Abstract is missing.
- Jigsaw-based Secure Data Transfer over Computer NetworksRangarajan Vasudevan, Ajith Abraham, Sugata Sanyal, Dharma P. Agrawal. 2-6 [doi]
- Semi-Fragile Watermarking Scheme for Authentication of JPEG ImagesChi Kin Ho, Chang-Tsun Li. 7-11 [doi]
- Mitigating the Untrusted Terminal Problem Using Conditional SignaturesIstván Zsolt Berta, Levente Buttyán, István Vajda. 12-16 [doi]
- Arcanum : A Secure and Efficient Key Exchange Protocol for the InternetAjmal S. Mian, Ashraf Masood. 17-21 [doi]
- A Security Protocol for Certified E-Goods DeliveryAleksandra Nenadic, Ning Zhang, Stephen Barton. 22 [doi]
- Enhancing Anonymity via Market CompetitionShouhuai Xu, William Robert Nelson Jr., Ravi S. Sandhu. 30-34 [doi]
- A Secure Account-Based Mobile Payment ProtocolSupakorn Kungpisdan, Bala Srinivasan, Phu Dung Le. 35-39 [doi]
- Accountability Logic for Mobile Payment ProtocolsSupakorn Kungpisdan, Bala Srinivasan, Phu Dung Le. 40-44 [doi]
- Face Recognition Using Interpolated Bezier Curve Based RepresentationSarbajit Pal, P. K. Biswas, Ajith Abraham. 45-49 [doi]
- Run-time Detection of Buffer Overflow Attacks without Explicit Sensor Data ObjectsChangwoo Pyo, Byungchul Bae, Taejin Kim, Gyungho Lee. 50 [doi]
- Achieving Distributed Trusted ServicesOmaima Bamasak, Ning Zhang. 56-61 [doi]
- Performance Evaluation of Data Integrity Mechanisms for Mobile AgentsVandana Gunupudi, Stephen R. Tate. 62-69 [doi]
- Adaptive Neuro-Fuzzy Intrusion Detection SystemsSampada Chavan, Khusbu Shah, Neha Dave, Sanghamitra Mukherjee, Ajith Abraham, Sugata Sanyal. 70-74 [doi]
- Cryptographic Protocol Analysis using Goal ExtractionJanica Edmonds, Mauricio Papa. 75-80 [doi]
- ProtoMon: Embedded Monitors for Cryptographic Protocol Intrusion Detection and PreventionSachin P. Joglekar, Stephen R. Tate. 81 [doi]
- Web Server Attack Categorization based on Root Causes and Their LocationsJeongseok Seo, Han-Sung Kim, Sanghyun Cho, Sung Deok Cha. 90-96 [doi]
- A Fast Pattern-Match Engine for Network Processor-based Network Intrusion Detection SystemRong-Tai Liu, Nen-Fu Huang, Chia-Nan Kao, Chih-Hao Chen, Chi-Chieh Chou. 97-101 [doi]
- A Modified Optical Image Reconstruction Model with Information FeedbackChaoyang Zhang, Yukong Zhang. 102-106 [doi]
- Threshold and Identity-based Key Management and Authentication for Wireless Ad Hoc NetworksHongmei Deng, Anindo Mukherjee, Dharma P. Agrawal. 107-111 [doi]
- An Extensible Framework for Practical Secure Component Composition in a Ubiquitous Computing EnvironmentDavid Llewellyn-Jones, Madjid Merabti, Qi Shi, Bob Askwith. 112-117 [doi]
- Distributed Knowledge Networks: Towards a New Paradigm for Delivering KnowledgeAlfredo Cuzzocrea, Fernando Bellas. 118-123 [doi]
- Identity-Based Threshold Signature Scheme from the Bilinear PairingsJoonsang Baek, Yuliang Zheng. 124-128 [doi]
- HORSE: An Extension of an r-Time Signature Scheme With Fast Signing and VerificationWilliam D. Neumann. 129 [doi]
- Recurrent Exercises for Introductory Human Computer Interaction CoursesRenée Turban. 136-140 [doi]
- A New Approach to Learning AlgorithmsTomasz Müldner, Elhadi Shakshuki. 141-145 [doi]
- Computer Skills Training to (Middle-aged) Adults: Problems and ProgramAntoni Martínez-Ballesté, Francesc Sebé, Josep Domingo-Ferrer. 146-150 [doi]
- Dependency Theory E-Learning ToolPaul Douglas, Steve Barker. 151-155 [doi]
- A Web-Service Oriented Framework for building SCORM Compatible Learning Management SystemsChih-Ping Chu, Ching-Pao Chang, Chung-Wei Yeh, Yu-Fang Yeh. 156 [doi]
- Games and Animation: Collaborations Between the Arts and Computer ScienceJ. R. Parker. 164-168 [doi]
- Web-based Mathematics Education: MeML Design and ImplementationPaul S. Wang, Yi Zhou, Xiao Zou. 169-175 [doi]
- IT Security Project: Implementation of the Advanced Encryption Standard (AES) on a Smart CardKai Schramm, Christof Paar. 176-180 [doi]
- An Instructor s Environment for Automatic Generation of Problem SequencesPavel Azalov, Fani Zlatarova. 181-185 [doi]
- The Development of a Philosophy for an Applied Web Programming CurriculumJill E. Courte. 186 [doi]
- Assessing Distance Learning Student s Performance: A Natural Language Processing Approach to Analyzing Class Discussion MessagesYi-fang Brook Wu, Xin Chen. 192-196 [doi]
- Auxiliar: A Case-Based System to Assist Online CoursesDilermando Piva Jr., Ricardo Luís de Freitas, Mauro Sérgio Miskulin, Gilberto Shigueo Nakamiti, Carlos Miguel Tobar. 197-201 [doi]
- Building an Effective Groupware SystemMohammed Abdel Razek, Claude Frasson, Marc Kaltenbach. 202-206 [doi]
- A Standard Visual Courseware Authoring Tool Based on Content Packaging SpecificationZongkai Yang, Gang Zhao, Di Wu, Jianhua He. 207-211 [doi]
- GAME: A Generic Automated Marking Environment for Programming AssessmentMichael Blumenstein, Steve Green, Ann Nguyen, Vallipuram Muthukkumarasamy. 212 [doi]
- A Novel Approach for New E-commerce Product Positioning and to-go/not-to go with Rapid Prototyping ExperienceSheikh Iqbal Ahamed. 218-222 [doi]
- Dynamic Identification of Correspondence Assertions for Electronic Commerce Data IntegrationChima Adiele, Sylvanus A. Ehikioya. 223-227 [doi]
- A Topology Viewer for Distributed Brokering SystemsAmey Dharurkar, Shrideep Pallickara, Geoffrey Fox. 228-234 [doi]
- The Impacts of Professions in Systems DevelopmentAnn Johansson. 235-240 [doi]
- Automatic Estimation of Stock Market Forecasting and Generating the Corresponding Natural Language ExpressionQiong Liu, Xin Lu, Fuji Ren, Shingo Kuroiwa. 241-245 [doi]
- Special Technique for Optimizing Teaching-Learning Process in CBT SoftwareRajiv Dharaskar. 246-250 [doi]
- Extending the Undergraduate Computer Science Curriculum to Include Data MiningNazli Goharian, David A. Grossman, N. Raju. 251-254 [doi]
- Extending the Wiki Paradigm for Use in the ClassroomChien-Min Wang, David Turner. 255 [doi]
- Information Retrieval with Principal ComponentsAlbert Hoang. 262-266 [doi]
- Financial Activity Mining from Online Multilingual NewsPik-Shan Cheung, Ruizhang Huang, Wai Lam. 267-271 [doi]
- Enabling Personalization Recommendation With WeightedFP for Text Information Retrieval Based on User-FocusZhenya Zhang, Enhong Chen, Jin Wang, Xufa Wang. 272-276 [doi]
- The e-Salesman SystemMagdalene P. Ting, Vishal Seth, Jerry Gao. 277-282 [doi]
- From Keywords to Links: an Automatic ApproachJihong Zeng, Peter A. Bloniarz. 283-286 [doi]
- Toward Dialogues With Documents: MultiBrowserDaniel Berleant, Jinghao Miao, Zhong Gu, Dongping Xu. 287-294 [doi]
- From Paragraph Networks to Document NetworksJinghao Miao, Daniel Berleant. 295 [doi]
- Refined Extended Preorder Index with Path InformationGuangming Xing, Dongli Zhang. 304-308 [doi]
- Multitasking Web Search on Alta VistaAmanda Spink, Minsoo Park, Bernard J. Jansen, Jan O. Pedersen. 309-313 [doi]
- Extracting New Topic Contents from Hidden Web SitesTakanori Mouri, Hiroyuki Kitagawa. 314-319 [doi]
- Enhancing Usability of Flight and Fare Search Functions for Airline and Travel Web SitesCraig Chariton, Min-Hyung Choi. 320-325 [doi]
- A Hybrid Classifier Approach for Web Retrieved Documents ClassificationRazvan Stefan Bot, Yi-fang Brook Wu, Xin Chen, Quanzhi Li. 326 [doi]
- Web Page Fragmentation for Personalized Portal ConstructionChristos Bouras, Vaggelis Kapoulas, Ioannis Misedakis. 332-336 [doi]
- TIN: An Interactive Image Navigator Providing Ubiquitous Access To Distributed Geo-Spatial DataBienvenido Vélez, Amaury Cabarcas, Lizvette Malavé. 337-343 [doi]
- Exploring Similarity among Web Pages Using the Hyperlink StructureShou-Hsuan Stephen Huang, Carlos Humberto Molina-Rodríguez, Jesús Ubaldo Quevedo-Torrero, Mario Francisco Fonseca-Lozada. 344-348 [doi]
- Anxiously Seeking Answers: How Attitude Affects Search PerformanceWendy T. Lucas, Heikki Topi. 349-353 [doi]
- XCpaqs: Compression of XML Document with XPath Query SupportHongzhi Wang, Jianzhong Li, Jizhou Luo, Zhenying He. 354 [doi]
- Matching Techniques for Resource Discovery in Distributed Systems Using Heterogeneous Ontology DescriptionsSilvana Castano, Alfio Ferrara, Stefano Montanelli, Gianpaolo Racca. 360-366 [doi]
- Application Service Provision through the Grid: Business models and ArchitecturesBill Vassiliadis, Kostas Giotopoulos, Konstantinos Votis, Spyros Sioutas, Nikos Bogonikolos, Spiros Likothanassis. 367-371 [doi]
- The GRelC Library: A Basic Pillar in the Grid Relational Catalog ArchitectureGiovanni Aloisio, Massimo Cafaro, Sandro Fiore, Maria Mirto. 372-376 [doi]
- Content-Addressable IBP - Rationale, Design and PerformanceRebecca L. Collins, James S. Plank. 377-281 [doi]
- The LAG Grammar for Authoring the Adaptive WebAlexandra I. Cristea, Michael Verschoor. 382-288 [doi]
- Adaptation and Reuse in Designing Web Information SystemsFlavius Frasincar, Peter Barna, Geert-Jan Houben, Zoltán Fiala. 387-291 [doi]
- On-line Generation of Suggestions for Web UsersFabrizio Silvestri, Ranieri Baraglia, Paolo Palmerini, Massimo Serranó. 392-397 [doi]
- Reinforcement Learning Architecture for Web RecommendationsNick Golovin, Erhard Rahm. 398 [doi]
- Protocol Analysis in Intrusion Detection Using Decision TreeTarek Abbes, Adel Bouhoula, Michaël Rusinowitch. 404-408 [doi]
- Security Protection and Checking in Embedded System Integration Against Buffer Overflow AttacksZili Shao, Chun Xue, Qingfeng Zhuge, Edwin Hsing-Mean Sha, Bin Xiao. 409-413 [doi]
- Low-Intrusive Consistent Disk Checkpointing: A Tool for Digital ForensicsSriranjani Sitaraman, Subbarayan Venkatesan. 414-418 [doi]
- Dynamic Control of Worm PropagationRam Dantu, João W. Cangussu, Arun Yelimeli. 419-423 [doi]
- Towards Framework Selection Criteria and Suitability for an Application FrameworkSheikh Iqbal Ahamed, Alex Pezewski, Al Pezewski. 424 [doi]
- Robust Partner Selection Scheme for Information Quality Assurance despite Uncertainty in Open Multi-Agent SystemsK. Suzanne Barber, Jisun Park. 430-434 [doi]
- A System for Ensuring Data Integrity in Grid EnvironmentsAustin Gilbert, Ajith Abraham, Marcin Paprzycki. 435-439 [doi]
- Defeating the Current Steganalysis Techniques (Robust Steganography)Andrew H. Sung, Gopalakrishna Reddy Tadiparthi, Srinivas Mukkamala. 440-444 [doi]
- Risk Management using Behavior based Attack GraphsRam Dantu, Kall Loper, Prakash Kolan. 445-449 [doi]
- A Model for Team-based Access Control (TMAC 2004)Fahad T. Alotaiby, Jim X. Chen. 450 [doi]
- An Object-Based Approach for Digital Video RetrievalMark Smith, Alireza Khotanzad. 456-459 [doi]
- A Mathematical Model of Similarity and ClusteringFu-Shing Sun, Chun-Hung Tzeng. 460-464 [doi]
- Mining Association Rules from Relations on a Parallel NCR Teradata Database SystemSoon Myoung Chung, Murali Mangamuri. 465-470 [doi]
- A New Reparation Method for Incomplete Data in the Context of Supervised LearningMatteo Magnani, Danilo Montesi. 471-475 [doi]
- Adaptive Web Document Classification with MCRDRYang Sok Kim, Sung Sik Park, Edward Deards, Byeong Ho Kang. 476 [doi]
- Physically Locating Wireless IntrudersFrank Adelstein, Prasanth Alla, Rob Joyce, Golden G. Richard III. 482 [doi]
- Replicate Relational and XML Databases for Internet ComputingJoseph Fong, Hing Kwok Wong. 492-496 [doi]
- Modeling Long Duration Transactions with Time Constraints in Active DatabaseD. S. Yadav, Rajeev Agrawal, D. S. Chauhan, R. C. Saraswat, Arun K. Majumdar. 497-501 [doi]
- Accessing Temporal Data Objects in Mobile Computing EnvironmentsArthur C. S. Wong, Victor C. S. Lee, Kwok-Wa Lam. 502-506 [doi]
- Fuzzy Inclusion Dependencies in Fuzzy Relational DatabasesAwadhesh Kumar Sharma, A. Goswami, D. K. Gupta. 507-510 [doi]
- Server-side Broadcast Transaction in Mobile Computing EnvironmentBryan Hin Cheung Poon, Kwok-Wa Lam, Victor C. S. Lee. 511 [doi]
- Survivability and Applicability in Database Constraints: Temporal Boundary to Data Integrity ScenariosLuiz Camolesi Jr.. 518-522 [doi]
- Protecting Federated Databases Using A Practical Implementation of a Formal RBAC PolicySteve Barker, Paul Douglas. 523-527 [doi]
- A Model for Multiple-Query Processing Based upon Strong FactoringJamal R. Alsabbagh, Vijay V. Raghavan. 528-533 [doi]
- Component-based Embedded Database for Mobile Embedded SystemsSheikh Iqbal Ahamed, Sanjay Vallecha. 534-538 [doi]
- Mapping Methods and Query for Aggregation and Association in Object-Relational Database using CollectionEric Pardede, J. Wenny Rahayu, David Taniar. 539 [doi]
- Community, Context, and Distance EducationJohn Rothfork. 546-550 [doi]
- A Constraint-Based Query Modification Engine for Retrofitting COTS DBMS sMoses Garuba, Ronald Langrin, Legand L. Burge III. 551-556 [doi]
- The Design and Implementation of the MESSENGER Trajectory DatabaseJoseph Gill, Legand L. Burge III, Moses Garuba. 557-561 [doi]
- Pedagogical Issues in Programming LanguagesJohn T. Minor, Laxmi Gewali. 562-565 [doi]
- Performance Study of a MLS/DBMS Implemented as a Kernelized ArchitectureMoses Garuba, Edward Appiah, Legand L. Burge III. 566 [doi]
- A Systolic Memory Architecture for Fast Codebook Design based on MMPDCL AlgorithmKentaro Sano, Chiaki Takagi, Ryusuke Egawa, Ken-ichi Suzuki, Tadao Nakamura. 572-578 [doi]
- Semi-Parallel Reconfigurable Architectures for Real-Time LDPC DecodingMarjan Karkooti, Joseph R. Cavallaro. 579-585 [doi]
- An Object-Oriented Database-based Architecture for Mobile Enterprise ApplicationsRobert Steele, Yuri Ventsov, Tharam S. Dillon. 586-590 [doi]
- A Formal Approach to Software Architecture of Agent-Base SystemsHassan Reza, Emanuel S. Grant. 591 [doi]
- Minimization of Boundary Artifacts on Scalable Image Compression Using Symmetric-Extended Wavelet TransformWeiting Cai, Malek Adjouadi. 598-602 [doi]
- Arbitrary Trajectories Tracking using Multiple Model Based Particle Filtering in Infrared Image SequenceMukesh A. Zaveri, Shabbir N. Merchant, Uday B. Desai. 603-607 [doi]
- Effect of Initial HMM Choices in Multiple Sequence Training for Gesture RecognitionNianjun Liu, Richard I. A. Davis, Brian C. Lovell, Peter J. Kootsookos. 608-613 [doi]
- Resampling Based Method for Pixel-wise Correspondence between 3D FacesChunliang Gu, Baocai Yin, Yongli Hu, Shiquan Cheng. 614-619 [doi]
- Recognizing Non-rigid Human Actions Using Joints Tracking in Space-timeXin Lu, Qiong Liu, Shunichiro Oe. 620 [doi]
- Robust Segmentation Using Parametric and Nonparametric Local Spatial PosteriorsEunSang Bak, Kayvan Najarian. 626-630 [doi]
- A Robust Face Recognition System for Real Time SurveillanceMing-Jung Seow, Rajkiran Gottumukkal, Deepthi Valaparla, Vijayan K. Asari. 631-635 [doi]
- A Fuzzy Approach to Texture SegmentationMadasu Hanmandlu, Vamsi Krishna Madasu, Shantaram Vasikarla. 636-642 [doi]
- Spherical Parameterization for 3D Surface Analysis in Volumetric ImagesLi Shen, Fillia Makedon. 643-649 [doi]
- Factors that Affect the Performance of the DCT-Block Based Image Watermarking AlgorithmsMohammad Eyadat. 650 [doi]
- Design of an Efficient Architecture for Real-time Image Enhancement Based on a Luma-Dependent Nonlinear ApproachHau T. Ngo, Li Tao, Vijayan K. Asari. 656-660 [doi]
- Determination of Pose Angle of Face using Dynamic Space Warping (DSW)B. Yegnanarayana, Anil Kumar Sao, B. V. K. Vijaya Kumar, Marios Savvides. 661-664 [doi]
- Fuzzy Edge Detector Using Entropy OptimizationMadasu Hanmandlu, John See, Shantaram Vasikarla. 665-670 [doi]
- Digital Watermarking on Still Images Using Wavelet TransformReza Safabakhsh, Shiva Zaboli, Arash Tabibiazar. 671-675 [doi]
- Feature Weighting Methods for Abstract Features Applicable to Motion based Video IndexingAshfaqur Rahman, M. Manzur Murshed, Laurence Dooley. 676 [doi]
- National Science Foundation Project on Advanced Online Education in Information TechnologyVladimir Uskov, Alexander Uskov. 682-686 [doi]
- Visual XML Schemas Based on Reserved Graph GrammarsGuang-Lei Song, Kang Zhang. 687-691 [doi]
- User Interface Augmentation: Vision and SoundJ. R. Parker, M. Baumback. 692-697 [doi]
- Combining the Product of Interactive Multimedia Creator with MPEG4 TechnologyXiang Zheng, Bing-Feng Zhou, Xi-Feng Fang, Jin-Wen Sun, Duan-Feng Si. 698 [doi]
- Experience in Teaching Object-Oriented Concepts to First Year Students with Diverse BackgroundsMichael Blumenstein. 704-708 [doi]
- Web-Based Mathematics Education with MathChatDavid Chiu. 709-717 [doi]
- Adaptive Course Creation for AllAlexandra I. Cristea. 718-722 [doi]
- Improving Retention of Minority Freshmen in Engineering by Applying the Six Sigma MethodologyLegand L. Burge III, Moses Garuba, Charita Brent. 723-728 [doi]
- Implementing Directed Lines of Reasoning in an Intelligent Tutoring System Using the Atlas Planning EnvironmentBruce I. Mills, Martha W. Evens, Reva Freedman. 729 [doi]
- A Fast Computation Scheme of Partial Distortion Entropy UpdatingHiroyuki Takizawa, Hiroaki Kobayashi. 736-741 [doi]
- Design and Evaluation of Intermediate Retransmission and Packet Loss Detection Schemes for MPEG4 TransmissionM. Nithish, C. Ramakrishna, J. Ramkumar, Priya Lakshmi. 742-746 [doi]
- Embedded Error Detection in Arithmetic Coding Using MarkersSomphop Chokchaitam, Prasit Teekaput. 747-750 [doi]
- Steganalysis of Data Hiding Techniques in Wavelet DomainShaohui Liu, Hongxun Yao, Wen Gao. 751-754 [doi]
- Online Compression of ASCII FilesJohn Istle, Pamela Mandelbaum, Emma Regentova. 755 [doi]
- An Integrated Approach for Database Security and Fault ToleranceChang N. Zhang, Honglan Zhong. 762-766 [doi]
- Towards New Algorithms for Data Compression Using Adaptive CodesDragos Trinca. 767-771 [doi]
- On Gossip Codes and Traceability SchemesRavi Sankar Veerubhotla, Ashutosh Saxena, Ved Prakash Gulati, Arun K. Pujari. 772-777 [doi]
- Data Redundancy and Compression Methods for a Disk-Based Network Backup SystemYan Chen, Zhiwei Qu, Zhenhua Zhang, Boon-Lock Yeo. 778-785 [doi]
- Equivalence of Punctured Convolutional Codes from Shift Equivalent Puncturing PatternsLi Shen, Peizhong Lu, Xiangyang Luo, Yan Zou. 786 [doi]
- A High Performance Parallel IP Lookup Technique Using Distibuted Memory OrganizationK. Venkatesh, S. Aravind, R. Ganapath, T. Srinivasan. 792-797 [doi]
- Content Description Servers for Networked Video SurveillanceJeffrey E. Boyd, Maxwell Sayles, Luke Olsen, Paul Tarjan. 798-803 [doi]
- J-Honeypot: A Java-Based Network Deception Tool with Monitoring and Intrusion DetectionYuqing Mai, Radhika Upadrashta, Xiao Su. 804-808 [doi]
- The Effective Buffer Architecture for Data Link Layer of PCI ExpressEugin Hyun, Kwang-Su Seong. 809 [doi]