17. SAC 2002:
Madrid,
Spain
 Proceedings of the 2002 ACM Symposium on Applied Computing (SAC), March 10-14, 2002, Madrid, Spain.
 ACM 2002  
  
  
  
  
 @proceedings{DBLP:conf/sac/2002,
  title     = {Proceedings of the 2002 ACM Symposium on Applied Computing (SAC),
               March 10-14, 2002, Madrid, Spain},
  publisher = {ACM},
  year      = {2002},
  bibsource = {DBLP, http://dblp.uni-trier.de}
}
 
A.I. and computational logic
 
Agents,
interactions,
mobility and systems
 
- Henry Hexmoor, Justin Tyrel Vaughn:
 Computational adjustable autonomy for NASA Personal Satellite Assistants.
21-26
             
- Chang-Hyun Jo, Allen J. Arnold:
 The Agent-based Programming Language: APL.
27-31
             
- Lorenzo Bettini, Rocco De Nicola, Michele Loreti:
 Software update via mobile agent based programming.
32-36
             
- Jorge J. Gómez-Sanz, Juan Pavón, Francisco J. Garijo:
 Meta-models for building multi-agent systems.
37-41
             
- Bengt Carlsson, K. Ingemar Jönsson:
 Differences between the iterated prisoner's dilemma and the chicken game under noisy conditions.
42-48
             
- Susan Weissman Lauzac, Panos K. Chrysanthis:
 Personalizing information gathering for mobile database clients.
49-56
             
- Iadine Chades, Bruno Scherrer, François Charpillet:
 A heuristic approach for solving decentralized-POMDP: assessment on the pursuit problem.
57-62
             
- Jen-Hsiang Chen, Kuo-Ming Chao, Nick Godwin, Colin R. Reeves, Peter Smith:
 An automated negotiation mechanism based on co-evolution and game theory.
63-67
             
- Hoang Pham Huy, Simone Sédillot:
 Agent-based mobility add-in feature for Object Transaction Service (OTS).
68-75
             
- Hock Kim Tan, Luc Moreau:
 Certificates for mobile code security.
76-81
             
- Lucas C. Ferreira, Ricardo Dahab:
 Blinded-key signatures: securing private keys embedded in mobile agents.
82-86
             
- Abhishek Singh, Santosh Pande:
 Compiler optimizations for Java aglets in distributed data intensive applications.
87-92
             
- Luc Moreau:
 A fault-tolerant directory service for mobile agents based on forwarding pointers.
93-100
             
- Frances M. T. Brazier, Benno J. Overeinder, Maarten van Steen, Niek J. E. Wijngaards:
 Agent factory: generative migration of mobile agents in heterogeneous environments.
101-106
             
- Laurent Magnin, Viet Thang Pham, Arnaud Dury, Nicolas Besson, Arnaud Thiefaine:
 Our guest agents are welcome to your agent platforms.
107-114
             
- Walter Binder, Volker Roth:
 Secure mobile agent systems using Java: where are we heading?.
115-119
             
Applications of spatial simulation of discrete entities
 
- William Maniatty, Boleslaw K. Szymanski:
 Editorial message: special track on applications of spatial simulation of discrete entities.
120-121
             
- Christopher L. Barrett, Madhav V. Marathe, James P. Smith, S. S. Ravi:
 A mobility and traffic generation framework for modeling and simulating ad hoc communication networks.
122-126
             
- Jacki P. Goldman, William J. Gullick, Dennis Bray, Colin G. Johnson:
 Individual-based simulation of the clustering behaviour of epidermal growth factor receptors.
127-131
             
- G. Korniss, M. A. Novotny, A. K. Kolakowska, H. Guclu:
 Statistical properties of the simulated time horizon in conservative parallel discrete-event simulations.
132-137
             
- Stephen Eubank:
 Scalable, efficient epidemiological simulation.
139-145
             
Bioinformatics
 
- Warren T. Jones, Hasan M. Jamil:
 Bioinformatics track.
146
             
- Guoying Liu, Ann E. Loraine, Ron Shigeta, Melissa S. Cline, Jill Cheng, Stephen A. Chervi, David Kulp, Michael A. Siani-Rose:
 NetAffx: affymetrix probeset annotations.
147-150
             
- Rhonda Harrison, Charles DeLisi:
 A hypothesis driven approach to condition specific transcription factor binding site characterization in S.c..
151-158
             
- Mathew J. Palakal, Snehasis Mukhopadhyay, Javed Mostafa:
 An intelligent biological information management system.
159-163
             
- David Sankoff:
 Short inversions and conserved gene clusters.
164-167
             
- Deendayal Dinakarpandian, Vijay Kumar:
 BlOMIND-protein property prediction by property proximity profiles.
168-172
             
- Gianluca Della Vedova, Todd Wareham:
 Optimal algorithms for local vertex quartet cleaning.
173-177
             
Computational science
 
Computer security
 
- Giampaolo Bella, Ronaldo Menezes, James A. Whittaker:
 Editorial Message: special track on computer security.
194-195
             
- Shouhuai Xu, Ravi S. Sandhu:
 Authenticated multicast immune to denial-of-service attack.
196-200
             
- Christopher Krügel, Thomas Toth, Engin Kirda:
 Service specific anomaly detection for network intrusion detection.
201-208
             
- Alexandr Seleznyov, Oleksiy Mazhelis:
 Learning temporal patterns for anomaly intrusion detection.
209-213
             
- Chenghuai Lu, André L. M. dos Santos, Francisco R. Pimentel:
 Implementation of fast RSA key generation on smart cards.
214-220
             
- Abhishek Singh, André L. M. dos Santos:
 Grammar based off line generation of disposable credit card numbers.
221-228
             
- Roberto Barbuti, Cinzia Bernardeschi, Nicoletta De Francesco:
 Checking security of Java bytecode by abstract interpretation.
229-236
             
- Larry A. Dunning, Sub Ramakrishnan:
 Security status display and browser interframe communication.
237-241
             
- James A. Whittaker, Andres De Vivanco:
 Neutralizing windows-based malicious mobile code.
242-246
             
- Giampaolo Bella:
 Interactive simulation of security policies.
247-252
             
- Jan Steffan, Markus Schumacher:
 Collaborative attack modeling.
253-259
             
- Herbert H. Thompson, James A. Whittaker, Florence E. Mottay:
 Software security vulnerability testing in hostile environments.
260-264
             
- Matt Burnside, Dwaine E. Clarke, Todd Mills, Andrew Maywah, Srinivas Devadas, Ronald L. Rivest:
 Proxy-based security protocols in networked mobile devices.
265-272
             
- Arslan Brömme, Marcel Kronberg, Oliver Ellenbeck, Oliver Kasch:
 A conceptual framework for testing biometric algorithms within operating systems' authentication.
273-280
             
- Michele Boreale, Maria Grazia Buscemi:
 Experimenting with STA, a tool for automatic analysis of security protocols.
281-285
             
Coordination models,
languages and applications
 
- Andrea Omicini, Sascha Ossowski:
 Editorial message: special track on coordination models, languages and applications.
286-287
             
- Sherief Abdallah, Nevin M. Darwish, Osman Hegazy:
 Monitoring and synchronization for teamwork in GPGP.
288-293
             
- Paul Davidsson, Fredrik Wernstedt:
 A multi-agent system architecture for coordination of just-in-time production and distribution.
294-299
             
- Elth Ogston, Stamatis Vassiliadis:
 Unstructured agent matchmaking: experiments in timing and fuzzy matching.
300-305
             
- Anthony Karageorgos, Simon G. Thompson, Nikolay Mehandjiev:
 Semi-automatic design of agent organisations.
306-313
             
- Neal Sample, Dorothea Beringer, Gio Wiederhold:
 A comprehensive model for arbitrary result extraction.
314-321
             
- Guangxin Yang:
 A uniform meta-model for modeling integrated cooperation.
322-328
             
- Jinlei Jiang, Guangxin Yang, Yan Wu, Meilin Shi:
 CovaTM: a transaction model for cooperative applications.
329-335
             
- Paolo Ciancarini, Robert Tolksdorf, Franco Zambonelli:
 Coordination middleware for XML-centric applications.
336-343
             
- Philipp Obreiter, Guntram Gräf:
 Towards scalability in tuple spaces.
344-350
             
- Jozef Hooman, Jaco van de Pol:
 Formal verification of replication on a distributed data space architecture.
351-358
             
- Nadia Busi, Gianluigi Zavattaro:
 On the serializability of transactions in shared dataspaces with temporary data.
359-366
             
- Federico Bergenti, Alessandro Ricci:
 Three approaches to the coordination of multiagent systems.
367-372
             
- Lorenzo Bettini, Michele Loreti, Rosario Pugliese:
 An infrastructure language for open nets.
373-377
             
- José Antonio Pérez, Rafael Corchuelo, David Ruiz, Miguel Toro:
 An enablement detection algorithm for open multiparty interactions.
378-384
             
- Ludger Fiege, Gero Mühl, Felix C. Gärtner:
 A modular approach to build structured event-based systems.
385-392
             
- F. H. Carvalho, Ricardo Massa Ferreira Lima, Rafael Dueire Lins:
 Coordinating functional processes with Haskell#.
393-400
             
Database and digital library technologies
 
- Ramzi A. Haraty, Mohammad Zubair:
 Database and digital library technologies: track chairs message.
401
             
- Kjetil Nørvåg:
 Temporal query operators in XML databases.
402-406
             
- Albrecht Schmidt, Martin L. Kersten:
 Bulkloading and maintaining XML documents.
407-412
             
- Qiang Ding, Qin Ding, William Perrizo:
 Decision tree classification of spatial data streams using Peano Count Trees.
413-417
             
- Jon Olav Hauglid, Roger Midtstraum:
 SESAM: searching supported by analysis of metadata.
418-425
             
- Qin Ding, Maleq Khan, Amalendu Roy, William Perrizo:
 The P-tree algebra.
426-431
             
- Fernando Ferri, Elaheh Pourabbas, Maurizio Rafanelli:
 The syntactic and semantic correctness of pictorial configurations to query geographic databases by PQL.
432-437
             
- Sang-Wook Kim, Jeehee Yoon, Sanghyun Park, Tae-Hoon Kim:
 Shape-based retrieval of similar subsequences in time-series databases.
438-445
             
- Brajendra Panda, Kazi Asharful Haque:
 Extended data dependency approach: a robust way of rebuilding database.
446-452
             
- Maria Cláudia Cavalcanti, Marta Mattoso, Maria Luiza Machado Campos, François Llirbat, Eric Simon:
 Sharing scientific models in environmental applications.
453-457
             
- Ramzi A. Haraty, Mazen Hamdoun:
 Iterative querying in web-based database applications.
458-462
             
- Laura C. Rivero, Jorge Horacio Doorn, Viviana E. Ferraggine:
 Elicitation and conversion of hidden objects and restrictions in a database schema.
463-469
             
- Zaher Aghbari, Kunihiko Kaneko, Akifumi Makinouchi:
 Topological mapping: a dimensionality reduction method for efficient video search.
470-475
             
- M. Mercedes Martínez, Jean-Claude Derniame, Pablo de la Fuente:
 A method for the dynamic generation of virtual versions of evolving documents.
476-482
             
- Jeffrey T. Clark, Brian M. Slator, Aaron Bergstrom, Francis Larson, Richard Frovarp, James E. Landrum, William Perrizo, William Jockheck:
 DANA (Digital Archive Network for Anthropology): a model for digital archiving.
483-487
             
- Cláudio de Souza Baptista:
 A geolibrary for multimedia data sets: design and implementation issues.
488-492
             
- Kurt Maly, Mohammad Zubair, S. Balusani, A. Mathur, S. Sudeep, W. Wolters:
 DL-COTF: an XML based digital library for U. S. Navy's operational test and evaluation force.
493-497
             
Declarative data mining
 
Electronics books for technical learning
 
Evolutionary computing and optimization
 
- Roger L. Wainwright, Günther R. Raidl:
 Evolutionary computation and optimization track: SAC 2002.
541
             
- Sergiy Butenko, Panos M. Pardalos, Ivan Sergienko, Vladimir Shylo, Petro Stetsyuk:
 Finding maximum independent sets in graphs arising from coding theory.
542-546
             
- Bryant A. Julstrom, Günther R. Raidl:
 Initialization is robust in evolutionary algorithms that encode spanning trees as sets of edges.
547-552
             
- Brad Dolin, Forrest H. Bennett III, Eleanor G. Rieffel:
 Co-evolving an effective fitness sample: experiments in symbolic regression and distributed robot control.
553-559
             
- Haibing Li, Andrew Lim:
 Local search with annealing-like restarts to solve the vehicle routing problem with time windows.
560-565
             
- George Nyauma Nyakoe, Makoto Ohki, Suichiro Tabuchi:
 Acquisition of modulation pulses for a multi-robot system using genetic algorithm.
568-573
             
- Steve Hurley, Roger M. Whitaker:
 An agent based approach to site selection for wireless networks.
574-577
             
- Nelishia Pillay:
 Using genetic programming for the induction of novice procedural programming solution algorithms.
578-583
             
- Atila Neves, Osvaldo Brasão, Agostinho C. Rosa:
 Learning the risk board game with classifier systems.
585-589
             
- Jacinto Mata Vázquez, José Luis Álvarez Macías, José Cristóbal Riquelme Santos:
 An evolutionary algorithm to discover numeric association rules.
590-594
             
- David A. van Veldhuizen, Jesse B. Zydallis, Gary B. Lamont:
 Issues in parallelizing multiobjective evolutionary algorithms for real world applications.
595-602
             
- Konstantinos E. Parsopoulos, Michael N. Vrahatis:
 Particle swarm optimization method in multiobjective problems.
603-607
             
- Fulvio Corno, Matteo Sonza Reorda, Giovanni Squillero:
 An evolutionary algorithm for reducing integrated-circuit test application time.
608-612
             
Information access and retrieval
 
- Fabio Crestani, Gabriella Pasi:
 Editorial message: special track on information access and retrieval systems.
613-614
             
- José María Gómez Hidalgo:
 Evaluating cost-sensitive Unsolicited Bulk Email categorization.
615-620
             
- Andreas Becks, Christian Seeling, Ralf Minkenberg:
 Benefits of document maps for text access in knowledge management: a comparative study.
621-626
             
- David L. Chan, Robert W. P. Luk, W. K. Mak, Hong Va Leong, Edward Kei Shiu Ho, Qin Lu:
 Multiple related document summary and navigation using concept hierarchies for mobile clients.
627-632
             
- Simon O. Sweeney, Fabio Crestani, Anastasios Tombros:
 Mobile delivery of news using hierarchical query-biased summaries.
634-639
             
- Mohand Boughanem, Mohamed Tmar:
 Incremental adaptive filtering: profile learning and threshold calibration.
640-644
             
- Hideo Joho, Claire Coverson, Mark Sanderson, Micheline Hancock-Beaulieu:
 Hierarchical presentation of expansion terms.
645-649
             
- Peter J. Brown, Gareth J. F. Jones:
 Exploiting contextual change in context-aware retrieval.
650-656
             
- Holger Billhardt, Daniel Borrajo, Victor Maojo:
 Using genetic algorithms to find suboptimal retrieval expert combinations.
657-662
             
- Evangelos Kotsakis:
 Structured information retrieval in XML documents.
663-667
             
- Seung-Kyu Ko, Yoon-Chul Choy:
 A structured documents retrieval method supporting attribute-based structure information.
668-674
             
- Gloria Bordogna, Gabriella Pasi:
 Flexible querying of WEB documents.
675-680
             
- Satoshi Watanabe, Takao Miura:
 Reordering B-tree files.
681-686
             
- Mario A. Nascimento, Vishal Chitkara:
 Color-based image retrieval using binary signatures.
687-692
             
- Daniela Stan, Ishwar K. Sethi:
 Color patterns for pictorial content description.
693-698
             
- Patrick Ruch:
 Information retrieval and spelling correction: an inquiry into lexical disambiguation.
699-703
             
Inter disciplinary approaches to the design of dependable computer systems
 
- John E. Dobson, Cliff B. Jones, Rob Procter, Mark Rouncefield, Robin Williams:
 Editorial message: special track on inter-disciplinary approaches to the design of dependable computer systems.
704-705
             
- Massimo Felici, Juliana Küster Filipe:
 Limits in modelling evolving computer-based systems.
706-710
             
- Mark-Alexander Sujan, Antonio Rizzo, Alberto Pasquini:
 Contradictions and critical issues during system evolution.
711-715
             
- Corin A. Gurr, Gillian Hardstone:
 Modelling organisational practice in user requirements.
716-720
             
- Neil Pollock, James Cornford:
 Fitting standard software to non-standard organisations.
721-725
             
- Luciana D'Adderio:
 Configuring software, reconfiguring memories: the influence of integrated systems on knowledge storage, retrieval and reuse.
726-731
             
- Denis Besnard, Anthony T. Lawrie:
 Lessons from industrial design for software engineering through constraints identification, solution space optimisation and reuse.
732-738
             
- Shamus P. Smith, Michael D. Harrison:
 Augmenting descriptive scenario analysis for improvements in human reliability design.
739-743
             
- Salem Aljareh, B. Nick Rossiter:
 A task-based security model to facilitate collaboration in trusted multi-agency networks.
744-749
             
Multimedia and visualization
 
- Chung-Ming Huang, Tz-Heng Hsu, Chi-Kuang Chang:
 A proxy-based adaptive flow control scheme for media streaming.
750-754
             
- Sooyong Kang, Heon Young Yeom:
 Smoothed fetching: bridging the data layout and transmission schemes in multimedia servers.
755-760
             
- Alfred Yu, Wael M. Badawy:
 A mesh update requirement for hierarchical adaptive meshes in mesh-based motion tracking.
761-765
             
- Yongjian Fu, Jui-Che Teng, S. R. Subramanya:
 Node splitting algorithms in tree-structured high-dimensional indexes for similarity search.
766-770
             
- Fernando Naharro-Berrocal, Cristóbal Pareja-Flores, Jaime Urquiza-Fuentes, J. Ángel Velázquez-Iturbide:
 Approaches to comprehension-preserving graphical reduction of program visualizations.
771-777
             
- Jess Y. S. Mak, Hong Va Leong, Alvin T. S. Chan:
 Dynamic structuring of web information for access visualization.
778-784
             
- Andrzej Trembilski, Andreas Broßler:
 Transparency for polygon based cloud rendering.
785-790
             
- José Martinez, Erwan Loisant:
 Browsing image databases with Galois' lattices.
791-795
             
- Mingjun Zhang, Chaman L. Sabharwal:
 An efficient implementation of parametric line and polygon clipping algorithm.
796-800
             
Neuro-fuzzy applications
 
Parallel and distributed systems and networking
 
- I. Garcés, Daniel Franco:
 Analysis of Distributed Routing Balancing behavior.
817-824
             
- Alireza Shahrabi, Mohamed Ould-Khaoua, Lewis M. Mackenzie:
 Communication delay in wormhole-routed torus networks.
825-829
             
- Jehad Al-Sadi, Khaled Day, Mohamed Ould-Khaoua:
 Probability vectors: a new fault-tolerant routing algorithm for k-ary n-cubes.
830-834
             
- Hamid Sarbazi-Azad, Mohamed Ould-Khaoua:
 A simple mathematical model of adaptive routing in wormhole k-ary n-cubes.
835-839
             
- Ahmed Yassin Al-Dubai, Mohamed Ould-Khaoua, Lewis M. Mackenzie:
 Towards a scalable broadcast in wormhole-switched mesh networks.
840-844
             
- Hiroshi Fujimoto, Tadashi Nakano, Kaname Harumoto, Shojiro Nishio:
 Response order rearrangement on a caching proxy for reducing WWW latency.
845-851
             
- Wooi-Ghee Wang, Takahiro Hara, Masahiko Tsukamoto, Shojiro Nishio:
 AODV compatible routing with extensive use of cache information in ad-hoc networks.
852-859
             
- Jung-Sheng Fu, Gen-Huey Chen:
 Cycle embedding in faulty hierarchical cubic networks.
860-864
             
- Chun-Hsi Huang:
 Grid-enabled parallel divide-and-conquer: theory and practice.
865-869
             
- Eder N. Mathias, Celso M. da Costa, Fernando Luís Dotti, Felipe Martins Müller:
 DEVOpT: a distributed architecture supporting heuristic and metaheuristic optimization methods.
870-875
             
- Georgios I. Goumas, Maria Athanasaki, Nectarios Koziris:
 Automatic code generation for executing tiled nested loops onto parallel architectures.
876-881
             
- Heinz Stockinger, Andrew Hanushevsky:
 HTTP redirection for replica catalogue lookups in data grids.
882-889
             
- Brian F. Cooper, Neal Sample, Moshe Shadmon:
 A parallel index for semistructured data.
890-896
             
- Franck Morvan, Abdelkader Hameurlain:
 Dynamic memory allocation strategies for parallel query execution.
897-901
             
- Dirk Thißen:
 Load balancing for the management of service performance in open service markets: a customer-oriented approach.
902-906
             
- Juan Touriño, Jacobo Barro, Ramon Doallo, Víctor M. Gulías:
 Performance analysis of MPI-I/O primitives on a PC cluster.
907-912
             
- Sunghyun Jee, Kannappan Palaniappan:
 Performance evaluation for a compressed-VLIW processor.
913-917
             
- B. Anthony Kadrovach, Gary B. Lamont:
 A particle swarm model for swarm-based networked sensor systems.
918-924
             
Programming languages and object technologies
 
- Chang-Hyun Jo, Rajeev R. Raje:
 Editorial message: special track on the programming languages and object technologies.
925-926
             
- Robert Tolksdorf, Kai Knubben:
 Programming distributed systems with the delegation-based object-oriented language dSelf.
927-931
             
- Beum-Seuk Lee, Barrett R. Bryant:
 Automated conversion from requirements documentation to an object-oriented formal specification language.
932-936
             
- Ian Nunn, Dwight Deugo:
 Automated assembly of software components based on XML-coded instructions.
937-942
             
- Enis Avdicausevic, Marjan Mernik, Mitja Lenic, Viljem Zumer:
 Experimental aspect-oriented language - AspectCOOL.
943-947
             
- Claudia Leopold:
On optimal temporal locality of stencil codes.
948-952           
- Kameswari V. Garigipati, Cindy Norris:
 Evaluating the use of profiling by a region-based register allocator.
953-957
             
- João Coelho Garcia, Paulo Ferreira:
 Concurrency control for distributed cooperative engineering applications.
958-963
             
- Nael B. Abu-Ghazaleh, Dhananjay S. Phatak:
 Verification caching: towards efficient and secure mobile code execution environments.
964-968
             
Software engineering:
theory,
application and practice
 
- David C. Rine, James F. Power, J. Paul Gibson:
 ACM SAC2002 software engineering: theory and applications (SETA) track description.
969-970
             
- Hisham Haddad, Herbert Tesser:
 Reusable subsystems: domain-based approach.
971-975
             
- Paul Young, Valdis Berzins, Jun Ge, Luqi:
 Using an object oriented model for resolving representational differences between heterogeneous systems.
976-983
             
- Assem El-Ansary:
 Behavioral Pattern Analysis: towards a new representation of systems requirements based on actions and events.
984-991
             
- Mahmoud O. Elish, David C. Rine, Joel E. Foreman:
 Evaluating collaborative software in supporting organizational learning with Bayesian Networks.
992-996
             
- Fatma Dandashi:
 A method for assessing the reusability of object-oriented code using a validated set of automated measurements.
997-1003
             
- Seok Won Lee:
 Proxy Viewpoints Model-based Requirements engineering.
1004-1008
             
- Jan Jürjens:
 A UML statecharts semantics with message-passing.
1009-1013
             
- Sergiu Dascalu, Peter Hitchcock:
 An approach to integrating semi-formal and formal notations in software specification.
1014-1020
             
- María-del-Mar Gallardo, Jesús Martínez, Pedro Merino, Estefanía Rosales:
 Using XML to implement abstraction for Model Checking.
1021-1025
             
- Jan Jürjens:
 Using UMLsec and goal trees for secure systems development.
1026-1030
             
- Derek Lawson, Gerry Coleman:
 Investigating software measures to improve product reliability.
1031-1035
             
- Rory O'Connor, Gerry Coleman:
 Strategies for personal process improvement a comparison.
1036-1040
             
Standardization in IT
 
Virtual reality,
digital media,
and computer games
 
- Daniel Ballin, Ruth Aylett, Marc Cavazza:
 Editorial message: special track on virtual reality, digital media, and computer games.
1058-1059
             
- Taku Komura, Atsushi Kuroda, Yoshihisa Shinagawa:
 NiceMeetVR: facing professional baseball pitchers in the virtual batting cage.
1060-1065
             
- Marco Roccetti, Vittorio Ghini, Paola Salomoni, Alessandro Gambetti, Davide Melandri, Mirko Piaggesi, Daniela Salsi:
 The structuring of a wireless internet application for a music-on-demand service on UMST devices.
1066-1073
             
- Kikuo Asai, Noritaka Osawa, Yuji Y. Sugimoto, Yoshiaki Tanaka:
 Viewpoint motion control by body position in immersive projection display.
1074-1079
             
- Marc Cavazza, Fred Charles, Steven J. Mead:
 Emergent situations in interactive storytelling.
1080-1085
             
Web and e-business application
 
- Sara Comai, Letizia Tanca:
 Editorial message: special track on web and E-business applications.
1086-1087
             
- Sabrina De Capitani di Vimercati:
 An authorization model for temporal XML documents.
1088-1093
             
- Petri Vuorimaa, Teemu Ropponen, Niklas von Knorring, Mikko Honkala:
 A Java based XML browser for consumer devices.
1094-1099
             
- Ljiljana Stojanovic, Nenad Stojanovic, Raphael Volz:
 Migrating data-intensive web sites into the Semantic Web.
1100-1107
             
- Valter Crescenzi, Giansalvatore Mecca, Paolo Merialdo:
 Wrapping-oriented classification of web pages.
1108-1112
             
- Uwe Zdun:
 Dynamically generating web application fragments from page templates.
1113-1120
             
- Volker Turau:
 A framework for automatic generation of web-based data entry applications based on XML.
1121-1126
             
- Danilo Ardagna, Chiara Francalanci:
 A cost-oriented methodology for the design of web based IT architectures.
1127-1133
             
- Mon-Yen Luo, Chu-Sing Yang, Chun-Wei Tseng:
 Content management on server farm with layer-7 routing.
1134-1139
             
- Tadashi Nakano, Kaname Harumoto, Shinji Shimojo, Shojiro Nishio:
 User adaptive content delivery mechanism on the world wide web.
1140-1146
             
- Min Wang, Xiaoyang Sean Wang:
 Optimizing relational store for e-catalog queries: a data mining approach.
1147-1152
             
- Shonali Krishnaswamy, Seng Wai Loke, Arkady B. Zaslavsky:
 Application run time estimation: a quality of service metric for web-based data mining services.
1153-1159
             
- Victoria Ungureanu:
 An agreement centric access control mechanism for business to business e-commerce.
1160-1164
             
Copyright © Fri Mar 12 17:20:36 2010
 by Michael Ley (ley@uni-trier.de)