Abstract is missing.
- Message from the Conference Co-chairs [doi]
- Message from the Program Chair [doi]
- Message from the SAWN 2006 Workshop Co-chairs [doi]
- SNPD 2006 Program Committee [doi]
- Decision Table Based Analysis of Trading ModelsRajeshwar Prasad Srivastava. 3-8 [doi]
- Transition from Requirements to Architecture: A Review and Future PerspectiveMatthias Galster, Armin Eberlein, Mahmood Moussavi. 9-16 [doi]
- A Three-Layer Model for Software Engineering MetricsKiumi Akingbehin, Bruce R. Maxim. 17-20 [doi]
- An NFR-Based Framework for Establishing Traceability between Enterprise Architectures and System ArchitecturesNary Subramanian, Lawrence Chung, Yeong-Tae Song. 21-28 [doi]
- Design Phase Analysis of Software Qualities Using Aspect-Oriented ProgrammingDaesung Park, Sungwon Kang, Jihyun Lee. 29-34 [doi]
- Improvement of Object Serialization in Java Remote Method InvocationHei Ning Helen Ma, Lan Yang. 35-42 [doi]
- Applying Dynamic Change Impact Analysis in Component-based Architecture DesignTie Feng, Jonathan I. Maletic. 43-48 [doi]
- Addressing Unbounded Parallelism in Verification of Software ComponentsJirí Adámek. 49-56 [doi]
- Transforming Linear Terms of Algebraic Specifications Into Extended PomsetsBastian Dolle. 57-64 [doi]
- From Stream Transformers to Moore State Transition Machines with Input and OutputWalter Dosch, Wuttipong Ruanthong, Annette Stümpel. 65-72 [doi]
- Reducing Test Cost and Improving Documentation In TDD (Test Driven Development)Taha Karamat, Atif Neuman Jamil. 73-76 [doi]
- An Extension to Robustness Slicing Algorithm Based on Dynamic ArrayYancheng Wang, Bixin Li, Xufang Gong. 77-84 [doi]
- Text Classification by Combining Different Distance Functions withWeightsTakahiro Yamada, Kyohei Yamashita, Naohiro Ishii, Kazunori Iwata. 85-90 [doi]
- Ontology-Based Knowledge Extraction-A Case Study of Software DevelopmentRuey-Shun Chen, Chan-Chine Chang, Isabel Chi. 91-96 [doi]
- A Distributed Flocking Approach for Information Stream Clustering AnalysisXiaohui Cui, Thomas E. Potok. 97-102 [doi]
- Identifying Critical Dependencies Using General Bayesian Network: An Application to Aviation OperationSung Woo Shin, Inwon Kang. 103-108 [doi]
- Network Intrusion Detection Through Genetic Feature SelectionChi-Hoon Lee, Jin-Wook Chung, Sung Woo Shin. 109-114 [doi]
- Using Data Mining Technology to improve Manufacturing Quality - A Case Study of LCD Driver IC Packaging IndustryRuey-Shun Chen, Kun-Chieh Yeh, Chan-Chine Chang, H. H. Chien. 115-119 [doi]
- Data Clustering of Tolerance Space in MATLABFu-Shing Sun, Chun-Hung Tzeng. 120-126 [doi]
- Flexible Metadata Management for Block-level Storage SystemJie Xiao, Dan Feng, Zhan Shi, Mengfei Cheng. 127-132 [doi]
- New Generalized Cellular Automata to a Class of Optimization ProblemsDianxun Shuai, Liangjun Huang, Qing Shuai. 133-138 [doi]
- A Wireless Grid Service Platform Using SIP and AgentsFang-Yie Leu, Tai-Shiang Wang. 139-144 [doi]
- Minimizing Multicast Communication Latency in WAN-Based EnvironmentKanchana Silawarawet, Natawut Nupairoj. 145-150 [doi]
- Routing Problems in Incomplete Pancake GraphsKeiichi Kaneko. 151-156 [doi]
- A Parallel Local Search Algorithm for Euclidean Steiner Tree ProblemRashid Bin Muhammad. 157-164 [doi]
- Design Issues in a Bare PC Web ServerLong He, Ramesh K. Karne, Alexander L. Wijesinha, Sandeep Girumala, Gholam H. Khaksari. 165-170 [doi]
- The global fault-tolerance of interconnection networksHovhannes A. Harutyunyan, Calin D. Morosan. 171-176 [doi]
- Offshore Outsourcing Bridge: Designing and Development A Model Applied Management Platform for Chinese Offshore OutsourcingLi Shiying, Luo Yi. 177-183 [doi]
- MyTwigStack: A Holistic Twig Join Algorithm with Effective Path Merging SupportDunren Che. 184-189 [doi]
- A Software Tool for Network Traffic AnalysisF. Sun, H. Tzeng. 190-196 [doi]
- Pupil and Iris Localization for Iris Recognition in Mobile PhonesDal Ho Cho, Kang Ryoung Park, Dae Woong Rhee, Yanggon Kim, Jonghoon Yang. 197-201 [doi]
- A Novel Generalized Particle Model for Lossless Data CompressionDianxun Shuai, Qing Shuai. 202-207 [doi]
- DCE-MRI Segmentation and Motion Correction Based on Active Contour Model and Forward MappingWenzhu Lu, Jianhua Yao, Chao Lu, Sheila Prindiville, Catherine Chow. 208-212 [doi]
- Target Classification and Pattern Recognition Using Micro-Doppler Radar SignaturesYinan Yang, Jiajin Lei, Wenxue Zhang, Chao Lu. 213-217 [doi]
- Face Recognition by Spatiotemporal ICA Using Facial Database Collected by AcSys FRS Discover SystemJiajin Lei, Chao Lu. 218-224 [doi]
- Broadcast with Hitch-hiking in Wireless Ad-Hoc Networks (Invited Talk Abstract)Gruia Calinescu. 225 [doi]
- Topology Control and Mobility Management in Mobile Ad Hoc Networks (Invited Talk Abstract)Fei Dai. 226 [doi]
- 2-Connected Dominating Set inWireless Networks (Invited Talk Abstract)My T. Thai. 227 [doi]
- AFlexible Framework for Wireless-Based Intelligent Sensor with Reconfigurability , Dynamic adding , and Web interfaceHung-Chieh Yu, Shu-Ming Tseng. 231-236 [doi]
- An Early Binding Fast Handover for High-Speed Mobile Nodes on MIPv6 over Connectionless Packet Radio LinkHocheal Kim, Youngtak Kim. 237-242 [doi]
- Node-Disjoint Multipath Routing and Distributed Cross-Layer QoS Guarantees in Mobile Ad hoc NetworksXuefei Li, Laurie G. Cuthbert. 243-248 [doi]
- An Effective Authentication Scheme in Mobile Ad Hoc NetworkKiho Shin, Yoonho Kim, Yanggon Kim. 249-252 [doi]
- A Graph Alorithm Based Approach to Recovery and Failover in Tactical ManetsDamian Watkins, Craig Scott, Darryn Randle. 253-260 [doi]
- DEEPS: Deterministic Energy-Efficient Protocol for Sensor networksDumitru Brinza, Alexander Zelikovsky. 261-266 [doi]
- Reliable Cost-based Data-centric Routing Protocol forWireless Sensor NetworksJian Wu, Paul J. M. Havinga. 267-272 [doi]
- Approximation Algorithm for Maximum Lifetime in Wireless Sensor Networks with Data AggregationJeffrey Stanford, Sutep Tongngam. 273-277 [doi]
- Cross-Layer Design and Optimization forWireless Sensor NetworksWeilian Su, Tat L. Lim. 278-284 [doi]
- Maximum Lifetime of Sensor Networks with Adjustable Sensing RangeAkshaye Dhawan, Chinh T. Vu, Alexander Zelikovsky, Yingshu Li, Sushil K. Prasad. 285-289 [doi]
- Deployment Algorithms and In-Door Experimental Vehicles for Studying Mobile Wireless Sensor NetworksMuhammad F. Mysorewala, Dan O. Popa, V. Giordano, Frank L. Lewis. 290-298 [doi]
- A Novel Approach of Requirements Analysis for Agent Based SystemPrabhat Ranjan, Arun Kumar Misra. 299-304 [doi]
- A Survey of Software Estimation Techniques and Project Planning PracticesMehwish Nasir. 305-310 [doi]
- A Dynamic and Self-study Language Model Oriented to Chinese Characters InputLi Pei-feng, Gu Ping, Zhu Qiao-Ming. 311-318 [doi]
- A QoS-aware Mobility Management MechanismMaher Kaddoura. 319-323 [doi]
- Verifying and Fixing Password Authentication ProtocolXiaoqi Ma, Rachel McCrindle, Xiaochun Cheng. 324-329 [doi]
- Data-Logging and Supervisory Control in Wireless Sensor NetworksAditya N. Das, Frank L. Lewis, Dan O. Popa. 330-338 [doi]
- Effects of Computer Competency on Usability and Learning Experience in Online Learning EnvironmentsGabriele Meiselwitz, Goran Trajkovski. 339-342 [doi]
- e- Oral: A Hypermedia Web Application for English Language Oral Exams within a Distance Education EnvironmentMa Eugenia Lopez, Laura Alba-Juez, Mónica Aragonés, Beatriz Molina. 343-348 [doi]
- Transitioning from e-Learning to m-Learning: Present Issues and Future ChallengesTsvetozar Georgiev, Evgeniya Georgieva, Goran Trajkovski. 349-353 [doi]
- A Web-based Cooperative Research Paper Edit SystemTakayuki Fujimoto, Tokuro Matsuo. 354-360 [doi]
- Using Tools in Teaching University Courses in Information TechnologyYulia Nemchinova, Hasan Sayani. 361-367 [doi]
- Semantic Web Service Modeling using UML for e-business environmentYan Ha, Roger Y. Lee. 368-374 [doi]
- Asynchronous Callback in Web ServicesKai Qian, Jigang Liu, Lixin Tao. 375-380 [doi]
- Preventing Attacks on Back-End Servers using Masquerading/HoneypotsTheodor Richardson. 381-388 [doi]
- Genetic Algorithms for Hunting Snakes in Hypercubes: Fitness Function Analysis and Open QuestionsPedro A. Diaz-Gomez, Dean F. Hougen. 389-394 [doi]
- Label-Based Access Control Policy Enforcement and ManagementWei Zhou, Vinesh H. Raja, Christoph Meinel, Munir Ahmad. 395-400 [doi]
- Development of a Honeynet Laboratory: a Case StudyMichael O Leary, Shiva Azadegan, Jay Lakhani. 401-406 [doi]
- A Role-based PMI Authentication Model and its ApplicationYanqin Zhu, Peide Qian, Yueqin Liu. 407-412 [doi]
- GSM Security Issues and ChallengesS. Muhammad Siddique, Muhammad Amir. 413-418 [doi]