Abstract is missing.
- UMOST : Ubiquitous Multimedia Framework for Context-Aware Session MobilityYong-Ju Lee, Choon Seo Park, Jin-Whan Jeong, Hag-Young Kim. 3-8 [doi]
- Image-Based Modeling of Virtual Pagoda of ChinaWu Guo, Yi Li, Wenhui Li, Meiying Sun. 9-14 [doi]
- Cognitive Modeling in Medical Pattern Semantic UnderstandingLidia Ogiela, Ryszard Tadeusiewicz, Marek R. Ogiela. 15-18 [doi]
- An IMS Based Inter-working Solution for Multimedia Service in a Converged NetworkZhongwen Zhu. 19-24 [doi]
- A Time Slot Count in Window Method Suitable for Long-Term Regularity-Based User Classification for Mobile InternetToshihiko Yamakami. 25-29 [doi]
- FBBM: A New Backup Method with Data De-duplication CapabilityTianming Yang, Dan Feng, Jingning Liu, Yaping Wan. 30-35 [doi]
- Abnormal Gait Detection Using Discrete Fourier TransformAhmed Mostayed, Mohammad Mynuddin Gani Mazumder, Sikyung Kim, Se Jin Park. 36-40 [doi]
- A Trust Management Model for P2P File Sharing SystemHuafeng Wu, Chaojian Shi, Haiguang Chen, Chuanshan Gao. 41-44 [doi]
- The Adaptive Heartbeat Design of High Availability RAID Dual-ControllerYaping Wan, Dan Feng, Tianming Yang, Ze Deng, Li Liu. 45-50 [doi]
- A Regularity-Oriented Service Model with Sub-Day-Scale User Classifications for Mobile InternetToshihiko Yamakami. 51-56 [doi]
- A Rekey-Boosted Security Protocol in Hierarchical Wireless Sensor NetworkYi-Ying Zhang, WenCheng Yang, Kee-Bum Kim, Min-Yu Cui, Myong-Soon Park. 57-61 [doi]
- Image Retrieval Using Maximum Frequency of Local Histogram Based Color CorrelogramWaqas Rasheed, Youngeun An, Sung Bum Pan, Ilhoe Jeong, Jong-An Park, Jinsuk Kang. 62-66 [doi]
- An Energy-Aware Distributed Algorithm for Sensor Nodes ClusteringSusmit Bagchi. 67-72 [doi]
- Efficient Information Retrieval by Dispatching Mobile Agents in ParallelWenyu Qu, Keqiu Li, Chao Zhang. 73-76 [doi]
- Handwritten Signature Authentication Using Statistical EstimationSamir Kumar Bandyopadhyay, Debnath Bhattacharyya, Poulami Das, Deepsikha Debnath. 77-82 [doi]
- A New CORDIC Algorithm and Software Implementation Based on Synchronized Data Triggering ArchitectureXinbiao Gan, Kui Dai, Libo Huang, Li Shen, Zhiying Wang. 83-86 [doi]
- An Improvement of Password-Only Authenticated Key Establishment Protocol without Public Key CryptographyEun-Jun Yoon, Kee-Young Yoo. 87-91 [doi]
- GPU-Based Simulation of Large-Scope Ocean WaveSu-Jun Li, Ling-Da Wu. 92-95 [doi]
- A Novel Technique for Real-Time Internet Radio Recorder on Non-DSP Embedded SystemLain-Jing Hwang, Chien-Chou Shih, I-Ting Kuo. 96-101 [doi]
- I-SEAD: A Secure Routing Protocol for Mobile Ad Hoc NetworksChu-Hsing Lin, Wei-Shen Lai, Yen-Lin Huang, Mei-Chun Chou. 102-107 [doi]
- An Extension of Software Player for Playing Finalizing-Failure DVD VR DiscsChun-Yi Tsai, Tzao-Lin Lee. 108-113 [doi]
- A Comparative Review of Aspect Ratio Conversion MethodsZhongliang Deng, Yandong Guo, Xiaodong Gu, Zhibo Chen, Quqing Chen, Charles Wang. 114-117 [doi]
- Efficient Compression of Multi-view Video Using Hierarchical B PicturesLini Ma, Feng Pan. 118-121 [doi]
- Ambulatory Urodynamics Monitoring System Using Personal Digital AssistanceKeo-Sik Kim, Yang Soo An, Jeong-Hwan Seo, Chul-Gyu Song. 122-125 [doi]
- ACE: Active Emergence Call Service System for u-LifecareWon-Hee Han, Eun-Ha Song, Laurence Tianruo Yang, Jong Hyuk Park, Young-Sik Jeong. 126-131 [doi]
- A Robust Watermark Scheme for Copyright ProtectionChu-Hsing Lin, Jung-Chun Liu, Chih-Hsiong Shih, Yan-Wei Lee. 132-137 [doi]
- Supporting Landmark Image Retrieval with Skyline Extraction TechniquesYu-Ren Liao, Yu-Cheng Chen, Kuan-Chung Chen, Wei-Guang Teng. 138-143 [doi]
- Automatic Colonic Polyp Detection by the Mapping Using Regional Unit SphereM. Park, S. J. Jin, R. Hofstetter, M. Xu, B. H. Kang. 144-149 [doi]
- Agent-Based Trust Management Model for Wireless Sensor NetworksHaiguang Chen, Huafeng Wu, Jinchu Hu, Chuanshan Gao. 150-154 [doi]
- G3M: A Generalized Multimedia Data Model Based on MPEG-7Qiong Zuo, Zhongsheng Cao. 155-159 [doi]
- Lifelog Image Analysis Based on Activity Situation Models Using Contexts from Wearable Multi SensorsKatsuhiro Takata, Jianhua Ma, Bernady O. Apduhan, Runhe Huang, Norio Shiratori. 160-163 [doi]
- OntoCBR: Ontology-Based CBR in Context-Aware ApplicationsYun Bai, Juan Yang, Yuhui Qiu. 164-169 [doi]
- An Interactive Fire Animation on a Mobile EnvironmentDongGyu Park, Sanghyuk Woo, MiRiNa Jo, DoHoon Lee. 170-175 [doi]
- Using Adaptive Bandwidth Allocation Approach to Defend DDoS AttacksChu-Hsing Lin, Jung-Chun Liu, Hsun-Chi Huang, Tsung-Che Yang. 176-181 [doi]
- Investigation of Secure Framework for Multipath MANETBinod Vaidya, Dong-You Choi, Jong-An Park, Seung Jo Han. 182-185 [doi]
- Validating Secure Connections between Wireless Devices in Pervasive Computing Using Data MatrixSeunghyun Im. 186-190 [doi]
- DG-Based Active Defense Strategy to Defend against DDoSRui Guo, Guiran Chang, Yuhai Qin, Baojing Sun, An Liu, Bencheng Zhang, Dan Peng. 191-196 [doi]
- Broadcasting with the Least Energy is an NP-Complete ProblemWuu Yang, Huei-Ru Tseng, Rong-Hong Jan, Bor-Yeh Shen. 197-200 [doi]
- A Novel Personal Identity Verification Approach Using a Discrete Wavelet Transform of the ECG SignalChuang-Chien Chiu, Chou-Min Chuang, Chih-Yu Hsu. 201-206 [doi]
- A Reflective Heterogeneous Service Coordination Middleware Based on Mobile Agents in Wireless EnvironmentsHaiYang Hu, Hua Hu, Jie Chen. 207-210 [doi]
- A Very Low Bit Rate Video Coding for Ubiquitous ServicesBen-Shung Chow. 211-214 [doi]
- Hybrid Negotiation Mechanism for Resolution Conflicts between Replicas in Data GridGhalem Belalem, Belabbes Yagoubi. 215-220 [doi]
- A Dynamic Hybrid Congestion Control Algorithm for Structured P2P NetworksZhi Chen, Jingdong Xu, Guowei Huang. 221-228 [doi]
- Personalized Information Retrieval Using the User HistoryTaehwan Kim, Hochul Jeon, Joongmin Choi. 229-232 [doi]
- An Imperceptible Watermarking Scheme Using Variation and Modular OperationsShu-Fen Tu, Ching-Sheng Hsu. 233-237 [doi]
- A Conceptual Model of Adjectival Modification in Chinese and Its Automatic Construction from a Machine Readable DictionaryXuening Li, Ruzhan Lu, Yi Hu. 238-243 [doi]
- Ontology-Based User Intention Recognition for Proactive Planning of Intelligent Robot BehaviorHochul Jeon, Taehwan Kim, Joongmin Choi. 244-248 [doi]
- A Novel Topic Extraction Method Based on Bursts in Video StreamsKimiaki Shirahama, Kuniaki Uehara. 249-252 [doi]
- Speaker Independent Phoneme Recognition Based on Fisher Weight MapTakashi Muroi, Tetsuya Takiguchi, Yasuo Ariki. 253-257 [doi]
- Integrated Platform for Collaborative Learning in the Mobile EnvironmentYu-Tsung Tai, Meng-Chien Yang. 258-262 [doi]
- ATBaM: An Arnold Transform Based Method on Watermarking Relational DataChaokun Wang, Jianmin Wang, Ming Zhou, Guisheng Chen, Deyi Li. 263-270 [doi]
- High-Speed Implementations of Block Cipher ARIA Using Graphics Processing UnitsYongjin Yeom, Yongkuk Cho, Moti Yung. 271-275 [doi]
- A Channel Management Scheme for Reducing Interference in Ubiquitous Wireless LANs EnvironmentKibaek Yoo, Chong-kwon Kim. 276-281 [doi]
- Audio-Based Video Editing with Two-Channel MicrophoneTetsuya Takiguchi, Jun Adachi, Yasuo Ariki. 282-287 [doi]
- Context-Aware Environment-Role-Based Access Control Model for Web ServicesChun-Dong Wang, Ting Li, Li-Chun Feng. 288-293 [doi]
- An Intelligent Clustering Algorithm for 3D Objects Layouts in Storage SystemsShao-Shin Hung, Hui-Ling Lin. 294-297 [doi]
- Toward a Message-Oriented Application Model and its Middleware Support in Ubiquitous EnvironmentsChun-Feng Liao, Ya-Wen Jong, Li-Chen Fu. 298-303 [doi]
- Human-Robot Interface Using System Request Utterance Detection Based on Acoustic FeaturesTetsuya Takiguchi, Tomoyuki Yamagata, Atsushi Sako, Nobuyuki Miyake, Jérome Revaud, Yasuo Ariki. 304-309 [doi]
- A Location-Aware Resource Management Scheme for Ubiquitous Wireless NetworksChenn-Jung Huang, Hong-Xin Chen, I-Fan Chen, Kai-Wen Hu. 310-315 [doi]
- A Novel Evaluation Method Basing on Support Vector MachinesGuang-ming Xian, Bi-qing Zeng. 316-319 [doi]
- A Novel Hybrid Model for Information Processing Basing on Rough Sets and Fuzzy SVMGuang-ming Xian, Bi-qing Zeng. 320-323 [doi]
- Gaining Flexibility and Performance of Computing Using Tailored Instruction Set and Reconfigurable ArchitectureTian Hangpei, Deyuan Gao, Zhu Yian, Wang Deli, Wang Jing. 324-329 [doi]
- Dynamically Reconfigurable Instruction Set for Software Radio Encoding/CodingTian Hangpei, Deyuan Gao, Wang Deli, Zhu Yian, Shengbing Zhang, Wang Jing. 330-335 [doi]
- A Novel Migration Algorithm Based-On “States-Balancing” in a Distributed Multimedia Services SystemMinglong Zhang, Boqin Feng. 336-341 [doi]
- An Eyes-Free In-car User Interface Interaction Style Based on Visual and Textual Mnemonics, Chording and SpeechFrode Eika Sandnes, Yo-Ping Huang, Yeh-Min Huang. 342-347 [doi]
- A Proposal on the Error Bound of Collaborative Filtering Recommender SystemUk-Pyo Han, Gil-Mo Yang, Jae Soo Yoo, Young-Jun Chung, Hee-Choon Lee. 348-354 [doi]
- Design and Implementation of a FAT File System for Reduced Cluster Switching OverheadMoonsoo Choi, Heemin Park, Jaewook Jeon. 355-360 [doi]
- A Transcoding Architecture for Adapting MPEG-21 Digital Items in Mobile NetworksTz-Heng Hsu, Yueh-Heng Li, Meng-Shu Chiang. 361-364 [doi]
- Recovery of Damaged Compressed Files for Digital Forensic PurposesBora Park, Antonio Savoldi, Paolo Gubian, Jungheum Park, Seok Hee Lee, Sangjin Lee. 365-372 [doi]
- A New Live Streaming Media Architecture for Peer-to-Peer NetworkJiujun Cheng, ChunGang Yan, Kuifei Yu, Jian Ma. 373-377 [doi]
- A New Parameter Selection Method of Neural NetworkGui-fang Wu, Se-young Jang, Hoon-Sung Kwak, Jie-Xin Pu. 378-383 [doi]
- Efficient Data Dissemination in Mobile P2P Ad-Hoc Networks for Ubiquitous ComputingDo-Hoon Kim, Myoung Rak Lee, Longzhe Han, Hoh Peter In. 384-389 [doi]
- A Verification-Based Localization Method for Unstable Radio Sensor Networks in Smart Home EnvironmentsYong-Ming Huang, Ding-Chao Wang, Chao-Chun Chen. 390-393 [doi]
- A General Method for Shot Boundary DetectionLing Xue, Li Chao, Li Huan, Xiong Zhang. 394-397 [doi]
- Which Instant Messaging System Should I Choose: A Conceptual ModelZhaoli Meng, Meiyun Zuo, Yanhui Chen. 398-401 [doi]
- Genetic Algorithm for Shortest Driving Time in Intelligent Transportation SystemsChu-Hsing Lin, Jui-Ling Yu, Jung-Chun Liu, Chia-Jen Lee. 402-406 [doi]
- SVM-Based Video Scene Classification and SegmentationYingying Zhu, Zhong Ming. 407-412 [doi]
- Developing Proactive Information Delivery System through Bluetooth in Ubiquitous NetworksEric J. Ballance, Hwajung Lee. 413-418 [doi]
- Intelligent Security for Inter-space Surveillance ApplicationsGeon Woo Kim, Deok-Gyu Lee, Jong-Wook Han, Sang-Wook Kim. 419-422 [doi]
- Reference Algorithm for 3D Mesh Model in Service Rendering MiddlewareHakran Kim, Yongik Yoon, Hwajin Park. 423-428 [doi]
- Detecting Clusters and Outliers for Multi-dimensional DataYong Shi. 429-432 [doi]
- Investigating Wireless Sensor Network Lifetime Using a Realistic Radio Communication ModelMichael Mallinson, Sajid Hussain, Jong Hyuk Park. 433-437 [doi]
- Optimized Implementation of Ray Tracing on Cell Broadband EngineBo Li, Hai Jin, Zhiyuan Shao, Yong Li, Xin Liu. 438-443 [doi]
- FRCS: A File Replication and Consistency Service in Data GridsChao-Tung Yang, Chun-Pin Fu, Chien-Jung Huang, Ching-Hsien Hsu. 444-447 [doi]
- The Study of Metal Resource Management Module and Process by Analyzing InformationSungmo Jung, Seoksoo Kim. 448-453 [doi]
- A Study on Composite System Vulnerability through CC AnalysisJaegu Song, Seoksoo Kim. 454-459 [doi]
- A Performance-Effective and High-Scalable Grid File SystemChin-Chen Chu, Ching-Hsien Hsu. 460-465 [doi]
- A Video Sharing Platform with Data Grid Technology for Mobile DevicesChao-Tung Yang, Chun-Jen Chen, Chien-Jung Huang, Hung-Yen Chen. 466-469 [doi]
- Reconfigurable Depth Buffer Compression Design for 3D Graphics SystemTzung-Rung Jung, Lan-Da Van, Wai-Chi Fang, Teng-Yao Sheu. 470-474 [doi]
- Video Customization System Using Mpeg StandardsSvetlana Kim, Yongik Yoon. 475-480 [doi]
- Unit Commitment Scheduling Using a Hybrid ANN and Lagrangian Relaxation MethodZhen Liu, Na Li, Chaohai Zhang. 481-484 [doi]
- Analyzing Maximum Length of Instruction Sequence in Network Packets for Polymorphic Worm DetectionKohei Tatara, Yoshiaki Hori, Kouichi Sakurai. 485-489 [doi]
- Design and Implementation of ATA-Based Virtual Storage System for Mobile DeviceYu-Shu They, Chee-Min Yeoh, Hoonjae Lee, Hyotaek Lim. 490-495 [doi]
- Geometrically Reciprocal Authentication Scheme Using Shift Tangent Line in Ad Hoc Network SystemsChung-Wei Chen, Shiuh-Jeng Wang, Yuh-Ren Tsai. 499-504 [doi]
- TCP-Based Dynamic Media Stream Adaptation in Ubiquitous EnvironmentGergely Hományi, Gábor Paller. 505-510 [doi]
- A New Grid Resource Management Mechanism Based on D-S TheoryYongsheng Hao, Yuebin Xu, Guanfeng Liu, Zhenkuan Pan. 511-514 [doi]
- Supporting Appropriate Communication Media Selection in Ubiquitous EnvironmentSeint Seint Aye, Kyoji Kawagoe. 515-520 [doi]
- Flexible Key Assignment for a Time-Token Constraint in a HierarchyHsing-Chung Chen, Shiuh-Jeng Wang, Jyh-Horng Wen, Chung-Wei Chen. 521-526 [doi]
- A Study on New Low-Cost RFID System with Mutual Authentication Scheme in UbiquitousSoo-Young Kang, Im-Yeong Lee. 527-530 [doi]
- Distributive Key Management for Mobile Ad Hoc NetworksMohammad Al-Shurman, Seong-Moo Yoo, Bonam Kim. 533-536 [doi]
- A Cost Effective Rate Control for Streaming Video Dedicated to Wireless Handheld DevicesYoun-Sik Hong, Hwa-Seok Lim, Jun-Sik Hong. 537-542 [doi]
- Energy-Efficient Buffer Architecture for Flash MemoryWen-Tzeng Huang, C. T. Chen, Chin-Hsing Chen, C. C. Cheng. 543-546 [doi]
- The Practical System Architecture for the Wireless Sensor NetworksHyun-Jin Kim, Junmo Yang. 547-551 [doi]
- An Improved Flexible Access Control Scheme for JPEG2000 CodestreamsYang Ou, Chae Duk Jung, Chul Sur, Kyung Hyune Rhee. 552-557 [doi]
- Ubiquitous Web Access: Collaborative Optimization and Dynamic Content NegotiationXavier Sanchez-Loro, Victoria Beltran, Jordi Casademont, Marisa Catalan. 558-563 [doi]
- A Novel Network Mobility Scheme Using SIP and SCTP for Multimedia ApplicationsFang-Yie Leu, Zhen-Jia Ko. 564-569 [doi]
- A User-Perceived Freshness Clustering Method to Identify Three Subgroups in Mobile Internet UsersToshihiko Yamakami. 570-575 [doi]
- Natural Language Watermarking for Korean Using Adverbial DisplacementMi-Young Kim. 576-581 [doi]
- Energy Effective Geographical Routing Considering Wireless Link Condition in WSNInbo Sim, Jaiyong Lee. 582-585 [doi]
- A Context-Aware Push-to-Talk ServiceJenq-Muh Hsu, Wei-Bin Lain, Jui-Chih Liang. 586-591 [doi]
- An Abnormal Area Scanning for Scalable and Energy-Efficient and Secure SensorNet ManagementHayoung Oh, Kijoon Chae. 592-596 [doi]
- Development of Telemedicine and Telecare over Wireless Sensor NetworkShuo-Jen Hsu, Hsin-Hsien Wu, Shih-Wei Chen, Tsang-Chi Liu, Wen-Tzeng Huang, Yuan-Jen Chang, Chin-Hsing Chen, You-Yin Chen. 597-604 [doi]