Application Protocol Design for Collaborative Learning

Author(s): Joung-Souk Sung
Volume: 2
Issue: 4
Year: 2009





Policy based Agents in Wireless Body Sensor Mesh Networks for Patient Health Monitoring

Author(s): Kevin Miller | Suresh Sankaranarayanan
Volume: 2
Issue: 4
Year: 2009





The Development of the Simulation Modeling System and Modeling Ability Evaluation

Author(s): Jeng-Fung Hung | Jen-Chin Lin
Volume: 2
Issue: 4
Year: 2009





Terrain Mapping and Classification in Outdoor Environments Using Neural Networks

Author(s): Alberto Yukinobu Hata | Denis Fernando Wolf | Gustavo Pessin | Fernando Osório
Volume: 2
Issue: 4
Year: 2009





The Development of Dynamic Brand Equity Chase Model and Its Application to Digital Industry Based on Scanner Data

Author(s): Nam Yongsik | Kwak Youngsik
Volume: 2
Issue: 4
Year: 2009





Using Low-Level Architectural Features for Configuration InfoSec in a General-Purpose Self-Configurable System

Author(s): Nicholas J. Macias | Peter M. Athanas
Volume: 2
Issue: 4
Year: 2009





E-Government: Shaping Marketing Decisions, Motives for Sponsoring E-Learning, Security and Development

Author(s): Sattarov Shavkat | Sattarova Feruza | Tadjibayev Furkhat
Volume: 2
Issue: 3
Year: 2009





Biometric Authentication: A Review

Author(s): Debnath Bhattacharyya | Rahul Ranjan | Farkhod Alisherov | Minkyu Choi
Volume: 2
Issue: 3
Year: 2009





Analysis and Diagnosis of Breast Cancer

Author(s): Poulami Das | Debnath Bhattacharyya | Samir K. Bandyopadhyay | Tai-hoon Kim
Volume: 2
Issue: 3
Year: 2009





Nanotechnology, Big things from a Tiny World: a Review

Author(s): Debnath Bhattacharyya | Shashank Singh | Niraj Satnalika | Ankesh Khandelwal | Seung-Hwan Jeon
Volume: 2
Issue: 3
Year: 2009





A Hierarchical Interface Design of a Puzzle Game for Elementary Education

Author(s): Eun-Young Park | Young-Ho Park
Volume: 3
Issue: 2
Year: 2010





Model Based Threat and Vulnerability Analysis of E-Governance Systems

Author(s): Shilpi Saha | Debnath Bhattacharyya | Tai-hoon Kim | Samir Kumar Bandyopadhyay
Volume: 3
Issue: 2
Year: 2010





An Analysis and Design of the Storage Management System Based on SMI 1.1.0

Author(s): YoonSik Kwak | Boneun Goo | Daesik Ko | Ilnoh Oh | JungYeon Hwang | Seungkook Cheong
Volume: 3
Issue: 2
Year: 2010





Application Service Program (ASP) Price Elasticities

Author(s): Hong Jaeweon | Cho Wanwoo | Jang Ho | Kwak Youngsik
Volume: 3
Issue: 2
Year: 2010





Mobile Manufacturer or Service provider? An Empirical Study on Consumers’ Adoption Intention

Author(s): Feng Hu | Xiaoyi Du | Yong Liu
Volume: 3
Issue: 2
Year: 2010





E-learning Materials Development: Applying and Implementing Software Reuse Principles and Granularity Levels in the Small

Author(s): Nabil Arman
Volume: 3
Issue: 2
Year: 2010





The Development of Software Pricing Schemata and Its Application to Software Industry in Korea

Author(s): Youngsik Kwak | Yunkyung Lee | Yoonsik Kwak
Volume: 3
Issue: 1
Year: 2010





Performing Workflows in Pervasive Environments Based on Context Specifications

Author(s): Xiping Liu | Jianxin Chen
Volume: 3
Issue: 1
Year: 2010





The Study of Location Strategy for Bank through the Analysis of Inter-regional Financial Transaction Network

Author(s): Hong Jae Weon | Hong Won Eui | Kwak Yoon Sik
Volume: 3
Issue: 1
Year: 2010





DCNL: Disclosure Control of Natural Language Information to Enable Secure and Enjoyable E-Communications

Author(s): Haruno Kataoka | Natsuki Watanabe | Keiko Mizutani | Hiroshi Yoshiura
Volume: 3
Issue: 1
Year: 2010





OpenTide China’s Pricing Decision-making Support System 2.0 for Digital Industry in China

Author(s): Yeisun Lee | Wonsang Youn | Jongwook Lim | Yongsik Nam | Youngsik Kwak2
Volume: 3
Issue: 1
Year: 2010




