


default search action
19th AINA 2005: Fukuoka, Japan
- 19th International Conference on Advanced Information Networking and Applications (AINA 2005), 28-30 March 2005, Taipei, Taiwan. IEEE Computer Society 2005, ISBN 0-7695-2249-1

Volume 1
Multimedia Communication and Synchronization
- Emmanuel Bouix, Marc Dalmau, Philippe Roose, Franck Luthon

:
Multimedia Oriented Component Model. 3-8 - Yasutaka Nishimura, Tomoya Enokido, Makoto Takizawa

:
Design of a Hierarchical Group to Realize a Scalable Group. 9-14 - Yun-Sheng Yen, Weimin Chen, Jia-Cheng Zhuang, Han-Chieh Chao

:
A Novel Sliding Weighted Fair Queueing Scheme for Multimedia Transmission. 15-20 - Hsu-Chen Cheng, Frank Yeong-Sung Lin:

Maximum-Revenue Multicast Routing and Partial Admission Control for Multirate Multimedia Distribution. 21-26 - Satoshi Itaya, Tomoya Enokido, Makoto Takizawa

:
A High-Performance Multimedia Streaming Model on Multi-Source Streaming Approach in Peer-to-Peer Networks. 27-32
Multi-Agent Systems
- S. Misbah Deen:

A Multi-Agent Framework for a P2P Data Sharing Facility. 35-40 - Bo Liu

, Junzhou Luo, Wei Li:
Multi-Agent Based Network Management Task Decomposition and Scheduling. 41-46 - Jun Sawamoto, Hidekazu Tsuji, Dilmurat Tilwaldi, Hisao Koizumi:

A Proposal of Multi-Agent System Development Framework for Cooperative Problem Solving and Its Experimental Evaluation. 47-52 - Guangzhu Chen, Zhishu Li, Daohua Yuan, Nimazhashi:

A Model of Multi-Agent System Based on Immune Evolution. 53-58 - Emad Farazmand, Afsaneh Shokoufi, Caro Lucas, Farzad Habibipour:

Using a Learning Mechanism in Matchmaking Process of Agents' Negotiation in Multi-Agent Systems. 59-64
Ad Hoc Network I
- Zhenjie Huang

, Dan Chen, Yumin Wang:
Multi-Signature with Anonymous Threshold Subliminal Channel for Ad Hoc Environments. 67-71 - Chyi-Ren Dow, Pei-Jung Lin

, Sheng-Chang Chen, Jyh-Horng Lin, Shiow-Fen Hwang:
A Study of Recent Research Trends and Experimental Guidelines in Mobile Ad Hoc Networks. 72-77 - Masashi Saito, Jun Tsukamoto, Takaaki Umedu, Teruo Higashino:

Evaluation of Inter-Vehicle Ad Hoc Communication Protocol. 78-83 - Fumiaki Sato, Tadanori Mizuno:

A Route Reconstruction Method Based on Support Group Concept for Mobile Ad Hoc Networks. 84-89 - Bing-Hong Liu, Ming-Jer Tsai, Wei-Chei Ko:

Dynamical Construction of a Core-Based Group-Shared Multicast Tree in Mobile Ad Hoc Networks. 90-95
Real-Time Systems and Tracking
- Goichi Itabashi, Kaoru Takahashi, Yasushi Kato, Takuo Sugamma, Norio Shiratori:

Incremental Design of a State Machine Specification for Mobile and Real-Time Systems . 99-104 - Chun-Chao Yeh:

On the Power-Aware Resource Allocation for Linear-Pipelined Real-Time Tasks. 105-110 - Hui-Huang Hsu, Timothy K. Shih, Chia-Tong Tang, Yi-Chun Liao:

Real-Time Multiple Tracking Using a Combined Technique. 111-116 - D. Frank Hsu, Damian M. Lyons:

A Dynamic Pruning and Feature Selection Strategy for Real-Time Tracking. 117-124 - Simon Sheu, Chang-Yeng Cheng, Alan Chang:

Fast Pattern Detection in Stream Data. 125-130
Semantic Based Information Retrieval
- Qing Li

, Jun Yang, Yueting Zhuang:
Multi-Modal Information Retrieval with a Semantic View Mechanism. 133-138 - Mikio Amano, Daisuke Hironaka, Seio Oda, Genci Capi

, Masao Yokota:
Linguistic Interpretation of Human Motion Based on Mental Image Directed Semantic Theory. 139-144 - Seksun Suwanmanee, Djamal Benslimane, Philippe Thiran:

OWL-Based Approach for Semantic Interoperability. 145-150 - Anthony Y. Chang:

An Intelligent Semantic Model for the Design of Consistent Online SMIL Presentations. 151-156 - Jason C. Hung, Ching-Sheng Wang, Che-Yu Yang, Mao-Shuen Chiu, George Yee:

Applying Word Sense Disambiguation to Question Answering System for e-Learning. 157-162
Peer-to-Peer and Real-Time Communications
- Kenichi Watanabe, Tomoya Enokido, Makoto Takizawa

, K. H. (Kane) Kim:
Charge-Based Flooding Algorithm for Detecting Multimedia Objects in Peer-to-Peer Overlay Networks. 165-170 - Nobuhiro Nakamura, Souichirou Takahama, Leonard Barolli, Jianhua Ma, Kaoru Sugita:

A Multiplatform P2P System: Its Implementation and Applications. 171-176 - Wei Ren

, Hai Jin:
Distributed Agent-Based Real Time Network Intrusion Forensics System Architecture Design . 177-182 - Takahide Gouda, Leonard Barolli, Kaoru Sugita, Akio Koyama, Arjan Durresi, Giuseppe De Marco:

Application of Policing Mechanisms for Broadband Networks: Issues and Difficulties. 183-188 - Marco Comuzzi

, Chiara Francalanci, Paolo Giacomazzi:
Trade-Off Based Negotiation of Traffic Conditioning and Service Level Agreements in DiffServ Networks. 189-194
e-Learning and SCORM
- Yoshihito Takahashi, Tomomi Abiko, Eriko Negishi, Goichi Itabashi, Yasushi Kato, Kaoru Takahashi, Norio Shiratori:

An Ontology-Based e-Learning System for Network Security. 197-202 - Hsiau Wen Lin, Wen-Chih Chang, George Yee, Timothy K. Shih, Chun-Chia Wang, Hsuan-Che Yang

:
Applying Petri Nets to Model SCORM Learning Sequence Specification in Collaborative Learning. 203-208 - Jun-Ming Su, Shian-Shyong Tseng, Jui-Feng Weng, Kuan-Ting Chen, Yi-Lin Liu, Yi-Ta Tsai:

An Object Based Authoring Tool for Creating SCORM Compliant Course. 209-214 - Mike Hogeboom, Fuhua Oscar Lin

, Larbi Esmahi, Chunsheng Yang:
Constructing Knowledge Bases for e-Learning Using Protege 2000 and Web Services. 215-220 - Sheng-Tun Li, Chu-Hung Lin:

On the Distributed Management of SCORM-Compliant Course Contents. 221-226
Collaborative Environment and Virtual Space
- Tomoyuki Ishida, Akihiro Miyakawa, Yoshitaka Shibata:

Virtual Traditional Japanese Crafting System Using JGNII in Collaborative Work Environment. 229-234 - Kaoru Sugita, Tomoyuki Ishida, Akihiro Miyakawa, Leonard Barolli, Yoshitaka Shibata:

Experimental Result of Feature Extraction Method for Digital Traditional Japanese Crafting System. 235-240 - Toshitada Ishii, Yoshitaka Shibata:

An Interactive Virtual Space Presentation System Considering Users Background. 241-246 - Masaki Ito, Jin Nakazawa, Hideyuki Tokuda:

mPATH: An Interactive Visualization Framework for Behavior History. 247-252 - Naoki Nakashima, Koji Okamura, Joon-Soo Hahm, Young-Woo Kim

, Hiroshi Mizushima, Haruyuki Tatsumi, Byung-In Moon, Ho-Seong Han, Yong-Jin Park
, Jae-Hwa Lee, Sung-Kwan Youm, Chul-Hee Kang, Shuji Shimizu:
Telemedicine with Digital Video Transport System in Asia-Pacific Area. 253-257
Multicast Protocols and Admission Controls
- Kun Zhang, Heng Wang, Feng-Yu Liu:

An Efficient Algorithm Based on Simulated Annealing for Multicast Routing with Delay and Delay Variation Constraints. 261-266 - Hui Tian, Hong Shen:

Hamming Distance and Hop Count Based Classification for Multicast Network Topology Inference. 267-272 - Bo Rong, Maria Bennani

, Michel Kadoch
, Ahmed K. Elhakeem:
Bandwidth Fragmentation Avoided QoS Multicast Routing by Employing Admission Control. 273-278 - Wen-Tsuen Chen, Ho-Ling Hsu, Jeng-Long Chiang:

Logical Key Tree Based Secure Multicast Protocol with Copyright Protection. 279-284
Grid Computing
- Dang Minh Quan, Odej Kao:

On Architecture for SLA-Aware Workflows in Grid Environments. 287-292 - Mingkui Yang, Hongbing Liang, Bin Xu:

S-WFMS: A Service-Based Workflow Management System in Grid Environment. 293-297 - Chao-Tung Yang

, Yi-Chun Hsiung, Heng-Chuan Kan:
Implementation and Evaluation of a Java Based Computational Grid for Bioinformatics Applications. 298-303 - Fang-Yie Leu, Jia-Chun Lin, Ming-Chang Li, Chao-Tung Yang

, Po-Chi Shih:
Integrating Grid with Intrusion Detection. 304-309 - Stephen Childs, Brian A. Coghlan, David O'Callaghan, Geoff Quigley, John Walsh:

A Single-Computer Grid Gateway Using Virtual Machines. 310-315
Sensor Network
- Sheng-Po Kuo, Yu-Chee Tseng, Fang-Jing Wu

, Chun-Yu Lin:
A Probabilistic Signal-Strength-Based Evaluation Methodology for Sensor Network Deployment. 319-324 - Chih-Wei Shiou, Frank Yeong-Sung Lin, Hsu-Chen Cheng, Yean-Fu Wen:

Optimal Energy-Efficient Routing for Wireless Sensor Networks. 325-330 - Lok Hang Lee, Man Hon Wong:

Aggregate Sum Retrieval in Sensor Network by Distributed Prefix Sum Data Cube. 331-336 - Ren C. Luo, Ogst Chen, Liang Chao Tu:

Nodes Localization through Data Fusion in Sensor Network. 337-342 - Arjan Durresi, Vamsi Paruchuri

:
Geometric Broadcast Protocol for Sensor and Actor Networks. 343-348
Agent and Distributed Systems I
- Ying-Hong Wang, Huan-Chao Keh, Tsang-Ching Hu, Cheng-Horng Liao:

A Hierarchical Dynamic Monitoring Mechanism for Mobile Agent Location. 351-356 - Min Yang, Shao-yin Huang, Zhi Wang, Zunping Cheng, Dilin Mao, Chuanshan Gao:

PICC: A Secure Mobile Agent Framework Based on Garbled Circuit. 357-362 - Gen Kitagata, Yu Matsushima, Daisuke Hasegawa, Tetsuo Kinoshita

, Norio Shiratori:
An Agent-Based Middleware for Communication Service on Ad Hoc Network. 363-367 - Youhei Tanaka, Tomoya Enokido, Makoto Takizawa

:
Design and Implementation of Transactional Agents for Manipulating Distributed Objects. 368-373 - George Yee, Larry Korba:

An Agent Architecture for e-Services Privacy Policy Compliance. 374-379
Security and Authentication Protocols
- Heping Hu, Hanbing Yao:

A Scheme for Authentication and Authorization in a Grid Application. 383-387 - Tianjie Cao, Dongdai Lin, Rui Xue:

An Efficient ID-Based Deniable Authentication Protocol from Pairings. 388-391 - Chung-Ming Huang, Jianwei Li:

Authentication and Key Agreement Protocol for UMTS with Low Bandwidth Consumption. 392-397 - Fangguo Zhang

, Yi Mu, Willy Susilo
:
Reducing Security Overhead for Mobile Networks. 398-403
Ad Hoc Network II
- Yi-Chung Chen, Jang-Ping Sheu:

Interest-Based Lookup Protocols for Mobile Ad Hoc Networks. 407-413 - Wen-Lin Yang:

Constructing Energy-Efficient Multicast Trees with Delay Constraints in Ad Hoc Networks. 414-419 - Kuei-Ping Shih, Chih-Yung Chang, Chien-Min Chou, Szu-Min Chen:

A Power Saving MAC Protocol by Increasing Spatial Reuse for IEEE 802.11 Ad Hoc WLANs. 420-425 - Zhenyu Liu, Marta Z. Kwiatkowska, Costas C. Constantinou

:
A Biologically Inspired QoS Routing Algorithm for Mobile Ad Hoc Networks. 426-431 - Wei-Yeh Chen, Jean-Lien C. Wu:

Performance Analysis of Radio Resource Allocation for Multimedia Traffic in Cellular Networks. 432-437
Routing Algorithms
- Chung-Min Chen, Yibei Ling, Marcus Pang, Wai Chen, Shengwei Cai, Yoshihisa Suwa, Onur Altintas:

Scalable Request Routing with Next-Neighbor Load Sharing in Multi-Server Environments. 441-446 - Harri Paloheimo, Antti Ylä-Jääski:

Interoperability of MANET and 4G RAN Routing in Terms of Energy Conservation. 447-452 - Ashraf Uddin Ahmed, Senro Saito, Zixue Cheng:

Zone-Based Routing Algorithm for Congestion Control over the Internet. 453-458 - Sing-Ling Lee, Jung-Chun Liu, YuChing Chen:

An Ear-Decomposition Based Approach for Survivable Routing in WDM Networks. 459-464 - Yan Shi, Zengji Liu, Zhiliang Qiu, Min Sheng:

Load Balance Based Network Bandwidth Allocation for Delay Sensitive Services. 465-470
Admission Control
- Leonard Barolli, Mimoza Durresi, Kaoru Sugita, Arjan Durresi, Akio Koyama:

A CAC Scheme for Multimedia Applications Based on Fuzzy Logic. 473-478 - Deyun Gao, Jianfei Cai

, Liren Zhang:
Physical Rate Based Admission Control for HCCA in IEEE 802.11e WLANs. 479-483 - Changhua Zhu, Changxing Pei, Jiandong Li, Weidong Kou:

QoS-Oriented Hybrid Admission Control in IEEE 802.11 WLAN. 484-487 - Song Xiao, Chengke Wu, Jechang Jeong:

Robust Video Communication Based on Source Modeling and Network Congestion Control. 488-491
Web-Based Systems
- Mario A. Bochicchio

, Nicola Fiore:
Supporting the Conceptual Modeling of Web Applications: The MODE Project. 495-500 - Guillermo de Jesús Hoyos-Rivera, Roberta Lima-Gomes, Jean-Pierre Courtiat:

CoLab: A Flexible Collaborative Web Browsing Tool. 501-506 - Wai Yip Lum

, Francis Chi-Moon Lau:
User-Centric Adaptation of Structured Web Documents for Small Devices. 507-512 - Wassam Zahreddine, Qusay H. Mahmoud

:
A Framework for Automatic and Dynamic Composition of Personalized Web Services. 513-518 - Yeim-Kuan Chang, Ming-Hong Hong, Yi-Wei Ting:

Web-Based Energy-Efficient Cache Invalidation in Wireless Mobile Environment. 519-524
Mobile Systems and Applications
- Katsuhiko Sato, Michiaki Katsumoto, Tetsuya Miki:

Fragmented Patching: New VOD Technique That Supports Client Mobility. 527-532 - Shu-Ming Tseng

, Teng-Chuan Lin, Kuan-Fu Huang:
A Low-Complexity Iterative Detector for COFDM in Mobile Channels. 533-537 - Agustinus Borgy Waluyo, Gabriel Goh, David Taniar, Bala Srinivasan:

On Building a Data Broadcasting System for Mobile Databases. 538-543 - Takaaki Umedu, Shigeharu Urata, Akio Nakata, Teruo Higashino:

Automatic Decomposition of Java Program for Implementation on Mobile Terminals. 544-549
Cellular Network and CDMA
- Ben-Jye Chang:

MDP-Based Fast Handoff with Reducing Waste Rate Method for Management Radio Resource in 3GPP Cellular Networks. 553-558 - Junyang Zhou

, Kenneth Man-Kin Chu, Joseph Kee-Yin Ng:
Providing Location Services within a Radio Cellular Network Using Ellipse Propagation Model. 559-564 - Shu-Ming Tseng

, Hung-Chieh Yu, Chi-Lung Chang, Yuan-Ching Tseng, Kuen-Cherng Lin:
EM Vector Channel Estimation and V-BLAST/PIC Detection for Multiuser Long-Code MIMO CDMA in Multipath Rayleigh Fading Channels. 565-569 - Jen-Shun Yang, Chien-Chao Tseng

, Ray-Guang Cheng
:
A Signal-to-Interference Ratio Based Downlink Scheduling Scheme for WCDMA Mobile Communication System. 570-575 - Po-Jen Chuang, Shien-Da Chang:

Performance Analysis on Location Tracking in PCS Networks. 576-582
Encryption and Privacy
- Ren-Junn Hwang, Feng-Fu Su, Yi-Shiung Yeh, Chia-Yao Chen:

An Efficient Decryption Method for RSA Cryptosystem. 585-590 - Tianjie Cao, Dongdai Lin, Rui Xue:

ID-Based Ring Authenticated Encryption. 591-596 - Sheng-Hua Shiau, Ren-Junn Hwang, Ming-Fuu Lin:

Key Agreement Protocol Based on Weil Pairing. 597-602 - Willy Susilo

, Fangguo Zhang
, Yi Mu:
Privacy-Enhanced Internet Storage. 603-608 - Zhenjie Huang

, Zhixiong Chen, Yumin Wang:
Convertible Undeniable Partially Blind Signatures. 609-614
Search Engine and Information Retrieval
- Simon Sheu, Alan Chang, Webber Huang:

Fast Similarity Search in String Databases. 617-622 - Hao-ming Wang, Boqin Feng:

Research of the Chinese Meta-search Engine Model Based on Intelligent Agent. 623-628 - Bo Yang, Ali R. Hurson

:
Ad Hoc Image Retrieval Using Hierarchical Semantic-Based Index. 629-634 - Nobuyoshi Sato, Minoru Uehara, Yoshifumi Sakai:

The Evaluations of FTF-IDF Scoring for Fresh Information Retrieval. 635-640 - Nen-Fu Huang, Rong-Tai Liu, Chih-Hao Chen, Ying-Tsuen Chen, Li-Wen Huang:

A Fast URL Lookup Engine for Content-Aware Multi-Gigabit Switches. 641-646
Distributed Systems
- Shin-Jia Hwang, Kuang-Hsi Chen:

A Proxy Automatic Signature Scheme Using a Compiler in Distributed Systems for (Unknown) Virus Detection. 649-654 - János Tapolcai

, Pin-Han Ho, Xiaohong Jiang, Susumu Horiguchi:
Shared Protection Based on Matrix Decomposition in Tropical Semi-Rings. 655-660 - Satoshi Fujita, Shigeaki Tagashira, Chen Qiao, Masaya Mito:

Distributed Branch-and-Bound Scheme for Solving the Winner Determination Problem in Combinatorial Auctions. 661-666 - Jingde Cheng:

Connecting Components with Soft System Buses: A New Methodology for Design, Development, and Maintenance of Reconfigurable, Ubiquitous, and Persistent Reactive Systems. 667-672
Agent and Distributed Systems II
- Yu Jiao, Ali R. Hurson

:
Adaptive Power Management for Mobile Agent-Based Information Retrieval. 675-680 - Prasanna Lokuge, Damminda Alahakoon:

Reinforcement Learning in Neuro BDI Agents for Achieving Agent's Intentions in Vessel Berthing Applications. 681-686 - Sameera Abar

, Hideaki Hatori, Toru Abe, Tetsuo Kinoshita
:
Agent-Based Knowledge Acquisition in Network Management Domain. 687-692 - Ssu-Hsuan Lu, Chun-Chieh Yang, Hsiao-Hsi Wang, Kuan-Ching Li

:
On Design of Agent Home Scheme for Prefetching Strategy in DSM Systems. 693-698 - Jun'ichi Yura, Jin Nakazawa, Hideyuki Tokuda:

Galaxy DS: Directory Service for Service Composition Based on Smart Space Structure. 699-704
Security, Cryptographic, and Watermarking
- Yuichi Nakamura, Hiroaki Kikuchi:

Efficient Key Management Based on the Subset Difference Method for Secure Group Communication. 707-712 - Fan Hong, Liang Hong, Cai Fu:

Secure OLSR. 713-718 - Jiali Cao, Zheng-an Yao:

An Improved RSA-Based Access Control Scheme for Hierarchical Groups. 719-723 - Jingmei Liu, Baodian Wei, Xiangguo Cheng, Xinmei Wang:

An AES S-Box to Increase Complexity and Cryptographic Analysis. 724-728 - Ying-Lan Chang, Koun-Tem Sun, Yueh-Hong Chen:

ART2-Based Genetic Watermarking. 729-734
Caching Algorithms and Scheduling
- Rachid El Abdouni Khayari, Michael Best, Axel Lehmann:

Impact of Document Types on the Performance of Caching Algorithms in WWW Proxies: A Trace Driven Simulation Study. 737-742 - Hai Jin, Chao Xie, Kaiqin Fan, Rong Hu, Yunfa Li

:
Single Stream Image and Stream Network Prefetch in Streaming Media Proxy Caching. 743-748 - Iftekhar Ahmad

, Joarder Kamruzzaman
, Srinivas Aswathanarayaniah:
An Improved Preemption Policy for Higher User Satisfaction. 749-754 - Tomoya Enokido, Makoto Takizawa

:
Concurrency Control Using Role Ordering (RO) Scheduler. 755-760 - Li-Hsing Yen, Chi-Hung Liao:

Round-Robin with FCFS Preemption: A Simple MAC Scheduling Scheme for Bluetooth Piconet. 761-766
Wireless Networks
- Jing Liu, Jiandong Li, Lei Zhou, Guanghui Zhang:

An Enhanced User-Dependent Perfect-Scheduling Multiple Access Protocol for Wireless Packet Network. 769-774 - Hong Zhu, Chengke Wu, Yangli Wang, Yong Fang:

Fast Mode Decision for H.264/AVC Based on Macroblock Correlation. 775-780 - Shuenn Gi Lee:

Performance of Concatenated FEC under Fading Channel in Wireless-MAN OFDM System. 781-785 - Chen-Shie Ho, Sy-Yen Kuo

, Shih-Yi Yuan
:
Group Partition and Restoration Strategies for Survivable WDM Networks. 786-791 - Nen-Fu Huang, Kwei-Bor Chen, Whai-En Chen:

Fast and Scalable Multi-TCAM Classification Engine for Wide Policy Table Lookup. 792-797
Traffic Analysis and Protocols
- Kultida Rojviboonchai, Toru Osuga, Hitoshi Aida:

R-M/TCP: Protocol for Reliable Multi-Path Transport over the Internet. 801-806 - Rung-Shiang Cheng, Hui-Tang Lin, Wen-Shyang Hwang, Ce-Kuen Shieh:

Improving the Ramping up Behavior of TCP Slow Start. 807-812 - Yung-Chung Wang:

Conditional Drop Probability of RED Mechanism with UDP and TCP Traffic. 813-820 - Ling Chen:

Effects of Network Characteristics on Task Performance in a Desktop CVE System. 821-826 - Bo Rong, Jacques Lebeau, Maria Bennani

, Michel Kadoch
, Ahmed K. Elhakeem:
Traffic Aggregation Based SIP over MPLS Network Architecture. 827-832
Parallel Systems
- Junichi Funasaka:

An Analysis on Adaptive Parallel Downloading Method. 835-840 - S. M. Rezazad, Hamid Sarbazi-Azad:

A Constraint-Based Performance Comparison of Hypercube and Star Multicomputers with Failures. 841-846 - Tzong-Jye Liu, Chia-Lin Lee:

2-State Alternator for Uniform Rings with Arbitrary Size. 847-852 - Yosuke Sugiyama, Tomoya Enokido, Makoto Takizawa

:
Lattice-Based Precedence of Moderate Lock Modes on Objects. 853-858 - Liang Cai, Xiaohu Yang, Chun Chen:

Design and Implementation of a Server-Aided PKI Service (SaPKI. 859-864
e-Commerce and e-Entertainment on Grid Computing
- Chia-Hung Chien, Paul Hsueh-Min Chang, Von-Wun Soo:

Market-Oriented Multiple Resource Scheduling in Grid Computing Environments. 867-872 - Graham Morgan

, Kier Storey:
Scalable Collision Detection for Massively Multiplayer Online Games. 873-878 - Muhammad Younas, Kuo-Ming Chao

, Rachid Anane
, Song Y. Yan, Philip J. Lovett, Anthony N. Godwin:
Grid Services Mediation. 879-884 - Rosa Gil

, Jaime Delgado
, Zièd Choukair:
Characterizing Ad Hoc B2B Applications Using Ontologies and Complex Systems. 885-892 - Zièd Choukair:

Correctness Proof Obligation for CoCTelS Telecom Services Composition Model. 893-900
Information Networks and Applications I
- Yoshizo Ishihara, Runhe Huang, Kwang Mong Sim

:
Learning Opponent's Eagerness with Bayesian Updating Rule in a Market-Driven Negotiation Model. 903-908 - Pi-Chung Wang

, Chun-Liang Lee, Yuan-Rung Yang, Hung-Yi Chang:
CAM-Based Huffman Decoding Made Power Efficient. 909-914 - Katsuhiro Takata, Yusuke Shina, Jianhua Ma, Bernady O. Apduhan:

Designing a Space-Oriented System for Ubiquitous Outdoor Kid's Safety Care. 915-920 - Rami Yared, Xavier Défago

, Takuya Katayama:
Fault-Tolerant Group Membership Protocols Using Physical Robot Messengers. 921-926 - Shuxin Yin, Indrakshi Ray:

Relational Database Operations Modeling with UML. 927-932
Information Networks and Applications II
- Teng Ma, Junzhou Luo:

A Prediction-Based and Cost-Based Replica Replacement Algorithm Research and Simulation. 935-940 - Jinhua Sun, Jiandong Li, Lijun Jin:

A RS-SISO Algorithm for Serially Concatenated Continuous Phase Modulation. 941-946 - Chin-Chen Chang, Wei-Liang Tai

, Min-Hui Lin
:
A Reversible Data Hiding Scheme with Modified Side Match Vector Quantization. 947-952 - Ratsameetip Wita

, Yunyong Teng-Amnuay:
Vulnerability Profile for Linux. 953-958
Information Networks and Applications III
- Michel Raynal, Matthieu Roy, Ciprian Tutu:

A Simple Protocol Offering Both Atomic Consistent Read Operations and Sequentially Consistent Read Operations. 961-966 - Woei-Kae Chen, Tung-Hung Tsai, Hung-Hsing Chao:

Integration of Specification-Based and CR-Based Approaches for GUI Testing. 967-972 - Xiangguo Cheng, Jingmei Liu, Xinmei Wang:

An Identity-Based Signature and Its Threshold Version. 973-977 - Xinxin Fan, Yumin Wang:

Simultaneous Divisor Class Addition-Subtraction Algorithm and Its Applications to Hyperelliptic Curve Cryptosystem. 978-983
Information Networks and Applications IV
- Bo Xu, Dongyi Jiang, Jun Li:

HSM: A Fast Packet Classification Algorithm. 987-992 - Tzu-Chi Huang, Ce-Kuen Shieh, Yu-Ben Miao:

Java Application's Packet Eavesdropper for Content Delivery Network. 993-998 - Nobuo Funabiki, Megumi Isogai, Toru Nakanishi, Teruo Higashino:

Optical-Drop Wavelength Assignment Problem for Wavelength Reuse in WDM Ring Metropolitan Area Networks. 999-1004 - Jianhua Yang, Shou-Hsuan Stephen Huang:

Matching TCP Packets and Its Application to the Detection of Long Connection Chains on the Internet. 1005-1010 - Agustinus Borgy Waluyo, Bala Srinivasan, David Taniar:

Global Indexing Scheme for Location-Dependent Queries in Multi Channels Mobile Broadcast Environment. 1011-1016
Volume 2
Ad Hoc and Mobile Networks
- Venkatesan Balakrishnan, Vijay Varadharajan:

Designing Secure Wireless Mobile Ad Hoc Networks. 5-8 - Guanghui Zhang, Jiandong Li, Yanhui Chen, Jing Liu:

Effect of Mobility on the Critical Transmitting Range for Connectivity in Wireless Ad Hoc Networks. 9-12 - Wenzhu Zhang, Jiandong Li, Xuan Wang:

Cost-Efficient QoS Routing Protocol for Mobile Ad Hoc Networks. 13-16 - San-Yuan Wang, Jia-Yu Liu, Chun-Chien Huang, Mao-Yuan Kao, Yi-Ho Li:

Signal Strength-Based Routing Protocol for Mobile Ad Hoc Networks. 17-20 - Chen-Nien Tsai, Kai-Wei Ke, Ho-Ting Wu:

Synchronous and Multiplexed Time Slots and Radio Blocks Allocation for Mobile Packet Data Networks. 21-24 - He Hong, Jiandong Li, Min Sheng:

CRMA: A Novel Multiple Access Protocol for Power Efficient Wireless LAN. 25-28
Multicasting and Broadcasting
- Yuka Kato

, Atsushi Honda, Katsuya Hakozaki:
An Analysis of Relationship between Video Contents and Subjective Video Quality for Internet Broadcasting. 31-34 - Ngoc Chi Nguyen, Vo Dinh Minh Nhat, Sungyoung Lee:

Fault Tolerant Routing and Broadcasting in de Bruijn Networks. 35-40 - Alimujiang Yiming, Toshio Eisaka:

A Switched Ethernet Protocol for Hard Real-Time Embedded System Applications. 41-44 - Kazuhisa Nakagawa, Koji Okamura:

The Advanced International Case Study Using High Speed Internet. 45-48
Wireless Communication
- Ying-Hong Wang, Hui-Min Huang, Huang-Yi Li:

Hybrid CIP/M&M for Micro-Mobility Management under the Multilayer Wireless Network. 51-54 - Ying-Hong Wang, Kuo-Jan Tseng, Yi Hsieh:

An Algorithm of Dynamic Resource Reservation for Multimedia Wireless Communication. 55-59 - Tzu-Jane Tsai, Ju-Wei Chen:

IEEE 802.11 MAC Protocol over Wireless Mesh Networks: Problems and Perspectives. 60-63 - Chih-Yung Chang, Hao-Chun Sun, Chen-Chi Hsieh:

MCDA: An Efficient Multi-Channel MAC Protocol for 802.11 Wireless LAN with Directional Antenna. 64-67 - Makoto Kamegawa, Mai Kawamoto, Tetsuya Shigeyasu, Misako Urakami, Hiroshi Matsuno:

A New Wireless Networking System for Rescue Activities in Disasters -- System Overview and Evaluation of Wireless Node. 68-71
Image Compression and Coding Methods
- Chi-Shiang Chan, Chin-Chen Chang:

A Lossless Medical Image Compression Scheme Using Modified S-Tree Structure. 75-78 - Ching-Lin Wang, Ren-Hung Hwang

, Tung-Shou Chen, Hsiu-Yueh Lee:
Detecting and Restoring System of Tampered Image Based on Discrete Wavelet Transformation and Block Truncation Coding. 79-82 - Chin-Chen Chang, Chi-Lung Chiang, Ju Yuan Hsiao:

A DCT-Domain System for Hiding Fractal Compressed Images. 83-86 - Lun-Chia Kuo, Sheng-Jyh Wang

:
A Feature-Based Scalable Codec for Image Compression. 87-90 - Weihong Fu, Weidong Kou:

A New Look at Coding and Decoding Algorithm for SFC-OFDM System. 91-94 - Yangli Wang, Chengke Wu:

Low Complexity Multiple Description Coding Method for Wireless Video. 95-98
Collaborative and Web-Based Learning
- Nicoletta Sala:

Cooperative Learning and Web Applications: A Case Study. 101-104 - Ying-Hong Wang, Wen-Nan Wang, Yi-Hsiang Yen:

An Intelligent Semantic Agent for e-Learning Message Communication. 105-108 - Dmitry A. Vazhenin, Alexander Vazhenin, Ying-Hong Wang:

WEB-Based Environment for Programming and Distance Learning. 109-112 - Koji Hashimoto, Yoshitaka Shibata:

An Adaptive Communication System for User's Resource Environment. 113-116 - Hiroyasu Mitsui:

A Web-Based Remote Experiment System with Individualized Assessment of Learners. 117-120
Security and Authentication
- Chu-Hsing Lin, Wei Lee:

Efficient Secret Sharing with Access Structures in a Hierarchy. 123-126 - Chu-Hsing Lin, Wei Lee, Chien-Sheng Chen:

Dynamic Key Generations for Secret Sharing in Access Structures. 127-130 - Chang Yu Cheng, Jasmy Yunus, Kamaruzzaman Seman:

Estimations on the Security Aspect of Brand's Electronic Cash Scheme. 131-134 - Chu-Hsing Lin, Hsiu-Hsia Lin:

Secure One-Round Tripartite Authenticated Key Agreement Protocol from Weil Pairing. 135-138 - Yeu-Pong Lai, Chin-Chen Chang:

A Simple Forward Secure Blind Signature Scheme Based on Master Keys and Blind Signatures. 139-144 - Sandrine Duflos, Valérie Gay

, Brigitte Kervella, Eric Horlait:
Integration of Security Parameters in the Service Level Specification to Improve QoS Management of Secure Distributed Multimedia Services. 145-148
Network Security
- Chih-Chung Lu, Shau-Yin Tseng, Szu-Kai Huang:

A Secure Modular Exponential Algorithm Resists to Power, Timing, C Safe Error and M Safe Error Attacks. 151-154 - Dong Seong Kim

, Ha-Nam Nguyen
, Jong Sou Park:
Genetic Algorithm to Improve SVM Based Network Intrusion Detection System. 155-158 - Nen-Fu Huang, Chia-Nan Kao, Hsien-Wei Hung, Gin-Yuan Jai, Chia-Lin Lin:

Apply Data Mining to Defense-in-Depth Network Security System. 159-162 - Yi-Hsing Chang, J. Wey Chen:

Designing an Enhanced PC Cluster System for Scalable Network Services. 163-166 - Yih-Fuh Wang, Chien-Hsun Chen:

Improved Genetic Algorithm to Solve Preplanned Backup Path on WDM Networks. 167-174
Mobile Agent and Ontology
- Chen-Han Lin, Jen-Shun Yang, Ko-Ching Wu:

Mobile Intelligent Agent Technologies to Support VoIP Seamless Mobility. 177-180 - Yusuke Mizuno, Shohei Kato, Atsuko Mutoh, Hidenori Itoh:

A Behavioral Model Based on Meme and Qualia for Multi-Agent Social Behavior. 181-184 - Mosaab Daoud, Qusay H. Mahmoud

:
Reliability Estimation of Mobile Agent Systems Using the Monte Carlo Approach. 185-188 - Wassam Zahreddine, Qusay H. Mahmoud

:
An Agent-Based Approach to Composite Mobile Web Services. 189-192 - Andrew Flahive, J. Wenny Rahayu, David Taniar, Bernady O. Apduhan:

A Distributed Ontology Framework in the Semantic Grid Environment. 193-196
Parallel Programming and Architecture
- Chia-Chu Chiang:

Heterogeneous Distributed Parallel Programming for Coordination in Software Development. 199-202 - Hsin-Chuan Chen, Jen-Shiun Chiang:

Low-Power Way-Predicting Cache Using Valid-Bit Pre-Decision for Parallel Architectures. 203-206 - Chao-Tung Yang

, Kuan-Wei Cheng, Kuan-Ching Li
:
An Enhanced Parallel Loop Self-Scheduling Scheme for Cluster Environments. 207-210 - Kuan-Ching Li

, Hsun-Chang Chang, Chao-Tung Yang
, Liria Matsumoto Sato
, Chung-Yuan Yang, Yin-Yi Wu, Mao-Yueh Pel, Hsiang-Kai Liao, Min-Chieh Hsieh, Chia-Wen Tsai:
On Construction of a Visualization Toolkit for MPI Parallel Programs in Cluster Environments. 211-214 - Kuan-Ching Li

, Hsun-Chang Chang, Chao-Tung Yang
, Li-Jen Chang, Hsiang-Yao Cheng, Liang-Teh Lee:
Implementation of Visuel MPI Parallel Program Performance Analysis Tool for Cluster Environments. 215-218 - Armando De Giusti, Marcelo R. Naiouf, Franco Chichizola, Laura C. De Giusti:

Dynamic Load Balance in Parallel Merge Sorting over Homogeneous Clusters. 219-222
Multimedia Transmission and Coding
- Yi-jung Lo, Zsehong Tsai:

A Call Admission Control Algorithm for Long-Lived and Short-Lived Streaming Media. 225-228 - K. Kalapriya, S. K. Nandy:

Throughput Driven, Highly Available Streaming Stored Playback Video Service over a Peer-to-Peer Network. 229-234 - Fang-Chu Chen, Te-Ming Chiu:

Scalefactor Based Bit Shift FGS Audio Coding. 235-238 - Yu-Cheng Fan, Hen-Wai Tsao

:
A Dual Pyramid Watermarking for JPEG-2000. 239-242
Authentication Scheme
- Hung-Yu Chien, Che-Hao Chen:

A Remote Authentication Scheme Preserving User Anonymity. 245-248 - Chia-Yin Lee, Chu-Hsing Lin, Chin-Chen Chang:

An Improved Low Computation Cost User Authentication Scheme for Mobile Communication. 249-252 - Nobutaka Kawaguchi, Shintaro Ueda, Naohiro Obata, Hiroshi Shigeno, Ken-ichi Okada:

An Image Authentication Scheme Considering Privacy $#8212; A First Step towards Surveillance Camera Authentication. 253-256 - Chin-Chen Chang, Jui-Yi Kuo:

An Efficient Multi-Server Password Authenticated Key Agreement Scheme Using Smart Cards with Access Control. 257-260 - Chi-Hsiung Huang, Chia-Yin Lee, Chu-Hsing Lin, Chin-Chen Chang, Kuo-Lun Chen:

Authenticated Encryption Schemes with Message Linkage for Threshold Signatures. 261-264 - Lanjun Dang, Weidong Kou, Yuxia Xiao:

An Improved Scheme for Unilateral Asymmetric Smart Card Authentication. 265-268
Web-Based Systems
- Jin-Tan David Yang, Wu Lin Lee, Chun-Yen Tsai:

A Web-Based Bookmark Tool with Ontological Approach for Knowledge Sharing of Special Interest Groups. 271-276 - Chun-Te Wu, Hsing Mei:

Location-Based-Service Roaming Based on Web Services. 277-280 - Luis Guillermo Cárdenas, José A. Gil

, Josep Domenech
, Julio Sahuquillo
, Ana Pont
:
Performance Comparison of a Web Cache Simulation Framework. 281-284 - Junji Nakazato, Kenji Fujimoto, Hiroaki Kikuchi:

Privacy Preserving Web-Based Questionnaire. 285-288 - Jeanne Chen, Tung-Shou Chen, Tzu-Hsin Tsai, Hui-Fang Tsai, Mingli Hsieh, Shih-Shan Tang:

Using the ACM Technique to Refine Protein Spots in 2DGE Images. 289-292
Peer-to-Peer and Communication Networks
- Kasame Tritrakan, Veera Muangsin

:
Using Peer-to-Peer Communication to Improve the Performance of Distributed Computing on the Internet. 295-298 - Tien-Chin Wang, Tsung-Han Chang, Tsung Hung Chen, Peter Wang:

Apply Incremental Classification for a P2P MOD System. 299-302 - Pedro Furtado

:
Support for Efficiently Processing Complex Queries over a P2P Substrate. 303-306 - Yusong Lin, Binqiang Wang, Zongmin Wang:

MixCast: A New Group Communication Model in Large-Scale Network. 307-310 - Toshihiko Yamakami:

An Interoperability Design Model: Lessons Learned in Computer Communication Standardization. 311-314 - Yu-Ju Lin, Haniph A. Latchman, Jonathan C. L. Liu, Richard E. Newman:

Periodic Contention-Free Multiple Access for Power Line Communication Networks. 315-318
Performance Analysis and Optimization
- Hsun-Chang Chang, Kuan-Ching Li

, Yaw-Ling Lin
, Chao-Tung Yang
, Hsiao-Hsi Wang, Liang-Teh Lee:
Performance Issues of Grid Computing Based on Different Architecture Cluster Computing Platforms. 321-324 - Rohan Samarasinghe, Yoshihiro Yasutake, Takaichi Yoshida:

Optimizing the Access Performance and Data Freshness of Distributed Cache Objects Considering User Access Pattern. 325-328 - Haijie Huang, Jianfei Cai

:
Improving TCP Performance during Soft Vertical Handoff. 329-332 - Chao-Tung Yang

, Po-Chi Shih, Kuan-Ching Li
:
A High-Performance Computational Resource Broker for Grid Computing Environments. 333-336 - Chin-Fu Ku, Sao-Jie Chen

, Jan-Ming Ho, Ray-I Chang
:
Improving End-to-End Performance by Active Queue Management. 337-340 - Ren C. Luo, Liang Chao Tu, Ogst Chen:

An Efficient Dynamic Power Management Policy on Sensor Network. 341-344
Bandwidth Allocation and Physical Layer
- Chin-Chi Wu, Hsien-Ming Wu, Chia-Lung Liu, Woei Lin:

A DDRR-Based Scheduler to Achieve Proportional Delay Differentiation in Terabit Network. 347-350 - Yuzhao Li, Changxing Pei, Changhua Zhu, Jiandong Li:

An Algorithm for Discovering Physical Topology in Single Subnet IP Networks. 351-354 - Chia-Lung Liu, Woei Lin, Chin-Chi Wu:

Evaluation and Analysis of the Sliding-Window Parallel Packet Switch. 355-358 - Ding-Jyh Tsaur, Xian-Yang Lu, Chin-Chi Wu, Woei Lin:

3D-VOQ Switch Design and Evaluation. 359-362 - Chorng-Horng Yang, Jian-Wei Ruan:

On-Demand Routing for Bluetooth Scatternets Subject to Device Mobility. 363-366 - Jyh-Biau Chang, Tyng-Yeu Liang, Ce-Kuen Shieh:

Progressive Multilayer Reconfiguration for Software DSM Systems in Non-Dedicated Clusters. 367-370
Virtual World Communication and Video Object Detection
- Lain-Chyr Hwang, San-Yuan Wang, Steen J. Hsu, Yong-Hua Huang:

A New Scheduling Algorithm: Jumping Virtual Clock. 373-376 - Jui-Fa Chen, Wei-Chuan Lin, Hua-Sheng Bai, Shih-Yao Dai:

A Message Interchange Protocol Based on Routing Information Protocol in a Virtual World. 377-384 - Lawrence Y. Deng, Nick C. Tang, Dong-Liang Lee, Chin Thin Wang, Ming Chih Lu:

Vision Based Adaptive Traffic Signal Control System Development. 385-388 - Ching-Tang Hsieh, Yu-Shan Juan, Kuo-Ming Hung:

Multiple License Plate Detection for Complex Background. 389-392
Cryptographic and Security
- AbdelNasir Alshamsi, Takamichi Saito:

A Technical Comparison of IPSec and SSL. 395-398 - Chu-Hsing Lin, Wei Lee, Yi-Kang Ho:

An Efficient Hierarchical Key Management Scheme Using Symmetric Encryptions. 399-402 - Ping Li, Yaping Lin:

A Protocol for Designated Confirmer Signatures Based on RSA Cryptographic Algorithms. 403-406 - Michitaka Yoshimoto, Bhed Bahadur Bista, Toyoo Takata:

Development of Security Scanner with High Portability and Usability. 407-410 - Fan Hong, Xian Zhu, Shaobin Wang:

Delegation Depth Control in Trust-Management System. 411-414
Grid and Distributed Computing
- Sachio Mizuta, Runhe Huang:

Automation of Grid Service Code Generation with AndroMDA for GT3. 417-420 - Chao-Tung Yang

, Shu-Tzu Tsai, Kuan-Ching Li
:
Decision Tree Construction for Data Mining on Grid Computing Environments. 421-424 - Rodrigo Lanka, Kentaro Oda, Takaichi Yoshida:

Theoretical Consideration of Adaptive Fault Tolerance Architecture for Open Distributed Object-Oriented Computing. 425-428 - Tomasz Müldner, Zhonghai Luo, Elhadi M. Shakshuki

:
Distribution of Data and Remote Invocation of Programs. 429-432 - Pierre-Emmanuel Gros, Joan Hérisson, Nicolas Férey, Rachid Gherbi

:
Combining Applications and Databases Integration Approaches in a Common Distributed Genomic Platform. 433-438 - Yih-Jiun Lee, Peter Henderson:

A Practical Modelling Notation for Secure Distributed Computation. 439-442
Information Networking and Applications I
- Pei-Yih Ting:

A Temporal Order Resolution Algorithm in the Multi-server Time Stamp Service Framework. 445-448 - Li-Chun Wang

, Ching-Hao Lee:
A TCP-Physical Cross-Layer Congestion Control Mechanism for the Multirate WCDMA System Using Explicit Rate Change Notification. 449-452 - Rainfield Y. Yen, Hong-Yu Liu:

Symbol Error Probability for Rectangular M-QAM OFDM Transmission over Rayleigh Fading Channels. 453-456 - Savio S. H. Tse, Francis Chi-Moon Lau:

An Approximation Solution for the 2-Median Problem on Two-Dimensional Meshes. 457-460 - Mohsen Jahanshahi

, K. Mostafavi, M. S. Kordafshari, Majid Gholipour, Abolfazl Toroghi Haghighat:
Two New Approaches for Orphan Detection. 461-464
Information Networking and Applications II
- Yi He, Yuhui Qiu, Guangyuan Liu

, Kaiyou Lei:
A Parallel Tabu Search Approach Based on Genetic Crossover Operation. 467-470 - Fernando Tinetti, Walter J. Aróztegui, Antonio Quijano:

Sparse Equation Systems in Heterogeneous Clusters of Computers. 471-474 - Pi-Chung Wang

, Yuan-Rung Yang, Chun-Liang Lee, Hung-Yi Chang:
A Memory-Efficient Huffman Decoding Algorithm. 475-479 - Ren-Der Lin, Wen-Shyen Chen:

Fast Calculation Algorithm of the Undetected Errors Probability of CRC Codes. 480-483 - Yueping Jin, Zhaohui Wu, ShuiGuang Deng

, Zhen Yu:
Service-Oriented Workflow Model. 484-488
Information Networking and Applications III
- Toshihiro Shikama, Tadanori Mizuno:

Resequencing Schemes for Selective-Repeat ARQ and Their Performance. 491-494 - Chun-yan Gu, Hong-feng Yi, Kechu Yi, Li-jun Jin:

A Method of Inverse Filter Design Based on Cepstrum Measure. 495-498 - Hui-Feng Huang, Chin-Chen Chang:

A New Design for Efficient t-out-n Oblivious Transfer Scheme. 499-502 - Chien-Min Wang

, Hsi-Min Chen, Gen-Cher Lee, Shun-Te Wang, Shyh-Fong Hong:
A Tree-Structured Persistence Server for Data Management of Collaborative Applications. 503-506 - Chul-Wuk Jeon, Il-Gon Kim, Jin-Young Choi:

Automatic Generation of the C# Code for Security Protocols Verified with Casper/FDR. 507-510 - Jin-Hau Kuo, Jen-Bin Kuo, Hsuan-Wei Chen, Ja-Ling Wu

:
A Hierarchical and Multi-Model Based Algorithm for Lead Detection and News Program Narrative Parsing. 511-514
Smart Molecular Networks and Ubiquitous Media
- Shie-Ming Peng

:
Molecular Metal Wires and Molecular Switches. 519 - Jhing-Fa Wang:

Advanced Ubiquitous Media for Creative Cyberspace. 520
Smart Object and Information Processing
- Naoki Shimizu, Riko Yagiu, Masashi Saito:

A Study of Information Services Based on Personal Belongings. 523-528 - Wai-Kwong Wing, Francis Chi-Moon Lau, Cho-Li Wang:

Smart Retrieval and Sharing of Information Resources Based on Contexts of User-Information Relationships. 529-534 - Chiung-Hon Leon Lee, Alan Liu

:
Modeling the Query Intention with Goals. 535-540 - Minaz J. Parmar, Marios C. Angelides:

Human Readable Genetic Rules for Scene Boundary Detection. 541-546 - Qiangfu Zhao:

Design Smart NNTrees Based on the R4-Rule. 547-551 - Wei Chen, Zhaohui Wu, Xiang Wang:

Minimizing Memory Utilization of Task Sets in SmartOSEK. 552-558
Smart Environment and System
- Wei-Khing For, Xiaoming Bao, Woon-Seng Gan

, See-Kiong Ng:
Reconfigurable Context-Sensitive Bio-Bridge Middleware for Smart Bio-Laboratories. 561-566 - Zixue Cheng, Shengguo Sun, Mizuo Kansen, Tongjun Huang, Aiguo He:

A Personalized Ubiquitous Education Support Environment by Comparing Learning Instructional Requirement with Learner's Behavior. 567-573 - Jianhua Ma, Bernady O. Apduhan, Laurence Tianruo Yang:

Smart Hyperspaces and Project Ubikids. 574-579 - HungPin Chao:

The Non-Specific Intelligent Guided-View System Based on RFID Technology. 580-585 - Aiguo He, Zixue Cheng, Tongjun Huang, Yue Zhao:

Pseudo-Surface Based Network Camera Smart Control. 586-590 - Dan Feng, Lingfang Zeng

, Fang Wang, Lingjun Qin, Qun Liu:
Adaptive Policy Trigger Mechanism for OBSS. 591-595
Smart Networking and Protocol
- Mimoza Durresi, Arjan Durresi, Leonard Barolli:

Sensor Inter-Vehicle Communication for Safer Highways. 599-604 - Teruaki Yokoyama, Katsuyoshi Iida

, Suguru Yamaguchi:
An Architecture of Network Imprinting for Personal but Wide Area Applications. 605-609 - Stephen Herborn, Roksana Boreli, Aruna Seneviratne

:
Identity Location Decoupling in Pervasive Computing Networks. 610-615 - Mamatha Nanjundaiah, Vipin Chaudhary

:
Improvement to the Anticollision Protocol Specification for 900MHz Class 0 Radio Frequency Identification Tag. 616-620 - Junichiro Saito, Kouichi Sakurai:

Grouping Proof for RFID Tags. 621-624 - Satoshi Kawanami, Takeshi Nishimura, Tomoya Enokido, Makoto Takizawa

:
A Scalable Group Communication Protocol with Global Clock. 625-630
Smart Service Sociality and Privacy
- George Yee:

Using Privacy Policies to Protect Privacy in UBICOMP. 633-638 - Guozhen Zhang, Qun Jin, Man Lin:

A Framework of Social Interaction Support for Ubiquitous Learning. 639-643 - Yingpeng Sang, Hong Shen:

A Scheme for Testing Privacy State in Pervasive Sensor Networks. 644-648 - Xinyi Huang, Willy Susilo

, Yi Mu, Futai Zhang:
Identity-Based Ring Signcryption Schemes: Cryptographic Primitives for Preserving Privacy and Authenticity in the Ubiquitous World. 649-654 - Ryuzou Nishi, Hitoshi Morioka, Kouichi Sakurai:

Trends and Issues for Security of Home-Network Based on Power Line Communication. 655-660 - Willy Susilo

, Russell James Ang, Cameron Allen George McDonald, Jianyong Huang:
Personal Firewall for Pocket PC 2003: Design & Implementation. 661-666
Web and Mobile Information Systems I
- Yih-Ling Hedley, Muhammad Younas, Anne E. James

:
The Categorisation of Hidden Web Databases through Concept Specificity and Coverage. 671-376 - Irfan-Ullah Awan, Yue Li, Demetres D. Kouvatsos:

Performance Analysis Mobility Management in Heterogeneous Wireless Networks. 677-682 - Shuchih Ernest Chang:

The Design of a Secure and Pervasive Multimodal Web System. 683-688 - Aláa Qasim Al-Namiy, Faris S. Majeed:

Improving Query Answering in Peer-to-Peer Data Searching. 689-694 - Eric Pardede

, J. Wenny Rahayu, David Taniar:
Preserving Composition in XML Object Relational Storage. 695-700 - Ing-Xiang Chen, Chun-Lin Fan, Pang-Hsiang Lo, Li-Chia Kuo, Cheng-Zen Yang

:
ISWIVE: An Integrated Semantic Web Interactive Visualization Environment. 701-706
Web and Mobile Information Systems II
- Shih-Chun Chou, Wen-Tai Hsieh, Fabien L. Gandon

, Norman M. Sadeh
:
Semantic Web Technologies for Context-Aware Museum Tour Guide Applications. 709-714 - Kuo-Ming Chao

, Muhammad Younas, Chi-Chun Lo, Tao-Hsin Tan:
Fuzzy Matchmaking for Web Services. 721-726 - Hui-Na Chua, Simon D. Scott, Y. W. Choi, Peter Blanchfield:

Web-Page Adaptation Framework for PC & Mobile Device Collaboration. 727-732 - S. M. F. D. Syed Mustapha

:
Extracting Social Knowledge in the Intelligent Conversational Channel for Agent Communication. 733-738 - Elhadi M. Shakshuki

, Saad Abu-Draz:
Agent-Mediated e-Commerce System. 739-744
Web and Mobile Information Systems III
- Ziming Zhuang:

iHITS: Extending HITS for Personal Interests Profiling. 747-751 - Nor Adnan Yahaya

, Goh Poh Gin, Wai-Choon Chan:
Developing Innovative Web Information Systems through the Use of Web Data Extraction Technology. 752-757 - Toshihiko Yamakami:

A 2-Dimensional Evolution Model of Value-Added Mobile Internet Services. 758-761 - Vincent Shin-Mu Tseng, Kawuu Weicheng Lin:

Mining Sequential Mobile Access Patterns Efficiently in Mobile Web Systems. 762-767 - Elhadi M. Shakshuki

, Ivan Tomek, Omkarnath Prabhu:
Agent Frameworks in FCVW. 768-773 - Behzad Bordbar, Rachid Anane

:
An Architecture for Automated QoS Resolution in Wireless Systems. 774-779
IPv6 Technology and Deployment I
- Gabriel López Millán, Félix J. García Clemente

, Manuel Gil Pérez
, Gregorio Martínez Pérez
, Antonio Fernandez Gómez-Skarmeta
:
Deploying Secure Cryptographic Services in Multi-Domain IPv6 Networks. 785-789 - Yen-Wen Chen, Ji-Min Shih:

Binding Updates for Mobile Networks by Using Multicast Mechanism in IPv6 Environment. 790-795 - Mingshou Liu, Cheng-Hsien Hsu, Shi-Hong Kuo, Hsang-Chi Tsai:

An IPv6 Enabled Packet Engine Design for Home/SOHO Routers. 796-800 - Guillaume Chelius, Eric Fleury, Laurent Toutain:

No Administration Protocol (NAP) for IPv6 Router Auto-Configuration. 801-806 - Chiung-Ying Wang, Cheng-Ying Li, Ren-Hung Hwang

, Yuh-Shyan Chen
:
Global Connectivity for Mobile IPv6-Based Ad Hoc Networks. 807-812 - Shiang-Ming Huang, Quincy Wu, Yi-Bing Lin:

Tunneling IPv6 through NAT with Teredo Mechanism. 813-818 - Whai-En Chen, Chia-Yung Su, Jui-Hung Weng:

Development of IPv6-IPv4 Translation Mechanisms for SIP-Based VoIP Applications. 819-823
IPv6 Technology and Deployment II
- Jenq-Muh Hsu, Chian-Fei Hsu, Chung-Ming Huang:

Design of an IPv6 SOHO Router Based on Embedded Linux System. 827-832 - Satoshi Doi, Shingo Ata, Hiroshi Kitamura, Masayuki Murata

:
Design, Implementation and Evaluation of Routing Protocols for IPv6 Anycast Communicatio. 833-838 - Satoshi Matsunaga, Shingo Ata, Hiroshi Kitamura, Masayuki Murata

:
Design and Implementation of IPv6 Anycast Routing Protocol: PIA-SM. 839-844 - Shu-Fen Tseng, Hsi-Chieh Lee

, Te-Ching Kung, Shou-Lien Chou, Jing-Yi Chen:
The Development of Global IPv6 Products: An Exploration. 845-850 - Rafael Marín López, Gregorio Martínez Pérez

, Antonio Fernandez Gómez-Skarmeta
:
Implementing RADIUS and Diameter AAA Systems in IPv6-Based Scenarios. 851-855 - Eduardo Jacob

, Juan José Unzilla
, Maria Victoria Higuero
, Purificación Sáiz, Marina Aguado
, Christian Pinedo
:
A Dual (IP4/IPv6) "Durable Storage" Commercial Service. 856-861

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.


Google
Google Scholar
Semantic Scholar
Internet Archive Scholar
CiteSeerX
ORCID














