Abstract is missing.
- A New Technique for Unequal-Spaced Channel-Allocation Problem in WDM Transmission SystemA. B. M. Mozzammel Hossain, Md. Saifuddin Faruk. 1-4 [doi]
- An Algorithm to Remove Noise from Audio Signal by Noise SubtractionAbdelshakour Abuzneid, Moeen Uddin, Shaid Ali Naz, Omar Abuzaghleh. 5-10 [doi]
- Support Vector Machines based Arabic Language Text Classification System: Feature Selection Comparative StudyAbdelwadood Moh d. Mesleh. 11-16 [doi]
- Visual Attention in Foveated ImagesAbulfazl Yavari, Hamid Reza Pourreza. 17-20 [doi]
- Frequency Insensitive Digital Sampler and Its Application to the Electronic Reactive Power MeterAdalet N. Abiyev. 21-26 [doi]
- Non-Linear Control Applied to an Electrochemical Process to Remove Cr(VI) from Plating WastewaterA. Regalado-Méndez, D. Tello-Delgado, H. O. García-Arriaga. 27-32 [doi]
- Semantics for the Specification of Asynchronous Communicating Systems (SACS)A. V. S. Rajan, S. Bavan, Geetha Abeysinghe. 33-38 [doi]
- Application Multicriteria Decision Analysis on TV DigitalAna Karoline Araújo de Castro, Plácido Rogério Pinheiro, Gilberto George Conrado de Souza. 39-44 [doi]
- A Framework for the Development and Testing of Cryptographic SoftwareAndrew Burnett, Tom Dowling. 45-50 [doi]
- Transferable Lessons from Biological and Supply Chain Networks to Autonomic ComputingAni Calinescu. 51-56 [doi]
- Experiences from an Empirical Study of Programs Code CoverageAnna Derezinska. 57-62 [doi]
- A Secure and Efficient Micropayment SystemAnne Nguyen, Xiang Shao. 63-67 [doi]
- An Empirical Investigation of Defect Management in Free/Open Source Software ProjectsAnu Gupta, Ravinder Kumar Singla. 68-73 [doi]
- A Parallel Algorithm that Enumerates all the Cliques in an Undirected GraphA. S. Bavan. 74-78 [doi]
- Agent Based Framework for Worm DetectionA. M. El-Menshawy, H. M. Faheem, T. Al-Arif, Z. Taha. 79-84 [doi]
- Available Bandwidth Based Congestion Avoidance Scheme for TCP: Modeling and SimulationA. O. Oluwatope, G. Adesola Aderounmu, E. R. Adagunodo, O. O. Abiona, Francis Joseph Ogwu. 85-89 [doi]
- On the modeling and control of the Cartesian Parallel ManipulatorAyssam Y. Elkady, Sarwat N. Hanna, Galal A. Elkobrosy. 90-96 [doi]
- Resource Allocation in Market-based Grids Using a History-based Pricing MechanismBehnaz Pourebrahimi, S. Arash Ostadzadeh, Koen Bertels. 97-100 [doi]
- Epistemic Structured Representation for Legal Transcript AnalysisTracey Hughes, Cameron Hughes, Alina Lazar. 101-107 [doi]
- A Dynamic Approach to Software Bug EstimationChuanlei Zhang, Hemant Joshi, Srini Ramaswamy, Coskun Bayrak. 108-113 [doi]
- Soft Biometrical Students Identification Method for e-LearningDeniss Kumlander. 114-118 [doi]
- Innovation in Telemedicine: an Expert Medical Information System based on SOA, Expert Systems and Mobile ComputingDenivaldo Lopes, Bruno Abreu, Wesly Batista. 119-124 [doi]
- Service-Enabled Business Processes: Constructing Enterprise Applications - An Evaluation FrameworkChristos K. K. Georgiadis, Elias Pimenidis. 125-130 [doi]
- Image Enhancement Using Frame Extraction Through TimeJames Elliott Coleshill, Alexander Ferworn, Deborah Stacey. 131-135 [doi]
- A Comparison of Software for Architectural Simulation of Natural LightEvangelos Christakou, Neander Silva. 136-141 [doi]
- Vehicle Recognition Using Curvelet Transform and ThresholdingFarhad Mohamad Kazemi, Hamid Reza Pourreza, Reihaneh Moravejian, Ehsan Mohamad Kazemi. 142-146 [doi]
- Vehicle Detection Using a Multi-agent Vision-based SystemSaeed Samadi, Farhad Mohamad Kazemi, Mohammad R. Akbarzadeh-Totonchi. 147-152 [doi]
- Using Attacks Ontology in Distributed Intrusion Detection SystemF. Abdoli, Mohsen Kahani. 153-158 [doi]
- Predicting Effectively the Pronunciation of Chinese Polyphones by Extracting the Lexical InformationFeng-Long Huang, Shu-Yu Ke, Qiong-Wen Fan. 159-165 [doi]
- MiniDMAIC: An Approach for Causal Analysis and Resolution in Software Development ProjectsFca. Márcia G. S. Gonçalves. 166-171 [doi]
- Light Vehicle Event Data Recorder ForensicsJeremy S. Daily, Nathan Singleton, Elizabeth Downing, Gavin Wylie Manes. 172-177 [doi]
- Research of Network Control Systems with Competing Access to the Transfer ChannelG. V. Abramov, A. E. Emelyanov, M. N. Ivliev. 178-183 [doi]
- Service-Oriented Context-Awareness and Context-Aware ServicesH. Gümüskaya, M. V. Nural. 184-189 [doi]
- Autonomous Classification via Self-Formation of Collections in AuInSysHanh H. Pham. 190-195 [doi]
- Grid Computing Implementation in Ad Hoc NetworksAksenti Grnarov, Bekim Cilku, Igor Miskovski, Sonja Filiposka, Dimitar Trajanov. 196-201 [doi]
- One-Channel Audio Source Separation of Convolutive MixtureJalal Taghia, Jalil Taghia. 202-206 [doi]
- Extension of Aho-Corasick Algorithm to Detect Injection AttacksJalel Rejeb, Mahalakshmi Srinivasan. 207-212 [doi]
- Use of Computer Vision during the process of Quality Control in the classification of grainRosas Salazar Juan Manuel, Guzmán Ruiz Mariana, Valdes Marrero Manuel Alejandro. 213-217 [doi]
- Theoretical Perspectives for E-Services Acceptance ModelKamaljeet Sandhu. 218-223 [doi]
- E-Services Acceptance Model (E-SAM)Kamaljeet Sandhu. 224-229 [doi]
- Factors for E-Services System Acceptance: A Multivariate AnalysisKamaljeet Sandhu. 230-235 [doi]
- A Qualitative Approach to E-Services System DevelopmentKamaljeet Sandhu. 236-241 [doi]
- Construction of Group Rules for VLSI ApplicationByung-Heon Kang, Dong-Ho Lee, Chun-Pyo Hong. 242-244 [doi]
- Implementation of an Automated Single Camera Object Tracking System Using Frame Differencing and Dynamic Template MatchingKaran Gupta, Anjali V. Kulkarni. 245-250 [doi]
- A Model for Prevention of Software Piracy through Secure DistributionVaddadi P. Chandu, Karandeep Singh, Ravi Baskaran. 251-255 [doi]
- Performance Enhancement of CAST-128 Algorithm by modifying its functionG. N. Krishnamurthy, V. Ramaswamy, G. H. Leela, M. E. Ashalatha. 256-260 [doi]
- A Concatenative Synthesis Based Speech Synthesiser for HindiKshitij Gupta. 261-264 [doi]
- Legibility on a Podcast: Color and typefacesLennart Strand. 265-267 [doi]
- The sensing mechanism and the response simulation of the MIS hydrogen sensorLinfeng Zhang, Erik McCullen, Lajos Rimai, K. Y. Simon Ng, Ratna Naik, Gregory Auner. 268-272 [doi]
- Visual Extrapolation of Linear and Nonlinear Trends: Does the Knowledge of Underlying Trend Type Affect Accuracy and Response Bias?Lisa A. Best. 273-278 [doi]
- Resource Discovery and Selection for Large Scale Query Optimization in a Grid EnvironmentMahmoud El Samad, Abdelkader Hameurlain, Franck Morvan. 279-283 [doi]
- Protecting Medical Images with Biometric InformationMarcelo Fornazin, Danilo B. S. Netto, Marcos Antonio Cavenaghi, Aparecido N. Marana. 284-289 [doi]
- Power Efficiency Profile Evaluation for Wireless Communication ApplicationsMarius Marcu, Dacian Tudor, Sebastian Fuicu. 290-294 [doi]
- Closing the Gap between Enterprise Models and Service-oriented ArchitecturesMartin Juhrisch, Werner Esswein. 295-299 [doi]
- Object Normalization as Contribution to the area of Formal Methods of Object-Oriented Database DesignVojtech Merunka, Martin Molhanec. 300-304 [doi]
- A Novel Security Schema for Distributed File SystemsBager Zarei, Mehdi Asadi, Saeed Nourizadeh, Shapour Jodi Begdillo. 305-310 [doi]
- A Fingerprint Method for Scientific Data VerificationMicah Altman. 311-316 [doi]
- Mobile Technologies in Requirements EngineeringGunnar Kurtz, Michael Geisser, Tobias Hildenbrand, Thomas Kude. 317-322 [doi]
- Unsupervised Color Textured Image Segmentation Using Cluster Ensembles and MRF ModelMofakharul Islam, John Yearwood, Peter Vamplew. 323-328 [doi]
- An Efficient Storage and Retrieval Technique for Documents Using Symantec Document Segmentation (SDS) ApproachMohammad A. ALGhalayini, ElQasem AlNemah. 329-338 [doi]
- A New Persian/Arabic Text Steganography Using La WordMohammad Shirali-Shahreza. 339-342 [doi]
- GTRSSN: Gaussian Trust and Reputation System for Sensor NetworksMohammad Momani, Subhash Challa. 343-347 [doi]
- Fuzzy Round Robin CPU Scheduling (FRRCS) AlgorithmM. H. Zahedi, M. Ghazizadeh, Mahmoud Naghibzadeh. 348-353 [doi]
- Fuzzy Expert System In Determining Hadith1 ValidityM. Ghazizadeh, M. H. Zahedi, Mohsen Kahani, B. Minaei Bidgoli. 354-359 [doi]
- An Investigation into the Performance of General Sorting on Graphics Processing UnitsNick Pilkington, Barry Irwin. 360-365 [doi]
- An Analysis of Effort Variance in Software Maintenance ProjectsNita Sarang, Mukund A. Sanglikar. 366-371 [doi]
- Design of Adaptive Neural Network Frequency Controller for Performance Improvement of an Isolated Thermal Power SystemOgnjen Kuljaca, Jyotirmay Gadewadikar, Kwabena Agyepong. 372-377 [doi]
- Comparing PMBOK and Agile Project Management software development processesP. Fitsilis. 378-383 [doi]
- An Expert System for Diagnosing Heavy-Duty Diesel Engine faultsPeter Nabende, Tom Wanyama. 384-389 [doi]
- Interactive Visualization of Data-Oriented XML DocumentsPetr Chmelar, Radim Hernych, Daniel Kubicek. 390-393 [doi]
- Issues in Simulation for Valuing Long-Term ForwardsPhillip G. Bradford, Alina Olteanu. 394-398 [doi]
- A Model for Mobile Television Applications Based on Verbal Decision AnalysisIsabelle Tamanini, Thais C. Sampaio Machado, Marília Soares Mendes, Ana Lisse Carvalho, Elizabeth Furtado, Plácido Pinheiro. 399-404 [doi]
- Gene Selection for Predicting Survival Outcomes of Cancer Patients in Microarray StudiesQihua Tan, Mads Thomassen, Kirsten M. Jochumsen, O. Mogensen, Kaare Christensen, Torben A. Kruse. 405-409 [doi]
- Securing XML Web Services by using a Proxy Web Service ModelQuratul-ain Mahesar, Asadullah Shah. 410-415 [doi]
- O-Chord: A Method for Locating Relational Data Sources in a P2P EnvironmentRaddad Al King, Abdelkader Hameurlain, Franck Morvan. 416-421 [doi]
- Intuitive Interface for the Exploration of Volumetric DatasetsRahul Sarkar, Chrishnika de Almeida, Noureen Syed, Sheliza Jamal, Jeff Orchard. 422-427 [doi]
- New Trends in Cryptography by Quantum ConceptsS. G. K. Murthy, M. V. Ramana Murthy, P. Ram Kumar. 428-432 [doi]
- On Use of Operation Semantics for Parallel iSCSI ProtocolRanjana Singh, Rekha Singhal. 433-440 [doi]
- BlueCard: Mobile Device-Based Authentication and Profile ExchangeRiddhiman Ghosh, Mohamed Dekhil. 441-446 [doi]
- Component Based Face Recognition SystemPavan Kandepet, Roman W. Swiniarski. 447-454 [doi]
- An MDA-Based Generic Framework to Address Various Aspects of Enterprise ArchitectureS. Shervin Ostadzadeh, Fereidoon Shams Aliee, S. Arash Ostadzadeh. 455-460 [doi]
- Simulating VHDL in PSpice SoftwareSaeid Moslehpour, Chandrasekhar Puliroju, Christopher L. Spivey. 461-466 [doi]
- VLSI Implementation of Discrete Wavelet Transform using Systolic Array ArchitectureS. Sankar Sumanth, K. A. Narayanan Kutty. 467-472 [doi]
- Introducing MARF: a Modular Audio Recognition Framework and its Applications for Scientific and Software Engineering ResearchSerguei A. Mokhov. 473-478 [doi]
- TCP/IP Over BluetoothUmar F. Khan, Shafqat Hameed, Tim Macintyre. 479-484 [doi]
- Measurement-Based Admission Control for Non-Real-Time Services in Wireless Data NetworksShow-Shiow Tzeng, Hsin-Yi Lu. 485-490 [doi]
- A Cooperation Mechanism in Agent OrganizationWaled Alshabi, Srinivasan S. Ramaswamy, Mhamed Itmi, Habib Abdulrab. 491-496 [doi]
- A Test Taxonomy Applied to the Mechanics of Java RefactoringsSteve Counsell, Stephen Swift, Robert M. Hierons. 497-502 [doi]
- Classification Techniques with Cooperative Routing for Industrial Wireless Sensor NetworksSudhir G. Akojwar, Rajendra M. Patrikar. 503-508 [doi]
- Biometric Approaches of 2D-3D Ear and Face: A SurveyS. M. S. Islam, Mohammed Bennamoun, Robyn A. Owens, R. Davies. 509-514 [doi]
- Performance Model for a Reconfigurable CoprocessorSyed Sajjad Rizvi, Syed N. Hyder, Aasia Riasat. 515-520 [doi]
- RFID: A New Software Based Solution to Avoid InterferenceSyed Sajjad Rizvi, Eslam M. Gebriel, Aasia Riasat. 521-525 [doi]
- A Software Component Architecture for Adaptive and Predictive Rate Control of Video StreamingTaner Arsan, Tuncay Saydam. 526-531 [doi]
- Routing Table Instability in Real-World Ad-Hoc Network TestbedTirthankar Ghosh, Benjamin Pratt. 532-535 [doi]
- Quality Attributes for Embedded SystemsTrudy Sherman. 536-539 [doi]
- A Mesoscale Simulation of the Morphology of the PEDT/PSS Complex in the Water Dispersion and Thin Film: the Use of the MesoDyn Simulation CodeT. Kaevand, A. Öpik, Ü. Lille. 540-546 [doi]
- Developing Ontology-Based Framework Using Semantic GridP. Venkata Krishna, Ratika Khetrapal. 547-552 [doi]
- A Tree Based Buyer-Seller Watermarking ProtocolVinu V. Das. 553-557 [doi]
- A Spatiotemporal Parallel Image Processing on FPGA for Augmented Vision SystemWalid Atabany, Patrick Degenaar. 558-561 [doi]
- Biometrics of Cut Tree FacesW. A. Barrett. 562-565 [doi]
- A Survey of Hands-on Assignments and Projects in Undergraduate Computer Architecture CoursesXuejun Liang. 566-570 [doi]
- Predicting the Demand for Spectrum Allocation Through AuctionsYenumula B. Reddy. 571-576 [doi]
- Component-Based Project Estimation Issues for Recursive DevelopmentYusuf Altunel, Mehmet R. Tolun. 577-581 [doi]