Abstract is missing.
- Learning and making sense of project phenomena in information systems educationKosheek Sewchurran, Elsje Scott. 1-8 [doi]
- A comparative study on structure of the motivation for information security by security incident experiencesYasuko Kanno, Masato Terada, Hidehiro Yajima, Toshinari Kamamura, Norihisa Doi. 9-16 [doi]
- A study of correlation between transitions and sound effects in a fairy tale movieAika Mukai, Toshiyuki Yamamoto, Makoto J. Hirayama. 17-20 [doi]
- A survey on HCI considerations in the software development life cycle: from practitioner s perspectiveRogayah Abd Majid, Nor Laila Md. Noor, Wan Adilah Wan Adnan, Suria Mansor. 21-24 [doi]
- Database design for global patient monitoring applications using WAPDhananjay Singh, Hoon Jae Lee. 25-31 [doi]
- Determinism in speech pitch relation to emotionAhmed Mustafa Mahmoud, Wan Haslina Hassan. 32-37 [doi]
- Measuring fish length from digital images (FiLeDI)Norhaida Abdullah, Mohd Shafry, Mohd Rahim, Ismail Mat Amin. 38-43 [doi]
- Mobile technology for irrigation problems in rural IndiaUmesh Hodeghatta Rao, Sanjay Mohapatra. 44-46 [doi]
- Proportional fairness of call blocking probabilityShengling Wang, Yong Cui, Ke Xu, Jian-Hui Huang, Dapeng Liu. 47-52 [doi]
- Relationship of blink, affect, and usability of graph reading tasksGia Kim, Siu Man Lui. 53-58 [doi]
- Star economy in the user generated content: a new perspective for digital ecosystemsToshihiko Yamakami. 59-62 [doi]
- The deployment of PDA accessible clinical-log for medical education in PBL-approachRattiporn Luanrattana, Khin Than Win. 63-68 [doi]
- The design of aesthetic interaction: towards a graceful interaction frameworkWan Norizan Wan Hashim, Nor Laila Md. Noor, Wan Adilah Wan Adnan. 69-75 [doi]
- Turning keywords into URIs: simplified user interfaces for exploring linked dataAtif Latif, Muhammad Tanvir Afzal, Patrick Höfler, Anwar Us Saeed, Klaus Tochtermann. 76-81 [doi]
- VisionSynaptics: a system convert hand-writing and image symbol into computer symbolYu Cheng, Tao Zhang, Song Chen. 82-85 [doi]
- Web-enabled user support services system in distance learningA. Murali M. Rao. 86-90 [doi]
- A method to support multiple interfaces mobile nodes in PMIPv6 domainHyun Jong Kim, Jeong Yun Kim, Seong Gon Choi. 91-96 [doi]
- A multiple bayes classification solution to word sense disambiguationZhao-Zhi Pan, Yu Hong, Jian-Min Yao. 97-99 [doi]
- A multiuser diversity based time-frequency two dimensional adaptive resource allocation algorithm for WiMAXJianbo Ye, Qingbo Zhang, Guogang Huang. 100-103 [doi]
- An ambient intelligence architecture for extracting knowledge from distributed sensorsAlessandra De Paola, Salvatore Gaglio, Giuseppe Lo Re, Marco Ortolani. 104-109 [doi]
- An analysis of new features for workflow system in the SaaS softwareLi Weiping. 110-114 [doi]
- An improvement of secure authentication scheme with full anonymity for wireless communicationsChin-Hung Wang, Tzu-Chieh Wei, Po-Chin Lee, Chia Chun Wu. 115-118 [doi]
- DTD2OWL: automatic transforming XML documents into OWL ontologyPham Thi Thu Thuy, Young-Koo Lee, Sungyoung Lee. 125-131 [doi]
- Efficient line buffer instruction cache scheme with prefetchWeili Li, Lixin Yu. 132-135 [doi]
- Image segmentation by automatic histogram thresholdingRuey-Ming Chao, Hsien-Chu Wu, Zi-Chun Chen. 136-141 [doi]
- Interdisciplinary applications of mathematical modelingElise de Doncker, Karlis Kaugars, Shujun Li, Haisen S. Li, Yoshimitsu Shimizu, Junpei Fujimoto, Fukuko Yuasa, T. Ishikawa, Nobuyuki Hamaguchi. 142-148 [doi]
- Middleware in ubiquitous computing system with MedRec architectureMangal Sain, Hoon Jae Lee, Wan-Young Chung. 149-154 [doi]
- Multi-level visual secret sharing scheme with smooth-lookingHong-Hao Chen, Cheng-Chi Lee, Chih-Chiang Lee, Hsien-Chu Wu, Chwei-Shyong Tsai. 155-160 [doi]
- Pattern-based planning system for complex environmentsMahshid S. Ehsaei, Abolfazl Toroghi Haghighat. 161-167 [doi]
- PhraseRank for document clustering: reweighting the weight of phraseYoon Ho Cho, Sang-Hyun Park 0002, SangKeun Lee. 168-174 [doi]
- Predicting lattice constant of cubic perovskites using support vector regressionAbdul Majid, Yeon Soo Lee. 175-183 [doi]
- RoboEarth: connecting robots worldwideOliver Zweigle, René van de Molengraft, Raffaello D Andrea, Kai Häussermann. 184-191 [doi]
- Social networks identification and analysis using call detail recordsMuhammad Usman Khan, Shoab Ahmed Khan. 192-196 [doi]
- Supervised learning algorithm for automatic adaption of situation templates using uncertain dataOliver Zweigle, Kai Häussermann, Uwe-Philipp Käppeler, Paul Levi. 197-200 [doi]
- The effect of malicious peers in a gossip-based reputation systemVincenza Carchiolo, Alessandro Longheu, Michele Malgeri, Giuseppe Mangioni. 201-205 [doi]
- Foundation-based mobile platform software engineering: implications to convergence to open source softwareToshihiko Yamakami. 206-211 [doi]
- An interactivity model of mobile interactive TV: a oneseg case for mobile glueToshihiko Yamakami. 212-217 [doi]
- Double layered SOA test architecture based on BPA - simulation eventYoungkon Lee. 218-223 [doi]
- Intraorganizational power verified interactive genetic algorithms for the design of logistics networkTzong-Heng Chi, Chia-Chien Lin, Wei-Chen Lin. 224-229 [doi]
- Laying out the scope of developers risk management responsibilitiesMira Kajko-Mattsson. 230-235 [doi]
- Network response analyzer system for interactive lectures in classroom or distance learningMakoto J. Hirayama, Toshiyuki Yamamoto. 236-239 [doi]
- SLA management process modelMira Kajko-Mattsson. 240-249 [doi]
- Study on consumer demands and merchant participation motives of mobile payment services in ChinaZhao Xinyan, Ge Wei, Lu Tingjie. 250-255 [doi]
- PingPong-MAC: secure ubiquitous sensor network with authenticated encryptionPardeep Kumar, Sang il Cho, Hoon Jae Lee. 256-260 [doi]
- A study on bio feedback based interactive work for expressing human cytochemism in real-timeOk-Hue Cho, Jae-Joon Cho, Kil-Sang Yoo, Won-Hyung Lee. 261-264 [doi]
- A directed signature scheme and its application to group key initial distributionQian Wei, Jingsha He, Huiying Shao. 265-269 [doi]
- A method for opinion mining of product reviews using association rulesWon-Young Kim, Joon Suk Ryu, Kyu Il Kim, Ung-Mo Kim. 270-274 [doi]
- An adaptive, memory-efficient and fast algorithm for Huffman decoding and its implementationHoang-Anh Pham, Van-Hieu Bui, Anh-Vu Dinh-Duc. 275-279 [doi]
- An extended version of scaled small gain conditionZheng Min, Li Yang. 280-282 [doi]
- New link estimation for reliability in wireless sensor networksKi-Il Kim, Hye-Jin Lee, Sangjoon Park, Hyeon Park. 283-286 [doi]
- Mining opinions from messengerJoon Suk Ryu, Won-Young Kim, Kyu Il Kim, Ung-Mo Kim. 287-290 [doi]
- A novel fully-differential switched capacitor chopper stabilized cascade sigma-delta modulator for MEMS gyroscopePeisheng Wang, Haiyang Quan, Fuqiang Zhang, Zhiyong Hu. 291-294 [doi]
- Network selection based on network service zone for macro mobilityJinhee Park, JinWook Chung. 295-299 [doi]
- A user study: the effects of mobile phone prototypes and task complexities on usabilityIbrahim Furkan Ince, Yucel Batu Salman, Mustafa Eren Yildirim. 300-302 [doi]
- Developing a computer system for health assessmentZhou Mingjie, Wang Li, Zhang Jianxin. 303-306 [doi]
- No-reference video quality assessment for MPEG-2 video streams using BP neural networksXiuhua Jiang, Yuxia Wang, Caihong Wang. 307-311 [doi]
- Participatory design and evaluation of e-learning system for Korean language trainingYucel Batu Salman, Ibrahim Furkan Ince, Ji-Young Kim, Hong-In Cheng, Mustafa Eren Yildirim. 312-319 [doi]
- A weighted closeness-based trust combination modelJun-Feng Tian, Yuzhen Lu, Peng Yuan. 320-325 [doi]
- Experiences in security testing for web-based applicationsChengying Mao. 326-330 [doi]
- Ranking secure technologies in security provision financial transactions mobile commerceFatemeh Saghafi, Fatemeh NasserEslami, Maryam Esmaili. 331-336 [doi]
- A novel spatial index for case based geographic retrievalJia Zhang, Hong Pan, Zhen-ming Yuan. 342-347 [doi]
- An effective solution for community identificationDongming Chen. 348-351 [doi]
- Digital watermarking for volume data based on 3D-DWT and 3D-DCTWang Liu, Chunhui Zhao. 352-357 [doi]
- QoS-aware service composition using NSGA-II::1::Yujie Yao, Haopeng Chen. 358-363 [doi]
- SVDD regularized with area under the ROCBin Chen, Bin Li, Zhisong Pan. 364-368 [doi]
- The research on the service marketing strategies and empirical based on the product valueJingdong Chen, Wei Han. 369-374 [doi]
- The theory and empirical research of differentiation benefit positioning based on product valueJingdong Chen, Qisong Zhu. 375-380 [doi]
- The theory and empirical research of network marketing based on relational valueJingdong Chen, Xiaoqian Gao. 381-385 [doi]
- Information processing of the hull structure oriented to ship structure knowledge-type military specificationHong-qin Zhang, Song-lin Yang, Yong-cheng An, Jun-jie Zhao, Wu-xing He. 386-389 [doi]
- Ship structure knowledge-based military specification virtual test system s designSong-lin Yang, Hong-qin Zhang, Yong-cheng An, Hai-bian Cheng, Wu-xing He. 390-393 [doi]
- The analysis of DDoS attack for the video transmissionChung-Hsin Liu, Chun-Lin Lo. 394-399 [doi]
- The effectiveness of the handheld devices based on mobiles learningChung-Hsin Liu, Wei-Yu Chen. 400-405 [doi]
- The study for the optimal routing of Bluetooth PiconetChung-Hsin Liu, Sheng-Shiang Chang, Zhao-Cheng Ye. 406-411 [doi]
- The study of effectiveness for ad-hoc wireless networkChung-Hsin Liu, Sheng-Shiang Chang. 412-417 [doi]
- The study of the wireless network DoS attackChung-Hsin Liu, Po-Cheng Teng, Chun-Lin Lo, Kuo-Hao Lee. 418-421 [doi]
- The study of WSN routingChung-Hsin Liu, Chien-Yun Lo. 422-428 [doi]
- An efficient and effective image representation for region-based image retrievalZhiyong Zeng, Zhiqiang Yao, Shigang Liu. 429-434 [doi]
- An efficient region-based image representation using Legendre color distribution momentsZhiyong Zeng, Xuemei Ding, Shigang Liu. 435-439 [doi]
- Automatic identification of covert channels inside Linux kernel based on source codesGaoshou Zhai, Yufeng Zhang, Chengyu Liu, Na Yang, Minli Tian, Hengsheng Yang. 440-445 [doi]
- Design and implementation of a tool for analyzing SELinux secure policyGaoshou Zhai, Wenlin Ma, Minli Tian, Na Yang, Chengyu Liu, Hengsheng Yang. 446-451 [doi]
- A binary method for fast computation of inter and intra cluster similarities for combining multiple clusteringsSelim Mimaroglu, A. Murat Yagci. 452-456 [doi]
- A comparative study between computer programming languages for developing distributed systems in web environmentK. Aldrawiesh, A. Al-Ajlan, Y. Al-Saawy, A. Bajahzar. 457-461 [doi]
- A maximum network lifetime QoS routing algorithm in MANETsQiang Sun, Shasha Cao, Nianshen Chen. 462-467 [doi]
- Achieving high efficient agreement with malicious faulty nodes on a cloud computing environmentS. C. Wang, K. Q. Yan, S.-S. Wang, C. P. Huang. 468-473 [doi]
- Adaptation e-learning contents in mobile environmentSvetlana Kim, Yongik Yoon. 474-479 [doi]
- An automated mechanism for organizing and retrieving core asset artifacts for product derivation in SPLHamad I. Alsawalqah, Komi S. Abotsi, Dan-Hyung Lee. 480-485 [doi]
- An empirical study of success factors on business-to-business e-marketplaces from buyers and sellers perspectivesMunkhbat Luvsanbyamba, In-Keun Chung. 486-491 [doi]
- Attribute summarization: a technique for wireless XML streamingJun Pyo Park, Chang-Sup Park, Min Kyoung Sung, Yon Dohn Chung. 492-496 [doi]
- Averaging approach for distributed event detection in wireless sensor networksThe-Dung Pham, Hung Quoc Ngo, Sungyoung Lee, Young-Koo Lee. 497-501 [doi]
- Designing a special purpose e-commerce websiteHazim Iscan, Oguz Findik, Halife Kodaz, Ali Erdi. 508-513 [doi]
- Development and estimation of ubiquitous unconstrained BCG monitoring system using wireless sensor nodeYun-Hong Noh, Do-Un Jeong. 514-520 [doi]
- DPUid: distributed algorithm for proximity-based unique id in wireless sensor networksMd. Rakibul Haque, Md. Ashik Faisal Khan, Md. Atiqul Islam, Mahmuda Naznin. 521-525 [doi]
- EDARP: novel energy and distance-aware routing protocol in wireless sensor networkMohammad Zeynali, Leili Mohammad Khanli, Amir Mollanejad. 526-533 [doi]
- e-mail authentication system: a spam filtering for smart sendersPattaraporn Klangpraphant, Pattarasinee Bhattarakosol. 534-538 [doi]
- An energy consumption technique for global healthcare monitoring applicationsDhananjay Singh, Hoon Jae Lee, Wan-Young Chung. 539-542 [doi]
- Handover support for converged inter-RAT networksDiana Poovathingal Lazar, Navrati Saxena, H. M. Gupta, Swades De. 543-549 [doi]
- Hierarchical service-oriented routing of queries in wireless sensor networksSeifu Tatek Yazhy, Seung-Kyu Park. 550-554 [doi]
- Identity-based secure protocol scheme for wireless sensor networkSang-Ho Na, Kyu-Jin Kim, Mohammad Mehedi Hassan, Eui-nam Huh. 555-560 [doi]
- Intelligent agent based hospital search & appointment systemTyrone Edwards, Suresh Sankaranarayanan. 561-567 [doi]
- Legible+: integrated system for remote collaboration through document creationMariano Perez Pelaez, Toshiya Fujii, Wonsuk Nam, Masaki Yachiune, Ikuro Choh. 568-570 [doi]
- MPCS: a secure Mobile Payment Consortia System for higher educational institutionsS. Britto R. Kumar, S. Albert Rabara, J. Ronal Martin. 571-579 [doi]
- Multi-Level Secure Framework (MLSF) for composite web servicesJ. G. R. Sathiaseelan, S. Albert Rabara, J. Ronal Martin. 580-585 [doi]
- Optimization of continuous query processing for RFID sensor tag data streamYongxu Piao, Wooseok Ryu, Haipeng Zhang, Bonghee Hong. 586-591 [doi]
- Personal mobile information systemDuklon Stenett, Suresh Sankaranarayanan. 592-598 [doi]
- Premature ventricular contractions, a typical extra-systole arrhythmia, lowers the scaling exponent: DFA as a beneficial biomedical computationToru Yazawa, Tomoo Katsuyama. 599-604 [doi]
- Relative navigation and situation awareness information distribution for GPS information deficient situationsJong-Moon Chung, Myungjun Choi, Yong-Suk Park, Ho Kim, Hyundo Kim. 605-609 [doi]
- Simulation and analysis of ad-hoc on-demand distance vector routing protocolMd. Monzur Morshed, Md. Habibur Rahman, Md. Rezaur Rahman Mazumder, K. A. M. Lutfullah. 610-614 [doi]
- Smart buffer management for different start video broadcastingHathairat Ketmaneechairat, Phoemphun Oothongsap, Anirach Mingkhwan. 615-619 [doi]
- Using syntactic and contextual information for sentiment polarity analysisShaishav Agrawal, Tanveer j Siddiqui. 620-623 [doi]
- Wearable patch-type ECG using ubiquitous wireless sensor network for healthcare monitoring applicationHsein-Ping Kew, Do-Un Jeong. 624-630 [doi]
- 6DMPP: small worlds in mobile peer-to-peer networksKe Zuo, Quanyuan Wu. 631-636 [doi]
- A study on QoS issues for mobile ad-hoc networksR. Lakshmi Priya, Nabendu Chaki. 637-642 [doi]
- Architecting autonomic computing systems through Probabilistic Software Stability Model (PSSM)E. R. Naganathan, P. Eugene Xavier. 643-648 [doi]
- General criteria on building decision trees for data classificationYo-Ping Huang, Vu Thi Thanh Hoa. 649-654 [doi]
- QoS implementation in a federated identities systemFarah Layouni, Yann Pollet. 655-657 [doi]
- Requirements for troubleshooting wi-fi network security through location technologiesNicolás Macia, Paula Venosa, Luis Marrone. 658-663 [doi]
- A framework for digital cosmetic systemMohammad Shoyaib, Jo Moo Youl, Mohammad Abdullah-Al-Wadud, Oksam Chae. 664-669 [doi]
- A grid infrastructure for online gamesRicardo Alexandre, Paula Prata, Abel Gomes. 670-673 [doi]
- A reward field model generation in Q-learning by dynamic programmingYunsick Sung, Kyungeun Cho, Kyhyun Um. 674-679 [doi]
- Buffer and loss monitoring for the control of multimedia data streaming rate on mobile ad hoc networksSupatach Chaksaen, Chanboon Sathitwiriyawong. 680-684 [doi]
- Category specific SIFT descriptor and its combination with color information for content-based image retrievalYan Zhang, Zhou Zhaoxing, Xiao Han. 685-690 [doi]
- Design of memory architecture for autonomous virtual characters using visual attention and quad-graphMyoungHee Cha, Kyungeun Cho, Kyhyun Um. 691-696 [doi]
- Weighted Finite Automata encoding over Thai languageKorakot Prachumrak. 697-701 [doi]
- A wavelet based method for detecting and localizing epileptic neural spikes in EEGBerdakh Abibullaev, Hee Don Seo, Won-Seok Kang, Jinung An. 702-707 [doi]
- An empirical improvement of the accuracy of RBF networksHyontai Sug. 708-712 [doi]
- An event detection algorithm in ECG with 60Hz interference and baseline wanderingJungkuk Kim, Minkyu Kim, Daesun Kim, Jaehyun Park, Woong Huh. 713-716 [doi]
- Applying complex system entropy cluster algorithm to mining principle of herbal combinations in traditional Chinese medicineChenghe Shi, Renquan Liu, Yuhao Zhao, Xiujuan Wang. 717-721 [doi]
- Detecting mitochondria in fluorescence imagesMohammad Abdullah-Al-Wadud, Yoojin Chung. 722-725 [doi]
- Effects of discretization on determination of coronary artery disease using support vector machineIsmail Babaoglu, Oguz Findik, Erkan Ãœlker. 726-729 [doi]
- EMG signal decomposition using wavelet transformation with respect to different wavelet and a comparative studySaleh Ahmed, Shamim Ahmad, Md. Omar Faruqe, Md. Rashedul Islam. 730-735 [doi]
- Learning a prediction model for protein-protein recognitionHuang-Cheng Kuo, Kuan-Yu Su, Ping-Lin Ong, Jen-Peng Huang. 736-741 [doi]
- Mobile robot for personal exercise training in ubiquitous healthcare environmentHong-Seok Na, Youn-Sik Choi, Tae-Soo Park. 742-744 [doi]
- Ontology-based medical diagnostic knowledge structuring using case-based reasoning methodologyThinn Mya Mya Swe, Nan Sai Moon Kham. 745-749 [doi]
- Pervasive distributed volume rendering in a lightweight multi-agent platformLuigi Gallo, Antonio Coronato. 750-755 [doi]
- Thyroid disease diagnosis using Artificial Immune Recognition System (AIRS)Halife Kodaz, Ismail Babaoglu, Hazim Iscan. 756-761 [doi]
- A literature review for a 6-sigma perception of academic qualitySeena Biju, Sreekumaran Nair. 762-767 [doi]
- Cost effective software engineering using program slicing techniquesMuhammad Saleem, Rasheed Hussain, Vasir Ismail, Shaikh Mohsin. 768-772 [doi]
- Fault tree analysis in city lifeline system operations and management-theory and applicationWang Jian, Chen Rui, Zhang Pengyan, Yu Ningjie. 773-777 [doi]
- A perspective of two-dimensional process integration customer relationship management driven business modelShan-yan Huang, Han-yuh Liu. 778-783 [doi]
- A new robust forensic marking using peak position modulation for videoJihah Nah, JongWeon Kim, Jaeseok Kim. 784-789 [doi]
- An improved backprojection algorithm for spiral cone-beam CT with an improved ray traverse algorithmGuowei Xue, Yan Zhang, Jia Li. 790-795 [doi]
- Knowledge-based approach for 3D skeleton extractionPorawat Visutsak, Veera Boonjing, Korakot Prachumrak. 796-801 [doi]
- Malicious content filtering based on semantic featuresSemin Kim, Hyun-seok Min, Jaehyun Jeon, Yong Man Ro, SeungWan Han. 802-806 [doi]
- Mining association rules in tree structured XML dataJuryon Paik, Junghyun Nam, Won-Young Kim, Joon Suk Ryu, Ung-Mo Kim. 807-811 [doi]
- Recommender systems: incremental clustering on web log dataSaeed Reza Aghabozorgi, Teh Ying Wah. 812-818 [doi]
- A Localized Software-based approach for Fault-Tolerant Ethernet (LSFTE)Huy Thao Vu, Minh Thiep Ha, Jong-myung Rhee. 819-823 [doi]
- Decentralized Hybrid Wireless Mesh ProtocolMadhusudan Singh, Sang-Gon Lee. 824-829 [doi]
- Design issues of integrated subway air quality management system base on particulate matter measurementsHwangSoo Park, Jin YouLin, Sang Boem Lim, Jung-Hun Woo, Suhyang Kim, Young Sunwoo, Minghe Piao. 830-834 [doi]
- Efficient implementation of hybrid automatic gain control algorithm for chirp spread spectrumHui Liu, Yeong-Sam Kim, Seong-Hyun Jang, Jong-Wha Chong. 835-838 [doi]
- Efficient service recommendation system for cloud computing marketSeungmin Han, Mohammad Mehedi Hassan, Changwoo Yoon, Eui-nam Huh. 839-845 [doi]
- Multi-round scheduling for divisible loads on the heterogeneous cluster systems of multi-core computersLi Xia, Zhong Cheng, Qu Zeng-Yan. 846-852 [doi]
- Ontology based schema matching and mapping approach for structured databasesSu Su Hlaing. 853-859 [doi]
- Performance modeling of slotted MACA-BI MAC protocol for mobile ad hoc networksRishi Pal Singh, D. K. Lobiyal. 860-862 [doi]
- Performance of Phase-Silence-Shift-Keying for additive white Gaussian noise and fading channelsDong Kyoo Kim, Dong Yong Kwak. 863-865 [doi]
- R-ECS: reliable elastic computing services for building virtual computing environmentTing Chen, Yongjian Wang, Yinan Ren, Cheng Luo, Depei Qian, Zhongzhi Luan. 866-872 [doi]
- The performance of IPv4 and IPv6 using UDP on IEEE 802.11n WLANs with WPA2 securitySamad S. Kolahi, Zhang Qu, Burjiz K. Soorty, Navneet Chand. 873-876 [doi]
- Using zone-disjoint multi-path routing algorithm for video transmission over ad-hoc networksAli Asghar Khavasi, Nastooh Taheri Javan. 877-882 [doi]
- A formal approach for specification and verification of fault injection processFayçal Bessayah, Ana R. Cavalli, Eliane Martins. 883-890 [doi]
- A highly effective model for security protection against eavesdropping exploitsSupachai Tangwongsan, Sathaporn Kassuvan. 891-895 [doi]
- A new fault cryptanalysis on montgomery ladder exponentiation algorithmJeaHoon Park, KiSeok Bae, Sang-Jae Moon, Dooho Choi, YouSung Kang, JaeCheol Ha. 896-899 [doi]
- A study of traceability of CDMA-based fingerprinting schemeMinoru Kuribayashi. 900-905 [doi]
- Access to culture and information through library: a perspective on Chinese copyright law reformationChuanfu Chen, Yushuang Fu, Dan Wu, Congjing Ran, Kai Sun, Gang Wu. 906-911 [doi]
- Collect and broadcast news in securityHeng-Sheng Chen, Tsang-Yean Lee, Huey-Ming Lee. 912-917 [doi]
- Design and simulation of a modified perturbed digital chaotic signal generator for secure data communicationAli Mohammed Noori Hasan. 918-922 [doi]
- Development of digital watermarking technology to protect cadastral map informationJungyeop Kim, Sungeon Hong. 923-929 [doi]
- Dynamic policy model for target based intrusion detection systemMati Pinyathinun, Chanboon Sathitwiriyawong. 930-934 [doi]
- Relationship between weight of plaintext and successful attacks in knapsack cryptosystemsYasuyuki Murakami, Tatsuo Douzono, Takeshi Nasako. 935-939 [doi]
- SEAODV: secure efficient AODV routing protocol for MANETs networksMisagh Mohammadizadeh, Ali Movaghar, Seyad Mohammad Safi. 940-944 [doi]
- Watermarking schema using an artificial immune system in spatial domainOguz Findik, Ismail Babaoglu, Erkan Ãœlker. 945-950 [doi]
- Web service description for mobile phone virusChien-Yuan Lai, Hsiu-Sen Chiang, Ching-Chiang Chen, Shih-Hao Chou. 951-956 [doi]
- A smart automatic thumbnail cropping based on attention driven regions of interest extractionI. S. Amrutha, S. S. Shylaja, S. Natarajan, K. N. Balasubramanya Murthy. 957-962 [doi]
- Application of intelligent agents for mobile tutoringLavare Henry, Suresh Sankaranarayanan. 963-969 [doi]
- Automation technique of software internationalization and localization based on lexical analysisWenlin Peng, Xiaohu Yang, Feng Zhu. 970-975 [doi]
- Contrast enhanced dynamic time warping distance for time series shape averaging classificationSongpol Ongwattanakul, Dararat Srisai. 976-981 [doi]
- Converting PDF to HTML approach based on text detectionDeliang Jiang, Xiaohu Yang. 982-985 [doi]
- From the bricks to the clicks: knowledge management in e-governmentHau-Dong Tsui, Chong-Yen Lee, Tsang-Yean Lee. 986-991 [doi]
- Making links between goal and tasks to retrieve information from web browsing historiesKenji Higuchi, Fumiko Harada, Hiromitsu Shimakawa. 992-994 [doi]
- Reinforcement learning coordination with combined heuristics in multi-agent environment for university timetablingOlga Yugay, Lee Tae Kyung, Franz I. S. Ko. 995-1000 [doi]
- Temporal-spatial association analysis of ocean salinity and temperature variationsYo-Ping Huang, Jung-Shian Jau, Frode Eika Sandnes. 1001-1006 [doi]
- The approximation of interval Bezier curves by a fuzzy rule-based systemErkan Ãœlker, Ahmet Arslan. 1007-1012 [doi]
- A study of interface design for widgets in web services through usability evaluationMiran Han, Peom Park. 1013-1018 [doi]
- Usability evaluation for history educational gamesWong Seng Yue, Nor Azan Mat Zin. 1019-1025 [doi]
- A proposal for secure vehicular communicationsPeter D. Dawoud, Dawoud S. Dawoud, R. Peplow. 1026-1032 [doi]
- LBS system using online map in 3G networks environmentSangwook Bae, Keo Oudom, Young-Guk Ha, Sunyoung Han. 1033-1037 [doi]
- An approach to combining ActiveX with MATLAB in power electronics educationWenna Li, Jianwei Leng, Zhibo Niu. 1038-1043 [doi]
- Research on cloud storage architecture and key technologiesWenying Zeng, Yuelong Zhao, Kairi Ou, Wei Song. 1044-1048 [doi]
- Practical RFID + sensor convergence toward context-aware X-realityMarie Kim, Hwang Jae Gak, Cheol-Sig Pyo. 1049-1055 [doi]
- TCP portscan detection based on single packet flows and entropyHai Zhang, Xuyang Zhu, Wenming Guo. 1056-1060 [doi]
- Virtual shared network for WBANs communication with different RF channelJinhee Park, JinWook Chung. 1061-1065 [doi]
- Improvement of Jeju National Museum service using mobile RFIDHyeon-Seok Kim, Chan Jung Park, Seong Baeg Kim. 1066-1071 [doi]
- A perceptive viewpoint controller for the Free-Viewpoint TVMin Chul Park, Kyung Joo Cheoi. 1077-1080 [doi]
- Development of integrated e-parcel management system with GSM networkMohd Helmy Abd Wahab, Danial Md. Nor, Afizah Abdoll Mutalib, Ayob Johari, Rahmat Sanudin. 1081-1085 [doi]
- Dynamic Electronic Design Automation concept, benefit and frameworkMi Zhang, Guang Hu, Shi-liang Tu, ZhiLei Chai. 1086-1090 [doi]
- A harmonized media service middleware using the emotional knowledgeJihye Lee, Yong-Ik Yoon. 1091-1094 [doi]
- Content-based music genre classification using timbral feature vectors and support vector machineShi-Huang Chen, Shih-Hao Chen. 1095-1101 [doi]
- Disk I/O based load balancing in VOD systemWei Xiong, Xiuyan Jiang, Dejian Ye. 1102-1105 [doi]
- Improved block truncation coding using low cost approach for color image compressionJ. Wang, Y. C. Jeung, J. W. Chong. 1106-1109 [doi]
- Manipulation of virtual objects in marker-less AR system by fingertip tracking and hand gesture recognitionByungsung Lee, Junchul Chun. 1110-1115 [doi]
- Realistic rendering system using the measured BRDFsSung-Soo Kim, Joo-Haeng Lee, Seung-Woo Nam. 1116-1121 [doi]
- BioProber2.0: a unified biomedical workbench with mining and probing literaturesJoon-Ho Lim, Soo-Jun Park, Hyunchul Jang, Sunhee Park. 1122-1125 [doi]
- A method for analysis linear correlation for multi-sensor of bridge monitoring systemJianting Zhou, Jianxi Yang, Diankun Wu. 1126-1129 [doi]
- Content based mammography images retrieval using Ripley s K functionLeonardo S. Kury A. Mendes, Anselmo Cardoso de Paiva, Cláudio de Souza Baptista, Aristófanes Corrêa Silva. 1130-1135 [doi]
- Parallel implementation of a financial application on a GPUMyungho Lee, Jin-Hong Jeon, Jongwoo Bae, Hyuk Soo Jang. 1136-1141 [doi]
- Lock management in blue whale file systemZhenhan Liu, Xiaoxuan Meng, Lu Xu. 1142-1147 [doi]
- Modified phase silence shift keying with phase offset for WBAN systemsJaehwan Kim, Jung-Yeol Oh, HyungSoo Lee, Jaeyoung Kim. 1149-1151 [doi]
- Sliding-window caching algorithm for streaming media serverJun Li, Zhenjing Chen. 1152-1159 [doi]
- Vertical handover between LTE and wireless LAN systems based on common resource management (CRRM) and generic link layer (GLL)Tae-sub Kim, Ryong Oh, SangJoon Lee, Suk-Ho Yoon, Choong-Ho Cho, Seng-Wan Ryu. 1160-1166 [doi]
- Design and implementation of SIP-aware DDoS attack detection systemDo-Yoon Ha, Hwan Kuk Kim, Kyounghee Ko, Chang-Yong Lee, Jeongwook Kim, Hyun-Cheol Jeong. 1167-1171 [doi]
- A bionic gait programming algorithm for hexapod robotXiaohu Lv, Yongxin Liu. 1172-1175 [doi]
- A concept in error correction of text editors: case study Thai-English setWiboonsak Watthayu, Puchong Praekhao. 1176-1180 [doi]
- Analysis of effect of highway ITS incident management systemSunghan Lim, Hyunsuk Kim. 1181-1184 [doi]
- Automatic focusing attention for a stereo pair of image sequenceMin Chul Park, Kyung Joo Cheoi. 1185-1190 [doi]
- Automatic number plate detection for Korean vehiclesHo-Sub Yoon, Hong-Chang Lee, Jaeyeon Lee. 1191-1195 [doi]
- Before and after evaluation of highway ITS based infrastructure projectHyunsuk Kim, Sunghan Lim. 1196-1200 [doi]
- Spatio-temporal mining for power load forecasting in GIS-AMR load analysis modelHeon Gyu Lee, Yonghoon Choi, Jin-Ho Shin. 1201-1206 [doi]
- A new palm vein matching method based on ICP algorithmHaifen Chen, Guangming Lu, Rui Wang. 1207-1211 [doi]
- A next generation smart energy technologyAurobi Das, V. Balakrishnan. 1212-1218 [doi]
- Complex event processing model for distributed RFID networkXiao Jia, Yuan Wenming, Wang Dong. 1219-1222 [doi]
- Non-model self-learning control of nonlinear systemWang PeiFeng, Li Yang, Cai MingWei, Wang JiChao, Li QingRu. 1223-1226 [doi]
- On some properties of covering based approximations of classifications of setsB. K. Tripathy, G. K. Panda. 1227-1232 [doi]
- ILemo: a web platform to integrate personal data and servicesJiangning Cui, Bihui Duan, Hong Liu, Taoying Liu. 1233-1238 [doi]
- Adaptive control of response in a rotor with loose foundationCai Guoqiang, Yao Dechen, Yang Jianwei, Qin Yong. 1239-1243 [doi]
- A neural network based model for VoIP speech quality predictionJiuchun Ren, Dilin Mao, Zhiwei Wang. 1244-1248 [doi]
- The usage of coarse wordage: a study of the mob rule on China's internetZengjie Cao, Yuanyuan Lin. 1249-1252 [doi]
- Vision-based two hand detection and trackingJiajun Wen, Yinwei Zhan. 1253-1258 [doi]
- A survey of prediction models for breast cancer survivabilityAmna Ali, Ali Tufail, Umer Khan, Minkoo Kim. 1259-1262 [doi]
- Characteristics of firms with effective internal control: evidence from Chinese companiesZhang Ying, Dongxiu Niu. 1263-1268 [doi]
- Research of computer simulation system based on SOATangjianfeng, Zhangxianing, Wangjicheng. 1269-1273 [doi]
- Research of mainframe CICS application integration using CICS SCATangjianfeng, Huangxianbin, Wangjicheng. 1274-1277 [doi]
- A stereo algorithm using edge-based orthogonal dynamic programmingYujuan Yang, Sidan Du. 1278-1283 [doi]
- An objective and automatic feedback model for QoS evaluationCheng Zhou, Haopeng Chen. 1284-1289 [doi]
- Parallel integration modelDingju Zhu, Jianping Fan. 1290-1292 [doi]
- Metamorphic malware detection technology based on aggregating emerging patternsJingfeng Xue, Changzhen Hu, Kunsheng Wang, Rui Ma, Jiaxin Zou. 1293-1296 [doi]
- Neural network approach for intrusion detectionAmit Kumar Choudhary, Akhilesh Swarup. 1297-1301 [doi]
- A taxonomy of security attacks on the advanced encryption standardVivaksha J. Jariwala, Devesh C. Jinwala. 1302-1305 [doi]
- BinText steganography based on Markov state transferring probabilityWeihui Dai, Yue Yu, Bin Deng. 1306-1311 [doi]
- Mathematical morphology filters applied to an image skeletonization method to generation of topological mapsJanderson R. Oliveira, Edson A. S. Filho, Roseli A. F. Romero. 1312-1317 [doi]
- Robotic path planning using multi neuron heuristic searchRahul Kala, Anupam Shukla, Ritu Tiwari. 1318-1323 [doi]
- An image denoising method by using hybrid fractal-wavelet codingChong Fu, Zhiliang Zhu. 1324-1329 [doi]
- Digital campus information portal content organization based on information architecture Fang Yuan, Ping Xiao, Qixin Liu, Xiaolong Fu. 1330-1334 [doi]
- Multi-channel video-based parallel fire detection acceleration method using multi-coresDi Xie, Ruofeng Tong, Hongsen Wu. 1335-1340 [doi]
- Multifeature biometric system based on EEG signalsHu Jian-feng. 1341-1345 [doi]
- Ontology: the historical review and literature productivity analysis using bibliometric methodology from 1956 to 2008Chi-Yen Yin, Yau-Jung Lee, Jiann-Min Yang. 1346-1350 [doi]
- A study on the productivity review for management of technology using bibliometric methodologyChi-Yen Yin, Jan-Shan Lin, Jiann-Min Yang. 1351-1356 [doi]
- Trigonometric polynomial uniform B-spline surface with shape parameterXumin Liu, Weixiang Xu, Yong Guan, Yuanyuan Shang. 1357-1363 [doi]
- Approximation algorithm and scheme for RNA structure predictionHengwu Li. 1364-1367 [doi]
- The study on the relationship between inflammatory factors and cardiac function based on chronic myocardial ischemia (syndrome of blood stasis model)Yong Wang, Huihui Zhao, Wenjing Chuo, Jianxin Chen, Shuzhen Guo, Wei Wang. 1368-1371 [doi]
- Adapting and adjusting test process reflecting characteristics of embedded software and industrial properties based on referential modelsChongwon Lee. 1372-1377 [doi]
- Anatomic model on web customer satisfaction based on customer behaviorYawei Tian, Li Zhang. 1378-1381 [doi]
- A template-based isomap algorithm for real-time removal of ocular artifacts from EEG signalsJunfeng Gao, Jiancheng Sun, Pan Lin, Chongxun Zheng, Pei Wang. 1382-1388 [doi]
- Annotating WSDL by CIDOC CRMYunxin Wang, HongYu Li. 1389-1392 [doi]
- Feature extraction and reconstruction of particles reinforced metal matrix composite microstructureJun Sun, Huazhu Song. 1393-1397 [doi]
- Design of variable pitch controller for large wind turbineWang Zi Yang, Qin Yong, Jia Li-Min. 1398-1400 [doi]
- A secure cryptosystem from palm vein biometricsB. Prasanalakshmi, A. Kannammal. 1401-1405 [doi]
- Modifying Erlang B table based upon data miningCuibo Yu, Xuerong Gou, Shasha Chai, Xunan Wang, Yunhan Xie. 1406-1409 [doi]
- Designing an electronic medical records system using design patternsYerbol Nisanbayev, Huiseong Na, Dongwook Lim, Franz Ko. 1410-1415 [doi]
- Employing PRBAC for privacy preserving data publishingAnour F. A. Dafa-Alla, Gyoyong Sohn, Keun Ho Ryu. 1416-1421 [doi]
- A research analysis on the concept of converging technology and converging types of information technologyK. H. Choi. 1422-1426 [doi]
- Coverage preserved optimal routing protocol for improving the quality of service in wireless sensor networksB. Paramasivan, Mohaideen Pitchai, D. Usha, Radha Krishnan. 1427-1431 [doi]
- Mobile based digital contents conversion service implementationBeom-Il Nam, Byeungwoo Jeon. 1432-1436 [doi]
- A pi/4-shifted differential 8PSSK modulation for high data rate WBAN systemJung-Yeol Oh, Jae-Hwan Kim, Hyung-Soo Lee, Jae-Young Kim. 1437-1440 [doi]
- Study on consumer demands and merchant participation motives of mobile payment services in ChinaXinyan Zhao, Wei Ge, Tingjie Lu. 1447-1451 [doi]
- Distributed requirement elicitation and negotiation based on the hall for workshop of meta-synthetic engineeringChao-Fan Dai, Ming-Li Wang. 1452-1456 [doi]
- Comparative Analysis of ANN trained with Back Propagation and Genetic Algorithm for Implementation of Exclusive-OR ProblemD. Kaur, A. Holland. 1457-1460 [doi]
- Design and Proposal of a Next Generation Digital Cable Broadcasting Service-Based System Using Cloud Storage Computing EnvironmentsJong Won Yang, Kim Jae Hum, Kim Soo Hyun, Young-Hwan Bang, Sang-Dong Lee. 1461-1465 [doi]
- Cryptanalysis on 2 Dimensional Subset-sum Public Key CryptosystemTomohiro Shintani, Ryuichi Sakai. 1466-1469 [doi]