Abstract is missing.
- Keynote address: towards secure systems programming languagesGilad Bracha. 1-2 [doi]
- Editorial message: special track on artificial intelligence, computational logic and image analysisChih-Cheng Hung, Agostinho C. Rosa, Stefano Bistarelli. 3-4 [doi]
- Person identification from heavily occluded face imagesAndreas Lanitis. 5-9 [doi]
- Morphing of image represented objects using a physical methodologyRaquel Ramos Pinho, João Manuel R. S. Tavares. 10-15 [doi]
- Hierarchical nonlinear constraint satisfactionHiroshi Hosobe. 16-20 [doi]
- Concatenate feature extraction for robust 3D elliptic object localizationYuichi Motai, Akio Kosaka. 21-28 [doi]
- Symbol representation in map image compressionAlexander Akimov, Pasi Fränti. 29-34 [doi]
- Solving weighted Max-Sat optimization problems using a Taboo Scatter Search metaheuristicDalila Boughaci, Habiba Drias. 35-36 [doi]
- Editorial message: special track on agents, interactions, mobility, and systems (AIMS)Henry Hexmoor, Marcin Paprzycki, Niranjan Suri. 37 [doi]
- Knowledge-based conversational agents and virtual storytellingPaul Tarau, Elizabeth Figa. 39-44 [doi]
- Further extensions of FIPA Contract Net Protocol: threshold plus DoAChen Xueguang, Song Haigang. 45-51 [doi]
- Information agents cooperating with heterogenous data sources for customer-order managementDionisis Kehagias, Andreas L. Symeonidis, Kyriakos C. Chatzidimitriou, Pericles A. Mitkas. 52-57 [doi]
- Propositional planning in BDI agentsFelipe Rech Meneguzzi, Avelino F. Zorzo, Michael da Costa Móra. 58-63 [doi]
- A decision-theoretic approach for designing proactive communication in multi-agent teamworkYu Zhang, Richard A. Volz, Thomas R. Ioerger, John Yen. 64-71 [doi]
- Specification and verification of agent interaction protocols in a logic-based systemMarco Alberti, Davide Daolio, Paolo Torroni, Marco Gavanelli, Evelina Lamma, Paola Mello. 72-78 [doi]
- A framework and analysis for cooperative search using UAV swarmsPatrick Vincent, Izhak Rubin. 79-86 [doi]
- Using mobile agents as roaming security guards to test and improve security of hosts and networksMarco M. Carvalho, Thomas B. Cowin, Niranjan Suri, Maggie R. Breedy, Kenneth M. Ford. 87-93 [doi]
- Software agents for process monitoring and notificationLarry Bunch, Maggie R. Breedy, Jeffrey M. Bradshaw, Marco M. Carvalho, Niranjan Suri, Andrzej Uszok, Jack Hansen, Michal Pechoucek, Vladimír Marík. 94-100 [doi]
- Editorial message: special track on bioinformaticsWarren T. Jones, Mathew J. Palakal, Jake Yue Chen. 101 [doi]
- An architecture for biological information extraction and representationAditya Vailaya, Peter Bluvas, Robert Kincaid, Allan Kuchinsky, Michael L. Creech, Annette Adler. 103-110 [doi]
- Classifying biological articles using web resourcesFrancisco M. Couto, Bruno Martins, Mário J. Silva. 111-115 [doi]
- Clustering of diverse genomic data using information fusionJyotsna Kasturi, Raj Acharya. 116-120 [doi]
- BioMap: toward the development of a knowledge base of biomedical literatureKamal Kumar, Mathew J. Palakal, Snehasis Mukhopadhyay, Mathew J. Stephens, Huian Li. 121-127 [doi]
- Time-frequency feature detection for time-course microarray dataJiawu Feng, Paolo Emilio Barbano, Bud Mishra. 128-132 [doi]
- An integrated tool for microarray data clustering and cluster validity assessmentNadia Bolshakova, Francisco Azuaje, Padraig Cunningham. 133-137 [doi]
- Finding differentially expressed genes: pattern generation using Q-valuesOsman Abul, Reda Alhajj, Faruk Polat, Ken Barker. 138-142 [doi]
- A new framework for clustering algorithm evaluation in the domain of functional genomicsAnyuan Guo. 143-146 [doi]
- A parallel algorithm for the extraction of structured motifsAlexandra M. Carvalho, Arlindo L. Oliveira, Ana T. Freitas, Marie-France Sagot. 147-153 [doi]
- Identification of fundamental building blocks in protein sequences using statistical association measuresDeborah K. Weisser, Judith Klein-Seetharaman. 154-161 [doi]
- Guiding motif discovery by iterative pattern refinementZhiping Wang, Mehmet M. Dalkilic, Sun Kim. 162-166 [doi]
- VistaClara: an interactive visualization for exploratory analysis of DNA microarraysRobert Kincaid. 167-174 [doi]
- Multidimensional support vector machines for visualization of gene expression dataDaisuke Komura, Hiroshi Nakamura, Shuichi Tsutsumi, Hiroyuki Aburatani, Sigeo Ihara. 175-179 [doi]
- A seriate coverage filtration approach for homology searchHsiao Ping Lee, Yin-Te Tsai, Chuan Yi Tang. 180-184 [doi]
- Combining analysis and synthesis in a model of a biological cellKen Webb, Tony White. 185-190 [doi]
- Applications of finite fields to dynamical systems and reverse engineering problemsMaría A. Aviñó, Edward L. Green, Oscar Moreno. 191-196 [doi]
- A fast program for maximum likelihood-based inference of large phylogenetic treesAlexandros Stamatakis, Thomas Ludwig 0002, Harald Meier. 197-201 [doi]
- Bio-sequence analysis with cradle s 3SoC:::TM::: software scalable system on chipXiandong Meng, Vipin Chaudhary. 202-206 [doi]
- Object-oriented design for the specification of the blood clotting cascade: a class-structured view of bio-computing processesJacqueline Signorini, Patrick Greussay. 207-208 [doi]
- Protein threading with residue-environment matching by artificial neural networksNan Jiang, Wendy Xinyu Wu, Ian Mitchell. 209-210 [doi]
- Predicting cell adhesion probability via the biochemical stochastic pi-calculusPaola Lecca, Corrado Priami, Carlo Laudanna, G. Constantin. 211-212 [doi]
- Editorial message: special track on computational sciencesAdrian Sandu. 213 [doi]
- Computational analysis of microwave heating patterns in resonant multimode cavitiesDusko D. Dincov, Kevin A. Parrott. 215-219 [doi]
- A class of OpenMP applications involving nested parallelismH. Martin Bücker, Arno Rasch, Andreas Wolf. 220-224 [doi]
- Degree restricted spanning trees of graphsMohammad Sohel Rahman, Abul Kashem. 225-228 [doi]
- Using semi-lagrangian formulations with automatic code generation for environmental modelingPaul van der Mark, Lex Wolters, Gerard Cats. 229-234 [doi]
- Adaptive resolution modeling of regional air qualityChaitanya Belwal, Adrian Sandu, Emil M. Constantinescu. 235-239 [doi]
- New ICT applications in health careValentin Masero. 241-242 [doi]
- Diagnosis of lung nodule using Gini coefficient and skeletonization in computerized tomography imagesAristófanes C. Silva, Paulo Cezar Pinto Carvalho, Marcelo Gattass. 243-248 [doi]
- Compression of mammograms for medical practiceArtur Przelaskowski. 249-253 [doi]
- Boundary extraction in thermal images by edge mapQuming Zhou, Zhuojing Li, Jake K. Aggarwal. 254-258 [doi]
- Health Level-7 compliant clinical patient records systemJagbir S. Hooda, Erdogan Dogdu, Raj Sunderraman. 259-263 [doi]
- Towards a flexible, process-oriented IT architecture for an integrated healthcare networkMario Beyer, Klaus Kuhn, Christian Meiler, Stefan Jablonski, Richard Lenz. 264-271 [doi]
- A relational approach to the capture of DICOM files for Grid-enabled medical imaging databasesDavid J. Power, Eugenia A. Politou, Mark Slaymaker, Steve Harris, Andrew C. Simpson. 272-279 [doi]
- Knowledge discovery from doctor-patient relationshipJesús S. Aguilar-Ruiz, Raquel Costa, Federico Divina. 280-284 [doi]
- Potential prevention of medical errors in casualty surgery by using information technologyR. Blaser, M. Schnabel, D. Mann, P. Jancke, Klaus Kuhn, Richard Lenz. 285-290 [doi]
- Regularized B-spline network and its application to heart arrhythmia classificationJie Zhou, Liqun Li. 291-295 [doi]
- Automatic fitting of cochlear implants with evolutionary algorithmsClaire Bourgeois-République, Jean-Jacques Chabrier, Pierre Collet. 296-300 [doi]
- Disclosure risk measures for the sampling disclosure control methodTraian Marius Truta, Farshad Fotouhi, Daniel C. Barth-Jones. 301-306 [doi]
- Active contour on the basis of inertiaJ. B. Pagador, José Moreno, Valentin Masero, Juan M. León-Rojas. 307-308 [doi]
- Patient scheduling under uncertaintyTorsten O. Paulussen, Anja Zöller, Armin Heinzl, Lars Braubach, Alexander Pokahr, Winfried Lamersdorf. 309-310 [doi]
- Editorial message: special track on computer networksVana Kalogeraki, Turgay Korkmaz, Kamil Saraç. 311-312 [doi]
- Analytical modelling of priority commit protocol for reliable Web applicationsIrfan Awan, Muhammad Younas. 313-317 [doi]
- A study for provisioning of ::::QoS:::: web-based services to the end-userYannis Mitsos, Fotis Andritsopoulos, Dimitrios Kagklis. 318-321 [doi]
- High throughput reliable message disseminationBoaz Carmeli, Gidon Gershinsky, Avi Harpaz, Nir Naaman, Haim Nelken, Julian Satran, P. Vortman. 322-327 [doi]
- Core selection with end-to-end QoS supportWanida Putthividhya, Minh Tran, Wallapak Tavanapong, Johnny S. Wong. 328-333 [doi]
- Optimal placement of NAK-suppressing agents for reliable multicast: a partial deployment caseOvidiu Daescu, Raja Jothi, Balaji Raghavachari, Kamil Saraç. 334-338 [doi]
- Implications of the topological properties of Internet traffic on traffic engineeringSteve Uhlig, Olivier Bonaventure, Vincent Magnin, Chris Rapier, Luca Deri. 339-346 [doi]
- Communication delay in hypercubic networks with LRD trafficGeyong Min, Mohamed Ould-Khaoua, Irfan-Ullah Awan, Demetres D. Kouvatsos. 347-351 [doi]
- A functional architecture for self-aware routersDamien Galand, Oliver Marcé. 352-356 [doi]
- EmuNET: a real-time network emulatorAyman I. Kayssi, Ali El-Haj-Mahmoud. 357-362 [doi]
- A framework for implicit and explicit service activation based on Service Level SpecificationDimitrios Kagklis, Nicolas Liampotis, Christos Tsakiris. 363-368 [doi]
- A discrete event based simulation environment for enhanced UMTS 3:::rd::: generation networksJosephine Antoniou, Vasos Vassiliou, Andreas Pitsillides, George Hadjipollas, N. Jacovides. 369-370 [doi]
- RED with Dynamic Thresholds for improved fairnessVladimir Vukadinovic, Ljiljana Trajkovic. 371-372 [doi]
- Editoral message: special track on computer securityGiampaolo Bella, Peter Ryan. 373-374 [doi]
- Efficient comparison of enterprise privacy policiesMichael Backes, Günter Karjoth, Walid Bagga, Matthias Schunter. 375-382 [doi]
- Modeling and detecting the cascade vulnerability problem using soft constraintsStefano Bistarelli, Simon N. Foley, Barry O Sullivan. 383-390 [doi]
- Fair certified e-mail deliveryAleksandra Nenadic, Ning Zhang, Stephen Barton. 391-396 [doi]
- Anonymity and certification: e-mail, a case studyLavinia Egidi, Giovanni Porcelli. 397-403 [doi]
- The loop fallacy and serialization in tracing intrusion connections through stepping stonesXinyuan Wang. 404-411 [doi]
- Unsupervised learning techniques for an intrusion detection systemStefano Zanero, Sergio M. Savaresi. 412-419 [doi]
- Naive Bayes vs decision trees in intrusion detection systemsNahla Ben Amor, Salem Benferhat, Zied Elouedi. 420-424 [doi]
- Protected transmission of biometric user authentication data for oncard-matchingUlrich Waldmann, Dirk Scheuermann, Claudia Eckert. 425-430 [doi]
- Java bytecode verification on Java cardsRoberto Barbuti, Stefano Cataudella. 431-438 [doi]
- Towards multisensor data fusion for DoS detectionChristos Siaterlis, Basil S. Maglaris. 439-446 [doi]
- Editoral message: special track on coordination models, languages and applicationsSascha Ossowski, Ronaldo Menezes. 447-448 [doi]
- Integrating objective & subjective coordination in multi-agent systemsAndrea Omicini, Alessandro Ricci, Mirko Viroli, Giovanni Rimassa. 449-455 [doi]
- An agent design method promoting separation between computation and coordinationNico Janssens, Elke Steegmans, Tom Holvoet, Pierre Verbaeten. 456-461 [doi]
- Enforcing agent communication laws by means of a reflective frameworkAntonella Di Stefano, Corrado Santoro, Giuseppe Pappalardo, Emiliano Tramontana. 462-468 [doi]
- A robust deception-free coalition formation modelMaría-Victoria Belmonte, Ricardo Conejo, José-Luis Pérez-de-la-Cruz, Francisco Triguero Ruiz. 469-473 [doi]
- A Negotiation Support System based on a Multi-agent System: specificity and preference relations on argumentsMaxime Morge, Philippe Beaune. 474-478 [doi]
- Self-maintained distributed tuples for field-based coordination in dynamic networksMarco Mamei, Franco Zambonelli. 479-486 [doi]
- WSSecSpaces: a secure data-driven coordination service for Web Services applicationsRoberto Lucchi, Gianluigi Zavattaro. 487-491 [doi]
- Web Services: separation of concerns: computation coordination communicationTheophilos A. Limniotes, George A. Papadopoulos, Farhad Arbab. 492-497 [doi]
- Tucupi: a flexible workflow system based on overridable constraintsJacques Wainer, Fábio de Lima Bezerra, Paulo Barthelmess. 498-502 [doi]
- Orchestrating document-based workflows with X-FoldersDavide Rossi. 503-507 [doi]
- Concurrent and distributed programming using constraint logic programsRafael Ramirez, Andrew E. Santosa. 508-509 [doi]
- Cooperation models for service oriented multi-agent systemXinJun Mao, Gang Wu, Huaimin Wang. 510-511 [doi]
- Editorial message: special track on data miningHasan M. Jamil, Rosa Meo. 513-514 [doi]
- Statistical properties of transactional databasesPaolo Palmerini, Salvatore Orlando, Raffaele Perego. 515-519 [doi]
- SDS-rules and association rulesTomás Karban, Jan Rauch, Milan Simunek. 520-524 [doi]
- Mining dependence rules by finding largest itemset support quotaAlexandr A. Savinov. 525-529 [doi]
- Memory issues in frequent itemset miningBart Goethals. 530-534 [doi]
- Optimizing subset queries: a step towards SQL-based inductive databases for itemsetsCyrille Masson, Céline Robardet, Jean-François Boulicaut. 535-539 [doi]
- A new algorithm for gap constrained sequence miningSalvatore Orlando, Raffaele Perego, Claudio Silvestri. 540-547 [doi]
- Interval and dynamic time warping-based decision treesJuan José Rodríguez, Carlos J. Alonso. 548-552 [doi]
- On support thresholds in associative classificationElena Baralis, Silvia Chiusano, Paolo Garza. 553-558 [doi]
- Reducing borders of k-disjunction free representations of frequent patternsMarzena Kryszkiewicz. 559-563 [doi]
- Frequent free tree discovery in graph dataUlrich Rückert, Stefan Kramer. 564-570 [doi]
- GraphZip: a fast and automatic compression method for spatial data clusteringYu Qian, Kang Zhang. 571-575 [doi]
- Neighborhood based detection of anomalies in high dimensional spatio-temporal sensor datasetsNabil R. Adam, Vandana Pursnani Janeja, Vijayalakshmi Atluri. 576-583 [doi]
- K-nearest-neighbor consistency in data clustering: incorporating local information into global optimizationChris H. Q. Ding, Xiaofeng He. 584-589 [doi]
- Framework for mining web content outliersMalik Agyemang, Ken Barker, Reda Alhajj. 590-594 [doi]
- A model for mining outliers from complex data setsHongwei Qi, Jue Wang. 595-599 [doi]
- Assigning document identifiers to enhance compressibility of Web Search Engines indexesFabrizio Silvestri, Raffaele Perego, Salvatore Orlando. 600-605 [doi]
- Rule discovery from textual data based on key phrase patternsShigeaki Sakurai, Akihiro Suyama. 606-612 [doi]
- An optimized approach for KNN text categorization using P-treesImad Rahal, William Perrizo. 613-617 [doi]
- SQL based frequent pattern mining without candidate generationXuequn Shang, Kai-Uwe Sattler, Ingolf Geist. 618-619 [doi]
- Hierarchical model-based clustering of relational data with aggregatesJianzhong Chen, Mary Shapcott, Sally I. McClean, Kenneth Adamson. 620-621 [doi]
- FGKA: a Fast Genetic K-means Clustering AlgorithmYi Lu, Shiyong Lu, Farshad Fotouhi, Youping Deng, Susan J. Brown. 622-623 [doi]
- Editorial message: special track on data streamsJesús S. Aguilar-Ruiz, Paul R. Cohen. 625 [doi]
- An efficient single-pass query evaluator for XML data streamsDan Olteanu, Tim Furche, François Bry. 627-631 [doi]
- Forest trees for on-line dataJoão Gama, Pedro Medas, Ricardo Rocha. 632-636 [doi]
- The time diversification monitoring of a stock portfolio: an approach based on the fractal dimensionMehmed M. Kantardzic, Pedram Sadeghian, Chun Shen. 637-641 [doi]
- Parallel hypothesis driven video content analysisOle-Christoffer Granmo. 642-648 [doi]
- Discovering decision rules from numerical data streamsFrancisco J. Ferrer-Troyano, Jesús S. Aguilar-Ruiz, José Cristóbal Riquelme Santos. 649-653 [doi]
- Data stream management system for MavHomeQingchun Jiang, Sharma Chakravarthy. 654-655 [doi]
- Editorial message: special track on database theory, technology, and applications657 [doi]
- Architectures for a temporal workflow management systemCarlo Combi, Giuseppe Pozzi. 659-666 [doi]
- Enhancement of workflow flexibility by composing activities at run-timeShuiGuang Deng, Zhen Yu, Zhaohui Wu, Huang Lican. 667-673 [doi]
- Simplified access to structured databases by adapting keyword search and database selectionMohammad Hassan, Reda Alhajj, Mick J. Ridley, Ken Barker. 674-678 [doi]
- A mobile agent approach for global database constraint checkingPraveen Madiraju, Rajshekhar Sunderraman. 679-683 [doi]
- 1-2PC: the one-two phase atomic commit protocolYousef J. Al-Houmaily, Panos K. Chrysanthis. 684-691 [doi]
- On the semantics and expressive power of Datalog-like languages for NP search and optimization problemsEster Zumpano, Sergio Greco, Irina Trubitsyna, Pierangelo Veltri. 692-697 [doi]
- ConvRel: relationship conversion to XML nested structuresAngela Cristina Duta, Ken Barker, Reda Alhajj. 698-702 [doi]
- On using collection for aggregation and association relationships in XML object-relational storageEric Pardede, J. Wenny Rahayu, David Taniar. 703-710 [doi]
- A data mining approach for database intrusion detectionYi Hu, Brajendra Panda. 711-716 [doi]
- Creation and management of versions in multiversion data warehouseBartosz Bebel, Johann Eder, Christian Koncilia, Tadeusz Morzy, Robert Wrembel. 717-723 [doi]
- Signature file hierarchies and signature graphs: a new index method for object-oriented databasesYangjun Chen, Yibin Chen. 724-728 [doi]
- Feature-based distributed object search using signatures in Peer-to-Peer environmentsRyo Matsushita, Hiroyuki Kitagawa, Yoshiharu Ishikawa. 729-734 [doi]
- Integrating similarity-based queries in image DBMSsSolomon Atnafu, Richard Chbeir, David Coquil, Lionel Brunie. 735-739 [doi]
- VCR indexing for fast event matching for highly-overlapping range predicatesKun-Lung Wu, Shyh-Kwei Chen, Philip S. Yu. 740-747 [doi]
- Replicated declustering for arbitrary queriesAli Saman Tosun. 748-753 [doi]
- A comparison of two view materialization approaches for disease surveillance systemZhen Liu, Panos K. Chrysanthis, Fu-Chiang Tsui. 754-755 [doi]
- Editorial message: special track on E-commerce technologiesSviatoslav Braynov, Manuel Núñez, Peter R. Wurman. 757-758 [doi]
- A multi-criteria model for electronic auctionsMarie-Jo Bellosta, Imène Brigui, Sylvie Kornman, Daniel Vanderpooten. 759-765 [doi]
- An anonymous bonus point system for mobile commerce based on word-of-mouth recommendationTobias Straub, Andreas Heinemann. 766-773 [doi]
- Formal specification of autonomous commerce agentsIsmael Rodríguez. 774-778 [doi]
- An improved formal specification of the Internet Open Trading PprotocolChun Ouyang, Jonathan Billington. 779-783 [doi]
- A framework for the classification and the reclassification of electronic catalogsDomenico Beneventano, Stefania Magnani. 784-788 [doi]
- Automatic verification of the TLS handshake protocolGregorio Díaz, Fernando Cuartero, Valentín Valero Ruiz, Fernando L. Pelayo. 789-794 [doi]
- Automated test scenarios generation for an e-barter systemAna R. Cavalli, Stéphane Maag. 795-799 [doi]
- Web Services for E-commerce: guaranteeing security access and quality of serviceMario Bravetti, Roberto Lucchi, Gianluigi Zavattaro, Roberto Gorrieri. 800-806 [doi]
- A new signature scheme: joint-signatureLi-Sha He, Ning Zhang. 807-812 [doi]
- A secure method for signature delegation to mobile agentsOmaima Bamasak, Ning Zhang. 813-818 [doi]
- Editorial message for the special track on embedded systems: applications, solutions, and techniquesAlessio Bechini, Cosimo Antonio Prete. 819-820 [doi]
- Efficient implementation of fingerprint verification for mobile embedded systems using fixed-point arithmeticT. Y. Tang, Y. S. Moon, K. C. Chan. 821-825 [doi]
- Assessing the effect of failure severity, coincident failures and usage-profiles on the reliability of embedded control systemsFrederick T. Sheldon, Kshamta Jerath. 826-833 [doi]
- Profit-driven uniprocessor scheduling with energy and timing constraintsJian-Jia Chen, Tei-Wei Kuo, Chia-Lin Yang. 834-840 [doi]
- Efficient AES implementations for ARM based platformsKubilay Atasu, Luca Breveglieri, Marco Macchetti. 841-845 [doi]
- Dynamic on-demand updating of data in real-time database systemsThomas Gustafsson, Jörgen Hansson. 846-853 [doi]
- Code generation techniques for developing light-weight XML Web services for embedded devicesRobert van Engelen. 854-861 [doi]
- An efficient management scheme for large-scale flash-memory storage systemsLi-Pin Chang, Tei-Wei Kuo. 862-868 [doi]
- A hardware/software kernel for system on chip designsAndrew Morton, Wayne M. Loucks. 869-875 [doi]
- DSPxPlore: design space exploration methodology for an embedded DSP coreChristian Panis, Ulrich Hirnschrott, Gunther Laure, Wolfgang Lazian, Jari Nurmi. 876-883 [doi]
- An energy efficient cache memory architecture for embedded systemsJung-Wook Park, Cheong-Ghil Kim, Jung Hoon Lee, Shin-Dug Kim. 884-890 [doi]
- Multi-objective co-exploration of source code transformations and design space architectures for low-power embedded systemsGiovanni Agosta, Gianluca Palermo, Cristina Silvano. 891-896 [doi]
- A hardware extension of the RISC microprocessor for Attribute Grammar evaluationIoannis Panagopoulos, Christos Pavlatos, George K. Papakonstantinou. 897-904 [doi]
- L0 buffer energy optimization through scheduling and explorationMurali Jayapala, Tom Vander Aa, Francisco Barat, Geert Deconinck, Francky Catthoor, Henk Corporaal. 905-906 [doi]
- Fine-grained power management for multithreaded processor coresSascha Uhrig, Theo Ungerer. 907-908 [doi]
- Editorial message: special track on engineering e-learning systemsSymeon Retalis, Paris Avgeriou. 909-910 [doi]
- Issues of pedagogy and design in e-learning systemsCharalambos Vrasidas. 911-915 [doi]
- Patterns for blended, Person-Centered learning: strategy, concepts, experiences, and evaluationMichael Derntl, Renate Motschnig-Pitrik. 916-923 [doi]
- SiteLang: : Edu: towards a context-driven e-learning content utilization modelAleksander Binemann-Zdanowicz. 924-928 [doi]
- Evaluating adaptive hypermedia authoring while teaching adaptive systemsAlexandra I. Cristea. 929-934 [doi]
- Training Needs Analysis: the first step in authoring e-learning contentEmma O Brien, Timothy Hall. 935-939 [doi]
- Carrying on the e-learning process with a workflow management engineMirko Cesarini, Mattia Monga, Roberto Tedesco. 940-945 [doi]
- Improving courseware quality through life-cycle encompassing quality assuranceInes Grützner, Stephan Weibelzahl, Patrick E. Waterson. 946-951 [doi]
- Encouraging knowledge exchange in discussion forums by market-oriented mechanismsNatalia López, Manuel Núñez, Ismael Rodríguez, Fernando Rubio. 952-956 [doi]
- The eduSource Communication Language: implementing open network for learning repositories and servicesMarek Hatala, Griff Richards, Timmy Eap, Jordan Willms. 957-962 [doi]
- An architecture for supporting vicarious learning in a distributed environmentSteve Neely, Helen Lowe, David M. Eyers, Jean Bacon, Julian Newman, Xiaofeng Gong. 963-970 [doi]
- Modeling and execution of E-Learning resourcesJohannes Lischka, Dimitris Karagiannis. 971-972 [doi]
- Editorial message: special track on evolutionary computation and optimizationBryant A. Julstrom. 973-974 [doi]
- Using a genetic algorithm to optimize the gape of a snake jawChun Wai Liew. 975-979 [doi]
- Two hybrid evolutionary algorithms for the rectilinear Steiner arborescence problemBryant A. Julstrom, Athos Antoniades. 980-984 [doi]
- Solving the error correcting code problem with parallel hybrid heuristicsEnrique Alba, J. Francisco Chicano. 985-989 [doi]
- An improved hybrid genetic algorithm for the generalized assignment problemHarald Feltl, Günther R. Raidl. 990-995 [doi]
- Automatic construction of drama school timetables based on a generic evolutionary framework for allocation and scheduling problemsOskar Preinfalk, Helmut A. Mayer. 996-1000 [doi]
- Genetic Programming for data classification: partitioning the search spaceJeroen Eggermont, Joost N. Kok, Walter A. Kosters. 1001-1005 [doi]
- Schemata Theory for the real coding and arithmetical operatorsDiego F. Nehab, Marco Aurélio Cavalcanti Pacheco. 1006-1012 [doi]
- Experiments with UNA for solving linear constraints in real variablesNeelam Gupta, YongJun Cho, Mohammad Z. Hossain. 1013-1020 [doi]
- Solving the maximum clique problem by k-opt local searchKengo Katayama, Akihiro Hamamoto, Hiroyuki Narihisa. 1021-1025 [doi]
- Evolutionary segmentation of yeast genomeDaniel Mateos, José Cristóbal Riquelme Santos, Jesús S. Aguilar-Ruiz. 1026-1027 [doi]
- Application of fuzzy logic to multiple criteria decision making in aquacultural planningOmar F. El-Gayar. 1028-1029 [doi]
- Editorial message: special track on information access and retrievalFabio Crestani, Gabriella Pasi. 1031-1032 [doi]
- A comparison of several predictive algorithms for collaborative filtering on multi-valued ratingsMaritza L. Calderón-Benavides, Cristina N. González-Caro, José de Jesús Pérez Alcázar, Juan C. García-Díaz, Joaquin Delgado. 1033-1039 [doi]
- A knowledge based system for content-based retrieval of Scalable Vector Graphics documentsEugenio Di Sciascio, Francesco M. Donini, Marina Mongiello. 1040-1044 [doi]
- Ontology and rule based retrieval of sound objects in augmented audio reality system for museum visitorsMarek Hatala, Leila Kalantari, Ron Wakkary, Kenneth Newby. 1045-1050 [doi]
- Geographical information recognition and visualization in texts written in various languagesBruno Pouliquen, Ralf Steinberger, Camelia Ignat, Tom De Groeve. 1051-1058 [doi]
- Experiments on using fuzzy quantified sentences in adhoc retrievalDavid E. Losada, Félix Díaz-Hermida, Alberto Bugarín, Senén Barro. 1059-1064 [doi]
- Shadow document methods of resutls mergingShengli Wu, Fabio Crestani. 1067-1072 [doi]
- The effectiveness of combining information retrieval strategies for European languagesJaap Kamps, Maarten de Rijke. 1073-1077 [doi]
- An architecture for information retrieval over semi-collaborating Peer-to-Peer networksIraklis A. Klampanos, Joemon M. Jose. 1078-1083 [doi]
- Video information retrieval using objects and ostensive relevance feedbackPaul Browne, Alan F. Smeaton. 1084-1090 [doi]
- A new algorithm for computing transitive closuresYangjun Chen. 1091-1092 [doi]
- Editorial message: special track on internet data managementMarios D. Dikaiakos, Alexandros Labrinidis, Qiong Luo. 1093-1094 [doi]
- Text mining agent for net auctionYukitaka Kusumura, Yoshinori Hijikata, Shogo Nishida. 1095-1102 [doi]
- Specifying temporal data models for semistructured data by a constraint-based approachCarlo Combi, Barbara Oliboni, Elisa Quintarelli. 1103-1108 [doi]
- Caching in Web memory hierarchiesDimitrios Katsaros, Yannis Manolopoulos. 1109-1113 [doi]
- Learning query languages of Web interfacesAndré Bergholz, Boris Chidlovskii. 1114-1121 [doi]
- Efficient management of XML contents over wireless environment by XstreamEugene Y. C. Wong, Alvin T. S. Chan, Hong Va Leong. 1122-1127 [doi]
- Automatic language identification of written textsRafael Dueire Lins, Paulo Gonçalves. 1128-1133 [doi]
- Minimizing the reconfiguration overhead in content-based publish-subscribeGianpaolo Cugola, Davide Frey, Amy L. Murphy, Gian Pietro Picco. 1134-1140 [doi]
- GD-GhOST: a goal-oriented self-tuning caching algorithmGanesh Santhanakrishnan, Ahmed Amer, Panos K. Chrysanthis, Dan Li. 1141-1145 [doi]
- A web-page fragmentation technique for personalized browsingChristos Bouras, Vaggelis Kapoulas, Ioannis Misedakis. 1146-1147 [doi]
- Editorial message: special track on mobile computing and applicationsHong Va Leong, Alvin T. S. Chan. 1149-1150 [doi]
- A call admission control scheme using genetic algorithmsDilek Karabudak, Chih-Cheng Hung, Benny Bing. 1151-1158 [doi]
- A comparison of randomized and evolutionary approaches for optimizing base station site selectionLarry Raisanen, Roger M. Whitaker, Steve Hurley. 1159-1165 [doi]
- Delivering Attribute Certificates over GPRSGeorgios Kambourakis, Angelos N. Rouskas, Stefanos Gritzalis. 1166-1170 [doi]
- Extending invalid-access prevention policy protocols for mobile-client data cachingShin Parker, Zhengxin Chen. 1171-1176 [doi]
- A declarative framework for adaptable applications in heterogeneous environmentsPaola Inverardi, Fabio Mancinelli, Monica Nesi. 1177-1183 [doi]
- Object-oriented middleware for location-aware systemsRiku Järvensivu, Risto Pitkänen, Tommi Mikkonen. 1184-1190 [doi]
- UbiCollab: collaboration support for mobile usersMonica Divitini, Babak A. Farshchian, Haldor Samset. 1191-1195 [doi]
- MIRES: an information exchange system for mobile phonesQing Li, Xiang Li, Jian Zhai, Wenyin Liu. 1196-1200 [doi]
- Wireless spatio-semantic transactions on multimedia datasetsJames D. Carswell, Keith Gardiner, Marco Neumann. 1201-1205 [doi]
- A network independent broker for obtaining the position of nomadic usersNikos Prigouris, Giorgos Papazafeiropoulos, Giannis F. Marias, Stathes Hadjiefthymiades, Lazaros F. Merakos. 1206-1207 [doi]
- Towards an intelligent mobile travel assistantMarc Torrens, Patrick Hertzog, Pearl Pu, Boi Faltings. 1208-1209 [doi]
- Multimedia and visualization trackChaman L. Sabharwal. 1211-1212 [doi]
- Providing resource allocation and performance isolation in a shared streaming-media hosting serviceLudmila Cherkasova, Wenting Tang. 1213-1218 [doi]
- A new algorithm for removing noisy borders from monochromatic documentsBruno Tenório Ávila, Rafael Dueire Lins. 1219-1225 [doi]
- LEMP: Lightweight Efficient Multicast Protocol for video on demandPanayotis E. Fouliras, Spiros Xanthos, Nikolaos Tsantalis, Athanasios Manitsaris. 1226-1231 [doi]
- Similarity between Euclidean and cosine angle distance for nearest neighbor queriesGang Qian, Shamik Sural, Yuelong Gu, Sakti Pramanik. 1232-1237 [doi]
- Cost effective transcoding for QoS adaptive multimedia streamingIlhoon Shin, Kern Koh. 1238-1241 [doi]
- Axes-based visualizations with radial layoutsChristian Tominski, James Abello, Heidrun Schumann. 1242-1247 [doi]
- Modelling and filtering of MPEG-7-compliant meta-data for digital videoHarry W. Agius, Marios C. Angelides. 1248-1252 [doi]
- A high-dimensional approach to interactive graph visualizationHiroshi Hosobe. 1253-1257 [doi]
- Exploring an open, distributed multimedia framework to design and develop an adaptive middleware for interactive digital television systemsGlêdson Elias da Silveira, Adilson B. Lopes, Frederico Borelli, Maurício F. Magalhães. 1258-1264 [doi]
- Editorial message: special track on object oriented programming language and systemsDavide Ancona, Rajeev R. Raje, Mirko Viroli. 1265-1266 [doi]
- The inheritance anomaly: ten years afterGiuseppe Milicia, Vladimiro Sassone. 1267-1274 [doi]
- Another step towards a smart compilation manager for JavaGiovanni Lagorio. 1275-1280 [doi]
- Modeling multiple class loaders by a calculus for dynamic linkingSonia Fagorzi, Elena Zucca, Davide Ancona. 1281-1288 [doi]
- Adding wildcards to the Java programming languageMads Torgersen, Christian Plesner Hansen, Erik Ernst, Peter von der Ahé, Gilad Bracha, Neal M. Gafter. 1289-1296 [doi]
- Re-classification and multi-threading: ::::Fickle::::::MT::Ferruccio Damiani, Mariangiola Dezani-Ciancaglini, Paola Giannini. 1297-1304 [doi]
- SmartMethod: an efficient replacement for methodWalter Cazzola. 1305-1309 [doi]
- Interface utilization in the Java Development KitJens Gößner, Philip Mayer, Friedrich Steimann. 1310-1315 [doi]
- Language support for incremental integration of independently developed components in JavaBo Nørregaard Jørgensen. 1316-1322 [doi]
- Prototype system for method materialisation and maintenance in object-oriented databasesJuliusz Jezierski, Mariusz Masewicz, Robert Wrembel. 1323-1327 [doi]
- Seamless integration of rule-based knowledge and object-oriented functionality with linguistic symbiosisMaja D'Hondt, Kris Gybels, Viviane Jonckers. 1328-1335 [doi]
- Editorial message: special track on organizational engineeringJosé M. Tribolet, Pedro Sousa. 1337-1338 [doi]
- Modeling organizational goals: analysis of current methodsEvangelia Kavakli. 1339-1343 [doi]
- Towards a Corporate Performance Measurement SystemBeate List, Karl Machaczek. 1344-1350 [doi]
- Evolution of business processes towards eBusiness using a critiquing approachLerina Aversano, Thierry Bodhuin, Gerardo Canfora, Raffaele Esposito, Maria Tortorella. 1351-1358 [doi]
- Information requirements engineering for data warehouse systemsRobert Winter, Bernhard Strauch. 1359-1365 [doi]
- A method to define an Enterprise Architecture using the Zachman FrameworkCarla Marques Pereira, Pedro Sousa. 1366-1371 [doi]
- Developing the extended enterprise with the FADEEFrank G. Goethals, Jacques Vandenbulcke, Wilfried Lemahieu. 1372-1379 [doi]
- Separation, review and supervision controls in the context of a credit application process: a case study of organisational control principlesAndreas Schaad, Jonathan D. Moffett. 1380-1384 [doi]
- Organizational engineering in public administrations: a method for process-oriented egovernment projectsJörg Becker, Lars Algermissen, Björn Niehaves. 1385-1389 [doi]
- An integrated model of workflows, e-contracts and solution implementationMizuho Iwaihara, Haiying Jiang, Yahiko Kambayashi. 1390-1395 [doi]
- Applying scheduling techniques to minimize the number of late jobs in workflow systemsGregório Baggio, Jacques Wainer, Clarence A. Ellis. 1396-1403 [doi]
- Editorial message: special track on parallel and distributed systemsRobert van Engelen, Nectarios Koziris, Mario Mango Furnari, Kleanthis Psarris. 1405-1406 [doi]
- Exploiting fast ethernet performance in multiplatform cluster environmentSándor Juhász, Hassan Charaf. 1407-1411 [doi]
- Automatic parallel code generation for tiled nested loopsGeorgios I. Goumas, Nikolaos Drosinos, Maria Athanasaki, Nectarios Koziris. 1412-1419 [doi]
- Class-Dependent Assignment in cluster-based serversVictoria Ungureanu, Benjamin Melamed, Phillip G. Bradford, Michael Katehakis. 1420-1425 [doi]
- Efficient fault-tolerant routing algorithm for OTIS-cube using unsafety vectorsJehad Al-Sadi, A. M. Awwad. 1426-1430 [doi]
- A cost-oriented approach for infrastructural designDanilo Ardagna, Chiara Francalanci, Marco Trubian. 1431-1437 [doi]
- Scalable and lock-free concurrent dictionariesHåkan Sundell, Philippas Tsigas. 1438-1445 [doi]
- Using a hybrid Evolutionary-Taboo Algorithm to solve Job Shop ProblemJoão Paulo Caldeira, Fernando Melicio, Agostinho C. Rosa. 1446-1451 [doi]
- Editorial message: special track on the programming languagesChang-Hyun Jo, Marjan Mernik, Barrett R. Bryant. 1453-1454 [doi]
- FSM-Hume: programming resource-limited systems using bounded automataGreg Michaelson, Kevin Hammond, Jocelyn Sérot. 1455-1461 [doi]
- Controlling data movement in global computing applicationsDaniele Gorla, Rosario Pugliese. 1462-1467 [doi]
- Constructive negation by bottom-up computation of literal answersJavier Álvez, Paqui Lucio, Fernando Orejas. 1468-1475 [doi]
- Exploiting labels in Structural Operational SemanticsPeter D. Mosses. 1476-1481 [doi]
- A back-end for GHC based on categorical multi-combinatorsRicardo Massa Ferreira Lima, Rafael Dueire Lins, André L. M. Santos. 1482-1489 [doi]
- Approximating module semantics with constraintsFrancesco Logozzo. 1490-1495 [doi]
- Type-safe covariance in C++Vitaly Surazhsky, Joseph Gil. 1496-1502 [doi]
- Implementing the essence of reflection: a reflective run-time environmentMassimo Ancona, Walter Cazzola. 1503-1507 [doi]
- A core calculus of higher-order mixins and classesLorenzo Bettini, Viviana Bono, Silvia Likavec. 1508-1509 [doi]
- Editorial message: special track on software engineering: applications, practices, and toolsIbrahim K. El-Far, Chia-Chu Chiang, Stefan Gruner, Markus Montigel, Herbert H. Thompson. 1511-1512 [doi]
- Missing requirements and relationship discovery through proxy viewpoints modelSeok-Won Lee, David C. Rine. 1513-1518 [doi]
- A framework to simulate UML models: moving from a semi-formal to a formal environmentAlessandra Cavarra, Elvinia Riccobene, Patrizia Scandurra. 1519-1523 [doi]
- A portable virtual machine for program debugging and directingCamil Demetrescu, Irene Finocchi. 1524-1530 [doi]
- Translating the Object Constraint Language into the Java Modelling LanguageAli Hamie. 1531-1535 [doi]
- A relational approach to software metricsMarco Scotto, Alberto Sillitti, Giancarlo Succi, Tullio Vernazza. 1536-1540 [doi]
- A new approach to the BDI agent-based modelingChang-Hyun Jo, Guobin Chen, James Choi. 1541-1545 [doi]
- A control theory based framework for dynamic adaptable systemsJoão W. Cangussu, Kendra Cooper, Changcheng Li. 1546-1553 [doi]
- Aspect Oriented Programming for a component-based real life application: a case studyOdysseas Papapetrou, George A. Papadopoulos. 1554-1558 [doi]
- Modeling sociotechnical specifics using architectural conceptsMichael Cebulla. 1559-1563 [doi]
- Editorial message: special track on ubiquitous computingGeorge Roussos, George Samaras, Diomidis Spinellis. 1565-1566 [doi]
- Route profiling: putting context to workAnthony Harrington, Vinny Cahill. 1567-1573 [doi]
- Applications of context-aware computing in hospital work: examples and design principlesJakob Bardram. 1574-1579 [doi]
- Infotainment across access devices: the perceptual impact of multimedia QoSTacha Serif, Stephen R. Gulliver, George Ghinea. 1580-1585 [doi]
- A Ubiquitous Computing environment for aircraft maintenanceMatthias Lampe, Martin Strassner, Elgar Fleisch. 1586-1592 [doi]
- Trust enhanced ubiquitous payment without too much privacy lossJean-Marc Seigneur, Christian Damsgaard Jensen. 1593-1599 [doi]
- Fluid: supporting a transportable and adaptive web serviceI. Made Putera Pratistha, Arkady B. Zaslavsky. 1600-1606 [doi]
- Take me with you! : a case study of context-aware application integrating cyber and physical spacesKaori Fujinami, Tetsuo Yamabe, Tatsuo Nakajima. 1607-1614 [doi]
- Profile and context filtering of streaming data for a mobile personal assistantAlan Berfield, Jonathan Beaver, Panos K. Chrysanthis. 1615-1616 [doi]
- Editorial message: special track on web technologies and applicationsSara Comai, Marlon Dumas, Maristella Matera. 1617-1618 [doi]
- A Web services composition approach based on software agents and contextZakaria Maamar, Soraya Kouadri Mostéfaoui, Hamdi Yahyaoui. 1619-1623 [doi]
- Migration to web services oriented architecture: a case studyJia Zhang, Jen-Yao Chung, Carl K. Chang. 1624-1628 [doi]
- Using XML and related standards to support Location Based ServicesAnastasios Ioannidis, Manos Spanoudakis, Panos Sianas, Giannis Priggouris, Stathes Hadjiefthymiades, Lazaros F. Merakos. 1629-1633 [doi]
- Semantic enrichment for improving systems interoperabilityXiaomeng Su, Sari Hakkarainen, Terje Brasethvik. 1634-1641 [doi]
- Multilingual semantic elaboration in the DOSE platformDario Bonino, Fulvio Corno, Laura Farinetti, Andrea Ferrato. 1642-1646 [doi]
- Generating web-based systems from specificationsTue Becher Jensen, Terkel K. Tolstrup, Michael R. Hansen. 1647-1653 [doi]
- Trasformers-by-example: pushing reuse in conceptual web application modellingStephan Lechner, Michael Schrefl. 1654-1661 [doi]
- WebUml: reverse engineering of web applicationsCarlo Bellettini, Alessandro Marchetto, Andrea Trentini. 1662-1669 [doi]
- WARP: Web Application Rapid PrototypingMario A. Bochicchio, Nicola Fiore. 1670-1676 [doi]
- Towards increasing web application productivityJia Zhang, Jen-Yao Chung, Carl K. Chang. 1677-1681 [doi]
- An iterative rating method: application to web-based conference managementPhilippe Rigaux. 1682-1687 [doi]
- A study into the usability of e-encyclopaediasRuth Wilson, Julie Shortreed, Monica Landoni. 1688-1692 [doi]
- Cookies on-the-move: managing cookies on a smart cardAlvin T. S. Chan. 1693-1697 [doi]
- Design and implementation of component-based adaptive Web presentationsZoltán Fiala, Michael Hinz, Geert-Jan Houben, Flavius Frasincar. 1698-1704 [doi]
- Replica placement in adaptive content distribution networksSven Buchholz, Thomas Buchholz. 1705-1710 [doi]
- Enhanced object management for high performance web proxiesYen-Jen Chang, Yung-Ching Weng, Feipei Lai. 1711-1716 [doi]
- Adaptive data dissemination and caching for edge service architectures built with the J2EEErich Liebmann, Schahram Dustdar. 1717-1724 [doi]
- A learning-based approach for fetching pages in WebVigiLSharma Chakravarthy, Anoop Sanka, Jyoti Jacob, Naveen Pandrangi. 1725-1731 [doi]
- A service-oriented customizable Digital LibraryClaudia Di Napoli, Maurizio Giordano. 1730-1731 [doi]
- XVM: XML Virtual MachineQuanzhong Li, Michelle Y. Kim, Edward So, Steve Wood. 1732-1733 [doi]