Abstract is missing.
- Performance Evaluation of Block-Based Motion Estimation Algorithms and Distortion MeasuresS. R. Subramanya, Hiral Patel, Ilker Ersoy. 2-7 [doi]
- Geoblock: A LVQ-Based Framework for Geographic Image RetrievalLei Zhu. 8-12 [doi]
- Language Model-based Retieval for Farsi DocumentsKazem Taghva, Jeffrey S. Coombs, Ray Pereda, Thomas A. Nartker. 13-17 [doi]
- Summarizing Inter-Query Learning in Content-Based Image Retrieval via Incremental Semantic ClusteringIker Gondra, Douglas R. Heisterkamp. 18-22 [doi]
- A Framework for Trajectory Based Visual Event RetrievalIlker Ersoy, Filiz Bunyak, S. R. Subramanya. 23 [doi]
- Detecting Anomalies in High-Performance Parallel ProgramsGerman Florez, Zhen Liu, Susan Bridges, Rayford B. Vaughn, Anthony Skjellum. 30-34 [doi]
- Grid Workflow Based on Dynamic Modeling and SchedulingShaohua Zhang, Ning Gu, Saihan Li. 35-39 [doi]
- Extensible Communication Architecture for Grid NodesNader Mohamed, Jameela Al-Jaroodi, Hong Jiang. 40-44 [doi]
- Access Policy Specification for Web ApplicationsSteve Barker. 45-49 [doi]
- A Web / Grid Portal Implementation of BioSimGrid: A Biomolecular Simulation DatabaseBing Wu, Matthew J. Dovey, Muan Hong Ng, Kaihsu Tai, Stuart E. Murdock, Paul Jeffreys, Simon J. Cox, Jonathan W. Essex, Mark S. P. Sansom. 50 [doi]
- A Problem Solving Environment for Remote Sensing Data ProcessingGiovanni Aloisio, Massimo Cafaro, Italo Epicoco, Gianvito Quarta. 56-61 [doi]
- A Demonstration of Collaborative Web Services and Peer-to-Peer GridsMinjun Wang, Geoffrey Fox, Shrideep Pallickara. 62-67 [doi]
- On the Matching of Events in Distributed Brokering SystemsShrideep Pallickara, Geoffrey Fox. 68-76 [doi]
- Performing Security Analysis of Large Scale Power Systems with a Broker-based Computational GridMichele Di Santo, Nadia Ranaldo, D. Villacci, Eugenio Zimeo. 77-82 [doi]
- G-AQFS: Grid Computing Exploitation for the Management of Air Quality in Presence of Complex Meteorological CirculationsGiovanni Aloisio, Massimo Cafaro, R. Cesari, C. Mangia, Gian Paolo Marra, M. Miglietta, Maria Mirto, U. Rizza, I. Schipa, A. Tanzarella. 83 [doi]
- Integrating Ontology and Workflow in PROTEUS, a Grid-Based Problem Solving Environment for BioinformaticsMario Cannataro, Carmela Comito, Antonella Guzzo, Pierangelo Veltri. 90-94 [doi]
- Grid Job Builder - A Workflow Editor for Computing GridsChristoph Jung, Martin Einhoff, Stefan Noll, Norbert Schiffner. 95-99 [doi]
- A Cost-Effective Critical Path Approach for Service Priority Optimization in the Grid Computing EconomyMei Lin, Zhangxi Lin. 100-104 [doi]
- OGSA-WebDB: An OGSA-Based System for Bringing Web Databases into the GridSaid Mirza Pahlevi, Isao Kojima. 105 [doi]
- Effectiveness of Advanced and Authenticated Packet Marking Scheme for Traceback of Denial of Service AttacksBilal Rizvi, Emmanuel Fernández-Gaucherand. 111-115 [doi]
- Vulnerability Scanning for Buffer OverflowAishwarya Iyer, Lorie M. Liebrock. 116-117 [doi]
- Disaster coverable PKI model based on Majority Trust principleVesselin Tzvetkov. 118-119 [doi]
- A Novel Relevance Feedback Method in Content-Based Image RetrievalBaice Li, Senmiao Yuan. 120-123 [doi]
- OntoTag s Linguistic Ontologies: Improving Semantic Web Annotations for a Better Language Understanding in MachinesGuadalupe Aguado de Cea, Asunción Gómez-Pérez, Inmaculada Álvarez de Mon y Rego, Antonio Pareja-Lora. 124-128 [doi]
- Bidding in P2P Content Distribution Networks using the Lightweight Currency ParadigmElharith Elrufaie, David A. Turner. 129-130 [doi]
- Improving Classification Performance for Heterogeneous Cancer Gene Expression DataBenny Y. M. Fung, Vincent T. Y. Ng. 131-132 [doi]
- Monitoring the Development Process with EclipseAlberto Sillitti, Andrea Janes, Giancarlo Succi, Tullio Vernazza. 133-134 [doi]
- Modeling a Grid-Based Problem Solving Environment for Mobile DevicesStanislav Kurkovsky, Bhagyavati, Arris Ray, Mei Yang. 135 [doi]
- An Integrated Neighborhood Dependent Approach for Nonlinear Enhancement of Color ImagesLi Tao, Vijayan K. Asari. 138-139 [doi]
- Extendible Range-Based Numbering Scheme for XML DocumentGuangming Xing, Bill Tseng. 140-141 [doi]
- An Extension of XQuery for Moving Objects over GMLWarnill Chung, Soon-Young Park, Hae-Young Bae. 142-147 [doi]
- An Evaluation of New and Old Similarity Ranking AlgorithmsPaul Lynch, Xiaocheng Luan, Maureen Prettyman, Lee Mericle, Edward Borkmann, Jonathan Schlaifer. 148-149 [doi]
- Experiments on A Secure Compression AlgorithmEbru Celikel, Mehmet Emin Dalkiliç. 150-152 [doi]
- A GCD attack resistant CRTHACS for secure group communicationsXukai Zou, Byrav Ramamurthy, Spyros S. Magliveras. 153-154 [doi]
- A Distributed Quadtree Dictionary Approach to Multi-Resolution CompressionRion Dooley. 155-156 [doi]
- Face Detection Technique Based on Rotation Invariant Wavelet FeaturesSatyanadh Gundimada, Vijayan K. Asari. 157-158 [doi]
- Integrating Compression with Watermarking on Video SequencesAlexia Giannoula, Dimitrios Hatzinakos. 159 [doi]
- Fuzzy Measures and Integrals for Evaluating StrategiesYasuo Narukawa, Vicenç Torra. 162-166 [doi]
- How to Make E-cash with Non-Repudiation and AnonymityRonggong Song, Larry Korba. 167-172 [doi]
- A Workshop on Advanced Separation of Concerns and Aspect-Oriented ProgrammingDouglas R. Dechow. 173-177 [doi]
- Applied Fieldbus Knowledge for ICT EngineersPerfecto Mariño, Heriberto Hernández, Miguel Angel Domínguez, Francisco Poza, Fernando Machado, Fernando Vázquez. 178-182 [doi]
- An Approach to Improving the Quality of Part-of-Speech Tagging of Chinese TextYi-li Qian, Jia-heng Zheng. 183-187 [doi]
- Ensembles of Partitions via Data ResamplingBehrouz Minaei-Bidgoli, Alexander P. Topchy, William F. Punch. 188-192 [doi]
- Choosing the Initial Set of Exemplars when Learning with an NGE-based SystemLucas Baggio Figueira, Maria do Carmo Nicoletti. 193-197 [doi]
- The Effects of Business Rules on Transactional Association AnalysisRay R. Hashemi, Louis A. Le Blanc, Bart J. Westgeest. 198-202 [doi]
- Information Technologies for Education & Training in E-GovernmentRanjit Bose. 203-207 [doi]
- Routine Learning: Analyzing Your WhereaboutsSusanna Pirttikangas, Jukka Riekki, Juha Röning. 208 [doi]
- Information-Content Based Sentence Extraction for Text SummarizationDaniel Mallett, James Elding, Mario A. Nascimento. 214-218 [doi]
- Measuring the Scalability of Relationally Mapped Semistructured QueriesRebecca Cathey, Steven M. Beitzel, Eric C. Jensen, Angelo J. Pilotto, David A. Grossman. 219-223 [doi]
- Modified LZW Algorithm for Efficient Compressed Text RetrievalNan Zhang 0005, Tao Tao, Ravi Vijaya Satya, Amar Mukherjee. 224-228 [doi]
- A Unique-Order Interpolative Code for Fast Querying and Space-Efficient Indexing in Information Retrieval SystemsCher-Sheng Cheng, Jean Jyh-Jiun Shann, Chung-Ping Chung. 229-235 [doi]
- Turkish Word N-gram Analyzing Algorithms for a Large Scale Turkish Corpus - TurCoYalçin Çebi, Gökhan Dalkiliç. 236-240 [doi]
- Content-Based Image Retrieval Incorporating Models of Human PerceptionM. Emre Celebi, Y. Alp Aslandogan. 241-245 [doi]
- Use of Multiple Algorithms in Image Content SearchesJ. R. Parker, Brad Behm. 246 [doi]
- How M=Ec2 in HealthcareNilmini Wickramasinghe, Steve Goldberg. 252-257 [doi]
- Enhanced Cell Visiting Probability for QoS Provisioning in Mobile Multimedia CommunicationsMohammad Mahfuzul Islam, M. Manzur Murshed, Laurence Dooley. 258-262 [doi]
- A Secure Electronic Examination Protocol using Wireless NetworksJordi Herrera-Joancomartí, Josep Prieto-Blázquez, Jordi Castellà-Roca. 263-268 [doi]
- Threats to the Mobile Enterprise: Jurisprudence Analysis of Wardriving and WarchalkingElaine Lawrence, John Lawrence. 269-274 [doi]
- Registration and Discovery of Services in the NetTraveler Integration System for Mobile DevicesManuel Rodríguez-Martínez, José F. Enseñat, Elfred Pagan, Juan G. Arzola, Maniel Sotomayor, Elliot Varga. 275-281 [doi]
- A Two-tier Architecture for Automated Mobile ApplicationsRobert Steele, Yuri Ventsov, Sri Madhisetty, Laurie Benkovich. 282 [doi]
- Lexical-chain and It s Application in Text FilteringShaozi Li, Wenjian You, Tangqiu Li, Huowang Chen. 288-292 [doi]
- Problems and Solutions in Machine Translation Involving Arabic, Chinese and FrenchHaytham Alsharaf, Sylviane Cardey, Peter Greenfield, Yihui Shen. 293-297 [doi]
- Internet Archive as a Source of Bilingual DictionaryMohamed Abdel Fattah, Fuji Ren, Shingo Kuroiwa. 298-302 [doi]
- Integrating Speech Enabled Services in a web-based e-Learning EnvironmentSteffen Werner, Matthias Wolff, Matthias Eichner, Rüdiger Hoffmann. 303-307 [doi]
- Source Signal based Rate Adaptation for GSM AMR Speech CodecJ. Makinen, J. Vainio. 308-313 [doi]
- Linguistic Knowledge and Automatic Semantic Representation of Emotions and FeelingsYvette Yannick Mathieu. 314-318 [doi]
- Word Statistics of Turkish Language on a Large Scale Text Corpus - TurCoGökhan Dalkiliç, Yalçin Çebi. 319 [doi]
- An Informed Operator Approach to Tackle Diversity Constraints in Evolutionary SearchMaumita Bhattacharya. 326-330 [doi]
- Efficient Multicast E-Services Over APPCASTV. Radha, Ved Prakash Gulati, Arun K. Pujari. 331-336 [doi]
- Ontology-based Web CrawlerGanesh Subbiah, M. Jayaraj, V. Kalyan, Srinivasa Murthy, G. Aghila. 337-341 [doi]
- A Hybrid Number System And Its Application In FPGA-DSP TechnologyReza Hashemian, Bipin Sreedharan. 342-346 [doi]
- Significance of Steganography on Data SecurityS. Venkatraman, Ajith Abraham, Marcin Paprzycki. 347-351 [doi]
- Recognition and Identification of Form Document LayoutsKai Luo, Shahram Latifi, Kazem Taghva, Emma Regentova. 352-356 [doi]
- Evolutionary Time SchedulingNadia Nedjah, Luiza de Macedo Mourelle. 357-361 [doi]
- Group Key Management utilizing Huffman and Petrick based approachesSenthamil Ilango, Johnson Thomas. 362-366 [doi]
- 3D Shape Acquisition using a combined SSD and Least Squares Correlation ApproachPedram Azad, Tilo Gockel, Rüdiger Dillmann. 367-371 [doi]
- Mining User Navigational Patterns in Dynamically Changing EnvironmentsAjumobi Udechukwu, Ken Barker, Reda Alhajj. 372 [doi]
- Ant Mobility Model Platform for Network SimulatorHsien-Chou Liao, Yi-Wei Ting, Shih-Hsuan Yen, Chou Chen Yang. 380-384 [doi]
- Multiple Directional Antennas in Suburban Ad-Hoc NetworksMuhammad Mahmudul Islam, Ronald Pose, Carlo Kopp. 385-389 [doi]
- Statistic-based Routing in Wireless Sensor NetworksXianhui Xie, Larry Hughes. 390-394 [doi]
- Collaborative Vision using Networked SensorsRam Dantu, Sachin P. Joglekar. 395-399 [doi]
- Investigating Peer-to-peer Systems for Resource Sharing within a Small Group of NodesL. Lanae Neild, Roy P. Pargas. 400-404 [doi]
- Secure Multipath Communication in Mobile Ad hoc NetworksMike Burmester, Tri Van Le. 405-409 [doi]
- Accessing SMIL-based Dynamically Adaptable Multimedia Presentations from Mobile DevicesRobert Steele, Marcin Lubonski, Yuri Ventsov, Elaine Lawrence. 410 [doi]
- Extended DCEL Data Structure for Mobile ComputingJianhong Li, Xiaojun Liang, Laxmi Gewali. 416-420 [doi]
- An Object and XML Database Schemas Design ToolNarudol Chankuang, Suphamit Chittayasothorn. 421-427 [doi]
- Prefetching XML Data with Abstract Query MiningVincent T. Y. Ng, Chan Chi Kong, Shiu Hin Wang. 428-432 [doi]
- Distributed Knowledge Management for Autonomous Access Control in Computer NetworksAlexandr Seleznyov, Stephen Hailes. 433-437 [doi]
- Software Security in Bangladesh with .NET Framework: A RoadmapMuhammad Ashraful Alam. 438-443 [doi]
- Design Strategies to Improve Performance of GIS Web ServicesShengru Tu, Maik Flanagin, Ying Wu, Mahdi Abdelguerfi, Eric Normand, Venkata Mahadevan, Jay J. Ratcliff, Kevin Shaw. 444 [doi]
- KIP: A Keyphrase Identification Program with Learning FunctionsYi-fang Brook Wu, Quanzhi Li, Razvan Stefan Bot, Xin Chen. 450-454 [doi]
- Applications of Data Mining in Retail BusinessSyed Riaz Ahmed. 455-459 [doi]
- Integrity Constraints in Temporal Relational DatabasesAbdullah Uz Tansel. 460-464 [doi]
- Evidence Combination in Medical Data MiningY. Alp Aslandogan, Gauri A. Mahajani, Stan Taylor. 465-469 [doi]
- Building Decision Trees Using Functional DependenciesKwok-Wa Lam, Victor C. S. Lee. 470-473 [doi]
- A New Framework for Uncertainty Sampling: Exploiting Uncertain and Positive-Certain Examples in Similarity-Based Text ClassificationKang Hyuk Lee, Byeong Ho Kang. 474-479 [doi]
- Confidence on Approximate Query in Large DatasetsCharles Wesley Ford, Chia-Chu Chiang, Hao Wu, Radhika R. Chilka, John R. Talburt. 480 [doi]
- High Performance FPGA based Elliptic Curve Cryptographic Co-ProcessorJonathan Lutz, M. Anwarul Hasan. 486-492 [doi]
- A Parallel Architecture for Computing Scalar Multiplication on Hessian Elliptic CurvesNazar A. Saqib, Francisco Rodríguez-Henríquez, Arturo Díaz-Pérez. 493-497 [doi]
- Architectural Design Features of a Programmable High Throughput AES CoprocessorAlireza Hodjat, Patrick Schaumont, Ingrid Verbauwhede. 498-502 [doi]
- Multi-Objective Evolutionary Hardware for RSA-Based CryptosystemsNadia Nedjah, Luiza de Macedo Mourelle. 503-507 [doi]
- Efficient Cryptographic Hardware Using the Co-Design MethodologyLuiza de Macedo Mourelle, Nadia Nedjah. 508-512 [doi]
- High Performance Arithmetic for special Hyperelliptic Curve Cryptosystems of Genus TwoJan Pelzl, Thomas J. Wollinger, Christof Paar. 513-517 [doi]
- Fast Modular Multiplication by Operand ChangingManfred Schimmler, Viktor Bunimov. 518-524 [doi]
- A Clock-less Implementation of the AES Resists to Power and Timing AttacksAn Yu, David S. Brée. 525-532 [doi]
- Increasing Robustness of LSB Audio Steganography Using a Novel Embedding MethodNedeljko Cvejic, Tapio Seppänen. 533-537 [doi]
- Finding Optimum Parallel Coprocessor Design for Genus 2 Hyperelliptic Curve CryptosystemsGuido Bertoni, Luca Breveglieri, Thomas J. Wollinger, Christof Paar. 538 [doi]
- Power-Analysis Attack on an ASIC AES implementationSiddika Berna Örs, Frank K. Gürkaynak, Elisabeth Oswald, Bart Preneel. 546-552 [doi]
- A Basis-Independent Algorithm to Design Fast Parallel Multipliers over GF(2m)Michele Elia, Manuel Leone. 553-559 [doi]
- On the Importance of Protecting Delta in SFLASH against Side Channel AttacksKatsuyuki Okeya, Tsuyoshi Takagi, Camille Vuillaume. 560-568 [doi]
- On Permutation Operations in Cipher DesignRuby B. Lee, Zhijie Shi, Yiqun Lisa Yin, Ronald L. Rivest, Matthew J. B. Robshaw. 569-577 [doi]
- Streaming Encryption for a Secure Wavelength and Time Domain Hopped Optical NetworkHerwin Chan, Alireza Hodjat, Jun Shi, Richard D. Wesel, Ingrid Verbauwhede. 578-582 [doi]
- Compact and Efficient Encryption/Decryption Module for FPGA Implementation of the AES Rijndael Very Well Suited for Small Embedded ApplicationsGaël Rouvroy, François-Xavier Standaert, Jean-Jacques Quisquater, Jean-Didier Legat. 583-587 [doi]
- Area Efficient High Speed Elliptic Curve Cryptoprocessor for Random CurvesAmir K. Daneshbeh, M. Anwarul Hasan. 588 [doi]
- Comparing Different Thresholding Algorithms for Segmenting AurorasXiang Li, Rahul Ramachandran, Matt He, Sunil Movva, John A. Rushing, Sara J. Graves, Wladislaw Lyatsky, Arjun Tan, Glynn A. Germany. 594-601 [doi]
- Exploiting Known Latitudinal Variations for Improved Limited-Angle Tomographic Reconstruction of the PlasmasphereNaveen Santhanam, Timothy S. Newman, Dennis L. Gallagher. 602-606 [doi]
- Mapping Surface Materials on Mars from Mars Pathfinder Spectral Images with HYPEREYEErzsébet Merényi, William H. Farrand, Philip Tracadas. 607-614 [doi]
- Factors Affecting the Signal Quality in Optical Data Transmission and Estimation Method for BER and SNRStamatios V. Kartalopoulos. 615-619 [doi]
- Lossless Encoding Based on Redistribution of StatisticsArtyom M. Grigoryan, Serkan Dursun, Emma Regentova. 620-624 [doi]
- On the Design of Heterogeneous Applications for Distributed CoordinationChia-Chu Chiang, Peiyi Tang. 625 [doi]
- Digital Library Resources DescriptionChadia Moghrabi, Tang-Ho Lê, Jean Roy, Johanne Hachey. 632-637 [doi]
- Applying Continuous Action Reinforcement Learning Automata(CARLA) to Global Training of Hidden Markov ModelsJahanshah Kabudian, Mohammad Reza Meybodi, Mohammad Mehdi Homayounpour. 638-642 [doi]
- Wearable, Wireless Brain Computer Interfaces In Augmented Reality EnvironmentsKarla Felix Navarro. 643-647 [doi]
- Towards Proactive Computer-System ForensicsPhillip G. Bradford, Marcus Brown, Josh Perdue, Bonnie Self. 648-652 [doi]
- A Novel Approach for Bi-directional Motion Estimation and CompensationFarzin Ahmadianpour, M. Omair Ahmad. 653-657 [doi]
- Fuzzy Clustering for TV Program ClassificationZhiwen Yu, Jianhua Gu, Xingshe Zhou, Zhiyi Yang. 658 [doi]
- Improved Rate Control for Advanced Video Coding (AVC)Standard under Low Delay ConstraintPornthep Navakitkanok, Supavadee Aramvith. 664-668 [doi]
- Distributed Omni-Video Arrays and Digital Tele-Viewer for Customized Viewing, Event Detection and NotificationMohan M. Trivedi, Kohsia S. Huang, Tarak Gandhi, Brett Hall, Kimberly Harlow. 669-674 [doi]
- Application of Active Contour Models in Medical Image SegmentationFoued Derraz, Mohamed Beladgham, M hamed Khelif. 675-681 [doi]
- Digital Analysis of Thermal Infrared Imagery using Temperature MappingCheruku Venkateswarlu, Sumanth Yenduri, S. Sitharama Iyengar. 682-688 [doi]
- An HVS-based Motion Vector Composition Algorithm for Spatial Resolution TranscodingAbdullah Al Yusuf, M. Manzur Murshed, Laurence Dooley. 689-693 [doi]
- Neural Image Recognition System with Application to Tuberculosis DetectionK. V. Ramana, S. Basha. 694-698 [doi]
- Error Concealment of Transform Coded Images With Continuous QoSXiao Su, Yi Shang. 699-703 [doi]
- JPEG Compression Immune Steganography Using Wavelet TransformJianyun Xu, Andrew H. Sung, Peipei Shi, Qingzhong Liu. 704-708 [doi]
- A Novel DCT-based Approach for Secure Color Image WatermarkingNarges Ahmidi, Reza Safabakhsh. 709-713 [doi]
- Efficient Technique for Ellipse Detection Using Restricted Randomized Hough TransformZhiguo Cheng, Yuncai Liu. 714 [doi]
- Key Agreement and Identity Authentication Protocols for Ad Hoc NetworksJun Yao, Guihua Zeng. 720-724 [doi]
- Hybrid Greedy/multicasting Power-aware Routing Protocol in Ad Hoc NetworksJiageng Li, David Cordes. 725-729 [doi]
- NICD: A Novel Indexless Wireless On-Demand Data Broadcast AlgorithmO. B. V. Ramanaiah, Hrushikesha Mohanty. 730-734 [doi]
- Causal Ordering in Event Notification Service Systems for Mobile UsersChit Htay Lwin, Hrushikesha Mohanty, R. K. Ghosh. 735-740 [doi]
- Using SPIN to Model Cryptographic ProtocolsLi Yongjian, Xue Rui. 741-745 [doi]
- Bluetooth Potential in the M-Enterprise: A Feasibility StudySojen Pradhan, Elaine Lawrence, Stephen Newton, Johit Das. 746-751 [doi]
- Security Level Evaluation: Policy and Fuzzy TechniquesValentina Casola, Massimiliano Rak, Rosa Preziosi, Luigi Troiano. 752 [doi]
- Secure Large-Scale BingoAntoni Martínez-Ballesté, Francesc Sebé, Josep Domingo-Ferrer. 758-762 [doi]
- Efficient Recovery of SecretsMarcel Fernandez, Miguel Soriano. 763-767 [doi]
- A Platform for Secure E-GamblingCarlo Blundo, Stelvio Cimato. 768-772 [doi]
- A Game-Theoretic Model for Two-Party Cryptographic ProtocolsPino Caballero-Gil, Candelaria Hernández-Goya, Carlos Bruno-Castaneda. 773-777 [doi]
- A Non-Repudiable Bitstring Commitment Scheme Based on a Public-Key CryptosystemJordi Castellà-Roca, Josep Domingo-Ferrer. 778-780 [doi]
- On the Security of an Efficient TTP-Free Mental Poker ProtocolJordi Castellà-Roca, Josep Domingo-Ferrer. 781 [doi]
- An Approach to On-line Text Generation for E-learning PurposesMaryam Tayefeh Mahmoudi, Kambiz Badie. 786-789 [doi]
- Analysis and Compensation of Errors in the Input Device Based on Inertial SensorsJing Yang, Wook Chang, Won-Chul Bang, Eun-Seok Choi, Kyoung-Ho Kang, Sung-Jung Cho, Dong Yoon Kim. 790-796 [doi]
- Evaluation and Comparison of Natural Language and Graphical User Interfaces in Query-by-Impressions ScenesTadahiko Kumamoto, Kimiko Ohta. 797-804 [doi]
- Estimation of Camera Pose Using 2D to 3D Corner CorrespondenceFanhuai Shi, Yuncai Liu. 805-809 [doi]
- Secure Information Sharing Using Role-based DelegationGail-Joon Ahn, Badrinath Mohan. 810-819 [doi]
- An Information Search Interface with Soft Real-time GuaranteeHuayong Wang, Yiqi Dai. 820 [doi]
- Synthesis Scheme for Low Power Designs with Multiple Supply Voltages by Heuristic AlgorithmsLing Wang, Yingtao Jiang, Henry Selvaraj. 829-833 [doi]
- Knowledge Discovery in a Microarray Data WarehouseAli Al-Timimi, D. Curtis Jamison. 834-839 [doi]
- Three and Four-dimensional Parity-check Codes for Correction and Detection of Multiple ErrorsNaveen Babu Anne, Utthaman Thirunavukkarasu, Shahram Latifi. 840-845 [doi]
- An Efficient Reconfigurable Architecture and Implementation of Edge Detection Algorithm using Handle-CDaggu Venkateshwar Rao, Muthukumar Venkatesan. 846 [doi]