Abstract is missing.
- A Closed-Loop Mechanism for Service Evaluating and Discovering on the InternetHao-Peng Chen, Guang Yang, Can Zhang. 1-8 [doi]
- A Leader Management Scheme for Fault-Tolerant Multiple SubnetsKiyong Kim, Yeonseung Ryu, Semog Kim, Jong-myung Rhee. 9-12 [doi]
- A Minimum Time to Release Job Scheduling Algorithm in Computational Grid EnvironmentNandagopal Malarvizhi, V. Rhymend Uthariaraj. 13-18 [doi]
- A New Interconnection Network for Parallel ComputersB. N. B. Ray, Alok Ranjan Tripathy, Shakti Prasad Mohanty. 19-24 [doi]
- A Resource Service Risk Based Scheduling Algorithm in Grid MarketBin Wu, Shoubao Yang, Xiaoqian Liu. 25-30 [doi]
- A Sensor Grid Framework for Acoustic Surveillance ApplicationsJohn Sanabria, Wilson Rivera, Domingo Rodríguez, Yuji Yunes, Gail Ross, Cesar Sandoval. 31-38 [doi]
- A Solving Model of Network ResourceJianhua Wang, Jun Zhang, Weidong Ji, Long Zhang. 39-43 [doi]
- A Taxonomy and Survey of Cloud Computing SystemsRimal Bhaskar Prasad, Eunmi Choi, Ian Lumb. 44-51 [doi]
- An Agent-Based Migration Transparency and Fault Tolerance in Computational GridSrimathi Chandrasekaran, Eunmi Choi, Venkat Viswanadh. 52-57 [doi]
- An Energy Efficient Concentric Clustering Scheme in Wireless Sensor NetworksMin Woo Park, Jin-Young Choi, Young-Ju Han, Tai-Myoung Chung. 58-61 [doi]
- An Optimal Algorithm for Scheduling Tasks within Deadline and Budget ConstraintsHu Song, Shoubao Yang, Bin Wu, Xiaoqian Liu, Liangmin Guo. 62-65 [doi]
- Analysis and Design of Fully Differential Gain-Boosted Op-amp for 14bit 100MS/s Pipelined Analog-to-Digital ConverterWenxiao Feng, Tiejun Lu, Zongmin Wang. 66-69 [doi]
- Approximation Strategy Based on Data Merging for Static Data Management in NetworksDongMei Xing, Hong Zhu. 70-75 [doi]
- Configuration of a SIP Signaling Network: An Experimental AnalysisMaryam Homayouni, Sayed Vahid Azhari, Mojataba Jahanbakhsh, Ahmad Akbari, Alireza Mansoori, Nahid Amani. 76-81 [doi]
- Development of Zig System for Evaluating an Oscillator PerformanceDal-Hwan Yoon, Long Chen, Teng Lian, Jong-Hwa Yoon, Jong-Uk Yoon. 82-85 [doi]
- Extended Crossed Cube: An Improved Fault Tolerant Interconnection NetworkNibedita Adhikari, C. R. Tripathy. 86-91 [doi]
- Flow Byte Sizes Estimation from Simple Random Packet SamplingHai Zhang, Zhuxu Yang, Wenming Guo. 92-96 [doi]
- General Model for Ubiquitous Networking Deployment Constructed RecommendationChen-Shu Wang, Hsin-Chang Li. 97-102 [doi]
- Impact of Interference on Multicast Throughput over Ad Hoc NetworksYao Yu, Yu Zhou, Sidan Du. 103-110 [doi]
- Intelligent Design-Oriented Product Functional Decomposition Iterative ModelYongtao Hao, Wenjing Han. 111-116 [doi]
- Jingle-Mingle: A Hybrid Reliable Load Balancing Approach for a Trusted Distributed EnvironmentShakti Mishra, Dharmender Singh Kushwaha, Arun Kumar Misra. 117-122 [doi]
- Network Stochastic Optimization for Large Virtual EnvironmentAlvin Chew HouMing, Koh Kim Leng. 123-129 [doi]
- Reduction Method of Order-Cycle Column Remove Based on Indiscernibility RelationXiaoyong Lu, Liqing Li, Xiaogang Zhou. 130-133 [doi]
- Resolution and Reconstruction of an Algorithm by a Modified Mobius Transformation in Signal ProcessingDianchuan Jin, Xuebin Chen, Zhaohua Qian. 134-137 [doi]
- SCTP Throughput Improvement with Best Load Sharing Based on MultihomingInwhee Joe, Sijia Yan. 138-142 [doi]
- Test Case Generation of Concurrent Programs Based on Event GraphXiaoan Bao, Na Zhang, Zuohua Ding. 143-149 [doi]
- The Design and Implementation of Behavior-Driven Artificial Neural Network Computing SystemYongbin Zhang, Liangbin Zheng, Fucheng You. 150-153 [doi]
- The Study for Wireless Network Packet TransmissionChung-Hsin Liu, Ping-Shin Tsai. 154-157 [doi]
- Wireless Bandwidth Estimation Technique (WBET) to Maintain the Quality of Service (QoS) of IEEE 802.11e NetworkKazi Md. Abdullah Al Mamun, Md. Kawsar Habib, Nazmus Sakib, Al-Amin Pervez. 158-160 [doi]
- A New Data Gathering Algorithm Based on Mutual Supportability and Grey Prediction in Wireless Sensor NetworksMin Xiang, Ping Wang, Zhiyong Luo, Young Han Kim, Yan Jin. 161-165 [doi]
- Adaptive Distributed Load Balancing Algorithm Based on Live Migration of Virtual Machines in CloudYi Zhao, Wenlong Huang. 170-175 [doi]
- Collision Detection and Conflict Solution Research in Modern Collaborative DesignShufen Zhang, Xuebin Chen, Hongcan Yan, Shuai Zhang. 176-181 [doi]
- Designing an Efficient Collaborative Learning Model to Construct a Consensus Based on Binary Tree StructureYu-Feng Lan, Shin-Ming Huang. 182-187 [doi]
- Geographic Forwarding and Routing for Ad-hoc Wireless Network: A SurveyColin Lemmon, Siu Man Lui, Ickjai Lee. 188-195 [doi]
- Integration of RDF Processing into a Programming LanguageIk-Hyun Jhin, Nak-Min Choi, Eun-Sun Cho. 196-199 [doi]
- Jampots: A Mashup System towards an E-learning EcosystemBo Dong, Qinghua Zheng, Lingzhi Xu, Haifei Li, Jie Yang, Mu Qiao. 200-205 [doi]
- Rebuilding Web Application Requirements Based on User NavigationZuohua Ding, Mingyue Jiang. 206-213 [doi]
- Risk Management in the Trustworthy Software Process: A Novel Risk and Trustworthiness Measurement Model FrameworkMinglu Li, Jianping Li, Hao Song, Dengsheng Wu. 214-219 [doi]
- Semantic P2P Network for HealthcareLican Huang. 220-225 [doi]
- Software Internationalization: Testing Methods for Bidirectional SoftwareSameer Abufardeh, Kenneth Magel. 226-231 [doi]
- The Bias Routing Tree Avoiding Technique for Hierarchical Routing Protocol over 6LoWPANHun-Jung Lim, Tai-Myoung Chung. 232-235 [doi]
- Using Instant Messaging and Annotation Services to Improve Undergraduate Programming Courses in Web-Based Collaborative LearningYu-Feng Lan, Yu-Cheng Jiang. 236-241 [doi]
- 3D Simulation of Charge Collection and MNU in Highly-Scaled SRAM DesignLin Liu, Yuanfu Zhao, Suge Yue. 242-246 [doi]
- A Mediated RSA-Based End Entity Certificates Revocation Mechanism in GridJinpei Pan, MingChu Li, Weifeng Sun, Jing Hu. 247-250 [doi]
- An Agent-Based Mobility Protocol for Improved Mobile QoS in Next Generation IP NetworksWan Haslina Hassan, Ahmed Mustafa Mahmood, Norsheila Fisal. 251-256 [doi]
- Anti-misbehavior System for Tor NetworkXin Liu, Neng Wang. 257-261 [doi]
- Apply Rough Set Theory into the Information ExtractionWen-Yau Liang. 262-266 [doi]
- Collective Behavior of Dynamic Swarm with General Topology and Complex Communication Time-DelaysHuan Li, Bo Liu. 267-271 [doi]
- Comparison on Confidence Bands of Decision Boundary between SVM and Logistic RegressionXing Wang, Xin Wang, Zhaonan Sun. 272-277 [doi]
- Detecting Unknown Malicious Executables Using Portable Executable HeadersTzu-Yen Wang, Chin-Hsiung Wu, Chu-Cheng Hsieh. 278-284 [doi]
- DLP Based Proxy Blind Signature Scheme with Low-ComputationAung Nway Oo, Ni Lar Thein. 285-288 [doi]
- Dynamic Information Flow for Designing Simultaneous Coordination Model in E-Supply NetworkIraj Mahdavi, Shima Mohebbi, Namjae Cho, Rasoul Shafaei, Mahdi Zandakbari. 289-296 [doi]
- EVOGENTS: Evolving AgentsMichael Hermano, Shirley B. Chu, Daniel Pua, Stephen Tan, Andrei Victor. 297-302 [doi]
- Extreme Learning Machine with Fuzzy Activation FunctionHieu Trung Huynh, Yonggwan Won. 303-307 [doi]
- High-Effect Key Management Associated with Secure Data Transmission Approaches in Sensor Networks Using a Hierarchical-Based Cluster Elliptic Curve Key AgreementHua-Yi Lin. 308-314 [doi]
- Incomplete Information of Decision Support System for Planting Material SelectionMohd Najib B. Mohd Salleh, Dr. Nazri Mohd Nawi, Patrice Boursier. 315-319 [doi]
- Providing a Heuristic Method to Simplify Behaviour AuthoringAlvin Chew HouMing, Koh Kim Leng, Xu Ke. 320-324 [doi]
- Research of Part Geometry Model and Gene Coding Based on Semantic RelationshipHao Yongtao, Huang Dinghou, Qiu Xiulian. 325-328 [doi]
- Research of the Enterprise Application Integration Platform Based on Multi-agentGuozheng Wang, Jijie Zheng, Haiyan Wu, Ying Tang. 329-331 [doi]
- Secure Site Authentication and Message Transmission Based on Grid EnvironmentChong-Yen Lee, Tsang-Yean Lee, Homer Wu, Hau-Dong Tsui, Heng-Sheng Chen. 332-337 [doi]
- Semantic Text Mining with Linked DataZhaohui Huang, Huajun Chen, Tong Yu, Hao Sheng, Zhaobo Luo, Yuxin Mao. 338-343 [doi]
- Test Data Generation Using Annealing Immune Genetic AlgorithmX. B. Tan, Longxin Cheng, Xiumei Xu. 344-348 [doi]
- The Research on the Principle of Covert Communication and Defense Strategy Based on SnifferShufen Zhang, Xuebin Chen, Shuai Zhang, Hongcan Yan. 349-352 [doi]
- Analysis and Evaluation of Connectivity Reliability for Dynamic Transportation NetworkXinyuan Zhang, Limin Jia, Honghui Dong, Zhuo Wang, Ke Wang, Yong Qin. 353-356 [doi]
- Performance Evaluation on Base-Stock Levels in a Single-Station Production SystemKuo-Hwa Chang, Yang-Shu Lu, Rong-Cheng Chang. 357-362 [doi]
- Formal Risk Assessment of Vessel Traffic at Coastal WatersShenping Hu, Quangen Fang, Cunqiang Cai. 363-368 [doi]
- Role of Intelligent Agents and Wireless Body Sensor Mesh Networks in Patient Health MonitoringKevin Miller, Suresh Sankaranarayanan. 369-375 [doi]
- A BIM-Based Design Method for Energy-Efficient BuildingSeunghyun Yoon, Namhee Park, Jinwon Choi. 376-381 [doi]
- GongPath: Development of BIM Based Indoor Pedestrian Navigation SystemJumphon Lertlakkhanakul, Yongzhi Li, Jinwon Choi, Soyoung Bu. 382-388 [doi]
- Preference Based Genetic Algorithm for the Optimum Design of Integrated Structural Control SystemWonsuk Park, Kwan-Soon Park, Dong-Ho Ha, Jinkyo F. Choo. 389-392 [doi]
- Recovery of Sensors in Wireless Sensor NetworksAli Barati, Mohammad Ali Khosh Kholghi, Ali Movaghar. 393-396 [doi]
- Smart Environment Software Reference ArchitectureAlejandro Fernández-Montes, Juan Antonio Ortega, Juan Antonio Álvarez, Luis González Abril. 397-403 [doi]
- A Novel IP Paging Scheme with Dynamic Paging Areas according to the Mobile VelocityInwhee Joe, Jaeyoung Kim. 404-408 [doi]
- A Route Optimization Scheme Based on Roaming in PMIPv6 (pROR)Sang-seok Oh, Hyon-Young Choi, Sung-Gi Min. 409-415 [doi]
- A Synchronization Algorithm of Mobile Database for Ubiquitous ComputingMi Young Choi, Eun-Ae Cho, Dae-Ha Park, Jong-Youn Bae, Chang-Joo Moon, Doo-Kwon Baik. 416-419 [doi]
- An Implementation Case Study: Business Oriented SOA Execution Test FrameworkYoungkon Lee. 425-430 [doi]
- Estimation with Intermittent Observation Using Both a Priori and a Posteriori InformationSang Man Seong, Tae-Whan Kim, Ick Ho Whang. 437-440 [doi]
- Fairness-Based Global Optimization of User-Centric NetworksMario Köppen, Kaori Yoshida, Masato Tsuru, Yuji Oie. 441-443 [doi]
- Towards General Access Control Management for Middleware SecurityGang Yin, Dian-xi Shi, Pinbo Sui, Huaimin Wang. 444-448 [doi]
- Traffic Modeling with Bernoulli Shift MapFei Ge, Liansheng Tan, Yuan-ni Wang. 449-452 [doi]
- A DV-Hop Positioning Algorithm for Wireless Sensor Network Based on Detection ProbabilityYing Liu, Zhi-hong Qian, Dan Liu, Hui Zhong. 453-456 [doi]
- A New Node Role-Based Reputation Model in Hierarchical Ad Hoc NetworksYao Yu, Lei Guo, Xingwei Wang, Jun Liu, Weigang Hou, Yan Li. 457-461 [doi]
- A New Routing Algorithm Based on Integrated Grooming Auxiliary Graph in Multi-granularity Optical NetworksWeigang Hou, Lei Guo, Xingwei Wang, Jiannong Cao, Jingjing Wu, Yan Li. 462-467 [doi]
- A New Routing Strategy to Improve Traffic Congestion for Scale-Free NetworkSisi Cheng, Qing Li, Qi Chen. 468-470 [doi]
- A Novel Authentication and Key Agreement Scheme for Wireless Mesh NetworksXin Zhao, Yuqin Lv, Tet Hin Yeap, Bin Hou. 471-474 [doi]
- A Probe into the Concept of MultimediaSong Chunhui, Wu Shulei, Chen Huandong, Zhan Jinmei, Chen Juntao. 475-478 [doi]
- AE-BP: Adaptive Erasure Belief Propagation Decoding Algorithm of LDPC CodesChaonian Guo, Xiangxue Li, Dong Zheng, Shengli Liu, Jianhua Li. 479-483 [doi]
- An Approach to Distribute Replicas among Decentralized Tuple Space NodesXiang Zheng, Zheng Qin, Jiankuan Xing. 484-488 [doi]
- Design and Implementation of Computer and Network Resource Optimization for Linking High-Performance Computing ResourcesWonhyuk Lee, Joon Woo, Hyuncheol Kim, JinWook Chung. 489-493 [doi]
- Dormancy Scheduling Algorithm Based on Node s Self-Adaptive Density in WSNYang Tao, Shudan Zhang. 494-500 [doi]
- Enhanced Light Weight Route Optimization in Proxy Mobile IPv6Young-Hyun Choi, Tai-Myoung Chung. 501-504 [doi]
- Hierarchical Conflict Detection for Cluster s Transactional MemoryRuibo Wang, Kai Lu. 505-507 [doi]
- Proposal for Deploying PCE Architecture to Optimize a Path Based on GMPLS NetworkWonhyuk Lee, Seunghae Kim, Hyuncheol Kim, JinWook Chung. 508-510 [doi]
- Renewal-Theory-Based Hard Disk Power Management Strategy OptimizationFagui Liu, Zexiang Wu, Weipeng Mai. 511-515 [doi]
- RePro: A Reputation-based Proactive Routing Protocol for the Wireless Mesh BackboneQing Ding, Ming Jiang, Xi Li, Xuehai Zhou. 516-521 [doi]
- The Design of a Component Description Language in the Environment of InternetFeng Xu, Likun Jia, Rongyan Jiang. 522-526 [doi]
- A Selective MAP Binding Scheme Based on the Mobile SpeedInwhee Joe, Wooyeob Lee. 527-530 [doi]
- An Enhanced TCP Protocol for Wired/Wireless NetworksInwhee Joe, Jaehyung Lee. 531-533 [doi]
- Effective Collaborative Filtering Approaches Based on Missing Data ImputationWeiwei Xia, Liang He, Junzhong Gu, Keqin He. 534-537 [doi]
- Job Schedule Model Based on Grid EnvironmentWuu-Yee Chen, Tsang-Yean Lee, Nai-Wen Kuo, Yuan-Hwa Mei, Shan-Kai Chen, Yu-Chen Yan. 538-543 [doi]
- Limited Contention Scheme (LCS) to Reduce Collision in LR-WPANSu-Hwan Ko, Jung-Kyu Lee. 544-548 [doi]
- Personalized Recommendation Service in the IMS EnvironmentsYoun-Gyou Kook, Jae-Oh Lee. 549-554 [doi]
- Secure Fast Handover Scheme of Proxy Mobile IPv6Soo-Duek Kim, Jong-Hyouk Lee, Tai-Myoung Chung. 555-558 [doi]
- A Hybrid Improved Ant Colony Optimization and Random Forests Feature Selection Method for Microarray DataWen Xiong, Cong Wang. 559-563 [doi]
- A Method of Network Traffic Analysis Based on Multiple-Combination ModelJing Wu, Yan-heng Liu, Rong Lv, Guo-xin Cao. 564-568 [doi]
- A Mixed-Encoding Genetic Algorithm for Nonlinear Bilevel Programming ProblemsHecheng Li, Yuping Wang. 569-573 [doi]
- A Ping Pong Based One-Time-Passwords Authentication SystemBayalagmaa Davaanaym, Young Sil Lee, Hoon Jae Lee, Sanggon Lee, HyoTeak Lim. 574-579 [doi]
- A System Service Optimization Model Based on Martingale Difference ApproximationRuijuan Zheng, Meiyu Xu, Jiexin Pu, Qingtao Wu. 580-583 [doi]
- An Approach for Database Intrusion Detection Based on the Event Sequence ClusteringYinzhao Li, Dongxu Yang, Jiadong Ren, Changzhen Hu. 584-588 [doi]
- Efficiency and Consistency Study on CarmaYuan Huang, Xing Wang, Ben-Chang Shia. 589-594 [doi]
- Knowledge Value Chain Model Implemented for Supply Chain Management PerformanceMing-Chang Lee, Mei-Wen Han. 606-611 [doi]
- Machine Learning Trend Anticipation by Text Mining Methodology Based on SSCI DatabaseJohannes K. Chiang, Wen-Chin Wu, Wei-Cheng Liao, Chi-Yen Yin. 612-617 [doi]
- Off-Line Password-Guessing Attack to Yang s and Huang s Authentication Schemes for Session Initiation ProtocolHeasuk Jo, Yunho Lee, Mijin Kim, Seungjoo Kim, Dongho Won. 618-621 [doi]
- Research of Product Function Gene Model Based on Behavior Semantic WebHao Yongtao, Ma Chong, Xin Cheng. 622-627 [doi]
- Road Traffic State Prediction with a Maximum Entropy MethodHonghui Dong, Limin Jia, Xiaoliang Sun, Chenxi Li, Yong Qin, Min Guo. 628-630 [doi]
- SHOIQD System an Approach to Integrate Description Logic SHOIQ with Nonmonotonic RulesLing Ji, Dantong Ouyang, Yuxin Ye. 631-634 [doi]
- WebVaccine: A Client-Side Realtime Prevention System against Obfuscated Malicious Web PagesJungMin Kang, Kiwook Sohn, Soonyoung Jung. 635-637 [doi]
- An Intersection-Centric IBF* Algorithm for Traffic Simulation Routing GuidanceXiao-Fan Zhi, Zhi-Cheng Liao, Yi Sun. 642-646 [doi]
- Analysis on Non-linear Characteristics of Bridge Health Monitoring Based on Time-Delayed Transfer Entropy and Mutual InformationJianting Zhou, Jianxi Yang. 647-652 [doi]
- Research on Chinese Urban Growth Path Based on the Conception of Sustainable DevelopmentTao Yu, Zhou Jiang, Yi Chen. 653-656 [doi]
- RFID-Based Tracking in Supporting Real-Time Urban Traffic InformationYaying Zhang. 657-659 [doi]
- A Generic Transaction Model for ForCES-Based Distributed SystemsXintao Liao, Ligang Dong, Chuanhuang Li. 660-664 [doi]
- A Reliable Data Capture in Multi-RFID Reader EnvironmentsHyun Lee, Young-Ran Lee, Jae Sung Choi, Ramez Elmasri. 665-668 [doi]
- Design and Implement of IPsec VPN Service Mapping Layer Based on the ForCES FrameworkXiaoqing Yan, Weiming Wang, Fenggen Jia. 669-672 [doi]
- u-Healthcare Service Based on a USN Middleware PlatformYung Bok Kim. 673-678 [doi]
- A Neural Network-Based Damage Detection Algorithm Using Dynamic Responses Measured in Civil StructuresJinkyo F. Choo, Dong-Ho Ha, Hyun-Moo Koh. 682-685 [doi]
- A Novel Cost-Effective Disk Scrubbing SchemeJunping Liu, Ke Zhou, Liping Pang, Zhikun Wang, Yuhui Deng, Dan Feng. 686-691 [doi]
- An Efficient Power Allocation Algorithm for Peak-Power Constrained Multicarrier SystemsChengshi Zhao, Sangjun Bae, Mingrui Zou, Bin Shen, Kyungsup Kwak. 692-695 [doi]
- BBN-Based Decision Support for Health Risk AnalysisKevin F. R. Liu, Che-Fan Lu. 696-702 [doi]
- Data Mining on Forecast Raw Water Quality from Online Monitoring Station Based on Decision-Making TreeJinsuo Lu, Tinglin Huang. 706-709 [doi]
- Dynamic Power Management Based Call Pattern Recognition for Telecommunication EquipmentsCheol-Kyun Heo, Dong Ryeol Shin. 710-712 [doi]
- Estimation of Evaporative Fraction from Remotely Sensed in Arid/Semi-arid RegionsQin Li, Xi Chen, Frank Veroustraete, Anming Bao, Qinghan Dong, Tie Liu. 713-718 [doi]
- Gain Experiences from Process Improvement in SchoolYangting Wang, Yongxia Yu. 719-723 [doi]
- Clustered Agent Base Frame Work for Ad-hoc NetworksItrat Fatema, V. M. Thakare. 724-728 [doi]
- ETC-Based Methodology on Data Processing ValidationDeng Lu, Shanping Li, Liheng Zhao. 729-732 [doi]
- Research and Design of On-board Dynamic Reconfigurable RouterChunjing Mao, Yong Guan, David Jungwirth. 733-738 [doi]
- The Access Control Model in Ubiquitous Sensor Network EnvironmentMarie Kim, Hyochan Bang, Hwang Jae Gak, Cheol-Sig Pyo. 739-744 [doi]
- A Hybrid Model Checking and Runtime Monitoring Method for C++ Web ServicesZhengwei Qi, Alei Liang, Haibing Guan, Ming Wu, Zheng Zhang. 745-750 [doi]
- A Method of Schema Matching Based on Top-K Mapping and User FeedbackJunren Wang, Qingzhong Li, Yongquan Dong. 751-756 [doi]
- A New Model for Software ReliabilityWeiguo Li, Yongfu Wang, He Huang. 757-760 [doi]
- A Revised Service Group Model for Web Service Availability ManagementLingjuan He, Lianchen Liu, Cheng Wu. 761-766 [doi]
- A Time Varying Network CalculusBaohua Fan, Heying Zhang, Wenhua Dou. 767-772 [doi]
- An Efficient Piecewise Linearization Method in Fuzzy Multi-objective ProgramsChia-Hui Huang. 773-779 [doi]
- An Empirical Analysis on the Peasant Entrepreneurs Influence on the Industrial Cluster in Rural ChinaBei Hu, Rongzhi Liu. 780-784 [doi]
- An Integrated Analysis System for Agricultural Biotechnology Information and Web ServiceChangKug Kim, UngHan Yoon, GangSeob Lee, DoWon Yun, SeongHan Park, SukMan Kim, YongHwan Kim. 785-787 [doi]
- Business-Centric SOA Test Framework Based on BPA-Simulated EventYoungkon Lee. 788-793 [doi]
- CostBP Algorithm and its Application in Customer Churn PredictionYan-jie Dong, Xue Hua Wang, Jun Zhou. 794-797 [doi]
- From Early Requirements to Late Requirements Modeling for a Data WarehouseYogesh Singh, Anjana Gosain, Manoj Kumar 0002. 798-804 [doi]
- HeXie Mechanism Design on Interest Distribution in Virtual EnterprisesYu Wang, Dong-Mei Chen, Xiao-Min Zhang. 805-808 [doi]
- Model of Intellectual Information Management in Manufacture Enterprise Web Services-OrientedWei Tan, Xi-fan Yao, Bin Wang, Shan-Jun Zhang. 809-814 [doi]
- The Design of Payment Model for Financial Transaction Using MyKadNurul Huda Ahmad Zahari, Mohd Najib Mohd Salleh, Muhaini Othman. 815-819 [doi]
- The Microkernel Concept Based Dependable System ArchitectureTae-You Lee, Yong-Ki Ku, Choon-Sung Nam, Dong Ryeol Shin. 820-823 [doi]
- The Study of Interface Standard for Single Window SystemKyeongrim Ahn, Keunyoung Youn, SunHo Park. 824-828 [doi]
- Web Services for Automated Fault Analysis in Electrical Power SystemMustarum Musaruddin, Rastko Zivanovic. 829-832 [doi]
- A Methodology for Developing Data Taxonomy for Data ArchitectureMi Young Choi, Jong-Youn Bae, Chang-Joo Moon, Doo-Kwon Baik. 833-838 [doi]
- A Model of Information Security Based on Office AutomationChunyong Yin, Ruxia Sun, Shuoben Bi. 839-841 [doi]
- Online Information Satisfaction: A Rasch Model Measurement of Information Management Experience within the Malaysian Agricultural Extension ServicesSohaimi Zakaria, Azrilah Abdul Aziz. 842-848 [doi]
- Applying Double-Loop Knowledge Management Model on Customer Self-Service Systems for Taiwan s E-governmentShan-yan Huang, Han-yuh Liu. 849-854 [doi]
- Behavior-Based Credit Card Fraud Detecting ModelYongbin Zhang, Fucheng You, Huaqun Liu. 855-858 [doi]
- DOCINER: A Document Indexation Tool for Learning ObjectsSuphakit Niwattanakul, Michel Eboueya, Philippe Martin. 859-863 [doi]
- Enterprise Knowledge Management Systems: Role of Aspects and Distributed Middleware FrameworkDeepak Dahiya, Usha Batra. 864-869 [doi]
- Handling Exceptions in Situation-Driven Agent SystemsMinsoo Kim, Minkoo Kim. 870-875 [doi]
- HERA: Design Framework for Decentralized Distributed Virtual Environments and GamesChristian Bettinger, Andreas Baumann, Frank Hausen, Georg Schneider, Hermann Schloss. 876-881 [doi]
- Improving Software Design Using Aspects in Distributed ComputingDeepak Dahiya, Usha Batra. 882-887 [doi]
- Research on a Scalable Parallel Data Mining AlgorithmJinlin Wang, Xi Chen, Kefa Zhou. 888-893 [doi]
- Secure and Efficient Two-Party Authenticated Key Agreement Protocol from Certificateless Public Key Encryption SchemeMengbo Hou, Qiuliang Xu. 894-897 [doi]
- Security Management for Flexibility in Virtual Knowledge SpacesReinhard Keil, Jonas Schulte, Ingo Döpke. 898-906 [doi]
- Sentence Similarity Computation Based on POS and Semantic NetsMing-Che Lee, Jia-wei Zhang, Wen Xiang Lee, Heng Yu Ye. 907-912 [doi]
- SRDL: A Simple Role-Based Delegation LogicGang Yin, Dianxi Shi, Min Guo, Huaimin Wang. 913-916 [doi]
- Strong Authentication and Key Agreement Protocol in UMTSKa-Kyung Oh, Tae-You Lee, Choon-Sung Nam, Dong Ryeol Shin. 917-920 [doi]
- The Knowledge Based System to Support the Subjective Hand Evaluation Process of Fabric Swatch Selection in Fashion and Textile IndustryTommy K. L. Choy, Harry H. K. Chow, Karen Ka-Leung Moon, Alvis C. K. Cheng. 921-925 [doi]
- The Research of Using Jena in the Semantic-Based Online Learning Intelligent Behavior Analysis SystemLei Shi, Lei Fan, Zhenzhen Meng. 926-929 [doi]
- A Dynamic Routing Algorithm for Managing CSCF Agents in the IMS NetworkJi-Hyun Hwang, Youn-Gyou Kook, Jae-Oh Lee. 930-935 [doi]
- A Railroad Integration of Services Based on OSGi PlatformHee-Yeon Cho, Choon-Sung Nam, Hyung-Rok Seo, Dong Ryeol Shin. 936-938 [doi]
- Agent Based Sensor Network Middleware Sporting Heterogeneous EnvironmentsJong-Wan Yoon, Hyung-Rok Seo, Choon-Sung Nam, Dong Ryeol Shin. 939-942 [doi]
- Development of RTLS Access Point Allocation Prototype for Location Tracking in Construction SitesNam-gi Kang, Jae-sun Park, Tae-min Hong, Yang-dam Eo, Byoung-kil Lee, Mu-wook Pyeon. 943-948 [doi]
- IMS Based PoC Service DeploymentJae Hyung Cho, Jae-Oh Lee. 949-954 [doi]
- Ontology Maintenance via Multi-agentsMuhammad Rafi, Hilal Qureshi, Hasina Khatoon. 955-959 [doi]
- Research of Massive Internet Text Data Real-Time Loading and Index SystemWeihong Han, Yan Jia, Shuqiang Yang. 960-965 [doi]
- Research on Handoff Mechanism Based on Capability Adaptation in Heterogeneous Network PlatformFei Ma, Wenan Zhou, Junde Song, Guang-xian Xu. 966-969 [doi]
- Social Overlay: P2P Infrastructure for Social NetworksBipin Upadhyaya, Eunmi Choi. 970-976 [doi]
- Study on Groundwater Optimization Model Based on GISMei Song, Lijie Wang. 977-980 [doi]
- Business Blogs for Interactive Storytelling: An Interpretive Interactionism PerspectiveChia-yen Wu, Han-yuh Liu, Yi-ting Wang. 981-985 [doi]
- Perception Cultural Impacts: Principles for Trainer s Skills for E-learningFathia Lahwal, Mohamed Amaimin, Ajlan Al-Ajlan. 986-993 [doi]
- DRiMaP--A Model of Distributed Risk Management ProcessMira Kajko-Mattsson, Kristoffer Sjokvist, Joakim Soderstrom, Dag Krogdahl. 994-1000 [doi]
- Selection of an Investment Portfolio by Means of a Mathematical Model of Optimization Applied to Mexican Stock-Market in Period of DebacleJosé Crispín Zavala Díaz, Dalia V. Garcia-Villagomez, Jorge A. Ruiz-Vanoye, Ocotlán Díaz-Parra. 1001-1006 [doi]
- Support Vector Regression Model of Currency Options Pricing with Stochastic Volatility Models and Forward Exchange RatePing Wang, YunCheng Huang, YuanSu Wang. 1007-1012 [doi]
- Sustainable Development via Value Based Management SystemSadaf Ashtari, Jamshid Nazemi. 1013-1018 [doi]
- Using Extended Classifier System for Portfolio Allocation of MSCI Index Component StocksWen-Chih Tsai, Chiung-Fen Huang, An-Pin Chen. 1019-1024 [doi]
- A Global Social Graph as a Hybrid HypergraphJoonhyun Bae, Sangwook Kim. 1025-1031 [doi]
- Behavior Safety Integration Management and Control System for Coal EnterprisesHong Chen, Hui Qi, Ruyin Long. 1032-1040 [doi]
- Social Capital: The Literature Productivity Review and Trend Forecast Using Bibliometric Methodology from 1959 to 2008Chi-Yen Yin, Johannes K. Chiang. 1041-1046 [doi]
- Developing a Risk Analysis Framework for Hospital Information Security ManagementChi-Chang Chang, Pei-Ran Sun, Sun-Long Cheng, Ruey-Shin Chen, Kuo-Hsiung Liao. 1047-1052 [doi]
- Preliminary Children Health Care Service Using Ubiquitous TechnologyPeom Park, You Min Shin, Ho-Young Byun, JaeSoo Yang. 1053-1057 [doi]
- 2-Layered SOA Test Framework Based on BPA-Simulated EventYoungkon Lee. 1058-1063 [doi]
- An Approach to Explore Effective Customer-Centric E-governmentHan-yuh Liu, Shih-yu Fang. 1064-1069 [doi]
- On the Policy Support to Promote Intelligence Vision System Base on the Ubiquitous Community ComputingSeong-Pil Kong, Yang-dam Eo, Chang-Jae Kim. 1070-1074 [doi]
- Research on Dynamic Service Composition Based on Object Petri Net for the Networked Information SystemXianpeng Huangfu, Zhen Shu, Honghui Chen, Xueshan Luo. 1075-1080 [doi]
- Ubiquitous E-learning System for Dynamic Mini-courseware Assemblying and Delivering to Mobile TerminalsYuShun Li, Hui Guo, Ge Gao, Ronghuai Huang, Xiaochun Cheng. 1081-1086 [doi]
- Which Internet Marketing Mix s Has More Effect on the Passenger s Decision for Choosing Their Travel Agency in Iran?Ata Farzamnia, S. M. R. Nasserzadeh, Soroosh Nalchigar. 1087-1092 [doi]
- A Study of Design Flow of Management Experiments Based on Software EngineeringJun Wang, Lan-juan Liu. 1096-1101 [doi]
- An Approach for Model Composition and VerificationDefen Zhang, Shixian Li, Xianming Liu. 1102-1107 [doi]
- Ancient Architecture Point Cloud Data Triangulation Algorithm Integrated with Cylindrical Projection and Tangent Plane ProjectionJianghong Zhao, Yanming Wang, Ganhua Yin. 1108-1113 [doi]
- Rule Engine Research and Implementation in Financial SystemHongjin Zhang, Xiaohu Yang. 1114-1117 [doi]
- The Uncertainty Mathematical Methods of Economic AnalysisLimin Mi, Yuanxing Liu. 1118-1122 [doi]
- A Novel Security Network Storage System Based on InternetLin Guo, Hai-Bo Li, Zhi-hai Yu, Lejun Zhang, Jianpei Zhang. 1123-1127 [doi]
- A Personal Memex System Using Memex Ontology and Web ServicesYoungkun Min, Bogju Lee, Chansu Yu. 1128-1130 [doi]
- Applying an Enhanced Algorithm for Mining Incremental Updates on an Egyptian Newspaper WebsiteLaila Mohamed El Fangary. 1131-1135 [doi]
- Design and Implementation of Chinese Text Clustering SystemYing Tan, Lan Huang, Hong Qi, Yandong Zhai. 1136-1140 [doi]
- Research on a Knowledge Management Model of Modern Service Enterprises Based on Value ChainQin Yuanjian, Xiao Zhixiong. 1147-1152 [doi]
- Research on Reliable Transport Technology of Tubular Distribution Mobile Wireless Sensor NetworkLejun Zhang, Jianpei Zhang, Lin Guo, Hua Huang, Yongtian Yang, Pengfei Sun. 1153-1156 [doi]
- A Biological Early Warning System for Toxicity DetectionSung Yong Kim, Ki Yong Kwon, Won Don Lee. 1157-1160 [doi]
- Analysis on the Classification Error of ANNSLihua Feng, Jiahong Feng. 1161-1164 [doi]
- E-learning System Model Construction Based ConstructivismHuandong Chen, Shulei Wu, Chunhui Song, Jinmei Zhan, Juntao Chen, Dong Kang. 1165-1169 [doi]
- Improved Clonal Selection Algorithm for Protein Contact Map PredictionLan Huang, Guixia Liu, Rongxing Wang, Bin Yang, Chunguang Zhou. 1170-1175 [doi]
- Modeling of Broadcasting Based on Distance Scheme for WSNYubo Deng, Jianwei Niu, Lian Li. 1176-1179 [doi]
- Research on RFID System Recognition Test under the Forestry Environment for Tree ManagementTae-Woong Jung, Jee-Hee Koo, Kyoung Min Kim, Mu-wook Pyeon. 1180-1184 [doi]
- Research on the Learning Theory of E-learningHuandong Chen, Shulei Wu, Chunhui Song, Mingrui Chen. 1185-1187 [doi]
- Solving One-dimensional Cutting-Stock Problem Based on Ant Colony OptimizationBin Yang, Chunyang Li, Lan Huang, Ying Tan, Chunguang Zhou. 1188-1191 [doi]
- Upon the Dynamic Modeling of Sentence MeaningMarius Crisan. 1192-1197 [doi]
- A Flexible Metric-Driven Framework for Software ProcessCheng Lin, Zhongdong Huang. 1198-1202 [doi]
- Analysis on the Spillover Effect of Foreign Direct Investment: Case of SuzhouTao Yu, Qiang Wu, Ying Hong. 1203-1206 [doi]
- E-learning Systems Evaluation with Data Envelopment Analysis and Bayesian NetworksH.-Y. Kao, M. C. Liu, C.-L. Huang, Y. C. Chang. 1207-1210 [doi]
- A Performance Model For E-education ProjectHui Chai. 1211-1214 [doi]
- The Expansion of Information ConceptXiuheng Zhao, Rui Chen. 1215-1218 [doi]
- Design of Presence Based Dynamic Group IM in IMSWei Zheng, Chunhong Zhang, Cuibo Yu, Peng Yang, Yuqi Mu, Xiaohua Zhang. 1219-1222 [doi]
- Design of RFID-Based Profiling Agent for Recommendation System in Smart HomeJong-Hun Kim, Chang-Woo Song, Jung-Hyun Lee, Kee-Wook Rim. 1223-1226 [doi]
- Sub-order Non-duplication Event Matching Algorithm for Stateful Publish/Subscribe SystemsJianwei Yin, Chunxu Lv. 1227-1233 [doi]
- Ubiquitous Name-Based Information Management with a Multilingual Domain Name InterfaceYung Bok Kim. 1234-1239 [doi]
- A Fast Texture Matching Algorithm Based on Multi-resolution and PartitionShuhan Wei, Ranran Zhang, Pengyi Hao, Youdong Ding. 1240-1245 [doi]
- A New Approach for Combined Demosaicking and Watermarking in Digital Camera PipelinePooya Monshizadeh Naeeni, Alireza Nasiri Avanaki, Sied Mehdi Fakhraie. 1246-1250 [doi]
- A Novel 1GSPS Low Offset Comparator for High Speed ADCYongheng Guo, Wei Cai, Tiejun Lu, Zongmin Wang. 1251-1254 [doi]
- A Seamless Representation of Multi-scale CloudsJiangbin Xu, Hanchen Song, Lingda Wu, Chao Yang. 1255-1260 [doi]
- A Web-Based Installation Manual Management System for Open Source SoftwareYukikazu Murakami, Nobuo Funabiki, Hidekazu Tokunaga, Kazuhiro Shigeta, Toru Nakanishi. 1261-1266 [doi]
- An Effective Scene Manager for the Online Game Chungmukong s Battle on the Sea Min Seok Kang, Kyung-Sik Kim. 1267-1270 [doi]
- An Efficient Scheme to Construct Virtual Community for Multimedia Content Sharing Based on Profile in a Ubiquitous Computing EnvironmentChung-Pyo Hong, Eo-Hyung Lee, Shin-Dug Kim. 1271-1276 [doi]
- Applying Iterative Logistic Regression and Active Learning to Relevance Feedback in Image Retrieval SystemNa Luo, Weiwei Hu, Jin Zhang, Tao Fu, Jun Kong. 1277-1282 [doi]
- Automatic Construction of Multilingual Web Directory Using Self-Organizing MapsHsin-Chang Yang, Han-Wei Hsiao, Chung-Hong Lee. 1283-1288 [doi]
- Automatic Exploration Path Planning for 3D Object ObservationJian Zhao, Hanchen Song, Jiangbin Xu, Lingda Wu. 1289-1294 [doi]
- Combining Shape and Color for Retrieval of 3D ModelsConrado R. Ruiz Jr., Rafael Cabredo, Levi Jones Monteverde, Zhiyoung Huang. 1295-1300 [doi]
- DEM Extraction from LIDAR Data by Morphological GradientYong Li, Huayi Wu. 1301-1306 [doi]
- Dynamic and Incremental Clustering Based on Density ReachableYu-Chen Song, Hai-Dong Meng, Shu-Ling Wang, Michael J. O Grady, Gregory M. P. O Hare. 1307-1310 [doi]
- Exploring Traditional Art and Culture in Modern Computer GamesConrado R. Ruiz Jr., Nor Hidayu Salimi, Sujitra Chodnok, Pham Trung Ha. 1311-1316 [doi]
- Home Control System with the MobileDal-Hwan Yoon, Long Chen, Ki-Hwan Seo, Jong-Uk Yoon, Jong-Hwa Yoon. 1317-1320 [doi]
- Qualitative Cluster Reasoning Framework for Decision MakingYang Qu, Kyungmi Lee, Ickjai Lee. 1321-1326 [doi]
- Research on Knowledge Management of Pyramidia for E-learning SystemCuijuan Li, Bo Xu. 1327-1330 [doi]
- Role-Based Access Control of Digital Right ManagementDwen-Ren Tsai, Wei-Yu Chen, Chia-Hao Liang, Chung-Chiang Hu. 1331-1334 [doi]
- Speckle Filtering by Generalized Gamma DistributionSathit Intajag, Nopparat Sukkasem. 1335-1338 [doi]
- Speech Enhancement Using Spectral Subtraction Based on a Modified Noise Minimum Statistics EstimationHamze Moazami Goodarzi, Saeed Seyedtabaii. 1339-1343 [doi]
- The Progress in Modeling Research of Urban Spheres of Influence in ChinaLi Wang, Jianghao Wang, Hanqing Ma, Yu Deng, Jian Wang, Rui Chen. 1344-1347 [doi]
- The Smoothed 3D Skeleton for AnimationPorawat Visutsak, Korakot Prachumrak. 1348-1353 [doi]
- Using Local Latent Semantic Indexing with Pseudo Relevance Feedback in Web Image RetrievalRuhan He, Yong Zhu, Wei Zhan. 1354-1357 [doi]
- Visualizing Curvilinear Cylindrical Engineering Members in 3-D Environment with Motion PathManjit Singh Sidhu. 1358-1363 [doi]
- Voice Activity Detection Based on Distance Entropy in Noisy EnvironmentHuan Zhao, Li-xia Zhao, Kai Zhao, Gang-jin Wang. 1364-1367 [doi]
- A Scheduling Method on Selective Contents Broadcasting with Node Relay Based Webcast Considering Available BandwidthYusuke Gotoh, Tomoki Yoshihisa, Hideo Taniguchi, Masanori Kanazawa. 1368-1373 [doi]
- Basics of Concepts Representation for Document SummarizationSang C. Suh, S. I. Saffer, Sri Ganesh Anaparthi, Nikolay Metodiev Sirakov. 1374-1380 [doi]
- Design of Cluster-Based System Framework for SIP-Based Multimedia Conferencing ServicesHui-Kai Su, Wen-Hsu Hsiao, Yu-Kai Lin, Kim-Joan Chen, Cheng-Shong Wu. 1381-1387 [doi]
- Evaluation of E-publishing Acceptance in Iranian AcademiaSamrand Toufani, Gholam Ali Montazer. 1388-1394 [doi]
- How Can We Teach Computational Literacy to All Levels of Students?Soo Hwan Kim, SeonKwan Han, Hyeoncheol Kim. 1395-1400 [doi]
- Interactive Multimedia Interface and Multimodal Analysis for Technology-Enhanced Learning and Performance PreservationKia Ng. 1401-1405 [doi]
- Physical Learning Activities with a Teaching Assistant Robot in Elementary School Music ClassJeong-Hye Han, Dong-Ho Kim, Jong Won Kim. 1406-1410 [doi]
- Real-Time Stable Personal Broadcasting Community for Mobile TerminalsEo-Hyung Lee, Chung-Pyo Hong, Shin-Dug Kim. 1411-1418 [doi]
- Stroke Segmentation of Reconstruct Offline Handwriting Diagram Based on Continuous Hidden Markov ModelLiming Wu, Yingmin Zhang, Yaohua Deng, Xiuchun Tang. 1419-1424 [doi]
- A MIH Services Based Application-Driven Vertical Handoff Scheme for Wireless NetworksZequn Huang, Songnan Bai, Jaeil Jung. 1428-1431 [doi]
- Practice of Game-Theoretical Methods and Panel Data Model in City Environmental ManagementJian Wang, Rui Chen, Xin Guo, Ruilong Li, Ningjie Yu, Pengyan Zhang. 1432-1435 [doi]
- The Forecasting of China Natural Gas Consumption Based on Genetic AlgorithmChen Rui, Wang Jian, Wang Li, Yu Ningjie, Zhang Pengyan. 1436-1439 [doi]
- Virtual Organization Model Research in Collaborative Design GridXuebin Chen, Guolin Duan, Shufen Zhang, Jin Cai, Yuee Che. 1440-1444 [doi]
- A Security Enhancement Scheme for Image Perceptual HashingHaibin Zhang, Hui Zhang. 1445-1448 [doi]
- Beacon-based Cooperative Forwarding Scheme for Safety Applications in IVCSongnan Bai, Zequn Huang, Jaeil Jung. 1449-1456 [doi]
- High Capacity and Robust Digital Image WatermarkingChi-Man Pun. 1457-1461 [doi]
- Moving Image Frame with MobleDal-Hwan Yoon, Yong-Jin Park, Keun-Seong Choi, Se-Min Park, Jong-Hwa Yoon, Jong-Uk Yoon. 1462-1464 [doi]
- Reversible Digital Watermarking with Block LinkingChi-Man Pun, Nopporn Hemman. 1465-1468 [doi]
- The Application and Research of Text Mining in Relevance about Choosing Course and Research Project by Graduate StudentQin Wang, Shouning Qu, Caiyun Dong, Kui Liu. 1469-1472 [doi]
- The Study of the SIP for the VoIPChung-Hsin Liu, Chun-Lin Lo. 1473-1478 [doi]
- 2-Layered SOA Test Framework Based on Event-Simulating ProxyYoungkon Lee. 1479-1484 [doi]
- Acquiring Mood Information from Songs in Large Music DatabaseYi Liu, Yue Gao. 1485-1491 [doi]
- An Artificial Intelligence Based Model for Algebra EducationMaria de los A. Alonso, Argelio V. de la Cruz Rivera, Grettel Barceló. 1492-1498 [doi]
- An Efficient Hardware Architecture of the A-star Algorithm for the Shortest Path Search EngineWoo-Jin Seo, Seung Ho Ok, Jin-Ho Ahn, Sungho Kang, Byung-In Moon. 1499-1502 [doi]
- Sign Language Number RecognitionIwan Njoto Sandjaja, Nelson Marcos. 1503-1508 [doi]
- Simulation of Transient Non-stationary WindsChunxiang Li, Jinhua Li, Jianhong Shen. 1509-1512 [doi]
- Survivability for Wireless Sensor Network: Model, Evaluation and ExperimentJun Li, Xianghui Liu. 1513-1516 [doi]
- The Implementation of a Wired Call-out System with Quasi-digital EncodingJijie Zheng, Guozheng Wang, Haiyan Wu, Ying Tang. 1517-1519 [doi]
- VLSI Architecture of Video Post-Processing System for MPEG/H.26XChun-Ping Qin, Duo-Li Zhang, Gao-Ming Du, Ming-Lun Gao, Yu-Kun Song. 1520-1525 [doi]
- A Study on Access Control Model for Context-Aware WorkflowSeon-Ho Park, Jung-Ho Eom, Tai-Myoung Chung. 1526-1531 [doi]
- Application of RFID Technology to Curb Diversion of Transit Goods in KenyaJoseph K. Siror, Huanye Sheng, Dong Wang, Jie Wu. 1532-1539 [doi]
- Personal Healthcare Information SystemMangal Sain, Hoon Jae Lee, Wan-Young Chung. 1540-1545 [doi]
- The Analysis for the Auxiliary Telemedicine System QoSChung-Hsin Liu, Jiun-Ting Chen, Chung-Min Wu, Chuen-Lung Chen. 1546-1551 [doi]
- The Study of the Bluetooth Column-Ring pathChung-Hsin Liu, Yun-Mou Hou. 1552-1555 [doi]
- Use of RFID Technologies to Combat Cattle Rustling in the East AfricaJoseph K. Siror, Huanye Sheng, Dong Wang, Jie Wu. 1556-1562 [doi]
- A Comparative Study of Global and Local Feature Representations in Image Database CategorizationChih-Fong Tsai, Wei-Chao Lin. 1563-1566 [doi]
- A DM642-Based Underwater Video Coding SystemQing-Zhong Li, Jia-Xu Liu, Ai-Yun Zang, Zhong-Qi Wang, Wen-Jin Wang. 1567-1572 [doi]
- A New Approach to Salt-and-Pepper Noise Removal for Color ImageQing Xu 0002, Rui Zhang, Mateu Sbert. 1573-1576 [doi]
- A Scoring Function for Retrieving Photo Sets with Broad Topic CoverageSangjin Lee, Jonghun Park. 1577-1580 [doi]
- A Study of GIS Development Based on KML and Google EarthYing-jun Du, Chong-chong Yu, Jie Liu. 1581-1585 [doi]
- An Ontology-Based Method of Adaptive LearningZhiyong Liu, Lei Liu, Hui Kang, Shaochun Zhong, Bing Jia. 1586-1591 [doi]
- Application of an Uncertain Reasoning Approach to Software Aging DetectionQing E. Wu, ZhenYu Han, TianSong Guo. 1592-1597 [doi]
- Color Correction for Object Identification from Images with Different Color IlluminationYoo-Joo Choi, Yu-Bu Lee, We-Duke Cho. 1598-1603 [doi]
- Compound Block Algorithm of Moving Object and Background in H.264Jianfeng Zou, Ding Rong. 1604-1606 [doi]
- Design of the 3D Input Method Based on Touch Device for MobileMoon Sang Hwang, Jae Wook Jeon. 1607-1610 [doi]
- Global Feature Properties by Image Modifications and VariationsJaekyong Jeong, Chunho Park, Byeungwoo Jeon. 1611-1614 [doi]
- Hybrid Cataclysmic Genetic Algorithm Used to Reactive Power OptimizationWen-hua Zhou, Zhen-jie Jiang. 1615-1618 [doi]
- Intra-mixture Prediction Mode and Enhanced Most Probable Mode Estimation for Intra Coding in H.264/AVCJinho Lee, Jin Soo Choi, Jin Woo Hong, Haechul Choi. 1619-1622 [doi]
- Multifractal Spectrum Analysis on Microscope Image of Eutectic Carbides by a Quadratic Function FittingGuitang Wang, Jing Ning, Qiaofen Zhang, Wenjuan Liu, Luxin Tang. 1623-1627 [doi]
- Rate-Distortion Curve Evaluation for Cross-Layer Optimization in Multimedia TransmissionLaura Toni. 1628-1631 [doi]
- Vehicle Travel Time Prediction Algorithm Based on Historical Data and Shared LocationPeng Chen, Zhao Lu, Junzhong Gu. 1632-1637 [doi]
- Apply Web 2.0 Tools to Constructive Collaboration Learning: A Case Study in MIS CourseHsiao-Ya Chiu, Shi-Zong Wen, Chieh-Chung Sheng. 1638-1643 [doi]
- Developing Curriculum on U-City EducationTae-Woong Jung, Jee-Hee Koo. 1644-1648 [doi]
- Road Traffic Flow Prediction with a Time-Oriented ARIMA ModelHonghui Dong, Limin Jia, Xiaoliang Sun, Chenxi Li, Yong Qin. 1649-1652 [doi]
- Status of U-city Human Resource Development Business and the Direction for Education PoliciesJee-Hee Koo, Tae-Woong Jung, Mu-wook Pyeon. 1653-1657 [doi]
- Multi-infusion Timing Controller with User-Friendly Interface for Loose Leaf Tea Brewing ServiceChin-Ming Hsu, Hui-Mei Chao. 1658-1661 [doi]
- A Foreground Extraction Algorithm Based on Adaptively Adjusted Gaussian Mixture ModelsTianci Huang, Jingbang Qiu, Takeshi Ikenaga. 1662-1667 [doi]
- A FPGA-Based Dual-Pixel Processing Pipelined Hardware Accelerator for Feature Point Detection Part in SIFTJingbang Qiu, Tianci Huang, Takeshi Ikenaga. 1668-1674 [doi]
- A Secure Data Mechanism for Ubiquitous Sensor Network with Dragon CipherPardeep Kumar, Hoon Jae Lee. 1675-1680 [doi]
- IBE Applied to Identity Authentication for Object-Based Storage SystemJunjian Chen, Jingning Liu, Dan Feng, Zhikun Wang, Qinhua Yan. 1681-1684 [doi]
- Improving Scalability for RFID Privacy Protection Using ParallelismSeong-pyo Hong, Moon-Su Jung, Il-Yong Chung. 1685-1688 [doi]
- Lossless Steganography Techniques for IP Telephony Speech Taking Account of the Redundancy of Folded Binary CodeNaofumi Aoki. 1689-1692 [doi]
- Single-byte-marker for Detecting JPEG JFIF Header Using FORIMAGE-JPEGKamaruddin Malik Mohamad, Mustafa Mat Deris. 1693-1698 [doi]
- A Class of New AC-DC-AC Matrix Converter ACCMCJingxue Lin, Peilin Song. 1699-1704 [doi]
- A New 12-channel Hand-Held GPS Accelerator DesignCui-Xia Li, Wei Ming Liu, Yi Tang. 1705-1708 [doi]
- An Autonomous Mobile Robot System for Advanced Microcontroller EducationChin-Ming Hsu, Hui-Mei Chao. 1709-1714 [doi]
- Computer Simulation on Magnetic Field Distribution of Limited Current-Carrying SolenoidsXiao Deng, Qitu Hu, Liang Liang, Xiaoling Zhang. 1715-1719 [doi]
- Evaluation of Enterprise Managers Performance Based on Unascertained MeasurementBaosen Wang, Yuzhu Hao, Dawei Hu. 1720-1723 [doi]
- Implementation of Gray Projection Image Stabilization Algorithm Based on TMS320DM642Yong-xiang Zhang, Fang-min Chen, Jian Wang, Wei-gong Zhang, Quan Zhou. 1724-1726 [doi]
- Localization Systems Using Passive UHF RFIDJae Sung Choi, Hyun Lee, Ramez Elmasri, Daniel W. Engels. 1727-1732 [doi]
- Research of Image Capturing and Processing System Based on SOPC TechnologyZiting Wang, Cunfang Zheng. 1733-1736 [doi]
- Spline Interpolation Based FFT Simulation AlgorithmChunxiang Li, Jinhua Li, Peng Dong. 1737-1742 [doi]
- Texture Content-Based Image Retrieval for Necktie PatternChun-ying Liu, Zhi-Geng Pan, Jin-xiang Dong. 1743-1746 [doi]
- Using of Interactive Learning Environment in Experimental StudyHaiyan Yan, Bo Xu. 1747-1751 [doi]
- VBR MPEG Video Traffic Dynamic Prediction Based on the Modeling and Forecast of Time SeriesJun Dai, Jun Li. 1752-1757 [doi]
- An Energy Efficient Clustering Algorithm for Event-Driven Wireless Sensor Networks (EECED)Otgonchimeg Buyanjargal, Youngmi Kwon. 1758-1763 [doi]
- Bayesian Inference of Time-Dependent Behavior with Nonhomogeneous Poisson ProcessChi-Chang Chang, Chuen-Sheng Cheng, Pei-Ran Sun. 1764-1769 [doi]
- Study on Realization of Simulative Operation System Based on 3D Alternation TechnologyYing-hong Dong. 1770-1775 [doi]
- A Lightweight Routing Protocol for Mobile Target Detection in Wireless Sensor NetworksYu-Chen Kuo, Wen-Tien Yeh, Ching-Sung Chen. 1776-1782 [doi]
- Content Self-Protection for Digital Products Using RFID-Enable Agent PlatformKee-Hyun Choi, Dong Ryeol Shin, Ho-Jin Shin, Kyung-Soo Jang. 1783-1788 [doi]
- A New Hierarchical Document Clustering MethodGang Kou, Yi Peng. 1789-1792 [doi]
- A Research on Exception Monitoring and HandlingWeijian Huang, Shuo Liang, Yuanyuan Shi. 1793-1797 [doi]
- A Study on Identifying Essential Hyperplanes for Constructing a Multiclass Classification ModelSung Hyuk Park, Soon-Young Huh, Peng Zhang, Yong Shi. 1798-1804 [doi]
- Automating Cellular Network Faults Prediction Using Mobile Intelligent AgentsOkuthe P. Kogeda, Simbarashe Nyika. 1805-1810 [doi]
- Based on Improved BP Neural Network to Forecast Demand for Spare PartsJiafu Ren, Min Xiao, Zongfang Zhou, Fang Zhang. 1811-1814 [doi]
- Optimizing-Computation of Controlling Parameters of Intelligent Propulsion System of a Hydrofoil Sliding Craft Propelled by Adjustable-Pitch ScrewSong-lin Yang, Wei Xi, Lian-xiang Ma, Hong-qin Zhang, Zhao-long Yang. 1815-1818 [doi]
- Perceptual Image Watermarking Algorithm Based on Magic Squares Scrambling in DWTHui-fen Huang. 1819-1822 [doi]
- Research on Project Target Optimization and Decision-Making Based on MAUFT and AHMWeijian Huang, Juwei Yan, Fei Wang. 1823-1826 [doi]
- Research on the Application of Web Mining Framework in E-commerce Based on Mobile AgentWeijian Huang, Xuqian Zhou, Nianpeng Wang. 1827-1830 [doi]
- The Non-equal-interval Direct Verhulst GM(1, 1) Model with Two Times Fitting and its Application to Test Data ProcessingYouxin Luo, Bin Zeng. 1831-1835 [doi]
- Conquer Web 2.0 Motivational Challenges from Social Context EvolutionYuan-Chu Hwang, Tsung-Lin Li. 1836-1841 [doi]
- Integrated Network Management Certification Training with Computer Game: A Knowledge Placement FrameworkChen-Shu Wang, Yu-Chieh Li. 1842-1845 [doi]
- Shape-Match Algorithm Based on Least Single Direction Warping Works of PointsYong-tao Hao, Dai Le. 1846-1851 [doi]
- A Stepwise Methodology for Tracing Computer UsageSeungBong Lee, Jewan Bang, Kyung-Soo Lim, Jongsung Kim, Sangjin Lee. 1852-1857 [doi]
- Analysis of Time Information for Digital InvestigationJewan Bang, Byeongyeong Yoo, Jongsung Kim, Sangjin Lee. 1858-1864 [doi]
- How to Deal with Blurriness in Live Forensics: A Case of StudyAntonio Savoldi, Paolo Gubian, Isao Echizen. 1865-1871 [doi]
- A New Strategy for Handling Global Feedback Loops in Selective-Tracing Waveform Relaxation Algorithm for Large Scale MOSFET Circuit SimulationChun-Jung Chen, Chun-Chia Chang, Tai-Ning Yang, Chih-Jen Lee, Allen Y. Chang, Chang-Lung Tsai. 1872-1875 [doi]
- Analyzing Strategies of Integrating ICT into Teaching Activities Using Innovation Diffusion TheoryHui An Sang, Dwen-Ren Tsai. 1876-1878 [doi]
- Efficiency Evaluation for the 3G and WiMAXChung-Hsin Liu, Ping-Shin Tsai. 1879-1883 [doi]
- Integrated Application of WBAN and WSNWeiya Wang, Chao Li. 1884-1888 [doi]
- Interoperable Map Interface towards the Sharing and Integration of Internet Geospatial Resource: A Metadata PerspectiveJung-Hong Hong, Hsiung-Peng Liao. 1889-1895 [doi]
- Performance Evaluation of Real-Time Indoor Positioning with Active-RFID and CSS-Based Nano Lock SystemAllen Y. Chang, Dwen-Ren Tsai, Tsung-Chi Liu, Chun-Jung Chen, I-Horng Jeng. 1896-1898 [doi]
- Search, Identification and Positioning of the Underground Manhole with RFID Ground TagAllen Y. Chang, Chang Sung Yu, Sheng-Chi Lin, Yin-Yih Chang, Pei-Chi Ho. 1899-1903 [doi]
- The Analysis of a Multi-channel MAC Protocol Using Maximal Matching for Ad Hoc NetworksSheng-Hsuan Hsu, Ching-Chi Hsu, Shun-Shii Lin, Ferng-Ching Lin. 1904-1909 [doi]
- The Creative Commons Based Digital Right Management ModelWei-Yu Chen, Dwen-Ren Tsai. 1910-1912 [doi]
- The Simulation for the SIP DDoS AttackChung-Hsin Liu, Chun-Lin Lo. 1913-1917 [doi]
- A Novel Architecture for Efficient Key Management in Humanware ApplicationsMuhammad Khaliq-ur-Rahman Raazi Syed, Sungyoung Lee, Young-Koo Lee. 1918-1922 [doi]
- A Uniform Construction of New Exact Travelling Wave Solutions and its ApplicationsBinlu Feng, Yunhua Zhou. 1923-1928 [doi]
- An Efficient Anonymous Authentication Protocol with Pseudonym RevocabilityYang Zhang. 1929-1934 [doi]
- GA-Based on Demand Bandwidth Reservation for Real-Time Traffic in Cellular IP NetworkMohammad Anbar, D. P. Vidyarthi. 1935-1942 [doi]
- Optimization of Intelligent Compactness Control Rule of Vibratory Roller Based on Genetic Algorithm MethodYi Zhang, Jun Zhang, XingZu Shu, Lei Guo, Yong Shi, XinBo Liu. 1943-1947 [doi]
- Vertical Handover Algorithm for Heterogeneous Wireless NetworksGiovanni Ciccarese, Mario De Blasi, Pierluigi Marra, V. Mighali, Cosimo Palazzo, Luigi Patrono, M. L. Stefanizzi. 1948-1954 [doi]
- Kernel-Perfection through the Push OperationScott Heard, Jing Huang. 1955-1957 [doi]
- A Conceptual Model for Combining Enhanced OLAP and Data Mining SystemsMuhammad Usman, Sohail Asghar, Simon Fong. 1958-1963 [doi]
- A Framework of Business Intelligence-Driven Data Mining for E-businessYang Hang, Simon Fong. 1964-1970 [doi]
- The Application of Trend Following Strategies in Stock Market TradingSimon Fong, Jackie Tai. 1971-1976 [doi]
- A Controllable and Adaptable Computer Virus Detection ModelXin Wang, Hua Jiang, Zhenrong Deng. 1977-1981 [doi]
- A Trust Rating Model of Recommendation in GridWenming Huang, Peizhi Wen, Xianli Zeng, Zhenrong Deng. 1982-1985 [doi]
- Design and Development of SIP-Based Billing Application Server SystemZhenrong Deng, Wenming Huang, Zhenbo Tang. 1986-1989 [doi]
- Policy-Driven Service-Augmented Agents toward Developing Flexible E-business InstitutionGuoyong Cai, Baifa Luo, Zhenrong Deng, Weizhi Liao. 1990-1995 [doi]
- Research of Multi-objective Optimization Based on Hybrid Genetic AlgorithmHua Jiang, Guilin Xu, Zhenrong Deng. 1996-1999 [doi]
- Data Mining for Customer Queries in ERP ModelAbdullah S. Al-Mudimigh, Zahid Ullah, Farrukh Saleem, Fahad N. Al-Aboud. 2000-2005 [doi]
- Fast and Effective Generation of Candidate-Sequences for Sequential Pattern MiningWei-Cheng Liao, Don-Lin Yang, Jungpin Wu, Ming-Chuan Hung. 2006-2009 [doi]
- Mapping Method of SCORM Content Aggregation Model for E-learning Content DesignJin-Sung Kim, Young-Gue Park. 2010-2015 [doi]
- Mining Generalized Actionable Rules Using Concept HierarchiesLi-Shiang Tsay, Seunghyun Im. 2016-2023 [doi]
- Estimation of 3-D Trajectory of the Golf Ball Using Dual Linear SensorJi Eun Bae, Jin Wook Kim, Hang Joon Kim, Hyun Soo Park. 2024-2030 [doi]
- Empirical Study on Relationship between Independent Director System and Profitability of Listed Companies in ChinaYuchao Ma. 2031-2034 [doi]
- Estimation of the Rigidity and Expectational ModelShu Quan Lu, Shiyu Xie, Takao Ito. 2035-2039 [doi]
- A Blind Signature Scheme Based on Elliptic Curve CryptosystemFuh-Gwo Jeng, Tzer-Long Chen, Tzer-Shyong Chen. 2044-2049 [doi]
- A Brand-New Mobile Value-Added Service: M-CheckJung-San Lee, Bo Li, Yung-Chen Chou. 2050-2055 [doi]
- A Cross-Layering IPv6 Fast Handover Scheme for Real-Time Applications in IEEE 802.16e NetworkChen-Hua Shih, Yaw-Chung Chen. 2056-2061 [doi]
- A Framework of Multicast Key Agreement for Distributed User on 3G-WLANChung-Wei Chen, Shiuh-Jeng Wang, Yuh-Ren Tsai, Hsing-Chung Chen. 2062-2068 [doi]
- A One-Time Password Scheme with QR-Code Based on Mobile PhoneKuan-Chieh Liao, Wei-Hsun Lee, Min-Hsuan Sung, Ting-Ching Lin. 2069-2071 [doi]
- A Secure DSDV Routing Protocol for Ad Hoc Mobile NetworksJyu-Wei Wang, Hsing-Chung Chen, Yi-Ping Lin. 2079-2084 [doi]
- An Energy Efficient Clustering for Cluster-Based Wireless Sensor NetworksYung-Fa Huang, Jhao-Wei Guo, Young-Long Chen. 2085-2088 [doi]
- Authentication Schemes Based on the EAP-SIM Mechanism in GSM-WLAN Heterogeneous Mobile NetworksShen-Ho Lin, Jung-Hui Chiu, Sung-Shiou Shen. 2089-2094 [doi]
- Efficient Mission-Oriented Coordination Selection Methods for Hierarchal Wireless Sensor NetworksJong-Shin Chen, Yu-Nan Tsai, San-Hui Chuang, Zeng-Wen Hong. 2095-2099 [doi]
- IP Video Surveillance Applications over WiMAX Wireless Broadband TechnologyRui-Yen Chang, Chin-Lung Lee. 2100-2102 [doi]
- Performance of Adaptive Vertical Handoff in Heterogeneous Networks of WLAN and WCDMA SystemsYung-Fa Huang, Chin-Wei Hsu, Fu-Bin Gao, Hsing-Chung Chen. 2103-2107 [doi]
- Security of Dynamic ID-Based Remote User Authentication SchemeYa-Fen Chang, Hung-Chin Chang. 2108-2110 [doi]
- Temporal and Location-Based RBAC ModelHsing-Chung Chen, Shiuh-Jeng Wang, Jyh-Horng Wen, Chung-Wei Chen. 2111-2116 [doi]