Abstract is missing.
- Internet Mail Transfer and Check System Based on Intelligence Mobile AgentsLi Cheng, Wang Weinong. 2-3 [doi]
- Security in Mobile Agent SystemsAhmed Sameh Mohamed, Dalia Fakhry. 4-5 [doi]
- Collaboration among Agents in Logical Network of Peer-To-Peer ServicesTadashige Iwao, Yuji Wada, Shigeichiro Yamasaki, Masatoshi Shiouchi, Makoto Okada, Makoto Amamiya. 6-7 [doi]
- Incremental Hoarding and Reintegration in Mobile EnvironmentsAbdelsalam Helal, Abhinav Khushraj, Jinsuo Zhang. 8-11 [doi]
- A Single Authoring Programming Model: The Interaction LogicStéphane H. Maes. 12-13 [doi]
- The Design and Implementation of a Kernel Monitoring System for Network ServersYutaka Nakamura, Eiji Kawai, Shinji Shimojo, Suguru Yamaguchi, Hideki Sunahara. 14-15 [doi]
- Multicast over SatelliteHidetaka Izumiyama, Hiroyuki Kusumoto. 16-19 [doi]
- Implementation and Evaluation of Authorized Access LAN Sockets Using PPPoEHideo Masuda, Michio Nakanishi, Masahide Nakamura, Mio Suzuki. 20-25 [doi]
- A Knowledge Sharing System using XML Linking Language and Peer-to-Peer TechnologyHiroyuki Sato, Kenji Otomo, Tsuyoshi Masuo. 26-27 [doi]
- A VoiceXML Framework for Reusable Dialog ComponentsStéphane H. Maes. 28-30 [doi]
- A Proposed Net-space Service Using InfoLead Cruising Navigation TechnologyToru Kawamura, Atsushi Kanai, Kaku Take-Uchi, Tetsuyuki Mutou. 31-32 [doi]
- Experimental Results of Pattern-Based Automatic Program GeneratorMakoto Yoshida, Mitunori Sakamoto. 33-35 [doi]
- Mobile Commerce: Vision and ChallengesHui Lei. 36 [doi]
- Ubiquitous Commerce - Always On, Always Aware, Always Pro-activeAnatole Gershman. 37-38 [doi]
- DoCoMo s Vision on Mobile CommerceMasaki Kinoshita. 39-40 [doi]
- Technological and Business Challenges in Pervasive ComputingDik Lun Lee. 41-42 [doi]
- Mobile Commerce: Vision and Challenges (Location and its Management)George Samaras. 43-45 [doi]
- Knowledge Creation through Task Model and Information Organizing Method Using Images/Drawing ExpressionCalvin Woodworth, Hiroyuki Kojima. 46-53 [doi]
- The Internet EnterpriseAbdelsalam Helal, Stanley Y. W. Su, Jie Meng, Raja Krithivasan, Arun Jagatheesan. 54-63 [doi]
- Remote Attack Detection Method in IDA: MLSI-Based Intrusion Detection using Discriminant AnalysisMidori Asaka, Takefumi Onabuta, Tadashi Inoue, Shigeki Goto. 64-73 [doi]
- Design and Implementation of Unauthorized Access Tracing SystemShigeyuki Matsuda, Tatsuya Baba, Akihiro Hayakawa, Taichi Nakamura. 74-81 [doi]
- A New Intrusion Detection Method based on Process ProfilingYoshinori Okazaki, Izuru Sato, Shigeki Goto. 82-91 [doi]
- Adaptive Behaviors of Intelligent Agents based on Neural Semantic KnowledgeTianning Zhang, Stefan Covaci. 92-99 [doi]
- A Component-Based Approach for Integrating Mobile Agents Into the Existing Web InfrastructurePaulo Marques, Raul Fonseca, Paulo Simões, Luís Moura Silva, João Gabriel Silva. 100-108 [doi]
- Mobile Agents for QoS Tailoring, Control and Adaptation over the Internet: the ubiQoS Video on Demand ServicFrancesco Baschieri, Paolo Bellavista, Antonio Corradi. 109-118 [doi]
- Dynamic Configuration of Agent Migration Protocols for the InternetIchiro Satoh. 119-127 [doi]
- Introduction of the Content ID Forum (cIDf)Hideki Sakamoto, Hiroshi Yasuda. 128-131 [doi]
- Analysis and Improvement of HITS Algorithm for Detecting Web CommunitieSaeko Nomura, Satoshi Oyama, Tetsuo Hayamizu, Toru Ishida. 132-140 [doi]
- Contents-Independent EPSS for the Web siteYuko Ikehata, Toshio Souya, Yoshinori Hijikata. 141-149 [doi]
- XSLT Stylesheet Generation by Example with WYSIWYG EditingKouichi Ono, Teruo Koyanagi, Mari Abe, Masahiro Hori. 150-161 [doi]
- InfoLead - A New Concept for Cruising Navigation TechnologyKatsuya Arai, Tetsuyuki Mutou, Atsushi Kanai. 162-167 [doi]
- Discovering Empirical Laws of Web DynamicsKazumi Saito, Pat Langley. 168-175 [doi]
- On Updating in Very Short Time by Distributed Search EnginesNobuyoshi Sato, Minoru Uehara, Yoshifumi Sakai, Hideki Mori. 176-185 [doi]
- Connectedness Oriented Communication: Fostering a Sense of Connectedness to Augment Social RelationshipsKazuhiro Kuwabara, Takeshi Ohguro, Takumi Watanabe, Yoshihiro Itoh, Yuji Maeda. 186-193 [doi]
- Service Emergence based on Relationship among Self-Organizing EntitiesTomoko Itao, Tetsuya Nakamura, Masato Matsuo, Tatsuya Suda, Tomonori Aoyama. 194-203 [doi]
- X-VRML - XML Based Modeling of Virtual RealityKrzysztof Walczak, Wojciech Cellary. 204-213 [doi]
- Using Plain Base32 ASCII-Compatible Encoding in the Local Part of E-mail AddressesPei-Chi Wu. 214-219 [doi]
- Efficient Construction of Variable-Stride Multibit Tries for IP LookupSartaj Sahni, Kun Suk Kim. 220-229 [doi]
- Intelligent Internet Search Applications Based on VLSI Associative ProcessorsHuaiyu Xu, Yoshio Mita, Tadashi Shibata. 230-237 [doi]
- A Design of a Next Generation IX using MPLS TechnologyIkuo Nakagawa, Hiroshi Esaki, Kenichi Nagami. 238-245 [doi]
- A Virtual Overlay Network for Integrating Home ApplianceTatsuo Nakajima, Daiki Ueno, Eiji Tokunaga, Hiroo Ishikawa, Ichiro Satoh. 246-255 [doi]
- Inferring Traffic Flow Characteristics from Aggregated-Flow MeasurementMasato Tsuru, Tetsuya Takine, Yuji Oie. 256-261 [doi]
- Design and Evaluation of Dynamic Protocol Selection Architecture for Reliable MulticastKensuke Shibata, Koji Okamura, Keijiro Araki. 262-269 [doi]
- CAD-HOC: A CAD-Like Tool for Generating Mobility Benchmarks in Ad-Hoc NetworksSubodh Shah, Edwin Hernandez, Abdelsalam Helal. 270-280 [doi]