Message from the AINA 2007 Workshop Chairs (PDF)
Message from the FINA 2007 Symposium Chairs (PDF)
FINA 2007 Organizing Committee and Reviewers (PDF)
Message from the DMIR 2007 Symposium Chairs (PDF)
DMIR 2007 Organizing and Program Committees (PDF)
Message from the SSNDS 2007 Symposium Chairs (PDF)
SSNDS 2007 Organizing and Program Committees (PDF)
Message from the BLSC 2007 Symposium Chairs (PDF)
Service Provider Implementation of SIP Regarding Security (Abstract)
Message from the SEC 2007 Symposium Chairs (PDF)
Effective Caching in Wireless Sensor Network (Abstract)
Message from the TeNAS 2007 Workshop Chairs (PDF)
TeNAS 2007 Organizing and Program Committees (PDF)
Message from the SOCNE 2007 Workshop Chairs (PDF)
SOCNE 2007 Organizing and Program Committees (PDF)
Assessment of a Mobile Agent Based Routing Protocol for Mobile Ad-hoc Networks (Abstract)
Sentient Networks: A New Dimension in Network Capability (Abstract)
A Cell-Based Approach for Evolutionary Component Repositories for Intelligent Service Robots (Abstract)
Rank Theorems for Forward Secrecy in Group Key Management Protocols (Abstract)
A Coverage and Connectivity Method to Cluster Topology in Wireless Sensor Networks (Abstract)
Efficient Mediated Certificates Public-Key Encryption Scheme without Pairings (Abstract)
Effective Caching in Wireless Sensor Network (Abstract)
An Improved Approach to Secure Authentication and Signing (Abstract)
Efficient Battery Management for Sensor Lifetime (Abstract)
Coordination Protocols of Multiple Actuator Nodes in a Multi-Actuator/Multi-Sensor Model (Abstract)
Multi-Agent Coordination Mechanism Based on Indirect Interaction (Abstract)
Self-Healing in Distributed Network Environments (Abstract)
On the Miscollaboration of Congestion Control Mechanisms at the Transport and the Network Layers (Abstract)
Detecting Stepping-Stone with Chaff Perturbations (Abstract)
Ontology Based Grid Information Interoperation (Abstract)
A Coverage and Connectivity Method to Cluster Topology in Wireless Sensor Networks (Abstract)
Efficient Mediated Certificates Public-Key Encryption Scheme without Pairings (Abstract)
BER Analysis of a GMSK System Using Decision Feedback (Abstract)
An Improved Approach to Secure Authentication and Signing (Abstract)
A New Approach to Early Detection of an Unknown Worm (Abstract)
Cross Layer Routing for Reliable Connections in IP over WDM Networks (Abstract)
Conditional Random Fields for Intrusion Detection (Abstract)
A Scalable and Efficient Client Emulation Method for IP Multicast Performance Evaluation (Abstract)
Implementation and Field Experiments of a Remote Medical-Care Supporting System (Abstract)
Self-Similar Property for TCP Traffic under the Bottleneck Restrainment (Abstract)
Common-Cause Failure Analysis for Dynamic Hierarchical Systems (Abstract)
Quasi-Orthogonal Time Division Multiplexing and Its Applications under Rayleigh Fading Channels (Abstract)
A New Mutable Nonlinear Transformation Algorithm for S-box (Abstract)
Specification Synthesis for Monitoring and Analysis of MANET Protocols (Abstract)
A Traffic Classification Algorithm for Intrusion Detection (Abstract)
A New Approach to Early Detection of an Unknown Worm (Abstract)
Arabic Sign Language Recognition an Image-Based Approach (Abstract)
Conditional Random Fields for Intrusion Detection (Abstract)
Sizing Router Buffers for Large-Scale TCP/IP Networks (Abstract)
Using Two-Stage Concept-Based Singular Value Decomposition Technique as a Query Expansion Strategy (Abstract)
Self-Similar Property for TCP Traffic under the Bottleneck Restrainment (Abstract)
Sharing Software Components Using a Service-Oriented, Distributed and Secure Infrastructure (Abstract)
A New Mutable Nonlinear Transformation Algorithm for S-box (Abstract)
A Computational Approach to TSP Performance Prediction Using Data Mining (Abstract)
Evaluation of Open-Domain Question Answering Systems within a Time Constraint (Abstract)
Towards Answering How do I Questions Using Classification (Abstract)
Arabic Sign Language Recognition an Image-Based Approach (Abstract)
Morphological Zerotree Compression Coding Based on Integer Wavelet Transform for Iris Image (Abstract)
Extracting Significant Phrases from Text (Abstract)
WaveQ: Combining Wavelet Analysis and Clustering for Effective Image Retrieval (Abstract)
Using Two-Stage Concept-Based Singular Value Decomposition Technique as a Query Expansion Strategy (Abstract)
A New Method of Cluster-Based Topic Language Model for Genomic IR (Abstract)
Mining Visual Knowledge for Multi-Lingual Image Retrieval (Abstract)
Proactive Documents--A New Paradigm to Access Document Information from Various Contexts (Abstract)
Filtering Spam Using Kolmogorov Complexity Estimates (Abstract)
Reducing the Complexity in the Distributed Multiplication Protocol of Two Polynomially Shared Values (Abstract)
Effectiveness of Multi-Perspective Representation Scheme on Support Vector Machines (Abstract)
An Investigation of Chip-Level Hardware Support for Web Mining (Abstract)
Learning Relations and Information Extraction Rules for Protein Annotation (Abstract)
Effective Storage Security in Incompletely Trusted Environment (Abstract)
Extracting Significant Phrases from Text (Abstract)
Reduction in Dimensions and Clustering Using Risk and Return Model (Abstract)
Using Web Directories for Similarity Measurement in Personal Name Disambiguation (Abstract)
Privacy-Preserving Two-Party K-Means Clustering via Secure Approximation (Abstract)
A Parallel Mining Algorithm for Closed Sequential Patterns (Abstract)
Fast and Efficient Implementation of AES via Instruction Set Extensions (Abstract)
Reducing the Complexity in the Distributed Multiplication Protocol of Two Polynomially Shared Values (Abstract)
Enforcing Fine-Grained Authorization Policies for Java Mobile Agents (Abstract)
Advanced Packet Filter Placement Strategies for Carrier-Grade IP-Networks (Abstract)
Obligations for Role Based Access Control (Abstract)
Authenticated Broadcast Encryption Scheme (Abstract)
An Efficient Scheme for User Authentication in Wireless Sensor Networks (Abstract)
Using Social Network Theory Towards Development of Wireless Ad Hoc Network Trust (Abstract)
Detecting Anomaly Node Behavior in Wireless Sensor Networks (Abstract)
An Identity-Based Key Management Framework for Personal Networks (Abstract)
Random Oracle Instantiation in Distributed Protocols Using Trusted Platform Modules (Abstract)
Information Security Threats and Access Control Practices in Norwegian Businesses (Abstract)
Context-Aware Security Policy for the Service Discovery (Abstract)
Adapting the UCON_ABC Usage Control Policies on CORBASec Infrastructure (Abstract)
Enforcing Fine-Grained Authorization Policies for Java Mobile Agents (Abstract)
A Decentralized Authorization Architecture (Abstract)
Conflict Detection and Resolution in Context-Aware Authorization (Abstract)
Authenticated Broadcast Encryption Scheme (Abstract)
Leveraging Identity-Based Cryptography for Node ID Assignment in Structured P2P Systems (Abstract)
A Certified Email Protocol Using Key Chains (Abstract)
Heuristics for Improving Cryptographic Key Assignment in a Hierarchy (Abstract)
An Identity-Based Key Management Framework for Personal Networks (Abstract)
Identity-Based and Inter-Domain Password Authenticated Key Exchange for Lightweight Clients (Abstract)
A New and Efficient Key Management Scheme for Content Access Control within Tree Hierarchies (Abstract)
Detecting Coordinated Distributed Multiple Attacks (Abstract)
Finding Logically Consistent Resource-Deception Plans for Defense in Cyberspace (Abstract)
Intrusion Detection for Encrypted Web Accesses (Abstract)
Dealing with Some Conceptual Data Model Requirements for Biological Domains (Abstract)
HTTPS Hacking Protection (Abstract)
Towards an Aspect Oriented Approach for the Security Hardening of Code (Abstract)
An Online/Offline Signature Scheme Based on the Strong RSA Assumption (Abstract)
Privacy Rights Management for Privacy Compliance Systems (Abstract)
Database-Driven Grid Computing with GridBASE (Abstract)
On the Contribution of Preamble to Information Hiding in Mimicry Attacks (Abstract)
Detecting Protein-Domains DNA-Motifs Association in Saccharomyces cerevisiae Regulatory Networks (Abstract)
A Spatial Indexing Approach for Protein Structure Modeling (Abstract)
Dealing with Some Conceptual Data Model Requirements for Biological Domains (Abstract)
A Greedy Correlation-Incorporated SVM-Based Algorithm for Gene Selection (Abstract)
Markov Models to Classify M. tuberculosis Spoligotypes (Abstract)
Crick's Hypothesis Revisited: The Existence of a Universal Coding Frame (Abstract)
Attractive Feature Reduction Approach for Colon Data Classification (Abstract)
Biological Sequence Clustering and Classification with a Hybrid Method and Dynamic Programming (Abstract)
Biological Systems Analysis Using Inductive Logic Programming (Abstract)
Database-Driven Grid Computing with GridBASE (Abstract)
Parallel Contour Matching and 3D Partial Retrieval in Bio-Image Database (Abstract)
A Grid System for the Ingestion of Biological Data into a Relational DBMS (Abstract)
A Circular Hamming Distance, Circular Gumbel Distribution, RNA Relics and Primitive Genome (Abstract)
Kinetic Analysis of Ligand-Receptor Complex Formation with the Aid of Computer Simulation (Abstract)
Application of Double Clustering to Gene Expression Data for Class Prediction (Abstract)
Efficiency of Hybrid Normalization of Microarray Gene Expression: A Simulation Study (Abstract)
Crick's Hypothesis Revisited: The Existence of a Universal Coding Frame (Abstract)
A Soft-Core for Pattern Recognition (Abstract)
An Inter-Core Communication Enabled Multi-Core Simulator Based on SimpleScalar (Abstract)
Synthetic Trace-Driven Simulation of Cache Memory (Abstract)
A Real-Time Scheduling Algorithm with Buffer Optimization for Embedded Signal Processing Systems (Abstract)
Reliability-Driven Scheduling of Periodic Tasks in Heterogeneous Real-Time Systems (Abstract)
A Flexible Scheduling Framework for Deeply Embedded Systems (Abstract)
MAC Address Translation for Enabling Scalable Virtual Private LAN Services (Abstract)
Hardware-Software Cosynthesis of Multiprocessor Embedded Architectures (Abstract)
Detecting VLIW Hard Errors Cost-Effectively through a Software-Based Approach (Abstract)
Embedded Intelligent Intrusion Detection: A Behavior-Based Approach (Abstract)
High-Flexibility Rekeying Processor for Key Management in Secure Multicast (Abstract)
A Soft-Core for Pattern Recognition (Abstract)
Fault Tolerance in Small World Cellular Neural Networks for Image Processing (Abstract)
Buffer Management for Multimedia QoS Control over HSDPA Downlink (Abstract)
Coordinate Magnetic Routing for Mobile Sinks Wireless Sensor Networks (Abstract)
A Control Plane Architecture to Enhance Network Appliance Agility through Autonomic Functionality (Abstract)
Constructing Enterprise Information Network Security Risk Management Mechanism by Using Ontology (Abstract)
Mobile Event Monitoring Protocol for Wireless Sensor Networks (Abstract)
MAC Address Translation for Enabling Scalable Virtual Private LAN Services (Abstract)
Real Time Scheduling for Audio and Video Streams (Abstract)
A New Low Cost Sessions-Based Misbehaviour Detection Protocol (SMDP) for MANET (Abstract)
A Toolkit for Virtual Large-Scale Storage in a Learning Environment (Abstract)
A Fuzzy-Based and Simulated IP Network Traffic Engineering Promoting Multi-Service Performance (Abstract)
Multi-Purpose Models for QoS Monitoring (Abstract)
Convergent Online Charging for Context-Aware Mobile Services (Abstract)
Comparative Evaluation of Converged Service-Oriented Architectures (Abstract)
Planning and Design of TWAREN: Advanced National Research and Education Network in Taiwan (Abstract)
A Control Plane Architecture to Enhance Network Appliance Agility through Autonomic Functionality (Abstract)
Constructing Enterprise Information Network Security Risk Management Mechanism by Using Ontology (Abstract)
Bridging the Gap between Networked Appliances and Virtual Worlds (Abstract)
Making Embedded Software Development More Efficient with SOA (Abstract)
Service-Oriented Device Communications Using the Devices Profile for Web services (Abstract)
Service-Oriented Architectures for Embedded Systems Using Devices Profile for Web Services (Abstract)
Fuzzy Logic Based Admission Control for Multimedia Streams in the UPnP QoS Architecture (Abstract)
Architecture and Models for Self-Adaptability of Transport Protocols (Abstract)
Convergent Online Charging for Context-Aware Mobile Services (Abstract)
Comparative Evaluation of Converged Service-Oriented Architectures (Abstract)
Conceptual Framework for a Comprehensive Service Management Middleware (Abstract)
An Analysis of Web Services Mediation Architecture and Pattern in Synapse (Abstract)
An User-Driven Slight Ontology Framework Based on Meta-Ontology for Change Management (Abstract)
Author Index (PDF)