Abstract is missing.
- Committees [doi]
- Additional Referees [doi]
- General Chair s Message [doi]
- A New Phylogenetic Tree Model for Fuzzy CharactersAndy Auyeung. 2-7 [doi]
- Parallel Multiple Sequence Alignment with Dynamic SchedulingJiancong Luo, Ishfaq Ahmad, Munib Ahmed, Raymond A. Paul. 8-13 [doi]
- Dihedral Angle based Dimensionality Reduction for Protein Structural ComparisonNaveen Kandiraju, Sumeet Dua, Steven A. Conrad. 14-19 [doi]
- Recognizing Transcription Start Site (TSS) of Plant PromotersRasiah Loganantharaj. 20-25 [doi]
- Design and Implementation of a Unique Blood-Vessel Detection Algorithm towards Early Diagnosis of Diabetic RetinopathySumeet Dua, Naveen Kandiraju, Hilary W. Thompson. 26-31 [doi]
- A Time-Series Biclustering Algorithm for Revealing Co-Regulated GenesYa Zhang, Hongyuan Zha, Chao-Hsien Chu. 32-37 [doi]
- An Adaptive Scalable Multiuser-OFDM System for Multimedia Transmission Over Fading ChannelsAhmed Muthana M. Nadhim, Jianhua He, Jiangtao Xi, Zongkai Yang. 40-45 [doi]
- Hypergraph Lossless Image CompressionAlain Bretto, Luc Gillibert. 46-50 [doi]
- A Scalable Generative Topographic Mapping for Sparse Data SequencesAta Kabán. 51-56 [doi]
- Language Discrimination via PPM ModelEbru Celikel. 57-62 [doi]
- Layered MPEG Video Transmission over IP DiffServHong Zhao, Nirwan Ansari, Yun Q. Shi. 63-67 [doi]
- Hybrid Coding for Animated Polygonal Meshes: Combining Delta and OctreeJinghua Zhang, Charles B. Owen. 68-73 [doi]
- Watermark Based Digital Rights ManagementPiyali Mandal, Ashish Thakral, Shekhar Verma. 74-78 [doi]
- A Parallel Scheme for Implementing Multialphabet Arithmetic Coding in High-Speed Programmable HardwareS. Mahapatra, Kuldeep Singh. 79-84 [doi]
- Multiple Description Coding Using Transforms and Data FusionShumin Tian, P. Karivaratha Rajan. 85-90 [doi]
- Multiple-Pattern Matching For LZW Compressed FilesTao Tao, Amar Mukherjee. 91-96 [doi]
- Orthogonal Hermite Pulses Used for UWB M-ary CommunicationWen Hu, Guoxin Zheng. 97-101 [doi]
- A New Approach of Color Quantization Based On Ant Colony Clustering AlgorithmXinrong Hu, Tianzhen Wang, Dehua Li. 102-108 [doi]
- A Rate Control Algorithm for Wireless Video Transmission Using Perceptual TuningYu Sun, Dongdong Li, Ishfaq Ahmad, Jiancong Luo. 109-114 [doi]
- Packet- vs. Session-Based Modeling for Intrusion Detection SystemsBruce D. Caulkins, Joohan Lee, Morgan C. Wang. 116-121 [doi]
- Text Data Mining: A Case StudyCharles Wesley Ford, Chia-Chu Chiang, Hao Wu, Radhika R. Chilka, John R. Talburt. 122-127 [doi]
- A Classifier-based Text Mining Approach for Evaluating Semantic Relatedness Using Support Vector MachinesChung-Hong Lee, Hsin-Chang Yang. 128-133 [doi]
- On the Relation Between Dependence and Diversity in Multiple Classifier SystemsDechang Chen, Dong Hua, Konstantinos Sirlantzis, Xiaobin Ma. 134-139 [doi]
- Quality-Oriented Software ArchitectureHassan Reza, Emanuel S. Grant. 140-145 [doi]
- Mining p53 Binding Sites Using Profile Hidden Markov ModelJeffrey Huang, Shijun Li. 146-151 [doi]
- Arabic Stemming Without A Root DictionaryKazem Taghva, Rania Elkhoury, Jeffrey S. Coombs. 152-157 [doi]
- A Stemming Algorithm for the Farsi LanguageKazem Taghva, Russell Beckley, Mohammad Sadeh. 158-162 [doi]
- Mining Biomedical Images with Density-Based ClusteringM. Emre Celebi, Y. Alp Aslandogan, Paul R. Bergstresser. 163-168 [doi]
- Optimal Statistical Model for Forecasting OzoneMali Abdollahian, R. Foroughi. 169-173 [doi]
- Regression Analysis of Ozone DataMali Abdollahian, R. Foroughi. 174-178 [doi]
- XML Representation of Digital Videos for Visual Data Mining ApplicationsMark Smith, Alireza Khotanzad. 179-183 [doi]
- Dynamic Web Content Filtering based on User s KnowledgeN. Churcharoenkrung, Yang Sok Kim, Byeong Ho Kang. 184-188 [doi]
- An Efficient Clustering Algorithm Using Graphical TechniquesQuoc-Nam Tran. 189-194 [doi]
- A Signature-Based Liver Cancer Predictive SystemRay R. Hashemi, Joshua H. Early, Mahmood Bahar, Alexander A. Tyler, John F. Young. 195-199 [doi]
- Elimination of Redundant Information for Web Data MiningShakirah Mohd Taib, Soon-Ja Yeom, Byeong Ho Kang. 200-205 [doi]
- Mining Association Rules from the Star Schema on a Parallel NCR Teradata Database SystemSoon Myoung Chung, Murali Mangamuri. 206-212 [doi]
- A Web Recommendation System Based on Maximum EntropyXin Jin, Bamshad Mobasher, Yanzan Zhou. 213-218 [doi]
- A Time Series Data Management FrameworkAbel Matus-Castillejos, Ric Jentzsch. 220-225 [doi]
- Design Theoretic Approach to Replicated DeclusteringAli Saman Tosun. 226-231 [doi]
- Constrained DeclusteringAli Saman Tosun. 232-237 [doi]
- Managing a Relational Database with Intelligent AgentsIra Rudowsky, Olga Kulyba, Mikhail Kunin, Dmitri Ogarodnikov, Theodore Raphan. 238-242 [doi]
- Impact Of External Security Measures On Data Access Implementation With Online Database Management SystemMoses Garuba, Anteneh Girma. 243-248 [doi]
- Performance Evaluation of Secure Concurrency Control Algorithm for Multilevel Secure Distributed Database SystemsNavdeep Kaur, Rajwinder Singh, Anil Kumar Sarje, Manoj Misra. 249-254 [doi]
- XML Schema Re-Engineering Using a Conceptual Schema ApproachOviliani Yenty Yuliana, Suphamit Chittayasothorn. 255-260 [doi]
- Schemaless XML Document Management in Object-Oriented DatabasesSoon Myoung Chung, Sheeya B. Jesurajaiah. 261-266 [doi]
- EGRID Project: Experience Report on the Implementation of a Grid Infrastructure for the Analysis of Financial DataAngelo Leto, Ezio Corso, Riccardo Murri, Alessio Terpin, Cristian Zoicas, Stefano Cozzini. 268-273 [doi]
- Development of Concurrent Systems through CoordinationChia-Chu Chiang. 274-279 [doi]
- A New Generalized Particle Approach to Allot Resources And Jobs for Grid ComputingDianxun Shuai, Xiang Feng, Rui Gong, Xing Wang. 280-285 [doi]
- Computing Molecular Potential Energy Surface with DIETEmmanuel Jeannot, Gerald Monard. 286-291 [doi]
- Transaction Mechanism Design in Decentralized Computational MarketQianfei Fu, Shoubao Yang, Maosheng Li, Junmao Zhun. 292-297 [doi]
- A Grid-Enabled Web Map ServerGiovanni Aloisio, Massimo Cafaro, Dario Conte, Sandro Fiore, Gian Paolo Marra, Gianvito Quarta. 298-303 [doi]
- The GSI Plug-in for gSOAP: Enhanced Security, Performance, and ReliabilityGiovanni Aloisio, Massimo Cafaro, Italo Epicoco, Daniele Lezzi, Robert van Engelen. 304-309 [doi]
- Research on Grid Resource Reliability Model Based on PromiseMaosheng Li, Shoubao Yang, Qianfei Fu, Yang Jin. 310-315 [doi]
- Metacomputing through the Enactment of a BPEL4WS Workflow in a Grid EnvironmentMichele Di Santo, Nadia Ranaldo, Eugenio Zimeo. 316-321 [doi]
- Algorithms and Databases in Bioinformatics: Towards a Proteomic OntologyMario Cannataro, Pietro Hiram Guzzi, Tommaso Mazza, Giuseppe Tradigo, Pierangelo Veltri. 322-328 [doi]
- High Throughput Web Services for Life SciencesMine Altunay, D. Colonnese, C. Warade. 329-334 [doi]
- Grid-Based Collaboration in Interactive Data Language ApplicationsMinjun Wang, Geoffrey Fox, Marlon E. Pierce. 335-341 [doi]
- An Approach for Service Description and a Flexible Way to Discover Services in Distributed SystemsOussama Kassem Zein, Yvon Kermarrec. 342-347 [doi]
- The BPEL Orchestrating Framework for Secured Grid ServicesPichet Amnuaykanjanasin, Natawut Nupairoj. 348-353 [doi]
- Replica Placement in Data Grid: Considering Utility and RiskRashedur M. Rahman, Ken Barker, Reda Alhajj. 354-359 [doi]
- An Analysis of Reliable Delivery Specifications for Web ServicesShrideep Pallickara, Geoffrey Fox, Sangmi Lee Pallickara. 360-365 [doi]
- Double Auction Protocols for Resource Allocation in GridsUmesh Kant, Daniel Grosu. 366-371 [doi]
- A New Electronic Cash ModelXiaosong Hou, Chik-How Tan. 374-379 [doi]
- Automatic Agent and Data Mining for e-CommerceCharles C. Willow. 380-384 [doi]
- A Characterization of Web Data Sources to Facilitate E-Commerce TransactionsChima Adiele. 385-390 [doi]
- A Methodology for Evaluating Agent ToolkitsElhadi Shakshuki. 391-396 [doi]
- Exploring Price and Product Information Search Behavior in e-MarketTaedong Han. 397-402 [doi]
- A Mobile Commerce Framework Based on Web Services ArchitectureYao-Chung Chang, Jiann-Liang Chen, Wen-Ming Tseng. 403-408 [doi]
- The Interoperability between Different e-Business SpecificationsLiang Peng, Keqing He, Bing Li, Jin Liu. 409-413 [doi]
- A Semantic Interoperability Extension Model to the ebXML RegistryWudong Liu, Lulu He, Jing Liu, Keqing He. 414-419 [doi]
- An Exchange Protocol for Alternative CurrenciesYiyao Hao, Daniel M. Havey, David A. Turner. 420-424 [doi]
- IPS - Secure Internet Payment SystemZoran Djuric. 425-430 [doi]
- A Framework and Process for Curricular Integration and Innovation Using Project Based Interdisciplinary TeamsFrank P. Coyle, Mitchell A. Thornton. 432-435 [doi]
- An Integrated Course Based on Educational GamesHye Sun Kim, Seong Baeg Kim. 436-441 [doi]
- Adaptation and Configuration - Support-Possibilities of Different Learner Types within Virtual Learning Environments - An Experience ReportImke Sassen, Birgit Schwartz-Reinken. 442-446 [doi]
- Constructing Different Learning Paths Through e-LearningKyoung Mi Yang, Rockford J. Ross, Seong Baeg Kim. 447-452 [doi]
- An E-learning tool for Database AdministrationPaul Douglas, Steve Barker. 453-458 [doi]
- Synthetic Exercises on the WebPavel Azalov. 459-464 [doi]
- Integration of Digital Rights Management into Learning Content Management SystemZongkai Yang, Qingtang Liu, Kun Yan, Wanting Deng, Jing Jin. 465-469 [doi]
- Comparison of Information Technology Adoption Rates across Laggards, Innovators and OthersRukmini Reddy Muduganti, Shravan Kumar Sogani, Henry Hexmoor. 470-475 [doi]
- A Specialization in Information and Knowledge Management Systems for the Undergraduate Computer Science CurriculumShlomo Argamon, Nazli Goharian, David A. Grossman, Ophir Frieder, N. Raju. 476-481 [doi]
- An Intelligent Tutoring System for Program SemanticsSteve Barker, Paul Douglas. 482-487 [doi]
- Adaptive Book: Teaching and Learning Environment for Programming EducationVictor Adamchik, Ananda Gunawardena. 488-492 [doi]
- Digital Chips for an On-Line CasinoJordi Castellà-Roca, Guillermo Navarro, Jose A. Ortega-Ruiz, Joaquín García. 494-499 [doi]
- Protecting On-Line Casinos against Fraudulent Player Drop-OutJoaquín García, Frédéric Cuppens, Fabien Autrel, Jordi Castellà-Roca, Joan Borrell, Guillermo Navarro, Jose A. Ortega-Ruiz. 500-505 [doi]
- Dealing Cards in Poker GamesPhilippe Golle. 506-511 [doi]
- Single-Parameter Blackjack Betting Systems Inspired by Scatter SearchRon Coleman. 512-517 [doi]
- Online Gaming Cheating and Security IssueYing-Chieh Chen, Jing-Jang Hwang, Ronggong Song, George Yee, Larry Korba. 518-523 [doi]
- Fast Parallel Table Lookups to Accelerate Symmetric-Key CryptographyA. Murat Fiskiran, Ruby B. Lee. 526-531 [doi]
- ASIC-Hardware-Focused Comparison for Hash Functions MD5, RIPEMD-160, and SHSAkashi Satoh, Tadanobu Inoue. 532-537 [doi]
- A Scalable and High Performance Elliptic Curve Processor with Resistance to Timing AttacksAlireza Hodjat, David Hwang, Ingrid Verbauwhede. 538-543 [doi]
- A Countermeasure for EM Attack of a Wireless PDACatherine H. Gebotys, C. C. Tiu, X. Chen. 544-549 [doi]
- Quadrinomial Modular Arithmetic using Modified Polynomial BasisChristophe Nègre. 550-555 [doi]
- FPGA Implementations of the ICEBERG Block CipherFrançois-Xavier Standaert, Gilles Piret, Gaël Rouvroy, Jean-Jacques Quisquater. 556-561 [doi]
- On the Masking Countermeasure and Higher-Order Power Analysis AttacksFrançois-Xavier Standaert, Eric Peeters, Jean-Jacques Quisquater. 562-567 [doi]
- A Scalable Dual Mode Arithmetic Unit for Public Key CryptosystemsFrancis M. Crowe, Alan Daly, William P. Marnane. 568-573 [doi]
- A Fast Implementation of Multiplicative Inversion Over GF(2:::m:::)Francisco Rodríguez-Henríquez, Nazar A. Saqib, Nareli Cruz Cortés. 574-579 [doi]
- ASIC Implementation of a Unified Hardware Architecture for Non-Key Based Cryptographic Hash PrimitivesT. S. Ganesh, T. S. B. Sudarshan. 580-585 [doi]
- AES Power Attack Based on Induced Cache Miss and CountermeasureGuido Bertoni, Vittorio Zaccaria, Luca Breveglieri, Matteo Monchiero, Gianluca Palermo. 586-591 [doi]
- XScale Hardware Acceleration on Cryptographic Algorithms for IPSec ApplicationsHung-Ching Chang, Chun-Chin Chen, Chih-Feng Lin. 592-597 [doi]
- Modified Radix-2 Montgomery Modular Multiplication to Make It Faster and SimplerKooroush Manochehri, Saadat Pourmozafari. 598-602 [doi]
- Reconfigurable Hardware for Addition Chains Based Modular ExponentiationLuiza de Macedo Mourelle, Nadia Nedjah. 603-607 [doi]
- Verifiable Threshold Sharing of a Large Secret Safe-PrimeMaged Hamada Ibrahim. 608-613 [doi]
- Pareto-Optimal Hardware for Substitution BoxesNadia Nedjah, Luiza de Macedo Mourelle. 614-619 [doi]
- Applications of The Montgomery ExponentShay Gueron, Or Zuk. 620-625 [doi]
- A Parallelized Design for an Elliptic Curve Cryptosystem CoprocessorFabio Sozzani, Guido Bertoni, Stefano Turcato, Luca Breveglieri. 626-630 [doi]
- A Proposal of Short Proxy Signature using PairingTakeshi Okamoto, Atsuo Inomata, Eiji Okamoto. 631-635 [doi]
- Improved Routing-Based Linear Algebra for the Number Field SieveWilli Geiselmann, Hubert Köpfer, Rainer Steinwandt, Eran Tromer. 636-641 [doi]
- Inversion-Free Arithmetic on Genus 3 Hyperelliptic Curves and Its ImplementationsXinxin Fan, Thomas J. Wollinger, YuMin Wang. 642-647 [doi]
- Intrusion Detection System to Detect Variant Attacks Using Learning Algorithms with Automatic Generation of Training DataAkira Yamada, Yutaka Miyake, Keisuke Takemori, Toshiaki Tanaka. 650-655 [doi]
- StackOFFence: A Technique for Defending Against Buffer Overflow AttacksBharat B. Madan, Shashi Phoha, Kishor S. Trivedi. 656-661 [doi]
- Conversion and Proxy Functions for Symmetric Key CiphersDebra L. Cook, Angelos D. Keromytis. 662-667 [doi]
- An Aspect-Oriented Approach to Mobile Agent Access ControlDianxiang Xu, Vivek Goel. 668-673 [doi]
- An Efficient Secure Key Issuing Protocol in ID-Based CryptosystemsRaju Gangishetti, M. Choudary Gorantla, Manik Lal Das, Ashutosh Saxena, Ved Prakash Gulati. 674-678 [doi]
- Clarifying Obfuscation: Improving the Security of White-Box DESHamilton E. Link, William D. Neumann. 679-684 [doi]
- Secure Group Communication with Multiplicative One-way FunctionsHeeyoul Kim, Seong-Min Hong, Hyunsoo Yoon, Jung Wan Cho. 685-690 [doi]
- Application of Loop Reduction to Learning Program Behaviors for Anomaly DetectionJidong Long, Daniel G. Schwartz, Sara Stoecklin, Mahesh K. Patel. 691-696 [doi]
- No-Capture Hardware Feature for Securing Sensitive InformationKhaled Hussain, Sharon Rajan, Naveen Addulla, Ghada S. Moussa. 697-702 [doi]
- Formalisation and implementation of Access control modelsMathieu Jaume, Charles Morisset. 703-708 [doi]
- QoS-Based Authentication Scheme for Ad Hoc Wireless NetworksP. Muppala, Johnson P. Thomas, Ajith Abraham. 709-714 [doi]
- Byteprints: A Tool to Gather Digital EvidenceSriranjani Sitaraman, Srinivasan Krishnamurthy, Subbarayan Venkatesan. 715-720 [doi]
- A Secure and Efficient Voter-Controlled Anonymous Election SchemeThomas E. Carroll, Daniel Grosu. 721-726 [doi]
- Security Design and Evaluation in a VoIP Secure Infrastracture: A Policy Based ApproachValentina Casola, Massimiliano Rak, Antonino Mazzeo, Nicola Mazzocca. 727-732 [doi]
- The N/R One Time Password SystemVipul Goyal, Ajith Abraham, Sugata Sanyal, Sang-Yong Han. 733-738 [doi]
- CompChall: Addressing Password Guessing AttacksVipul Goyal, Virendra Kumar, Mayank Singh, Ajith Abraham, Sugata Sanyal. 739-744 [doi]
- Efficient TTP-Free Mental Poker ProtocolsWeiliang Zhao, Vijay Varadharajan. 745-750 [doi]
- A Dynamic Method for Handling the Inference Problem in Multilevel Secure DatabasesXue Ying Chen, Ruizhong Wei. 751-756 [doi]
- ID-Based One Round Authenticated Group Key Agreement Protocol with Bilinear PairingsYijuan Shi, Gongliang Chen, Jianhua Li. 757-761 [doi]
- Securely Utilizing External Computing PowerYu Yu, Jussipekka Leiwo, Benjamin Premkumar. 762-767 [doi]
- Effective Steganalysis Based on Statistical Moments of Wavelet Characteristic FunctionYun Q. Shi, Guorong Xuan, Chengyun Yang, Jianjiong Gao, Zhenping Zhang, Peiqi Chai, Dekun Zou, Chunhua Chen, Wen Chen. 768-773 [doi]
- Dynamic Learning of Automata from the Call Stack Log for Anomaly DetectionZhen Liu, Susan M. Bridges. 774-779 [doi]
- Efficient Array & Pointer Bound Checking Against Buffer Overflow Attacks via Hardware/SoftwareZili Shao, Chun Xue, Qingfeng Zhuge, Edwin Hsing-Mean Sha, Bin Xiao. 780-785 [doi]
- A Comparative Study of Three Moment-Based Shape DescriptorsM. Emre Celebi, Y. Alp Aslandogan. 788-793 [doi]
- Concept-Based Information AccessRifat Ozcan, Y. Alp Aslandogan. 794-799 [doi]
- Designing a Value Based Niche Search Engine Using Evolutionary StrategiesSourav Sengupta, Bernard J. Jansen. 800-805 [doi]
- A Mathematical Investigation on Retrieval Performance Evaluation Measures of Information Retrieval AlgorithmJun-feng Song, Wei Ming Zhang, Weidong Xiao. 806-810 [doi]