Hwang, Byeungwoo Jeon. 607-611 [doi]
- Performance testing based on test-driven development for mobile applicationsHeejin Kim, Byoungju Choi, Seokjin Yoon. 612-617 [doi]
- A framework of sensor-cloud integration opportunities and challengesMohammad Mehedi Hassan, Biao Song, Eui-nam Huh. 618-626 [doi]
- Analysis on quantum-based fixed priority scheduling of real-time tasksMoonju Park, Hong Jin Yoo, Jinseok Chae. 627-634 [doi]
- An e-learning framework supporting personalization and collaborationJihyun Kim, Yujung Jung, Yoonsun Lim, Myung Kim, Sunsook Noh. 635-638 [doi]
- Virtual community 101: know your virtual community and membersEunyoung Cheon, JoongHo Ahn. 639-643 [doi]
- A statistical analysis of relation degree of compound pair on online biological pathway databasesMyungha Jang, Arang Rhie, Jiyoung Whang, Sanduk Yang, Hyun S. Park. 644-649 [doi]
- PicAChoo: a tool for customizable feature extraction utilizing characteristics of textual dataJaeseok Myung, Jung-Yeon Yang, Sang-goo Lee. 650-655 [doi]
- Mining high utility patterns in incremental databasesChowdhury Farhan Ahmed, Syed Khairuzzaman Tanbeer, Byeong-Soo Jeong, Young-Koo Lee. 656-663 [doi]
- A clustering algorithm using particle swarm optimization for DNA chip data analysisMinsoo Lee, Yoonkyoung Lee, Boyeon Meang, Okju Choi. 664-668 [doi]
- Activity recognition with the aid of unlabeled samplesDonghai Guan, Young-Koo Lee, Sungyoung Lee. 670-674 [doi]