Abstract is missing.
- Analysis of Automated AuctionsErol Gelenbe. 1-12 [doi]
- Advanced Mixed Reality Technologies for Surveillance and Risk Prevention ApplicationsDaniel Thalmann, Patrick Salamin, Renaud Ott, Mario Gutiérrez, Frédéric Vexo. 13-23 [doi]
- Requirements Engineering as a Key to Holistic Software QualityManfred Broy. 24-34 [doi]
- Problems and Challenges of Image-Guided Neurosurgical Navigation and InterventionJacques G. Verly, Martin Kavec, Lara M. Vigneron, Christophe Phillips, Romain Boman, Vincent Libertiaux, Jean-Philippe Ponthot, Serge Cescotto, Pierre Robe, Didier Martin, David Wikler, Marc Levivier, Jacques Brotchi. 35 [doi]
- Information and Communication Technologies in the EU s Seventh Framework ProgrammeEric Badiqué. 36 [doi]
- The Greedy Prepend Algorithm for Decision List InductionDeniz Yuret, Michael de la Maza. 37-46 [doi]
- Heuristics for Minimum Brauer Chain ProblemFatih Gelgi, Melih Onus. 47-54 [doi]
- Dispatching Rules for Allocation of Component Types to Machines in the Automated Assembly of Printed Circuit BoardsMehmet Bayram Yildirim, Ekrem Duman, Dilek Duman. 55-64 [doi]
- Heuristic Approach to Schedule Crew for a Regional AirlineByung Tech Kim, Young Hoon Lee. 65-74 [doi]
- Automatic Segmentation of the Liver in CT Images Using a Model of Approximate ContourMarcin Ciecholewski, Krzysztof Debski. 75-84 [doi]
- Unambiguous 3D Measurements by a Multi-period Phase Shift MethodErik Lilienblum, Bernd Michaelis. 85-94 [doi]
- Hybrid Techniques for Dynamic Optimization ProblemsDemet Ayvaz, Haluk Topcuoglu, Fikret S. Gürgen. 95-104 [doi]
- Minimizing the Search Space for Shape Retrieval AlgorithmsM. Abdullah-Al-Wadud, Oksam Chae. 105-114 [doi]
- Decision Support for Packing in WarehousesGürdal Ertek, Kemal Kilic. 115-124 [doi]
- A Fast Partial Distortion Elimination Algorithm Using Selective Matching ScanJong-Nam Kim, Tae-Kyung Ryu, Yongjae Jeong. 125-133 [doi]
- Variable Neighborhood Search for the Orienteering ProblemZülal Sevkli, Fatih Erdogan Sevilgen. 134-143 [doi]
- Extracting Gene Regulation Information from Microarray Time-Series Data Using Hidden Markov ModelsOsman N. Yogurtçu, Engin Erzin, Attila Gürsoy. 144-153 [doi]
- Asymptotical Lower Limits on Required Number of Examples for Learning Boolean NetworksOsman Abul, Reda Alhajj, Faruk Polat. 154-164 [doi]
- Modified Association Rule Mining Approach for the MHC-Peptide Binding ProblemGalip Gürkan Yardimci, Alper Küçükural, Yücel Saygin, Osman Ugur Sezerman. 165-173 [doi]
- Prediction and Classification for GPCR Sequences Based on Ligand Specific FeaturesBekir Ergüner, Özgün Erdogan, Osman Ugur Sezerman. 174-181 [doi]
- An Efficient Algorithm for the Identification of Repetitive Variable Motifs in the Regulatory Sequences of Co-expressed GenesAbanish Singh, Nikola Stojanovic. 182-191 [doi]
- An Intelligent Shopping Agent for Optimal Purchasing Decision on the Semantic WebHak-Jin Kim, Wooju Kim, Jungmyong Kim. 192-201 [doi]
- Adapting the Pyramid Technique for Indexing Ontological DataÖvünç Öztürk, Tugba Özacar, Murat Osman Ünalir, Ata Önal. 202-211 [doi]
- Comparison of Different Neural Networks Performances on Motorboat DatasetsM. Fatih Amasyali, Mert Bal, Ugur B. Çelebi, Serkan Ekinci, U. Kasif Boyaci. 212-220 [doi]
- Dynamic Role Assignment for Multi-agent CooperationIn-Cheol Kim. 221-229 [doi]
- Lexical Ambiguity Resolution for Turkish in Direct Transfer Machine Translation ModelsA. Cüneyd Tantug, Esref Adali, Kemal Oflazer. 230-238 [doi]
- Design of a Feature Set for Face Recognition ProblemEmre Akbas, Fatos T. Yarman-Vural. 239-247 [doi]
- Low-Cost Microarchitectural Techniques for Enhancing the Prediction of Return Addresses on High-Performance Trace Cache ProcessorsYunhe Shi, Emre Özer, David Gregg. 248-257 [doi]
- Recovery Logics for Speculative Update Global and Local Branch HistoryJong Wook Kwak, Chu Shik Jhon. 258-266 [doi]
- An ILP Formulation for Task Scheduling on Heterogeneous Chip MultiprocessorsSuleyman Tosun, Nazanin Mansouri, Mahmut T. Kandemir, Ozcan Ozturk. 267-276 [doi]
- Hardware Designs for Local Alignment of Protein SequencesMustafa Gök, Çaglar Yilmaz. 277-285 [doi]
- A New Model of BAM: Alpha-Beta Bidirectional Associative MemoriesMaría Elena Acevedo-Mosqueda, Cornelio Yáñez-Márquez, Itzamá López-Yáñez. 286-295 [doi]
- PARM: Data Structure for Efficient Volume Ray CastingSukhyun Lim, Byeong-Seok Shin. 296-305 [doi]
- Triangle Propagation for Mass-Spring Chain AlgorithmAlpaslan Duysak. 306-315 [doi]
- Hardware Acceleration of Terrain Visualization Using ::::ef-::::BuffersHyun-Duk Chang, Byeong-Seok Shin. 316-324 [doi]
- Computer Simulation of Woven Fabric Defects Based on Faulty Yarn PhotographsHakan Özdemir, Güngör Baser. 325-333 [doi]
- Bidirectional Distancemap for Efficient Volume Ray CastingSukhyun Lim, Byeong-Seok Shin. 334-342 [doi]
- Segmenting Free-Form 3D Objects by a Function Representation in Spherical CoordinatesOlcay Sertel, Cem Ünsalan. 343-352 [doi]
- Applying Natural Neighbor Coordinates for Electromagnetic Tracker CalibrationYi Li, Weidong Chen, Dongming Lu, Lei Zhao. 353-362 [doi]
- Minkowski Sum Based Octree Generation for Triangular MeshesEngin Deniz Diktas, Ali Vahit Sahiner. 363-373 [doi]
- Hardware-Oriented Visualisation of TreesCristina Rebollo, Inmaculada Remolar, Miguel Chover, Jesús Gumbau. 374-383 [doi]
- A Multi-resolution Technique for Real-time Animation of Large CrowdsIngu Kang, Young Ik Eom, JungHyun Han. 384-393 [doi]
- A Framework for Working with Digitized Cultural Heritage ArtifactsCan Ozmen, Selim Balcisoy. 394-400 [doi]
- On the Stability of Application-Layer Multicast TreeKe Xu, Jiangchuan Liu, Lizheng Fu, Chunyu Liu. 401-412 [doi]
- Extended Authentication Integrating Scheme for Beyond 3G Wireless NetworksJongMin Jeong, Goo Yeon Lee, Sang-Jae Moon. 413-423 [doi]
- A New Function for Optimization of Working Paths in Survivable MPLS NetworksKrzysztof Walkowiak. 424-433 [doi]
- HIMUTSIS: Hierarchical Multi-tier Adaptive Ad-Hoc Network Security Protocol Based on Signcryption Type Key Exchange SchemesAttila Altay Yavuz, Fatih Alagöz, Emin Anarim. 434-444 [doi]
- Dual-Level Traffic Smoothing Technique over Switched Ethernet for Hard Real-Time CommunicationHai Jin, Minghu Zhang, Pengliu Tan. 445-454 [doi]
- A Model of a Packet Aggregation SystemJung Ha Hong, Oleg Gusak, Neal Oliver, Khosrow Sohraby. 455-463 [doi]
- On the Use of Principle Component Analysis for the Hurst Parameter Estimation of Long-Range Dependent Network TrafficMelike Erol, Tayfun Akgul, Sema F. Oktug, Suleyman Baykut. 464-473 [doi]
- Throughput Analysis of UDP and VPN Traffic in 802.11g NetworksSüheyla Ikiz, Y. Murat Erten. 474-482 [doi]
- Path Loss Rate Driven Burst Assembly in OBS NetworksBurak Kantarci, Sema F. Oktug. 483-492 [doi]
- Pixel Domain Spatio-temporal Denoising for Archive VideosM. Kemal Güllü, Oguzhan Urhan, Sarp Ertürk. 493-502 [doi]
- Fast Sub-pixel Motion Estimation by Means of One-Bit TransformOrhan Akbulut, Oguzhan Urhan, Sarp Ertürk. 503-510 [doi]
- Neighborhood Decomposition of Convex Structuring Elements for Mathematical Morphology on Hexagonal GridSyng-Yup Ohn. 511-521 [doi]
- Block Motion Estimation Using Modified Two-Bit TransformBegüm Demir, Sarp Ertürk. 522-531 [doi]
- 3D Face Tracking Using Appearance Registration and Robust Iterative Closest Point AlgorithmFadi Dornaika, Angel Domingo Sappa. 532-541 [doi]
- Video as Input: Spiral Search with the Sparse Angular SamplingTatiana Evreinova, Grigori E. Evreinov, Roope Raisamo. 542-552 [doi]
- An Adept Segmentation Algorithm and Its Application to the Extraction of Local Regions Containing Fiducial PointsErhan AliRiza Ince, Syed Amjad Ali. 553-562 [doi]
- Lossless Compression of Volumetric Medical DataSamy Ait-Aoudia, Fatma-Zohra Benhamida, Mohamed-Azzeddine Yousfi. 563-571 [doi]
- Identification of Luminal and Medial Adventitial Borders in Intravascular Ultrasound Images Using Level SetsAli Iskurt, Sema Candemir, Yusuf Sinan Akgul. 572-582 [doi]
- Prediction of Moving Object Location Based on Frequent TrajectoriesMikolaj Morzy. 583-592 [doi]
- A Framework for Visualizing Association Mining ResultsGürdal Ertek, Ayhan Demiriz. 593-602 [doi]
- Credential-Based Policies Management in an Access Control Framework Protecting XML ResourcesKonstantina Stoupa, Zisis Simeoforidis, Athena Vakali. 603-612 [doi]
- Evaluating Proposals in Web Services NegotiationYonglei Yao, Fangchun Yang, Sen Su. 613-621 [doi]
- Nested Bitemporal Relational AlgebraAbdullah Uz Tansel, Canan Eren Atay. 622-633 [doi]
- A Protocol for Reconciling Recovery and High-Availability in Replicated DatabasesJosé Enrique Armendáriz-Iñigo, Francesc D. Muñoz-Escoí, Hendrik Decker, J. R. Juárez-Rodríguez, José Ramón González de Mendívil. 634-644 [doi]
- Migrating a Hierarchical Legacy Database Application onto an XML-Based Service-Oriented Web PlatformÖzgür Yürekten, Kivanç Dinçer, Berk Akar, Müberra Sungur, Elif Kurtaran Özbudak. 645-654 [doi]
- Power-Aware Processors for Wireless Sensor NetworksGürhan Küçük, Can Basaran. 655-664 [doi]
- Effects of Asynchronism and Neighborhood Size on Clustering in Self-propelled Particle SystemsAndaç T. Samiloglu, Veysel Gazi, A. Bugra Koku. 665-676 [doi]
- Virtual-ROM: A New Demand Paging Component for RTOS and NAND Flash Memory Based Mobile DevicesHyojun Kim, Jihyun In, DongHoon Ham, SongHo Yoon, Dongkun Shin. 677-686 [doi]
- Model-Driven Development of RTOS-Based Embedded SoftwareJi Chan Maeng, Dongjin Na, Yongsoon Lee, Minsoo Ryu. 687-696 [doi]
- A Target Oriented Agent to Collect Specific Information in a Chat MediumCemal Köse, Özcan Özyurt. 697-706 [doi]
- Algorithms for Within-Cluster Searches Using Inverted FilesIsmail Sengör Altingövde, Fazli Can, Özgür Ulusoy. 707-716 [doi]
- Effect of Inverted Index Partitioning Schemes on Performance of Query Processing in Parallel Text Retrieval SystemsBerkant Barla Cambazoglu, Aytul Catal, Cevdet Aykanat. 717-725 [doi]
- Exploiting Social Networks Dynamics for P2P Resource OrganisationVincenza Carchiolo, Michele Malgeri, Giuseppe Mangioni, Vincenzo Nicosia. 726-734 [doi]
- Security Considerations in e-CognocracyJoan Josep Piles, José Luis Salazar, José Ruíz, José María Moreno-Jiménez. 735-744 [doi]
- A Dynamic Service Range Management Strategy for Improving Mobile Multicast Protocol PerformancePing Wang, Yunze Cai, Jinjie Huang, Xiaoming Xu. 745-754 [doi]
- A Survey of Major Challenges and Future Directions for Next Generation Pervasive ComputingYong-Bin Kang, Yusuf Pisan. 755-764 [doi]
- Camera-Based Virtual Environment Interaction on Mobile DevicesTolga K. Çapin, Antonio Haro, Vidya Setlur, Stephen Wilkinson. 765-773 [doi]
- A Cost Model for an Adaptive Cell-Based Index StructureWonik Choi, Jinseok Chae, Nam-Joong Kim, Mee Young Sung. 774-782 [doi]
- Positioning Method for Outdoor Systems in Wireless Sensor NetworksNam-koo Ha, Kijun Han. 783-792 [doi]
- Formal Description of a Runtime Infrastructure for Automatic Distribution of ProgramsOmid Bushehrian, Saeed Parsa. 793-802 [doi]
- Super-Peer Selection Based Framework Using Dynamic Capacity and SimilaritySu-Hong Min, Dong-Sub Cho. 803-812 [doi]
- A General Graph Model for Representing Exact Communication Volume in Parallel Sparse Matrix-Vector MultiplicationAleksandar Trifunovic, William J. Knottenbelt. 813-824 [doi]
- Safety of Rollback-Recovery Protocol Maintaining WFR Session GuaranteeJerzy Brzezinski, Anna Kobusinska, Jacek Kobusinski. 825-833 [doi]
- 3-D Parallel Implementation of the Wave-Equation PML Algorithm Using Distributed SystemOyku Akaydin, Omar Ramadan. 834-843 [doi]
- Trustworthy Distributed Algorithm Design to Defend Distance Cheating in Link-Weighted ALMDan Li, Jianping Wu, Yong Cui, Jiangchuan Liu, Ke Xu. 844-853 [doi]
- jEQN a Java-Based Language for the Distributed Simulation of Queueing NetworksAndrea D Ambrogio, Daniele Gianni, Giuseppe Iazeolla. 854-865 [doi]
- Exact Performance Measures for Peer-to-Peer Epidemic Information DiffusionÖznur Özkasap, Emine Sule Yazici, Selda Küçükçifçi, Mine Çaglar. 866-876 [doi]
- A Leader Election Protocol for Timed Asynchronous Distributed SystemsAmirhasan Amintabar, Alexander Kostin, Ljudmila Ilushechkina. 877-886 [doi]
- Computing the Steady-State Distribution of G-networks with Synchronized Partial FlushingJean-Michel Fourneau, Franck Quessette. 887-896 [doi]
- Worst-Case Analysis of Router Networks with Rival Queueing ModelsNalan Gülpinar, Peter G. Harrison, Berç Rustem. 897-907 [doi]
- An Anomaly Intrusion Detection Approach Using Cellular Neural NetworksZhongxue Yang, Adem Karahoca. 908-917 [doi]
- A Lookup Table Model for Time-Memory Trade-Off Attacks on Binary Additive Stream CiphersImran Erguler, Emin Anarim. 918-923 [doi]
- Improved Merkle Cryptosystem (IMC)Attila Altay Yavuz, Emin Anarim, Fatih Alagöz. 924-934 [doi]
- Threshold Cryptography Based on Asmuth-Bloom Secret SharingKamer Kaya, Ali Aydin Selçuk, Zahir Tezcan. 935-942 [doi]
- Capture Resilient ElGamal Signature ProtocolsHüseyin Acan, Kamer Kaya, Ali Aydin Selçuk. 943-951 [doi]
- A New Efficient Protocol for Authentication and Certificate Status Management in Personal Area NetworksChul Sur, Jong-Phil Yang, Kyung Hyune Rhee. 952-962 [doi]
- A New Image Encryption Algorithm Based on One-Dimensional Polynomial Chaotic MapsAmir Akhavan, Hadi Mahmodi, Afshin Akhshani. 963-971 [doi]
- A Non-committing Encryption Scheme Based on Quadratic ResidueFeiyu Lei, Wen Chen, Kefei Chen. 972-980 [doi]
- Biometric Cryptosystem Using Online SignaturesAlisher Kholmatov, Berrin A. Yanikoglu. 981-990 [doi]
- Finite Field Polynomial Multiplication in the Frequency Domain with Application to Elliptic Curve CryptographySelçuk Baktir, Berk Sunar. 991-1001 [doi]
- A Threshold Proxy Signature Scheme with Nonrepudiation and AnonymityYuan Yumin. 1002-1010 [doi]
- Deterministic Analysis of Balancedness in Symmetric CryptographyCandelaria Hernández-Goya, Amparo Fúster-Sabater. 1011-1020 [doi]
- Test Suite Reduction Based on Dependence AnalysisGuy-Vincent Jourdan, Panitee Ritthiruangdech, Hasan Ural. 1021-1030 [doi]
- Realism in Project-Based Software Engineering Courses: Rewards, Risks, and RecommendationsPierre Flener. 1031-1039 [doi]
- Problems of Adiabatic Quantum Program DesignEvgeniya Khusnitdinova, A. C. Cem Say. 1040-1049 [doi]
- Modified Cognitive Complexity MeasureSanjay Misra. 1050-1059 [doi]
- Coverage-Based, Prioritized Testing Using Neural Network ClusteringNida Gökçe, Mubariz Eminov, Fevzi Belli. 1060-1071 [doi]
- Component Oriented Design Based on Axiomatic Design Theory and COSEMLCengiz Togay, Ali H. Dogru. 1072-1079 [doi]