Abstract is missing.
- A Constant Time Optimal Routing Algorithm for Directed Double Loop NetworksBao-Xing Chen, Wenjun Xiao. 1-5
- Using Source-Code Analysis to Help End-User Programmers Create Dependable SoftwareGregg Rothermel. 3 [doi]
- Research on the Password Security Strengthening based on the Active-typed RhythmLu Feng, Zhang Yi. 6-11
- Software De-Pipelining TechniqueBogong Su, Jian Wang, Erh-Wen Hu, Joseph Manzano. 7-16 [doi]
- A Hybrid Genetic Algorithm Based on Simulated Annealing and Applications to Optimization and SAT ProblemsXinchao Zhao, Xiao-Shan Gao. 12-18
- Abstracting Stack to Detect Obfuscated Calls in BinariesArun Lakhotia, Eric Uday Kumar. 17-26 [doi]
- One Practical Range-Based Labeling Scheme for XML DocumentGuangming Xing, Jinhua Guo. 19-24
- WebUnify: An Ontology-based Web Site Organization and Publication Platform for Device AdaptationGuangzuo Cui, Fei Chen. 25-31
- Context-Sensitivity Matters, But Context Does NotJens Krinke. 29-35 [doi]
- IORAPE Framework : A Method to Specify Semantic Web ServicesLi Ying, Jin Zhi. 32-38
- Some Notes on Interprocedural Program SlicingKeith Brian Gallagher. 36-42 [doi]
- An Overview of Streaming VideoYongliang Liu, Wen Gao. 39-44
- Formalizing Executable Dynamic and Forward SlicingDavid Binkley, Sebastian Danicic, Tibor Gyimóthy, Mark Harman, Ákos Kiss, Lahcen Ouarbya. 43-52 [doi]
- Agent-Based Architectures of Web Database AccessYipeng Liu, Dunren Che. 45-52
- Improving Performance of Genetic Algorithm for Predictive Association Rule DiscoveryXiaoyuan Xu, Guoqiang Han, HuaQing Min. 53-58
- Control Flow Reversal for Adjoint Code GenerationUwe Naumann, Jean Utke, Andrew Lyons, Michael W. Fagan. 55-64 [doi]
- A Comparison of Partial Least Square Model and Neural Network ModelCarl Lee, Xiaomin Lu. 59-67
- Evolving Transformation Sequences using Genetic AlgorithmsDeji Fatiregun, Mark Harman, Robert M. Hierons. 66-75 [doi]
- Incremental Implementation of Distance-associated Join Indices for Dynamic Spatial Range QueriesYuqin Xiao, Ju Zhang, Ning Jing. 68-76
- Program Restructuring Through Clustering TechniquesXia Xu, Chung-Horng Lung, Marzia Zaman, Anand Srinivasan. 75-84 [doi]
- A Sensitive Sequence Comparison MethodXiaoqiu Huang, Liang Ye, I-Hsuan Yang, Kun-Mao Chao. 77-80
- Reverse Engineering of Multiple Time-delayed Gene Regulatory NetworksXia Li, Tianwen Zhang, Wei Jiang, Shaoqi Rao, Li Li, Zheng Guo. 81-88
- Amorphous Procedure ExtractionMark Harman, David Binkley, Ranjit Singh, Robert M. Hierons. 85-94 [doi]
- Feature Gene Selection Based on a Hybrid between Genetic Algorithm and Support Vector MachineLi Li, Wei Jiang, Wu Linna, Shaoqi Rao, Zheng Guo, Xia Li. 89-96
- Mining Aspectual Views using Formal Concept AnalysisTom Tourwé, Kim Mens. 97-106 [doi]
- An Improvement for Eulerian Path of AssemblyShenglan Peng, Minghua Deng, Minping Qian. 97-105
- An improved method for concept location during Program ComprehensionYong Jiang, Shaochun Xu. 106-111
- Adding Distribution to Existing Applications by Means of Aspect Oriented ProgrammingMariano Ceccato, Paolo Tonella. 107-116 [doi]
- A Risk Analysis Approach to Prioritize UML-Based Software TestingXiaoqing Bai, Huaizhong Li, Chiou Peng Lam. 112-119
- Specifying the Law of Demeter and C++ Programming Guidelines with FCLDaqing Hou, H. James Hoover, Piotr Rudnicki. 119-127 [doi]
- Case Studies of Constructivist Learning in Incremental Software Development and Software ReuseShaochun Xu, Yong Jiang. 120-127
- Clone Detection in Source Code by Frequent Itemset TechniquesVera Wahler, Dietmar Seipel, Jürgen Wolff von Gudenberg, Gregor Fischer. 128-135 [doi]
- Metamorphic Testing and Testing with Special ValuesTsong Yueh Chen, Fei-Ching Kuo, Ying Liu, Antony Tang. 128-134
- Cooperative Honeypot Model and ImplementationJuhou He, Xiuqing He, Weihua Li. 135-141
- Predicting Class Testability using Object-Oriented MetricsMagiel Bruntink, Arie van Deursen. 136-145 [doi]
- FDR verification of ESANP protocol in Ad hoc NetworkYoung Ah Ahn, Jin-Young Choi. 141-145
- An Immune CRT-Based Three-prime RSA cryptosystemYonghong Yang, Zine-Eddine Abid, Wei Wang. 146-151
- Executable Source Code and Non-Executable Source Code: Analysis and RelationshipsGregorio Robles, Jesús M. González-Barahona. 149-157 [doi]
- Using extended phylogenetc profiles and support vector machines for protein family classificationKishore Narra, Li Liao. 152-157
- Prediction of Protein Dispensability through Integrated Analysis of Multiple-Source High-Throughput DataYu Chen, Dong Xu. 158-166
- A CASE Tool Platform Using an XML Representation of Java Source CodeKatsuhisa Maruyama, Shinichiro Yamamoto. 158-167 [doi]
- Classification of Cancer Types Based on Decision Tree Analysis of Gene Function Expression ProfilesZheng Guo, Tianwen Zhang, Shaoqi Rao, Qi Wang, Hui Yu, Xia Li. 167-173
- Power and Mobility-aware Adaptive Dynamic Source Routing in MANETLi Xu, Bao-yu Zheng, Zhen Yang. 174-180
- Fast Update IPv6 Routing Lookup Based on Half-Stored BSPRHe-Ming Wang, Zhen-Xing Wang, Yan-Xiao Zhang. 181-187
- The Wavelet-based Fusion Model for Multi-resolution Satellite DataThitirat Wiyarat, Tiranee Achalakul. 188-194
- Payment-Based EmailDavid A. Turner, Ni Deng. 195-200
- A Reuse-Oriented Business Component Acquisition Method Based on Greatest Common Sub-ProcessZhongjie Wang, Xiaofei Xu, De-chen Zhan. 201-208
- Design of Component-Based Software Process Assistance and Improvement Tools using Software Process Engineering MetamodelShuo Wu, Chaoying Wu, Bosheng Zhou. 209-216
- Congestion Pricing for Efficient use of the Internet InfrastructureSungchul Hong, Yeong-Tae Song, Seonsu Ji. 217-227
- A New Approach to Requirements Elicitation ProcessRoger Y. Lee, Gopalakrishnan Ramamurthi, Haeng-Kon Kim, Hae Sool Yang. 226-233
- Self-Organizing Map as a Tool in Maintenance-oriented DecisionXihan Qian, Uwe Meinberg, Steffen Müller. 234-240
- An Image Retrieval System Based on Patient Data and Image ContentDaniel Wang, Carl Lee, R. H. Mehta, Joni Kaiser, Marilyn Bott. 241-246
- An Algorithm for Segmenting Handwritten Squared-Shape CharactersHan Zhang, Chao Lu. 247-251
- Automated extracting code fragments that implement Security functionality from source programsYong Yang, Hee Beng Kuan Tan. 252-258
- Design and Implementation of the Java Oolong-to-.NET MSIL IL TranslatorYang-Sun Lee, Ji-Hoon Jung. 259-265
- Design and Implementation of the .NET MSIL-to-Java Oolong IL Translator for Embedded SystemsYang-Sun Lee, Sung-Kyou Che. 266-273
- GML Based Ubiquitous WebGISYingwei Luo, Baoqi Huang, Jiangong Xu, Xiaolin Wang, Zhuoqun Xu. 274-281
- A Proactive Web Browsing AgentHongen Lu. 282-287
- WCBS: An Case Study of MVC DiagramsChong-Wei Xu, Chieu Wang, Bohan Huang. 287-291
- A Web-based Spatial Decision Support System: WebPolisYichun Xie. 292-299
- A fuzzy approach to selecting information systems projectsHepu Deng, Santoso Wibowo. 300-305
- Research and Design on A Versatile Secure Architecture Model for Active NetworkLu Feng, Guo Jing. 306-311
- Inducing Symmetrically Connected, All-Node Subgraphs from the Crossed CubeDajin Wang. 312-319
- Analytic Results on the Performance of Service Systems with Different ParametersWenying Feng. 320-326
- Addressing State Explosion in Behavior Protocol VerificationMartin Mach, Frantisek Plasil. 327-333
- Integrating Formal Techniques into Eclipse PlatformJiang Guo, Raj Pamula. 334-341
- Design Patterns for Web ServicesKai Qian, Orlando Karam, Jorge Diaz, Jigang Liu. 342-348
- Cryptanalysis on a Blind Signature Scheme Based on ElGamal SignatureYingjie Wang, Jianhua Li, Lei Fan. 349-351
- Modeling and Verifying Cryptographic Protocols Using SPIN/PromelaXiao Mei-hua, Xue Jin-yun. 352-358
- Realizing Restricted Delegation Using Attribute Certificates in Grid EnvironmentsWenbao Jiang, Hua Song, Yiqi Dai. 359-365
- Adding Multiple Paths Capabilities in a User-Level Shared-Disk File SystemRui-yong Jia, Yan-yuan Zhang, Yong Feng, Zhong-hua Li. 366-372
- Agent-based Spatial Information Collaboration and Parallel MechanismsYingwei Luo, Xiaolin Wang, Zhuoqun Xu. 373-380
- A Silicon-based Approach of Molecular ComputingWen Yu, Weimin Zheng. 381-386
- The Design and Realization of the 3D Visualization System Based on HLAJia Lianxing, Wang Lin, Xuan Guomin, Xing Xiaoping, Zhu Yinghao, Shan Weifeng. 387-391
- Model Management and Analogical Reasoning in Decision Support SystemsHarry Zhou. 392-396
- Design and Implementation of Real-Time OXCSwitch Monitor and Analyzer for GLASS Optical Network SimulatorXiaoyun Zhao, Yanggon Kim, Yeong-Tae Song, Bonghee Moon. 397-404
- Facile Flow Switching Based on Packet-By-Packet ReserveHe-Ming Wang, Zhen-Xing Wang, Yan-Xiao Zhang. 405-411
- Intelligent Content-Based Routing for Enhanced Internet ServicesSylvanus A. Ehikioya, Jayaraman Suresh, Jose A. Rueda. 412-419
- Evolution Knowledge of Semantic Web in Personified Home ApplicationXuhui Chen, Huiyan Cheng, Yimin Wang. 420-428