Abstract is missing.
- Combinatorial Test Case Selection with Markovian Usage ModelsSergiy A. Vilkomir, W. Thomas Swain, Jesse H. Poore. 3-8 [doi]
- Improving Pattern-Based LTL Formulas for Automata Model CheckingSalamah Salamah, Ann Q. Gates, Steve Roach. 9-14 [doi]
- Performance Analysis of the OGSA-DAI 3.0 SoftwareKun Wang, Yuejian Xie, Sanli Li, Xiaoying Wang. 15-20 [doi]
- Improving Model Driven Architecture with Requirements ModelsNarayan C. Debnath, Maria Carmen Leonardi, María Virginia Mauco, German Montejano, Daniel Riesco. 21-26 [doi]
- A Feature Model of E-Government Systems Integrated with Formal SpecificationsNarayan C. Debnath, Laura Felice, German Montejano, Daniel Riesco. 27-31 [doi]
- Towards Improving Visual-Facial Emotion Recognition through Use of Complementary Keyboard-Stroke Pattern InformationGeorge A. Tsihrintzis, Maria Virvou, Efthymios Alepis, Ioanna-Ourania Stathopoulou. 32-37 [doi]
- Execution Trace Visualization in a 3D SpacePhilippe Dugerdil, Sazzadul Alam. 38-43 [doi]
- Tools for MDA Software Development: Evaluation Criteria and Set of Desirable FeaturesTihomir Calic, Sergiu Dascalu, Dwight D. Egbert. 44-50 [doi]
- A Minimalist Visual Notation for Design Patterns and AntipatternsDemis Ballis, Andrea Baruzzo, Marco Comini. 51-56 [doi]
- Business Process Development in Semantically-Enriched EnvironmentIman Poernomo, Timur Umarov. 57-62 [doi]
- Towards a Model Driven Autonomic Management SystemLaurent Broto, Daniel Hagimont, Estella Annoni, Benoît Combemale, Jean Paul Bahsoun. 63-69 [doi]
- Boundary Value Analysis Using Divide-and-Rule ApproachKaran Vij, Wenying Feng. 70-75 [doi]
- Test Generation with DHT NetworksHarry Gros-Desormeaux, Hacène Fouchal, Philippe Hunel. 76-81 [doi]
- Modeling Variability in Business Process Models Using UMLMaryam Razavian, Ramtin Khosravi. 82-87 [doi]
- Streaming Dyadic Boolean OperationsWalter Dosch, Annette Stümpel, Tõnu Tamme. 88-96 [doi]
- Development of a New Software Product from a Classroom ProjectJeremy W. Pauli, Ty E. Lawrence, Brennon F. Brown. 97-100 [doi]
- Analysis of RSA over Gaussian Integers AlgorithmAleksey Koval, Boris S. Verkhovsky. 101-105 [doi]
- Protection and Recovery of Disk Encryption Key Using Smart CardsKazumasa Omote, Kazuhiko Kato. 106-111 [doi]
- A FPGA Coprocessor for the Cryptographic Tate Pairing over FpAlessandro Barenghi, Guido Bertoni, Luca Breveglieri, Gerardo Pelosi. 112-119 [doi]
- An Efficient Window-Based Countermeasure to Power Analysis of ECC AlgorithmsFan Zhang, Zhijie Jerry Shi. 120-126 [doi]
- An Efficient RSA Public Key Encryption SchemeSattar J. Aboud, Mohammad Ahmed Al-Fayoumi, Mustafa Al-Fayoumi, Haidar S. Jabbar. 127-130 [doi]
- Resource Efficiency of Instruction Set Extensions for Elliptic Curve CryptographyChristoph Puttmann, Jamshid Shokrollahi, Mario Porrmann. 131-136 [doi]
- ULTRA GRIDSEC: Peer-to-Peer Computational Grid Middleware Security Using High Performance Symmetric Key CryptographyMostafa-Sami M. Mostafa, Safia H. Deif, Hisham Abd Elazeem, Ismail Kholidy. 137-142 [doi]
- Automating Contract NegotiationJohn K. Debenham, Elaine Lawrence. 143-148 [doi]
- A Framework for Agent-Based Trust Management in Online AuctionsHaiping Xu, Sol M. Shatz, Christopher K. Bates. 149-155 [doi]
- A Multi-Issue Negotiation Mechanism for Bounded Rational NegotiatorsHamed Janzadeh, Ahmad Kardan. 156-161 [doi]
- Efficient Indexing and Storage Algorithm for Visual DatabasesMark Smith, Alireza Khotanzad. 162-166 [doi]
- Fusion of Face and Gait for Automatic Human RecognitionRabia Jafri, Hamid R. Arabnia. 167-173 [doi]
- Expert-Driven Knowledge DiscoveryTristan Ling, Byeong Ho Kang, David P. Johns, Justin Walls, Ivan Bindoff. 174-178 [doi]
- Feature Selection for Document Type ClassificationKazem Taghva, Jason Vergara. 179-182 [doi]
- A Model Based Testing Technique to Test Web Applications Using StatechartsHassan Reza, Kirk Ogaard, Amarnath Malge. 183-188 [doi]
- A Method to Test Component Off-the-Shelf (COTS) Used in Safety Critical SystemsHassan Reza, Steve Buettner, Varun Krishna. 189-194 [doi]
- Mining Medical Databases with Modified Gini Index ClassificationQuocnam Tran. 195-200 [doi]
- Automated Diagnosis System to Support Colon Cancer Treatment: MATCHJawed I. A. Siddiqi, Babak Akhgar, Alicja Gruzdz, Ghasem Zaefarian, Aleksandra Ihnatowicz. 201-205 [doi]
- Development of Context-Aware Systems to Support Human-Human Communication and CollaborationRahat Iqbal, Kashif Iqbal, Nazaraf Shah, Jawed I. A. Siddiqi, Anne E. James. 206-211 [doi]
- An Overlay Discovery Algorithm towards a Pure Distributed Communication SystemCharilaos Tsivopoulos, Jawed I. A. Siddiqi, Babak Akhgar, Shahram Rahimi, Morvarid Bassir. 212-217 [doi]
- A Framework for IT as a UtilityRyan Coombes, Jawed I. A. Siddiqi. 218-223 [doi]
- Observations on Compressing Text Files of Varying LengthMohammad Hjouj Btoush, Jawed I. A. Siddiqi, Babak Akhgar, Ziad Dawahdeh. 224-228 [doi]
- A Distributed Shared Parallel IO System for HPCYufeng Guo, Qiong Li, Guangming Liu, Yusheng Cao, Lei Zhang. 229-234 [doi]
- Sorting on Partially Connected Mesh NetworksXuerong Feng, Chunlei Liu, Jun Kong. 235-240 [doi]
- A Scalable Proof Methodology for RISC Processor Designs: A Functional ApproachSalah Merniz, Mohamed Benmohammed. 241-246 [doi]
- Global/Local Hashed Perceptron Branch PredictionAnthony S. Fong, C.-Y. Ho. 247-252 [doi]
- Deadlock-Free Multi-Path Routing for Torus-Based NoCsYaoting Jiao, Mei Yang, Yingtao Jiang, Yulu Yang, Xiao-chun Yun. 253-258 [doi]
- Design and Implementation of a Parameterized NoC Router and its Application to Build PRDT-Based NoCsShankar Neelkrishnan, Mei Yang, Yingtao Jiang, Lei Zhang, Yulu Yang, Enyue Lu, Xiao-chun Yun. 259-264 [doi]
- A Technique for Accelerating Characteristic 2 Elliptic Curve CryptographyShay Gueron, Michael E. Kounavis. 265-272 [doi]
- A Meta Hardware Description Language Melasy for Model-Checking SystemsNaoki Iwasaki, Katsumi Wasaki. 273-278 [doi]
- Hardware/Software Codesign — Pedagogy for the IndustryMin He, Ming-Che Tsai, Xiaolong Wu, Fei Wang, Ramzi Nasr. 279-284 [doi]
- The Confirmatory Research on Representative Method of Knowledge Work ProcessLi Jinkun, Wang Bo, Li Yongjian, Fu Hao. 285-290 [doi]
- Collaborative Computing Using the Atom Publishing ProtocolFirat Kart, Louise E. Moser, P. Michael Melliar-Smith. 291-296 [doi]
- Secure Web-Based Sharing of Health Information Services Using Ad-Hoc Dynamic CoalitionsS. Sampath, Ravi Iyer, K. S. Sridharan, Ravi Mukkamala, Sandhya Kapoor. 297-302 [doi]
- Implementation of Collaborative Control in Supply Chain Management by Using DA and Workflow TechnologyTianyang Wang, Zhiyi Fang, Lianyu Zhao, Dan Zhao, Peng Xu, Jin Liu. 303-308 [doi]
- Search Engines Help SystemsYun-Ke Chang, Miguel A. Morales Arroyo, Amanda Spink, Myat Thu Aung, Kyaw Thu, Ya Lwin, Zaw Win Htike. 309-314 [doi]
- Metasearch Engines and Information Retrieval: Computational Complexity of Ranking Multiple Search ResultsRobert Goldberg, Isak Taksa, Amanda Spink. 315-320 [doi]
- A Knowledge-Based Question Answering System for B2C eCommerceAli Ghobadi Tapeh, Maseud Rahgozar. 321-326 [doi]
- A Unified View of Information-Theoretic Aspects of Cognitive RadioFahim Gohar Awan, Muhammad Fainan Hanif. 327-331 [doi]
- Error Forecasting Schemes of Error Correction at ReceiverChandan T. Bhunia. 332-336 [doi]
- Research and Design for Unify XML-Based Management System FrameworkJiang HanPing, Shang Lei. 337-340 [doi]
- Hybrid Approach for Spectrum Bidding in Wireless Communications for Maximizing the ProfitYenumula B. Reddy, Nandigam Gajendar. 341-347 [doi]
- Authenticated Secure Group Communication using Broadcast Encryption Key ComputationR. Aparna, B. B. Amberker. 348-353 [doi]
- On the Properties of Adaptive Additive IncreaseChristos V. Samaras, Vassilis Tsaoussidis. 354-359 [doi]
- Detecting Primary Signals for Efficient Utilization of Spectrum Using Q-LearningYenumula B. Reddy. 360-365 [doi]
- Peer-to-Peer Application in Mobile Cellular SystemsShuping Liu, Jianwei Chen, Shushan Zhao, Fan Na. 366-371 [doi]
- Enhancing Mobile E-Witness with Access Point Selection PoliciesVittorio Ghini, Stefano Cacciaguerra, Giorgia Lodi, Fabio Panzieri. 372-377 [doi]
- Real-Time Implementation of Fault Detection in Wireless Sensor Networks Using Neural NetworksJohn W. Barron, Azzam I. Moustapha, Rastko R. Selmic. 378-383 [doi]
- Application Based Meta Tagging of Network ConnectionsMark Wallis, Frans Henskens, Michael Hannaford. 384-389 [doi]
- Optimized Routing Based on Mobility Prediction in Wireless Mobile Adhoc Networks for Urban AreaMohsen Chegin, Mahmood Fathy. 390-395 [doi]
- Setup Planning and Operation Sequencing Using Neural Network and Genetic AlgorithmRavinder Singh Joshi, Navdeep Kumar, Anju Sharma. 396-401 [doi]
- Honeycomb: A Novel Approach for Construction of Stable ALM OverlayBaiqiang Liu, Takeshi Tsuchiya, Kei ichi Koyanagi. 402-407 [doi]
- Transmitting Range Assignments Using Steiner Tree in Ad Hoc Wireless NetworksRashid Bin Muhammad. 408-413 [doi]
- Agent-Based Shop-Floor Control System in a Dynamic EnvironmentSerafettin Alpay, Inci Sariçiçek. 414-419 [doi]
- Intelligent Quality Performance Assessment for E-Banking Security using Fuzzy LogicMaher Ragheb Aburrous, M. Alamgir Hossain, Fadi A. Thabtah, Keshav P. Dahal. 420-425 [doi]
- Looking at the Class Associative Classification Training AlgorithmFadi A. Thabtah, Qazafi Mahmood, Lee McCluskey. 426-431 [doi]
- Reverse Engineering Functional Classes: A Middleware Case StudyHannu Mäyrä, Mauno Rönkkö. 432-437 [doi]
- A Seamless Modeling Approach for Service-Oriented Information SystemsSebastian Herold, Andreas Rausch, Alexander Bösl, Jan Ebell, Christian Linsmeier, Detlef Peters. 438-446 [doi]
- A Case Study in Partial Parsing Unstructured TextChia-Chu Chiang, John R. Talburt, Ningning Wu, Elizaberth Pierce, Chris Heien, Ebony Gulley, JaMia Moore. 447-452 [doi]
- The State of Metrics in Software IndustryMauricio John Ordoñez, Hisham M. Haddad. 453-458 [doi]
- Semantic Web for E-Government Service Delivery IntegrationFarzad Sanati, Jie Lu. 459-464 [doi]
- Managing Process Interaction in IS Development ProjectsReza Khajavinia. 465-470 [doi]
- Fault-Based Web Services TestingSamer Hanna, Malcolm Munro. 471-476 [doi]
- Using Trustworthy and Referee Agents to Secure Multi-Agent SystemsJamal Bentahar, Babak Khosravifar. 477-482 [doi]
- A Conceptual Framework for Application ComprehensionVenkat N. Gudivada, Jagadeesh Nandigam, Jay N. Bhuyan. 483-488 [doi]
- Measuring the Complexity of Traces Using Shannon EntropyAbdelwahab Hamou-Lhadj. 489-494 [doi]
- Graphical Browsing of Email Data: An Empirical InvestigationSaad Alharbi, Dimitrios Rigas. 495-499 [doi]
- Towards the Development of XML Benchmark for XML UpdatesBinh Viet Phan, Eric Pardede. 500-505 [doi]
- Incorporating Product Development in CS CurriculumSudharsan R. Iyengar. 506-511 [doi]
- HOMER: Home-Based Object-Relational Medical Electronic RecordJoseph M. Woodside. 512-517 [doi]
- A Six Sigma Support Information System: Process Improvement at a Thai UniversityJaruek Chookittikul, Supphachai Busarathit, Wajee Chookittikul. 518-523 [doi]
- Establishing a Consistent Curriculum in a Distributed Campus Environment: Lessons Learned while Moving Towards AccreditationJanet L. Kourik, Peter Maher. 524-527 [doi]
- Maple in MathematicsSuthathip Suanmali. 528-533 [doi]
- Integrating Direct3D Programming into Computer Science CurriculumDelin Tan, Shou-Hsuan Stephen Huang. 534-538 [doi]
- A Production Support Infrastructure for Live Student ProjectsJeff Pittges. 539-544 [doi]
- Towards a Formal Verification of an Authentication Protocol Using Non-Monotonic LogicManik Lal Das, V. Lakshmi Narasimhan. 545-550 [doi]
- An Improved Role-Based Workflow Access Control ModelHui Zhao, Zhiyi Fang, Peng Xu, Lianyu Zhao, Jin Liu, Tianyang Wang. 551-556 [doi]
- Encryption as an Effective Tool in Reducing Wireless LAN VulnerabilitiesJiang Li, Moses Garuba. 557-562 [doi]
- A New Image Steganography Based on 2k Correction and Edge-DetectionJae-Gil Yu, Eun-Joon Yoon, Sang-Ho Shin, Kee-Young Yoo. 563-568 [doi]
- Palette and Index Change Technique for Steganoraphy Based on an IndexcolorSe-Min Kim, Gil-Je Lee, Kee-Young Yoo. 569-574 [doi]
- Cryptanalysis of Wang et al. s Remote User Authentication Scheme Using Smart CardsEun-Jun Yoon, Eun-Jung Lee, Kee-Young Yoo. 575-580 [doi]
- Security Issues of Collaborative Review SystemYuseung Sohn, Hyun-Yi Moon, Seunglim Yong, Sang Ho Lee. 581-586 [doi]
- Security in the New Era of Telecommunication: Threats, Risks and Controls of VoIPMoses Garuba, Jiang Li, Zhenqiang Yi. 587-591 [doi]
- Intrusion Techniques: Comparative Study of Network Intrusion Detection SystemsMoses Garuba, Chunmei Liu, Duane Fraites. 592-598 [doi]
- A Digital Identity Management Service ModelYeonjung Kang, Haeryong Park, Kilsoo Chun, Junghwan Song. 599-602 [doi]
- EARS: Efficient Entity Authentication in Remote SystemsManik Lal Das, V. Lakshmi Narasimhan. 603-608 [doi]
- Multi-User FPGA — An Efficient Way of Managing Expensive FPGA Resources Using TCP/IP, Wi-Max/ Wi-Fi in a Secure Network EnvironmentPiyush Kumar Shukla, S. Silakari, Sarita S. Bhadoria, Anuj Garg. 609-614 [doi]
- Personalized Negotiation Based on Individualization: Incorporating Personalization into Peer-to-Peer SystemJaved I. Khan, Kailas B. Bobade, Manas Hardas. 615-621 [doi]
- Simon s Intelligence Phase for Security Risk Assessment in Web ApplicationsBrunil Romero, Marianella Villegas, Marina Meza. 622-627 [doi]
- A Comparative Analysis of Anti-Malware Software, Patch Management, and Host-Based Firewalls in Preventing Malware Infections on Client ComputersMoses Garuba, Chunmei Liu, Alicia Nicki Washington. 628-632 [doi]
- DHPA: A New Distributed High Performance Architecture for Space Environment Modeling and SimulationShanshan Li, Qun Wang. 633-638 [doi]
- Using Built-In Interoperability with Self-Adaptive Components for RTSEmilia de Menezes Colonese. 639-644 [doi]
- Proposing a Formal Method to Reduce RTS Logical Model ComplexityFrancisco Supino Marcondes, Emilia de Menezes Colonese, Ítalo Santiago Vega, Luiz Alberto Vieira Dias. 645-650 [doi]
- Efficient Monitoring of Embedded Real-Time SystemsJoão Cadamuro Junior, Douglas Renaux. 651-656 [doi]
- Performance Analysis of Cache and Scratchpad Memory in an Embedded High Performance ProcessorWanessa Pereira Dias, Emilia Colonese. 657-661 [doi]
- Formulating Pseudo-Natural LanguageSudharsan R. Iyengar. 662-667 [doi]
- Structural Features for Recognizing Degraded Printed Gurmukhi ScriptManish Kumar Jindal, Rajendra Kumar Sharma, Gurpreet Singh Lehal. 668-673 [doi]
- English to Turkish Example-Based Machine Translation with Synchronous SSTCN. Deniz Alp, Çigdem Turhan. 674-679 [doi]
- A Suffix Based Part-of-Speech Tagger for TurkishBekir Taner Dinçer, Bahar Karaoglan, Tarik Kisla. 680-685 [doi]
- Exploiting Wikipedia for Directional Inferential Text SimilarityLeong Chee Wee, Samer Hassan. 686-691 [doi]
- GlycoVault: A Bioinformatics Infrastructure for Glycan Pathway Visualization, Analysis and ModelingShravya Nimmagadda, Amrita Basu, Matthew Eavenson, Jun Han, Maciej Janik, Rajesh Narra, Kishore Nimmagadda, Arpan Sharma, Krys Kochut, John A. Miller, William S. York. 692-697 [doi]
- The Impact of Business Process Outsourcing on Firm PerformancePisit Chanvarasuth. 698-703 [doi]
- A Search-Free Intersection AlgorithmAkadej Udomchaiporn, Veera Boonjing. 704-708 [doi]
- An Experiment Study on Text Transformation for Compression Using Stoplists and Frequent WordsJirapond Tadrat, Veera Boonjing. 709-713 [doi]
- Abductive Reasoning for Keyword Recovering in Semantic-Based Keyword ExtractionRachada Kongkachandra, Kosin Chamnongthai. 714-719 [doi]
- Adaptive Transport Protocols in Multi Agent SystemAmjad Mehmood, Abdul Ghafoor, H. Farooq Ahmed, Zeeshan Iqbal. 720-725 [doi]
- A Two-Layered Deployment Scheme for Wireless Sensor Network based Location Tracking726-730 [doi]
- Chord-Based Key Establishment Schemes for Sensor NetworksFan Zhang, Zhijie Jerry Shi, Bing Wang. 731-737 [doi]
- SNMP—Proxy for Wireless Sensor NetworkYen Yang Lim, Marco Messina, Frank Kargl, Leena Ganguli, Martin Fischer, Tommy Kwong-Kin Tsang. 738-743 [doi]
- A Secure Group Key Management Scheme for Sensor NetworksA. S. Poornima, B. B. Amberker. 744-748 [doi]
- Processing Ad-Hoc Queries in Wireless Sensor NetworksSanghun Yun, Haengrae Cho, Xingcheng Liu. 749-754 [doi]
- Overlapped Layers for Prolonging Network Lifetime in Multi-Hop Wireless Sensor NetworksHongyan Wang, Mei Yang, Yingtao Jiang, Shupeng Wang, Laximi Gewali. 755-760 [doi]
- RCCT: Robust Clustering with Cooperative Transmission for Energy Efficient Wireless Sensor NetworksMahbod Ghelichi, Seied Kazem Jahanbakhsh, Esmaeil Sanaei. 761-766 [doi]
- A Vector Transform Application on a Coding Algorithm Based on the Polarity of Speech SignalBuket D. Barkana, Tamer Barkana. 767-771 [doi]
- Energy Estimation between Adjacent Formant Frequencies to Identify Speaker s GenderDeepak S. Deepawale, Rajesh Bachu, Buket D. Barkana. 772-776 [doi]
- Novel Multiple Spatial Watermarking Technique in Color ImagesIbrahim Nasir, Ying Weng, Jianmin Jiang. 777-782 [doi]
- Fusion of Hand Based Biometrics Using Particle Swarm OptimizationMadasu Hanmandlu, Amioy Kumar, Vamsi Krishna Madasu, Prasad K. D. V. Yarlagadda. 783-788 [doi]
- Computer Aided Detection of Suspicious Masses and Micro-CalcificationsMadasu Hanmandlu, Davuluri Vineel, Vamsi Krishna Madasu, Shantaram Vasikarla. 789-794 [doi]
- Watermarking: A New ApproachImad Muhi El-Ddin, Hedley Morris, Mohammad Eyadat. 795-800 [doi]
- *Miner: A Suit of Classifiers for Spatial, Temporal, Ancillary, and Remote Sensing Data MiningRanga Raju Vatsavai, Shashi Shekhar, Thomas E. Burk, Budhendra L. Bhaduri. 801-806 [doi]
- A New Human Interactive Proofs System for Deaf PersonsSajad Shirali-Shahreza, Mohammad Shirali-Shahreza. 807-810 [doi]
- Strategic KM, Innovation and PerformanceCarolina López-Nicolás, Ángel Meroño-Cerdán. 811-816 [doi]
- User Knowledge Requirement Model and its Hybrid Evolution AlgorithmZhang Lei, Xia Shixiong, Ding Shifei, Zhou Yong, Ding Qiulin. 817-822 [doi]
- A Research on Predicting the Operation Function for the Workflow-Based Knowledge Management SoftwareKota Tsubouchi, Kazuo Hiekata, Hiroyuki Yamato. 823-828 [doi]
- Knowledge Articulation Method Using Design Data HistoryKazuo Hiekata, Hiroyuki Yamato, Wataru Oishi. 829-834 [doi]
- An Ontology-Based Knowledge System for Supporting Position and Classification of Co-Branding StrategyWei-Lun Chang. 835-840 [doi]
- Incentive-Based Technology Start-Up Program for Undergraduate StudentsJoshua J. Pauli. 841-844 [doi]
- Instructional-Design Theories Applied on a Web-Based Learning ApplicationAnn Svensson. 845-850 [doi]
- Study on Customer Desired Value Change in a Business to Consumer MarketWei Jia, Mingli Zhang. 851-856 [doi]
- Study of Multi-Agent Task Model Based on Product Structure BreakdownHao Yongping, Zeng Pengfei, Shao Weiping. 857-862 [doi]
- On the Properties of System-Wide Responsive BehaviorAgeliki Tsioliaridou, Vassilis Tsaoussidis. 863-868 [doi]
- A Note on Algebraic Hypercube ColoringsIrene Finocchi, Emanuele G. Fusco, Rossella Petreschi. 869-874 [doi]
- An Analysis Framework of Factors Influencing China Software and Information Service Offshore OutsourcingNing Zhang. 875-880 [doi]
- Resource Usage Policy Specification for Managing Application ResourcesPrem Uppuluri, Ajay K. Gupta 0002. 881-887 [doi]
- An Efficient Technique for Distance Computation in Road NetworksXu Jianqiu, Victor Teixeira de Almeida, Qin Xiaolin. 888-893 [doi]
- Vehicle Recognition Using Contourlet Transform and SVMSaeid Rahati, Reihaneh Moravejian, Ehsan Mohamad Kazemi, Farhad Mohamad Kazemi. 894-898 [doi]
- A Decision Support System for Performance AppraisalP. D. D. Dominic, Izzatdin Abdul Aziz, K. N. Goh. 899-903 [doi]
- Hamiltonicity of Simplicial-Connected Graphs: An Algorithm Based on Clique DecompositionThierry Vallée, Alain Bretto. 904-909 [doi]
- Information Assurance and Secure Streaming Algorithm Based on Cubic Roots of IntegersBoris S. Verkhovsky. 910-915 [doi]
- Mimicry Attack on Strategy-Based Behavioral BiometricRoman V. Yampolskiy. 916-921 [doi]
- FES: A System for Combining Face, Ear and Signature Biometrics Using Rank Level FusionMd. Maruf Monwar, Marina L. Gavrilova. 922-927 [doi]
- Distributed Authentication Systems Enhanced by Quantum ProtocolsAdrian Kapczynski, Marcin Sobota. 928-931 [doi]
- Gait Recognition Using Wavelet TransformSaeid Rahati, Reihaneh Moravejian, Farhad Mohamad Kazemi. 932-936 [doi]
- Effects of Parameter Improvement Mechanisms for Intelligent E-Learning SystemsXin Zhang, Changchun Gao, Wenwen Zheng. 937-942 [doi]
- A Blocking Scheme for Identification of Components and Sub-Components of Semi-Structured E-DocumentsAzita A. Bahrami. 943-948 [doi]
- An Innovative Framework for the New Generation of SCORM 2004 Conformant E-Learning SystemsAli Shemshadi, Javad Soroor, Mohammad J. Tarokh. 949-954 [doi]
- Developing a Novel Framework for Effective Use of Implicit Feedback in Adaptive e-LearningAhmad Kardan, Hamed Monkaresi. 955-960 [doi]
- Decision Support Models for Personalized Course Composition with a Focus on Learning StylesAhmad Kardan, Nima Taghipour. 961-966 [doi]
- Learning Techniques to Train Neural Networks as a State Selector in Direct Power Control of DSTATCOM for Voltage Flicker MitigationMehdi Karami, Heidar Ali Shayanfar, Ali Ghobadi Tapeh, Siamak Bandari. 967-974 [doi]
- Mobile User Needs: Efficient TransactionsTarek El Kiki, Elaine Lawrence. 975-981 [doi]
- Mobile Voice Access in Social Networking SystemsStan Kurkovsky, David Strimple, Eric Nuzzi, Kerry Verdecchia. 982-987 [doi]
- Optimization of WAMDAS: A Web Service-Based Wireless Alarm Monitoring and Data Acquisition System for Pharmaceutical PlantsEdith Quispe Holgado, Manuel Rodríguez-Martínez, Edilberto García Rodríguez. 988-993 [doi]
- Implementing and Validating an Environmental and Health Monitoring SystemMarco Messina, Yen Yang Lim, Elaine Lawrence, Don Martin, Frank Kargl. 994-999 [doi]
- A Trust Evaluation Method for Node Cooperation in Mobile Ad Hoc NetworksKun Wang, Meng Wu, Subin Shen. 1000-1005 [doi]
- Research of Multi-Path Routing Protocol Based on Parallel Ant Colony Algorithm Optimization in Mobile Ad Hoc NetworksChengyong Liu, Layuan Li, Yang Xiang. 1006-1010 [doi]
- Scalable Video Transmission for a Surveillance SystemTomi Räty, Lassi Lehikoinen, Francois Bremond. 1011-1016 [doi]
- A Near-Zero Run-Time Energy Overhead within a Computation Outsourcing Framework for Energy Management in Mobile DevicesAhmed Abukmail, Abdelsalam Helal. 1017-1022 [doi]
- A Self-Healing Plug-in Parser for NMEA StreamsRon Coleman. 1023-1027 [doi]
- Stable and Energy Efficient Routing for Mobile Adhoc NetworksVinay Rishiwal, Ashwani Kush, Shekhar Verma. 1028-1033 [doi]
- Research on Author’s Semantic Similarity Based on Collaborative NetworkKai-Zhong Jiang, Yuan-Qiong Wu, Zhao Lv, Junzhong Gu. 1034-1039 [doi]
- Delay in a Discrete-Time Queueing Model with Batch Arrivals and Batch ServicesDieter Claeys, Koenraad Laevens, Joris Walraevens, Herwig Bruneel. 1040-1045 [doi]
- Multicast Using Static TreesJiang Li, Moses Garuba, Legand L. Burge III. 1046-1052 [doi]
- System Content and Packet Delay in Discrete-Time Queues with Session-Based ArrivalsLaurence Hoflack, Stijn De Vuyst, Sabine Wittevrongel, Herwig Bruneel. 1053-1058 [doi]
- Flow Loss Characteristics in the Presence of Correlated Background TrafficDieter Fiems, Stijn De Vuyst, Herwig Bruneel. 1059-1064 [doi]
- A Hierarchical Queueing Model for Streaming Video over Multi-Hop Wireless NetworksHao Wang. 1065-1070 [doi]
- System-Level Modeling and Simulation of Uplink WCDMARachod Patachaianand, Kumbesan Sandrasegaran. 1071-1076 [doi]
- Modeling Disruption Tolerant Networks with Random Geographical BarriersRotimi Iziduh, Lucky Adike, Alicia Nicki Washington. 1077-1080 [doi]
- Internet Filtering and CensorshipSamir N. Hamade. 1081-1086 [doi]
- Parallel FFT Algorithms on Network-on-ChipsJun Ho Bahn, Jungsook Yang, Nader Bagherzadeh. 1087-1093 [doi]
- On Power Dissipation in Information ProcessingRoman Ostroumov, Kang L. Wang. 1094-1097 [doi]
- Programmable Logic Gates for Optical ProcessingV. Kochergin, Z. Shi, R. Ostroumov, A. Kroetch, S. Buswell, S. Evoy, R. Heflin. 1098-1100 [doi]
- Performance Impact of Task-to-Task Communication Protocol in Network-on-ChipNader Bagherzadeh, Masaru Matsuura. 1101-1106 [doi]
- Spin Wave Logic Circuit on Silicon PlatformAlexander Khitun, Mingqiang Bao, Yina Wu, Ji-Young Kim, Augustin Hong, Ajey Jacob, Kosmas Galatsis, Kang L. Wang. 1107-1110 [doi]
- Using Domain Specific Question Answering Technique for Automatic Railways Inquiry on Mobile PhoneAvinash J. Agrawal. 1111-1116 [doi]
- Adaptive Visual Tracking Using Particle FilterShi-Wei Gao, Lei Guo, Liang Chen, Yong Yu. 1117-1122 [doi]
- Hardware Synthesis for Reconfigurable Heterogeneous Pipelined AcceleratorsLech Józwiak, Alexander Douglas. 1123-1130 [doi]
- Pipelined Bus-Invert Coding for FPGAs Driving High-Speed DDR-ChannelsGünter Knittel. 1131-1136 [doi]
- A Study of the Structure of Chinese Customer Satisfaction in a Web-Based Shopping EnvironmentHui Chen, Zheng Li. 1137-1139 [doi]
- Solutions to the WLAN and Bluetooth InterferenceMah-Rukh. 1140-1141 [doi]
- A Node Allocation Algorithm for Parallel ApplicationsS. Subha. 1142-1143 [doi]
- Variable Block Size Architecture for LoopsS. Subha. 1144-1145 [doi]
- Increasing Additive Noise Removal in Speech Processing Using Spectral SubtractionCliston Cole, Marc Karam, Heshmat Aglan. 1146-1147 [doi]
- CoLeP: An Agent-Based Collaborative System for Pervasive LearningWei-Lun Chang. 1148-1149 [doi]
- Applying Semantic Web Services to Web-Based IS and ApplicationsRanjit Bose. 1150-1155 [doi]
- Hierarchy-Driven Approach for Attack Patterns in Software Security EducationJoshua J. Pauli, Patrick Henry Engebretson. 1156-1157 [doi]
- Knowledge-Based Baseline Detection and Optimal Thresholding for Words Segmentation in Efficient Pre-Processing of Handwritten Arabic TextJawad H. AlKhateeb, Jinchang Ren, Stanley S. Ipson, Jianmin Jiang. 1158-1159 [doi]
- Biological Research Based on Sensor NetworksPerfecto Mariño, Fernando Pérez-Fontán, Miguel Angel Domínguez, Santiago Otero. 1160-1161 [doi]
- A Novel Location-Aided Routing Algorithm for MANETsKun Wang, Meng Wu, Weifeng Lu, Pengrui Xia, Subin Shen. 1162-1163 [doi]
- A High Performance Strategy for Constructing Dynamic MIBXiaotong Zhang, Lei Zhang, Jian Zhou. 1164-1167 [doi]
- Towards a Specification Prototype for Hierarchy-Driven Attack PatternsJoshua J. Pauli, Patrick Henry Engebretson. 1168-1169 [doi]
- An E-Government Platform Based on Multi-Tier ArchitectureXiaoyuan Zhang, Guoqiang Han, Bin Li, Kun Zou, Wen Li. 1170-1172 [doi]
- Compiled Code Compression for Embedded Systems Using Evolutionary ComputingM. S. Ali, Anjali Mahajan, N. V. Choudhari. 1173-1174 [doi]
- Quality Driven Web Service Selection and RankingDemian Antony D Mello, V. S. Ananthanarayana. 1175-1176 [doi]
- Prototype Generation from Ontology ChartsGeorge Tsaramirsis, Iman Poernomo. 1177-1178 [doi]
- Incorporating Object-Orientedness in Transformations from Live Sequence Charts to Colored Petri NetsBinsan Khadka, Boleslaw Mikolajczak. 1179-1183 [doi]
- Novel Window Functions for Digital FiltersArulalan M. Rajan, H. S. Jamadagni, Ashok Rao. 1184-1185 [doi]
- A Coarse Grain Multicomputer Algorithm Solving the Optimal Binary Search Tree ProblemMounir Kechid, Jean Frédéric Myoupo. 1186-1189 [doi]
- Cryptosystem Based on Extraction of Square Roots of Complex IntegersAleksey Koval, Boris S. Verkhovsky. 1190-1191 [doi]
- Permutation Routing in All-Optical Multistage Clos NetworkMing-Jye Lee, Chi-Chang Chen, Chien-Ning Yeh. 1192-1193 [doi]
- Artificial Intelligence in Sports PredictionAlan McCabe, Jarrod Trevathan. 1194-1197 [doi]
- Distributed Key Management Technique for Reliable Secure Group CommunicationA. S. Poornima, B. B. Amberker. 1198-1199 [doi]
- A Content-Based Multimedia Retrieval System Base on MPEG-7 Metadata SchemaYongbo Ma, Zhiyi Fang, Jin Liu, Tianyang Wang, Peng Xu, Lianyu Zhao. 1200-1201 [doi]
- Reversible Network Iterative Construct Method Based on the Cascade OperationZhijin Guan, Xiaolin Qin, Xinchun Cui. 1202-1205 [doi]
- Evaluation of a Middleware System for Accessing Digital Music Libraries in Mobile ServicesParaskevi S. Lampropoulou, Aristomenis S. Lampropoulos, George A. Tsihrintzis. 1206-1207 [doi]
- Analysis of the Transient Delay in a Discrete-Time Buffer with Batch ArrivalsJoris Walraevens, Dieter Fiems, Herwig Bruneel. 1208-1209 [doi]
- Data Compression for Emitter Location Finding in Sensor NetworksLei Yu, Xiaoyue Liu, Xin Chen. 1210-1215 [doi]
- Design of the Next Generation Military Network Management System Based on NETCONFZhu Wei, Liu Ningning, Shan Weifeng, Fu Guobin. 1216-1219 [doi]
- Mobile Agents in Heterogeneous Database Environment for Emergency Healthcare SystemSharmila S. Gaikwad. 1220-1221 [doi]
- Gradient and Principal Component Analysis Based Texture Recognition System: A Comparative StudyRatika Pradhan, Zangpo Gyalsten Bhutia, M. Nasipuri, Mohan P. Pradhan. 1222-1223 [doi]
- Utilizing User Behaviors with Semantic MetadataLili Jiang, Jian Zhan, Lian Li, Changxian Shi, Ning An. 1224-1225 [doi]
- Data/Information Lifecycle Management: A Solution for Taming Data BeastJivika Govil, Navkeerat Kaur, Harkeerat Kaur, Jivesh Govil. 1226-1227 [doi]
- Plastic Fiber Optic SimulationsSyed V. Ahamed, Galathara Kahanda. 1228-1233 [doi]
- Advanced Collage CAPTCHAMohammad Shirali-Shahreza, Sajad Shirali-Shahreza. 1234-1235 [doi]
- A New Congestion Control Algorithm Based on RBFNNShan Weifeng, Meng Baohong, Zhu Wei. 1236-1239 [doi]
- Very Fast Multi Operand Addition Method by Bitwise SubtractionKooroush Manochehri, Saadat Pourmozafari, Babak Sadeghian. 1240-1241 [doi]
- Security Threats on EPC Based RFID SystemsJoaquín García-Alfaro, Michel Barbeau, Evangelos Kranakis. 1242-1244 [doi]
- An Improved Algorithm for the Evaluation of Alternating Fixpoint Expressions in the mu-CalculusHua Jiang, Xiang Li. 1245-1248 [doi]
- A Set Associative Cache Model with Energy SavingS. Subha. 1249-1250 [doi]
- Transformation Matrix System for Reducing the Computational Complexity of Wireless Multi-User Receivers for DS-CDMA SystemsSyed Sajjad Rizvi, Aasia Riasat, Khaled M. Elleithy. 1251-1252 [doi]
- Modularization of the UML Metamodel Using Model SlicingJung Ho Bae, KwangMin Lee, Heung Seok Chae. 1253-1254 [doi]
- On Formal Description of Synchronization Requirements in Multimedia SystemsAlvis Cheuk M. Fong, Andrew Simpson. 1255-1256 [doi]
- User Modelling in a Collaborative Learning Environment for UMLKalliopi Tourtoglou, Maria Virvou. 1257-1258 [doi]
- From Use Cases to Framelets for Building Application FrameworksSarun Intakosum. 1259-1260 [doi]
- ArmSim: A Complete System Simulation Environment of the ARM Embedded SystemWan Han, Gao Xiaopeng. 1261-1262 [doi]
- Classification of Dynamic Load Balancing Strategies in a Network of WorkstationsSandeep Singh Waraich. 1263-1265 [doi]
- Online ExaminationSophal Chao, Yenumula B. Reddy. 1266-1267 [doi]
- An Adaptive Configuration for Agent-Based Supply NetworkKhaled Ghoneim, Jamal Bentahar. 1268-1271 [doi]
- Privacy Concerns of Semantic WebAzadeh Nematzadeh, Layla Pournajaf. 1272-1273 [doi]
- FPGA Based Implementation of Robust Watermarking SystemHesham Abdel Slam Aly Elzouka. 1274-1278 [doi]
- Database Support for Discovering Patterns in Large Datasets Collected from Multiple SensorsRichard A. Wasniowski. 1279-1280 [doi]
- A Parallel Steiner Tree Construction on the Server-Client Model of ComputationRashid Bin Muhammad. 1281-1283 [doi]
- Reliable Metal-Fill Monitoring System Using Wireless Sensor NetworksPhaneeth K. R. Junga, Mohamed Abdelrahman, Clayton Thurmer, Wael A. Deabes. 1284-1285 [doi]
- Investigation into the Creation and Application of a Composite Application Software Development Process Framework (CASDPF)Mohammed Al-Maharmeh, Bhuvan Unhelkar. 1286 [doi]
- Kernel-Based Speaker Clustering for Rapid Speaker AdaptationOldooz Hazrati Yadkoori, Seyed Mohammad Ahadi, Seyed Omid Sadjadi. 1287-1289 [doi]
- AOP Maintains an Independent Coordinate SystemJoe Kutner, Louise A. Perkins, Sumanth Yenduri, Farnaz Zand, Joe Zhang. 1290-1291 [doi]
- Comparing Source Codes Generated by CASE Tools with Hand CodedDenis S. Loubach, Diogo B. Ramos, Osamu Saotome, Adilson Marques da Cunha. 1292 [doi]
- Network-Based EDM Learning Framework in Precision Manufacturing EngineeringJanus S. Liang. 1293-1294 [doi]
- Secured and Lossless Watermarking Technique for Patent InfringementG. Yamuna, D. Sivakumar. 1295-1296 [doi]
- Developing an Aerospace System Software Using PBL and MDAJoão Carlos Silva Nobre, Denis Silva Loubach, Emilia Colonese. 1297-1298 [doi]
- Comparison between Redundancy Techniques for Real Time ApplicationsFauser Gustavo Russo Neves, Osamu Saotome. 1299-1300 [doi]
- Embedding a Corporate Blogging System in the CRM SolutionsNarjes Sharif Razavian, Fattaneh Taghiyareh. 1301-1302 [doi]
- Epidemic Modeling of Military Networks Using Group and Entity Mobility ModelsTemitayo Olajide, Alicia Nicki Washington. 1303-1304 [doi]
- Towards Maude-Tla based Foundation for Complex Concurrent Systems Specification and CertificationNasreddine Aoumeur, Kamel Barkaoui, Gunter Saake. 1305-1307 [doi]