Abstract is missing.
- Preface [doi]
- Copyright [doi]
- Title Page [doi]
- Future Technological Challenges for High Performance ComputersTadashi Watanabe. 2 [doi]
- An Agile Programming Model for Grid End UsersZhiwei Xu, Chengchun Shu, Haiyan Yu, Haozhi Liu. 3-7 [doi]
- Scalable and Practical Nonblocking Switching Networks (Extended Abstract)S. Q. Zheng. 8-10 [doi]
- Rearrangeability of the Tandem Cascade of Banyan-type NetworksXuesong Tan, Shuo-Yen Robert Li, Yuxiu Shen. 11-15 [doi]
- ReCord: A Distributed Hash Table with Recursive StructureJianyang Zeng, Wen-Jing Hsu. 16-20 [doi]
- The Topological Properties and Network Embedding of RP(k)Fang ai Liu, Liancheng Xu. 21-25 [doi]
- Theory on Switch Preservation under 2-stage InterconnectionShuo-Yen Robert Li, Xuesong Tan. 26-30 [doi]
- A Reconfigurable Optical Interconnect System for DSAGLei Li, Zheng Cao, Mingyu Chen, Jianping Fan. 31-34 [doi]
- Loop Parallelisation for the Jikes RVMJisheng Zhao, Ian Rogers, Chris C. Kirkham, Ian Watson. 35-39 [doi]
- Eliminating Inter-Thread Interference in Register File for SMT ProcessorsHua Yang, Gang Cui, Xiaozong Yang. 40-45 [doi]
- Two-Path Limited Speculation Method for Static/Dynamic Optimization in Multithreaded SystemsTakashi Yokota, Moriyuki Saito, Fumihito Furukawa, Kanemitsu Ootsu, Takanobu Baba. 46-50 [doi]
- A New Way to High Performance NFS for ClustersRongfeng Tang, Jin Xiong, Jie Ma, Dan Meng. 51-55 [doi]
- A Hybrid Parallel Loop Scheduling Scheme on Heterogeneous PC ClustersWen-Chung Shih, Chao-Tung Yang, Ping-I Chen, Shian-Shyong Tseng. 56-58 [doi]
- Table-Driven Code OptimizerSung-Lim Yun, Se Man Oh. 59-64 [doi]
- A Voronoi-Trajectory Based Hybrid Routing (VTBR) Algorithm for Wireless Ad Hoc Networks with ObstaclesWu Di, Qu Yan, Chi Zhongxian. 65-69 [doi]
- A Communication-Induced Checkpointing and Asynchronous Recovery Protocol for Mobile Computing SystemsTongchit Tantikul, D. Manivannan. 70-74 [doi]
- An Efficient Distributed Broadcasting Algorithm forWireless Ad Hoc NetworksYamin Li, Shietung Peng, Wanming Chu. 75-79 [doi]
- A Ring Removal Movement-Based Mobility Location Update SchemeYaqin Yang, JinCai Yang, Jiwei Cao. 80-84 [doi]
- Monte Carlo Simulation of LEACH Protocol for Wireless Sensor NetworksYing Wang, Mudi Xiong. 85-88 [doi]
- A Scalable Security Architecture for GridQuan Zhou, Geng Yang, Jiangang Shen, Chunming Rong. 89-93 [doi]
- Design and Implementation of Grid Monitoring System Based on GMAJianwei Liao, Hongbin Cai, Pandeng Jiang, Meirong Chen. 94-96 [doi]
- A Resource Price-adjusting Mechanism for Supply and Demand Balance in Grid ComputingLulai Yuan, Guosun Zeng, Xiongwei Mao. 97-99 [doi]
- Heterogeneous Resource Selection with Portfolio Optimization in Grid EconomyYu Hua, Chanle Wu, Huyin Zhang, Libing Wu. 100-102 [doi]
- WGMDS: A WSRF-Compliant Information Service on Wireless GridsJianghu Yang, Ming Li, Changlai Huang, Chuanshan Gao. 103-105 [doi]
- A Novel Security Model Based on Virtual Organization for GridXiuying Wu, Geng Yang, Jiangang Shen, Quan Zhou. 106-109 [doi]
- A Simple Process Calculus for the analysis of Security ProtocolsYonggen Gu, Yuxi Fu, Guoqiang Li. 110-114 [doi]
- D-S Evidence Theory and its Data Fusion Application in Intrusion DetectionJunfeng Tian, Weidong Zhao, Ruizhong Du, Zhe Zhang. 115-119 [doi]
- Efficient Traitor Tracing Scheme Based On NTRUXixiang Lv, Bo Yang, Changxing Pei. 120-124 [doi]
- A Study of Intrusion Signature Based on HoneypotJunfeng Tian, Jian-ling Wang, Xiao-hui Yang, Ren-ling Li. 125-129 [doi]
- The Architecture of the Large-scale Distributed Intrusion Detection SystemYonggang Chu, Jun Li, Yixian Yang. 130-133 [doi]
- Active Probe of Available Bandwidth: Analysis and ImprovementChanghua Zhu, Changxing Pei, Yunhui Yi, Dongxiao Quan. 134-138 [doi]
- CISOQ: A Practical High-Performance Packet Switch Architecture for the Support of Multicast TrafficXiming Hu, Jing Qu, Binqiang Wang, Xiaobei Li. 139-143 [doi]
- Overlay Multicasting over Multihomed ProxieXiao Chen, Ruijun Yang, Qi Xia, Weinong Wang. 144-148 [doi]
- Research on New Types of Network ArchitectureYan Wang, Mengqin Xia, Fasheng Yi, Jiazhi Zeng. 149-153 [doi]
- Study on Network Topology Visualization Algorithm and Implement Based on A AlgorithmWei Yuan, Changxing Pei, Haiyun Xiao, Changhua Zhu, Nan Chen, Yunhui Yi. 154-157 [doi]
- Construction of a Prototype of a Volume Communications EnvironmentMasahiro Watanabe, Motoi Okuda, Teruo Matsuzawa. 158-162 [doi]
- VoD Service Model and Performance Evaluation on the China s High Performance Broadband Information Network (3Tnet)Feng Lin, Xin Wang, Xiangyang Xue. 163-167 [doi]
- Detecting BGP Misconfiguration for BGP/MPLS VPNsHaiYing Liang, Guowen Teng, Hongjun Wang, Yuan Gao. 168-170 [doi]
- A New Tunnel Scheme for Multimedia Communications Traversing NAT/Firewall in NGNGengsheng Zheng, Zhiping Xie, Bo Wang, Guiming He. 171-173 [doi]
- Study of Channel Characteristics of Power Line Communications NetworksZhai Mingyue, Liu Chunying, Bi Haiying. 174-176 [doi]
- The maximal rates of more general complex orthogonal designsHaibin Kan, Hong Shen. 177-180 [doi]
- Research on Multi-constrained QoS Routing Scheme Using Mean Field AnnealingLianggui Liu, Guangzeng Feng. 181-185 [doi]
- Data Dissemination Model for Location-Based ServicesKwangJin Park, MoonBae Song, Ki-Sik Kong. 186-190 [doi]
- A Cluster-Based Energy-Efficient Scheme for Sensor NetworksJian Zhang, Benxiong Huang, Lai Tu, Fan Zhang. 191-195 [doi]
- RandomWalk Routing for Wireless Sensor NetworksHui Tian, Hong Shen, Teruo Matsuzawa. 196-200 [doi]
- Secure Protocols Enhancement Based on Radio-propagation Related Looser Assumptions in Mobile Ad hoc NetworksRuijun Yang, Qi Xia, Weinong Wang, Qunhua Pan, Xinli Huang, Minglu Li. 201-204 [doi]
- Dynamic Shared Path Protection Algorithm in WDM Mesh Networks under Service Level Agreement ConstraintsRongxi He, Bin Lin, Lemin Li, Chen Gu. 205-209 [doi]
- A Unified Framing Protocol for Hybrid Data TransportZhanqi Xu, Chunting Wang, Changxin Pei, Aijun Wen. 210-214 [doi]
- On-Line Routing in WDM-TDM Switched Optical Mesh NetworksArun Vishwanath, Weifa Liang. 215-219 [doi]
- Wavelength Assignment for Parallel FFT Communication Pattern on Linear Arrays by Lattice EmbeddingYawen Chen, Hong Shen. 220-224 [doi]
- Splitter Placement Problem on Directed Fiber TreesTian Hu, Bao-hua Zhao. 225-228 [doi]
- On the Effectiveness of multi-similarity for early detection of wormsHui He, Mingzeng Hu, Hongli Zhang, Zhenjiang Tang. 229-233 [doi]
- Intrusion Detection Based on An Improved ART2 Neural NetworkWu Di, Dai Ji, Chi Zhongxian. 234-238 [doi]
- Privacy Preserving ID3 Algorithm over Horizontally Partitioned DataMingjun Xiao, Liusheng Huang, Yonglong Luo, Hong Shen. 239-243 [doi]
- Computing the Reliability for Clustered Ad Hoc NetworksWu Di, Li Qing, Chi Zhongxian. 244-246 [doi]
- A Disaster Recovery System Model in an E-government SystemKun Wang, Lihua Zhou, Zhen Cai, Zengxin Li. 247-250 [doi]
- Trusted Computing-Based Security Architecture For 4G Mobile NetworksYu Zheng, Dake He, Weichi Yu, Xiaohu Tang. 251-255 [doi]
- Intrusion Detection Combining Multiple Decision Trees by Fuzzy logicJunfeng Tian, Yue Fu, Ying Xu, Jian-ling Wang. 256-258 [doi]
- A New Approach to Automatically Detect WormsPing Wang, Binxing Fang, Xiao-chun Yun. 259-263 [doi]
- Optimization of Intrusion Detection through Fast Hybrid Feature SelectionKhaja Mohammad Shazzad, Jong Sou Park. 264-267 [doi]
- An Efficient Keys Agreement for Multi-party s CommunicationZhang Peng, Ye Chengqing, Li Xin, Ma Xuying. 267-269 [doi]
- Worm Detection in Large Scale Network by TrafficYi Xin, Binxing Fang, Xiao-chun Yun, Hai-Yong Chen. 270-273 [doi]
- Adaptive Carrier Sensing and Packet Sending - An Alternative to Boost the Performance in Directional CommunicationsJacir Luiz Bordim, T. Hunziker, Koji Nakano. 274-279 [doi]
- An Efficient Key Management Scheme for Secure Sensor NetworksRuiYing Du, HuiJuan Tu, Wen Song. 279-283 [doi]
- Design and Analysis of High Speed WLAN Systems with Adaptive Margin TechnologyXiaohui Li, Naian Liu, Changxing Pei, Kechu Yi, Weidong Kou. 284-287 [doi]
- An Efficient Topology Maintenance Algorithm Based on Shortest Path Tree for Wireless Sensor NetworksZhong Shen, Yilin Chang, Xin Zhang, Can Cui. 288-292 [doi]
- Delay Character of a Novel Architecture for IEEE 802.16 SystemsNaian Liu, Xiaohui Li, Changxing Pei, Bo Yang. 293-296 [doi]
- Developing context-aware applications in ubiquitous computing environmentsJie Sun, Zhaohui Wu. 297-301 [doi]
- Reconfigurable Computing in Ubiquitous Computers: A RoadmapLu Yan, Zheng Liang. 302-305 [doi]
- Design of a Security Management Middleware in Ubiquitous Computing EnvironmentsZhefan Jiang, Kanghee Lee, Sangok Kim, Hyunchul Bae, Sangwook Kim, Soongju Kang. 306-308 [doi]
- An adaptable software architecture based on mobile components in pervasive computingSongqiao Han, Shensheng Zhang, Yong Zhang, Change Fan. 309-311 [doi]
- On-chip Debug for an Asynchronous Java AcceleratorZheng Liang, Juha Plosila, Lu Yan, Kaisa Sere. 312-315 [doi]
- Design of Virtual Personal Computing Environment for Ubiquitous ComputingXiaoli Su, Faqiong Jiang, Hongzhou Shi, Zhenmin Zhu, Jintao Li. 316-319 [doi]
- Web Media Service based on Streaming Player supporting ubiquitous environmentSangok Kim, Kanghee Lee, Zhefan Jiang, Sangwook Kim. 320-322 [doi]
- Design and Implementation of A Script Language Based On-Demand Service FrameworkZhenchun Huang, He Chuan. 323-327 [doi]
- Integration and Share of Spatial Data Based on Web ServiceXiang Ma, Qunhua Pan, Minglu Li. 328-332 [doi]
- Ontology-Based 3d Body Scanning Data Sharing SystemZhu Xinjuan, Zhang Xin. 333-335 [doi]
- Optimal Selection of Web Services for Composition Based on Interface-Matching and Weighted Multistage GraphYan Gao, Bin Zhang, Jun Na, Lei Yang, Yu Dai, Qiang Gong. 336-338 [doi]
- Research on Improved Role Hierarchy Model in Extended Organization PKI NetworksShaomin Zhang, Baoyi Wang. 339-342 [doi]
- Performance Comparison between VOPP and MPIZhiyi Huang, Martin K. Purvis, Paul Werstein. 343-347 [doi]
- Simulating and Improving Probabilistic Packet Marking Schemes Using Ns2Qiang Li, Hongzi Zhu, Meng Zhang, Jiubin Ju. 348-352 [doi]
- Research on the Performance Analysis of the Concurrent SystemJin Guo, Mingyuan Liu, Lifang Liu. 353-355 [doi]
- Component based performance prediction for network processor based systemHong Xiao, Ling Zhang, Di Wu. 356-358 [doi]
- Simulation-Based Optimization Strategy for Liquid Fueled Multi-stage Space Launch VehicleSaqlain Akhtar, He Linshu. 359-365 [doi]
- Wrapping Client-Server Application to Web Services for Internet ComputingHe Guo, Chunyan Guo, Feng Chen, Hongji Yang. 366-370 [doi]
- A New Algorithm to Solve Synchronous Consensus for Dependent FailuresJun Wang, Min Song. 371-375 [doi]
- An Efficient Asynchronous Proactive RSA SchemeRuishan Zhang, Kefei Chen. 376-380 [doi]
- An Efficient Group Key Management Scheme: Link Tree ProtocolZhang Jun, Fanyuan Ma, Gu Dawu, Yingcai Bai. 381-385 [doi]
- Fast Two Phrases PPM for IP TracebackQiang Li, Qinyuan Feng, Liang Hu, Jiubin Ju. 386-389 [doi]
- Workflow-based Remote-Sensing Image Processing Application in ImageGridRan Zheng, Hai Jin, Qin Zhang, Ying Li. 390-394 [doi]
- JSChord: A Peer-to-Peer System to Achieve Max ThroughputYifeng Shao, Feng Hong, Minglu Li. 395-399 [doi]
- An Adaptive Advance Reservation Mechanism for Grid ComputingLibing Wu, Jianbing Xing, Chanle Wu, Jianqun Cui. 400-403 [doi]
- Dynamic Role and Context-Based Access Control for Grid ApplicationsHanbing Yao, Heping Hu, Baohua Huang, Ruixuan Li. 404-406 [doi]
- Integrating Agent and Web Service into Grid Service Workflow SystemZhengli Zhai, Yang Yang, Wencai Guo, Zhimin Tian. 407-410 [doi]
- Role Based Platform Independent Web Application ModelingChengwan He, Wenjie Tu, Keqing He. 411-415 [doi]
- Chocolat/SMV: A Translator from CafeOBJ into SMVKazuhiro Ogata, Masahiro Nakano, Masaki Nakamura, Kokichi Futatsugi. 416-420 [doi]
- Formal Description and Complexity Analysis of Routing in Mobile Ad Hoc SystemJinkui Xie, Linpeng Huang. 421-423 [doi]
- Coalgebraic Component Specification and Verification in RSLSun Meng, Bernhard K. Aichernig, Zhang Naixiao. 424-426 [doi]
- Software Component Model for Network Processor Based SystemHong Xiao, Ling Zhang, Di Wu. 427-429 [doi]
- A Segment-based Approach of Defending Against Buffer Overflow AttacksYu-an Tan, Ji-yan Zheng, Yuan-da Cao. 430-433 [doi]
- An OO-based Design Model of Software AgentJianxing Li, XinJun Mao, Yao Shu. 434-440 [doi]
- A Novel Peer-to-Peer Intrusion Detection SystemKun Xiao, Ji Zheng, Xin Wang, Xiangyang Xue. 441-445 [doi]
- A Survey of Mobile Agent-Based Fault-Tolerant TechnologyWenyu Qu, Hong Shen, Xavier Défago. 446-450 [doi]
- Agent-Oriented Early Requirement Analysis of Distributed Simulation Environment of Fluid FlowJianxing Li, Zhichang Qi, Zuobin Chen. 451-455 [doi]
- Research of Multi-Agent System Model and Learning MethodYong-mei Zhang, Yan Han. 456-460 [doi]
- How the Enterprise Choosing Strategic Action: Modeling, Algorithm and SimulationYalin Chen, Xianjia Wang, Guangmin Wang. 461-465 [doi]
- An Asynchronous Event Relation Model for Monitoring Distributed SystemMing Chen, Benting Wan. 466-470 [doi]
- A Distributed Architecture for Network Performance Measurement and Evaluation SystemHongjie Sun, Binxing Fang, Hongli Zhang. 471-475 [doi]
- A Study of Parallel Prefetching Algorithms Using Trace-Driven SimulationDingqing Hu, Changsheng Xie, Bin Cai. 476-478 [doi]
- Performance Evaluation of SLIM and DRBL Diskless PC Clusters on Fedora Core 3Chao-Tung Yang, Ping-I Chen, Ya-Ling Chen. 479-482 [doi]
- Access Control List Mediation System for Large-Scale NetworkKanghee Lee, Zhefan Jiang, Sangok Kim, Sangwook Kim, Sunkyung Kim. 483-487 [doi]
- An Efficient Protocol for the Problem of Secure Two-party Vector DominanceYingpeng Sang, Hong Shen, Zonghua Zhang. 488-492 [doi]
- A Brief Comparative Study on Analytical Models of Computer System Dependability and SecurityZonghua Zhang, Hong Shen, Xavier Défago, Yingpeng Sang. 493-497 [doi]
- Fault-Tolerance Schemes for Hierarchical Mesh NetworksJason Zurawski, Dajin Wang. 498-502 [doi]
- Enhancing Attack Survivability of Gnutella-like P2P Networks by Targeted Immunization SchemeXinli Huang, Yin Li, Ruijun Yang, Fanyuan Ma. 503-506 [doi]
- JSGrid: An Environment for Heterogenous Cluster ComputingKazuhiro Takeda, Satoshi Ono, Christopher J. Ashley, Shigeru Nakayama. 507-512 [doi]
- A Scheduling Method for Divisible Workload Problem in Grid EnvironmentsNguyen The Loc, Said Elnaffar, Takuya Katayama, Tu Bao Ho. 513-517 [doi]
- Design and Implementation of TIGER Grid: an Integrated Metropolitan-Scale Grid EnvironmentChao-Tung Yang, Kuan-Ching Li, Wen-Chung Chiang, Po-Chi Shih. 518-520 [doi]
- A Run-Time Scheduling Policy for Dependent Tasks in Grid Computing SystemsHui Jin, Yanxiang He, Weidong Wen, Haowen Liu. 521-523 [doi]
- Integration Patterns of Grid Security ServiceXiangli Qu, Xuejun Yang, Jingwei Zhong, Xuefeng Lv. 524-528 [doi]
- MAS organization: design, enforcement and instantiationYe Chun, Xie Ke-fan, Chen Ya-lin, Wang Xian-jia. 529-532 [doi]
- Incentives for Participating in a Hybrid Peer-to-Peer SystemGuangzhong Sun, Guoliang Chen, Junmin Wu. 533-536 [doi]
- Development of an Internet Home Automation System using Java and Dynamic DNS ServiceXimin Zhang, Junding Sun, Lihua Zhou. 537-539 [doi]
- Remote Monitoring of Air-Quality over InternetWang Huiran, Ma Ruifang. 540-542 [doi]
- Using Semantic Web Technologies to Specify Constraints of RBACDi Wu, Jian Lin, Yabo Dong, Miaoliang Zhu. 543-545 [doi]
- Verifying Web Services Composition: A Transformation-Based ApproachYanping Yang, Qingping Tan, Yong Xiao, Jinshan Yu, Feng Liu. 546-548 [doi]
- A Case of Application-level Multicast for Real-time Video Delivery over InternetZhensheng Liu, Guiming He. 549-552 [doi]
- A Study of Distributed Parallel Processing for Queen Ant Strategy in Ant Colony OptimizationIchiro Iimura, Koji Hamaguchi, Toshiya Ito, Shigeru Nakayama. 553-557 [doi]
- How to build bargaining agents in the e-commerce modeling and analysisYalin Chen, Xianjia Wang, Ye Chun, Wenqi Zhu. 558-562 [doi]
- Multi-agent-oriented Modeling for Intelligence Reconnaissance SystemXiong Li, Xiaobin Liu, Na Hao. 563-565 [doi]
- describer: Service-Oriented Multiagent Architecture for Mobile EnvironmentZhiqiang Liu, Dong Wang, Huanye Sheng. 566-568 [doi]
- A Layered Resource Management Model in P2P SystemWang Dan, Zhao Rongjuan. 569-572 [doi]
- Collaborative MPEG-4 Contents Authoring, Presentation and Interaction in a Mobile EnvironmentSongLu Li, Sangwook Kim, Sunkyung Kim. 573-577 [doi]
- A systems programming language for wireless networked embedded systemsXiaohua Luo, Kougen Zheng, Zhaohui Wu, Yunhe Pan. 578-582 [doi]
- A Message-based Software Architecture Style for Distributed ApplicationGuozhen Tan, Xinpeng Li, Jiankun Wu, Hongzhuo Zhao, Chengxu Li. 583-585 [doi]
- An ECA Rules Based Middleware Architecture for Wireless Sensor NetworksChongqing Zhang, Minglu Li, Qunhua Pan. 586-588 [doi]
- Design anKaibod Implementation of a Distributed Simulation System of 3D SightsJin-lian Du, Chun-shang Tian. 589-593 [doi]
- Simulating Large-Scale Traffic Aggregation in an Automatic Switched Optical NetworkHua Wang, Xin Wang, Xiangyang Xue. 594-597 [doi]
- Multi-Session Partitioning for Parallel Timing OptimizationJiyoun Kim, José Neves, Marios C. Papaefthymiou. 598-602 [doi]
- An O(1) Time Parallel Algorithm for the Dominance Counting and 3D Block-Based Medial Axis Transform on AROBShih-Ying Lin, Shi-Jinn Horng, Tzong-Wann Kao, Yuh-Rau Wang. 603-609 [doi]
- Optimal Routing in a Small-World NetworkJianyang Zeng, Wen-Jing Hsu. 610-614 [doi]
- A Distributed Self-Stabilizing Algorithm for Finding a Connected Dominating Set in a GraphAnkur Jain, Arobinda Gupta. 615-619 [doi]
- Efficiency of Local Genetic Algorithm in Parallel ProcessingGang Peng, Ichiro Iimura, Takeshi Nakatsuru, Shigeru Nakayama. 620-623 [doi]
- Some New Parallel Fast Fourier Transform AlgorithmsZhong Cui-xiang, Han Guo-qiang, Huang Ming-he. 624-628 [doi]
- GLB-DMECR: Geographic Location-Based Decentralized Minimum Energy Consumption Routing in Wireless Sensor NetworksHuifeng Hou, Xiangwen Liu, Hongyi Yu, Hanying Hu. 629-633 [doi]
- Energy Adaptive Cluster-Head Selection for Wireless Sensor NetworksYing Liang, Haibin Yu. 634-638 [doi]
- Comparative Analysis of Scheduling Algorithms in Ad Hoc Mobile NetworkingHeng Xu, Xin Wang, C. K. Toh. 639-643 [doi]
- Research of TCP Vegas Congestion Control Algorithm in Ad Hoc NetworksChangqing Gong, Zhigang Zhao, Guangxing Wang. 644-648 [doi]
- Coverage and Energy Efficient Information Gathering Protocol in Wireless Sensor NetworksXiangwen Liu, Huifeng Hou, Jinya Yang, Hongyi Yu, Hanying Hu. 649-654 [doi]
- LRC-RED: A Self-tuning Robust and Adaptive AQM SchemeNaixue Xiong, Yan Yang, Xavier Défago, Yanxiang He. 655-659 [doi]
- Approximating Spanning Trees with Inner Nodes CostRudolf Fleischer, Qi Ge, Jian Li, Shijun Tian, Haitao Wang. 660-664 [doi]
- A Recursion Nearness Based Method for Characterizing IP AddressWei Ren, Hai Jin. 665-669 [doi]
- Mapping Resources for Network Emulation with Heuristic and Genetic AlgorithmsYi Liu, Yanping Li, Kaiping Xiao, Huali Cui. 670-674 [doi]
- Accurate DCA Algorithm for TCP Congestion AvoidanceMengqin Xia, Fasheng Yi, Yan Wang, Jiazhi Zeng. 675-678 [doi]
- AVS Generic Audio CodingRuimin Hu, Shuixian Chen, Haojun Ai, Naixue Xiong. 679-683 [doi]
- New Ray-Space Interpolation Method For Free Viewpoint Video SystemLiangzhong Fan, Mei Yu, Gangyi Jiang, Rangding Wang, Yong-Deak Kim. 684-688 [doi]
- A Watermarking Method Using Quantization and Statistical Characteristics of Wavelet TransformKeunDuck Byun, Sangjin Lee, HyungJun Kim. 689-693 [doi]
- New Multiple Description Layered Coding Method For Video CommunicationMei Yu, Xien Ye, Rangding Wang, Fangming Xiao, Gangyi Jiang. 694-697 [doi]
- A QoS Multicast Routing Algorithm Based on Shrinking-chaotic-mutation Evolutionary Algorithm in IP/DWDM Optical InternetXingwei Wang, Pengcheng Liu, Min Huang. 698-702 [doi]
- A Distributed Entropy-Based QoS Multicast Routing Optimization Algorithm for MANETChao Gui, Baolin Sun. 703-707 [doi]
- A Strategy for Routing Messages Between Elements in a Hypercube with Faulty LinksDinko Gichev. 708-710 [doi]
- An On-line Integrated Routing Algorithm in IP/MPLS over WDM NetworksYang Su, Zhanqi Xu, Zengji Liu. 711-713 [doi]
- A New Routing Method to Tolerate both Convex and ConcaveHuaxi Gu, Zengji Liu, Guochang Kang, Hong Shen. 714-719 [doi]
- A Dual-Channel Routing Scheme in Ad Hoc NetworksQinghui Wang, Junsuo Sun, Guangxing Wang. 720-722 [doi]
- A Hybrid Intelligent QoS Multicast Routing Algorithm in NGIJunwei Wang, Xingwei Wang, Min Huang. 723-727 [doi]
- Research of Multicast Server Selection Based on Ant AlgorithmYuhua Liu, Jiwei Cao, Liansheng Tan, Kaihua Xu. 728-732 [doi]
- Aggregation Tree Routing Algorithm for Dynamic Topology in Large Scale NetworksGuozhen Tan, Ningning Han, Yi Liu, Hengwei Yao, Dong Li. 733-735 [doi]
- Solving the Vehicle Routing Problem with Stochastic Demands and CustomersFuCe FuCe, Wang Hui, ZhuLi Ying. 736-739 [doi]
- Encoding a Binary Search Tree in Constant Time on BSRLimin Xiang, Kai Cheng, Kazuo Ushijima. 740-744 [doi]
- Parallel Downloading Algorithm for Large-volume File DistributionHaitao Chen, Zhenghu Gong, Zunguo Huang. 745-749 [doi]
- Localized Algorithm for Coverage in Wireless Sensor NetworksHongli Xu, Liusheng Huang, Yingyu Wan, Kezhong Lu. 750-754 [doi]
- Spatial Gossip on the Percolation ModelQi Xia, Ruijun Yang, Weinong Wang. 755-758 [doi]
- An Agent-Based Deadlock Detection/Resolution Algorithm for the AND ModelXin Cheng, Xiaozong Yang, Feng Jin. 759-761 [doi]
- Ubicast: An Enhanced Application-Level Multicast ProtocolZi Chu, Yin-yin Yang, Hao Tu, Wei-ning Kong. 762-767 [doi]
- Towards Efficient and Scalable Searches for Mass-Market, Decentralized File-Sharing ApplicationsXinli Huang, Yin Li, Fei Liu, Fanyuan Ma. 768-772 [doi]
- Evolutionary Multiobjective Optimization in Engineering Management: An Empirical Study on Bridge Deck RehabilitationChunlu Liu. 773-777 [doi]
- Evaluation of Network Interface Controller on DIMMnet-2 Prototype BoardAkira Kitamura, Yasuo Miyabe, Tetsu Izawa, Tomotaka Miyashiro, Konosuke Watanabe, Tomohiro Otsuka, Hideharu Amano, Yoshihiro Hamada, Noboru Tanabe, Hironori Nakajo. 778-780 [doi]
- AMS Based Reconstruction Algorithm with Two-dimensional Threshold for IP TracebackXueqin Yang, Changxing Pei, Changhua Zhu, Yan Li. 781-783 [doi]
- Development of the real-time visualization system on networkHiroshi Oiwa, Hiroyuki Matsumoto, Teruo Matsuzawa, Yoshinobu Asano. 784-786 [doi]
- Structural Analysis Based on Baseline in Printed Mathematical ExpressionsXuedong Tian, Haoxin Fan. 787-790 [doi]
- Ontology-Based Clustering and Routing in Peer-to-Peer NetworksJuan Li, Son T. Vuong. 791-795 [doi]
- A P2P Based Personal Digital Library for CommunityYanfei Xu. 796-800 [doi]
- A Novel Incentive Mechanism for P2P SystemsTao Wang, Xianliang Lu, Meng-shu Hou. 801-803 [doi]
- Research on Collaborative Service Solution in Ubiquitous Learning EnvironmentGuozhen Zhang, Qun Jin. 804-806 [doi]
- An Improved P2P Model Based on ChordYu Dan, Chen XinMeng, Chang YunLei. 807-811 [doi]
- Audio Watermarking Algorithm Based on Wavelet Packet and Psychoacoustic ModelWang Rang-Ding, Xu Da-Wen, Li Qian. 812-814 [doi]
- An improved Basic-Unit Layer Rate-Control Scheme on H.264Shuguang Su, Shengsheng Yu, Jingli Zhou. 815-819 [doi]
- Performance Study of Nonrigid Registration Algorithm for Investigating Lung Disease on ClustersFumihiko Ino, Yuya Tanaka, Kenichi Hagihara, Hiroko Kitaoka. 820-825 [doi]
- A New Adaptive Multistage Median FilterSong Huan-sheng, Wang Guo-qiang, Zhao Xiang-mo. 826-828 [doi]
- Gabor Filterbank and Its Application in the Fingerprint Texture AnalysisYang Xu, Xuedong Zhang. 829-831 [doi]
- Iris Image Denoising Algorithm Based on Phase PreservingJian-Ming Wang, Run-tao Ding. 832-835 [doi]
- A Novel High Gray Scale Data Driver for Passive Matrix OLED DisplaysHong-Jae Shin, Sun-Bo Woo, Seung-Jun Shin, Kae-Dal Kwack, Tae-Whan Kim. 836-839 [doi]
- AnchorClu: An Anchorperson Shot Detection Method Based on ClusteringXi-Dao Luan, Yu-Xiang Xie, Ling-Da Wu, Jun Wen, Song-Yang Lao. 840-844 [doi]
- An Approach to Image Retrieval Based on Concept Lattices and Rough Set TheoryMing Li, Tong Wang. 845-849 [doi]
- Number and Letter Character Recognition of Vehicle License Plate Based on Edge Hausdorff DistanceShuang-tong Tang, Wen-ju Li. 850-852 [doi]
- Residual Texture Based Fast Block-Size Selection for Inter-Frame Coding in H.264/AVCZhengning Wang, Qiang Peng, Yong Zeng. 853-855 [doi]
- Stereo Correspondence Using Color Based on Competitive-cooperative Neural NetworksXijun Hua, Masahiro Yokomichi, Michio Kono. 856-860 [doi]
- Design and Implementation of a WBEM Disk Array ProviderYu-an Tan, Hong Deng, Guo-min Lin, Xue-lan Zhang. 861-865 [doi]
- Symmetry and AutobisimulationJianmin Jiang, Jinzhao Wu. 866-870 [doi]
- Authentication with controlled anonymity in P2P systemsAdam Wierzbicki, Aneta Zwierko, Zbigniew Kotulski. 871-875 [doi]
- A Kind of Negotiation Policy for Resource Allocation in Distributed Manufacturing EnvironmentCixing Lv, Yunlong Zhu, Chaowan Yin. 876-879 [doi]
- A Model for NP-based Application DesignShan Zheng, Zhao Rong-cai, Xie Kang-min. 880-883 [doi]
- A New Algorithm for Partner Selection in Virtual EnterpriseZhibin Zeng, Yan Li, Shujuan Li, Wenxing Zhu. 884-886 [doi]
- A Distributed and Cooperative Target Localization Algorithm in Wireless Sensor NetworksXing-yu Pi, Hong-Yi Yu. 887-889 [doi]
- A New Network Management Framework Design and Application RealizationLi Jing-hua, Xu Guang-hui. 890-894 [doi]
- Event Driven RFID Reader for Warehouse ManagementYang Dayu, Zou Peng. 895-899 [doi]
- ARV-based Array Grouping and Data Distribution in OpenMP/JIAJIAZeng Lifang, Yang Xuejun, Huang Chun. 900-903 [doi]
- Attribute value reduction in variable precision rough setNian Fu-zhong, Li Ming. 904-906 [doi]
- A Window-based Algorithm for Skyline QueriesJing Yu, Xin Liu, Guo-hua Liu. 907-909 [doi]
- Quantitative Association Rules Mining Methods with Privacy-preservingZi-Yang Chen, Guo-hua Liu. 910-912 [doi]
- A Novel Text Classification Algorithm Based on Naïve Bayes and KL-DivergenceBaoyi Wang, Shaomin Zhang. 913-915 [doi]
- Web Document Classification Based on Extended Rough setGaoxiang Yi, Heping Hu, Zhengding Lu. 916-919 [doi]
- Genetic Algorithms for Solving Linear Bilevel ProgrammingWang Guang-Min, Wan Zhong-Ping, Wang Xian-jia, Chen Ya-lin. 920-924 [doi]
- A Genetic Algorithm Optimized New Structured Neural Network for Multistage Decision-Making ProblemLei Yang, Yu Dai, Bin Zhang, Yan Gao. 925-929 [doi]
- Intelligent Compaction Control Based on Fuzzy Neural NetworkYongfeng Ju, Guangfeng Lin, Yindi Fan, Zongyi Liu. 930-934 [doi]
- A Novel Genetic Algorithm for HP Model Protein FoldingJie Song, Jiaxing Cheng, Tingting Zheng, Junjun Mao. 935-937 [doi]
- An Improved Genetic Algorithm For Multi-Objective OptimizationFu Lin, Guiming He. 938-940 [doi]
- A Coevolutionary Model Based on Dynamic Combination of Genetic Algorithm and Ant Colony AlgorithmMing Chen, Qiang Lu. 941-944 [doi]
- Digital Modulation Identification Based on Software Radio PlatformJian Chen, Yonghong Kuo, Fenglin Fu, Chao Li, Jiandong Li. 945-949 [doi]
- Parallel Algorithm for Computing Reversal DistanceYi-Fei Shen, Guo-Liang Chen. 950-953 [doi]
- Solving Very Large Traveling Salesman Problems by SOM Parallelization on Cluster ArchitecturesHannes Schabauer, Erich Schikuta, Thomas Weishäupl. 954-958 [doi]
- Network Optimized by K-L Transform for Digital Modulation IdentificationYonghong Kuo, Jian Chen, Xiaohua Tan. 959-961 [doi]
- Prediction of Chaotic Time Series Using LS-SVM with Automatic Parameter SelectionXiaodong Wang, Haoran Zhang, Changjiang Zhang, Xiushan Cai, Jin Wang, Jinshan Wang. 962-965 [doi]
- Scalable Parallel Quadrilateral Mesh Generation Coupled with Mesh PartitioningJianjun Chen 0002, Yao Zheng, Xia Ning. 966-970 [doi]
- An Efficient Multiple-Precision Division AlgorithmLiusheng Huang, Hong Zhong, Hong Shen, Yonglong Luo. 971-974 [doi]
- A High-Throughput Fibre Channel Data Communication ServiceYu-an Tan, Jing Jin, Yuan-da Cao, Li-gu Zhu. 975-978 [doi]
- Solution to Multi-objective Fuzzy Optimization Dynamic Programming with Uncertain InformationYingwei Jin, Hong Shen, Keqiu Li, Zhongxian Chi. 979-984 [doi]
- A New Solution to Non-structural System Group Decision-making ProblemsYingwei Jin, Hong Shen, Keqiu Li, Zhongxian Chi. 985-988 [doi]
- Fluid-structure Interaction Within 3-layered Aortic Arch Model under Pulsatile Blood FlowFeng Gao, Masahiro Watanabe, Teruo Matsuzawa. 989-992 [doi]
- The Calculational Method for Spectrogram and Variance-Length Curve of Yarn Based on Multiresolution AnalysisMa Jun, N. A. Korobov. 993-996 [doi]
- Constructing SVK_Lattices from Cyclic BasesWeichi Yu, Yu Zheng, Dake He. 997-1001 [doi]
- Hamiltonian-like Properties of k-Ary n-CubesDeqiang Wang, Mingyang Pan, Tong An, Kelun Wang, Shuyan Qu. 1002-1007 [doi]
- Embedding Paths of Different Lengths into Crossed CubesJianxi Fan, Xiaola Lin, Xiaohua Jia. 1008-1012 [doi]
- The Eigen-Problem In The Completely Max-AlgebraMa Jun, Gao Yan, Dai zhi yong. 1013-1016 [doi]
- Research on Application of Development Method of Knowledge Base in the Integrated System for ICADPengshou Xie, Yongping Kang, Qiuyu Zhang. 1017-1020 [doi]
- A DL-based Approach for Product Knowledge ReasoningXiangjun Fu, Shanping Li, Nizamuddin Channa. 1021-1023 [doi]
- Towards a Knowledge-Based System of Distributed ConfigurationXiangjun Fu, Shanping Li. 1024-1026 [doi]
- The Research on Decision Approach of Data Dependence in Dynamic Workflow SystemShaomin Zhang, Baoyi Wang. 1027-1029 [doi]
- Decision Tree s Pruning Algorithm Based on Deficient Data SetsZhang Yong, Chi Zhong-xian, Wang Da-gong. 1030-1032 [doi]
- Knowledge Discovery and Ontology-based services on the Grid (a survey report)Sunil Kr. Pandey, R. B. Mishra. 1033-1038 [doi]
- Perceptually Optimized Error-Resilient H.264 Video Streaming System over the Best-Effort InternetLiao Ning, Quan Zi-Yi, Men Ai-Dong. 1039-1043 [doi]
- An Automatic and Robust Algorithm for Segmentation of Three-dimensional Medical ImagesHaibo Zhang, Hong Shen, Huichuan Duan. 1044-1048 [doi]
- An Image Hiding Method Based on Correlation Analysis and Image FusionLiu Bin, Zhitang Li, Yao Li. 1049-1051 [doi]
- An Invariant Feature Representation for shape RetrievalHan ShuiHua, Yang ShuangYuan. 1052-1054 [doi]
- A New Approach of the Vehicle License Plate LocationXu Hong-ke, Yu Fu-hua, Jiao Jia-hua, Song Huan-sheng. 1055-1057 [doi]
- Toward Blind Logo Watermarking in JPEG-Compressed ImagesQing Gong, Hong Shen. 1058-1062 [doi]
- Load Balance Heuristics for Synchronous Iterative Applications on Heterogeneous Cluster SystemsWeizhe Zhang, Mingzeng Hu, Hongli Zhang. 1063-1067 [doi]
- Security-Driven Scheduling Algorithms Based on EigenTrust in GridKenli Li, Yan He, Xiaoling Liu, Ying Wang. 1068-1072 [doi]
- Gracefully Degrading Battery-Aware Static Multiprocessor Schedules Based on Symmetric Task FusionFrode Eika Sandnes, Oliver Sinnen, Yo-Ping Huang. 1073-1077 [doi]
- Using Dataflow Information to Improve Inter-Workflow Instance ConcurrencyYang Wang, Paul Lu. 1078-1082 [doi]
- A Post-Scheduling Optimization Algorithm of Distributed Real-Time TasksFang Ming, Yuan You-guang, Liang Hong-tao. 1083-1086 [doi]