Abstract is missing.
- An Efficient Key Distribution Method Applying to OMA DRM 2.0 with Device IdentifierZonghua Liu, Guangqing Liu, Byungwook Lee. 3-7 [doi]
- Classification of Facial Expression Using SVM for Emotion Care Service SystemByungsung Lee, Junchul Chun, Peom Park. 8-12 [doi]
- Comparison of the Mechanisms of the Zigbee s Indoor Localization AlgorithmAngela Song-Ie Noh, Woong Jae Lee, Jin Young Ye. 13-18 [doi]
- Managing Quality Level for Developing Information Security System Adopting QFDPauline Kongsuwan, Sangmun Shin, Myeonggil Choi. 19-24 [doi]
- Multidisciplinary Design Approach Using Repetitive Response Surface Enhancement and Global OptimizationKwon-Su Jeon, Jae-Woo Lee, Yung-Hwan Byun. 25-28 [doi]
- Neural Net Water Level Trend Prediction and Dynamic Water Level Sampling FrequencySteven P. Sweeney, Sehwan Yoo, Albert Chi, Frank Lin, Taikyeong Jeong, Sengphil Hong, Sam Fernald. 29-37 [doi]
- A Novel Method for All Solutions SAT ProblemXiuqin Wang, Guangsheng Ma, Hao Wang. 41-45 [doi]
- A Tabu Search and Ant Colony System Approach for the Capacitated Location-Routing ProblemLyamine Bouhafs, Amir Hajjam, Abderrafiaa Koukam. 46-50 [doi]
- An Adaptive Performance Management Method for Failure DetectionKe Liang, Xingshe Zhou, Kailong Zhang, Ruiqing Sheng. 51-56 [doi]
- Combined Fuzzy State Q-learning Algorithm to Predict Context Aware User Activity under Uncertainty in Assistive EnvironmentMohamed Ali Feki, Sang Wan Lee, Z. Zenn Bien, Mounir Mokhtari. 57-62 [doi]
- New Approaches for Software Watermarking by Register AllocationHakun Lee, Keiichi Kaneko. 63-68 [doi]
- Placing a Liaison between Two Members of the Same Level in an Organization Structure of a Complete Binary TreeKiyoshi Sawada. 69-72 [doi]
- Study on Ontology Partition Based on Ant Colony AlgorithmZhang Lei, Xia Shixiong, Xia Zhanguo, Zhou Yong. 73-78 [doi]
- The Complexity of the Evolution of Graph LabelingsGeir Agnarsson, Raymond Greenlaw, Sanpawat Kantabutra. 79-84 [doi]
- The Complexity of the Grid Wireless Mobility ModelSanpawat Kantabutra, Pattama Longani. 85-90 [doi]
- A Comparison of Iterative Repair Strategies for Earth Observing Satellites Imaging SchedulingGuo Yu-hua, Jing Ning, Li Jun, Wang Jun. 93-98 [doi]
- A Formal Approach for Design of Agent Based Earthquake Management System (EMS)Sarmad Sadik, Alade Rahman, Arshad Ali, Hafiz Farooq Ahmad, Hiroki Suguri. 99-104 [doi]
- A New Classifier to Deal with Incomplete DataJun Wu, Yo Seung Kim, Chi-Hwa Song, Won Don Lee. 105-110 [doi]
- A Sound and Complete Reified Temporal LogicGuoxing Zhao, Jixin Ma, Fuxing Shen, Miltos Petridis. 111-116 [doi]
- Application of Multi-layer Feed-forward Neural Network in Fault Diagnosis Based on FBP AlgorithmZhang Bin, Yan Jun, Zhang Wei. 117-120 [doi]
- Clustering ICT Indicators of Bhutan using Two Level HSOM AlgorithmTshering, Somjit Arch-int. 121-127 [doi]
- Comparison of Direct and Incremental Genetic Algorithm for Optimization of Ordinal Fuzzy ControllersKhairulmizam Samsudin, Faisul Arif Ahmad, Syamsiah Mashohor, Norfadzilah Mohd Latif. 128-134 [doi]
- Lipschitz Continuity of Approximate ReasoningTakashi Mitsuishi, Takanori Terashima, Toshimichi Homma, Yasunari Shidama. 135-140 [doi]
- On Relaxing and Steady State Genetic Methods for Satellite Imaging SchedulingJin Xiao-shan, Li Jun, Jing Ning. 141-146 [doi]
- The Study of a Financial Crisis Prediction Model based on XBRLFengyi Lin, Deron Liang, Shih-Jung Chiu. 147-153 [doi]
- Reinforcement Distribution in a Team of Cooperative Q-learning AgentsZahra Abbasi, Mohammad Ali Abbasi. 154-160 [doi]
- A New Vocoder based on AMR 7.4kbit/s Mode in Speaker Dependent Coding SystemVu Thi Lan Huong, Byung-Jae Min, Dong-Chul Park, Dong-Min Woo. 163-167 [doi]
- AINAN: Collaborative Application for Protein Visualization & AnalysesRauf Malick, Usama Khanzada, Athar Abbas, Waheed Iqbal, Kamran Azim. 171-175 [doi]
- A New PAPR Reduction Technique for OFDM-WLAN in 802.11a SystemsChusit Pradabpet, K. Eupree, S. Chivapreecha, Kobchai Dejhan. 179-184 [doi]
- A Two-Dimensionality Model for Providing End-to-End QoS CACJiazheng Wang, Xiuhua Fu. 185-189 [doi]
- Analytical Modeling of Task Scheduling for Master-Slave Super Hypercube ArchitectureMaryam Amiripour, Hamid Abachi. 190-194 [doi]
- Consideration of User Preference on Internet-based Overlay NetworkTaewan Gu, Jae-Bong Yoo, Chan Young Park. 195-200 [doi]
- Design of a Network Coverage Analyzer for Roadside-to-Vehicle Telematics NetworksJunghoon Lee. 201-205 [doi]
- LMCM: Layered Multiple Chaining Model for Authenticating Multicast StreamsJinxin He, Gaochao Xu, Xiaodong Fu, Zhiguo Zhou, Jianhua Jiang. 206-211 [doi]
- Mathematical Modelling for the Design of an Edge RouterPartha Bhattacharjee, Goutam Sanyal. 212-217 [doi]
- Message Sequence Charts to Specify the Communicating Threads for Concurrent Discrete Wavelet Transform Based Image Compression and a Verification AnalysisKamrul Hasan Talukder, Koichi Harada. 218-225 [doi]
- Neuro Fuzzy Model Predictive Control of AQM Networks Supporting TCP FlowsA. R. Maghsoudlou, R. Barzamini, S. Soleimanpour, J. Jouzdani. 226-230 [doi]
- Prolonging Sensor Network Lifetime with Initial Energy Level AssignmentLijie Ren, Zhongwen Guo, Renzhong Ma. 231-236 [doi]
- Routing in General Incomplete Star Interconnection NetworkBao-Xing Chen, Wenjun Xiao. 237-240 [doi]
- Towards Formal Modeling and Analysis of Networks of Embedded Medical Devices in Real-Time MaudePeter Csaba Ölveczky. 241-248 [doi]
- An MDA Approach to Byte Code Level Cross-CompilationArno Puder, Sascha Häberling, Rainer Todtenhoefer. 251-256 [doi]
- Customer Value-based HW/SW Partitioning Decision in Embedded SystemsNeunghoe Kim, Taek Lee, Dong-hyun Lee, Keun Lee, Hoh Peter In. 257-262 [doi]
- Early-Life Cycle Reuse Approach for Component-Based Software of Autonomous Mobile Robot SystemDayang N. A. Jawawi, Safaai Deris, Rosbi Mamat. 263-268 [doi]
- The Implementation and Execution Framework of a Role Model Based Language, EpsilonJSupasit Monpratarnchai, Tamai Tetsuo. 269-276 [doi]
- A Multisecret Sharing Threshold SchemeYanyan Zhang. 279-284 [doi]
- A Practical Certified E-Mail System with Temporal Authentication Based on Transparent TSSDongmei Liu, Sihan Qing, Pengfei Li, ChunYang Yuan. 285-290 [doi]
- Effect of Security Increment to Symmetric Data Encryption through AES MethodologyMd. Nazrul Islam, Md. Monir Hossain Mia, Muhammad F. I. Chowdhury, M. A. Matin. 291-294 [doi]
- An Improved ID-based Restrictive Partially Blind Signature SchemeShangping Wang, Pei Han, Yaling Zhang, Xiaofeng Wang. 295-300 [doi]
- DHA-KD: Dynamic Hierarchical Agent Based Key Distribution in Group CommunicationM. Amir Moulavi, Jalal A. Nasiri, Behnam Bahmani, Hossein Parvar, M. Sadeghizadeh, Mahmoud Naghibzadeh. 301-306 [doi]
- Improved Nonce Construction Scheme for AES CCMP to Evade Initial Counter PredictionMansoor Ahmed Khan, Ahmad Raza Cheema, Aamir Hasan. 307-311 [doi]
- Malicious Code Detection Architecture Inspired by Human Immune SystemMohd Fadzli Marhusin, David Cornforth, Henry Larkin. 312-317 [doi]
- Modular Matrix Cipher and Its Application in Authentication ProtocolBao Ngoc Tran, Thuc Dinh Nguyen. 318-323 [doi]
- Multi-signers Strong Designated Verifier Signature SchemeYaling Zhang, Jing Zhang, Yikun Zhang. 324-328 [doi]
- Security Analysis of Micali s Fair Contract Signing Protocol by Using Coloured Petri NetsPanupong Sornkhom, Yongyuth Permpoontanalarp. 329-334 [doi]
- Security Enhancements for Privacy and Key Management Protocol in IEEE 802.16e-2005Ayesha Altaf, M. Younus Javed, Attiq Ahmed. 335-339 [doi]
- Type Flaw Attacks and Prevention in Security ProtocolsJuan Wang, Jingwei Zhang, Huanguo Zhang. 340-343 [doi]
- Vulnerabilities Exposing IEEE 802.16e Networks to DoS Attacks: A SurveySheraz Naseer, Muhammad Younus, Attiq Ahmed. 344-349 [doi]
- Vulnerabilities of UMTS Access Domain Security ArchitectureMuzammil Khan, Attiq Ahmed, Ahmad Raza Cheema. 350-355 [doi]
- A Photonic-based Random Number Generator for Cryptographic ApplicationN. M. Thamrin, G. Witjaksono, A. Nuruddin, M. S. Abdullah. 356-361 [doi]
- A Feature Selection for Malicious DetectionYingxu Lai. 365-370 [doi]
- A Study of Classification Algorithm for Data Mining Based on Hybrid Intelligent SystemsGang Wang, Chenghong Zhang, Lihua Huang. 371-375 [doi]
- A Two-Stage Clustering Algorithm for Multi-type Relational DataYing Gao, Da-you Liu, Cheng-min Sun, He Liu. 376-380 [doi]
- An Effective Method for Chinese Related Queries RecommendationShen Xiaoyan, Cheng Bo, Chen Junliang, Meng Xiangwu. 381-386 [doi]
- Decision Tree-Based Model for Automatic Assignment of IT Service Desk Outsourcing in Banking BusinessPadej Phomasakha Na Sakolnakorn, Phayung Meesad. 387-392 [doi]
- Detecting Semantic Mapping of Ontologies with Inference of Description LogicWenhui Ma, Guangping Xu, Gang Wang, Jing Liu. 393-398 [doi]
- Improve Frequent Closed Itemsets Mining over Data Stream with BitmapHaifeng Li, Hong Chen. 399-404 [doi]
- Mining Approximate Closed Frequent Itemsets over StreamHaifeng Li, Zongjian Lu, Hong Chen. 405-410 [doi]
- Adaptive Evolvement of Query Plan Based on Low Cost in Dynamic Grid DatabaseNaijing Hu, Yuan Luo, Yingying Wang. 411-415 [doi]
- Prioritizing Default Rules Embedded in Description Logic Knowledge BaseShaohua Liu, Junsheng Yu, Yinglong Ma, Xu Zhang, Xiaoming Liu, Hansheng Su. 416-421 [doi]
- Stock Price Time Series Prediction using Neuro-Fuzzy with Support Vector Guideline SystemPhayung Meesad, Tong Srikhacha. 422-427 [doi]
- Using Social Network Analysis to Better Understand the Dependencies in UML Use Cases CollectionPhanarut Srichetta, Songsri Tangsripairoj. 428-433 [doi]
- Privacy Preserving of Associative Classification and Heuristic ApproachNattapon Harnsamut, Juggapong Natwichai, Bowonsak Seisungsittisunti. 434-439 [doi]
- A Sequential Pattern Mining Algorithm Based on Improved FP-treeYi Sui, Fengjing Shao, RenCheng Sun, JinLong Wang. 440-444 [doi]
- E Commerce - Forward and Reverse Auction - A Managerial Tool to Succeed over Business CompetitivenessD. Ganguly, Samit Chakraborty. 447-452 [doi]
- Meta-heuristic Enabled MAS Optimization in Supply Chain ProcurementXia Zhanguo, Wang Ke, Wang Zhixiao. 453-458 [doi]
- ICLS : Intelligent Cricket-based Location Tracking System Using Sensor FusionHo Min Jung, Byung Ki Kim, Wan Yeon Lee, Young Woong Ko. 461-466 [doi]
- Specifying and Verifying Timing Properties of a Time-triggered Protocol for In-vehicle CommunicationBo Zhang. 467-472 [doi]
- A Genetic Algorithm-aided Hidden Markov Model Topology Estimation for Phoneme Recognition of Thai Continuous SpeechPattana Bhuriyakorn, Proadpran Punyabukkana, Atiwong Suchato. 475-480 [doi]
- A New Auto-Focusing Method Based on WBDCT for Many Object SituationsKe Han, Xue-Mei Jiang, Quan Feng, Xiu-chang Zhu. 481-484 [doi]
- A Novel Voice Morphing System Using Bi-GMM for High Quality TransformationNing Xu, Xi Shao, Zhen Yang. 485-489 [doi]
- A Secure Scheme for Image TransformationSamir Kumar Bandyopadhyay, Debnath Bhattacharyya, Debashis Ganguly, Swarnendu Mukherjee, Poulami Das. 490-493 [doi]
- Efficient Object Recognition Using Parametric Eigenspace under Influence of Noise and OcclusionPravinkumar S. Revankar, Prabir Kumar Biswas, Sonali N. Deshpande. 494-500 [doi]
- Image Preprocessing and Trajectory Feature Extraction based on Hidden Markov Models for Sign Language RecognitionDuong Van Hieu, Supot Nitsuwat. 501-506 [doi]
- Modified Method for Denoising Color Images using Fuzzy ApproachMadhu S. Nair, M. Wilscy. 507-512 [doi]
- Novelty towards Hybrid Segmentation of Coronary Artery in CT Cardiac ImagesValliappan Raman, Patrick Then. 513-516 [doi]
- Static Hand Gesture Recognition and its Application based on Support Vector MachinesYun Liu, Zhijie Gan, Yu Sun. 517-521 [doi]
- Face Detection Based on Skin Gaussian Model and KL TransformWang Chuan-xu, Li Zuo-yong. 522-525 [doi]
- Face Detection using BP Network Combined with Gabor Wavelet TransformWang Chuan-xu, Li Xue. 526-529 [doi]
- A New Kind of Super-Resolution Reconstruction Algorithm Based on the ICM and the Constrained Cubic Spline InterpolationZhang Xiang-guang. 530-534 [doi]
- Background Subtraction Enhancement using SegmentationKyongil Yoon. 535-540 [doi]
- Information Value Evaluation Model for ILMHai Jin, Muzhou Xiong, Song Wu. 543-548 [doi]
- SMILE Visualization with Flash TechnologiesAnucha Tungkasthan, Pittaya Poompuang, Wichian Premchaiswadi. 551-556 [doi]
- Bring Precision and Access Control to Business Document SearchSomchai Chatvichienchai, Katsumi Tanaka. 557-562 [doi]
- Byte Code Transformations using XSL StylesheetsArno Puder. 563-568 [doi]
- COS: A Frame Work for Clustered off-line SearchSree Harsha Totakura, S. Venkata Nagendra, Rohit Indukuri, V. Vijayasherly. 569-573 [doi]
- Image Authentication Schemes against Key-Logger SpywareM. N. Doja, Naveen Kumar. 574-579 [doi]
- Information Flow based Ontology MappingYe Liang, Hong Bao, Hongzhe Liu. 580-585 [doi]
- Multi-Agent System Model of a BitTorrent NetworkEnrique Costa-Montenegro, Juan C. Burguillo-Rial, Pedro S. RodrÃguez-Hernández, Francisco J. González-Castaño, Maria Curras-Parada, Patricia Gomez-Rana, Juan P. Rey-Souto. 586-591 [doi]
- A Crossover Game Routing Algorithm for Wireless Multimedia Sensor NetworksZongwu Ke, Layuan Li, Nianshen Chen. 595-599 [doi]
- Accuracy of an Icing On-line Monitoring SystemHuang Xinbo, Sun Qindong. 600-604 [doi]
- Adaptive Self-Organizing Overlay Network for Car-to-Car CommunicationsMikio Aoyama, Hiroshi Takeichi. 605-610 [doi]
- Multicasting Support for NEMO based on ODMRPSeong-Yee Phang, Chee-Min Yeoh, Hoonjae Lee, Hyotaek Lim. 611-616 [doi]
- QoS Protocol Verification using Petri-Net for Seamless Mobility in a Ubiquitous Environment: A Case StudyDalju Lee, Jongmoon Baik. 617-622 [doi]
- The Upper Bound of Coverage on Fixed Energy Budget in Wireless Sensor NetworksFang Wang, Lisheng Ren, Guifa Teng. 623-626 [doi]
- Omni-Directional Antenna for Wireless Access PointSuwat Pattamavorakun, Wuttipol Wanarsup, Suwarin Pattamavorakun. 627-632 [doi]
- A New Hybrid Farsi Text Summarization Technique Based on Term Co-Occurrence and Conceptual Property of the TextAzadeh Zamanifar, Behrouz Minaei-Bidgoli, Mohsen Sharifi. 635-639 [doi]
- Collation Strategy Based on Heuristics Chart for Myanmar LanguageYuzana, Khin Marlar Tun. 640-645 [doi]
- A New Model of Mine Hoist Fault Diagnosis Based on the Rough Set TheoryXia Zhanguo, Wang Zhixiao, Wang Ke, Guan Hongjie. 649-654 [doi]
- An Automated Decision System for Computer Adaptive Testing Using Genetic AlgorithmsM. Phankokkruad, K. Woraratpanya. 655-660 [doi]
- Classification of Bio-Optical Signals using Soft Computing ToolsG. Subramanya Nayak, C. Puttamadappa, Akshata Kamath, B. Raja Sudeep, K. Kavitha. 661-663 [doi]
- Design of MLP using Evolutionary Strategy with Variable Length ChromosomesAbbas Sarraf Shirazi, Tahereh Seyedena. 664-669 [doi]
- Equalization for a Wireless ATM Channel with a Recurrent Neural Network Pruned by Genetic AlgorithmDong-Chul Park. 670-674 [doi]
- ESnapII: A Writable Dependent Snapshot System with Shared CacheGuangjun Xie, Lu Qi, Feng Wang, Gang Wang, Xiaoguang Liu, Jing Liu. 677-682 [doi]
- A Formal Model of Dynamic Resource Allocation in Grid Computing EnvironmentLeila Ismail, Bruce Mills, Alain Hennebelle. 685-693 [doi]
- A Visualization Portal for a Tsunami Warning System on a Distributed EnvironmentPemjit Aphimaeteethomrong, Veera Muangsin. 694-699 [doi]
- Aggregate Congestion Control for Peer-to-Peer File Sharing ApplicationsWei Li, Shanzhi Chen, YaNing Liu, Xin Li. 700-705 [doi]
- An Efficient Parallel Eye Detection Algorithm on Facial Color ImagesJalal A. Nasiri, M. Amir Moulavi, Sepideh Nazemi Gelyan, Hossein Deldari, H. Sadoghi Yazdi, A. Eshghi Shargh. 706-711 [doi]
- An Optimal Data Center Availability and Investment Trade-OffsMontri Wiboonrat. 712-719 [doi]
- Fast Preemptive Task Scheduling Algorithm for Homogeneous and Heterogeneous Distributed Memory SystemsMaruf Ahmed, Sharif M. H. Chowdhury, Masud Hasan. 720-725 [doi]
- Implementation of Parallel Algorithms for LUC CryptosystemZulkarnain Md Ali, Mohamed Othman, Mohd Rushdan Mohd Said, Md Nasir Sulaiman. 726-731 [doi]
- Parallel Implementation of the Novel Approach to Genome AssemblyJacek Blazewicz, Marta Kasprzak, Aleksandra Swiercz, Marek Figlerowicz, Piotr Gawron, Darren Platt, Lukasz Szajkowski. 732-737 [doi]
- Model Checking for Web Service Flow Based on Annotated OWL-SRujuan Liu, Changjun Hu, Chongchong Zhao. 741-746 [doi]
- Web Services Communication Model in Telecom DomainCheng Bo, Shen Xiaoyan, Meng Xiangwu, Chen Junliang. 747-752 [doi]
- An Ensemble of Complexity Metrics for BPEL Web ProcessesReza Meimandi Parizi, Abdul Azim Abdul Ghani. 753-758 [doi]
- A Preliminary Study on Portable Interceptor Mechanism to SOAPChen-Liang Fang, Deron Liang, Fengyi Lin, Chien-Cheng Lin. 759-764 [doi]
- Enhancing Service-Side QoS Monitoring for Web ServicesNatee Artaiam, Twittie Senivongse. 765-770 [doi]
- A Review of Software Risk Management for Selection of Best Tools and TechniquesMd. Forhad Rabbi, Khan Olid Bin Mannan. 773-778 [doi]
- A Z-Specification of Classification and Relationships between UsecasesDurga Prasad Kakollu, B. D. Chaudhary. 779-784 [doi]
- An Alternative Model for ERP Maintenance StrategyMuhammad Rofi Imtihan, Mohd. Salihin Ngadiman, Habibollah Haron. 785-793 [doi]
- An Application Generator FrameletInggriani Liem, Yohanes Nugroho. 794-799 [doi]
- An Approach to Modeling Software SafetyM. Ben Swarup, P. Seetha Ramaiah. 800-806 [doi]
- Architecture-aware Partial Order Reduction to Accelerate Model Checking of Networked ProgramsCyrille Artho, Watcharin Leungwattanakit, Masami Hagiya, Yoshinori Tanabe. 807-813 [doi]
- Conceptual Modeling for Safety Critical Computer SystemsP. Seetha Ramaiah, M. Ben Swarup, K. Raja Kumar. 814-819 [doi]
- Eclipse Project and Resource Tracking Plug-inKevin Li, Dwight Deugo. 820-827 [doi]
- Identification and Extraction of Design Pattern Information in Java ProgramChengwan He, Zheng Li, Keqing He. 828-834 [doi]
- Research on UML-based Modeling of Workflow Manage SystemGuan Hongjie, Meng Fan-rong, Xia Zhanguo. 835-839 [doi]
- Software Engineering Issues in Developing a Context-aware Exhibition Guide SystemJongmyung Choi, Hyun-Joo Moon. 840-845 [doi]
- The Prototype of the Massive Events Streams Service Architecture and its ApplicationKyungeun Park, Yanggon Kim, Juno Chang, Dae Woong Rhee, JinKyu Lee. 846-851 [doi]
- Tools and Techniques for Model Checking Networked ProgramsCyrille Artho, Watcharin Leungwattanakit, Masami Hagiya, Yoshinori Tanabe. 852-857 [doi]
- Multi Readers Detection in Adaptive RFID MiddlewareSiti Zaiton Mohd. Hashim, Mardiyono, Wan M. N. Wan-Kadir, Nurulhaini Anuar. 858-863 [doi]
- A Comparative Evaluation of Tests Generated from Different UML DiagramsSupaporn Kansomkeat, Jeff Offutt, Aynur Abdurazik, Andrea Baldini. 867-872 [doi]
- Finding Causes of Software Failure Using Ridge Regression and Association Rule Generation MethodsSaeed Parsa, Mojtaba Vahidi-Asl, Somaye Arabi Naree. 873-878 [doi]
- Test Sequence Generation from UML Sequence DiagramsPhilip Samuel, Anju Teresa Joseph. 879-887 [doi]
- Testing Component-Based Real Time SystemsRachid Bouaziz, Ismail Berrada. 888-894 [doi]
- Detecting Feature Interactions in Home Appliance NetworksPattara Leelaprute, Takafumi Matsuo, Tatsuhiro Tsuchiya, Tohru Kikuno. 895-903 [doi]
- A Traffic Modeling Method for MMOGXiangbin Shi, Du Ling, Liu Fang, Li Bao-long, Xian-min Chen. 907-911 [doi]
- An Algorithm of Level of Detail TerrainXiangbin Shi, Liu Fang, Du Ling, Bao Siqin, Xian-min Chen. 912-916 [doi]
- An Interest Management Mechanism Based on N-TreeXiangbin Shi, Wang Yue, Li Qiang, Du Ling, Liu Fang. 917-922 [doi]
- A Hierarchical Cache Scheme for the Large-scale Web Search EngineSungchae Lim, Joonseon Ahn. 925-930 [doi]
- Dynamic Data Feed to Bayesian Network Model and SMILE Web ApplicationNipat Jongsawat, Pittaya Poompuang, Wichian Premchaiswadi. 931-936 [doi]
- E-Tax Invoice System Using Web Services Technology: A Case Study of the Revenue Department of ThailandSukanya Suwisuthikasem, Songsri Tangsripairoj. 937-942 [doi]
- Knowledge Representation and Query Process Based-on Semantic Web TechnologiesChenghong Zhang, Songran Liu, Zhengchuan Xu, Zhuojun Gu, Xiaoling Wang. 943-948 [doi]
- Ranking of Indian E-commerce Web-applications by Measuring Quality FactorsPriyanka Tripathi, M. Kumar, Namita Shrivastava. 949-954 [doi]
- Research on Mechanism of Agricultural FAQ Retrieval Based on OntologyFang Wang, Guifa Teng, Lisheng Ren, Jianbin Ma. 955-958 [doi]
- Intelligent Personalization Job Web SiteWuttipol Wanarsup, Suwarin Pattamavorakun, Suwat Pattamavorakun. 959-964 [doi]
- A Class of SIR Epidemic Model with Saturation Incidence and Age of InfectionJunyuan Yang, Fengqin Zhang, Xiaoyan Wang. 967-970 [doi]
- A Hybrid Text Classification Model based on Rough Sets and Genetic AlgorithmsXiaoyue Wang, Zhen Hua, Rujiang Bai. 971-977 [doi]
- Mixing Protocol based on the Cooperation and the Parallelism for the Distributed EnvironmentBelaid Saad, Francine Herrmann, Yann Lanuel, Thomas Tamisier. 981-986 [doi]