Abstract is missing.
- An Intrusion Detection Architecture for Ad Hoc Network Based on Artificial Immune SystemHongxia Xie, Zhengyun Hui. 1-4 [doi]
- Conditional Fault-Tolerant Hamiltonicity of Twisted CubesJung-Sheng Fu. 5-10 [doi]
- Conditional Fault-Tolerant Hamiltonicity of Star GraphsJung-Sheng Fu. 11-16 [doi]
- Mixed Preservation of Conditionally Nonblocking Switches under 2-stage InterconnectionXuesong Tan, Shuo-Yen Robert Li. 17-22 [doi]
- Merging Source and Shared Trees Multicast in MPLS NetworksXiao-Yong Li, Xiao-lin Gui. 23-28 [doi]
- A Link Adaptation Solution to IEEE 802.16d WMANNaian Liu, Dechun Sun, Wuqiang Li, Changxing Pei. 29-32 [doi]
- On Power Lines Communications Channels Characteristics of MarkovMingyue Zhai. 33-37 [doi]
- Java Annotated Concurrency Based on the Concurrent PackageHong Zhu, Zhaolin Yin, Ying Ding. 38-43 [doi]
- A High-Efficiency Vector Interpolator Using Redundant CORDIC Arithmetic in Power-Aware 3-D Graphics RenderingTze-Yun Sung, Yaw-Shih Shieh, Chun-Wang Yu, Hsi-Chin Hsin. 44-49 [doi]
- Error-Diffusion Kernel Estimation Using Least SquaresKen-Chung Ho, Jr-Shian Juang. 50-55 [doi]
- Remote Sensing Images Classification/Data Fusion Using Distance Weighted Multiple Classifiers SystemsYu-Chang Tzeng. 56-60 [doi]
- Image Encryption and Decryption Using SCAN MethodologyChao-Shen Chen, Rong-Jian Chen. 61-66 [doi]
- Distributed Groups Mutual Exclusion Based on Clients/Servers ModelOusmane Thiare, Mourad Gueroui, Mohamed Naimi. 67-73 [doi]
- An Attribute-Based Access Control Model for Web ServicesHaibo Shen, Fan Hong. 74-79 [doi]
- Dynamic TXOP Assignment for Fairness (DTAF) in IEEE 802.11e WLAN under Heavy Load ConditionsNan Guo, Chen Chen, Changxing Pei. 80-85 [doi]
- Administrative Usage Control Model for Secure InteroperabilityFan Hong, Yongquan Cui. 86-89 [doi]
- Conditional Fault-Tolerant Cycle-Embedding of Crossed CubeHao-Shun Hung, Gen-Huey Chen, Jung-Sheng Fu. 90-95 [doi]
- Hamiltonian Connectedness of the Faulty WK-Recursive NetworkJung-Sheng Fu. 96-101 [doi]
- Cycle Embedding on Twisted CubesSun-Yuan Hsieh, Pei-Yu Yu. 102-104 [doi]
- An Efficient Assignment of Transmission Opportunity in QoS Guaranteed Wireless LANMasahiro Yamane, Shigeaki Tagashira, Satoshi Fujita. 105-108 [doi]
- K-MCore for Multicasting on Mobile Ad Hoc NetworksYamin Li, Shietung Peng, Wanming Chu. 109-114 [doi]
- Design of a Wireless Sensor Network for Detecting Occupancy of Vehicle Berth in Car ParkYing Wang, Guangrong Zhou, Tong Li. 115-118 [doi]
- A Clustering Algorithm for Time Series DataJian Yin, Duanning Zhou, Qiong-Qiong Xie. 119-122 [doi]
- A Database-Reduction-Based Algorithm for Episode MiningYunlan Wang, Xingshe Zhou, Peiqi Liu. 123-127 [doi]
- Data Mining Application to Syndrome Differentiation in Traditional Chinese MedicineWang Bo, Zhang Ming-Wei, Zhang Bin, Wei Wei-Jie. 128-131 [doi]
- An Improved Automatic MPI Code Generation Algorithm for Distributed Memory MachineXue-rong Gong, Yong-hong Sheng, Lin-sheng Lu, Ping Zhang. 132-137 [doi]
- Reverse Compilation for Speculative Parallel ThreadingXiaoqi Yang, Qilong Zheng, Guoliang Chen, Zhen Yao. 138-143 [doi]
- Prediction-Table Based Fault-Tolerant Real-Time Scheduling AlgorithmDong Liu, Chunyuan Zhang, Rui Li. 144-149 [doi]
- Stream-Based Implementation of Hash Functions for Multi-Gigabit Message Authentication CodesYu-Kuen Lai, Gregory T. Byrd. 150-155 [doi]
- Analysis of the Centralized Algorithm and the Distributed Algorithm for Parallel Packet SwitchYufeng Li, Han Qiu, Julong Lan, Jianwen Yang. 156-161 [doi]
- Server-Initiated Byzantine Agreement over Two-Level Combined Wired/Wireless NetworksChien-Fu Cheng, Shu-Ching Wang, Tyne Liang. 162-165 [doi]
- A Stable On-Demand Routing Protocol for Mobile Ad Hoc Networks with Weight-Based StrategyNen-Chung Wang, Jhu-Chan Chen. 166-169 [doi]
- Heterogeneous RSVP Extension for End-to-End QoS Support in UMTS/WLAN Interworking SystemsGwo-Chuan Lee, Long-Sheng Li, Wei-Yu Chien. 170-175 [doi]
- Reaching Byzantine Agreement in a Processor Fallible Virtual Subnet NetworkShu-Chin Wang, Kuo-Qin Yan, G. Y. Zheng, C. T. Chih. 176-179 [doi]
- A Study of Stimulative Queen Ant Strategy in Ant Colony Optimization MethodIchiro Iimura, Toshiya Ito, Shigeru Nakayama. 180-184 [doi]
- Low-Power Multiplierless 2-D DWT and IDWT Architectures Using 4-tap Daubechies FiltersTze-Yun Sung, Yaw-Shih Shieh, Chun-Wang Yu, Hsi-Chin Hsin. 185-190 [doi]
- High-Efficiency and Low-Power Architectures for 2-D DCT and IDCT Based on CORDIC RotationTze-Yun Sung, Yaw-Shih Shieh, Chun-Wang Yu, Hsi-Chin Hsin. 191-196 [doi]
- Off-Line Micro-Payment Protocol for Multiple Vendors in Mobile CommerceXiaoling Dai, Oluwatomi Ayoade, John C. Grundy. 197-202 [doi]
- Modeling Service Interactions Using Kahn Process NetworkWeishi Zhang, Xiuguo Zhang. 203-208 [doi]
- Extending Object-Oriented Middleware for Location-Aware ServicesDionisis X. Adamopoulos. 209-212 [doi]
- The Scalability of Heterogeneous Dispatcher-Based Web Server Load Balancing ArchitectureTsang-Long Pao, Jian-Bo Chen. 213-216 [doi]
- Controlling Performance of a Time-Criticial Thread in SMT Processors by Instruction Fetch PolicyCaixia Sun, Hongwei Tang, Minxuan Zhang. 217-222 [doi]
- UFCR: An Efficient I/O Method for Parallel File SystemYan-mei Huo, Jiubin Ju, Liang Hu. 223-228 [doi]
- Available Bandwidth Estimation in IEEE802.11b Network Based on Non-Intrusive MeasurementChen Chen, Changxing Pei, Liunai An. 229-233 [doi]
- Adaptive MAC Scheme Ready for Delay Assurances in Wireless NetworksFan Zhang, Benxiong Huang, Lai Tu, Jian Zhang. 234-239 [doi]
- A Zipf-Like Distribution of Popularity and Hits in the Mobile Web Pages with Short Life TimeToshihiko Yamakami. 240-243 [doi]
- A Gaming Fuzzy QoS Multicast Routing Scheme in NGIXingwei Wang, Qi Wang, Min Huang. 244-249 [doi]
- A Differential Evolution Based Flexible QoS Multicast Routing Algorithm in NGIJunwei Wang, Xingwei Wang, Pengcheng Liu, Min Huang. 250-253 [doi]
- Disjoint Paths Routing in Pancake GraphsKeiichi Kaneko, Shietung Peng. 254-259 [doi]
- Enhancing Web Services in the Framework of Service-Oriented ArchitecturesDionisis X. Adamopoulos. 260-265 [doi]
- Temporal Load-Balancing of Web-Server TrafficFrode Eika Sandnes, Yo-Ping Huang. 266-271 [doi]
- Using PVFS2 to Construct a Large File System in Data GridsChao-Tung Yang, Chien-Tung Pan, Ping-I Chen. 272-277 [doi]
- Recent Advances in Research on P2P NetworksYunfei Zhang, Changjia Chen, Xiaoping Wang. 278-284 [doi]
- A Systems Model for Computation, Communication, Command and Control (C4) in a Spacecraft or Satellite ClusterBrian J. d Auriol, Tanushree Ghosh. 285-290 [doi]
- A Generic Parallel Computing Model for the Distributed EnvironmentChi-Chang Chen, Meng-Xiang Chen. 291-294 [doi]
- A Social View on Unsolicited Bulk Email Impacts on Mobile Mail AddressesToshihiko Yamakami. 295-299 [doi]
- Adaptive MAC Scheme for Wireless LAN Based on Dynamic Group ConstructionsKen ichi Yasuda, Shigeaki Tagashira, Satoshi Fujita. 300-305 [doi]
- A Meshed Multipath Routing Protocol in Mobile Ad Hoc NetworksCheng-Ting Kuo, Chiu-Kuo Liang. 306-310 [doi]
- Radio Resource Management Algorithm Based on Cross-Layer Design for OFDM SystemsXiaohui Li, Ming Han, Kechu Yi, Changxing Pei, Naian Liu. 311-314 [doi]
- Secure Data Aggregation in Wireless Sensor Networks: A SurveyYingpeng Sang, Hong Shen, Yasushi Inoguchi, Yasuo Tan, Naixue Xiong. 315-320 [doi]
- Using Grid Computing to Enable Distributed Radar Data Retrieval and ProcessingDiego Arias, Wilson Rivera. 321-326 [doi]
- Building Interest-Oriented Web Search UnionYonghua Zhang, Feng Hong, Minglu Li, Guangtao Xue. 327-332 [doi]
- A Cooperative Service Composition Language and Its Formal SemanticsXiuguo Zhang, Weishi Zhang. 333-338 [doi]
- Intelligent Web Mining Model to Enhance Knowledge Discovery on the WebSunil Kr. Pandey, R. B. Mishra. 339-343 [doi]
- Implementing a Self-Timed Low-Power Java Accelerator for Network-on-Chip ApplicationsZheng Liang, Juha Plosila, Lu Yan, Kaisa Sere. 344-347 [doi]
- Adaptive to Context in Ubiquitous Computing EnvironmentsJie Sun, Zhaohui Wu. 348-351 [doi]
- A Mobile Service Middleware Supported 4G Adaptive Multimedia ApplicationsBaode Fan, Zhaolin Yin, Sainan Zhang. 352-357 [doi]
- Data Broadcast on a Multi-System Heterogeneous Overlayed Wireless NetworkJiun-Long Huang, Jui-Nan Lin. 358-363 [doi]
- The Failure-rate Aware Scheduling Policies for Large-scale Cluster SystemsLinping Wu, Chao Ren, Dan Meng, Jianfeng Zhan, Bibo Tu. 364-367 [doi]
- Study on Scheduling Strategy for Global Computing ApplicationGuangzhong Sun, Bin Fan, Guoliang Chen, Yinghua Zhou. 368-372 [doi]
- Scheduling Independent Tasks in Heterogeneous Environments under Communication ConstraintsPetros Lampsas, Thanasis Loukopoulos, Fedon Dimopoulos, Marouso Athanasiou. 373-378 [doi]
- A Lightweight Key Management Protocol for Hierarchical Sensor NetworksZeng Qingguang, Cui Yanling, Luo Juan. 379-382 [doi]
- Fair Transaction Protocols Based on Electronic CashChun-I Fan, Yu-Kuang Liang, Bo-Wei Lin. 383-388 [doi]
- An Identity-Based Fault-Tolerant Conference Key Distribution SchemeYang Zongkai, Xie Haitao, Cheng Wenqing, Tan Yunmeng. 389-392 [doi]
- Multi-Class MPLS Resilience Mechanism Supporting Traffic EngineeringHe Huang, Jin Wang, Bo Yang, Peng Li. 393-398 [doi]
- An O(nh) Algorithm for Dual-Server Coordinated En-Route Caching in Tree NetworksShihong Xu, Hong Shen. 399-404 [doi]
- A Self-Tuning Algorithm for Managing Reconfigurable CacheManman Peng, Yuming Wang. 405-410 [doi]
- On the Relationship between the Object Constraint Language (OCL) and the Java Modeling Language (JML)Ali Hamie. 411-414 [doi]
- Design Patterns of Scalable Cluster System SoftwareBibo Tu, Ming Zou, Jianfeng Zhan, Lei Wang, Jianping Fan. 415-420 [doi]
- Describing and Verifying Web Service Using CCSLi Bao, Weishi Zhang, Xiuguo Zhang. 421-426 [doi]
- Efficient Parallel Pattern Matching Using Partition MethodS. Viswanadha Raju, S. R. Mantena, A. Vinaya Babu, G. V. S. Raju. 427-430 [doi]
- Sequence Analysis in Constant Time on BSRLimin Xiang, Kai Cheng, Kazuo Ushijima. 431-436 [doi]
- A Parallel Algorithm by Sampling for the Knapsack Problem Based on MIMD Parallel ComputersXiao-Ling Liu, Shou-Ping Gao, De-Liang Gong, Ken-Li Li. 437-441 [doi]
- Hacking Tricks Toward Security on Network EnvironmentsTzer-Shyong Chen, Fuh-Gwo Jeng, Yu-Chia Liu. 442-447 [doi]
- Simulation and Evaluation of a New Algorithm of Worm Detection and ContainmentXiong Yang, Jing Lu, Yuguang Zhu, Ping Wang. 448-453 [doi]
- A Secure Threshold Proxy Signature Scheme for Mobile Agent-Based Electronic Commerce TransactionsWenqi Liu, Jianhua Yang, Lei Wei. 454-459 [doi]
- The Anatomy Study of Load Balancing in Distributed SystemKuo-Qin Yan, Shu-Chin Wang, C. P. Chang, L. Y. Tseng. 460-463 [doi]
- An Overtime-Tolerance Strategy for Advance ReservationLibing Wu, Chanle Wu, Jianqun Cui, Huyin Zhang, Gang Ye. 464-469 [doi]
- Integrating Reservation Mechanism into Grid Resource ManagementChen Jing, Kong Ling-fu. 470-473 [doi]
- Blind Watermarking Based on the Wavelet TransformJui-Cheng Yen, Hun-Chen Chen, Jui-Hsiang Juan. 474-478 [doi]
- Threshold Signature Scheme Resistible for Conspiracy AttackYu-Fang Chung, Chia-Hui Liu, Feipei Lai, Tzer-Shyong Chen. 479-483 [doi]
- An ECG Parallel Scheduling Algorithm for the Distributed SystemsMao-yuan Zhang, Ruixuan Li, Zhengding Lu, Chun-yan Zou. 484-487 [doi]
- 1-Fair Alternator Designs for the de Bruijn NetworkHsu-Shen Lin, Chang-Biau Yang, Kuo-Tsung Tseng. 488-491 [doi]
- Processor Allocation in Mesh Multiprocessors Using a Hybrid MethodSanya Attari, Ayaz Isazadeh. 492-496 [doi]
- Effective Filtering Scheme against RREQ Flooding Attack in Mobile Ad Hoc NetworksJian-Hua Song, Fan Hong, Yu Zhang. 497-502 [doi]
- TTSF: A Novel Two-Tier Spam FilterYang Li, Binxing Fang, Li Guo. 503-508 [doi]
- Generalized Unsolicited Tests for Authentication Protocol AnalysisYongjian Li, Jun Pang. 509-514 [doi]
- Performance-Based Content Retrieval for Learning Object Repositories on Grid EnvironmentsWen-Chung Shih, Chao-Tung Yang, Ping-I Chen, Shian-Shyong Tseng. 515-520 [doi]
- A Peer-to-Peer Based Framework of InterLibrary Cooperation for Digital LibrariesWen-Chung Shih, Chao-Tung Yang, Shian-Shyong Tseng, Chun-Jen Chen. 521-524 [doi]
- A Service-Oriented Virtual Machine for Grid ApplicationsHong Liu, Wei Li, Xiaoning Wang, Yili Gong, Tian Luo. 525-530 [doi]
- Comparison of Global Computing with Grid ComputingBabak Behsaz, Pooya Jaferian, Mohammad Reza Meybodi. 531-534 [doi]
- An Optimal Adaptive Checkpoint Strategy for DMR with Energy-AwareZhongwen Li, Yefeng Jiang. 535-538 [doi]
- c-Step DiagnosisGuey-Yun Chang, Gen-Huey Chen. 539-544 [doi]
- Designing Reliable Architecture for Stateful Fault ToleranceIndranil Saha, Debapriyay Mukhopadhyay, Satyajit Banerjee. 545-551 [doi]
- The 3-Wide-Diameter of the Hyper-L Triple-Loop NetworkHsun-Wen Chang, San-Yu Chen. 552-557 [doi]
- A Locality-Driven Atomic Group Checkpoint ProtocolZunce Wei, Hon Fung Li, Dhrubajyoti Goswami. 558-564 [doi]
- Hardness and Approximation of the Selected-Leaf-Terminal Steiner Tree ProblemSun-Yuan Hsieh, Huang-Ming Gao. 565-568 [doi]
- Load Balancing in a Cluster ComputerPaul Werstein, Hailing Situ, Zhiyi Huang. 569-577 [doi]
- A Information Monitoring and Job Scheduling System for Multiple Linux PC ClustersChao-Tung Yang, Chun-Sheng Liao, Ping-I Chen, Hao-Yu Tung. 578-582 [doi]