Abstract is missing.
- Stopping Criterion Selection for Efficient Semi-supervised Time Series ClassificationChotirat Ann Ratanamahatana, Dachawut Wanichsan. 1-14 [doi]
- Enhancing the Blockage of Spam over Internet Telephony (SPIT) Using Adaptive PMG AlgorithmJinyoung Ahn, Vijay Shyamasundar, Yeong-Tae Song. 15-26 [doi]
- Spatio-temporal Facial Expression Recognition Using Optical Flow and HMMGihan Shin, Junchul Chun. 27-38 [doi]
- An Approach for Anomaly Intrusion Detection Based on Causal Knowledge-Driven Diagnosis and DirectionMahmoud Jazzar, Aman Jantan. 39-48 [doi]
- Challenges Relating to RFID Implementation within the Electronic Supply Chain Management - A Practical ApproachBelal Chowdhury, Morshed U. Chowdhury, Clare D Souza. 49-59 [doi]
- Design and Implementation of Clustering File Backup Server Using File FingerprintHo Min Sung, Wan Yeon Lee, Jin Kim, Young Woong Ko. 61-73 [doi]
- Aspect Oriented Testing Frameworks for Embedded SoftwareHaeng-Kon Kim. 75-88 [doi]
- Analysis on Malicious Peer s Behavior of the P2P Trust Resource Chain ModelSinjae Lee, Shaojian Zhu, Yanggon Kim, Juno Chang. 89-102 [doi]
- Information Technology Service Management: A Thailand PerspectiveMontri Lawkobkit. 103-111 [doi]
- A New Artificial Immune System for the Detection of Abnormal BehaviourRachid El Meziane, Ilham Berrada, Ismail Kassou. 113-122 [doi]
- Markov Chain Analysis of Genetic Algorithms Applied to Fitness Functions Perturbed by Multiple Sources of Additive NoiseTakéhiko Nakama. 123-136 [doi]
- A Security Supervision System for Hybrid NetworksFrançoise Sailhan, Julien Bourgeois, Valérie Issarny. 137-149 [doi]
- Cost Minimization in Service Systems Using Particle Swarm OptimizationTad Gonsalves, Kiyoshi Itoh. 151-161 [doi]
- MS2Web: Applying MDA and SOA to Web ServicesHaeng-Kon Kim, Roger Y. Lee. 163-180 [doi]
- Security Analysis of One Verifiable Encryption SchemeLihua Liu, Zhengjun Cao. 181-187 [doi]
- Proactive Fault Management with Virtualization for Software AgingThandar Thein, Sung-Do Chi, Jong Sou Park. 189-200 [doi]
- A Preemption Control Technique for System Energy Minimization of Weakly Hard Real-Time SystemsSmriti Agrawal, Rama Shankar Yadav, Ranvijay. 201-215 [doi]
- Text Classification by Relearning and Ensemble ComputationNaohiro Ishii, Takahiro Yamada, Yongguang Bao. 217-226 [doi]
- Analysis of Agents Cooperation in RoboCupRescue SimulationKazunori Iwata, Nobuhiro Ito, Kuniyoshi Toda, Naohiro Ishii. 227-236 [doi]
- A Data Mining Approach for Predicting Reliable Path for Congestion Free Routing Using Self-motivated Neural NetworkB. Chandra Mohan, R. Sandeep, D. Sridharan. 237-246 [doi]
- A Formal Specification of UML Class and State DiagramsGongzhu Hu. 247-257 [doi]