The SCEAS System
Navigation Menu

Conferences in DBLP

Advanced Information Networking and Applications (aina)
2005 (conf/aina/2005)

  1. Emmanuel Bouix, Marc Dalmau, Philippe Roose, Franck Luthon
    Multimedia Oriented Component Model. [Citation Graph (0, 0)][DBLP]
    AINA, 2005, pp:3-8 [Conf]
  2. Venkatesan Balakrishnan, Vijay Varadharajan
    Designing Secure Wireless Mobile Ad Hoc Networks. [Citation Graph (0, 0)][DBLP]
    AINA, 2005, pp:5-8 [Conf]
  3. Guanghui Zhang, Jiandong Li, Yanhui Chen, Jing Liu
    Effect of Mobility on the Critical Transmitting Range for Connectivity in Wireless Ad Hoc Networks. [Citation Graph (0, 0)][DBLP]
    AINA, 2005, pp:9-12 [Conf]
  4. Yasutaka Nishimura, Tomoya Enokido, Makoto Takizawa
    Design of a Hierarchical Group to Realize a Scalable Group. [Citation Graph (0, 0)][DBLP]
    AINA, 2005, pp:9-14 [Conf]
  5. Wenzhu Zhang, Jiandong Li, Xuan Wang
    Cost-Efficient QoS Routing Protocol for Mobile Ad Hoc Networks. [Citation Graph (0, 0)][DBLP]
    AINA, 2005, pp:13-16 [Conf]
  6. Yun-Sheng Yen, Weimin Chen, Jia-Cheng Zhuang, Han-Chieh Chao
    A Novel Sliding Weighted Fair Queueing Scheme for Multimedia Transmission. [Citation Graph (0, 0)][DBLP]
    AINA, 2005, pp:15-20 [Conf]
  7. San-Yuan Wang, Jia-Yu Liu, Chun-Chien Huang, Mao-Yuan Kao, Yi-Ho Li
    Signal Strength-Based Routing Protocol for Mobile Ad Hoc Networks. [Citation Graph (0, 0)][DBLP]
    AINA, 2005, pp:17-20 [Conf]
  8. Hsu-Chen Cheng, Frank Yeong-Sung Lin
    Maximum-Revenue Multicast Routing and Partial Admission Control for Multirate Multimedia Distribution. [Citation Graph (0, 0)][DBLP]
    AINA, 2005, pp:21-26 [Conf]
  9. Chen-Nien Tsai, Kai-Wei Ke, Ho-Ting Wu
    Synchronous and Multiplexed Time Slots and Radio Blocks Allocation for Mobile Packet Data Networks. [Citation Graph (0, 0)][DBLP]
    AINA, 2005, pp:21-24 [Conf]
  10. He Hong, Jiandong Li, Min Sheng
    CRMA: A Novel Multiple Access Protocol for Power Efficient Wireless LAN. [Citation Graph (0, 0)][DBLP]
    AINA, 2005, pp:25-28 [Conf]
  11. Satoshi Itaya, Tomoya Enokido, Makoto Takizawa
    A High-Performance Multimedia Streaming Model on Multi-Source Streaming Approach in Peer-to-Peer Networks. [Citation Graph (0, 0)][DBLP]
    AINA, 2005, pp:27-32 [Conf]
  12. Yuka Kato, Atsushi Honda, Katsuya Hakozaki
    An Analysis of Relationship between Video Contents and Subjective Video Quality for Internet Broadcasting. [Citation Graph (0, 0)][DBLP]
    AINA, 2005, pp:31-34 [Conf]
  13. Ngoc Chi Nguyen, Nhat Minh Dinh Vo, Sungyoung Lee
    Fault Tolerant Routing and Broadcasting in de Bruijn Networks. [Citation Graph (0, 0)][DBLP]
    AINA, 2005, pp:35-40 [Conf]
  14. S. Misbah Deen
    A Multi-Agent Framework for a P2P Data Sharing Facility. [Citation Graph (0, 0)][DBLP]
    AINA, 2005, pp:35-40 [Conf]
  15. Alimujiang Yiming, Toshio Eisaka
    A Switched Ethernet Protocol for Hard Real-Time Embedded System Applications. [Citation Graph (0, 0)][DBLP]
    AINA, 2005, pp:41-44 [Conf]
  16. Bo Liu, Junzhou Luo, Wei Li
    Multi-Agent Based Network Management Task Decomposition and Scheduling. [Citation Graph (0, 0)][DBLP]
    AINA, 2005, pp:41-46 [Conf]
  17. Kazuhisa Nakagawa, Koji Okamura
    The Advanced International Case Study Using High Speed Internet. [Citation Graph (0, 0)][DBLP]
    AINA, 2005, pp:45-48 [Conf]
  18. Jun Sawamoto, Hidekazu Tsuji, Dilmurat Tilwaldi, Hisao Koizumi
    A Proposal of Multi-Agent System Development Framework for Cooperative Problem Solving and Its Experimental Evaluation. [Citation Graph (0, 0)][DBLP]
    AINA, 2005, pp:47-52 [Conf]
  19. Ying-Hong Wang, Hui-Min Huang, Huang-Yi Li
    Hybrid CIP/M&M for Micro-Mobility Management under the Multilayer Wireless Network. [Citation Graph (0, 0)][DBLP]
    AINA, 2005, pp:51-54 [Conf]
  20. Guangzhu Chen, Zhishu Li, Daohua Yuan, Nimazhashi
    A Model of Multi-Agent System Based on Immune Evolution. [Citation Graph (0, 0)][DBLP]
    AINA, 2005, pp:53-58 [Conf]
  21. Ying-Hong Wang, Kuo-Jan Tseng, Yi Hsieh
    An Algorithm of Dynamic Resource Reservation for Multimedia Wireless Communication. [Citation Graph (0, 0)][DBLP]
    AINA, 2005, pp:55-59 [Conf]
  22. Emad Farazmand, Afsaneh Shokoufi, Caro Lucas, Farzad Habibipour
    Using a Learning Mechanism in Matchmaking Process of Agents' Negotiation in Multi-Agent Systems. [Citation Graph (0, 0)][DBLP]
    AINA, 2005, pp:59-64 [Conf]
  23. Tzu-Jane Tsai, Ju-Wei Chen
    IEEE 802.11 MAC Protocol over Wireless Mesh Networks: Problems and Perspectives. [Citation Graph (0, 0)][DBLP]
    AINA, 2005, pp:60-63 [Conf]
  24. Chih-Yung Chang, Hao-Chun Sun, Chen-Chi Hsieh
    MCDA: An Efficient Multi-Channel MAC Protocol for 802.11 Wireless LAN with Directional Antenna. [Citation Graph (0, 0)][DBLP]
    AINA, 2005, pp:64-67 [Conf]
  25. Zhenjie Huang, Dan Chen, Yumin Wang
    Multi-Signature with Anonymous Threshold Subliminal Channel for Ad Hoc Environments. [Citation Graph (0, 0)][DBLP]
    AINA, 2005, pp:67-71 [Conf]
  26. Makoto Kamegawa, Mai Kawamoto, Tetsuya Shigeyasu, Misako Urakami, Hiroshi Matsuno
    A New Wireless Networking System for Rescue Activities in Disasters -- System Overview and Evaluation of Wireless Node. [Citation Graph (0, 0)][DBLP]
    AINA, 2005, pp:68-71 [Conf]
  27. Chyi-Ren Dow, P. J. Lin, Sheng-Chang Chen, J. H. Lin, Shiow-Fen Hwang
    A Study of Recent Research Trends and Experimental Guidelines in Mobile Ad Hoc Networks. [Citation Graph (0, 0)][DBLP]
    AINA, 2005, pp:72-77 [Conf]
  28. Chi-Shiang Chan, Chin-Chen Chang
    A Lossless Medical Image Compression Scheme Using Modified S-Tree Structure. [Citation Graph (0, 0)][DBLP]
    AINA, 2005, pp:75-78 [Conf]
  29. Masahi Saito, Jun Tsukamoto, Takaaki Umedu, Teruo Higashino
    Evaluation of Inter-Vehicle Ad Hoc Communication Protocol. [Citation Graph (0, 0)][DBLP]
    AINA, 2005, pp:78-83 [Conf]
  30. Ching-Lin Wang, Ren-Hung Hwang, Tung-Shou Chen, Hsiu-Yueh Lee
    Detecting and Restoring System of Tampered Image Based on Discrete Wavelet Transformation and Block Truncation Coding. [Citation Graph (0, 0)][DBLP]
    AINA, 2005, pp:79-82 [Conf]
  31. Chin-Chen Chang, Chi-Lung Chiang, Ju Yuan Hsiao
    A DCT-Domain System for Hiding Fractal Compressed Images. [Citation Graph (0, 0)][DBLP]
    AINA, 2005, pp:83-86 [Conf]
  32. Fumiaki Sato, Tadanori Mizuno
    A Route Reconstruction Method Based on Support Group Concept for Mobile Ad Hoc Networks. [Citation Graph (0, 0)][DBLP]
    AINA, 2005, pp:84-89 [Conf]
  33. Lun-Chia Kuo, Sheng-Jyh Wang
    A Feature-Based Scalable Codec for Image Compression. [Citation Graph (0, 0)][DBLP]
    AINA, 2005, pp:87-90 [Conf]
  34. Bing-Hong Liu, Ming-Jer Tsai, Wei-Chei Ko
    Dynamical Construction of a Core-Based Group-Shared Multicast Tree in Mobile Ad Hoc Networks. [Citation Graph (0, 0)][DBLP]
    AINA, 2005, pp:90-95 [Conf]
  35. Weihong Fu, Weidong Kou
    A New Look at Coding and Decoding Algorithm for SFC-OFDM System. [Citation Graph (0, 0)][DBLP]
    AINA, 2005, pp:91-94 [Conf]
  36. Yangli Wang, Chengke Wu
    Low Complexity Multiple Description Coding Method for Wireless Video. [Citation Graph (0, 0)][DBLP]
    AINA, 2005, pp:95-98 [Conf]
  37. Goichi Itabashi, Kaoru Takahashi, Yasushi Kato, Takuo Sugamma, Norio Shiratori
    Incremental Design of a State Machine Specification for Mobile and Real-Time Systems . [Citation Graph (0, 0)][DBLP]
    AINA, 2005, pp:99-104 [Conf]
  38. Nicoletta Sala
    Cooperative Learning and Web Applications: A Case Study. [Citation Graph (0, 0)][DBLP]
    AINA, 2005, pp:101-104 [Conf]
  39. Ying-Hong Wang, Wen-Nan Wang, Yi-Hsiang Yen
    An Intelligent Semantic Agent for e-Learning Message Communication. [Citation Graph (0, 0)][DBLP]
    AINA, 2005, pp:105-108 [Conf]
  40. Chun-Chao Yeh
    On the Power-Aware Resource Allocation for Linear-Pipelined Real-Time Tasks. [Citation Graph (0, 0)][DBLP]
    AINA, 2005, pp:105-110 [Conf]
  41. Dmitry A. Vazhenin, Alexander Vazhenin, Ying-Hong Wang
    WEB-Based Environment for Programming and Distance Learning. [Citation Graph (0, 0)][DBLP]
    AINA, 2005, pp:109-112 [Conf]
  42. Hui-Huang Hsu, Timothy K. Shih, Chia-Tong Tang, Yi-Chun Liao
    Real-Time Multiple Tracking Using a Combined Technique. [Citation Graph (0, 0)][DBLP]
    AINA, 2005, pp:111-116 [Conf]
  43. Koji Hashimoto, Yoshitaka Shibata
    An Adaptive Communication System for User's Resource Environment. [Citation Graph (0, 0)][DBLP]
    AINA, 2005, pp:113-116 [Conf]
  44. D. Frank Hsu, Damian M. Lyons
    A Dynamic Pruning and Feature Selection Strategy for Real-Time Tracking. [Citation Graph (0, 0)][DBLP]
    AINA, 2005, pp:117-124 [Conf]
  45. Hiroyasu Mitsui
    A Web-Based Remote Experiment System with Individualized Assessment of Learners. [Citation Graph (0, 0)][DBLP]
    AINA, 2005, pp:117-120 [Conf]
  46. Chu-Hsing Lin, Wei Lee
    Efficient Secret Sharing with Access Structures in a Hierarchy. [Citation Graph (0, 0)][DBLP]
    AINA, 2005, pp:123-126 [Conf]
  47. Simon Sheu, Chang-Yeng Cheng, Alan Chang
    Fast Pattern Detection in Stream Data. [Citation Graph (0, 0)][DBLP]
    AINA, 2005, pp:125-130 [Conf]
  48. Chu-Hsing Lin, Wei Lee, Chien-Sheng Chen
    Dynamic Key Generations for Secret Sharing in Access Structures. [Citation Graph (0, 0)][DBLP]
    AINA, 2005, pp:127-130 [Conf]
  49. Chang Yu Cheng, Jasmy Yunus, Kamaruzzaman Seman
    Estimations on the Security Aspect of Brand's Electronic Cash Scheme. [Citation Graph (0, 0)][DBLP]
    AINA, 2005, pp:131-134 [Conf]
  50. Qing Li, Jun Yang, Yueting Zhuang
    Multi-Modal Information Retrieval with a Semantic View Mechanism. [Citation Graph (0, 0)][DBLP]
    AINA, 2005, pp:133-138 [Conf]
  51. Chu-Hsing Lin, Hsiu-Hsia Li
    Secure One-Round Tripartite Authenticated Key Agreement Protocol from Weil Pairing. [Citation Graph (0, 0)][DBLP]
    AINA, 2005, pp:135-138 [Conf]
  52. Yeu-Pong Lai, Chin-Chen Chang
    A Simple Forward Secure Blind Signature Scheme Based on Master Keys and Blind Signatures. [Citation Graph (0, 0)][DBLP]
    AINA, 2005, pp:139-144 [Conf]
  53. Mikio Amano, Daisuke Hironaka, Seio Oda, Genci Capi, Masao Yokota
    Linguistic Interpretation of Human Motion Based on Mental Image Directed Semantic Theory. [Citation Graph (0, 0)][DBLP]
    AINA, 2005, pp:139-144 [Conf]
  54. Seksun Suwanmanee, Djamal Benslimane, Philippe Thiran
    OWL-Based Approach for Semantic Interoperability. [Citation Graph (0, 0)][DBLP]
    AINA, 2005, pp:145-150 [Conf]
  55. Sandrine Duflos, Valérie Gay, Brigitte Kervella, Eric Horlait
    Integration of Security Parameters in the Service Level Specification to Improve QoS Management of Secure Distributed Multimedia Services. [Citation Graph (0, 0)][DBLP]
    AINA, 2005, pp:145-148 [Conf]
  56. Anthony Y. Chang
    An Intelligent Semantic Model for the Design of Consistent Online SMIL Presentations. [Citation Graph (0, 0)][DBLP]
    AINA, 2005, pp:151-156 [Conf]
  57. Chih-Chung Lu, Shau-Yin Tseng, Szu-Kai Huang
    A Secure Modular Exponential Algorithm Resists to Power, Timing, C Safe Error and M Safe Error Attacks. [Citation Graph (0, 0)][DBLP]
    AINA, 2005, pp:151-154 [Conf]
  58. Dong Seong Kim, Ha-Nam Nguyen, Jong Sou Park
    Genetic Algorithm to Improve SVM Based Network Intrusion Detection System. [Citation Graph (0, 0)][DBLP]
    AINA, 2005, pp:155-158 [Conf]
  59. Jason C. Hung, Ching-Sheng Wang, Che-Yu Yang, Mao-Shuen Chiu, George Yee
    Applying Word Sense Disambiguation to Question Answering System for e-Learning. [Citation Graph (0, 0)][DBLP]
    AINA, 2005, pp:157-162 [Conf]
  60. Nen-Fu Huang, Chia-Nan Kao, Hsien-Wei Hung, Gin-Yuan Jai, Chia-Lin Lin
    Apply Data Mining to Defense-in-Depth Network Security System. [Citation Graph (0, 0)][DBLP]
    AINA, 2005, pp:159-162 [Conf]
  61. Yi-Hsing Chang, J. Wey Chen
    Designing an Enhanced PC Cluster System for Scalable Network Services. [Citation Graph (0, 0)][DBLP]
    AINA, 2005, pp:163-166 [Conf]
  62. Kenichi Watanabe, Tomoya Enokido, Makoto Takizawa, Kane Kim
    Charge-Based Flooding Algorithm for Detecting Multimedia Objects in Peer-to-Peer Overlay Networks. [Citation Graph (0, 0)][DBLP]
    AINA, 2005, pp:165-170 [Conf]
  63. Yih-Fuh Wang, Chien-Hsun Chen
    Improved Genetic Algorithm to Solve Preplanned Backup Path on WDM Networks. [Citation Graph (0, 0)][DBLP]
    AINA, 2005, pp:167-174 [Conf]
  64. Nobuhiro Nakamura, Souichirou Takahama, Leonard Barolli, Jianhua Ma, Kaoru Sugita
    A Multiplatform P2P System: Its Implementation and Applications. [Citation Graph (0, 0)][DBLP]
    AINA, 2005, pp:171-176 [Conf]
  65. Wei Ren, Hai Jin
    Distributed Agent-Based Real Time Network Intrusion Forensics System Architecture Design . [Citation Graph (0, 0)][DBLP]
    AINA, 2005, pp:177-182 [Conf]
  66. Chen-Han Lin, Jen-Shun Yang, Ko-Ching Wu
    Mobile Intelligent Agent Technologies to Support VoIP Seamless Mobility. [Citation Graph (0, 0)][DBLP]
    AINA, 2005, pp:177-180 [Conf]
  67. Yusuke Mizuno, Shohei Kato, Atsuko Mutoh, Hidenori Itoh
    A Behavioral Model Based on Meme and Qualia for Multi-Agent Social Behavior. [Citation Graph (0, 0)][DBLP]
    AINA, 2005, pp:181-184 [Conf]
  68. Takahide Gouda, Leonard Barolli, Kaoru Sugita, Akio Koyama, Arjan Durresi, Giuseppe De Marco
    Application of Policing Mechanisms for Broadband Networks: Issues and Difficulties. [Citation Graph (0, 0)][DBLP]
    AINA, 2005, pp:183-188 [Conf]
  69. Mosaab Daoud, Qusay H. Mahmoud
    Reliability Estimation of Mobile Agent Systems Using the Monte Carlo Approach. [Citation Graph (0, 0)][DBLP]
    AINA, 2005, pp:185-188 [Conf]
  70. Wassam Zahreddine, Qusay H. Mahmoud
    An Agent-Based Approach to Composite Mobile Web Services. [Citation Graph (0, 0)][DBLP]
    AINA, 2005, pp:189-192 [Conf]
  71. Marco Comuzzi, Chiara Francalanci, Paolo Giacomazzi
    Trade-Off Based Negotiation of Traffic Conditioning and Service Level Agreements in DiffServ Networks. [Citation Graph (0, 0)][DBLP]
    AINA, 2005, pp:189-194 [Conf]
  72. Andrew Flahive, J. Wenny Rahayu, David Taniar, Bernady O. Apduhan
    A Distributed Ontology Framework in the Semantic Grid Environment. [Citation Graph (0, 0)][DBLP]
    AINA, 2005, pp:193-196 [Conf]
  73. Yoshihito Takahashi, Tomomi Abiko, Eriko Negishi, Goichi Itabashi, Yasushi Kato, Kaoru Takahashi, Norio Shiratori
    An Ontology-Based e-Learning System for Network Security. [Citation Graph (0, 0)][DBLP]
    AINA, 2005, pp:197-202 [Conf]
  74. Chia-Chu Chiang
    Heterogeneous Distributed Parallel Programming for Coordination in Software Development. [Citation Graph (0, 0)][DBLP]
    AINA, 2005, pp:199-202 [Conf]
  75. Hsiau Wen Lin, Wen-Chih Chang, George Yee, Timothy K. Shih, Chun-Chia Wang, Hsuan-Che Yang
    Applying Petri Nets to Model SCORM Learning Sequence Specification in Collaborative Learning. [Citation Graph (0, 0)][DBLP]
    AINA, 2005, pp:203-208 [Conf]
  76. Hsin-Chuan Chen, Jen-Shiun Chiang
    Low-Power Way-Predicting Cache Using Valid-Bit Pre-Decision for Parallel Architectures. [Citation Graph (0, 0)][DBLP]
    AINA, 2005, pp:203-206 [Conf]
  77. Chao-Tung Yang, Kuan-Wei Cheng, Kuan-Ching Li
    An Enhanced Parallel Loop Self-Scheduling Scheme for Cluster Environments. [Citation Graph (0, 0)][DBLP]
    AINA, 2005, pp:207-210 [Conf]
  78. Jun-Ming Su, Shian-Shyong Tseng, Jui-Feng Weng, Kuan-Ting Chen, Yi-Lin Liu, Yi-Ta Tsai
    An Object Based Authoring Tool for Creating SCORM Compliant Course. [Citation Graph (0, 0)][DBLP]
    AINA, 2005, pp:209-214 [Conf]
  79. Kuan-Ching Li, Hsun-Chang Chang, Chao-Tung Yang, Liria Matsumoto Sato, Chung-Yuan Yang, Yin-Yi Wu, Mao-Yueh Pel, Hsiang-Kai Liao, Min-Chieh Hsieh, Chia-Wen Tsai
    On Construction of a Visualization Toolkit for MPI Parallel Programs in Cluster Environments. [Citation Graph (0, 0)][DBLP]
    AINA, 2005, pp:211-214 [Conf]
  80. Kuan-Ching Li, Hsun-Chang Chang, Chao-Tung Yang, Li-Jen Chang, Hsiang-Yao Cheng, Liang-Teh Lee
    Implementation of Visuel MPI Parallel Program Performance Analysis Tool for Cluster Environments. [Citation Graph (0, 0)][DBLP]
    AINA, 2005, pp:215-218 [Conf]
  81. Mike Hogeboom, Fuhua Lin, Larbi Esmahi, Chunsheng Yang
    Constructing Knowledge Bases for e-Learning Using Protege 2000 and Web Services. [Citation Graph (0, 0)][DBLP]
    AINA, 2005, pp:215-220 [Conf]
  82. Armando De Giusti, Marcelo R. Naiouf, Franco Chichizola, Laura C. De Giusti
    Dynamic Load Balance in Parallel Merge Sorting over Homogeneous Clusters. [Citation Graph (0, 0)][DBLP]
    AINA, 2005, pp:219-222 [Conf]
  83. Sheng-Tun Li, Chu-Hung Lin
    On the Distributed Management of SCORM-Compliant Course Contents. [Citation Graph (0, 0)][DBLP]
    AINA, 2005, pp:221-226 [Conf]
  84. Yi-jung Lo, Zsehong Tsai
    A Call Admission Control Algorithm for Long-Lived and Short-Lived Streaming Media. [Citation Graph (0, 0)][DBLP]
    AINA, 2005, pp:225-228 [Conf]
  85. Tomoyuki Ishida, Akihiro Miyakawa, Yoshitaka Shibata
    Virtual Traditional Japanese Crafting System Using JGNII in Collaborative Work Environment. [Citation Graph (0, 0)][DBLP]
    AINA, 2005, pp:229-234 [Conf]
  86. K. Kalapriya, S. K. Nandy
    Throughput Driven, Highly Available Streaming Stored Playback Video Service over a Peer-to-Peer Network. [Citation Graph (0, 0)][DBLP]
    AINA, 2005, pp:229-234 [Conf]
  87. Fang-Chu Chen, Te-Ming Chiu
    Scalefactor Based Bit Shift FGS Audio Coding. [Citation Graph (0, 0)][DBLP]
    AINA, 2005, pp:235-238 [Conf]
  88. Kaoru Sugita, Tomoyuki Ishida, Akihiro Miyakawa, Leonard Barolli, Yoshitaka Shibata
    Experimental Result of Feature Extraction Method for Digital Traditional Japanese Crafting System. [Citation Graph (0, 0)][DBLP]
    AINA, 2005, pp:235-240 [Conf]
  89. Yu-Cheng Fan, Hen-Wai Tsao
    A Dual Pyramid Watermarking for JPEG-2000. [Citation Graph (0, 0)][DBLP]
    AINA, 2005, pp:239-242 [Conf]
  90. Toshitada Ishii, Yoshitaka Shibata
    An Interactive Virtual Space Presentation System Considering Users Background. [Citation Graph (0, 0)][DBLP]
    AINA, 2005, pp:241-246 [Conf]
  91. Hung-Yu Chien, Che-Hao Chen
    A Remote Authentication Scheme Preserving User Anonymity. [Citation Graph (0, 0)][DBLP]
    AINA, 2005, pp:245-248 [Conf]
  92. Masaki Ito, Jin Nakazawa, Hideyuki Tokuda
    mPATH: An Interactive Visualization Framework for Behavior History. [Citation Graph (0, 0)][DBLP]
    AINA, 2005, pp:247-252 [Conf]
  93. Chia-Yin Lee, Chu-Hsing Lin, Chin-Chen Chang
    An Improved Low Computation Cost User Authentication Scheme for Mobile Communication. [Citation Graph (0, 0)][DBLP]
    AINA, 2005, pp:249-252 [Conf]
  94. Nobutaka Kawaguchi, Shintaro Ueda, Naohiro Obata, Hiroshi Shigeno, Ken-ichi Okada
    An Image Authentication Scheme Considering Privacy $#8212; A First Step towards Surveillance Camera Authentication. [Citation Graph (0, 0)][DBLP]
    AINA, 2005, pp:253-256 [Conf]
  95. Naoki Nakashima, Koji Okamura, Joon-Soo Hahm, Young-Woo Kim, Hiroshi Mizushima, Haruyuki Tatsumi, Byung-In Moon, Ho-Seong Han, Yong-Jin Park, Jae-Hwa Lee, Sung-Kwan Youm, Chul-Hee Kang, Shuji Shimizu
    Telemedicine with Digital Video Transport System in Asia-Pacific Area. [Citation Graph (0, 0)][DBLP]
    AINA, 2005, pp:253-257 [Conf]
  96. Chin-Chen Chang, Jui-Yi Kuo
    An Efficient Multi-Server Password Authenticated Key Agreement Scheme Using Smart Cards with Access Control. [Citation Graph (0, 0)][DBLP]
    AINA, 2005, pp:257-260 [Conf]
  97. Kun Zhang, Heng Wang, Feng-Yu Liu
    An Efficient Algorithm Based on Simulated Annealing for Multicast Routing with Delay and Delay Variation Constraints. [Citation Graph (0, 0)][DBLP]
    AINA, 2005, pp:261-266 [Conf]
  98. Chi-Hsiung Huang, Chia-Yin Lee, Chu-Hsing Lin, Chin-Chen Chang, Kuo-Lun Chen
    Authenticated Encryption Schemes with Message Linkage for Threshold Signatures. [Citation Graph (0, 0)][DBLP]
    AINA, 2005, pp:261-264 [Conf]
  99. Lanjun Dang, Weidong Kou, Yuxia Xiao
    An Improved Scheme for Unilateral Asymmetric Smart Card Authentication. [Citation Graph (0, 0)][DBLP]
    AINA, 2005, pp:265-268 [Conf]
  100. Hui Tian, Hong Shen
    Hamming Distance and Hop Count Based Classification for Multicast Network Topology Inference. [Citation Graph (0, 0)][DBLP]
    AINA, 2005, pp:267-272 [Conf]
  101. Jin-Tan David Yang, Wu Lin Lee, Chun-Yen Tsai
    A Web-Based Bookmark Tool with Ontological Approach for Knowledge Sharing of Special Interest Groups. [Citation Graph (0, 0)][DBLP]
    AINA, 2005, pp:271-276 [Conf]
  102. Bo Rong, Maria Bennani, Michel Kadoch, Ahmed K. Elhakeem
    Bandwidth Fragmentation Avoided QoS Multicast Routing by Employing Admission Control. [Citation Graph (0, 0)][DBLP]
    AINA, 2005, pp:273-278 [Conf]
  103. Chun-Te Wu, Hsing Mei
    Location-Based-Service Roaming Based on Web Services. [Citation Graph (0, 0)][DBLP]
    AINA, 2005, pp:277-280 [Conf]
  104. Wen-Tsuen Chen, Ho-Ling Hsu, Jeng-Long Chiang
    Logical Key Tree Based Secure Multicast Protocol with Copyright Protection. [Citation Graph (0, 0)][DBLP]
    AINA, 2005, pp:279-284 [Conf]
  105. L. G. Cárdenas, José A. Gil, Josep Domènech, Julio Sahuquillo, Ana Pont
    Performance Comparison of a Web Cache Simulation Framework. [Citation Graph (0, 0)][DBLP]
    AINA, 2005, pp:281-284 [Conf]
  106. Junji Nakazato, Kenji Fujimoto, Hiroaki Kikuchi
    Privacy Preserving Web-Based Questionnaire. [Citation Graph (0, 0)][DBLP]
    AINA, 2005, pp:285-288 [Conf]
  107. Dang Minh Quan, Odej Kao
    On Architecture for SLA-Aware Workflows in Grid Environments. [Citation Graph (0, 0)][DBLP]
    AINA, 2005, pp:287-292 [Conf]
  108. Jeanne Chen, Tung-Shou Chen, Tzu-Hsin Tsai, Hui-Fang Tsai, Mingli Hsieh, Shih-Shan Tang
    Using the ACM Technique to Refine Protein Spots in 2DGE Images. [Citation Graph (0, 0)][DBLP]
    AINA, 2005, pp:289-292 [Conf]
  109. Mingkui Yang, Hongbing Liang, Bin Xu
    S-WFMS: A Service-Based Workflow Management System in Grid Environment. [Citation Graph (0, 0)][DBLP]
    AINA, 2005, pp:293-297 [Conf]
  110. Kasame Tritrakan, Veera Muangsin
    Using Peer-to-Peer Communication to Improve the Performance of Distributed Computing on the Internet. [Citation Graph (0, 0)][DBLP]
    AINA, 2005, pp:295-298 [Conf]
  111. Chao-Tung Yang, Yi-Chun Hsiung, Heng-Chuan Kan
    Implementation and Evaluation of a Java Based Computational Grid for Bioinformatics Applications. [Citation Graph (0, 0)][DBLP]
    AINA, 2005, pp:298-303 [Conf]
  112. Tien-Chin Wang, Tsung-Han Chang, Tsung Hung Chen, Peter Wang
    Apply Incremental Classification for a P2P MOD System. [Citation Graph (0, 0)][DBLP]
    AINA, 2005, pp:299-302 [Conf]
  113. Pedro Furtado
    Support for Efficiently Processing Complex Queries over a P2P Substrate. [Citation Graph (0, 0)][DBLP]
    AINA, 2005, pp:303-306 [Conf]
  114. Fang-Yie Leu, Jia-Chun Lin, Ming-Chang Li, Chao-Tung Yang, Po-Chi Shih
    Integrating Grid with Intrusion Detection. [Citation Graph (0, 0)][DBLP]
    AINA, 2005, pp:304-309 [Conf]
  115. Yusong Lin, Binqiang Wang, Zongmin Wang
    MixCast: A New Group Communication Model in Large-Scale Network. [Citation Graph (0, 0)][DBLP]
    AINA, 2005, pp:307-310 [Conf]
  116. Stephen Childs, Brian A. Coghlan, David O'Callaghan, Geoff Quigley, John Walsh
    A Single-Computer Grid Gateway Using Virtual Machines. [Citation Graph (0, 0)][DBLP]
    AINA, 2005, pp:310-315 [Conf]
  117. Toshihiko Yamakami
    An Interoperability Design Model: Lessons Learned in Computer Communication Standardization. [Citation Graph (0, 0)][DBLP]
    AINA, 2005, pp:311-314 [Conf]
  118. Yu-Ju Lin, Haniph A. Latchman, Jonathan C. L. Liu, Richard E. Newman
    Periodic Contention-Free Multiple Access for Power Line Communication Networks. [Citation Graph (0, 0)][DBLP]
    AINA, 2005, pp:315-318 [Conf]
  119. Sheng-Po Kuo, Yu-Chee Tseng, Fang-Jing Wu, Chun-Yu Lin
    A Probabilistic Signal-Strength-Based Evaluation Methodology for Sensor Network Deployment. [Citation Graph (0, 0)][DBLP]
    AINA, 2005, pp:319-324 [Conf]
  120. Hsun-Chang Chang, Kuan-Ching Li, Yaw-Ling Lin, Chao-Tung Yang, Hsiao-Hsi Wang, Liang-Teh Lee
    Performance Issues of Grid Computing Based on Different Architecture Cluster Computing Platforms. [Citation Graph (0, 0)][DBLP]
    AINA, 2005, pp:321-324 [Conf]
  121. Chih-Wei Shiou, Frank Yeong-Sung Lin, Hsu-Chen Cheng, Yean-Fu Wen
    Optimal Energy-Efficient Routing for Wireless Sensor Networks. [Citation Graph (0, 0)][DBLP]
    AINA, 2005, pp:325-330 [Conf]
  122. Rohan Samarasinghe, Yoshihiro Yasutake, Takaichi Yoshida
    Optimizing the Access Performance and Data Freshness of Distributed Cache Objects Considering User Access Pattern. [Citation Graph (0, 0)][DBLP]
    AINA, 2005, pp:325-328 [Conf]
  123. Haijie Huang, Jianfei Cai
    Improving TCP Performance during Soft Vertical Handoff. [Citation Graph (0, 0)][DBLP]
    AINA, 2005, pp:329-332 [Conf]
  124. Lok Hang Lee, Man Hon Wong
    Aggregate Sum Retrieval in Sensor Network by Distributed Prefix Sum Data Cube. [Citation Graph (0, 0)][DBLP]
    AINA, 2005, pp:331-336 [Conf]
  125. Chao-Tung Yang, Po-Chi Shih, Kuan-Ching Li
    A High-Performance Computational Resource Broker for Grid Computing Environments. [Citation Graph (0, 0)][DBLP]
    AINA, 2005, pp:333-336 [Conf]
  126. Ren C. Luo, Ogst Chen, Liang Chao Tu
    Nodes Localization through Data Fusion in Sensor Network. [Citation Graph (0, 0)][DBLP]
    AINA, 2005, pp:337-342 [Conf]
  127. Chin-Fu Ku, Sao-Jie Chen, Jan-Ming Ho, Ray-I Chang
    Improving End-to-End Performance by Active Queue Management. [Citation Graph (0, 0)][DBLP]
    AINA, 2005, pp:337-340 [Conf]
  128. Ren C. Luo, Liang Chao Tu, Ogst Chen
    An Efficient Dynamic Power Management Policy on Sensor Network. [Citation Graph (0, 0)][DBLP]
    AINA, 2005, pp:341-344 [Conf]
  129. Arjan Durresi, Vamsi Paruchuri
    Geometric Broadcast Protocol for Sensor and Actor Networks. [Citation Graph (0, 0)][DBLP]
    AINA, 2005, pp:343-348 [Conf]
  130. Chin-Chi Wu, Hsien-Ming Wu, Chia-Lung Liu, Woei Lin
    A DDRR-Based Scheduler to Achieve Proportional Delay Differentiation in Terabit Network. [Citation Graph (0, 0)][DBLP]
    AINA, 2005, pp:347-350 [Conf]
  131. Ying-Hong Wang, Huan-Chao Keh, Tsang-Ching Hu, Cheng-Horng Liao
    A Hierarchical Dynamic Monitoring Mechanism for Mobile Agent Location. [Citation Graph (0, 0)][DBLP]
    AINA, 2005, pp:351-356 [Conf]
  132. Yuzhao Li, Changxing Pei, Changhua Zhu, Jiandong Li
    An Algorithm for Discovering Physical Topology in Single Subnet IP Networks. [Citation Graph (0, 0)][DBLP]
    AINA, 2005, pp:351-354 [Conf]
  133. Chia-Lung Liu, Woei Lin, Chin-Chi Wu
    Evaluation and Analysis of the Sliding-Window Parallel Packet Switch. [Citation Graph (0, 0)][DBLP]
    AINA, 2005, pp:355-358 [Conf]
  134. Min Yang, Shao-yin Huang, Zhi Wang, Zunping Cheng, Dilin Mao, Chuanshan Gao
    PICC: A Secure Mobile Agent Framework Based on Garbled Circuit. [Citation Graph (0, 0)][DBLP]
    AINA, 2005, pp:357-362 [Conf]
  135. Ding-Jyh Tsaur, Xian-Yang Lu, Chin-Chi Wu, Woei Lin
    3D-VOQ Switch Design and Evaluation. [Citation Graph (0, 0)][DBLP]
    AINA, 2005, pp:359-362 [Conf]
  136. Gen Kitagata, Yu Matsushima, Daisuke Hasegawa, Tetsuo Kinoshita, Norio Shiratori
    An Agent-Based Middleware for Communication Service on Ad Hoc Network. [Citation Graph (0, 0)][DBLP]
    AINA, 2005, pp:363-367 [Conf]
  137. Chorng-Horng Yang, Jian-Wei Ruan
    On-Demand Routing for Bluetooth Scatternets Subject to Device Mobility. [Citation Graph (0, 0)][DBLP]
    AINA, 2005, pp:363-366 [Conf]
  138. Jyh-Biau Chang, Tyng-Yeu Liang, Ce-Kuen Shieh
    Progressive Multilayer Reconfiguration for Software DSM Systems in Non-Dedicated Clusters. [Citation Graph (0, 0)][DBLP]
    AINA, 2005, pp:367-370 [Conf]
  139. Youhei Tanaka, Tomoya Enokido, Makoto Takizawa
    Design and Implementation of Transactional Agents for Manipulating Distributed Objects. [Citation Graph (0, 0)][DBLP]
    AINA, 2005, pp:368-373 [Conf]
  140. Lain-Chyr Hwang, San-Yuan Wang, Steen J. Hsu, Yong-Hua Huang
    A New Scheduling Algorithm: Jumping Virtual Clock. [Citation Graph (0, 0)][DBLP]
    AINA, 2005, pp:373-376 [Conf]
  141. George Yee, Larry Korba
    An Agent Architecture for e-Services Privacy Policy Compliance. [Citation Graph (0, 0)][DBLP]
    AINA, 2005, pp:374-379 [Conf]
  142. Jui-Fa Chen, Wei-Chuan Lin, Hua-Sheng Bai, Shih-Yao Dai
    A Message Interchange Protocol Based on Routing Information Protocol in a Virtual World. [Citation Graph (0, 0)][DBLP]
    AINA, 2005, pp:377-384 [Conf]
  143. Heping Hu, Hanbing Yao
    A Scheme for Authentication and Authorization in a Grid Application. [Citation Graph (0, 0)][DBLP]
    AINA, 2005, pp:383-387 [Conf]
  144. Lawrence Y. Deng, Nick C. Tang, Dong-liang Lee, Chin Thin Wang, Ming Chih Lu
    Vision Based Adaptive Traffic Signal Control System Development. [Citation Graph (0, 0)][DBLP]
    AINA, 2005, pp:385-388 [Conf]
  145. Tianjie Cao, Dongdai Lin, Rui Xue
    An Efficient ID-Based Deniable Authentication Protocol from Pairings. [Citation Graph (0, 0)][DBLP]
    AINA, 2005, pp:388-391 [Conf]
  146. Ching-Tang Hsieh, Yu-Shan Juan, Kuo-Ming Hung
    Multiple License Plate Detection for Complex Background. [Citation Graph (0, 0)][DBLP]
    AINA, 2005, pp:389-392 [Conf]
  147. Chung-Ming Huang, Jian-Wei Li
    Authentication and Key Agreement Protocol for UMTS with Low Bandwidth Consumption. [Citation Graph (0, 0)][DBLP]
    AINA, 2005, pp:392-397 [Conf]
  148. AbdelNasir Alshamsi, Takamichi Saito
    A Technical Comparison of IPSec and SSL. [Citation Graph (0, 0)][DBLP]
    AINA, 2005, pp:395-398 [Conf]
  149. Fangguo Zhang, Yi Mu, Willy Susilo
    Reducing Security Overhead for Mobile Networks. [Citation Graph (0, 0)][DBLP]
    AINA, 2005, pp:398-403 [Conf]
  150. Chu-Hsing Lin, Wei Lee, Yi-Kang Ho
    An Efficient Hierarchical Key Management Scheme Using Symmetric Encryptions. [Citation Graph (0, 0)][DBLP]
    AINA, 2005, pp:399-402 [Conf]
  151. Li Ping, Lin Yaping
    A Protocol for Designated Confirmer Signatures Based on RSA Cryptographic Algorithms. [Citation Graph (0, 0)][DBLP]
    AINA, 2005, pp:403-406 [Conf]
  152. Yi-Chung Chen, Jang-Ping Sheu
    Interest-Based Lookup Protocols for Mobile Ad Hoc Networks. [Citation Graph (0, 0)][DBLP]
    AINA, 2005, pp:407-413 [Conf]
  153. Michitaka Yoshimoto, Bhed Bahadur Bista, Toyoo Takata
    Development of Security Scanner with High Portability and Usability. [Citation Graph (0, 0)][DBLP]
    AINA, 2005, pp:407-410 [Conf]
  154. Fan Hong, Xian Zhu, Shaobin Wang
    Delegation Depth Control in Trust-Management System. [Citation Graph (0, 0)][DBLP]
    AINA, 2005, pp:411-414 [Conf]
  155. Wen-Lin Yang
    Constructing Energy-Efficient Multicast Trees with Delay Constraints in Ad Hoc Networks. [Citation Graph (0, 0)][DBLP]
    AINA, 2005, pp:414-419 [Conf]
  156. Sachio Mizuta, Runhe Huang
    Automation of Grid Service Code Generation with AndroMDA for GT3. [Citation Graph (0, 0)][DBLP]
    AINA, 2005, pp:417-420 [Conf]
  157. Kuei-Ping Shih, Chih-Yung Chang, Chien-Min Chou, Szu-Min Chen
    A Power Saving MAC Protocol by Increasing Spatial Reuse for IEEE 802.11 Ad Hoc WLANs. [Citation Graph (0, 0)][DBLP]
    AINA, 2005, pp:420-425 [Conf]
  158. Chao-Tung Yang, Shu-Tzu Tsai, Kuan-Ching Li
    Decision Tree Construction for Data Mining on Grid Computing Environments. [Citation Graph (0, 0)][DBLP]
    AINA, 2005, pp:421-424 [Conf]
  159. Rodrigo Lanka, Kentaro Oda, Takaichi Yoshida
    Theoretical Consideration of Adaptive Fault Tolerance Architecture for Open Distributed Object-Oriented Computing. [Citation Graph (0, 0)][DBLP]
    AINA, 2005, pp:425-428 [Conf]
  160. Zhenyu Liu, Marta Z. Kwiatkowska, Costas C. Constantinou
    A Biologically Inspired QoS Routing Algorithm for Mobile Ad Hoc Networks. [Citation Graph (0, 0)][DBLP]
    AINA, 2005, pp:426-431 [Conf]
  161. Tomasz Müldner, Zhonghai Luo, Elhadi Shakshuki
    Distribution of Data and Remote Invocation of Programs. [Citation Graph (0, 0)][DBLP]
    AINA, 2005, pp:429-432 [Conf]
  162. Wei-Yeh Chen, Jean-Lien C. Wu
    Performance Analysis of Radio Resource Allocation for Multimedia Traffic in Cellular Networks. [Citation Graph (0, 0)][DBLP]
    AINA, 2005, pp:432-437 [Conf]
  163. Pierre-Emmanuel Gros, Joan Hérisson, Nicolas Férey, Rachid Gherbi
    Combining Applications and Databases Integration Approaches in a Common Distributed Genomic Platform. [Citation Graph (0, 0)][DBLP]
    AINA, 2005, pp:433-438 [Conf]
  164. Yih-Jiun Lee, Peter Henderson
    A Practical Modelling Notation for Secure Distributed Computation. [Citation Graph (0, 0)][DBLP]
    AINA, 2005, pp:439-442 [Conf]
  165. Chung-Min Chen, Yibei Ling, Marcus Pang, Wai Chen, Shengwei Cai, Yoshihisa Suwa, Onur Altintas
    Scalable Request Routing with Next-Neighbor Load Sharing in Multi-Server Environments. [Citation Graph (0, 0)][DBLP]
    AINA, 2005, pp:441-446 [Conf]
  166. Pei-yih Ting
    A Temporal Order Resolution Algorithm in the Multi-server Time Stamp Service Framework. [Citation Graph (0, 0)][DBLP]
    AINA, 2005, pp:445-448 [Conf]
  167. Harri Paloheimo, Antti Ylä-Jääski
    Interoperability of MANET and 4G RAN Routing in Terms of Energy Conservation. [Citation Graph (0, 0)][DBLP]
    AINA, 2005, pp:447-452 [Conf]
  168. Li-Chun Wang, Ching-Hao Lee
    A TCP-Physical Cross-Layer Congestion Control Mechanism for the Multirate WCDMA System Using Explicit Rate Change Notification. [Citation Graph (0, 0)][DBLP]
    AINA, 2005, pp:449-452 [Conf]
  169. Ashraf Uddin Ahmed, Senro Saito, Zixue Cheng
    Zone-Based Routing Algorithm for Congestion Control over the Internet. [Citation Graph (0, 0)][DBLP]
    AINA, 2005, pp:453-458 [Conf]
  170. Rainfield Y. Yen, Hong-Yu Liu
    Symbol Error Probability for Rectangular M-QAM OFDM Transmission over Rayleigh Fading Channels. [Citation Graph (0, 0)][DBLP]
    AINA, 2005, pp:453-456 [Conf]
  171. Savio S. H. Tse, Francis Chi-Moon Lau
    An Approximation Solution for the 2-Median Problem on Two-Dimensional Meshes. [Citation Graph (0, 0)][DBLP]
    AINA, 2005, pp:457-460 [Conf]
  172. Sing-Ling Lee, Jung-Chun Liu, YuChing Chen
    An Ear-Decomposition Based Approach for Survivable Routing in WDM Networks. [Citation Graph (0, 0)][DBLP]
    AINA, 2005, pp:459-464 [Conf]
  173. Mohsen Jahanshahi, K. Mostafavi, M. S. Kordafshari, M. Gholipour, Abolfazl Toroghi Haghighat
    Two New Approaches for Orphan Detection. [Citation Graph (0, 0)][DBLP]
    AINA, 2005, pp:461-464 [Conf]
  174. Yan Shi, Zengji Liu, Zhiliang Qiu, Min Sheng
    Load Balance Based Network Bandwidth Allocation for Delay Sensitive Services. [Citation Graph (0, 0)][DBLP]
    AINA, 2005, pp:465-470 [Conf]
  175. Yi He, Yuhui Qiu, Guangyuan Liu, Kaiyou Lei
    A Parallel Tabu Search Approach Based on Genetic Crossover Operation. [Citation Graph (0, 0)][DBLP]
    AINA, 2005, pp:467-470 [Conf]
  176. Fernando Tinetti, Walter J. Aróztegui, Antonio Quijano
    Sparse Equation Systems in Heterogeneous Clusters of Computers. [Citation Graph (0, 0)][DBLP]
    AINA, 2005, pp:471-474 [Conf]
  177. Leonard Barolli, Mimoza Durresi, Kaoru Sugita, Arjan Durresi, Akio Koyama
    A CAC Scheme for Multimedia Applications Based on Fuzzy Logic. [Citation Graph (0, 0)][DBLP]
    AINA, 2005, pp:473-478 [Conf]
  178. Pi-Chung Wang, Yuan-Rung Yang, Chun-Liang Lee, Hung-Yi Chang
    A Memory-Efficient Huffman Decoding Algorithm. [Citation Graph (0, 0)][DBLP]
    AINA, 2005, pp:475-479 [Conf]
  179. Deyun Gao, Jianfei Cai, Liren Zhang
    Physical Rate Based Admission Control for HCCA in IEEE 802.11e WLANs. [Citation Graph (0, 0)][DBLP]
    AINA, 2005, pp:479-483 [Conf]
  180. Ren-Der Lin, Wen-Shyen Chen
    Fast Calculation Algorithm of the Undetected Errors Probability of CRC Codes. [Citation Graph (0, 0)][DBLP]
    AINA, 2005, pp:480-483 [Conf]
  181. Changhua Zhu, Changxing Pei, Jiandong Li, Weidong Kou
    QoS-Oriented Hybrid Admission Control in IEEE 802.11 WLAN. [Citation Graph (0, 0)][DBLP]
    AINA, 2005, pp:484-487 [Conf]
  182. Yueping Jin, Zhaohui Wu, ShuiGuang Deng, Zhen Yu
    Service-Oriented Workflow Model. [Citation Graph (0, 0)][DBLP]
    AINA, 2005, pp:484-488 [Conf]
  183. Song Xiao, Chengke Wu, Jechang Jeong
    Robust Video Communication Based on Source Modeling and Network Congestion Control. [Citation Graph (0, 0)][DBLP]
    AINA, 2005, pp:488-491 [Conf]
  184. Toshihiro Shikama, Tadanori Mizuno
    Resequencing Schemes for Selective-Repeat ARQ and Their Performance. [Citation Graph (0, 0)][DBLP]
    AINA, 2005, pp:491-494 [Conf]
  185. Chun-yan Gu, Hong-feng Yi, Ke-chu Yi, Li-jun Jin
    A Method of Inverse Filter Design Based on Cepstrum Measure. [Citation Graph (0, 0)][DBLP]
    AINA, 2005, pp:495-498 [Conf]
  186. Mario A. Bochicchio, Nicola Fiore
    Supporting the Conceptual Modeling of Web Applications: The MODE Project. [Citation Graph (0, 0)][DBLP]
    AINA, 2005, pp:495-500 [Conf]
  187. Hui-Feng Huang, Chin-Chen Chang
    A New Design for Efficient t-out-n Oblivious Transfer Scheme. [Citation Graph (0, 0)][DBLP]
    AINA, 2005, pp:499-502 [Conf]
  188. Guillermo de Jesús Hoyos-Rivera, Roberta Lima-Gomes, Jean-Pierre Courtiat
    CoLab: A Flexible Collaborative Web Browsing Tool. [Citation Graph (0, 0)][DBLP]
    AINA, 2005, pp:501-506 [Conf]
  189. Chien-Min Wang, Hsi-Min Chen, Gen-Cher Lee, Shun-Te Wang, Shyh-Fong Hong
    A Tree-Structured Persistence Server for Data Management of Collaborative Applications. [Citation Graph (0, 0)][DBLP]
    AINA, 2005, pp:503-506 [Conf]
  190. Chul-Wuk Jeon, Il-Gon Kim, Jin-Young Choi
    Automatic Generation of the C# Code for Security Protocols Verified with Casper/FDR. [Citation Graph (0, 0)][DBLP]
    AINA, 2005, pp:507-510 [Conf]
  191. Wai Yip Lum, Francis Chi-Moon Lau
    User-Centric Adaptation of Structured Web Documents for Small Devices. [Citation Graph (0, 0)][DBLP]
    AINA, 2005, pp:507-512 [Conf]
  192. Jin-Hau Kuo, Jen-Bin Kuo, Hsuan-Wei Chen, Ja-Ling Wu
    A Hierarchical and Multi-Model Based Algorithm for Lead Detection and News Program Narrative Parsing. [Citation Graph (0, 0)][DBLP]
    AINA, 2005, pp:511-514 [Conf]
  193. Wassam Zahreddine, Qusay H. Mahmoud
    A Framework for Automatic and Dynamic Composition of Personalized Web Services. [Citation Graph (0, 0)][DBLP]
    AINA, 2005, pp:513-518 [Conf]
  194. Shie-Ming Peng
    Molecular Metal Wires and Molecular Switches. [Citation Graph (0, 0)][DBLP]
    AINA, 2005, pp:519- [Conf]
  195. Yeim-Kuan Chang, Ming-Hong Hong, Yi-Wei Ting
    Web-Based Energy-Efficient Cache Invalidation in Wireless Mobile Environment. [Citation Graph (0, 0)][DBLP]
    AINA, 2005, pp:519-524 [Conf]
  196. Jhing-Fa Wang
    Advanced Ubiquitous Media for Creative Cyberspace. [Citation Graph (0, 0)][DBLP]
    AINA, 2005, pp:520- [Conf]
  197. Naoki Shimizu, Riko Yagiu, Masashi Saito
    A Study of Information Services Based on Personal Belongings. [Citation Graph (0, 0)][DBLP]
    AINA, 2005, pp:523-528 [Conf]
  198. Katsuhiko Sato, Michiaki Katsumoto, Tetsuya Miki
    Fragmented Patching: New VOD Technique That Supports Client Mobility. [Citation Graph (0, 0)][DBLP]
    AINA, 2005, pp:527-532 [Conf]
  199. Wai-Kwong Wing, Francis Chi-Moon Lau, Cho-Li Wang
    Smart Retrieval and Sharing of Information Resources Based on Contexts of User-Information Relationships. [Citation Graph (0, 0)][DBLP]
    AINA, 2005, pp:529-534 [Conf]
  200. Shu-Ming Tseng, Teng-Chuan Lin, Kuan-Fu Huang
    A Low-Complexity Iterative Detector for COFDM in Mobile Channels. [Citation Graph (0, 0)][DBLP]
    AINA, 2005, pp:533-537 [Conf]
  201. Chiung-Hon Leon Lee, Alan Liu
    Modeling the Query Intention with Goals. [Citation Graph (0, 0)][DBLP]
    AINA, 2005, pp:535-540 [Conf]
  202. Agustinus Borgy Waluyo, Gabriel Goh, David Taniar, Bala Srinivasan
    On Building a Data Broadcasting System for Mobile Databases. [Citation Graph (0, 0)][DBLP]
    AINA, 2005, pp:538-543 [Conf]
  203. Minaz J. Parmar, Marios C. Angelides
    Human Readable Genetic Rules for Scene Boundary Detection. [Citation Graph (0, 0)][DBLP]
    AINA, 2005, pp:541-546 [Conf]
  204. Takaaki Umedu, Shigeharu Urata, Akio Nakata, Teruo Higashino
    Automatic Decomposition of Java Program for Implementation on Mobile Terminals. [Citation Graph (0, 0)][DBLP]
    AINA, 2005, pp:544-549 [Conf]
  205. Qiangfu Zhao
    Design Smart NNTrees Based on the R4-Rule. [Citation Graph (0, 0)][DBLP]
    AINA, 2005, pp:547-551 [Conf]
  206. Wei Chen, Zhaohui Wu, Xiang Wang
    Minimizing Memory Utilization of Task Sets in SmartOSEK. [Citation Graph (0, 0)][DBLP]
    AINA, 2005, pp:552-558 [Conf]
  207. Ben-Jye Chang
    MDP-Based Fast Handoff with Reducing Waste Rate Method for Management Radio Resource in 3GPP Cellular Networks. [Citation Graph (0, 0)][DBLP]
    AINA, 2005, pp:553-558 [Conf]
  208. Junyang Zhou, Kenneth Man-Kin Chu, Joseph Kee-Yin Ng
    Providing Location Services within a Radio Cellular Network Using Ellipse Propagation Model. [Citation Graph (0, 0)][DBLP]
    AINA, 2005, pp:559-564 [Conf]
  209. Wei-Khing For, Xiaoming Bao, Woon-Seng Gan, See-Kiong Ng
    Reconfigurable Context-Sensitive Bio-Bridge Middleware for Smart Bio-Laboratories. [Citation Graph (0, 0)][DBLP]
    AINA, 2005, pp:561-566 [Conf]
  210. Shu-Ming Tseng, Hung-Chieh Yu, Chi-Lung Chang, Yuan-Ching Tseng, Kuen-Cherng Lin
    EM Vector Channel Estimation and V-BLAST/PIC Detection for Multiuser Long-Code MIMO CDMA in Multipath Rayleigh Fading Channels. [Citation Graph (0, 0)][DBLP]
    AINA, 2005, pp:565-569 [Conf]
  211. Zixue Cheng, Shengguo Sun, Mizuo Kansen, Tongjun Huang, Aiguo He
    A Personalized Ubiquitous Education Support Environment by Comparing Learning Instructional Requirement with Learner's Behavior. [Citation Graph (0, 0)][DBLP]
    AINA, 2005, pp:567-573 [Conf]
  212. Jen-Shun Yang, Chien-Chao Tseng, Ray-Guang Cheng
    A Signal-to-Interference Ratio Based Downlink Scheduling Scheme for WCDMA Mobile Communication System. [Citation Graph (0, 0)][DBLP]
    AINA, 2005, pp:570-575 [Conf]
  213. Jianhua Ma, Bernady O. Apduhan, Laurence Tianruo Yang
    Smart Hyperspaces and Project Ubikids. [Citation Graph (0, 0)][DBLP]
    AINA, 2005, pp:574-579 [Conf]
  214. Po-Jen Chuang, Shien-Da Chang
    Performance Analysis on Location Tracking in PCS Networks. [Citation Graph (0, 0)][DBLP]
    AINA, 2005, pp:576-582 [Conf]
  215. HungPin Chao
    The Non-Specific Intelligent Guided-View System Based on RFID Technology. [Citation Graph (0, 0)][DBLP]
    AINA, 2005, pp:580-585 [Conf]
  216. Ren-Junn Hwang, Feng-Fu Su, Yi-Shiung Yeh, Chia-Yao Chen
    An Efficient Decryption Method for RSA Cryptosystem. [Citation Graph (0, 0)][DBLP]
    AINA, 2005, pp:585-590 [Conf]
  217. Aiguo He, Zixue Cheng, Tongjun Huang, Yue Zhao
    Pseudo-Surface Based Network Camera Smart Control. [Citation Graph (0, 0)][DBLP]
    AINA, 2005, pp:586-590 [Conf]
  218. Dan Feng, Lingfang Zeng, Fang Wang, Lingjun Qin, Qun Liu
    Adaptive Policy Trigger Mechanism for OBSS. [Citation Graph (0, 0)][DBLP]
    AINA, 2005, pp:591-595 [Conf]
  219. Tianjie Cao, Dongdai Lin, Rui Xue
    ID-Based Ring Authenticated Encryption. [Citation Graph (0, 0)][DBLP]
    AINA, 2005, pp:591-596 [Conf]
  220. Sheng-Hua Shiau, Ren-Junn Hwang, Ming-Fuu Lin
    Key Agreement Protocol Based on Weil Pairing. [Citation Graph (0, 0)][DBLP]
    AINA, 2005, pp:597-602 [Conf]
  221. Mimoza Durresi, Arjan Durresi, Leonard Barolli
    Sensor Inter-Vehicle Communication for Safer Highways. [Citation Graph (0, 0)][DBLP]
    AINA, 2005, pp:599-604 [Conf]
  222. Willy Susilo, Fangguo Zhang, Yi Mu
    Privacy-Enhanced Internet Storage. [Citation Graph (0, 0)][DBLP]
    AINA, 2005, pp:603-608 [Conf]
  223. Teruaki Yokoyama, Katsuyoshi Iida, Suguru Yamaguchi
    An Architecture of Network Imprinting for Personal but Wide Area Applications. [Citation Graph (0, 0)][DBLP]
    AINA, 2005, pp:605-609 [Conf]
  224. Zhenjie Huang, Zhixiong Chen, Yumin Wang
    Convertible Undeniable Partially Blind Signatures. [Citation Graph (0, 0)][DBLP]
    AINA, 2005, pp:609-614 [Conf]
  225. Stephen Herborn, Roksana Boreli, Aruna Seneviratne
    Identity Location Decoupling in Pervasive Computing Networks. [Citation Graph (0, 0)][DBLP]
    AINA, 2005, pp:610-615 [Conf]
  226. Mamatha Nanjundaiah, Vipin Chaudhary
    Improvement to the Anticollision Protocol Specification for 900MHz Class 0 Radio Frequency Identification Tag. [Citation Graph (0, 0)][DBLP]
    AINA, 2005, pp:616-620 [Conf]
  227. Simon Sheu, Alan Chang, Webber Huang
    Fast Similarity Search in String Databases. [Citation Graph (0, 0)][DBLP]
    AINA, 2005, pp:617-622 [Conf]
  228. Junichiro Saito, Kouichi Sakurai
    Grouping Proof for RFID Tags. [Citation Graph (0, 0)][DBLP]
    AINA, 2005, pp:621-624 [Conf]
  229. Hao-ming Wang, Boqin Feng
    Research of the Chinese Meta-search Engine Model Based on Intelligent Agent. [Citation Graph (0, 0)][DBLP]
    AINA, 2005, pp:623-628 [Conf]
  230. Satoshi Kawanami, Takeshi Nishimura, Tomoya Enokido, Makoto Takizawa
    A Scalable Group Communication Protocol with Global Clock. [Citation Graph (0, 0)][DBLP]
    AINA, 2005, pp:625-630 [Conf]
  231. Bo Yang, Ali R. Hurson
    Ad Hoc Image Retrieval Using Hierarchical Semantic-Based Index. [Citation Graph (0, 0)][DBLP]
    AINA, 2005, pp:629-634 [Conf]
  232. George Yee
    Using Privacy Policies to Protect Privacy in UBICOMP. [Citation Graph (0, 0)][DBLP]
    AINA, 2005, pp:633-638 [Conf]
  233. Nobuyoshi Sato, Minoru Uehara, Yoshifumi Sakai
    The Evaluations of FTF-IDF Scoring for Fresh Information Retrieval. [Citation Graph (0, 0)][DBLP]
    AINA, 2005, pp:635-640 [Conf]
  234. Guozhen Zhang, Qun Jin, Man Lin
    A Framework of Social Interaction Support for Ubiquitous Learning. [Citation Graph (0, 0)][DBLP]
    AINA, 2005, pp:639-643 [Conf]
  235. Nen-Fu Huang, Rong-Tai Liu, Chih-Hao Chen, Ying-Tsuen Chen, Li-Wen Huang
    A Fast URL Lookup Engine for Content-Aware Multi-Gigabit Switches. [Citation Graph (0, 0)][DBLP]
    AINA, 2005, pp:641-646 [Conf]
  236. Yingpeng Sang, Hong Shen
    A Scheme for Testing Privacy State in Pervasive Sensor Networks. [Citation Graph (0, 0)][DBLP]
    AINA, 2005, pp:644-648 [Conf]
  237. Shin-Jia Hwang, Kuang-Hsi Chen
    A Proxy Automatic Signature Scheme Using a Compiler in Distributed Systems for (Unknown) Virus Detection. [Citation Graph (0, 0)][DBLP]
    AINA, 2005, pp:649-654 [Conf]
  238. Xinyi Huang, Willy Susilo, Yi Mu, Futai Zhang
    Identity-Based Ring Signcryption Schemes: Cryptographic Primitives for Preserving Privacy and Authenticity in the Ubiquitous World. [Citation Graph (0, 0)][DBLP]
    AINA, 2005, pp:649-654 [Conf]
  239. János Tapolcai, Pin-Han Ho, Xiaohong Jiang, Susumu Horiguchi
    Shared Protection Based on Matrix Decomposition in Tropical Semi-Rings. [Citation Graph (0, 0)][DBLP]
    AINA, 2005, pp:655-660 [Conf]
  240. Ryuzou Nishi, Hitoshi Morioka, Kouichi Sakurai
    Trends and Issues for Security of Home-Network Based on Power Line Communication. [Citation Graph (0, 0)][DBLP]
    AINA, 2005, pp:655-660 [Conf]
  241. Satoshi Fujita, Shigeaki Tagashira, Chen Qiao, Masaya Mito
    Distributed Branch-and-Bound Scheme for Solving the Winner Determination Problem in Combinatorial Auctions. [Citation Graph (0, 0)][DBLP]
    AINA, 2005, pp:661-666 [Conf]
  242. Willy Susilo, Russell James Ang, Cameron Allen George McDonald, Jianyong Huang
    Personal Firewall for Pocket PC 2003: Design & Implementation. [Citation Graph (0, 0)][DBLP]
    AINA, 2005, pp:661-666 [Conf]
  243. Jingde Cheng
    Connecting Components with Soft System Buses: A New Methodology for Design, Development, and Maintenance of Reconfigurable, Ubiquitous, and Persistent Reactive Systems. [Citation Graph (0, 0)][DBLP]
    AINA, 2005, pp:667-672 [Conf]
  244. Yih-Ling Hedley, Muhammad Younas, Anne E. James
    The Categorisation of Hidden Web Databases through Concept Specificity and Coverage. [Citation Graph (0, 0)][DBLP]
    AINA, 2005, pp:671-376 [Conf]
  245. Yu Jiao, Ali R. Hurson
    Adaptive Power Management for Mobile Agent-Based Information Retrieval. [Citation Graph (0, 0)][DBLP]
    AINA, 2005, pp:675-680 [Conf]
  246. Irfan-Ullah Awan, Yue Li, Demetres D. Kouvatsos
    Performance Analysis Mobility Management in Heterogeneous Wireless Networks. [Citation Graph (0, 0)][DBLP]
    AINA, 2005, pp:677-682 [Conf]
  247. Prasanna Lokuge, Damminda Alahakoon
    Reinforcement Learning in Neuro BDI Agents for Achieving Agent's Intentions in Vessel Berthing Applications. [Citation Graph (0, 0)][DBLP]
    AINA, 2005, pp:681-686 [Conf]
  248. S. Ernest Chang
    The Design of a Secure and Pervasive Multimodal Web System. [Citation Graph (0, 0)][DBLP]
    AINA, 2005, pp:683-688 [Conf]
  249. Sameera Abar, Hideaki Hatori, Toru Abe, Tetsuo Kinoshita
    Agent-Based Knowledge Acquisition in Network Management Domain. [Citation Graph (0, 0)][DBLP]
    AINA, 2005, pp:687-692 [Conf]
  250. Aláa Qasim Al-Namiy, Faris S. Majeed
    Improving Query Answering in Peer-to-Peer Data Searching. [Citation Graph (0, 0)][DBLP]
    AINA, 2005, pp:689-694 [Conf]
  251. Ssu-Hsuan Lu, Chun-Chieh Yang, Hsiao-Hsi Wang, Kuan-Ching Li
    On Design of Agent Home Scheme for Prefetching Strategy in DSM Systems. [Citation Graph (0, 0)][DBLP]
    AINA, 2005, pp:693-698 [Conf]
  252. Eric Pardede, J. Wenny Rahayu, David Taniar
    Preserving Composition in XML Object Relational Storage. [Citation Graph (0, 0)][DBLP]
    AINA, 2005, pp:695-700 [Conf]
  253. Jun'ichi Yura, Jin Nakazawa, Hideyuki Tokuda
    Galaxy DS: Directory Service for Service Composition Based on Smart Space Structure. [Citation Graph (0, 0)][DBLP]
    AINA, 2005, pp:699-704 [Conf]
  254. Ing-Xiang Chen, Chun-Lin Fan, Pang-Hsiang Lo, Li-Chia Kuo, Cheng-Zen Yang
    ISWIVE: An Integrated Semantic Web Interactive Visualization Environment. [Citation Graph (0, 0)][DBLP]
    AINA, 2005, pp:701-706 [Conf]
  255. Yuichi Nakamura, Hiroaki Kikuchi
    Efficient Key Management Based on the Subset Difference Method for Secure Group Communication. [Citation Graph (0, 0)][DBLP]
    AINA, 2005, pp:707-712 [Conf]
  256. Shih-Chun Chou, Wen-Tai Hsieh, Fabien L. Gandon, Norman M. Sadeh
    Semantic Web Technologies for Context-Aware Museum Tour Guide Applications. [Citation Graph (0, 0)][DBLP]
    AINA, 2005, pp:709-714 [Conf]
  257. Fan Hong, Liang Hong, Cai Fu
    Secure OLSR. [Citation Graph (0, 0)][DBLP]
    AINA, 2005, pp:713-718 [Conf]
  258. Jiali Cao, Zheng-an Yao
    An Improved RSA-Based Access Control Scheme for Hierarchical Groups. [Citation Graph (0, 0)][DBLP]
    AINA, 2005, pp:719-723 [Conf]
  259. Kuo-Ming Chao, Muhammad Younas, Chi-Chun Lo, Tao-Hsin Tan
    Fuzzy Matchmaking for Web Services. [Citation Graph (0, 0)][DBLP]
    AINA, 2005, pp:721-726 [Conf]
  260. Jingmei Liu, Baodian Wei, Xiangguo Cheng, Xinmei Wang
    An AES S-Box to Increase Complexity and Cryptographic Analysis. [Citation Graph (0, 0)][DBLP]
    AINA, 2005, pp:724-728 [Conf]
  261. Hui-Na Chua, Simon D. Scott, Y. W. Choi, Peter Blanchfield
    Web-Page Adaptation Framework for PC & Mobile Device Collaboration. [Citation Graph (0, 0)][DBLP]
    AINA, 2005, pp:727-732 [Conf]
  262. Ying-Lan Chang, Koun-Tem Sun, Yueh-Hong Chen
    ART2-Based Genetic Watermarking. [Citation Graph (0, 0)][DBLP]
    AINA, 2005, pp:729-734 [Conf]
  263. S. M. F. D. Syed Mustapha
    Extracting Social Knowledge in the Intelligent Conversational Channel for Agent Communication. [Citation Graph (0, 0)][DBLP]
    AINA, 2005, pp:733-738 [Conf]
  264. Rachid El Abdouni Khayari, Michael Best, Axel Lehmann
    Impact of Document Types on the Performance of Caching Algorithms in WWW Proxies: A Trace Driven Simulation Study. [Citation Graph (0, 0)][DBLP]
    AINA, 2005, pp:737-742 [Conf]
  265. Elhadi Shakshuki, Saad Abu-Draz
    Agent-Mediated e-Commerce System. [Citation Graph (0, 0)][DBLP]
    AINA, 2005, pp:739-744 [Conf]
  266. Hai Jin, Chao Xie, Kaiqin Fan, Rong Hu, Yunfa Li
    Single Stream Image and Stream Network Prefetch in Streaming Media Proxy Caching. [Citation Graph (0, 0)][DBLP]
    AINA, 2005, pp:743-748 [Conf]
  267. Ziming Zhuang
    iHITS: Extending HITS for Personal Interests Profiling. [Citation Graph (0, 0)][DBLP]
    AINA, 2005, pp:747-751 [Conf]
  268. Iftekhar Ahmad, Joarder Kamruzzaman, Srinivas Aswathanarayaniah
    An Improved Preemption Policy for Higher User Satisfaction. [Citation Graph (0, 0)][DBLP]
    AINA, 2005, pp:749-754 [Conf]
  269. Nor Adnan Yahaya, Goh Poh Gin, Wai-Choon Chan
    Developing Innovative Web Information Systems through the Use of Web Data Extraction Technology. [Citation Graph (0, 0)][DBLP]
    AINA, 2005, pp:752-757 [Conf]
  270. Tomoya Enokido, Makoto Takizawa
    Concurrency Control Using Role Ordering (RO) Scheduler. [Citation Graph (0, 0)][DBLP]
    AINA, 2005, pp:755-760 [Conf]
  271. Toshihiko Yamakami
    A 2-Dimensional Evolution Model of Value-Added Mobile Internet Services. [Citation Graph (0, 0)][DBLP]
    AINA, 2005, pp:758-761 [Conf]
  272. Li-Hsing Yen, Chi-Hung Liao
    Round-Robin with FCFS Preemption: A Simple MAC Scheduling Scheme for Bluetooth Piconet. [Citation Graph (0, 0)][DBLP]
    AINA, 2005, pp:761-766 [Conf]
  273. Vincent Shin-Mu Tseng, Kawuu W. C. Lin
    Mining Sequential Mobile Access Patterns Efficiently in Mobile Web Systems. [Citation Graph (0, 0)][DBLP]
    AINA, 2005, pp:762-767 [Conf]
  274. Elhadi Shakshuki, Ivan Tomek, Omkarnath Prabhu
    Agent Frameworks in FCVW. [Citation Graph (0, 0)][DBLP]
    AINA, 2005, pp:768-773 [Conf]
  275. Jing Liu, Jiandong Li, Lei Zhou, Guanghui Zhang
    An Enhanced User-Dependent Perfect-Scheduling Multiple Access Protocol for Wireless Packet Network. [Citation Graph (0, 0)][DBLP]
    AINA, 2005, pp:769-774 [Conf]
  276. Behzad Bordbar, Rachid Anane
    An Architecture for Automated QoS Resolution in Wireless Systems. [Citation Graph (0, 0)][DBLP]
    AINA, 2005, pp:774-779 [Conf]
  277. Hong Zhu, Chengke Wu, Yangli Wang, Yong Fang
    Fast Mode Decision for H.264/AVC Based on Macroblock Correlation. [Citation Graph (0, 0)][DBLP]
    AINA, 2005, pp:775-780 [Conf]
  278. Shuenn Gi Lee
    Performance of Concatenated FEC under Fading Channel in Wireless-MAN OFDM System. [Citation Graph (0, 0)][DBLP]
    AINA, 2005, pp:781-785 [Conf]
  279. Gabriel López Millán, Félix J. García Clemente, Manuel Gil Pérez, Gregorio Martínez Pérez, Antonio F. Gómez-Skarmeta
    Deploying Secure Cryptographic Services in Multi-Domain IPv6 Networks. [Citation Graph (0, 0)][DBLP]
    AINA, 2005, pp:785-789 [Conf]
  280. Chen-Shie Ho, Sy-Yen Kuo, Shih-Yi Yuan
    Group Partition and Restoration Strategies for Survivable WDM Networks. [Citation Graph (0, 0)][DBLP]
    AINA, 2005, pp:786-791 [Conf]
  281. Yen-Wen Chen, Ji-Min Shih
    Binding Updates for Mobile Networks by Using Multicast Mechanism in IPv6 Environment. [Citation Graph (0, 0)][DBLP]
    AINA, 2005, pp:790-795 [Conf]
  282. Nen-Fu Huang, Kwei-Bor Chen, Whai-En Chen
    Fast and Scalable Multi-TCAM Classification Engine for Wide Policy Table Lookup. [Citation Graph (0, 0)][DBLP]
    AINA, 2005, pp:792-797 [Conf]
  283. Mingshou Liu, Cheng-Hsien Hsu, Shi-Hong Kuo, Hsang-Chi Tsai
    An IPv6 Enabled Packet Engine Design for Home/SOHO Routers. [Citation Graph (0, 0)][DBLP]
    AINA, 2005, pp:796-800 [Conf]
  284. Kultida Rojviboonchai, Toru Osuga, Hitoshi Aida
    R-M/TCP: Protocol for Reliable Multi-Path Transport over the Internet. [Citation Graph (0, 0)][DBLP]
    AINA, 2005, pp:801-806 [Conf]
  285. Guillaume Chelius, Eric Fleury, Laurent Toutain
    No Administration Protocol (NAP) for IPv6 Router Auto-Configuration. [Citation Graph (0, 0)][DBLP]
    AINA, 2005, pp:801-806 [Conf]
  286. Rung-Shiang Cheng, Hui-Tang Lin, Wen-Shyang Hwang, Ce-Kuen Shieh
    Improving the Ramping up Behavior of TCP Slow Start. [Citation Graph (0, 0)][DBLP]
    AINA, 2005, pp:807-812 [Conf]
  287. Chiung-Ying Wang, Cheng-Ying Li, Ren-Hung Hwang, Yuh-Shyan Chen
    Global Connectivity for Mobile IPv6-Based Ad Hoc Networks. [Citation Graph (0, 0)][DBLP]
    AINA, 2005, pp:807-812 [Conf]
  288. Shiang-Ming Huang, Quincy Wu, Yi-Bing Lin
    Tunneling IPv6 through NAT with Teredo Mechanism. [Citation Graph (0, 0)][DBLP]
    AINA, 2005, pp:813-818 [Conf]
  289. Yung-Chung Wang
    Conditional Drop Probability of RED Mechanism with UDP and TCP Traffic. [Citation Graph (0, 0)][DBLP]
    AINA, 2005, pp:813-820 [Conf]
  290. Whai-En Chen, Chia-Yung Su, Jui-Hung Weng
    Development of IPv6-IPv4 Translation Mechanisms for SIP-Based VoIP Applications. [Citation Graph (0, 0)][DBLP]
    AINA, 2005, pp:819-823 [Conf]
  291. Ling Chen
    Effects of Network Characteristics on Task Performance in a Desktop CVE System. [Citation Graph (0, 0)][DBLP]
    AINA, 2005, pp:821-826 [Conf]
  292. Bo Rong, Jacques Lebeau, Maria Bennani, Michel Kadoch, Ahmed K. Elhakeem
    Traffic Aggregation Based SIP over MPLS Network Architecture. [Citation Graph (0, 0)][DBLP]
    AINA, 2005, pp:827-832 [Conf]
  293. Jenq-Muh Hsu, Chian-Fei Hsu, Chung-Ming Huang
    Design of an IPv6 SOHO Router Based on Embedded Linux System. [Citation Graph (0, 0)][DBLP]
    AINA, 2005, pp:827-832 [Conf]
  294. Satoshi Doi, Shingo Ata, Hiroshi Kitamura, Masayuki Murata
    Design, Implementation and Evaluation of Routing Protocols for IPv6 Anycast Communicatio. [Citation Graph (0, 0)][DBLP]
    AINA, 2005, pp:833-838 [Conf]
  295. Junichi Funasaka
    An Analysis on Adaptive Parallel Downloading Method. [Citation Graph (0, 0)][DBLP]
    AINA, 2005, pp:835-840 [Conf]
  296. Satoshi Matsunaga, Shingo Ata, Hiroshi Kitamura, Masayuki Murata
    Design and Implementation of IPv6 Anycast Routing Protocol: PIA-SM. [Citation Graph (0, 0)][DBLP]
    AINA, 2005, pp:839-844 [Conf]
  297. S. M. Rezazad, Hamid Sarbazi-Azad
    A Constraint-Based Performance Comparison of Hypercube and Star Multicomputers with Failures. [Citation Graph (0, 0)][DBLP]
    AINA, 2005, pp:841-846 [Conf]
  298. Shu-Fen Tseng, Hsi-Chieh Lee, Te-Ching Kung, Shou-Lien Chou, Jing-Yi Chen
    The Development of Global IPv6 Products: An Exploration. [Citation Graph (0, 0)][DBLP]
    AINA, 2005, pp:845-850 [Conf]
  299. Tzong-Jye Liu, Chia-Lin Lee
    2-State Alternator for Uniform Rings with Arbitrary Size. [Citation Graph (0, 0)][DBLP]
    AINA, 2005, pp:847-852 [Conf]
  300. Rafael Marín López, Gregorio Martínez Pérez, Antonio F. Gómez-Skarmeta
    Implementing RADIUS and Diameter AAA Systems in IPv6-Based Scenarios. [Citation Graph (0, 0)][DBLP]
    AINA, 2005, pp:851-855 [Conf]
  301. Yosuke Sugiyama, Tomoya Enokido, Makoto Takizawa
    Lattice-Based Precedence of Moderate Lock Modes on Objects. [Citation Graph (0, 0)][DBLP]
    AINA, 2005, pp:853-858 [Conf]
  302. Eduardo Jacob, Juan José Unzilla, Maria Victoria Higuero, Purificación Sáiz, Marina Aguado, Christian Pinedo
    A Dual (IP4/IPv6) "Durable Storage" Commercial Service. [Citation Graph (0, 0)][DBLP]
    AINA, 2005, pp:856-861 [Conf]
  303. Liang Cai, Xiaohu Yang, Chun Chen
    Design and Implementation of a Server-Aided PKI Service (SaPKI. [Citation Graph (0, 0)][DBLP]
    AINA, 2005, pp:859-864 [Conf]
  304. Chia-Hung Chien, Paul Hsueh-Min Chang, Von-Wun Soo
    Market-Oriented Multiple Resource Scheduling in Grid Computing Environments. [Citation Graph (0, 0)][DBLP]
    AINA, 2005, pp:867-872 [Conf]
  305. Graham Morgan, Kier Storey
    Scalable Collision Detection for Massively Multiplayer Online Games. [Citation Graph (0, 0)][DBLP]
    AINA, 2005, pp:873-878 [Conf]
  306. Muhammad Younas, Kuo-Ming Chao, Rachid Anane, S. Y. Yan, P. J. Lovett, Anthony N. Godwin
    Grid Services Mediation. [Citation Graph (0, 0)][DBLP]
    AINA, 2005, pp:879-884 [Conf]
  307. Rosa Gil, Jaime Delgado, Zièd Choukair
    Characterizing Ad Hoc B2B Applications Using Ontologies and Complex Systems. [Citation Graph (0, 0)][DBLP]
    AINA, 2005, pp:885-892 [Conf]
  308. Zièd Choukair
    Correctness Proof Obligation for CoCTelS Telecom Services Composition Model. [Citation Graph (0, 0)][DBLP]
    AINA, 2005, pp:893-900 [Conf]
  309. Yoshizo Ishihara, Runhe Huang, Kwang Mong Sim
    Learning Opponent's Eagerness with Bayesian Updating Rule in a Market-Driven Negotiation Model. [Citation Graph (0, 0)][DBLP]
    AINA, 2005, pp:903-908 [Conf]
  310. Pi-Chung Wang, Chun-Liang Lee, Yuan-Rung Yang, Hung-Yi Chang
    CAM-Based Huffman Decoding Made Power Efficient. [Citation Graph (0, 0)][DBLP]
    AINA, 2005, pp:909-914 [Conf]
  311. Katsuhiro Takata, Yusuke Shina, Jianhua Ma, Bernady O. Apduhan
    Designing a Space-Oriented System for Ubiquitous Outdoor Kid's Safety Care. [Citation Graph (0, 0)][DBLP]
    AINA, 2005, pp:915-920 [Conf]
  312. Rami Yared, Xavier Défago, Takuya Katayama
    Fault-Tolerant Group Membership Protocols Using Physical Robot Messengers. [Citation Graph (0, 0)][DBLP]
    AINA, 2005, pp:921-926 [Conf]
  313. Shuxin Yin, Indrakshi Ray
    Relational Database Operations Modeling with UML. [Citation Graph (0, 0)][DBLP]
    AINA, 2005, pp:927-932 [Conf]
  314. Teng Ma, Junzhou Luo
    A Prediction-Based and Cost-Based Replica Replacement Algorithm Research and Simulation. [Citation Graph (0, 0)][DBLP]
    AINA, 2005, pp:935-940 [Conf]
  315. Jinhua Sun, Jiandong Li, Lijun Jin
    A RS-SISO Algorithm for Serially Concatenated Continuous Phase Modulation. [Citation Graph (0, 0)][DBLP]
    AINA, 2005, pp:941-946 [Conf]
  316. Chin-Chen Chang, Wei-Liang Tai, Min-Hui Lin
    A Reversible Data Hiding Scheme with Modified Side Match Vector Quantization. [Citation Graph (0, 0)][DBLP]
    AINA, 2005, pp:947-952 [Conf]
  317. Ratsameetip Wita, Yunyong Teng-Amnuay
    Vulnerability Profile for Linux. [Citation Graph (0, 0)][DBLP]
    AINA, 2005, pp:953-958 [Conf]
  318. Michel Raynal, Matthieu Roy, Ciprian Tutu
    A Simple Protocol Offering Both Atomic Consistent Read Operations and Sequentially Consistent Read Operations. [Citation Graph (0, 0)][DBLP]
    AINA, 2005, pp:961-966 [Conf]
  319. Woei-Kae Chen, Tung-Hung Tsai, Hung-Hsing Chao
    Integration of Specification-Based and CR-Based Approaches for GUI Testing. [Citation Graph (0, 0)][DBLP]
    AINA, 2005, pp:967-972 [Conf]
  320. Xiangguo Cheng, Jingmei Liu, Xinmei Wang
    An Identity-Based Signature and Its Threshold Version. [Citation Graph (0, 0)][DBLP]
    AINA, 2005, pp:973-977 [Conf]
  321. Xinxin Fan, Yumin Wang
    Simultaneous Divisor Class Addition-Subtraction Algorithm and Its Applications to Hyperelliptic Curve Cryptosystem. [Citation Graph (0, 0)][DBLP]
    AINA, 2005, pp:978-983 [Conf]
  322. Bo Xu, Dongyi Jiang, Jun Li
    HSM: A Fast Packet Classification Algorithm. [Citation Graph (0, 0)][DBLP]
    AINA, 2005, pp:987-992 [Conf]
  323. Tzu-Chi Huang, Ce-Kuen Shieh, Yu-Ben Miao
    Java Application's Packet Eavesdropper for Content Delivery Network. [Citation Graph (0, 0)][DBLP]
    AINA, 2005, pp:993-998 [Conf]
  324. Nobuo Funabiki, Megumi Isogai, Toru Nakanishi, Teruo Higashino
    Optical-Drop Wavelength Assignment Problem for Wavelength Reuse in WDM Ring Metropolitan Area Networks. [Citation Graph (0, 0)][DBLP]
    AINA, 2005, pp:999-1004 [Conf]
  325. Jianhua Yang, Shou-Hsuan Stephen Huang
    Matching TCP Packets and Its Application to the Detection of Long Connection Chains on the Internet. [Citation Graph (0, 0)][DBLP]
    AINA, 2005, pp:1005-1010 [Conf]
  326. Agustinus Borgy Waluyo, Bala Srinivasan, David Taniar
    Global Indexing Scheme for Location-Dependent Queries in Multi Channels Mobile Broadcast Environment. [Citation Graph (0, 0)][DBLP]
    AINA, 2005, pp:1011-1016 [Conf]
NOTICE1
System may not be available sometimes or not working properly, since it is still in development with continuous upgrades
NOTICE2
The rankings that are presented on this page should NOT be considered as formal since the citation info is incomplete in DBLP
 
System created by asidirop@csd.auth.gr [http://users.auth.gr/~asidirop/] © 2002
for Data Engineering Laboratory, Department of Informatics, Aristotle University © 2002