Evaluation of a Learning Management System for Adaptivity Purposes (Abstract)
Preface (PDF)
Copyright (PDF)
Committees (PDF)
Mapping Techniques for an Ontology Network (Abstract)
An Architectural Model for Applications Based on Mobile Services (Abstract)
Adaptive Autonomous Agent Models for Open Distributed Systems (Abstract)
Main Features of the Web Programming Language OPScript (Abstract)
A Metric for Paraphrase Detection (Abstract)
On the Complexity of Decontaminating an Hexagonal Mesh Network (Abstract)
Optical CDMA; Optical Parallel Interference Cancellation Using the Lowest Threshold Value (Abstract)
Analysis of Broadband Diffusion in OECD Countries (Abstract)
On the Behavior of LMS Adaptive Algorithm in MMSE Receivers for DS-CDMA Systems (Abstract)
Mapping Techniques for an Ontology Network (Abstract)
Database Replication with Availability and Consistency Guarantees through Failure-Handling (Abstract)
Weakest Preconditions for Applied \pi-Calculus (Abstract)
A Hardware-Based Software Protection Systems--Analysis of Security Dongles with Memory (Abstract)
A Heuristic Map-Matching Algorithm by Using Vector-Based Recognition (Abstract)
A Pattern Language for Identity Management (Abstract)
Grid Enablement of Applications Using Application Dependency Graph (Abstract)
On the Complexity of Decontaminating an Hexagonal Mesh Network (Abstract)
Parallel Algebraic Approach of BCH Coding in VHDL (Abstract)
Adaptive Feature Learning for Information Pattern Recognition (Abstract)
Research and Implementation of Design Pattern-Oriented Model Transformation (Abstract)
Mining Negative and Positive Influence Rules Using Kullback-Leibler Divergence (Abstract)
Optical CDMA Serial Interference Cancellation: First Cancellation Stage (Abstract)
Weakest Preconditions for Applied \pi-Calculus (Abstract)
A Hardware-Based Software Protection Systems--Analysis of Security Dongles with Memory (Abstract)
New Malicious Agents and SK Virii (Abstract)
An Empirical Model for Quantifying Security Based on Services (Abstract)
Information Management for Dynamic Networks (Abstract)
Passive Worm Propagation Modeling and Analysis (Abstract)
Security Patterns for Voice over IP Networks (Abstract)
A Perceptron Based Classifier for Detecting Malicious Route Floods in Wireless Mesh Networks (Abstract)
Identity Information Management in the Network Environment (Abstract)
Is Current 6to4 Relay Deployment Adequate? (Abstract)
The Concept of Complex Events as Suitable Means for Biometric System Implementation (Abstract)
Self-Optimization of a DHT-Based Discovery Science (Abstract)
An Improved Fast Handover Algorithm Based on HMIPv6 (Abstract)
A Fully Distributed Mechanism for Locating Mobile Agents (Abstract)
A User-Centric Model for Supporting Web Services (Abstract)
Information Management for Dynamic Networks (Abstract)
Rapid Development of Enhanced Services Using Application Programming Interfaces (Abstract)
A Strategy-Based Model for E-Government Planning (Abstract)
On Stubborn Graph Sandwich Problems (Abstract)
Scoop: A Complete Methodology for Cooperative Systems Modeling and Analysis (Abstract)
Distributed Routing Algorithms in all Optical Multi-Rings Topology Networks (Abstract)
Is Current 6to4 Relay Deployment Adequate? (Abstract)
IPv6 Field Trial over Regular ADSL Access (Abstract)
Performance Evaluation of SIPv6 Transitioning (Abstract)
An Improved Fast Handover Algorithm Based on HMIPv6 (Abstract)
A Practical Evaluation of the Nautilus6 Operational Home Agent Service (Abstract)
Integrating Voice over IP Services in IPv4 and IPv6 Networks (Abstract)
Typical DoS/DDoS Threats under IPv6 (Abstract)
E-Bicycle Demonstration on the Tour De France (Abstract)
Monitoring the Neighbor Discovery Protocol (Abstract)
Author Index (PDF)