callback( { "result":{ "query":":facetid:toc:\"db/conf/apscc/apscc2008.bht\"", "status":{ "@code":"200", "text":"OK" }, "time":{ "@unit":"msecs", "text":"219.53" }, "completions":{ "@total":"1", "@computed":"1", "@sent":"1", "c":{ "@sc":"275", "@dc":"275", "@oc":"275", "@id":"43275882", "text":":facetid:toc:db/conf/apscc/apscc2008.bht" } }, "hits":{ "@total":"275", "@computed":"275", "@sent":"275", "@first":"0", "hit":[{ "@score":"1", "@id":"5297415", "info":{"authors":{"author":{"@pid":"44/300","text":"Jemal H. Abawajy"}},"title":"An Online Credential Management Service for InterGrid Computing.","venue":"APSCC","pages":"101-106","year":"2008","type":"Conference and Workshop Papers","access":"closed","key":"conf/apscc/Abawajy08","doi":"10.1109/APSCC.2008.74","ee":"https://doi.org/10.1109/APSCC.2008.74","url":"https://dblp.org/rec/conf/apscc/Abawajy08"}, "url":"URL#5297415" }, { "@score":"1", "@id":"5297416", "info":{"authors":{"author":[{"@pid":"82/1606","text":"Heithem Abbes"},{"@pid":"09/1219","text":"Christophe Cérin"},{"@pid":"80/4954","text":"Mohamed Jemni"}]},"title":"BonjourGrid as a Decentralised Job Scheduler.","venue":"APSCC","pages":"89-94","year":"2008","type":"Conference and Workshop Papers","access":"closed","key":"conf/apscc/AbbesCJ08","doi":"10.1109/APSCC.2008.199","ee":"https://doi.org/10.1109/APSCC.2008.199","url":"https://dblp.org/rec/conf/apscc/AbbesCJ08"}, "url":"URL#5297416" }, { "@score":"1", "@id":"5297417", "info":{"authors":{"author":[{"@pid":"82/1606","text":"Heithem Abbes"},{"@pid":"45/685","text":"Roberto Barbera"},{"@pid":"80/4954","text":"Mohamed Jemni"},{"@pid":"37/7828","text":"Sadok Mazigh"}]},"title":"Towards the Interoperability between GTRS and EUMEDGRID.","venue":"APSCC","pages":"674-679","year":"2008","type":"Conference and Workshop Papers","access":"closed","key":"conf/apscc/AbessBJM08","doi":"10.1109/APSCC.2008.202","ee":"https://doi.org/10.1109/APSCC.2008.202","url":"https://dblp.org/rec/conf/apscc/AbessBJM08"}, "url":"URL#5297417" }, { "@score":"1", "@id":"5297418", "info":{"authors":{"author":[{"@pid":"58/4822","text":"Sahar Adabi"},{"@pid":"85/5516","text":"Sam Jabbehdari"},{"@pid":"29/7828","text":"Ali Rezaee"},{"@pid":"28/2374","text":"Sepideh Adabi"}]},"title":"Distributed Fuzzy Score-Based Clustering Algorithm for Mobile Ad Hoc Networks.","venue":"APSCC","pages":"193-198","year":"2008","type":"Conference and Workshop Papers","access":"closed","key":"conf/apscc/AdabiJRA08","doi":"10.1109/APSCC.2008.245","ee":"https://doi.org/10.1109/APSCC.2008.245","url":"https://dblp.org/rec/conf/apscc/AdabiJRA08"}, "url":"URL#5297418" }, { "@score":"1", "@id":"5297419", "info":{"authors":{"author":[{"@pid":"15/2608","text":"Nishat Ahmad"},{"@pid":"34/7828","text":"Youngan An"},{"@pid":"41/376","text":"Jong-An Park"}]},"title":"Content Based Image Retrieval Using Localized Line Segment Groupings.","venue":"APSCC","pages":"1352-1357","year":"2008","type":"Conference and Workshop Papers","access":"closed","key":"conf/apscc/AhmadAP08","doi":"10.1109/APSCC.2008.88","ee":"https://doi.org/10.1109/APSCC.2008.88","url":"https://dblp.org/rec/conf/apscc/AhmadAP08"}, "url":"URL#5297419" }, { "@score":"1", "@id":"5297420", "info":{"authors":{"author":{"@pid":"51/4448","text":"Sabah S. Al-Fedaghi"}},"title":"On Information Lifecycle Management.","venue":"APSCC","pages":"335-342","year":"2008","type":"Conference and Workshop Papers","access":"closed","key":"conf/apscc/Al-Fedaghi08","doi":"10.1109/APSCC.2008.81","ee":"https://doi.org/10.1109/APSCC.2008.81","url":"https://dblp.org/rec/conf/apscc/Al-Fedaghi08"}, "url":"URL#5297420" }, { "@score":"1", "@id":"5297421", "info":{"authors":{"author":[{"@pid":"61/6050","text":"Marcelo Keese Albertini"},{"@pid":"l/KuanChingLi","text":"Kuan-Ching Li"},{"@pid":"81/6146","text":"Rodrigo Fernandes de Mello"}]},"title":"A Novel Approach to Quantify Novelty Levels Applied on Ubiquitous Music Distribution.","venue":"APSCC","pages":"150-155","year":"2008","type":"Conference and Workshop Papers","access":"closed","key":"conf/apscc/AlbertiniLM08","doi":"10.1109/APSCC.2008.238","ee":"https://doi.org/10.1109/APSCC.2008.238","url":"https://dblp.org/rec/conf/apscc/AlbertiniLM08"}, "url":"URL#5297421" }, { "@score":"1", "@id":"5297422", "info":{"authors":{"author":[{"@pid":"07/7828","text":"Zobeideh Aliannezhadi"},{"@pid":"68/79","text":"Mohammad Abdollahi Azgomi"}]},"title":"Modeling and Analysis of a Web Service Firewall Using Coloured Petri Nets.","venue":"APSCC","pages":"548-553","year":"2008","type":"Conference and Workshop Papers","access":"closed","key":"conf/apscc/AliannezhadiA08","doi":"10.1109/APSCC.2008.203","ee":"https://doi.org/10.1109/APSCC.2008.203","url":"https://dblp.org/rec/conf/apscc/AliannezhadiA08"}, "url":"URL#5297422" }, { "@score":"1", "@id":"5297423", "info":{"authors":{"author":[{"@pid":"76/6802","text":"Lamine M. Aouad"},{"@pid":"37/6424","text":"Nhien-An Le-Khac"},{"@pid":"43/3991","text":"M. Tahar Kechadi"}]},"title":"Persistent Workflow on the Grid.","venue":"APSCC","pages":"8-14","year":"2008","type":"Conference and Workshop Papers","access":"closed","key":"conf/apscc/AouadLK08","doi":"10.1109/APSCC.2008.181","ee":"https://doi.org/10.1109/APSCC.2008.181","url":"https://dblp.org/rec/conf/apscc/AouadLK08"}, "url":"URL#5297423" }, { "@score":"1", "@id":"5297424", "info":{"authors":{"author":[{"@pid":"71/1535","text":"Lin Bai"},{"@pid":"68/6546","text":"Jun Wei"}]},"title":"A Flexible Transformation Scheme between the 'OR' of BPMN and 'Link' of BPEL.","venue":"APSCC","pages":"1300-1307","year":"2008","type":"Conference and Workshop Papers","access":"closed","key":"conf/apscc/BaiW08","doi":"10.1109/APSCC.2008.147","ee":"https://doi.org/10.1109/APSCC.2008.147","url":"https://dblp.org/rec/conf/apscc/BaiW08"}, "url":"URL#5297424" }, { "@score":"1", "@id":"5297425", "info":{"authors":{"author":[{"@pid":"93/7011","text":"Hadi Bannazadeh"},{"@pid":"58/4358","text":"Alberto Leon-Garcia"}]},"title":"Online Optimization in Application Admission Control for Service Oriented Systems.","venue":"APSCC","pages":"482-487","year":"2008","type":"Conference and Workshop Papers","access":"closed","key":"conf/apscc/BannazadehL08","doi":"10.1109/APSCC.2008.163","ee":"https://doi.org/10.1109/APSCC.2008.163","url":"https://dblp.org/rec/conf/apscc/BannazadehL08"}, "url":"URL#5297425" }, { "@score":"1", "@id":"5297426", "info":{"authors":{"author":[{"@pid":"25/7495","text":"Ashutosh Bhatia"},{"@pid":"07/7827","text":"Shubhranshu Singh"}]},"title":"A Distributed Prefix Allocation Scheme for Subordinate MANET.","venue":"APSCC","pages":"920-925","year":"2008","type":"Conference and Workshop Papers","access":"closed","key":"conf/apscc/BhatiaS08","doi":"10.1109/APSCC.2008.261","ee":"https://doi.org/10.1109/APSCC.2008.261","url":"https://dblp.org/rec/conf/apscc/BhatiaS08"}, "url":"URL#5297426" }, { "@score":"1", "@id":"5297427", "info":{"authors":{"author":[{"@pid":"47/6945","text":"A. K. Bhattacharjee"},{"@pid":"s/RKShyamasundar","text":"R. K. Shyamasundar"}]},"title":"ScriptOrc: A Specification Language for Web Service Choreography.","venue":"APSCC","pages":"1089-1096","year":"2008","type":"Conference and Workshop Papers","access":"closed","key":"conf/apscc/BhattacharjeeS08","doi":"10.1109/APSCC.2008.249","ee":"https://doi.org/10.1109/APSCC.2008.249","url":"https://dblp.org/rec/conf/apscc/BhattacharjeeS08"}, "url":"URL#5297427" }, { "@score":"1", "@id":"5297428", "info":{"authors":{"author":[{"@pid":"50/2666","text":"Daniel Câmara"},{"@pid":"59/2108","text":"Nikolaos Frangiadakis"},{"@pid":"20/4747","text":"Fethi Filali"},{"@pid":"l/AntonioAlfredoFerreiraLoureiro","text":"Antonio Alfredo Ferreira Loureiro"},{"@pid":"r/NickRoussopoulos","text":"Nick Roussopoulos"}]},"title":"Virtual Access Points for Stream Based Traffic Dissemination.","venue":"APSCC","pages":"1628-1632","year":"2008","type":"Conference and Workshop Papers","access":"closed","key":"conf/apscc/CamaraFFLR08","doi":"10.1109/APSCC.2008.34","ee":"https://doi.org/10.1109/APSCC.2008.34","url":"https://dblp.org/rec/conf/apscc/CamaraFFLR08"}, "url":"URL#5297428" }, { "@score":"1", "@id":"5297429", "info":{"authors":{"author":[{"@pid":"77/2309","text":"Jijun Cao"},{"@pid":"15/2098","text":"Jinshu Su"},{"@pid":"64/4714","text":"Chunqing Wu"}]},"title":"Modeling and Analyzing the Instantaneous Stability for Application Layer Multicast.","venue":"APSCC","pages":"217-224","year":"2008","type":"Conference and Workshop Papers","access":"closed","key":"conf/apscc/CaoSW08","doi":"10.1109/APSCC.2008.22","ee":"https://doi.org/10.1109/APSCC.2008.22","url":"https://dblp.org/rec/conf/apscc/CaoSW08"}, "url":"URL#5297429" }, { "@score":"1", "@id":"5297430", "info":{"authors":{"author":[{"@pid":"95/7826","text":"Charles C. Castello"},{"@pid":"51/1268","text":"Jeffrey Fan"},{"@pid":"40/6840","text":"Te-Shun Chou"},{"@pid":"45/7827","text":"Hong-Ming Kuo"}]},"title":"Integration and Implementation of Secured IP Based Surveillance Networks.","venue":"APSCC","pages":"117-122","year":"2008","type":"Conference and Workshop Papers","access":"closed","key":"conf/apscc/CastelloFCK08","doi":"10.1109/APSCC.2008.39","ee":"https://doi.org/10.1109/APSCC.2008.39","url":"https://dblp.org/rec/conf/apscc/CastelloFCK08"}, "url":"URL#5297430" }, { "@score":"1", "@id":"5297431", "info":{"authors":{"author":[{"@pid":"74/109","text":"Ben-Jye Chang"},{"@pid":"41/7827","text":"Szu-Liang Kuo"},{"@pid":"50/3292","text":"Ying-Hsin Liang"},{"@pid":"19/7828","text":"De-Yu Wang"}]},"title":"Markov Chain-Based Trust Model for Analyzing Trust Value in Distributed Multicasting Mobile Ad Hoc Networks.","venue":"APSCC","pages":"156-161","year":"2008","type":"Conference and Workshop Papers","access":"closed","key":"conf/apscc/ChangKLW08","doi":"10.1109/APSCC.2008.27","ee":"https://doi.org/10.1109/APSCC.2008.27","url":"https://dblp.org/rec/conf/apscc/ChangKLW08"}, "url":"URL#5297431" }, { "@score":"1", "@id":"5297432", "info":{"authors":{"author":[{"@pid":"12/7827","text":"Chien-Yen Chang"},{"@pid":"72/7827","text":"Chai-Chun Li"}]},"title":"Visual and Operational Impacts of Variable Speed Limit Signs on Bus Drivers on Freeways Using Driving Simulator.","venue":"APSCC","pages":"1453-1458","year":"2008","type":"Conference and Workshop Papers","access":"closed","key":"conf/apscc/ChangL08","doi":"10.1109/APSCC.2008.32","ee":"https://doi.org/10.1109/APSCC.2008.32","url":"https://dblp.org/rec/conf/apscc/ChangL08"}, "url":"URL#5297432" }, { "@score":"1", "@id":"5297433", "info":{"authors":{"author":[{"@pid":"76/3651","text":"Yue-Shan Chang"},{"@pid":"25/7783","text":"Yu-Cheng Luo"},{"@pid":"22/7605","text":"Pei-Chun Shih"}]},"title":"AIR: Agent and Ontology-Based Information Retrieval Architecture for Mobile Grid.","venue":"APSCC","pages":"650-655","year":"2008","type":"Conference and Workshop Papers","access":"closed","key":"conf/apscc/ChangLS08","doi":"10.1109/APSCC.2008.155","ee":"https://doi.org/10.1109/APSCC.2008.155","url":"https://dblp.org/rec/conf/apscc/ChangLS08"}, "url":"URL#5297433" }, { "@score":"1", "@id":"5297434", "info":{"authors":{"author":[{"@pid":"68/1344","text":"Ching Chang"},{"@pid":"35/7828","text":"Shih-Ming Ou"},{"@pid":"22/7828","text":"Zong-Wei Zhu"}]},"title":"Distance Effect and Cognitive Proximity: A Study of Space Competition Strategy in Tourism Industry.","venue":"APSCC","pages":"1436-1440","year":"2008","type":"Conference and Workshop Papers","access":"closed","key":"conf/apscc/ChangOZ08","doi":"10.1109/APSCC.2008.24","ee":"https://doi.org/10.1109/APSCC.2008.24","url":"https://dblp.org/rec/conf/apscc/ChangOZ08"}, "url":"URL#5297434" }, { "@score":"1", "@id":"5297435", "info":{"authors":{"author":[{"@pid":"37/6393","text":"Chung C. Chang"},{"@pid":"14/7827","text":"Li-Wei Sung"}]},"title":"Integration and Application of Web-Service-Based Expert System and Computer Maintenance Management Information System.","venue":"APSCC","pages":"987-992","year":"2008","type":"Conference and Workshop Papers","access":"closed","key":"conf/apscc/ChangS08","doi":"10.1109/APSCC.2008.47","ee":"https://doi.org/10.1109/APSCC.2008.47","url":"https://dblp.org/rec/conf/apscc/ChangS08"}, "url":"URL#5297435" }, { "@score":"1", "@id":"5297436", "info":{"authors":{"author":[{"@pid":"11/393","text":"Ruey-Ming Chao"},{"@pid":"28/5777","text":"Yu-An Ho"},{"@pid":"40/6313","text":"Yen-Ping Chu"}]},"title":"Data Hiding Scheme Using Covering Codes in Halftone Images Based on Error Diffusion.","venue":"APSCC","pages":"1483-1488","year":"2008","type":"Conference and Workshop Papers","access":"closed","key":"conf/apscc/ChaoHC08","doi":"10.1109/APSCC.2008.154","ee":"https://doi.org/10.1109/APSCC.2008.154","url":"https://dblp.org/rec/conf/apscc/ChaoHC08"}, "url":"URL#5297436" }, { "@score":"1", "@id":"5297437", "info":{"authors":{"author":[{"@pid":"07/4300","text":"Brijesh Kumar Chaurasia"},{"@pid":"39/2285","text":"Shekhar Verma"}]},"title":"Optimizing Pseudonym Updation for Anonymity in VANETS.","venue":"APSCC","pages":"1633-1637","year":"2008","type":"Conference and Workshop Papers","access":"closed","key":"conf/apscc/ChaurasiaV08","doi":"10.1109/APSCC.2008.110","ee":"https://doi.org/10.1109/APSCC.2008.110","url":"https://dblp.org/rec/conf/apscc/ChaurasiaV08"}, "url":"URL#5297437" }, { "@score":"1", "@id":"5297438", "info":{"authors":{"author":[{"@pid":"99/3342","text":"Uei-Ren Chen"},{"@pid":"34/7827","text":"Bo-Sheng Chiou"},{"@pid":"91/4951","text":"Jyun-Ming Chen"},{"@pid":"79/7003","text":"Woei Lin"}]},"title":"An Adjustable Target Coverage Method in Directional Sensor Networks.","venue":"APSCC","pages":"174-180","year":"2008","type":"Conference and Workshop Papers","access":"closed","key":"conf/apscc/ChenCCL08","doi":"10.1109/APSCC.2008.37","ee":"https://doi.org/10.1109/APSCC.2008.37","url":"https://dblp.org/rec/conf/apscc/ChenCCL08"}, "url":"URL#5297438" }, { "@score":"1", "@id":"5297439", "info":{"authors":{"author":[{"@pid":"98/7826","text":"Ying-Hueih Chen"},{"@pid":"03/4629","text":"I-Chieh Hsu"},{"@pid":"90/5350","text":"Yu-Chung Chen"}]},"title":"The Strategic Impact of Inter-organizational Information Systems - A Dynamic Capabilities Analysis.","venue":"APSCC","pages":"1193-1198","year":"2008","type":"Conference and Workshop Papers","access":"closed","key":"conf/apscc/ChenHC08","doi":"10.1109/APSCC.2008.122","ee":"https://doi.org/10.1109/APSCC.2008.122","url":"https://dblp.org/rec/conf/apscc/ChenHC08"}, "url":"URL#5297439" }, { "@score":"1", "@id":"5297440", "info":{"authors":{"author":[{"@pid":"41/2635","text":"Chin-Hsing Chen"},{"@pid":"64/3288","text":"Wen-Tzeng Huang"},{"@pid":"29/1202","text":"You-Yin Chen"},{"@pid":"18/3987","text":"Yuan-Jen Chang"}]},"title":"An Integrated Service Model for Telecare System.","venue":"APSCC","pages":"712-717","year":"2008","type":"Conference and Workshop Papers","access":"closed","key":"conf/apscc/ChenHCC08","doi":"10.1109/APSCC.2008.196","ee":"https://doi.org/10.1109/APSCC.2008.196","url":"https://dblp.org/rec/conf/apscc/ChenHCC08"}, "url":"URL#5297440" }, { "@score":"1", "@id":"5297441", "info":{"authors":{"author":[{"@pid":"29/1202","text":"You-Yin Chen"},{"@pid":"64/3288","text":"Wen-Tzeng Huang"},{"@pid":"41/2635","text":"Chin-Hsing Chen"},{"@pid":"18/3987","text":"Yuan-Jen Chang"}]},"title":"Development of a Novel Bidirectional Control Telecare System over a Wireless Sensor Network and the Internet.","venue":"APSCC","pages":"907-913","year":"2008","type":"Conference and Workshop Papers","access":"closed","key":"conf/apscc/ChenHCC08a","doi":"10.1109/APSCC.2008.197","ee":"https://doi.org/10.1109/APSCC.2008.197","url":"https://dblp.org/rec/conf/apscc/ChenHCC08a"}, "url":"URL#5297441" }, { "@score":"1", "@id":"5297442", "info":{"authors":{"author":[{"@pid":"51/7096","text":"I-Ching Chen"},{"@pid":"58/744","text":"Shueh-Cheng Hu"},{"@pid":"39/6223","text":"Dong-Her Shih"}]},"title":"Provision of Pedagogical Resources in Service-Oriented Instructional Environments.","venue":"APSCC","pages":"435-438","year":"2008","type":"Conference and Workshop Papers","access":"closed","key":"conf/apscc/ChenHS08","doi":"10.1109/APSCC.2008.38","ee":"https://doi.org/10.1109/APSCC.2008.38","url":"https://dblp.org/rec/conf/apscc/ChenHS08"}, "url":"URL#5297442" }, { "@score":"1", "@id":"5297443", "info":{"authors":{"author":[{"@pid":"31/5966","text":"Yan-Haw Chen"},{"@pid":"67/968","text":"Chong-Dao Lee"},{"@pid":"83/1532","text":"Chih-Hua Chien"},{"@pid":"15/7828","text":"S. H. Tai"}]},"title":"Efficient Decoding of Systematic (41, 21, 9) Quadratic Residue Code.","venue":"APSCC","pages":"128-133","year":"2008","type":"Conference and Workshop Papers","access":"closed","key":"conf/apscc/ChenLCT08","doi":"10.1109/APSCC.2008.49","ee":"https://doi.org/10.1109/APSCC.2008.49","url":"https://dblp.org/rec/conf/apscc/ChenLCT08"}, "url":"URL#5297443" }, { "@score":"1", "@id":"5297444", "info":{"authors":{"author":[{"@pid":"32/7827","text":"Jen Wel Chen"},{"@pid":"33/740","text":"Dershing Luo"},{"@pid":"65/637","text":"Ching-Cha Hsieh"}]},"title":"An Institutional Analysis on the Vicissitudes of a Micro-payment Platform.","venue":"APSCC","pages":"975-980","year":"2008","type":"Conference and Workshop Papers","access":"closed","key":"conf/apscc/ChenLH08","doi":"10.1109/APSCC.2008.241","ee":"https://doi.org/10.1109/APSCC.2008.241","url":"https://dblp.org/rec/conf/apscc/ChenLH08"}, "url":"URL#5297444" }, { "@score":"1", "@id":"5297445", "info":{"authors":{"author":[{"@pid":"73/6153","text":"Weiyu Chen"},{"@pid":"63/6566","text":"Weiwei Sun"},{"@pid":"50/6051","text":"Jiaqi Dong"},{"@pid":"10/709","text":"Zhuoyao Zhang"},{"@pid":"64/5882","text":"Yingxiao Xu"}]},"title":"Discovering and Selecting Reliable Service in Mobile Ad Hoc Networks.","venue":"APSCC","pages":"181-186","year":"2008","type":"Conference and Workshop Papers","access":"closed","key":"conf/apscc/ChenSDZX08","doi":"10.1109/APSCC.2008.175","ee":"https://doi.org/10.1109/APSCC.2008.175","url":"https://dblp.org/rec/conf/apscc/ChenSDZX08"}, "url":"URL#5297445" }, { "@score":"1", "@id":"5297446", "info":{"authors":{"author":[{"@pid":"06/7658","text":"Fan-Chei Cheng"},{"@pid":"67/1663","text":"Yu-Kumg Chen"}]},"title":"Effective Sigma-Delta Background Estimation for Video Background Generation.","venue":"APSCC","pages":"1315-1321","year":"2008","type":"Conference and Workshop Papers","access":"closed","key":"conf/apscc/ChengC08","doi":"10.1109/APSCC.2008.94","ee":"https://doi.org/10.1109/APSCC.2008.94","url":"https://dblp.org/rec/conf/apscc/ChengC08"}, "url":"URL#5297446" }, { "@score":"1", "@id":"5297447", "info":{"authors":{"author":[{"@pid":"80/4313","text":"Sheng-Tzong Cheng"},{"@pid":"40/7827","text":"Bo-Fu Chen"},{"@pid":"92/7092","text":"Chih-Lun Chou"}]},"title":"Fairness-Based Scheduling Algorithm for TDD Mode IEEE 802.16 Broadband Wireless Access Systems.","venue":"APSCC","pages":"931-936","year":"2008","type":"Conference and Workshop Papers","access":"closed","key":"conf/apscc/ChengCC08","doi":"10.1109/APSCC.2008.73","ee":"https://doi.org/10.1109/APSCC.2008.73","url":"https://dblp.org/rec/conf/apscc/ChengCC08"}, "url":"URL#5297447" }, { "@score":"1", "@id":"5297448", "info":{"authors":{"author":[{"@pid":"25/780","text":"Rei-Heng Cheng"},{"@pid":"33/7827","text":"Shiuan-Yea Peng"},{"@pid":"03/7828","text":"Chiming Huang"}]},"title":"A Gradient-Based Dynamic Load Balance Data Forwarding Method for Multi-sink Wireless Sensor Networks.","venue":"APSCC","pages":"1132-1137","year":"2008","type":"Conference and Workshop Papers","access":"closed","key":"conf/apscc/ChengPH08","doi":"10.1109/APSCC.2008.209","ee":"https://doi.org/10.1109/APSCC.2008.209","url":"https://dblp.org/rec/conf/apscc/ChengPH08"}, "url":"URL#5297448" }, { "@score":"1", "@id":"5297449", "info":{"authors":{"author":[{"@pid":"98/5440","text":"Hongmei Chi"},{"@pid":"04/3499","text":"Edward L. Jones"},{"@pid":"41/3276","text":"Lang Zhao"}]},"title":"Implementation of a Security Access Control Model for Inter-organizational Healthcare Information Systems.","venue":"APSCC","pages":"692-696","year":"2008","type":"Conference and Workshop Papers","access":"closed","key":"conf/apscc/ChiJZ08","doi":"10.1109/APSCC.2008.256","ee":"https://doi.org/10.1109/APSCC.2008.256","url":"https://dblp.org/rec/conf/apscc/ChiJZ08"}, "url":"URL#5297449" }, { "@score":"1", "@id":"5297450", "info":{"authors":{"author":[{"@pid":"13/7827","text":"Su-Yun Chiang"},{"@pid":"16/7827","text":"Gwo-Gauang Wong"},{"@pid":"181/2877","text":"Yiming Li"},{"@pid":"73/2439","text":"Hsiao-Cheng Yu"}]},"title":"A Dynamic Competition Analysis on the Personal Computer Shipments in Taiwan Using Lotka-Volterra Model.","venue":"APSCC","pages":"1412-1417","year":"2008","type":"Conference and Workshop Papers","access":"closed","key":"conf/apscc/ChiangWLY08","doi":"10.1109/APSCC.2008.296","ee":"https://doi.org/10.1109/APSCC.2008.296","url":"https://dblp.org/rec/conf/apscc/ChiangWLY08"}, "url":"URL#5297450" }, { "@score":"1", "@id":"5297451", "info":{"authors":{"author":{"@pid":"16/6905","text":"Hung-Yu Chien"}},"title":"Varying Pseudonyms-Based RFID Authentication Protocols with DOS Attacks Resistance.","venue":"APSCC","pages":"607-614","year":"2008","type":"Conference and Workshop Papers","access":"closed","key":"conf/apscc/Chien08","doi":"10.1109/APSCC.2008.79","ee":"https://doi.org/10.1109/APSCC.2008.79","url":"https://dblp.org/rec/conf/apscc/Chien08"}, "url":"URL#5297451" }, { "@score":"1", "@id":"5297452", "info":{"authors":{"author":{"@pid":"16/6905","text":"Hung-Yu Chien"}},"title":"DOS Attacks on Varying Pseudonyms-Based RFID Authentication Protocols.","venue":"APSCC","pages":"615-622","year":"2008","type":"Conference and Workshop Papers","access":"closed","key":"conf/apscc/Chien08a","doi":"10.1109/APSCC.2008.111","ee":"https://doi.org/10.1109/APSCC.2008.111","url":"https://dblp.org/rec/conf/apscc/Chien08a"}, "url":"URL#5297452" }, { "@score":"1", "@id":"5297453", "info":{"authors":{"author":{"@pid":"16/6905","text":"Hung-Yu Chien"}},"title":"Highly Efficient ID-Based Ring Signature from Pairings.","venue":"APSCC","pages":"829-834","year":"2008","type":"Conference and Workshop Papers","access":"closed","key":"conf/apscc/Chien08b","doi":"10.1109/APSCC.2008.82","ee":"https://doi.org/10.1109/APSCC.2008.82","url":"https://dblp.org/rec/conf/apscc/Chien08b"}, "url":"URL#5297453" }, { "@score":"1", "@id":"5297454", "info":{"authors":{"author":[{"@pid":"86/2556","text":"Chih-Hsun Chou"},{"@pid":"20/7827","text":"Pang-Hsin Liu"},{"@pid":"02/7505","text":"Bingjing Cai"}]},"title":"On the Studies of Syllable Segmentation and Improving MFCCs for Automatic Birdsong Recognition.","venue":"APSCC","pages":"745-750","year":"2008","type":"Conference and Workshop Papers","access":"closed","key":"conf/apscc/ChouLC08","doi":"10.1109/APSCC.2008.6","ee":"https://doi.org/10.1109/APSCC.2008.6","url":"https://dblp.org/rec/conf/apscc/ChouLC08"}, "url":"URL#5297454" }, { "@score":"1", "@id":"5297455", "info":{"authors":{"author":[{"@pid":"88/7827","text":"Chun-Mei Chou"},{"@pid":"55/7827","text":"Chien-Hua Shen"},{"@pid":"39/7410","text":"Yu-Je Lee"}]},"title":"The Skills of Electronic Commerce for Students in Departments of Business Management in University Science and Technological Schools.","venue":"APSCC","pages":"733-738","year":"2008","type":"Conference and Workshop Papers","access":"closed","key":"conf/apscc/ChouSL08","doi":"10.1109/APSCC.2008.299","ee":"https://doi.org/10.1109/APSCC.2008.299","url":"https://dblp.org/rec/conf/apscc/ChouSL08"}, "url":"URL#5297455" }, { "@score":"1", "@id":"5297456", "info":{"authors":{"author":[{"@pid":"17/7207","text":"Aminul Haque Chowdhury"},{"@pid":"72/7208-1","text":"Muhammad Ikram 0001"},{"@pid":"84/6360","text":"Ki-Hyung Kim"}]},"title":"Secure and Survivable Group Communication over MANET Using CRTDH Based on a Virtual Subnet Model.","venue":"APSCC","pages":"638-643","year":"2008","type":"Conference and Workshop Papers","access":"closed","key":"conf/apscc/ChowdhuryIK08","doi":"10.1109/APSCC.2008.123","ee":"https://doi.org/10.1109/APSCC.2008.123","url":"https://dblp.org/rec/conf/apscc/ChowdhuryIK08"}, "url":"URL#5297456" }, { "@score":"1", "@id":"5297457", "info":{"authors":{"author":[{"@pid":"197/3253","text":"Hui-Na Chua"},{"@pid":"45/6894","text":"Patrick Legrand"},{"@pid":"20/7633","text":"Karyn Wei-Ju Khoo"},{"@pid":"74/3400","text":"Simon Ringland"},{"@pid":"27/7828","text":"Bruno Legat"}]},"title":"Innovative Call Routing: Concept and Experimental Observations.","venue":"APSCC","pages":"1538-1543","year":"2008","type":"Conference and Workshop Papers","access":"closed","key":"conf/apscc/ChuaLKRL08","doi":"10.1109/APSCC.2008.51","ee":"https://doi.org/10.1109/APSCC.2008.51","url":"https://dblp.org/rec/conf/apscc/ChuaLKRL08"}, "url":"URL#5297457" }, { "@score":"1", "@id":"5297458", "info":{"authors":{"author":[{"@pid":"40/1031","text":"Ming-Chin Chuang"},{"@pid":"18/6000","text":"Jeng Farn Lee"}]},"title":"LMAM: A Lightweight Mutual Authentication Mechanism for Network Mobility in Vehicular Networks.","venue":"APSCC","pages":"1611-1616","year":"2008","type":"Conference and Workshop Papers","access":"closed","key":"conf/apscc/ChuangL08","doi":"10.1109/APSCC.2008.294","ee":"https://doi.org/10.1109/APSCC.2008.294","url":"https://dblp.org/rec/conf/apscc/ChuangL08"}, "url":"URL#5297458" }, { "@score":"1", "@id":"5297459", "info":{"authors":{"author":[{"@pid":"94/6283","text":"Guilan Dai"},{"@pid":"83/6813","text":"Rujuan Liu"},{"@pid":"31/4837","text":"Chongchong Zhao"},{"@pid":"37/1427","text":"Changjun Hu"}]},"title":"Timing Constraints Specification and Verification for Web Service Compositions.","venue":"APSCC","pages":"315-322","year":"2008","type":"Conference and Workshop Papers","access":"closed","key":"conf/apscc/DaiLZH08","doi":"10.1109/APSCC.2008.59","ee":"https://doi.org/10.1109/APSCC.2008.59","url":"https://dblp.org/rec/conf/apscc/DaiLZH08"}, "url":"URL#5297459" }, { "@score":"1", "@id":"5297460", "info":{"authors":{"author":[{"@pid":"89/361","text":"Azin Dehmoobad"},{"@pid":"24/3788","text":"Kamran Sartipi"}]},"title":"Minimized Domain Knowledge for SOA-Based Interoperability.","venue":"APSCC","pages":"500-506","year":"2008","type":"Conference and Workshop Papers","access":"closed","key":"conf/apscc/DehmoobadS08","doi":"10.1109/APSCC.2008.132","ee":"https://doi.org/10.1109/APSCC.2008.132","url":"https://dblp.org/rec/conf/apscc/DehmoobadS08"}, "url":"URL#5297460" }, { "@score":"1", "@id":"5297461", "info":{"authors":{"author":[{"@pid":"14/6707","text":"Ashay Dhamdhere"},{"@pid":"63/6049","text":"Vijay Sivaraman"},{"@pid":"22/7827","text":"Vidit Mathur"},{"@pid":"71/591","text":"Shuo Xiao"}]},"title":"Algorithms for Transmission Power Control in Biomedical Wireless Sensor Networks.","venue":"APSCC","pages":"1114-1119","year":"2008","type":"Conference and Workshop Papers","access":"closed","key":"conf/apscc/DhamdhereSMX08","doi":"10.1109/APSCC.2008.121","ee":"https://doi.org/10.1109/APSCC.2008.121","url":"https://dblp.org/rec/conf/apscc/DhamdhereSMX08"}, "url":"URL#5297461" }, { "@score":"1", "@id":"5297462", "info":{"authors":{"author":[{"@pid":"93/1852","text":"Karim Djouani"},{"@pid":"85/5901","text":"Jun Chen"},{"@pid":"00/7827","text":"Abdellah Akharraz"},{"@pid":"74/1515","text":"Kamel Barkaoui"}]},"title":"An Effective Link Adaptation Method in Cooperative Wireless Networks.","venue":"APSCC","pages":"914-919","year":"2008","type":"Conference and Workshop Papers","access":"closed","key":"conf/apscc/DjouaniCAB08","doi":"10.1109/APSCC.2008.230","ee":"https://doi.org/10.1109/APSCC.2008.230","url":"https://dblp.org/rec/conf/apscc/DjouaniCAB08"}, "url":"URL#5297462" }, { "@score":"1", "@id":"5297463", "info":{"authors":{"author":[{"@pid":"22/7404","text":"Wushi Dong"},{"@pid":"49/3092","text":"Niansheng Chen"},{"@pid":"73/2066-5","text":"Qiang Sun 0005"}]},"title":"A QoS Routing Protocol Supporting Unidirectional Links in MANETs.","venue":"APSCC","pages":"1401-1405","year":"2008","type":"Conference and Workshop Papers","access":"closed","key":"conf/apscc/DongCS08","doi":"10.1109/APSCC.2008.13","ee":"https://doi.org/10.1109/APSCC.2008.13","url":"https://dblp.org/rec/conf/apscc/DongCS08"}, "url":"URL#5297463" }, { "@score":"1", "@id":"5297464", "info":{"authors":{"author":[{"@pid":"54/5258","text":"Zhiqiang Du"},{"@pid":"05/1958","text":"Kun Wang"},{"@pid":"47/2926","text":"Lihua Zhou"}]},"title":"Efficient Broadcast Authentication in Wireless Sensor Networks.","venue":"APSCC","pages":"187-192","year":"2008","type":"Conference and Workshop Papers","access":"closed","key":"conf/apscc/DuWZ08","doi":"10.1109/APSCC.2008.133","ee":"https://doi.org/10.1109/APSCC.2008.133","url":"https://dblp.org/rec/conf/apscc/DuWZ08"}, "url":"URL#5297464" }, { "@score":"1", "@id":"5297465", "info":{"authors":{"author":[{"@pid":"57/1799","text":"Alain Durand"},{"@pid":"j/MarcJoye","text":"Marc Joye"},{"@pid":"99/3735","text":"Mohamed Karroumi"}]},"title":"Laundering and Repackaging of Multimedia Content in Content Distribution Systems.","venue":"APSCC","pages":"1344-1351","year":"2008","type":"Conference and Workshop Papers","access":"closed","key":"conf/apscc/DurandJK08","doi":"10.1109/APSCC.2008.129","ee":"https://doi.org/10.1109/APSCC.2008.129","url":"https://dblp.org/rec/conf/apscc/DurandJK08"}, "url":"URL#5297465" }, { "@score":"1", "@id":"5297466", "info":{"authors":{"author":[{"@pid":"57/3099","text":"Li Fan"},{"@pid":"70/7827","text":"Jiang WeiJian"}]},"title":"Research on Mobile-Agent Based Data Access Model in Pervasive Computing Environment.","venue":"APSCC","pages":"1523-1526","year":"2008","type":"Conference and Workshop Papers","access":"closed","key":"conf/apscc/FanW08","doi":"10.1109/APSCC.2008.89","ee":"https://doi.org/10.1109/APSCC.2008.89","url":"https://dblp.org/rec/conf/apscc/FanW08"}, "url":"URL#5297466" }, { "@score":"1", "@id":"5297467", "info":{"authors":{"author":[{"@pid":"25/6683","text":"Chih-Lun Fang"},{"@pid":"34/4711-1","text":"Tsung-Han Tsai 0001"},{"@pid":"04/7827","text":"Ren-Chih Kuo"}]},"title":"Design and Implementation of a Videotext Extractor on Dual-Core Platform.","venue":"APSCC","pages":"896-900","year":"2008","type":"Conference and Workshop Papers","access":"closed","key":"conf/apscc/FangTK08","doi":"10.1109/APSCC.2008.142","ee":"https://doi.org/10.1109/APSCC.2008.142","url":"https://dblp.org/rec/conf/apscc/FangTK08"}, "url":"URL#5297467" }, { "@score":"1", "@id":"5297468", "info":{"authors":{"author":[{"@pid":"40/4023","text":"Jiao Feng"},{"@pid":"x/NaixueXiong","text":"Naixue Xiong"},{"@pid":"13/1890","text":"Shuoben Bi"}]},"title":"X-ray Image Enhancement Based on Wavelet Transform.","venue":"APSCC","pages":"1568-1573","year":"2008","type":"Conference and Workshop Papers","access":"closed","key":"conf/apscc/FengXB08","doi":"10.1109/APSCC.2008.270","ee":"https://doi.org/10.1109/APSCC.2008.270","url":"https://dblp.org/rec/conf/apscc/FengXB08"}, "url":"URL#5297468" }, { "@score":"1", "@id":"5297469", "info":{"authors":{"author":[{"@pid":"71/2567","text":"Giulio Giunta"},{"@pid":"92/842","text":"Giuliano Laccetti"},{"@pid":"15/6533","text":"Raffaele Montella"}]},"title":"Five Dimension Environmental Data Resource Brokering on Computational Grids and Scientific Clouds.","venue":"APSCC","pages":"81-88","year":"2008","type":"Conference and Workshop Papers","access":"closed","key":"conf/apscc/GiuntaLM08","doi":"10.1109/APSCC.2008.201","ee":"https://doi.org/10.1109/APSCC.2008.201","url":"https://dblp.org/rec/conf/apscc/GiuntaLM08"}, "url":"URL#5297469" }, { "@score":"1", "@id":"5297470", "info":{"authors":{"author":[{"@pid":"86/7637","text":"Manish Godse"},{"@pid":"32/7569","text":"Rajendra M. Sonar"},{"@pid":"66/4256","text":"Shrikant Mulik"}]},"title":"Web Service Selection Based on Analytical Network Process Approach.","venue":"APSCC","pages":"1103-1108","year":"2008","type":"Conference and Workshop Papers","access":"closed","key":"conf/apscc/GodseSM08","doi":"10.1109/APSCC.2008.218","ee":"https://doi.org/10.1109/APSCC.2008.218","url":"https://dblp.org/rec/conf/apscc/GodseSM08"}, "url":"URL#5297470" }, { "@score":"1", "@id":"5297471", "info":{"authors":{"author":[{"@pid":"37/7502","text":"Masaki Gotou"},{"@pid":"07/6649","text":"Hirofumi Yamaki"},{"@pid":"72/7628","text":"Daisuke Yanagisawa"},{"@pid":"66/2768","text":"Masamitsu Ukai"},{"@pid":"02/3804","text":"Masahiro Tanaka"},{"@pid":"71/5163","text":"Toru Ishida 0001"}]},"title":"Resource Sharing by Multilingual Expression Services.","venue":"APSCC","pages":"470-475","year":"2008","type":"Conference and Workshop Papers","access":"closed","key":"conf/apscc/GotouYYUTI08","doi":"10.1109/APSCC.2008.213","ee":"https://doi.org/10.1109/APSCC.2008.213","url":"https://dblp.org/rec/conf/apscc/GotouYYUTI08"}, "url":"URL#5297471" }, { "@score":"1", "@id":"5297472", "info":{"authors":{"author":[{"@pid":"87/755","text":"Boncheol Gu"},{"@pid":"89/2343","text":"Junyoung Heo"},{"@pid":"52/3833","text":"Sangchul Oh"},{"@pid":"28/4560","text":"Namhoon Park"},{"@pid":"00/6312","text":"Gwangil Jeon"},{"@pid":"92/4612","text":"Yookun Cho"}]},"title":"An SDR-Based Wireless Communication Gateway for Vehicle Networks.","venue":"APSCC","pages":"1617-1622","year":"2008","type":"Conference and Workshop Papers","access":"closed","key":"conf/apscc/GuHOPJC08","doi":"10.1109/APSCC.2008.61","ee":"https://doi.org/10.1109/APSCC.2008.61","url":"https://dblp.org/rec/conf/apscc/GuHOPJC08"}, "url":"URL#5297472" }, { "@score":"1", "@id":"5297473", "info":{"authors":{"author":[{"@pid":"42/617","text":"Nan Guo"},{"@pid":"22/6267","text":"Tianhan Gao"},{"@pid":"13/5236-1","text":"Bin Zhang 0001"}]},"title":"Trusted Assessment of Web Services Based on a Six-Dimensional QoS Model.","venue":"APSCC","pages":"123-127","year":"2008","type":"Conference and Workshop Papers","access":"closed","key":"conf/apscc/GuoGZ08","doi":"10.1109/APSCC.2008.239","ee":"https://doi.org/10.1109/APSCC.2008.239","url":"https://dblp.org/rec/conf/apscc/GuoGZ08"}, "url":"URL#5297473" }, { "@score":"1", "@id":"5297474", "info":{"authors":{"author":[{"@pid":"33/4487","text":"Wencai Guo"},{"@pid":"53/2571","text":"Chuang Lin"}]},"title":"A Formal Approach to Verify Grid Service Composition Based on Interaction Pattern.","venue":"APSCC","pages":"69-74","year":"2008","type":"Conference and Workshop Papers","access":"closed","key":"conf/apscc/GuoL08","doi":"10.1109/APSCC.2008.192","ee":"https://doi.org/10.1109/APSCC.2008.192","url":"https://dblp.org/rec/conf/apscc/GuoL08"}, "url":"URL#5297474" }, { "@score":"1", "@id":"5297475", "info":{"authors":{"author":{"@pid":"59/2465","text":"Hakan Hacigümüs"}},"title":"Efficient Dynamic Policy Monitoring in Service Oriented Architectures.","venue":"APSCC","pages":"494-499","year":"2008","type":"Conference and Workshop Papers","access":"closed","key":"conf/apscc/Hacigumus08","doi":"10.1109/APSCC.2008.195","ee":"https://doi.org/10.1109/APSCC.2008.195","url":"https://dblp.org/rec/conf/apscc/Hacigumus08"}, "url":"URL#5297475" }, { "@score":"1", "@id":"5297476", "info":{"authors":{"author":{"@pid":"209/8668","text":"Israat Tanzeena Haque"}},"title":"Non-deterministic Geographic Forwarding in Mobile Ad Hoc Networks.","venue":"APSCC","pages":"1144-1149","year":"2008","type":"Conference and Workshop Papers","access":"closed","key":"conf/apscc/Haque08","doi":"10.1109/APSCC.2008.198","ee":"https://doi.org/10.1109/APSCC.2008.198","url":"https://dblp.org/rec/conf/apscc/Haque08"}, "url":"URL#5297476" }, { "@score":"1", "@id":"5297477", "info":{"authors":{"author":[{"@pid":"01/1070","text":"Ruhan He"},{"@pid":"53/7206","text":"Kaiming Liu"},{"@pid":"x/NaixueXiong","text":"Naixue Xiong"},{"@pid":"91/5027","text":"Yong Zhu"}]},"title":"Garment Image Retrieval on the Web with Ubiquitous Camera-Phone.","venue":"APSCC","pages":"1584-1589","year":"2008","type":"Conference and Workshop Papers","access":"closed","key":"conf/apscc/HeLXZ08","doi":"10.1109/APSCC.2008.109","ee":"https://doi.org/10.1109/APSCC.2008.109","url":"https://dblp.org/rec/conf/apscc/HeLXZ08"}, "url":"URL#5297477" }, { "@score":"1", "@id":"5297478", "info":{"authors":{"author":[{"@pid":"57/8174","text":"Yanxiang He"},{"@pid":"63/5422","text":"Liang Zhao"},{"@pid":"26/6973","text":"Zhao Wu"},{"@pid":"87/3534-7","text":"Fei Li 0007"}]},"title":"Modeling Web Services Composition with Transaction Extension for Performance Evaluation.","venue":"APSCC","pages":"476-481","year":"2008","type":"Conference and Workshop Papers","access":"closed","key":"conf/apscc/HeZWL08","doi":"10.1109/APSCC.2008.104","ee":"https://doi.org/10.1109/APSCC.2008.104","url":"https://dblp.org/rec/conf/apscc/HeZWL08"}, "url":"URL#5297478" }, { "@score":"1", "@id":"5297479", "info":{"authors":{"author":[{"@pid":"25/230","text":"Manabu Hirano"},{"@pid":"76/125","text":"Takahiro Shinagawa"},{"@pid":"42/982","text":"Hideki Eiraku"},{"@pid":"h/ShoichiHasegawa","text":"Shoichi Hasegawa"},{"@pid":"21/5940","text":"Kazumasa Omote"},{"@pid":"49/4539","text":"Kouichi Tanimoto"},{"@pid":"38/5831","text":"Takashi Horie"},{"@pid":"83/4869","text":"Kazuhiko Kato"},{"@pid":"50/6182","text":"Takeshi Okuda"},{"@pid":"70/5846","text":"Eiji Kawai"},{"@pid":"81/4806","text":"Suguru Yamaguchi"}]},"title":"Introducing Role-Based Access Control to a Secure Virtual Machine Monitor: Security Policy Enforcement Mechanism for Distributed Computers.","venue":"APSCC","pages":"1225-1230","year":"2008","type":"Conference and Workshop Papers","access":"closed","key":"conf/apscc/HiranoSEHOTHKOKY08","doi":"10.1109/APSCC.2008.14","ee":"https://doi.org/10.1109/APSCC.2008.14","url":"https://dblp.org/rec/conf/apscc/HiranoSEHOTHKOKY08"}, "url":"URL#5297479" }, { "@score":"1", "@id":"5297480", "info":{"authors":{"author":[{"@pid":"87/6191","text":"Tsu-Feng Ho"},{"@pid":"23/3276","text":"Shyong Jian Shyu"},{"@pid":"53/551","text":"Yi-Ling Wu"}]},"title":"Material Acquisitions in Academic Libraries.","venue":"APSCC","pages":"1465-1470","year":"2008","type":"Conference and Workshop Papers","access":"closed","key":"conf/apscc/HoSW08","doi":"10.1109/APSCC.2008.85","ee":"https://doi.org/10.1109/APSCC.2008.85","url":"https://dblp.org/rec/conf/apscc/HoSW08"}, "url":"URL#5297480" }, { "@score":"1", "@id":"5297481", "info":{"authors":{"author":[{"@pid":"13/3243","text":"Liu Hong"},{"@pid":"16/7828-2","text":"Hu Wan 0002"},{"@pid":"w/YuWang5","text":"Yu Wang 0005"},{"@pid":"08/550","text":"Xueguang Chen"},{"@pid":"z/DeqingZou","text":"Deqing Zou"}]},"title":"Extending HLA/RTI to WAN Based on Grid Service.","venue":"APSCC","pages":"57-62","year":"2008","type":"Conference and Workshop Papers","access":"closed","key":"conf/apscc/HongWWCZ08","doi":"10.1109/APSCC.2008.91","ee":"https://doi.org/10.1109/APSCC.2008.91","url":"https://dblp.org/rec/conf/apscc/HongWWCZ08"}, "url":"URL#5297481" }, { "@score":"1", "@id":"5297482", "info":{"authors":{"author":[{"@pid":"37/3214","text":"Alexander M. Hoole"},{"@pid":"10/1711","text":"Issa Traoré"}]},"title":"Contract-Based Security Monitors for Service Oriented Software Architecture.","venue":"APSCC","pages":"1239-1245","year":"2008","type":"Conference and Workshop Papers","access":"closed","key":"conf/apscc/HooleT08","doi":"10.1109/APSCC.2008.169","ee":"https://doi.org/10.1109/APSCC.2008.169","url":"https://dblp.org/rec/conf/apscc/HooleT08"}, "url":"URL#5297482" }, { "@score":"1", "@id":"5297483", "info":{"authors":{"author":[{"@pid":"87/788","text":"Ming-Chih Hsieh"},{"@pid":"24/3307","text":"Yung-Wei Kao"},{"@pid":"10/6898","text":"Shyan-Ming Yuan"}]},"title":"Web 2.0 Toolbar: Providing Web 2.0 Services for Existence Web Pages.","venue":"APSCC","pages":"507-512","year":"2008","type":"Conference and Workshop Papers","access":"closed","key":"conf/apscc/HsiehKY08","doi":"10.1109/APSCC.2008.137","ee":"https://doi.org/10.1109/APSCC.2008.137","url":"https://dblp.org/rec/conf/apscc/HsiehKY08"}, "url":"URL#5297483" }, { "@score":"1", "@id":"5297484", "info":{"authors":{"author":[{"@pid":"58/2603","text":"Fu-Shiung Hsieh"},{"@pid":"11/7828","text":"Shih-Min Tsai"}]},"title":"Combinatorial Reverse Auction Based on Lagrangian Relaxation.","venue":"APSCC","pages":"329-334","year":"2008","type":"Conference and Workshop Papers","access":"closed","key":"conf/apscc/HsiehT08","doi":"10.1109/APSCC.2008.112","ee":"https://doi.org/10.1109/APSCC.2008.112","url":"https://dblp.org/rec/conf/apscc/HsiehT08"}, "url":"URL#5297484" }, { "@score":"1", "@id":"5297485", "info":{"authors":{"author":[{"@pid":"26/7827","text":"Pi-Shan Hsu"},{"@pid":"89/7826","text":"Te-Jeng Chang"},{"@pid":"41/7448","text":"Chien-Pen Chuang"},{"@pid":"81/7827","text":"Ming-Hsiung Wu"}]},"title":"A Dynamic, Real Time and Non-interference Quantitative Measurement Technique on Diagnosing Instructional Condition for Adaptive E-learning.","venue":"APSCC","pages":"1471-1476","year":"2008","type":"Conference and Workshop Papers","access":"closed","key":"conf/apscc/HsuCCW08","doi":"10.1109/APSCC.2008.108","ee":"https://doi.org/10.1109/APSCC.2008.108","url":"https://dblp.org/rec/conf/apscc/HsuCCW08"}, "url":"URL#5297485" }, { "@score":"1", "@id":"5297486", "info":{"authors":{"author":[{"@pid":"14/5864","text":"Chun-Liang Hsu"},{"@pid":"08/5449","text":"Sheng-Yuan Yang"},{"@pid":"77/3211","text":"Wei-Bin Wu 0001"}]},"title":"Implementing Speech-Recognition Microprocessor into Intelligent Control-System of Home-Appliance.","venue":"APSCC","pages":"881-885","year":"2008","type":"Conference and Workshop Papers","access":"closed","key":"conf/apscc/HsuYW08","doi":"10.1109/APSCC.2008.75","ee":"https://doi.org/10.1109/APSCC.2008.75","url":"https://dblp.org/rec/conf/apscc/HsuYW08"}, "url":"URL#5297486" }, { "@score":"1", "@id":"5297487", "info":{"authors":{"author":[{"@pid":"52/4886","text":"Sue-Chen Hsueh"},{"@pid":"73/6733","text":"Ming-Yen Lin"},{"@pid":"07/3088","text":"Chien-Liang Chen"}]},"title":"Mining Negative Sequential Patterns for E-commerce Recommendations.","venue":"APSCC","pages":"1213-1218","year":"2008","type":"Conference and Workshop Papers","access":"closed","key":"conf/apscc/HsuehLC08","doi":"10.1109/APSCC.2008.183","ee":"https://doi.org/10.1109/APSCC.2008.183","url":"https://dblp.org/rec/conf/apscc/HsuehLC08"}, "url":"URL#5297487" }, { "@score":"1", "@id":"5297488", "info":{"authors":{"author":[{"@pid":"37/1427","text":"Changjun Hu"},{"@pid":"88/1017","text":"Feng Jiao"},{"@pid":"31/4837","text":"Chongchong Zhao"},{"@pid":"21/7827","text":"Huayu Li"}]},"title":"A Service-Oriented Modeling Technique for Domain-Specific Software.","venue":"APSCC","pages":"1026-1031","year":"2008","type":"Conference and Workshop Papers","access":"closed","key":"conf/apscc/HuJZL08","doi":"10.1109/APSCC.2008.35","ee":"https://doi.org/10.1109/APSCC.2008.35","url":"https://dblp.org/rec/conf/apscc/HuJZL08"}, "url":"URL#5297488" }, { "@score":"1", "@id":"5297489", "info":{"authors":{"author":[{"@pid":"37/1427","text":"Changjun Hu"},{"@pid":"21/7827","text":"Huayu Li"},{"@pid":"86/2120","text":"Xiaoming Zhang"}]},"title":"A Framework of Web Services Description and Discovery Based on OWL-S and Domain Ontology.","venue":"APSCC","pages":"1109-1113","year":"2008","type":"Conference and Workshop Papers","access":"closed","key":"conf/apscc/HuLZ08","doi":"10.1109/APSCC.2008.33","ee":"https://doi.org/10.1109/APSCC.2008.33","url":"https://dblp.org/rec/conf/apscc/HuLZ08"}, "url":"URL#5297489" }, { "@score":"1", "@id":"5297490", "info":{"authors":{"author":[{"@pid":"02/1690","text":"Xinrong Hu"},{"@pid":"x/NaixueXiong","text":"Naixue Xiong"},{"@pid":"47/7827","text":"Shuqin Cui"},{"@pid":"63/5010","text":"Wang Hui"},{"@pid":"99/7813","text":"Jianchun Wang"}]},"title":"A Color Clustering Algorithm for Cloth Image.","venue":"APSCC","pages":"1500-1505","year":"2008","type":"Conference and Workshop Papers","access":"closed","key":"conf/apscc/HuXCHW08","doi":"10.1109/APSCC.2008.78","ee":"https://doi.org/10.1109/APSCC.2008.78","url":"https://dblp.org/rec/conf/apscc/HuXCHW08"}, "url":"URL#5297490" }, { "@score":"1", "@id":"5297491", "info":{"authors":{"author":[{"@pid":"23/7178","text":"Hui-Jiun Hu"},{"@pid":"29/1484","text":"Jen Yen"},{"@pid":"88/7826","text":"Shing-Sheng Guan"}]},"title":"A Study on the Interface Usability of B2C Hypermarket E-commerce Website.","venue":"APSCC","pages":"1202-1207","year":"2008","type":"Conference and Workshop Papers","access":"closed","key":"conf/apscc/HuYG08","doi":"10.1109/APSCC.2008.64","ee":"https://doi.org/10.1109/APSCC.2008.64","url":"https://dblp.org/rec/conf/apscc/HuYG08"}, "url":"URL#5297491" }, { "@score":"1", "@id":"5297492", "info":{"authors":{"author":[{"@pid":"67/6924","text":"Hao Hu"},{"@pid":"86/3126","text":"Wenan Zhou"},{"@pid":"30/2700","text":"Shu Zhang"},{"@pid":"60/5010","text":"Junde Song"}]},"title":"A Novel Network Selection Algorithm in Next Generation Heterogeneous Network for Modern Service Industry.","venue":"APSCC","pages":"1263-1268","year":"2008","type":"Conference and Workshop Papers","access":"closed","key":"conf/apscc/HuZZS08","doi":"10.1109/APSCC.2008.102","ee":"https://doi.org/10.1109/APSCC.2008.102","url":"https://dblp.org/rec/conf/apscc/HuZZS08"}, "url":"URL#5297492" }, { "@score":"1", "@id":"5297493", "info":{"authors":{"author":[{"@pid":"56/1690","text":"Kuang Yu Huang"},{"@pid":"84/7429","text":"Chuen-Jiuan Jane"}]},"title":"An Automatic Stock Market Forecasting and Portfolio Selection Mechanism Based on VPRS, ARX and Grey System.","venue":"APSCC","pages":"1430-1435","year":"2008","type":"Conference and Workshop Papers","access":"closed","key":"conf/apscc/HuangJ08","doi":"10.1109/APSCC.2008.19","ee":"https://doi.org/10.1109/APSCC.2008.19","url":"https://dblp.org/rec/conf/apscc/HuangJ08"}, "url":"URL#5297493" }, { "@score":"1", "@id":"5297494", "info":{"authors":{"author":[{"@pid":"62/4409","text":"Hui-Feng Huang"},{"@pid":"83/7784","text":"Kuo-Ching Liu"}]},"title":"A New Dynamic Access Control in Wireless Sensor Networks.","venue":"APSCC","pages":"901-906","year":"2008","type":"Conference and Workshop Papers","access":"closed","key":"conf/apscc/HuangL08","doi":"10.1109/APSCC.2008.116","ee":"https://doi.org/10.1109/APSCC.2008.116","url":"https://dblp.org/rec/conf/apscc/HuangL08"}, "url":"URL#5297494" }, { "@score":"1", "@id":"5297495", "info":{"authors":{"author":[{"@pid":"62/1353","text":"Bor-Jiunn Hwang"},{"@pid":"87/366","text":"I-Shyan Hwang"},{"@pid":"96/7826","text":"Bo-Feng Guo"},{"@pid":"61/6426","text":"Ruey-Rong Su"}]},"title":"A Novel Radio Resource Management Scheme with HPWRR Scheduling Algorithm in Link Adaptive Mobile WiMAX Network.","venue":"APSCC","pages":"225-230","year":"2008","type":"Conference and Workshop Papers","access":"closed","key":"conf/apscc/HwangHGS08","doi":"10.1109/APSCC.2008.204","ee":"https://doi.org/10.1109/APSCC.2008.204","url":"https://dblp.org/rec/conf/apscc/HwangHGS08"}, "url":"URL#5297495" }, { "@score":"1", "@id":"5297496", "info":{"authors":{"author":[{"@pid":"62/1353","text":"Bor-Jiunn Hwang"},{"@pid":"87/366","text":"I-Shyan Hwang"},{"@pid":"81/7826","text":"Shao-Jyun Wun"}]},"title":"A Novel Hierarchical Network Selection Strategy with Adaptive QoS Level Scheme in 2-Tier Multi-rate Mobile WiMAX Networks.","venue":"APSCC","pages":"231-236","year":"2008","type":"Conference and Workshop Papers","access":"closed","key":"conf/apscc/HwangHW08","doi":"10.1109/APSCC.2008.220","ee":"https://doi.org/10.1109/APSCC.2008.220","url":"https://dblp.org/rec/conf/apscc/HwangHW08"}, "url":"URL#5297496" }, { "@score":"1", "@id":"5297497", "info":{"authors":{"author":[{"@pid":"14/1728","text":"Chi-Kuang Hwang"},{"@pid":"93/7827","text":"Hung-Min Yuan"}]},"title":"Partitioning Scheme Based on Convolution Characteristic Values of RSS Measuring from APs.","venue":"APSCC","pages":"1173-1176","year":"2008","type":"Conference and Workshop Papers","access":"closed","key":"conf/apscc/HwangY08","doi":"10.1109/APSCC.2008.139","ee":"https://doi.org/10.1109/APSCC.2008.139","url":"https://dblp.org/rec/conf/apscc/HwangY08"}, "url":"URL#5297497" }, { "@score":"1", "@id":"5297498", "info":{"authors":{"author":[{"@pid":"06/7828","text":"Cherng-Ying Ing"},{"@pid":"03/3357","text":"Tzao-Lin Lee"}]},"title":"USB Device Sharing Server for Office Environment.","venue":"APSCC","pages":"953-956","year":"2008","type":"Conference and Workshop Papers","access":"closed","key":"conf/apscc/IngL08","doi":"10.1109/APSCC.2008.177","ee":"https://doi.org/10.1109/APSCC.2008.177","url":"https://dblp.org/rec/conf/apscc/IngL08"}, "url":"URL#5297498" }, { "@score":"1", "@id":"5297499", "info":{"authors":{"author":[{"@pid":"67/933","text":"Kuen-Fang Jea"},{"@pid":"50/7265","text":"Jen-Ya Wang"}]},"title":"An RFID Encoding Method for Supply Chain Management.","venue":"APSCC","pages":"601-606","year":"2008","type":"Conference and Workshop Papers","access":"closed","key":"conf/apscc/JeaW08","doi":"10.1109/APSCC.2008.120","ee":"https://doi.org/10.1109/APSCC.2008.120","url":"https://dblp.org/rec/conf/apscc/JeaW08"}, "url":"URL#5297499" }, { "@score":"1", "@id":"5297500", "info":{"authors":{"author":[{"@pid":"38/5823","text":"Jie Jia"},{"@pid":"23/1163","text":"Hae-Kwang Kim"}]},"title":"Redundant Picture Coding Using Residual-Adaptive Polyphase Downsampling for H.264 Error Resiliency.","venue":"APSCC","pages":"1338-1343","year":"2008","type":"Conference and Workshop Papers","access":"closed","key":"conf/apscc/JiaK08","doi":"10.1109/APSCC.2008.45","ee":"https://doi.org/10.1109/APSCC.2008.45","url":"https://dblp.org/rec/conf/apscc/JiaK08"}, "url":"URL#5297500" }, { "@score":"1", "@id":"5297501", "info":{"authors":{"author":[{"@pid":"04/1600","text":"Jinhua Jiang"},{"@pid":"67/6383-1","text":"Gang Chen 0001"},{"@pid":"21/5967","text":"Lidan Shou"},{"@pid":"47/6529-5","text":"Ke Chen 0005"}]},"title":"OTJFast: Processing Ordered XML Twig Join Fast.","venue":"APSCC","pages":"1289-1294","year":"2008","type":"Conference and Workshop Papers","access":"closed","key":"conf/apscc/JiangCSC08","doi":"10.1109/APSCC.2008.15","ee":"https://doi.org/10.1109/APSCC.2008.15","url":"https://dblp.org/rec/conf/apscc/JiangCSC08"}, "url":"URL#5297501" }, { "@score":"1", "@id":"5297502", "info":{"authors":{"author":[{"@pid":"70/6907","text":"Jehn-Ruey Jiang"},{"@pid":"68/7827","text":"Jih-Wei Wu"},{"@pid":"64/7827","text":"Guan-Shien Du"}]},"title":"Energy-Efficient and Traffic-Dispersive Event Contour Tracking in Multi-sink Wireless Sensor Networks.","venue":"APSCC","pages":"1120-1126","year":"2008","type":"Conference and Workshop Papers","access":"closed","key":"conf/apscc/JiangWD08","doi":"10.1109/APSCC.2008.159","ee":"https://doi.org/10.1109/APSCC.2008.159","url":"https://dblp.org/rec/conf/apscc/JiangWD08"}, "url":"URL#5297502" }, { "@score":"1", "@id":"5297503", "info":{"authors":{"author":[{"@pid":"39/4661","text":"Jeong-In Ju"},{"@pid":"97/3817","text":"Jong Chul Lee"},{"@pid":"78/4299","text":"Kyoung Jun Lee"}]},"title":"Ubiquitous Business Model by Seamless Integration of Photo and Location Information.","venue":"APSCC","pages":"1527-1532","year":"2008","type":"Conference and Workshop Papers","access":"closed","key":"conf/apscc/JuLL08","doi":"10.1109/APSCC.2008.83","ee":"https://doi.org/10.1109/APSCC.2008.83","url":"https://dblp.org/rec/conf/apscc/JuLL08"}, "url":"URL#5297503" }, { "@score":"1", "@id":"5297504", "info":{"authors":{"author":[{"@pid":"39/7828","text":"Jungho Jun"},{"@pid":"78/4299","text":"Kyoung Jun Lee"}]},"title":"Design of Tag Match Advertising System and the Evaluation of the Business Model.","venue":"APSCC","pages":"1533-1537","year":"2008","type":"Conference and Workshop Papers","access":"closed","key":"conf/apscc/JunL08","doi":"10.1109/APSCC.2008.80","ee":"https://doi.org/10.1109/APSCC.2008.80","url":"https://dblp.org/rec/conf/apscc/JunL08"}, "url":"URL#5297504" }, { "@score":"1", "@id":"5297505", "info":{"authors":{"author":[{"@pid":"55/1425","text":"Wen-Hsing Kao"},{"@pid":"59/6282","text":"Jason C. Hung"},{"@pid":"59/5476","text":"Victoria Hsu"}]},"title":"Using Data Mining Techniques in Development of MURA Geometric Prediction Module for Large Area Photomask.","venue":"APSCC","pages":"957-962","year":"2008","type":"Conference and Workshop Papers","access":"closed","key":"conf/apscc/KaoHH08","doi":"10.1109/APSCC.2008.76","ee":"https://doi.org/10.1109/APSCC.2008.76","url":"https://dblp.org/rec/conf/apscc/KaoHH08"}, "url":"URL#5297505" }, { "@score":"1", "@id":"5297506", "info":{"authors":{"author":[{"@pid":"35/4102","text":"Fu-Chien Kao"},{"@pid":"99/7826","text":"Yun-Sheng Tsai"},{"@pid":"24/3325","text":"Andy S. Chiou"},{"@pid":"54/7827","text":"Shinping R. Wang"},{"@pid":"55/3015","text":"Chang-Yu Huang"}]},"title":"The Design of Intelligent Sensor Network Based on Grid Structure.","venue":"APSCC","pages":"623-630","year":"2008","type":"Conference and Workshop Papers","access":"closed","key":"conf/apscc/KaoTCWH08","doi":"10.1109/APSCC.2008.12","ee":"https://doi.org/10.1109/APSCC.2008.12","url":"https://dblp.org/rec/conf/apscc/KaoTCWH08"}, "url":"URL#5297506" }, { "@score":"1", "@id":"5297507", "info":{"authors":{"author":[{"@pid":"81/3048","text":"Da-Yu Kao"},{"@pid":"66/3674","text":"Shiuh-Jeng Wang"},{"@pid":"32/7828","text":"Kush Mathur"},{"@pid":"18/7828","text":"Saransh Jain"},{"@pid":"88/3259","text":"Frank Fu-Yuan Huang"}]},"title":"Privacy Concealments: Detective Strategies Unveiling Cyberstalking on Internet.","venue":"APSCC","pages":"1364-1368","year":"2008","type":"Conference and Workshop Papers","access":"closed","key":"conf/apscc/KaoWMJH08","doi":"10.1109/APSCC.2008.106","ee":"https://doi.org/10.1109/APSCC.2008.106","url":"https://dblp.org/rec/conf/apscc/KaoWMJH08"}, "url":"URL#5297507" }, { "@score":"1", "@id":"5297508", "info":{"authors":{"author":[{"@pid":"00/7828","text":"Kapil Kapani"},{"@pid":"g/ArobindaGupta","text":"Arobinda Gupta"}]},"title":"Influencing Models in Automated One-to-Many Negotiation.","venue":"APSCC","pages":"439-444","year":"2008","type":"Conference and Workshop Papers","access":"closed","key":"conf/apscc/KapaniG08","doi":"10.1109/APSCC.2008.185","ee":"https://doi.org/10.1109/APSCC.2008.185","url":"https://dblp.org/rec/conf/apscc/KapaniG08"}, "url":"URL#5297508" }, { "@score":"1", "@id":"5297509", "info":{"authors":{"author":[{"@pid":"81/10","text":"Takashi Kato"},{"@pid":"11/6798","text":"Kohei Kadowaki"},{"@pid":"78/3906","text":"Takahiro Koita"},{"@pid":"14/2582","text":"Kenya Sato"}]},"title":"Routing and Address Assignment Using Lane/Position Information in a Vehicular Ad Hoc Network.","venue":"APSCC","pages":"1600-1605","year":"2008","type":"Conference and Workshop Papers","access":"closed","key":"conf/apscc/KatoKKS08","doi":"10.1109/APSCC.2008.298","ee":"https://doi.org/10.1109/APSCC.2008.298","url":"https://dblp.org/rec/conf/apscc/KatoKKS08"}, "url":"URL#5297509" }, { "@score":"1", "@id":"5297510", "info":{"authors":{"author":[{"@pid":"73/7073","text":"Ali Khalili"},{"@pid":"98/106","text":"Shahriar Mohammadi"}]},"title":"Using Logically Hierarchical Meta Web Services to Support Accountability in Mashup Services.","venue":"APSCC","pages":"410-415","year":"2008","type":"Conference and Workshop Papers","access":"closed","key":"conf/apscc/KhaliliM08","doi":"10.1109/APSCC.2008.55","ee":"https://doi.org/10.1109/APSCC.2008.55","url":"https://dblp.org/rec/conf/apscc/KhaliliM08"}, "url":"URL#5297510" }, { "@score":"1", "@id":"5297511", "info":{"authors":{"author":[{"@pid":"43/934","text":"Do-Hoon Kim"},{"@pid":"29/233","text":"Taek Lee"},{"@pid":"i/HohPeterIn","text":"Hoh Peter In"}]},"title":"Effective Security Safeguard Selection Process for Return on Security Investment.","venue":"APSCC","pages":"668-673","year":"2008","type":"Conference and Workshop Papers","access":"closed","key":"conf/apscc/KimLI08","doi":"10.1109/APSCC.2008.182","ee":"https://doi.org/10.1109/APSCC.2008.182","url":"https://dblp.org/rec/conf/apscc/KimLI08"}, "url":"URL#5297511" }, { "@score":"1", "@id":"5297512", "info":{"authors":{"author":[{"@pid":"17/2037","text":"Ku-Jin Kim"},{"@pid":"46/1768","text":"Sun-Mi Park"},{"@pid":"19/4633","text":"Yoo-Joo Choi"}]},"title":"Deciding the Number of Color Histogram Bins for Vehicle Color Recognition.","venue":"APSCC","pages":"134-138","year":"2008","type":"Conference and Workshop Papers","access":"closed","key":"conf/apscc/KimPC08","doi":"10.1109/APSCC.2008.207","ee":"https://doi.org/10.1109/APSCC.2008.207","url":"https://dblp.org/rec/conf/apscc/KimPC08"}, "url":"URL#5297512" }, { "@score":"1", "@id":"5297513", "info":{"authors":{"author":[{"@pid":"17/2037","text":"Ku-Jin Kim"},{"@pid":"46/1768","text":"Sun-Mi Park"},{"@pid":"19/4633","text":"Yoo-Joo Choi"}]},"title":"Clothing Identification Based on Edge Information.","venue":"APSCC","pages":"876-880","year":"2008","type":"Conference and Workshop Papers","access":"closed","key":"conf/apscc/KimPC08a","doi":"10.1109/APSCC.2008.205","ee":"https://doi.org/10.1109/APSCC.2008.205","url":"https://dblp.org/rec/conf/apscc/KimPC08a"}, "url":"URL#5297513" }, { "@score":"1", "@id":"5297514", "info":{"authors":{"author":[{"@pid":"30/2488","text":"Mijeom Kim"},{"@pid":"67/614","text":"Jinsoo Park"},{"@pid":"85/2527","text":"Jaeyoung Oh"},{"@pid":"44/4079","text":"Hakjin Chong"},{"@pid":"97/2538","text":"Yoonkee Kim"}]},"title":"Study on Network Architecture for Traffic Information Collection Systems Based on RFID Technology.","venue":"APSCC","pages":"63-68","year":"2008","type":"Conference and Workshop Papers","access":"closed","key":"conf/apscc/KimPOCK08","doi":"10.1109/APSCC.2008.170","ee":"https://doi.org/10.1109/APSCC.2008.170","url":"https://dblp.org/rec/conf/apscc/KimPOCK08"}, "url":"URL#5297514" }, { "@score":"1", "@id":"5297515", "info":{"authors":{"author":{"@pid":"k/MarkusKirchberg","text":"Markus Kirchberg"}},"title":"Abstract State Machine Models for Basic Service-Oriented Architectures.","venue":"APSCC","pages":"445-452","year":"2008","type":"Conference and Workshop Papers","access":"closed","key":"conf/apscc/Kirchberg08","doi":"10.1109/APSCC.2008.21","ee":"https://doi.org/10.1109/APSCC.2008.21","url":"https://dblp.org/rec/conf/apscc/Kirchberg08"}, "url":"URL#5297515" }, { "@score":"1", "@id":"5297516", "info":{"authors":{"author":[{"@pid":"56/7448","text":"Atsushi Koide"},{"@pid":"73/5733","text":"Raylin Tso"},{"@pid":"85/1299","text":"Takeshi Okamoto"},{"@pid":"74/2114","text":"Eiji Okamoto"}]},"title":"A Restricted Undeniable Designated Verifier Signature.","venue":"APSCC","pages":"1375-1380","year":"2008","type":"Conference and Workshop Papers","access":"closed","key":"conf/apscc/KoideTOO08","doi":"10.1109/APSCC.2008.134","ee":"https://doi.org/10.1109/APSCC.2008.134","url":"https://dblp.org/rec/conf/apscc/KoideTOO08"}, "url":"URL#5297516" }, { "@score":"1", "@id":"5297517", "info":{"authors":{"author":{"@pid":"64/7560","text":"Weiguang Kong"}},"title":"Web-Based Request Behavior Comprehension.","venue":"APSCC","pages":"1556-1559","year":"2008","type":"Conference and Workshop Papers","access":"closed","key":"conf/apscc/Kong08","doi":"10.1109/APSCC.2008.84","ee":"https://doi.org/10.1109/APSCC.2008.84","url":"https://dblp.org/rec/conf/apscc/Kong08"}, "url":"URL#5297517" }, { "@score":"1", "@id":"5297518", "info":{"authors":{"author":[{"@pid":"77/4697","text":"Aman Kumar"},{"@pid":"06/7159","text":"Preethi Raghavan"},{"@pid":"89/1528","text":"Jay Ramanathan"},{"@pid":"23/1595","text":"Rajiv Ramnath"}]},"title":"Enterprise Interaction Ontology for Change Impact Analysis of Complex Systems.","venue":"APSCC","pages":"303-309","year":"2008","type":"Conference and Workshop Papers","access":"closed","key":"conf/apscc/KumarRRR08","doi":"10.1109/APSCC.2008.200","ee":"https://doi.org/10.1109/APSCC.2008.200","url":"https://dblp.org/rec/conf/apscc/KumarRRR08"}, "url":"URL#5297518" }, { "@score":"1", "@id":"5297519", "info":{"authors":{"author":[{"@pid":"04/5947","text":"Yaw-Wen Kuo"},{"@pid":"84/7826","text":"Tung-Lin Tsai"}]},"title":"On Achieving Maximum Channel Utilization for IEEE 802.11n WLAN.","venue":"APSCC","pages":"1168-1172","year":"2008","type":"Conference and Workshop Papers","access":"closed","key":"conf/apscc/KuoT08","doi":"10.1109/APSCC.2008.90","ee":"https://doi.org/10.1109/APSCC.2008.90","url":"https://dblp.org/rec/conf/apscc/KuoT08"}, "url":"URL#5297519" }, { "@score":"1", "@id":"5297520", "info":{"authors":{"author":[{"@pid":"24/5449","text":"Hong Feng Lai"},{"@pid":"08/7828","text":"J. L. Hong"},{"@pid":"76/7827","text":"Wang Han Jeng"}]},"title":"Model E-contract Update by Coloured Activity Net.","venue":"APSCC","pages":"488-493","year":"2008","type":"Conference and Workshop Papers","access":"closed","key":"conf/apscc/LaiHJ08","doi":"10.1109/APSCC.2008.191","ee":"https://doi.org/10.1109/APSCC.2008.191","url":"https://dblp.org/rec/conf/apscc/LaiHJ08"}, "url":"URL#5297520" }, { "@score":"1", "@id":"5297521", "info":{"authors":{"author":[{"@pid":"88/6609","text":"Gibson Lam"},{"@pid":"10/2815","text":"David Rossiter"}]},"title":"A SOAP-Based Streaming Content Delivery Framework for Multimedia Web Services.","venue":"APSCC","pages":"1097-1102","year":"2008","type":"Conference and Workshop Papers","access":"closed","key":"conf/apscc/LamR08","doi":"10.1109/APSCC.2008.18","ee":"https://doi.org/10.1109/APSCC.2008.18","url":"https://dblp.org/rec/conf/apscc/LamR08"}, "url":"URL#5297521" }, { "@score":"1", "@id":"5297522", "info":{"authors":{"author":[{"@pid":"56/6126","text":"Nuno Laranjeiro"},{"@pid":"14/6260","text":"Marco Vieira"},{"@pid":"33/2879","text":"Henrique Madeira"}]},"title":"Timing Failures Detection in Web Services.","venue":"APSCC","pages":"554-559","year":"2008","type":"Conference and Workshop Papers","access":"closed","key":"conf/apscc/LaranjeiroVM08","doi":"10.1109/APSCC.2008.236","ee":"https://doi.org/10.1109/APSCC.2008.236","url":"https://dblp.org/rec/conf/apscc/LaranjeiroVM08"}, "url":"URL#5297522" }, { "@score":"1", "@id":"5297523", "info":{"authors":{"author":[{"@pid":"77/6612","text":"Chin-Feng Lee"},{"@pid":"03/7827","text":"Lin-Yi Chuang"},{"@pid":"c/ChinChenChang","text":"Chin-Chen Chang 0001"}]},"title":"Hiding Information Employing Reduplicating Embedding.","venue":"APSCC","pages":"825-828","year":"2008","type":"Conference and Workshop Papers","access":"closed","key":"conf/apscc/LeeCC08","doi":"10.1109/APSCC.2008.50","ee":"https://doi.org/10.1109/APSCC.2008.50","url":"https://dblp.org/rec/conf/apscc/LeeCC08"}, "url":"URL#5297523" }, { "@score":"1", "@id":"5297524", "info":{"authors":{"author":[{"@pid":"48/1708","text":"Chiou-Yng Lee"},{"@pid":"97/6785","text":"Pramod Kumar Meher"}]},"title":"Efficient Bit-Parallel Multipliers in Composite Fields.","venue":"APSCC","pages":"686-691","year":"2008","type":"Conference and Workshop Papers","access":"closed","key":"conf/apscc/LeeM08","doi":"10.1109/APSCC.2008.103","ee":"https://doi.org/10.1109/APSCC.2008.103","url":"https://dblp.org/rec/conf/apscc/LeeM08"}, "url":"URL#5297524" }, { "@score":"1", "@id":"5297525", "info":{"authors":{"author":[{"@pid":"57/6966","text":"Chang-Hsing Lee"},{"@pid":"43/393","text":"Jau-Ling Shih"},{"@pid":"16/221","text":"Kun-Ming Yu"},{"@pid":"80/7827","text":"Hwai-San Lin"},{"@pid":"52/7827","text":"Ming-Hui Wei"}]},"title":"Fusion of Static and Transitional Information of Cepstral and Spectral Features for Music Genre Classification.","venue":"APSCC","pages":"751-756","year":"2008","type":"Conference and Workshop Papers","access":"closed","key":"conf/apscc/LeeSYLW08","doi":"10.1109/APSCC.2008.95","ee":"https://doi.org/10.1109/APSCC.2008.95","url":"https://dblp.org/rec/conf/apscc/LeeSYLW08"}, "url":"URL#5297525" }, { "@score":"1", "@id":"5297526", "info":{"authors":{"author":[{"@pid":"84/7827","text":"Ying Lee"},{"@pid":"09/5469","text":"Chien-Hung Wei"}]},"title":"A Computerized Feature Reduction Using Cluster Methods for Accident Duration Forecasting on Freeway.","venue":"APSCC","pages":"1459-1464","year":"2008","type":"Conference and Workshop Papers","access":"closed","key":"conf/apscc/LeeW08","doi":"10.1109/APSCC.2008.36","ee":"https://doi.org/10.1109/APSCC.2008.36","url":"https://dblp.org/rec/conf/apscc/LeeW08"}, "url":"URL#5297526" }, { "@score":"1", "@id":"5297527", "info":{"authors":{"author":[{"@pid":"53/1886","text":"Jenq-Shiou Leu"},{"@pid":"70/1798","text":"Hui-Ching Hsieh"},{"@pid":"08/3359","text":"Yen-Chiu Chen"},{"@pid":"61/861","text":"Yuan-Po Chi"}]},"title":"Design and Implementation of a Low Cost DNS-Based Load Balancing Solution for the SIP-Based VoIP Service.","venue":"APSCC","pages":"310-314","year":"2008","type":"Conference and Workshop Papers","access":"closed","key":"conf/apscc/LeuHCC08","doi":"10.1109/APSCC.2008.42","ee":"https://doi.org/10.1109/APSCC.2008.42","url":"https://dblp.org/rec/conf/apscc/LeuHCC08"}, "url":"URL#5297527" }, { "@score":"1", "@id":"5297528", "info":{"authors":{"author":[{"@pid":"08/6548","text":"Wenjing Li"},{"@pid":"38/7828","text":"Yucheng Guo"},{"@pid":"35/7636","text":"Weizhi Liao"},{"@pid":"28/7828","text":"Rongwei Hang"}]},"title":"Research on Ontology Component Description Model Based on the Semantic Web.","venue":"APSCC","pages":"697-702","year":"2008","type":"Conference and Workshop Papers","access":"closed","key":"conf/apscc/LiGLH08","doi":"10.1109/APSCC.2008.146","ee":"https://doi.org/10.1109/APSCC.2008.146","url":"https://dblp.org/rec/conf/apscc/LiGLH08"}, "url":"URL#5297528" }, { "@score":"1", "@id":"5297529", "info":{"authors":{"author":[{"@pid":"81/3199","text":"Gexin Li"},{"@pid":"12/7828","text":"Haijiang Hai"},{"@pid":"25/7828","text":"Zhiwen Hu"}]},"title":"A Flexible Framework for Semi-automatic Web Services Composition.","venue":"APSCC","pages":"1258-1262","year":"2008","type":"Conference and Workshop Papers","access":"closed","key":"conf/apscc/LiHH08","doi":"10.1109/APSCC.2008.152","ee":"https://doi.org/10.1109/APSCC.2008.152","url":"https://dblp.org/rec/conf/apscc/LiHH08"}, "url":"URL#5297529" }, { "@score":"1", "@id":"5297530", "info":{"authors":{"author":[{"@pid":"00/1996","text":"Peifeng Li"},{"@pid":"50/7827","text":"Qin Ji"},{"@pid":"11/5325","text":"Yuhua Zhang"},{"@pid":"28/1279","text":"Qiaoming Zhu"}]},"title":"An Adaptive Chunk Self-Scheduling Scheme on Service Grid.","venue":"APSCC","pages":"39-44","year":"2008","type":"Conference and Workshop Papers","access":"closed","key":"conf/apscc/LiJZZ08","doi":"10.1109/APSCC.2008.101","ee":"https://doi.org/10.1109/APSCC.2008.101","url":"https://dblp.org/rec/conf/apscc/LiJZZ08"}, "url":"URL#5297530" }, { "@score":"1", "@id":"5297531", "info":{"authors":{"author":[{"@pid":"l/YunfaLi","text":"Yunfa Li 0001"},{"@pid":"63/792","text":"Xianghua Xu"},{"@pid":"87/2888-1","text":"Jian Wan 0001"},{"@pid":"98/4156","text":"Hai Jin 0001"},{"@pid":"h/ZongfenHan","text":"Zongfen Han"}]},"title":"Aeolus: Reconcilable Key Management Mechanism for Secure Group Communication in Grid.","venue":"APSCC","pages":"1-7","year":"2008","type":"Conference and Workshop Papers","access":"closed","key":"conf/apscc/LiXWJH08","doi":"10.1109/APSCC.2008.227","ee":"https://doi.org/10.1109/APSCC.2008.227","url":"https://dblp.org/rec/conf/apscc/LiXWJH08"}, "url":"URL#5297531" }, { "@score":"1", "@id":"5297532", "info":{"authors":{"author":[{"@pid":"62/2673","text":"Rung-Huei Liang"},{"@pid":"09/7827","text":"Yin-Huan Chen"}]},"title":"Planning Locative Media within Physical Space and Collaborative Workspace.","venue":"APSCC","pages":"863-868","year":"2008","type":"Conference and Workshop Papers","access":"closed","key":"conf/apscc/LiangC08","doi":"10.1109/APSCC.2008.178","ee":"https://doi.org/10.1109/APSCC.2008.178","url":"https://dblp.org/rec/conf/apscc/LiangC08"}, "url":"URL#5297532" }, { "@score":"1", "@id":"5297533", "info":{"authors":{"author":[{"@pid":"65/4912","text":"Tyng-Yeu Liang"},{"@pid":"81/2768","text":"Siou-Ying Wang"},{"@pid":"20/7828","text":"I-Han Wu"}]},"title":"Using Frequent Workload Patterns in Resource Selection for Grid Jobs.","venue":"APSCC","pages":"807-812","year":"2008","type":"Conference and Workshop Papers","access":"closed","key":"conf/apscc/LiangWW08","doi":"10.1109/APSCC.2008.217","ee":"https://doi.org/10.1109/APSCC.2008.217","url":"https://dblp.org/rec/conf/apscc/LiangWW08"}, "url":"URL#5297533" }, { "@score":"1", "@id":"5297534", "info":{"authors":{"author":[{"@pid":"96/2533","text":"Gen-Yih Liao"},{"@pid":"51/7827","text":"Hsiu-Fen Hsieh"}]},"title":"Analyzing Security of RFID Tag Reading Protocols Based on Binary Tree Traversal.","venue":"APSCC","pages":"1199-1201","year":"2008","type":"Conference and Workshop Papers","access":"closed","key":"conf/apscc/LiaoH08","doi":"10.1109/APSCC.2008.115","ee":"https://doi.org/10.1109/APSCC.2008.115","url":"https://dblp.org/rec/conf/apscc/LiaoH08"}, "url":"URL#5297534" }, { "@score":"1", "@id":"5297535", "info":{"authors":{"author":[{"@pid":"48/112","text":"Chun-Feng Liao"},{"@pid":"31/768","text":"Ya-Wen Jong"},{"@pid":"95/245","text":"Li-Chen Fu"}]},"title":"PSMP: A Fast Self-Healing and Self-Organizing Pervasive Service Management Protocol for Smart Home Environments.","venue":"APSCC","pages":"574-579","year":"2008","type":"Conference and Workshop Papers","access":"closed","key":"conf/apscc/LiaoJF08","doi":"10.1109/APSCC.2008.11","ee":"https://doi.org/10.1109/APSCC.2008.11","url":"https://dblp.org/rec/conf/apscc/LiaoJF08"}, "url":"URL#5297535" }, { "@score":"1", "@id":"5297536", "info":{"authors":{"author":[{"@pid":"94/7296","text":"Che-hui Lien"},{"@pid":"95/5320","text":"Jyh-Jeng Wu"}]},"title":"An Empirical Study of Sellers' Information Manipulation in the Online Auction Market.","venue":"APSCC","pages":"1177-1180","year":"2008","type":"Conference and Workshop Papers","access":"closed","key":"conf/apscc/LienW08","doi":"10.1109/APSCC.2008.172","ee":"https://doi.org/10.1109/APSCC.2008.172","url":"https://dblp.org/rec/conf/apscc/LienW08"}, "url":"URL#5297536" }, { "@score":"1", "@id":"5297537", "info":{"authors":{"author":[{"@pid":"11/2723","text":"Yao-Nan Lien"},{"@pid":"85/7827","text":"Yi-Fan Yu"}]},"title":"Hop-by-Hop TCP over MANET.","venue":"APSCC","pages":"1150-1155","year":"2008","type":"Conference and Workshop Papers","access":"closed","key":"conf/apscc/LienY08","doi":"10.1109/APSCC.2008.93","ee":"https://doi.org/10.1109/APSCC.2008.93","url":"https://dblp.org/rec/conf/apscc/LienY08"}, "url":"URL#5297537" }, { "@score":"1", "@id":"5297538", "info":{"authors":{"author":[{"@pid":"53/7827","text":"Ching-Huang Lin"},{"@pid":"01/1814","text":"Chih-Hao Chen"},{"@pid":"48/6439","text":"Chi-Sung Laih"}]},"title":"A Study and Implementation of Vulnerability Assessment and Misconfiguration Detection.","venue":"APSCC","pages":"1252-1257","year":"2008","type":"Conference and Workshop Papers","access":"closed","key":"conf/apscc/LinCL08","doi":"10.1109/APSCC.2008.212","ee":"https://doi.org/10.1109/APSCC.2008.212","url":"https://dblp.org/rec/conf/apscc/LinCL08"}, "url":"URL#5297538" }, { "@score":"1", "@id":"5297539", "info":{"authors":{"author":[{"@pid":"84/1015","text":"Cha-Hwa Lin"},{"@pid":"63/7827","text":"Kai-Pei Chen"},{"@pid":"60/3791","text":"Chih-Hung Tsai"}]},"title":"Modeling the Examinee Ability on the Computerized Adaptive Testing Using Adaptive Network-Based Fuzzy Inference System.","venue":"APSCC","pages":"139-144","year":"2008","type":"Conference and Workshop Papers","access":"closed","key":"conf/apscc/LinCT08","doi":"10.1109/APSCC.2008.53","ee":"https://doi.org/10.1109/APSCC.2008.53","url":"https://dblp.org/rec/conf/apscc/LinCT08"}, "url":"URL#5297539" }, { "@score":"1", "@id":"5297540", "info":{"authors":{"author":[{"@pid":"95/7827","text":"Shih-Jie Lin"},{"@pid":"14/7828","text":"Min-Chun Huang"},{"@pid":"58/2995","text":"Kuan-Chou Lai"},{"@pid":"10/3894","text":"Kuo-Chan Huang"}]},"title":"Design and Implementation of Job Migration Policies in P2P Grid Systems.","venue":"APSCC","pages":"75-80","year":"2008","type":"Conference and Workshop Papers","access":"closed","key":"conf/apscc/LinHLH08","doi":"10.1109/APSCC.2008.246","ee":"https://doi.org/10.1109/APSCC.2008.246","url":"https://dblp.org/rec/conf/apscc/LinHLH08"}, "url":"URL#5297540" }, { "@score":"1", "@id":"5297541", "info":{"authors":{"author":[{"@pid":"63/5777","text":"Donghui Lin"},{"@pid":"71/5163","text":"Toru Ishida 0001"}]},"title":"Interorganizational Workflow Collaboration Based on Local Process Views.","venue":"APSCC","pages":"789-794","year":"2008","type":"Conference and Workshop Papers","access":"closed","key":"conf/apscc/LinI08","doi":"10.1109/APSCC.2008.171","ee":"https://doi.org/10.1109/APSCC.2008.171","url":"https://dblp.org/rec/conf/apscc/LinI08"}, "url":"URL#5297541" }, { "@score":"1", "@id":"5297542", "info":{"authors":{"author":[{"@pid":"46/7827","text":"Wen-Kung Lin"},{"@pid":"30/7827","text":"Chieh-Peng Lin"},{"@pid":"94/7826","text":"Chou-Kang Chiu"}]},"title":"Understanding Cyber Trust Using a Triadic Functioning Analysis.","venue":"APSCC","pages":"662-667","year":"2008","type":"Conference and Workshop Papers","access":"closed","key":"conf/apscc/LinLC08","doi":"10.1109/APSCC.2008.58","ee":"https://doi.org/10.1109/APSCC.2008.58","url":"https://dblp.org/rec/conf/apscc/LinLC08"}, "url":"URL#5297542" }, { "@score":"1", "@id":"5297543", "info":{"authors":{"author":[{"@pid":"28/7827","text":"Huiping Lin"},{"@pid":"03/5747-3","text":"Sheng Liu 0003"},{"@pid":"90/5039","text":"Yushun Fan"}]},"title":"Service-Oriented Enterprise Cooperation: Modeling Method and System.","venue":"APSCC","pages":"1032-1037","year":"2008","type":"Conference and Workshop Papers","access":"closed","key":"conf/apscc/LinLF08","doi":"10.1109/APSCC.2008.119","ee":"https://doi.org/10.1109/APSCC.2008.119","url":"https://dblp.org/rec/conf/apscc/LinLF08"}, "url":"URL#5297543" }, { "@score":"1", "@id":"5297544", "info":{"authors":{"author":[{"@pid":"13/7828","text":"Lee-kuo Lin"},{"@pid":"61/6160","text":"Chiu-Ching Tuan"},{"@pid":"29/7827","text":"Che-jen Cnen"}]},"title":"Application and Evaluation of Wireless Transmission Technique at Construction Job-site.","venue":"APSCC","pages":"963-968","year":"2008","type":"Conference and Workshop Papers","access":"closed","key":"conf/apscc/LinTC08","doi":"10.1109/APSCC.2008.214","ee":"https://doi.org/10.1109/APSCC.2008.214","url":"https://dblp.org/rec/conf/apscc/LinTC08"}, "url":"URL#5297544" }, { "@score":"1", "@id":"5297545", "info":{"authors":{"author":[{"@pid":"71/7827","text":"Chwen-Yea Lin"},{"@pid":"17/7827","text":"Chien-Chung Tu"},{"@pid":"36/3586","text":"Kwoting Fang"}]},"title":"Modeling the Trust with ECT in E-auction Loyalty.","venue":"APSCC","pages":"851-855","year":"2008","type":"Conference and Workshop Papers","access":"closed","key":"conf/apscc/LinTF08","doi":"10.1109/APSCC.2008.224","ee":"https://doi.org/10.1109/APSCC.2008.224","url":"https://dblp.org/rec/conf/apscc/LinTF08"}, "url":"URL#5297545" }, { "@score":"1", "@id":"5297546", "info":{"authors":{"author":[{"@pid":"74/4651","text":"Chi-Yi Lin"},{"@pid":"47/2345","text":"Szu-Chi Wang"}]},"title":"Beyond Smart: Enabling Cognition in a Wireless Home Network Environment.","venue":"APSCC","pages":"1246-1251","year":"2008","type":"Conference and Workshop Papers","access":"closed","key":"conf/apscc/LinW08","doi":"10.1109/APSCC.2008.210","ee":"https://doi.org/10.1109/APSCC.2008.210","url":"https://dblp.org/rec/conf/apscc/LinW08"}, "url":"URL#5297546" }, { "@score":"1", "@id":"5297547", "info":{"authors":{"author":[{"@pid":"13/5658","text":"Jun-Lin Lin"},{"@pid":"43/3553","text":"Meng-Cheng Wei"},{"@pid":"67/7827","text":"Chih-Wen Li"},{"@pid":"82/7826","text":"Kuo-Chiang Hsieh"}]},"title":"A Hybrid Method for k-Anonymization.","venue":"APSCC","pages":"385-390","year":"2008","type":"Conference and Workshop Papers","access":"closed","key":"conf/apscc/LinWLH08","doi":"10.1109/APSCC.2008.65","ee":"https://doi.org/10.1109/APSCC.2008.65","url":"https://dblp.org/rec/conf/apscc/LinWLH08"}, "url":"URL#5297547" }, { "@score":"1", "@id":"5297548", "info":{"authors":{"author":{"@pid":"05/7828","text":"Chung-Hsin Liu"}},"title":"The Study of the Handoff for the Wireless Network.","venue":"APSCC","pages":"937-941","year":"2008","type":"Conference and Workshop Papers","access":"closed","key":"conf/apscc/Liu08","doi":"10.1109/APSCC.2008.7","ee":"https://doi.org/10.1109/APSCC.2008.7","url":"https://dblp.org/rec/conf/apscc/Liu08"}, "url":"URL#5297548" }, { "@score":"1", "@id":"5297549", "info":{"authors":{"author":[{"@pid":"76/2713","text":"Yuhua Liu"},{"@pid":"65/6146","text":"Hongcai Chen"},{"@pid":"51/3159","text":"Chun Yang"},{"@pid":"66/7827","text":"Huaqiang Pan"}]},"title":"A Small World Architecture for P2P Networks.","venue":"APSCC","pages":"52-56","year":"2008","type":"Conference and Workshop Papers","access":"closed","key":"conf/apscc/LiuCYP08","doi":"10.1109/APSCC.2008.52","ee":"https://doi.org/10.1109/APSCC.2008.52","url":"https://dblp.org/rec/conf/apscc/LiuCYP08"}, "url":"URL#5297549" }, { "@score":"1", "@id":"5297550", "info":{"authors":{"author":[{"@pid":"05/7828","text":"Chung-Hsin Liu"},{"@pid":"36/7827","text":"Chih-Chieh Fan"}]},"title":"Zigbee- Research into Integrated Real-Time Located Systems.","venue":"APSCC","pages":"942-947","year":"2008","type":"Conference and Workshop Papers","access":"closed","key":"conf/apscc/LiuF08","doi":"10.1109/APSCC.2008.96","ee":"https://doi.org/10.1109/APSCC.2008.96","url":"https://dblp.org/rec/conf/apscc/LiuF08"}, "url":"URL#5297550" }, { "@score":"1", "@id":"5297551", "info":{"authors":{"author":[{"@pid":"99/1376","text":"Huai-Jen Liu"},{"@pid":"90/7826","text":"Pang-Shih Liu"}]},"title":"Hierarchical Routing Architecture for Integrating IPv4 and IPv6 Networks.","venue":"APSCC","pages":"703-706","year":"2008","type":"Conference and Workshop Papers","access":"closed","key":"conf/apscc/LiuL08","doi":"10.1109/APSCC.2008.128","ee":"https://doi.org/10.1109/APSCC.2008.128","url":"https://dblp.org/rec/conf/apscc/LiuL08"}, "url":"URL#5297551" }, { "@score":"1", "@id":"5297552", "info":{"authors":{"author":[{"@pid":"34/5678","text":"Zhaobin Liu"},{"@pid":"10/1531","text":"Wenyu Qu"},{"@pid":"21/6280","text":"Keqiu Li"}]},"title":"Autonomic Model for Service-Aware Storage.","venue":"APSCC","pages":"373-377","year":"2008","type":"Conference and Workshop Papers","access":"closed","key":"conf/apscc/LiuQL08","doi":"10.1109/APSCC.2008.262","ee":"https://doi.org/10.1109/APSCC.2008.262","url":"https://dblp.org/rec/conf/apscc/LiuQL08"}, "url":"URL#5297552" }, { "@score":"1", "@id":"5297553", "info":{"authors":{"author":[{"@pid":"67/6169","text":"Linlan Liu"},{"@pid":"78/6838","text":"Jian Shu"},{"@pid":"83/7827","text":"Binquan Chen"},{"@pid":"18/7827","text":"Shuangjian Liang"}]},"title":"An Load Balancing Strategy of FTP Server-Cluster Based on JXTA.","venue":"APSCC","pages":"707-711","year":"2008","type":"Conference and Workshop Papers","access":"closed","key":"conf/apscc/LiuSCL08","doi":"10.1109/APSCC.2008.40","ee":"https://doi.org/10.1109/APSCC.2008.40","url":"https://dblp.org/rec/conf/apscc/LiuSCL08"}, "url":"URL#5297553" }, { "@score":"1", "@id":"5297554", "info":{"authors":{"author":[{"@pid":"14/2536","text":"Yanguo Liu"},{"@pid":"10/1711","text":"Issa Traoré"},{"@pid":"37/3214","text":"Alexander M. Hoole"}]},"title":"A Service-Oriented Framework for Quantitative Security Analysis of Software Architectures.","venue":"APSCC","pages":"1231-1238","year":"2008","type":"Conference and Workshop Papers","access":"closed","key":"conf/apscc/LiuTH08","doi":"10.1109/APSCC.2008.17","ee":"https://doi.org/10.1109/APSCC.2008.17","url":"https://dblp.org/rec/conf/apscc/LiuTH08"}, "url":"URL#5297554" }, { "@score":"1", "@id":"5297555", "info":{"authors":{"author":[{"@pid":"04/7828","text":"Ting-Kuo Liu"},{"@pid":"23/6835","text":"Chung-Huang Yang"}]},"title":"Design and Implementation of Campus Gate Control System Based on RFID.","venue":"APSCC","pages":"1406-1411","year":"2008","type":"Conference and Workshop Papers","access":"closed","key":"conf/apscc/LiuY08","doi":"10.1109/APSCC.2008.301","ee":"https://doi.org/10.1109/APSCC.2008.301","url":"https://dblp.org/rec/conf/apscc/LiuY08"}, "url":"URL#5297555" }, { "@score":"1", "@id":"5297556", "info":{"authors":{"author":[{"@pid":"93/7617","text":"Cancan Liu"},{"@pid":"02/6143","text":"Weimin Zhang"},{"@pid":"02/2039","text":"Zhigang Luo"},{"@pid":"46/2375-14","text":"Hai Liu 0014"},{"@pid":"98/4025","text":"Lin Xiao"}]},"title":"Service-Oriented Reliable Problem Solving Environment for Scientific Computation.","venue":"APSCC","pages":"421-426","year":"2008","type":"Conference and Workshop Papers","access":"closed","key":"conf/apscc/LiuZLLX08","doi":"10.1109/APSCC.2008.118","ee":"https://doi.org/10.1109/APSCC.2008.118","url":"https://dblp.org/rec/conf/apscc/LiuZLLX08"}, "url":"URL#5297556" }, { "@score":"1", "@id":"5297557", "info":{"authors":{"author":[{"@pid":"l/YanLiu11","text":"Yan Liu 0011"},{"@pid":"34/6446","text":"Mingguang Zhuang"},{"@pid":"61/4797","text":"Qingling Wang"},{"@pid":"22/4415","text":"Guannan Zhang"}]},"title":"A New Approach to Web Services Characterization.","venue":"APSCC","pages":"404-409","year":"2008","type":"Conference and Workshop Papers","access":"closed","key":"conf/apscc/LiuZWZ08","doi":"10.1109/APSCC.2008.226","ee":"https://doi.org/10.1109/APSCC.2008.226","url":"https://dblp.org/rec/conf/apscc/LiuZWZ08"}, "url":"URL#5297557" }, { "@score":"1", "@id":"5297558", "info":{"authors":{"author":{"@pid":"40/760","text":"Shih-Ching Lo"}},"title":"Equal Area Estimation of Three-Parameter Logistic Model for Item Response Theory.","venue":"APSCC","pages":"1447-1452","year":"2008","type":"Conference and Workshop Papers","access":"closed","key":"conf/apscc/Lo08","doi":"10.1109/APSCC.2008.31","ee":"https://doi.org/10.1109/APSCC.2008.31","url":"https://dblp.org/rec/conf/apscc/Lo08"}, "url":"URL#5297558" }, { "@score":"1", "@id":"5297559", "info":{"authors":{"author":[{"@pid":"28/4610","text":"Shuchuan Lo"},{"@pid":"99/4337","text":"Chingching Lin"},{"@pid":"15/7827","text":"Yao-Chang Chuang"}]},"title":"Using Support Vector Machine and Sequential Pattern Mining to Construct Financial Prediction Model.","venue":"APSCC","pages":"993-998","year":"2008","type":"Conference and Workshop Papers","access":"closed","key":"conf/apscc/LoLC08","doi":"10.1109/APSCC.2008.190","ee":"https://doi.org/10.1109/APSCC.2008.190","url":"https://dblp.org/rec/conf/apscc/LoLC08"}, "url":"URL#5297559" }, { "@score":"1", "@id":"5297560", "info":{"authors":{"author":[{"@pid":"13/528","text":"Louis Y. Y. Lu"},{"@pid":"99/7827","text":"Chih-Chyi Chiang"}]},"title":"Prediction Model for Warranty Costs: A Case Study of a LCD Monitor Company.","venue":"APSCC","pages":"1418-1423","year":"2008","type":"Conference and Workshop Papers","access":"closed","key":"conf/apscc/LuC08","doi":"10.1109/APSCC.2008.56","ee":"https://doi.org/10.1109/APSCC.2008.56","url":"https://dblp.org/rec/conf/apscc/LuC08"}, "url":"URL#5297560" }, { "@score":"1", "@id":"5297561", "info":{"authors":{"author":[{"@pid":"32/7736","text":"Ching-Hu Lu"},{"@pid":"71/1756","text":"Yung-Ching Lin"},{"@pid":"95/245","text":"Li-Chen Fu"}]},"title":"Hide and Not Easy to Seek: A Hybrid Weaving Strategy for Context-Aware Service Provision in a Smart Home.","venue":"APSCC","pages":"595-600","year":"2008","type":"Conference and Workshop Papers","access":"closed","key":"conf/apscc/LuLF08","doi":"10.1109/APSCC.2008.77","ee":"https://doi.org/10.1109/APSCC.2008.77","url":"https://dblp.org/rec/conf/apscc/LuLF08"}, "url":"URL#5297561" }, { "@score":"1", "@id":"5297562", "info":{"authors":{"author":[{"@pid":"76/5299","text":"Doug Lundquist"},{"@pid":"o/ArisMOuksel","text":"Aris M. Ouksel"}]},"title":"Dynamic Subscription Permission: Extending the Depth of Demand-Controlled Flooding.","venue":"APSCC","pages":"211-216","year":"2008","type":"Conference and Workshop Papers","access":"closed","key":"conf/apscc/LundquistO08","doi":"10.1109/APSCC.2008.228","ee":"https://doi.org/10.1109/APSCC.2008.228","url":"https://dblp.org/rec/conf/apscc/LundquistO08"}, "url":"URL#5297562" }, { "@score":"1", "@id":"5297563", "info":{"authors":{"author":[{"@pid":"70/4037","text":"Yingwei Luo"},{"@pid":"29/4241-1","text":"Xiaolin Wang 0001"},{"@pid":"27/5719","text":"Xinpeng Liu"},{"@pid":"48/7827","text":"Zhou Xing"},{"@pid":"88/7127","text":"Xiao Pang"},{"@pid":"71/3583","text":"Haibo Wang"}]},"title":"A Rule-Based Event Handling Model.","venue":"APSCC","pages":"869-875","year":"2008","type":"Conference and Workshop Papers","access":"closed","key":"conf/apscc/LuoWLXPW08","doi":"10.1109/APSCC.2008.48","ee":"https://doi.org/10.1109/APSCC.2008.48","url":"https://dblp.org/rec/conf/apscc/LuoWLXPW08"}, "url":"URL#5297563" }, { "@score":"1", "@id":"5297564", "info":{"authors":{"author":[{"@pid":"79/1552-8","text":"Chao Ma 0008"},{"@pid":"57/8174","text":"Yanxiang He"},{"@pid":"x/NaixueXiong","text":"Naixue Xiong"}]},"title":"MPACP: An Approach for Automatic Matching of Parallel Application Communication Patterns.","venue":"APSCC","pages":"1517-1522","year":"2008","type":"Conference and Workshop Papers","access":"closed","key":"conf/apscc/MaHX08","doi":"10.1109/APSCC.2008.54","ee":"https://doi.org/10.1109/APSCC.2008.54","url":"https://dblp.org/rec/conf/apscc/MaHX08"}, "url":"URL#5297564" }, { "@score":"1", "@id":"5297565", "info":{"authors":{"author":[{"@pid":"27/5028","text":"Wenjing Ma"},{"@pid":"05/2978","text":"Mei Song"},{"@pid":"66/4615-25","text":"Yong Zhang 0025"},{"@pid":"50/3323","text":"Xin Lin"},{"@pid":"23/1797","text":"Huan Zhang"}]},"title":"An Optimization Method to Develop AAA Architectures with MIPv6 Mobility Support.","venue":"APSCC","pages":"948-952","year":"2008","type":"Conference and Workshop Papers","access":"closed","key":"conf/apscc/MaSZLZ08","doi":"10.1109/APSCC.2008.269","ee":"https://doi.org/10.1109/APSCC.2008.269","url":"https://dblp.org/rec/conf/apscc/MaSZLZ08"}, "url":"URL#5297565" }, { "@score":"1", "@id":"5297566", "info":{"authors":{"author":[{"@pid":"62/3268","text":"Ivan Madjarov"},{"@pid":"38/3277","text":"Abdelkader Bétari"}]},"title":"Adaptive Learning Sequencing for Course Customization: A Web Service Approach.","venue":"APSCC","pages":"530-535","year":"2008","type":"Conference and Workshop Papers","access":"closed","key":"conf/apscc/MadjarovB08","doi":"10.1109/APSCC.2008.297","ee":"https://doi.org/10.1109/APSCC.2008.297","url":"https://dblp.org/rec/conf/apscc/MadjarovB08"}, "url":"URL#5297566" }, { "@score":"1", "@id":"5297567", "info":{"authors":{"author":[{"@pid":"65/572","text":"Lijun Mei"},{"@pid":"c/WingKwonChan","text":"Wing Kwong Chan"},{"@pid":"t/THTse","text":"T. H. Tse"}]},"title":"A Tale of Clouds: Paradigm Comparisons and Some Thoughts on Research Issues.","venue":"APSCC","pages":"464-469","year":"2008","type":"Conference and Workshop Papers","access":"closed","key":"conf/apscc/MeiCT08","doi":"10.1109/APSCC.2008.168","ee":"https://doi.org/10.1109/APSCC.2008.168","url":"https://dblp.org/rec/conf/apscc/MeiCT08"}, "url":"URL#5297567" }, { "@score":"1", "@id":"5297568", "info":{"authors":{"author":[{"@pid":"48/4025","text":"Daniele Messina"},{"@pid":"65/3842","text":"Marco Ortolani"},{"@pid":"24/6170","text":"Giuseppe Lo Re"}]},"title":"Adaptive Collision Avoidance through Implicit Acknowledgments in WSNs.","venue":"APSCC","pages":"1138-1143","year":"2008","type":"Conference and Workshop Papers","access":"closed","key":"conf/apscc/MessinaOR08","doi":"10.1109/APSCC.2008.162","ee":"https://doi.org/10.1109/APSCC.2008.162","url":"https://dblp.org/rec/conf/apscc/MessinaOR08"}, "url":"URL#5297568" }, { "@score":"1", "@id":"5297569", "info":{"authors":{"author":[{"@pid":"91/2944","text":"Seiya Miyazaki"},{"@pid":"91/4770","text":"Nancy R. Mead"},{"@pid":"127/0551","text":"Justin Zhan"}]},"title":"Computer-Aided Privacy Requirements Elicitation Technique.","venue":"APSCC","pages":"367-372","year":"2008","type":"Conference and Workshop Papers","access":"closed","key":"conf/apscc/MiyazakiMZ08","doi":"10.1109/APSCC.2008.263","ee":"https://doi.org/10.1109/APSCC.2008.263","url":"https://dblp.org/rec/conf/apscc/MiyazakiMZ08"}, "url":"URL#5297569" }, { "@score":"1", "@id":"5297570", "info":{"authors":{"author":[{"@pid":"99/2219","text":"Brijesh Kadri Mohandas"},{"@pid":"00/6922","text":"Amiya Nayak"},{"@pid":"n/SagarNaik","text":"Kshirasagar Naik"},{"@pid":"21/1947","text":"Nishith Goel"}]},"title":"ABSRP- A Service Discovery Approach for Vehicular Ad Hoc Networks.","venue":"APSCC","pages":"1590-1594","year":"2008","type":"Conference and Workshop Papers","access":"closed","key":"conf/apscc/MohandasNNG08","doi":"10.1109/APSCC.2008.44","ee":"https://doi.org/10.1109/APSCC.2008.44","url":"https://dblp.org/rec/conf/apscc/MohandasNNG08"}, "url":"URL#5297570" }, { "@score":"1", "@id":"5297571", "info":{"authors":{"author":[{"@pid":"79/7826","text":"Ayman Mansour Murad"},{"@pid":"36/7828","text":"Bassam Al-Mahadeen"},{"@pid":"87/7827","text":"Nuha Mansour Murad"}]},"title":"Adding Quality of Service Extensions to the Associativity Based Routing Protocol for Mobile Ad Hoc Networks (MANET).","venue":"APSCC","pages":"631-637","year":"2008","type":"Conference and Workshop Papers","access":"closed","key":"conf/apscc/MuradAM08","doi":"10.1109/APSCC.2008.234","ee":"https://doi.org/10.1109/APSCC.2008.234","url":"https://dblp.org/rec/conf/apscc/MuradAM08"}, "url":"URL#5297571" }, { "@score":"1", "@id":"5297572", "info":{"authors":{"author":[{"@pid":"47/3124","text":"Shuichi Nakanishi"},{"@pid":"98/1415","text":"Muneyuki Shimokura"},{"@pid":"71/1400","text":"Tadashi Ohta"}]},"title":"Web Service Programs Described in a Rule-Based Language.","venue":"APSCC","pages":"1506-1511","year":"2008","type":"Conference and Workshop Papers","access":"closed","key":"conf/apscc/NakanishiSO08","doi":"10.1109/APSCC.2008.62","ee":"https://doi.org/10.1109/APSCC.2008.62","url":"https://dblp.org/rec/conf/apscc/NakanishiSO08"}, "url":"URL#5297572" }, { "@score":"1", "@id":"5297573", "info":{"authors":{"author":[{"@pid":"96/775","text":"Thomas Neubauer"},{"@pid":"77/7827","text":"Jan Pichler"},{"@pid":"74/4288","text":"Christian Stummer"}]},"title":"A Case Study on the Multicriteria Selection of Software Components.","venue":"APSCC","pages":"1005-1012","year":"2008","type":"Conference and Workshop Papers","access":"closed","key":"conf/apscc/NeubauerPS08","doi":"10.1109/APSCC.2008.138","ee":"https://doi.org/10.1109/APSCC.2008.138","url":"https://dblp.org/rec/conf/apscc/NeubauerPS08"}, "url":"URL#5297573" }, { "@score":"1", "@id":"5297574", "info":{"authors":{"author":[{"@pid":"97/7826","text":"Phi Nguyen"},{"@pid":"22/1091","text":"Sam Chung"}]},"title":"Generating Semantic Web Services Using Lattices and SAWSDL.","venue":"APSCC","pages":"1061-1068","year":"2008","type":"Conference and Workshop Papers","access":"closed","key":"conf/apscc/NguyenC08","doi":"10.1109/APSCC.2008.264","ee":"https://doi.org/10.1109/APSCC.2008.264","url":"https://dblp.org/rec/conf/apscc/NguyenC08"}, "url":"URL#5297574" }, { "@score":"1", "@id":"5297575", "info":{"authors":{"author":[{"@pid":"56/1776","text":"Youcong Ni"},{"@pid":"75/3547","text":"Shi Ying"},{"@pid":"09/6686","text":"Jing Wen"},{"@pid":"68/1772","text":"Linlin Zhang"},{"@pid":"53/930-2","text":"Peng Ye 0002"},{"@pid":"02/7827","text":"Jiajing Zhang"}]},"title":"Study on Weaving Process at Software Architectural level.","venue":"APSCC","pages":"1574-1577","year":"2008","type":"Conference and Workshop Papers","access":"closed","key":"conf/apscc/NiYWZYZ08","doi":"10.1109/APSCC.2008.69","ee":"https://doi.org/10.1109/APSCC.2008.69","url":"https://dblp.org/rec/conf/apscc/NiYWZYZ08"}, "url":"URL#5297575" }, { "@score":"1", "@id":"5297576", "info":{"authors":{"author":[{"@pid":"69/7503","text":"Seung-Hee Oh"},{"@pid":"11/5783","text":"Deok-Gyu Lee"},{"@pid":"67/2956","text":"Jong Wook Han"}]},"title":"The Mechanism and Requirements for Detecting the Cross-Service Attack.","venue":"APSCC","pages":"656-661","year":"2008","type":"Conference and Workshop Papers","access":"closed","key":"conf/apscc/OhLH08","doi":"10.1109/APSCC.2008.46","ee":"https://doi.org/10.1109/APSCC.2008.46","url":"https://dblp.org/rec/conf/apscc/OhLH08"}, "url":"URL#5297576" }, { "@score":"1", "@id":"5297577", "info":{"authors":{"author":[{"@pid":"54/438","text":"Chung-Ming Ou"},{"@pid":"00/5388","text":"Chung-Ren Ou"},{"@pid":"03/2903","text":"Yao-Tien Wang"}]},"title":"Security of Mobile Agent-Based Web Applications.","venue":"APSCC","pages":"107-112","year":"2008","type":"Conference and Workshop Papers","access":"closed","key":"conf/apscc/OuOW08","doi":"10.1109/APSCC.2008.225","ee":"https://doi.org/10.1109/APSCC.2008.225","url":"https://dblp.org/rec/conf/apscc/OuOW08"}, "url":"URL#5297577" }, { "@score":"1", "@id":"5297578", "info":{"authors":{"author":[{"@pid":"84/4202","text":"Wen Ouyang"},{"@pid":"90/7827","text":"Min-Lang Chen"}]},"title":"An Optimal Web Services Integration Using Greedy Strategy.","venue":"APSCC","pages":"568-573","year":"2008","type":"Conference and Workshop Papers","access":"closed","key":"conf/apscc/OuyangC08","doi":"10.1109/APSCC.2008.174","ee":"https://doi.org/10.1109/APSCC.2008.174","url":"https://dblp.org/rec/conf/apscc/OuyangC08"}, "url":"URL#5297578" }, { "@score":"1", "@id":"5297579", "info":{"authors":{"author":[{"@pid":"62/7827","text":"Ravi Shankar Pandey"},{"@pid":"02/7828","text":"Banshidhar D. Chaudhary"}]},"title":"A Cost Model for Participating Roles Based on Choreography Semantics.","venue":"APSCC","pages":"277-283","year":"2008","type":"Conference and Workshop Papers","access":"closed","key":"conf/apscc/PandeyC08","doi":"10.1109/APSCC.2008.117","ee":"https://doi.org/10.1109/APSCC.2008.117","url":"https://dblp.org/rec/conf/apscc/PandeyC08"}, "url":"URL#5297579" }, { "@score":"1", "@id":"5297580", "info":{"authors":{"author":[{"@pid":"89/4725","text":"Mohammad Tanvir Parvez"},{"@pid":"73/3979","text":"Adnan Abdul-Aziz Gutub"}]},"title":"RGB Intensity Based Variable-Bits Image Steganography.","venue":"APSCC","pages":"1322-1327","year":"2008","type":"Conference and Workshop Papers","access":"closed","key":"conf/apscc/ParvezG08","doi":"10.1109/APSCC.2008.105","ee":"https://doi.org/10.1109/APSCC.2008.105","url":"https://dblp.org/rec/conf/apscc/ParvezG08"}, "url":"URL#5297580" }, { "@score":"1", "@id":"5297581", "info":{"authors":{"author":{"@pid":"65/1091","text":"Andreas Pashalidis"}},"title":"Measuring the Effectiveness and the Fairness of Relation Hiding Systems.","venue":"APSCC","pages":"1387-1394","year":"2008","type":"Conference and Workshop Papers","access":"closed","key":"conf/apscc/Pashalidis08","doi":"10.1109/APSCC.2008.20","ee":"https://doi.org/10.1109/APSCC.2008.20","url":"https://dblp.org/rec/conf/apscc/Pashalidis08"}, "url":"URL#5297581" }, { "@score":"1", "@id":"5297582", "info":{"authors":{"author":[{"@pid":"42/5866","text":"Pravin Pawar"},{"@pid":"94/6267","text":"Bert-Jan van Beijnum"},{"@pid":"56/2997","text":"Hermie J. Hermens"},{"@pid":"11/4008","text":"Dimitri Konstantas"}]},"title":"Analysis of Context-Aware Network Selection Schemes for Power Savings.","venue":"APSCC","pages":"587-594","year":"2008","type":"Conference and Workshop Papers","access":"closed","key":"conf/apscc/PawarBHK08","doi":"10.1109/APSCC.2008.127","ee":"https://doi.org/10.1109/APSCC.2008.127","url":"https://dblp.org/rec/conf/apscc/PawarBHK08"}, "url":"URL#5297582" }, { "@score":"1", "@id":"5297583", "info":{"authors":{"author":[{"@pid":"67/1398","text":"Kang-Lin Peng"},{"@pid":"35/7827","text":"Ming-Chu Lin"}]},"title":"Providing Service Innovation for Creative Life.","venue":"APSCC","pages":"981-986","year":"2008","type":"Conference and Workshop Papers","access":"closed","key":"conf/apscc/PengL08","doi":"10.1109/APSCC.2008.193","ee":"https://doi.org/10.1109/APSCC.2008.193","url":"https://dblp.org/rec/conf/apscc/PengL08"}, "url":"URL#5297583" }, { "@score":"1", "@id":"5297584", "info":{"authors":{"author":[{"@pid":"26/7828","text":"Jianfeng Qian"},{"@pid":"74/3786","text":"Jianwei Yin"},{"@pid":"90/6976","text":"Dongcai Shi"},{"@pid":"92/5443","text":"Jinxiang Dong"}]},"title":"Exploring a Semantic Publish/Subscribe Middleware for Event-Based SOA.","venue":"APSCC","pages":"1269-1275","year":"2008","type":"Conference and Workshop Papers","access":"closed","key":"conf/apscc/QianYSD08","doi":"10.1109/APSCC.2008.153","ee":"https://doi.org/10.1109/APSCC.2008.153","url":"https://dblp.org/rec/conf/apscc/QianYSD08"}, "url":"URL#5297584" }, { "@score":"1", "@id":"5297585", "info":{"authors":{"author":[{"@pid":"92/4578","text":"Dang Minh Quan"},{"@pid":"18/6846","text":"Jörn Altmann"},{"@pid":"y/LaurenceTianruoYang","text":"Laurence Tianruo Yang"}]},"title":"Optimizing the Execution Time of the SLA-based Workflow in the Grid with Parallel Processing Technology.","venue":"APSCC","pages":"15-20","year":"2008","type":"Conference and Workshop Papers","access":"closed","key":"conf/apscc/QuanAY08","doi":"10.1109/APSCC.2008.114","ee":"https://doi.org/10.1109/APSCC.2008.114","url":"https://dblp.org/rec/conf/apscc/QuanAY08"}, "url":"URL#5297585" }, { "@score":"1", "@id":"5297586", "info":{"authors":{"author":[{"@pid":"97/3558","text":"Tobias Queck"},{"@pid":"86/1915","text":"Björn Schünemann"},{"@pid":"65/5982","text":"Ilja Radusch"},{"@pid":"m/CMeinel","text":"Christoph Meinel"}]},"title":"Realistic Simulation of V2X Communication Scenarios.","venue":"APSCC","pages":"1623-1627","year":"2008","type":"Conference and Workshop Papers","access":"closed","key":"conf/apscc/QueckSRM08","doi":"10.1109/APSCC.2008.23","ee":"https://doi.org/10.1109/APSCC.2008.23","url":"https://dblp.org/rec/conf/apscc/QueckSRM08"}, "url":"URL#5297586" }, { "@score":"1", "@id":"5297587", "info":{"authors":{"author":[{"@pid":"65/7827","text":"A. A. Moiz Qyser"},{"@pid":"16/5384","text":"Ramachandram Sirandas"},{"@pid":"24/7827","text":"Asshar Farhan"}]},"title":"A Staged Capability Improvement Model for Software Small and Medium Enterprises (SMEs).","venue":"APSCC","pages":"724-729","year":"2008","type":"Conference and Workshop Papers","access":"closed","key":"conf/apscc/QyserRF08","doi":"10.1109/APSCC.2008.143","ee":"https://doi.org/10.1109/APSCC.2008.143","url":"https://dblp.org/rec/conf/apscc/QyserRF08"}, "url":"URL#5297587" }, { "@score":"1", "@id":"5297588", "info":{"authors":{"author":[{"@pid":"95/5983","text":"Vahid Rahimian"},{"@pid":"60/2830","text":"Jafar Habibi"}]},"title":"MPaySmart: A Customer Centric Approach in Offering Efficient Mobile Payment Services.","venue":"APSCC","pages":"1038-1043","year":"2008","type":"Conference and Workshop Papers","access":"closed","key":"conf/apscc/RahimianH08","doi":"10.1109/APSCC.2008.243","ee":"https://doi.org/10.1109/APSCC.2008.243","url":"https://dblp.org/rec/conf/apscc/RahimianH08"}, "url":"URL#5297588" }, { "@score":"1", "@id":"5297589", "info":{"authors":{"author":[{"@pid":"78/7617","text":"Morrakot Raweewan"},{"@pid":"69/3770","text":"William G. Ferrell Jr."}]},"title":"How "Hard Science" and Engineering Enhance Service-Dominant Economy.","venue":"APSCC","pages":"718-723","year":"2008","type":"Conference and Workshop Papers","access":"closed","key":"conf/apscc/RaweewanF08","doi":"10.1109/APSCC.2008.158","ee":"https://doi.org/10.1109/APSCC.2008.158","url":"https://dblp.org/rec/conf/apscc/RaweewanF08"}, "url":"URL#5297589" }, { "@score":"1", "@id":"5297590", "info":{"authors":{"author":[{"@pid":"19/1151","text":"Kaijun Ren"},{"@pid":"06/2379","text":"Jinjun Chen"},{"@pid":"42/2525","text":"Nong Xiao"},{"@pid":"72/4489","text":"Junqiang Song"},{"@pid":"79/572","text":"Jinyang Li"}]},"title":"Building Quick Service Query List Using Wordnet for Automated Service Composition.","venue":"APSCC","pages":"297-302","year":"2008","type":"Conference and Workshop Papers","access":"closed","key":"conf/apscc/RenCXSL08","doi":"10.1109/APSCC.2008.161","ee":"https://doi.org/10.1109/APSCC.2008.161","url":"https://dblp.org/rec/conf/apscc/RenCXSL08"}, "url":"URL#5297590" }, { "@score":"1", "@id":"5297591", "info":{"authors":{"author":[{"@pid":"29/7828","text":"Ali Rezaee"},{"@pid":"24/1563","text":"Amir Masoud Rahmani"},{"@pid":"58/4822","text":"Sahar Adabi"}]},"title":"A Fuzzy-Based Adaptive Agent for Grid Services.","venue":"APSCC","pages":"763-768","year":"2008","type":"Conference and Workshop Papers","access":"closed","key":"conf/apscc/RezaeeRA08","doi":"10.1109/APSCC.2008.235","ee":"https://doi.org/10.1109/APSCC.2008.235","url":"https://dblp.org/rec/conf/apscc/RezaeeRA08"}, "url":"URL#5297591" }, { "@score":"1", "@id":"5297592", "info":{"authors":{"author":[{"@pid":"31/7827","text":"Pitch Sajjipanon"},{"@pid":"15/4758","text":"Sudsanguan Ngamsuriyaroj"}]},"title":"Web Services for MPI-Based Parallel Applications on a Rocks Cluster.","venue":"APSCC","pages":"265-270","year":"2008","type":"Conference and Workshop Papers","access":"closed","key":"conf/apscc/SajjipanonN08","doi":"10.1109/APSCC.2008.43","ee":"https://doi.org/10.1109/APSCC.2008.43","url":"https://dblp.org/rec/conf/apscc/SajjipanonN08"}, "url":"URL#5297592" }, { "@score":"1", "@id":"5297593", "info":{"authors":{"author":[{"@pid":"70/1671","text":"Felix Salfner"},{"@pid":"10/5050","text":"Katinka Wolter"}]},"title":"Service Availability of Systems with Failure Prevention.","venue":"APSCC","pages":"1219-1224","year":"2008","type":"Conference and Workshop Papers","access":"closed","key":"conf/apscc/SalfnerW08","doi":"10.1109/APSCC.2008.164","ee":"https://doi.org/10.1109/APSCC.2008.164","url":"https://dblp.org/rec/conf/apscc/SalfnerW08"}, "url":"URL#5297593" }, { "@score":"1", "@id":"5297594", "info":{"authors":{"author":[{"@pid":"39/7827","text":"Fatemeh Saremi"},{"@pid":"12/7029","text":"Hamid Mousavi"},{"@pid":"m/AliMovagharRahimabadi","text":"Ali Movaghar 0001"}]},"title":"Performance Analysis of SLTC - A Stable Path, Low Overhead, Truthful and Cost Efficient Routing Protocol in MANETs with Selfish Nodes.","venue":"APSCC","pages":"243-250","year":"2008","type":"Conference and Workshop Papers","access":"closed","key":"conf/apscc/SaremiMM08","doi":"10.1109/APSCC.2008.260","ee":"https://doi.org/10.1109/APSCC.2008.260","url":"https://dblp.org/rec/conf/apscc/SaremiMM08"}, "url":"URL#5297594" }, { "@score":"1", "@id":"5297595", "info":{"authors":{"author":[{"@pid":"23/7827","text":"Tzu-Hsuan Shan"},{"@pid":"58/2882","text":"Chuan-Ming Liu"}]},"title":"Enhancing the Key Pre-distribution Scheme on Wireless Sensor Networks.","venue":"APSCC","pages":"1127-1131","year":"2008","type":"Conference and Workshop Papers","access":"closed","key":"conf/apscc/ShanL08","doi":"10.1109/APSCC.2008.188","ee":"https://doi.org/10.1109/APSCC.2008.188","url":"https://dblp.org/rec/conf/apscc/ShanL08"}, "url":"URL#5297595" }, { "@score":"1", "@id":"5297596", "info":{"authors":{"author":[{"@pid":"27/6319","text":"Xu Shao"},{"@pid":"53/5272","text":"Teck Yoong Chai"},{"@pid":"20/323","text":"Teck Kiong Lee"},{"@pid":"48/3044","text":"Lek Heng Ngoh"},{"@pid":"98/2139","text":"Luying Zhou"},{"@pid":"k/MarkusKirchberg","text":"Markus Kirchberg"}]},"title":"An Integrated Telecom and IT Service Delivery Platform.","venue":"APSCC","pages":"391-396","year":"2008","type":"Conference and Workshop Papers","access":"closed","key":"conf/apscc/ShaoCLNZK08","doi":"10.1109/APSCC.2008.71","ee":"https://doi.org/10.1109/APSCC.2008.71","url":"https://dblp.org/rec/conf/apscc/ShaoCLNZK08"}, "url":"URL#5297596" }, { "@score":"1", "@id":"5297597", "info":{"authors":{"author":[{"@pid":"05/7494","text":"Chung-Chi Shen"},{"@pid":"34/7491","text":"Jyh-Shen Chiou"}]},"title":"The Internet Service Provider's Dilemma: User Friendly Design or Robust Security Mechanism?","venue":"APSCC","pages":"1024-1025","year":"2008","type":"Conference and Workshop Papers","access":"closed","key":"conf/apscc/ShenC08","doi":"10.1109/APSCC.2008.300","ee":"https://doi.org/10.1109/APSCC.2008.300","url":"https://dblp.org/rec/conf/apscc/ShenC08"}, "url":"URL#5297597" }, { "@score":"1", "@id":"5297598", "info":{"authors":{"author":[{"@pid":"33/7828","text":"Shang-Pin Sheng"},{"@pid":"38/7827","text":"Ben-Yue Chang"},{"@pid":"09/6598","text":"Hung-Yu Wei"}]},"title":"Access Gateway Discovery and Selection in Hybrid Multihop Relay Vehicular Network.","venue":"APSCC","pages":"1595-1599","year":"2008","type":"Conference and Workshop Papers","access":"closed","key":"conf/apscc/ShengCW08","doi":"10.1109/APSCC.2008.63","ee":"https://doi.org/10.1109/APSCC.2008.63","url":"https://dblp.org/rec/conf/apscc/ShengCW08"}, "url":"URL#5297598" }, { "@score":"1", "@id":"5297599", "info":{"authors":{"author":[{"@pid":"87/8167","text":"Sheping Zhai"},{"@pid":"59/3767","text":"Hai Wang"},{"@pid":"90/8167","text":"Juanli Wei"}]},"title":"A Pragmatics Web Service Oriented Approach to Understanding the Semantics of Concepts.","venue":"APSCC","pages":"1069-1074","year":"2008","type":"Conference and Workshop Papers","access":"closed","key":"conf/apscc/ShepingHJ08","doi":"10.1109/APSCC.2008.247","ee":"https://doi.org/10.1109/APSCC.2008.247","url":"https://dblp.org/rec/conf/apscc/ShepingHJ08"}, "url":"URL#5297599" }, { "@score":"1", "@id":"5297600", "info":{"authors":{"author":[{"@pid":"56/2435","text":"Wanita Sherchan"},{"@pid":"k/ShonaliKrishnaswamy","text":"Shonali Krishnaswamy"},{"@pid":"l/SengWaiLoke","text":"Seng Wai Loke"}]},"title":"EADRM: A Framework for Explanation-Aware Distributed Reputation Management of Web Services.","venue":"APSCC","pages":"560-567","year":"2008","type":"Conference and Workshop Papers","access":"closed","key":"conf/apscc/SherchanKL08","doi":"10.1109/APSCC.2008.258","ee":"https://doi.org/10.1109/APSCC.2008.258","url":"https://dblp.org/rec/conf/apscc/SherchanKL08"}, "url":"URL#5297600" }, { "@score":"1", "@id":"5297601", "info":{"authors":{"author":[{"@pid":"85/5317","text":"Xuanhua Shi"},{"@pid":"93/3669","text":"Zhao Chen"},{"@pid":"98/4156","text":"Hai Jin 0001"},{"@pid":"23/1092-1","text":"Song Wu 0001"},{"@pid":"87/7826","text":"Ke Fan"}]},"title":"WAGA: A Flexible Web-Based Framework for Grid Applications.","venue":"APSCC","pages":"542-547","year":"2008","type":"Conference and Workshop Papers","access":"closed","key":"conf/apscc/ShiCJWF08","doi":"10.1109/APSCC.2008.215","ee":"https://doi.org/10.1109/APSCC.2008.215","url":"https://dblp.org/rec/conf/apscc/ShiCJWF08"}, "url":"URL#5297601" }, { "@score":"1", "@id":"5297602", "info":{"authors":{"author":[{"@pid":"43/393","text":"Jau-Ling Shih"},{"@pid":"23/7828","text":"Ting-Yen Huang"},{"@pid":"94/7827","text":"Yu-Chen Wang"}]},"title":"A 3D Model Retrieval System Using the Derivative Elevation and 3D-ART.","venue":"APSCC","pages":"739-744","year":"2008","type":"Conference and Workshop Papers","access":"closed","key":"conf/apscc/ShihHW08","doi":"10.1109/APSCC.2008.87","ee":"https://doi.org/10.1109/APSCC.2008.87","url":"https://dblp.org/rec/conf/apscc/ShihHW08"}, "url":"URL#5297602" }, { "@score":"1", "@id":"5297603", "info":{"authors":{"author":[{"@pid":"23/3276","text":"Shyong Jian Shyu"},{"@pid":"36/3806","text":"Ying-Ru Chen"}]},"title":"Threshold Secret Image Sharing by Chinese Remainder Theorem.","venue":"APSCC","pages":"1332-1337","year":"2008","type":"Conference and Workshop Papers","access":"closed","key":"conf/apscc/ShyuC08","doi":"10.1109/APSCC.2008.223","ee":"https://doi.org/10.1109/APSCC.2008.223","url":"https://dblp.org/rec/conf/apscc/ShyuC08"}, "url":"URL#5297603" }, { "@score":"1", "@id":"5297604", "info":{"authors":{"author":[{"@pid":"61/5743","text":"Navya Sidharth"},{"@pid":"99/3425","text":"Jigang Liu"}]},"title":"Intrusion Resistant SOAP Messaging with IAPF.","venue":"APSCC","pages":"856-862","year":"2008","type":"Conference and Workshop Papers","access":"closed","key":"conf/apscc/SidharthL08","doi":"10.1109/APSCC.2008.221","ee":"https://doi.org/10.1109/APSCC.2008.221","url":"https://dblp.org/rec/conf/apscc/SidharthL08"}, "url":"URL#5297604" }, { "@score":"1", "@id":"5297605", "info":{"authors":{"author":[{"@pid":"07/7827","text":"Shubhranshu Singh"},{"@pid":"25/7495","text":"Ashutosh Bhatia"}]},"title":"A DHCPv6 Based IPv6 Autoconfiguration Mechanism for Subordinate MANET.","venue":"APSCC","pages":"237-242","year":"2008","type":"Conference and Workshop Papers","access":"closed","key":"conf/apscc/SinghB08","doi":"10.1109/APSCC.2008.253","ee":"https://doi.org/10.1109/APSCC.2008.253","url":"https://dblp.org/rec/conf/apscc/SinghB08"}, "url":"URL#5297605" }, { "@score":"1", "@id":"5297606", "info":{"authors":{"author":[{"@pid":"83/7826","text":"Malek Smaoui"},{"@pid":"58/5342","text":"Marc Garbey"},{"@pid":"43/7827","text":"Cendrine Mony"}]},"title":"Virtual Prairie: Going Green with Volunteer Computing.","venue":"APSCC","pages":"427-434","year":"2008","type":"Conference and Workshop Papers","access":"closed","key":"conf/apscc/SmaouiGM08","doi":"10.1109/APSCC.2008.233","ee":"https://doi.org/10.1109/APSCC.2008.233","url":"https://dblp.org/rec/conf/apscc/SmaouiGM08"}, "url":"URL#5297606" }, { "@score":"1", "@id":"5297607", "info":{"authors":{"author":[{"@pid":"05/5827","text":"Bruce Spencer"},{"@pid":"41/2581","text":"Sandy Liu"}]},"title":"Modelling the Sharing of Resources across Collaborative Sessions.","venue":"APSCC","pages":"813-818","year":"2008","type":"Conference and Workshop Papers","access":"closed","key":"conf/apscc/SpencerL08","doi":"10.1109/APSCC.2008.255","ee":"https://doi.org/10.1109/APSCC.2008.255","url":"https://dblp.org/rec/conf/apscc/SpencerL08"}, "url":"URL#5297607" }, { "@score":"1", "@id":"5297608", "info":{"authors":{"author":[{"@pid":"s/AnnaCinziaSquicciarini","text":"Anna Cinzia Squicciarini"},{"@pid":"316/3760-2","text":"Wonjun Lee 0002"},{"@pid":"b/ElisaBertino","text":"Elisa Bertino"},{"@pid":"44/7553","text":"Carol X. Song"}]},"title":"A Policy-Based Accountability Tool for Grid Computing Systems.","venue":"APSCC","pages":"95-100","year":"2008","type":"Conference and Workshop Papers","access":"closed","key":"conf/apscc/SquicciariniLBS08","doi":"10.1109/APSCC.2008.257","ee":"https://doi.org/10.1109/APSCC.2008.257","url":"https://dblp.org/rec/conf/apscc/SquicciariniLBS08"}, "url":"URL#5297608" }, { "@score":"1", "@id":"5297609", "info":{"authors":{"author":[{"@pid":"42/1523","text":"Hung-Min Sun"},{"@pid":"01/7486","text":"Shih-Ying Chang"},{"@pid":"56/253","text":"Shuai-Min Chen"},{"@pid":"24/7828","text":"Chien-Chien Chiu"}]},"title":"An Efficient Rekeying Scheme for Multicast and Broadcast (M&B) in Mobile WiMAX.","venue":"APSCC","pages":"199-204","year":"2008","type":"Conference and Workshop Papers","access":"closed","key":"conf/apscc/SunCCC08","doi":"10.1109/APSCC.2008.100","ee":"https://doi.org/10.1109/APSCC.2008.100","url":"https://dblp.org/rec/conf/apscc/SunCCC08"}, "url":"URL#5297609" }, { "@score":"1", "@id":"5297610", "info":{"authors":{"author":[{"@pid":"42/1523","text":"Hung-Min Sun"},{"@pid":"56/253","text":"Shuai-Min Chen"},{"@pid":"75/4511","text":"Yao-Hsin Chen"},{"@pid":"96/7827","text":"Heng-Jeng Chung"},{"@pid":"19/7827","text":"I-Hung Lin"}]},"title":"Secure and Efficient Handover Schemes for Heterogeneous Networks.","venue":"APSCC","pages":"205-210","year":"2008","type":"Conference and Workshop Papers","access":"closed","key":"conf/apscc/SunCCCL08","doi":"10.1109/APSCC.2008.194","ee":"https://doi.org/10.1109/APSCC.2008.194","url":"https://dblp.org/rec/conf/apscc/SunCCCL08"}, "url":"URL#5297610" }, { "@score":"1", "@id":"5297611", "info":{"authors":{"author":[{"@pid":"63/6566","text":"Weiwei Sun"},{"@pid":"10/709","text":"Zhuoyao Zhang"},{"@pid":"73/6153","text":"Weiyu Chen"},{"@pid":"03/5954","text":"Bo Peng"},{"@pid":"64/5882","text":"Yingxiao Xu"}]},"title":"Decentralized Execution of Composite Service in MANETs.","venue":"APSCC","pages":"355-360","year":"2008","type":"Conference and Workshop Papers","access":"closed","key":"conf/apscc/SunZCPX08","doi":"10.1109/APSCC.2008.187","ee":"https://doi.org/10.1109/APSCC.2008.187","url":"https://dblp.org/rec/conf/apscc/SunZCPX08"}, "url":"URL#5297611" }, { "@score":"1", "@id":"5297612", "info":{"authors":{"author":[{"@pid":"32/4656","text":"Sayed Gholam Hassan Tabatabaei"},{"@pid":"63/826","text":"Wan Mohd Nasir Wan-Kadir"},{"@pid":"03/2290","text":"Suhaimi Ibrahim"}]},"title":"Semantic Web Service Discovery and Composition Based on AI Planning and Web Service Modeling Ontology.","venue":"APSCC","pages":"397-403","year":"2008","type":"Conference and Workshop Papers","access":"closed","key":"conf/apscc/TabatabaeiKI08","doi":"10.1109/APSCC.2008.126","ee":"https://doi.org/10.1109/APSCC.2008.126","url":"https://dblp.org/rec/conf/apscc/TabatabaeiKI08"}, "url":"URL#5297612" }, { "@score":"1", "@id":"5297613", "info":{"authors":{"author":[{"@pid":"28/7435","text":"Marjan Naderan Tahan"},{"@pid":"01/4547","text":"Hamid R. Rabiee"},{"@pid":"39/7827","text":"Fatemeh Saremi"},{"@pid":"56/1484","text":"Zeinab Iranmanesh"}]},"title":"An Overlay Multicast Protocol for Multimedia Applications in Mobile Ad Hoc Networks.","venue":"APSCC","pages":"162-167","year":"2008","type":"Conference and Workshop Papers","access":"closed","key":"conf/apscc/TahanRSI08","doi":"10.1109/APSCC.2008.156","ee":"https://doi.org/10.1109/APSCC.2008.156","url":"https://dblp.org/rec/conf/apscc/TahanRSI08"}, "url":"URL#5297613" }, { "@score":"1", "@id":"5297614", "info":{"authors":{"author":[{"@pid":"62/3050","text":"Kenichi Takahashi"},{"@pid":"47/2540","text":"Akihiro Sakai"},{"@pid":"16/3865","text":"Kouichi Sakurai"}]},"title":"Invalidation of Mailing List Address to Block Spam Mails.","venue":"APSCC","pages":"841-846","year":"2008","type":"Conference and Workshop Papers","access":"closed","key":"conf/apscc/TakahashiSS08","doi":"10.1109/APSCC.2008.97","ee":"https://doi.org/10.1109/APSCC.2008.97","url":"https://dblp.org/rec/conf/apscc/TakahashiSS08"}, "url":"URL#5297614" }, { "@score":"1", "@id":"5297615", "info":{"authors":{"author":{"@pid":"09/7828","text":"Tsukasa Takemura"}},"title":"Formal Semantics and Verification of BPMN Transaction and Compensation.","venue":"APSCC","pages":"284-290","year":"2008","type":"Conference and Workshop Papers","access":"closed","key":"conf/apscc/Takemura08","doi":"10.1109/APSCC.2008.208","ee":"https://doi.org/10.1109/APSCC.2008.208","url":"https://dblp.org/rec/conf/apscc/Takemura08"}, "url":"URL#5297615" }, { "@score":"1", "@id":"5297616", "info":{"authors":{"author":[{"@pid":"02/3804","text":"Masahiro Tanaka"},{"@pid":"98/1687","text":"Yohei Murakami"},{"@pid":"71/5163","text":"Toru Ishida 0001"}]},"title":"Towards Service Supervision for Public Web Services.","venue":"APSCC","pages":"536-541","year":"2008","type":"Conference and Workshop Papers","access":"closed","key":"conf/apscc/TanakaMI08","doi":"10.1109/APSCC.2008.144","ee":"https://doi.org/10.1109/APSCC.2008.144","url":"https://dblp.org/rec/conf/apscc/TanakaMI08"}, "url":"URL#5297616" }, { "@score":"1", "@id":"5297617", "info":{"authors":{"author":[{"@pid":"88/7007","text":"Wei-Chung Teng"},{"@pid":"92/7827","text":"Yu-Chun Pao"},{"@pid":"14/2346","text":"Sheng-Luen Chung"}]},"title":"Design of MyServer: A Residential Server in Smart Home Systems.","venue":"APSCC","pages":"580-586","year":"2008","type":"Conference and Workshop Papers","access":"closed","key":"conf/apscc/TengPC08","doi":"10.1109/APSCC.2008.250","ee":"https://doi.org/10.1109/APSCC.2008.250","url":"https://dblp.org/rec/conf/apscc/TengPC08"}, "url":"URL#5297617" }, { "@score":"1", "@id":"5297618", "info":{"authors":{"author":[{"@pid":"06/2254","text":"Gunnar Thies"},{"@pid":"v/GottfriedVossen","text":"Gottfried Vossen"}]},"title":"Web-Oriented Architectures: On the Impact of Web 2.0 on Service-Oriented Architectures.","venue":"APSCC","pages":"1075-1082","year":"2008","type":"Conference and Workshop Papers","access":"closed","key":"conf/apscc/ThiesV08","doi":"10.1109/APSCC.2008.140","ee":"https://doi.org/10.1109/APSCC.2008.140","url":"https://dblp.org/rec/conf/apscc/ThiesV08"}, "url":"URL#5297618" }, { "@score":"1", "@id":"5297619", "info":{"authors":{"author":[{"@pid":"27/7827","text":"Lihua Tian"},{"@pid":"07/256-1","text":"Nanning Zheng 0001"},{"@pid":"16/6902","text":"Jianru Xue"},{"@pid":"96/6771","text":"Tao Xu"}]},"title":"A CAVLC-Based Blind Watermarking Method for H.264/AVC Compressed Video.","venue":"APSCC","pages":"1295-1299","year":"2008","type":"Conference and Workshop Papers","access":"closed","key":"conf/apscc/TianZXX08","doi":"10.1109/APSCC.2008.72","ee":"https://doi.org/10.1109/APSCC.2008.72","url":"https://dblp.org/rec/conf/apscc/TianZXX08"}, "url":"URL#5297619" }, { "@score":"1", "@id":"5297620", "info":{"authors":{"author":[{"@pid":"18/7695","text":"Animesh Tripathy"},{"@pid":"70/8863","text":"Prashanta Kumar Patra"}]},"title":"A Web Mining Architectural Model of Distributed Crawler for Internet Searches Using PageRank Algorithm.","venue":"APSCC","pages":"513-518","year":"2008","type":"Conference and Workshop Papers","access":"closed","key":"conf/apscc/TripathyP08","doi":"10.1109/APSCC.2008.259","ee":"https://doi.org/10.1109/APSCC.2008.259","url":"https://dblp.org/rec/conf/apscc/TripathyP08"}, "url":"URL#5297620" }, { "@score":"1", "@id":"5297621", "info":{"authors":{"author":{"@pid":"40/1415","text":"Bi-Huei Tsai"}},"title":"The Impact of Enterprise Resource Planning Systems on the Efficiency of Taiwanese Firms.","venue":"APSCC","pages":"1441-1446","year":"2008","type":"Conference and Workshop Papers","access":"closed","key":"conf/apscc/Tsai08","doi":"10.1109/APSCC.2008.251","ee":"https://doi.org/10.1109/APSCC.2008.251","url":"https://dblp.org/rec/conf/apscc/Tsai08"}, "url":"URL#5297621" }, { "@score":"1", "@id":"5297622", "info":{"authors":{"author":[{"@pid":"64/2471","text":"Chun-Yi Tsai"},{"@pid":"03/3357","text":"Tzao-Lin Lee"}]},"title":"Implementation and Evaluation of Minimal UPnP Scheduled Recording.","venue":"APSCC","pages":"886-889","year":"2008","type":"Conference and Workshop Papers","access":"closed","key":"conf/apscc/TsaiL08","doi":"10.1109/APSCC.2008.184","ee":"https://doi.org/10.1109/APSCC.2008.184","url":"https://dblp.org/rec/conf/apscc/TsaiL08"}, "url":"URL#5297622" }, { "@score":"1", "@id":"5297623", "info":{"authors":{"author":[{"@pid":"10/7827","text":"Yuan Hui Tsai"},{"@pid":"30/7827","text":"Chieh-Peng Lin"},{"@pid":"94/7826","text":"Chou-Kang Chiu"}]},"title":"Modeling the Mediating Role of Online Social Capital in Social Support and Service IT Usage.","venue":"APSCC","pages":"1019-1023","year":"2008","type":"Conference and Workshop Papers","access":"closed","key":"conf/apscc/TsaiLC08","doi":"10.1109/APSCC.2008.57","ee":"https://doi.org/10.1109/APSCC.2008.57","url":"https://dblp.org/rec/conf/apscc/TsaiLC08"}, "url":"URL#5297623" }, { "@score":"1", "@id":"5297624", "info":{"authors":{"author":{"@pid":"73/5733","text":"Raylin Tso"}},"title":"Signcryption Scheme with Standardized Verification Algorithm.","venue":"APSCC","pages":"1369-1374","year":"2008","type":"Conference and Workshop Papers","access":"closed","key":"conf/apscc/Tso08","doi":"10.1109/APSCC.2008.237","ee":"https://doi.org/10.1109/APSCC.2008.237","url":"https://dblp.org/rec/conf/apscc/Tso08"}, "url":"URL#5297624" }, { "@score":"1", "@id":"5297625", "info":{"authors":{"author":[{"@pid":"17/7827","text":"Chien-Chung Tu"},{"@pid":"71/7827","text":"Chwen-Yea Lin"},{"@pid":"36/3586","text":"Kwoting Fang"}]},"title":"Customers' Perception on Attitude Towards E-auction.","venue":"APSCC","pages":"1044-1048","year":"2008","type":"Conference and Workshop Papers","access":"closed","key":"conf/apscc/TuLF08","doi":"10.1109/APSCC.2008.229","ee":"https://doi.org/10.1109/APSCC.2008.229","url":"https://dblp.org/rec/conf/apscc/TuLF08"}, "url":"URL#5297625" }, { "@score":"1", "@id":"5297626", "info":{"authors":{"author":[{"@pid":"71/1498","text":"Sam Verboven"},{"@pid":"66/2132","text":"Peter Hellinckx"},{"@pid":"66/6327","text":"Frans Arickx"},{"@pid":"79/626","text":"Jan Broeckhove"}]},"title":"Runtime Prediction Based Grid Scheduling of Parameter Sweep Jobs.","venue":"APSCC","pages":"33-38","year":"2008","type":"Conference and Workshop Papers","access":"closed","key":"conf/apscc/VerbovenHAB08","doi":"10.1109/APSCC.2008.189","ee":"https://doi.org/10.1109/APSCC.2008.189","url":"https://dblp.org/rec/conf/apscc/VerbovenHAB08"}, "url":"URL#5297626" }, { "@score":"1", "@id":"5297627", "info":{"authors":{"author":[{"@pid":"86/3658","text":"Hannu Verkasalo"},{"@pid":"80/7826","text":"Kim Lindqvist"},{"@pid":"94/4894","text":"Heikki Hämmäinen"}]},"title":"Scenario Analysis of the Mobile Voice Services Market.","venue":"APSCC","pages":"378-384","year":"2008","type":"Conference and Workshop Papers","access":"closed","key":"conf/apscc/VerkasaloLH08","doi":"10.1109/APSCC.2008.29","ee":"https://doi.org/10.1109/APSCC.2008.29","url":"https://dblp.org/rec/conf/apscc/VerkasaloLH08"}, "url":"URL#5297627" }, { "@score":"1", "@id":"5297628", "info":{"authors":{"author":[{"@pid":"75/1974","text":"Sheng-Ming Wang"},{"@pid":"91/7826","text":"Fu-Mei Chen"}]},"title":"The Development of a Ubiquitous Geographic Information Service by Using Service-Oriented Architecture.","venue":"APSCC","pages":"453-457","year":"2008","type":"Conference and Workshop Papers","access":"closed","key":"conf/apscc/WangC08","doi":"10.1109/APSCC.2008.150","ee":"https://doi.org/10.1109/APSCC.2008.150","url":"https://dblp.org/rec/conf/apscc/WangC08"}, "url":"URL#5297628" }, { "@score":"1", "@id":"5297629", "info":{"authors":{"author":[{"@pid":"41/2492","text":"Chih-Chien Wang"},{"@pid":"49/7827","text":"Yu-Tzu Chen"}]},"title":"The Influence of Passion and Compulsive Buying on Online Auction Addiction.","venue":"APSCC","pages":"1187-1192","year":"2008","type":"Conference and Workshop Papers","access":"closed","key":"conf/apscc/WangC08a","doi":"10.1109/APSCC.2008.157","ee":"https://doi.org/10.1109/APSCC.2008.157","url":"https://dblp.org/rec/conf/apscc/WangC08a"}, "url":"URL#5297629" }, { "@score":"1", "@id":"5297630", "info":{"authors":{"author":[{"@pid":"09/3921","text":"Chien-Min Wang"},{"@pid":"87/1025","text":"Hsi-Min Chen"},{"@pid":"02/4831","text":"Chun-Chen Hsu"},{"@pid":"30/3557","text":"Jonathan Lee"}]},"title":"Resource Selection Strategies for a CNP-Based Resource Management Model.","venue":"APSCC","pages":"458-463","year":"2008","type":"Conference and Workshop Papers","access":"closed","key":"conf/apscc/WangCHL08","doi":"10.1109/APSCC.2008.240","ee":"https://doi.org/10.1109/APSCC.2008.240","url":"https://dblp.org/rec/conf/apscc/WangCHL08"}, "url":"URL#5297630" }, { "@score":"1", "@id":"5297631", "info":{"authors":{"author":[{"@pid":"w/ShuChinWang","text":"Shu-Ching Wang"},{"@pid":"18/5140","text":"Tzu-Chih Chung"},{"@pid":"98/437","text":"Kuo-Qin Yan"}]},"title":"Machine-to-Machine Technology Applied to Integrated Video Services Via Context Transfer.","venue":"APSCC","pages":"1395-1400","year":"2008","type":"Conference and Workshop Papers","access":"closed","key":"conf/apscc/WangCY08","doi":"10.1109/APSCC.2008.67","ee":"https://doi.org/10.1109/APSCC.2008.67","url":"https://dblp.org/rec/conf/apscc/WangCY08"}, "url":"URL#5297631" }, { "@score":"1", "@id":"5297632", "info":{"authors":{"author":[{"@pid":"97/192","text":"Chiapin Wang"},{"@pid":"67/859","text":"Tsungnan Lin"}]},"title":"A Cross-Layer Link Adaptation Algorithm for IEEE 802.11 WLAN with Multiple Nodes.","venue":"APSCC","pages":"1162-1167","year":"2008","type":"Conference and Workshop Papers","access":"closed","key":"conf/apscc/WangL08","doi":"10.1109/APSCC.2008.136","ee":"https://doi.org/10.1109/APSCC.2008.136","url":"https://dblp.org/rec/conf/apscc/WangL08"}, "url":"URL#5297632" }, { "@score":"1", "@id":"5297633", "info":{"authors":{"author":[{"@pid":"90/6339-1","text":"Yufeng Wang 0001"},{"@pid":"71/4736","text":"Akihiro Nakao"}]},"title":"On Novel Economic-Inspired Centrality Measures in Weighted Networks.","venue":"APSCC","pages":"291-296","year":"2008","type":"Conference and Workshop Papers","access":"closed","key":"conf/apscc/WangN08","doi":"10.1109/APSCC.2008.28","ee":"https://doi.org/10.1109/APSCC.2008.28","url":"https://dblp.org/rec/conf/apscc/WangN08"}, "url":"URL#5297633" }, { "@score":"1", "@id":"5297634", "info":{"authors":{"author":[{"@pid":"03/2903","text":"Yao-Tien Wang"},{"@pid":"54/438","text":"Chung-Ming Ou"},{"@pid":"97/1729","text":"Hsiang-Fu Yu"}]},"title":"Hierarchical Genetic Algorithms for Channel Allocation in Wireless Networks.","venue":"APSCC","pages":"168-173","year":"2008","type":"Conference and Workshop Papers","access":"closed","key":"conf/apscc/WangOY08","doi":"10.1109/APSCC.2008.160","ee":"https://doi.org/10.1109/APSCC.2008.160","url":"https://dblp.org/rec/conf/apscc/WangOY08"}, "url":"URL#5297634" }, { "@score":"1", "@id":"5297635", "info":{"authors":{"author":[{"@pid":"86/7826","text":"Chih-Yung Wang"},{"@pid":"64/2471","text":"Chun-Yi Tsai"},{"@pid":"03/3357","text":"Tzao-Lin Lee"}]},"title":"Detecting Media Format Support of the Media Renderer with Microsoft DirectShow.","venue":"APSCC","pages":"730-732","year":"2008","type":"Conference and Workshop Papers","access":"closed","key":"conf/apscc/WangTL08","doi":"10.1109/APSCC.2008.186","ee":"https://doi.org/10.1109/APSCC.2008.186","url":"https://dblp.org/rec/conf/apscc/WangTL08"}, "url":"URL#5297635" }, { "@score":"1", "@id":"5297636", "info":{"authors":{"author":[{"@pid":"05/2633","text":"Peishun Wang"},{"@pid":"52/4513","text":"Huaxiong Wang"},{"@pid":"p/JosefPieprzyk","text":"Josef Pieprzyk"}]},"title":"Improvement of a Dynamic Accumulator at ICICS 07 and Its Application in Multi-user Keyword-Based Retrieval on Encrypted Data.","venue":"APSCC","pages":"1381-1386","year":"2008","type":"Conference and Workshop Papers","access":"closed","key":"conf/apscc/WangWP08","doi":"10.1109/APSCC.2008.98","ee":"https://doi.org/10.1109/APSCC.2008.98","url":"https://dblp.org/rec/conf/apscc/WangWP08"}, "url":"URL#5297636" }, { "@score":"1", "@id":"5297637", "info":{"authors":{"author":[{"@pid":"39/449","text":"Jian Wang"},{"@pid":"80/1790","text":"Haihang Wang"},{"@pid":"11/2755","text":"Chengxiang Tan"}]},"title":"Cryptanalysis and Improvement of an 'Efficient Remote Mutual Authentication and Key Agreement'.","venue":"APSCC","pages":"835-840","year":"2008","type":"Conference and Workshop Papers","access":"closed","key":"conf/apscc/WangWT08","doi":"10.1109/APSCC.2008.173","ee":"https://doi.org/10.1109/APSCC.2008.173","url":"https://dblp.org/rec/conf/apscc/WangWT08"}, "url":"URL#5297637" }, { "@score":"1", "@id":"5297638", "info":{"authors":{"author":[{"@pid":"78/6078","text":"Ulf Wehling"},{"@pid":"r/SteffenRothkugel","text":"Steffen Rothkugel"}]},"title":"Improving the Bandwidth Consumption of File Sharing in Mobile Networks through Clustering.","venue":"APSCC","pages":"1156-1161","year":"2008","type":"Conference and Workshop Papers","access":"closed","key":"conf/apscc/WehlingR08","doi":"10.1109/APSCC.2008.113","ee":"https://doi.org/10.1109/APSCC.2008.113","url":"https://dblp.org/rec/conf/apscc/WehlingR08"}, "url":"URL#5297638" }, { "@score":"1", "@id":"5297639", "info":{"authors":{"author":[{"@pid":"38/2908","text":"Dengwen Wei"},{"@pid":"55/7015","text":"Zaobin Gan"},{"@pid":"60/7827","text":"Xiongbo Xia"}]},"title":"A Unified Framework for Digital Content Management Business Model-Ring-Tone Download as Case Study.","venue":"APSCC","pages":"969-974","year":"2008","type":"Conference and Workshop Papers","access":"closed","key":"conf/apscc/WeiGX08","doi":"10.1109/APSCC.2008.176","ee":"https://doi.org/10.1109/APSCC.2008.176","url":"https://dblp.org/rec/conf/apscc/WeiGX08"}, "url":"URL#5297639" }, { "@score":"1", "@id":"5297640", "info":{"authors":{"author":[{"@pid":"24/4105-6","text":"Wei Wei 0006"},{"@pid":"01/2240","text":"Yong Qi"},{"@pid":"69/1798","text":"Xin He"},{"@pid":"w/WeiWang15","text":"Wei Wang 0015"},{"@pid":"06/7035","text":"Ruidong Li"},{"@pid":"53/1151","text":"Hui He"}]},"title":"Improving the Survivability of WSNs with Biological Characters Based on Rejuvenation Technology.","venue":"APSCC","pages":"644-649","year":"2008","type":"Conference and Workshop Papers","access":"closed","key":"conf/apscc/WeiQHWLH08","doi":"10.1109/APSCC.2008.10","ee":"https://doi.org/10.1109/APSCC.2008.10","url":"https://dblp.org/rec/conf/apscc/WeiQHWLH08"}, "url":"URL#5297640" }, { "@score":"1", "@id":"5297641", "info":{"authors":{"author":[{"@pid":"30/7828","text":"Yuan-Chin Wen"},{"@pid":"97/5896","text":"Chia-Hung Chen"},{"@pid":"76/6381","text":"Sheng-De Wang"}]},"title":"Crossing Heterogeneous Grid Systems with a Single Sign-On Scheme Based on a P2P Layer.","venue":"APSCC","pages":"45-51","year":"2008","type":"Conference and Workshop Papers","access":"closed","key":"conf/apscc/WenCW08","doi":"10.1109/APSCC.2008.232","ee":"https://doi.org/10.1109/APSCC.2008.232","url":"https://dblp.org/rec/conf/apscc/WenCW08"}, "url":"URL#5297641" }, { "@score":"1", "@id":"5297642", "info":{"authors":{"author":[{"@pid":"59/7827","text":"Mei-Ying Wu"},{"@pid":"10/7828","text":"Han-Ping Chou"},{"@pid":"91/7827","text":"Yung-Chien Weng"},{"@pid":"06/7827","text":"Yen-Han Huang"}]},"title":"A Study of Web 2.0 Website Usage Behavior Using TAM 2.","venue":"APSCC","pages":"1477-1482","year":"2008","type":"Conference and Workshop Papers","access":"closed","key":"conf/apscc/WuCWH08","doi":"10.1109/APSCC.2008.92","ee":"https://doi.org/10.1109/APSCC.2008.92","url":"https://dblp.org/rec/conf/apscc/WuCWH08"}, "url":"URL#5297642" }, { "@score":"1", "@id":"5297643", "info":{"authors":{"author":[{"@pid":"98/4432","text":"Bin Wu"},{"@pid":"d/ShuiguangDeng","text":"ShuiGuang Deng"},{"@pid":"96/2744-1","text":"Jian Wu 0001"},{"@pid":"22/1805-1","text":"Ying Li 0001"},{"@pid":"86/3715","text":"Li Kuang"},{"@pid":"74/3786","text":"Jianwei Yin"}]},"title":"Service Behavioral Adaptation Based on Dependency Graph.","venue":"APSCC","pages":"1276-1281","year":"2008","type":"Conference and Workshop Papers","access":"closed","key":"conf/apscc/WuDWLKY08","doi":"10.1109/APSCC.2008.26","ee":"https://doi.org/10.1109/APSCC.2008.26","url":"https://dblp.org/rec/conf/apscc/WuDWLKY08"}, "url":"URL#5297643" }, { "@score":"1", "@id":"5297644", "info":{"authors":{"author":[{"@pid":"96/2744","text":"Jian Wu"},{"@pid":"52/5907","text":"Zhimin Huang"}]},"title":"Proxy-Based Web Service Security.","venue":"APSCC","pages":"1282-1288","year":"2008","type":"Conference and Workshop Papers","access":"closed","key":"conf/apscc/WuH08","doi":"10.1109/APSCC.2008.216","ee":"https://doi.org/10.1109/APSCC.2008.216","url":"https://dblp.org/rec/conf/apscc/WuH08"}, "url":"URL#5297644" }, { "@score":"1", "@id":"5297645", "info":{"authors":{"author":[{"@pid":"26/6973","text":"Zhao Wu"},{"@pid":"57/8174","text":"Yanxiang He"},{"@pid":"70/3303","text":"Haowen Liu"},{"@pid":"63/5422","text":"Liang Zhao"},{"@pid":"09/3220","text":"Hua Shen"}]},"title":"A Stochastic Performance Model Supporting Time and Non-time QoS Matrices for Web Service Composition.","venue":"APSCC","pages":"999-1004","year":"2008","type":"Conference and Workshop Papers","access":"closed","key":"conf/apscc/WuHLZS08","doi":"10.1109/APSCC.2008.124","ee":"https://doi.org/10.1109/APSCC.2008.124","url":"https://dblp.org/rec/conf/apscc/WuHLZS08"}, "url":"URL#5297645" }, { "@score":"1", "@id":"5297646", "info":{"authors":{"author":[{"@pid":"37/2022","text":"Shann-Chiuen Wu"},{"@pid":"05/7827","text":"Yung-Chung Ku"},{"@pid":"03/3357","text":"Tzao-Lin Lee"}]},"title":"Zero-Configuration Security Module for LAMP Application System.","venue":"APSCC","pages":"113-116","year":"2008","type":"Conference and Workshop Papers","access":"closed","key":"conf/apscc/WuKL08","doi":"10.1109/APSCC.2008.242","ee":"https://doi.org/10.1109/APSCC.2008.242","url":"https://dblp.org/rec/conf/apscc/WuKL08"}, "url":"URL#5297646" }, { "@score":"1", "@id":"5297647", "info":{"authors":{"author":[{"@pid":"37/2022","text":"Shann-Chiuen Wu"},{"@pid":"05/7827","text":"Yung-Chung Ku"},{"@pid":"03/3357","text":"Tzao-Lin Lee"}]},"title":"Zero-Configuration Personal Firewall for DLNA DMS.","venue":"APSCC","pages":"847-850","year":"2008","type":"Conference and Workshop Papers","access":"closed","key":"conf/apscc/WuKL08a","doi":"10.1109/APSCC.2008.244","ee":"https://doi.org/10.1109/APSCC.2008.244","url":"https://dblp.org/rec/conf/apscc/WuKL08a"}, "url":"URL#5297647" }, { "@score":"1", "@id":"5297648", "info":{"authors":{"author":[{"@pid":"14/2618","text":"Mei-Yu Wu"},{"@pid":"78/2188","text":"Chih-Kun Ke"},{"@pid":"44/7827","text":"Wen-Ling Tzeng"}]},"title":"Applying Context-Aware RBAC to RFID Security Management for Application in Retail Business.","venue":"APSCC","pages":"1208-1212","year":"2008","type":"Conference and Workshop Papers","access":"closed","key":"conf/apscc/WuKT08","doi":"10.1109/APSCC.2008.25","ee":"https://doi.org/10.1109/APSCC.2008.25","url":"https://dblp.org/rec/conf/apscc/WuKT08"}, "url":"URL#5297648" }, { "@score":"1", "@id":"5297649", "info":{"authors":{"author":[{"@pid":"79/6694","text":"Chao-Chin Wu"},{"@pid":"65/4237","text":"Lien Fu Lai"},{"@pid":"01/7828","text":"Po-Hsun Chiu"}]},"title":"Parallel Loop Self-Scheduling for Heterogeneous Cluster Systems with Multi-core Computers.","venue":"APSCC","pages":"251-256","year":"2008","type":"Conference and Workshop Papers","access":"closed","key":"conf/apscc/WuLC08","doi":"10.1109/APSCC.2008.166","ee":"https://doi.org/10.1109/APSCC.2008.166","url":"https://dblp.org/rec/conf/apscc/WuLC08"}, "url":"URL#5297649" }, { "@score":"1", "@id":"5297650", "info":{"authors":{"author":[{"@pid":"79/6694","text":"Chao-Chin Wu"},{"@pid":"58/2995","text":"Kuan-Chou Lai"},{"@pid":"21/7828","text":"Ren-Yi Sun"}]},"title":"GA-Based Job Scheduling Strategies for Fault Tolerant Grid Systems.","venue":"APSCC","pages":"27-32","year":"2008","type":"Conference and Workshop Papers","access":"closed","key":"conf/apscc/WuLS08","doi":"10.1109/APSCC.2008.165","ee":"https://doi.org/10.1109/APSCC.2008.165","url":"https://dblp.org/rec/conf/apscc/WuLS08"}, "url":"URL#5297650" }, { "@score":"1", "@id":"5297651", "info":{"authors":{"author":[{"@pid":"98/4432","text":"Bin Wu"},{"@pid":"04/5268","text":"Shijun Liu"},{"@pid":"68/5597-2","text":"Lei Wu 0002"}]},"title":"Dynamic Reliable Service Routing in Enterprise Service Bus.","venue":"APSCC","pages":"349-354","year":"2008","type":"Conference and Workshop Papers","access":"closed","key":"conf/apscc/WuLW08","doi":"10.1109/APSCC.2008.145","ee":"https://doi.org/10.1109/APSCC.2008.145","url":"https://dblp.org/rec/conf/apscc/WuLW08"}, "url":"URL#5297651" }, { "@score":"1", "@id":"5297652", "info":{"authors":{"author":[{"@pid":"85/7826","text":"JunFeng Wu"},{"@pid":"92/7826","text":"HuaiKou Miao"}]},"title":"A Rewriting Logic Approach to OWL-S Composite Process Formal Specification.","venue":"APSCC","pages":"343-348","year":"2008","type":"Conference and Workshop Papers","access":"closed","key":"conf/apscc/WuM08","doi":"10.1109/APSCC.2008.70","ee":"https://doi.org/10.1109/APSCC.2008.70","url":"https://dblp.org/rec/conf/apscc/WuM08"}, "url":"URL#5297652" }, { "@score":"1", "@id":"5297653", "info":{"authors":{"author":[{"@pid":"w/EricHsiaoKuangWu","text":"Eric Hsiao-Kuang Wu"},{"@pid":"61/7827","text":"Pratap Kumar Sahu"},{"@pid":"25/7827","text":"Jagruti Sahoo"}]},"title":"Destination Discovery Oriented Position Based Routing in VANET.","venue":"APSCC","pages":"1606-1610","year":"2008","type":"Conference and Workshop Papers","access":"closed","key":"conf/apscc/WuSS08","doi":"10.1109/APSCC.2008.302","ee":"https://doi.org/10.1109/APSCC.2008.302","url":"https://dblp.org/rec/conf/apscc/WuSS08"}, "url":"URL#5297653" }, { "@score":"1", "@id":"5297654", "info":{"authors":{"author":[{"@pid":"23/1092-1","text":"Song Wu 0001"},{"@pid":"42/7827","text":"Jinyan Yuan"},{"@pid":"28/2073","text":"Wei Gao"},{"@pid":"85/5317","text":"Xuanhua Shi"},{"@pid":"98/4156","text":"Hai Jin 0001"}]},"title":"Effectively Deploying Virtual Machines on Cluster.","venue":"APSCC","pages":"271-276","year":"2008","type":"Conference and Workshop Papers","access":"closed","key":"conf/apscc/WuYGSJ08","doi":"10.1109/APSCC.2008.125","ee":"https://doi.org/10.1109/APSCC.2008.125","url":"https://dblp.org/rec/conf/apscc/WuYGSJ08"}, "url":"URL#5297654" }, { "@score":"1", "@id":"5297655", "info":{"authors":{"author":[{"@pid":"98/7827","text":"Xinyi Wu"},{"@pid":"91/5027","text":"Yong Zhu"},{"@pid":"15/4732","text":"Xiaolong Deng"}]},"title":"Design and Implementation of Embedded SNMP Network Management Manager in Web-Based Mode.","venue":"APSCC","pages":"1512-1516","year":"2008","type":"Conference and Workshop Papers","access":"closed","key":"conf/apscc/WuZD08","doi":"10.1109/APSCC.2008.151","ee":"https://doi.org/10.1109/APSCC.2008.151","url":"https://dblp.org/rec/conf/apscc/WuZD08"}, "url":"URL#5297655" }, { "@score":"1", "@id":"5297656", "info":{"authors":{"author":[{"@pid":"18/5449","text":"Yingyuan Xiao"},{"@pid":"69/2745-3","text":"Hua Zhang 0003"}]},"title":"SHTM: A Semantic Hierarchy Transaction Model for Web Services Transactions.","venue":"APSCC","pages":"519-523","year":"2008","type":"Conference and Workshop Papers","access":"closed","key":"conf/apscc/XiaoZ08","doi":"10.1109/APSCC.2008.16","ee":"https://doi.org/10.1109/APSCC.2008.16","url":"https://dblp.org/rec/conf/apscc/XiaoZ08"}, "url":"URL#5297656" }, { "@score":"1", "@id":"5297657", "info":{"authors":{"author":[{"@pid":"33/4054","text":"Wei Xiong"},{"@pid":"11/7827","text":"Xu Xianbing"}]},"title":"A Tender Algorithm of Improved Distributed System Resource Management.","venue":"APSCC","pages":"1495-1499","year":"2008","type":"Conference and Workshop Papers","access":"closed","key":"conf/apscc/XiongX08","doi":"10.1109/APSCC.2008.68","ee":"https://doi.org/10.1109/APSCC.2008.68","url":"https://dblp.org/rec/conf/apscc/XiongX08"}, "url":"URL#5297657" }, { "@score":"1", "@id":"5297658", "info":{"authors":{"author":[{"@pid":"36/3988","text":"Qingyu Xu"},{"@pid":"42/4661","text":"Mingxing He"},{"@pid":"h/LeinHarn","text":"Lein Harn"}]},"title":"An Improved Time-Bound Hierarchical Key Assignment Scheme.","venue":"APSCC","pages":"1489-1494","year":"2008","type":"Conference and Workshop Papers","access":"closed","key":"conf/apscc/XuHH08","doi":"10.1109/APSCC.2008.167","ee":"https://doi.org/10.1109/APSCC.2008.167","url":"https://dblp.org/rec/conf/apscc/XuHH08"}, "url":"URL#5297658" }, { "@score":"1", "@id":"5297659", "info":{"authors":{"author":[{"@pid":"64/5882","text":"Yingxiao Xu"},{"@pid":"63/6566","text":"Weiwei Sun"}]},"title":"Composite Service Recovery Based on LSP Tunnel Recovery.","venue":"APSCC","pages":"361-366","year":"2008","type":"Conference and Workshop Papers","access":"closed","key":"conf/apscc/XuS08","doi":"10.1109/APSCC.2008.206","ee":"https://doi.org/10.1109/APSCC.2008.206","url":"https://dblp.org/rec/conf/apscc/XuS08"}, "url":"URL#5297659" }, { "@score":"1", "@id":"5297660", "info":{"authors":{"author":[{"@pid":"79/1810","text":"Guangtao Xue"},{"@pid":"73/7827","text":"Jinsheng Feng"},{"@pid":"l/MingluLi","text":"Minglu Li 0001"}]},"title":"A Passive Geographical Routing Protocol in VANET.","venue":"APSCC","pages":"680-685","year":"2008","type":"Conference and Workshop Papers","access":"closed","key":"conf/apscc/XueFL08","doi":"10.1109/APSCC.2008.252","ee":"https://doi.org/10.1109/APSCC.2008.252","url":"https://dblp.org/rec/conf/apscc/XueFL08"}, "url":"URL#5297660" }, { "@score":"1", "@id":"5297661", "info":{"authors":{"author":[{"@pid":"y/ChaoTungYang","text":"Chao-Tung Yang"},{"@pid":"92/1594","text":"Chiu-Hsiung Chen"},{"@pid":"50/4210","text":"Ming-Feng Yang"},{"@pid":"69/700","text":"Wen-Chung Chiang"}]},"title":"MIFAS: Medical Image File Accessing System in Co-allocation Data Grids.","venue":"APSCC","pages":"769-774","year":"2008","type":"Conference and Workshop Papers","access":"closed","key":"conf/apscc/YangCYC08","doi":"10.1109/APSCC.2008.267","ee":"https://doi.org/10.1109/APSCC.2008.267","url":"https://dblp.org/rec/conf/apscc/YangCYC08"}, "url":"URL#5297661" }, { "@score":"1", "@id":"5297662", "info":{"authors":{"author":[{"@pid":"08/5449","text":"Sheng-Yuan Yang"},{"@pid":"14/5864","text":"Chun-Liang Hsu"}]},"title":"Ontology-Supported Portal Architecture for Scholar's Webpages.","venue":"APSCC","pages":"1055-1060","year":"2008","type":"Conference and Workshop Papers","access":"closed","key":"conf/apscc/YangH08","doi":"10.1109/APSCC.2008.99","ee":"https://doi.org/10.1109/APSCC.2008.99","url":"https://dblp.org/rec/conf/apscc/YangH08"}, "url":"URL#5297662" }, { "@score":"1", "@id":"5297663", "info":{"authors":{"author":[{"@pid":"y/ChaoTungYang","text":"Chao-Tung Yang"},{"@pid":"98/3574","text":"Wen-Feng Hsieh"},{"@pid":"08/875","text":"Hung-Yen Chen"}]},"title":"Implementation of a Diskless Cluster Computing Environment in a Computer Classroom.","venue":"APSCC","pages":"819-824","year":"2008","type":"Conference and Workshop Papers","access":"closed","key":"conf/apscc/YangHC08","doi":"10.1109/APSCC.2008.266","ee":"https://doi.org/10.1109/APSCC.2008.266","url":"https://dblp.org/rec/conf/apscc/YangHC08"}, "url":"URL#5297663" }, { "@score":"1", "@id":"5297664", "info":{"authors":{"author":[{"@pid":"y/ChaoTungYang","text":"Chao-Tung Yang"},{"@pid":"39/3972","text":"Fang-Yie Leu"},{"@pid":"14/7231","text":"Wen-Jen Hu"}]},"title":"A Network Bandwidth-Aware Job Scheduling with Dynamic Information Model for Grid Resource Brokers.","venue":"APSCC","pages":"775-780","year":"2008","type":"Conference and Workshop Papers","access":"closed","key":"conf/apscc/YangLH08","doi":"10.1109/APSCC.2008.268","ee":"https://doi.org/10.1109/APSCC.2008.268","url":"https://dblp.org/rec/conf/apscc/YangLH08"}, "url":"URL#5297664" }, { "@score":"1", "@id":"5297665", "info":{"authors":{"author":[{"@pid":"82/503","text":"Chia-Han Yang"},{"@pid":"08/3043","text":"Joseph Z. Shyu"},{"@pid":"90/265","text":"Yimin Li"}]},"title":"A Symbiosis Model for New Product Development through Open Innovation Process.","venue":"APSCC","pages":"1424-1429","year":"2008","type":"Conference and Workshop Papers","access":"closed","key":"conf/apscc/YangSL08","doi":"10.1109/APSCC.2008.222","ee":"https://doi.org/10.1109/APSCC.2008.222","url":"https://dblp.org/rec/conf/apscc/YangSL08"}, "url":"URL#5297665" }, { "@score":"1", "@id":"5297666", "info":{"authors":{"author":[{"@pid":"65/7503","text":"Nara Yang"},{"@pid":"42/7498","text":"Gilsang Yoon"},{"@pid":"55/7499","text":"Jeonghwan Lee"},{"@pid":"60/4598","text":"Intae Hwang"},{"@pid":"31/4577","text":"Cheol Hong Kim"},{"@pid":"60/7993","text":"Jong-Myon Kim"}]},"title":"Loop Detection for Energy-Aware High Performance Embedded Processors.","venue":"APSCC","pages":"1578-1583","year":"2008","type":"Conference and Workshop Papers","access":"closed","key":"conf/apscc/YangYLHKK08","doi":"10.1109/APSCC.2008.66","ee":"https://doi.org/10.1109/APSCC.2008.66","url":"https://dblp.org/rec/conf/apscc/YangYLHKK08"}, "url":"URL#5297666" }, { "@score":"1", "@id":"5297667", "info":{"authors":{"author":{"@pid":"17/448","text":"Chi-Hsiang Yeh"}},"title":"Binary Countdown for Quality of Service in Ad Hoc and Sensor Networks.","venue":"APSCC","pages":"926-930","year":"2008","type":"Conference and Workshop Papers","access":"closed","key":"conf/apscc/Yeh08","doi":"10.1109/APSCC.2008.265","ee":"https://doi.org/10.1109/APSCC.2008.265","url":"https://dblp.org/rec/conf/apscc/Yeh08"}, "url":"URL#5297667" }, { "@score":"1", "@id":"5297668", "info":{"authors":{"author":[{"@pid":"43/4875","text":"Chun-Hsiu Yeh"},{"@pid":"90/7296","text":"Tsui-Ping Chang"},{"@pid":"75/4998","text":"Wei-Cheng Shen"}]},"title":"Developing Continuous Audit and Integrating Information Technology in E-business.","venue":"APSCC","pages":"1013-1018","year":"2008","type":"Conference and Workshop Papers","access":"closed","key":"conf/apscc/YehCS08","doi":"10.1109/APSCC.2008.8","ee":"https://doi.org/10.1109/APSCC.2008.8","url":"https://dblp.org/rec/conf/apscc/YehCS08"}, "url":"URL#5297668" }, { "@score":"1", "@id":"5297669", "info":{"authors":{"author":[{"@pid":"43/4875","text":"Chun-Hsiu Yeh"},{"@pid":"90/7296","text":"Tsui-Ping Chang"},{"@pid":"75/4998","text":"Wei-Cheng Shen"}]},"title":"Developing the Continuous Assurance Embedded Continuous Audit Web Services.","venue":"APSCC","pages":"1049-1054","year":"2008","type":"Conference and Workshop Papers","access":"closed","key":"conf/apscc/YehCS08a","doi":"10.1109/APSCC.2008.9","ee":"https://doi.org/10.1109/APSCC.2008.9","url":"https://dblp.org/rec/conf/apscc/YehCS08a"}, "url":"URL#5297669" }, { "@score":"1", "@id":"5297670", "info":{"authors":{"author":[{"@pid":"74/7827","text":"Fu-Hao Yeh"},{"@pid":"06/1480","text":"Greg C. Lee"},{"@pid":"01/4911","text":"Yu-Tzu Lin"}]},"title":"Removable Visible Watermarking in JPEG Compression Domain.","venue":"APSCC","pages":"1328-1331","year":"2008","type":"Conference and Workshop Papers","access":"closed","key":"conf/apscc/YehLL08","doi":"10.1109/APSCC.2008.30","ee":"https://doi.org/10.1109/APSCC.2008.30","url":"https://dblp.org/rec/conf/apscc/YehLL08"}, "url":"URL#5297670" }, { "@score":"1", "@id":"5297671", "info":{"authors":{"author":[{"@pid":"86/7827","text":"Yung-Chih Yen"},{"@pid":"82/7827","text":"Tung-Lin Chuang"},{"@pid":"25/5317","text":"Chia-Chen Yen"},{"@pid":"57/6148","text":"Jih-Shih Hsu"}]},"title":"A Study in the Affect and Cognition of Consumers on Blog Usage.","venue":"APSCC","pages":"323-328","year":"2008","type":"Conference and Workshop Papers","access":"closed","key":"conf/apscc/YenCYH08","doi":"10.1109/APSCC.2008.231","ee":"https://doi.org/10.1109/APSCC.2008.231","url":"https://dblp.org/rec/conf/apscc/YenCYH08"}, "url":"URL#5297671" }, { "@score":"1", "@id":"5297672", "info":{"authors":{"author":[{"@pid":"57/7827","text":"Blaise Omer Yenke"},{"@pid":"63/4133","text":"Jean-François Méhaut"},{"@pid":"89/2489","text":"Maurice Tchuenté"}]},"title":"Scheduling Deadline-Constrained Checkpointing on Virtual Clusters.","venue":"APSCC","pages":"257-264","year":"2008","type":"Conference and Workshop Papers","access":"closed","key":"conf/apscc/YenkeMT08","doi":"10.1109/APSCC.2008.131","ee":"https://doi.org/10.1109/APSCC.2008.131","url":"https://dblp.org/rec/conf/apscc/YenkeMT08"}, "url":"URL#5297672" }, { "@score":"1", "@id":"5297673", "info":{"authors":{"author":{"@pid":"y/WingLokYeung","text":"Wing Lok Yeung"}},"title":"A Formal Basis for Cross-Checking ebXML BPSS Choreography and Web Service Orchestration.","venue":"APSCC","pages":"524-529","year":"2008","type":"Conference and Workshop Papers","access":"closed","key":"conf/apscc/Yeung08","doi":"10.1109/APSCC.2008.295","ee":"https://doi.org/10.1109/APSCC.2008.295","url":"https://dblp.org/rec/conf/apscc/Yeung08"}, "url":"URL#5297673" }, { "@score":"1", "@id":"5297674", "info":{"authors":{"author":[{"@pid":"15/4530","text":"Yuyu Yin"},{"@pid":"22/1805-1","text":"Ying Li 0001"},{"@pid":"d/ShuiguangDeng","text":"ShuiGuang Deng"},{"@pid":"79/5452","text":"Wu Jian"}]},"title":"Verifying Consistency of Web Services Behavior.","venue":"APSCC","pages":"1308-1314","year":"2008","type":"Conference and Workshop Papers","access":"closed","key":"conf/apscc/YinLDJ08","doi":"10.1109/APSCC.2008.135","ee":"https://doi.org/10.1109/APSCC.2008.135","url":"https://dblp.org/rec/conf/apscc/YinLDJ08"}, "url":"URL#5297674" }, { "@score":"1", "@id":"5297675", "info":{"authors":{"author":[{"@pid":"15/4530","text":"Yuyu Yin"},{"@pid":"74/3786","text":"Jianwei Yin"},{"@pid":"22/1805-1","text":"Ying Li 0001"},{"@pid":"d/ShuiguangDeng","text":"ShuiGuang Deng"}]},"title":"Verifying Consistency of Web Services Behavior Using Type Theory.","venue":"APSCC","pages":"1560-1567","year":"2008","type":"Conference and Workshop Papers","access":"closed","key":"conf/apscc/YinYLD08","doi":"10.1109/APSCC.2008.149","ee":"https://doi.org/10.1109/APSCC.2008.149","url":"https://dblp.org/rec/conf/apscc/YinYLD08"}, "url":"URL#5297675" }, { "@score":"1", "@id":"5297676", "info":{"authors":{"author":[{"@pid":"75/2424","text":"Makoto Yoshida"},{"@pid":"78/4364","text":"Kenji Sakamoto"}]},"title":"Performance Comparison of Load Balancing Algorithms through Code Migration in Distributed Desktop Computing Grids.","venue":"APSCC","pages":"781-788","year":"2008","type":"Conference and Workshop Papers","access":"closed","key":"conf/apscc/YoshidaS08","doi":"10.1109/APSCC.2008.60","ee":"https://doi.org/10.1109/APSCC.2008.60","url":"https://dblp.org/rec/conf/apscc/YoshidaS08"}, "url":"URL#5297676" }, { "@score":"1", "@id":"5297677", "info":{"authors":{"author":[{"@pid":"77/82","text":"Lasheng Yu"},{"@pid":"359/5395","text":"Emmanuel Masabo"},{"@pid":"40/7828","text":"Chantal Mutimukwe"}]},"title":"Nash Equilibrium: Better Strategy for Agents Coordination.","venue":"APSCC","pages":"795-800","year":"2008","type":"Conference and Workshop Papers","access":"closed","key":"conf/apscc/YuMM08","doi":"10.1109/APSCC.2008.179","ee":"https://doi.org/10.1109/APSCC.2008.179","url":"https://dblp.org/rec/conf/apscc/YuMM08"}, "url":"URL#5297677" }, { "@score":"1", "@id":"5297678", "info":{"authors":{"author":[{"@pid":"69/2819","text":"Dan Yu"},{"@pid":"77/1300","text":"Gang Ye"},{"@pid":"91/2350","text":"Shilong Ma"},{"@pid":"x/NaixueXiong","text":"Naixue Xiong"},{"@pid":"y/LaurenceTianruoYang","text":"Laurence Tianruo Yang"}]},"title":"The Spacecraft Automatic Testing System Based on Workflow.","venue":"APSCC","pages":"890-895","year":"2008","type":"Conference and Workshop Papers","access":"closed","key":"conf/apscc/YuYMXY08","doi":"10.1109/APSCC.2008.180","ee":"https://doi.org/10.1109/APSCC.2008.180","url":"https://dblp.org/rec/conf/apscc/YuYMXY08"}, "url":"URL#5297678" }, { "@score":"1", "@id":"5297679", "info":{"authors":{"author":[{"@pid":"50/671-8","text":"Yu Zhang 0008"},{"@pid":"94/5089","text":"Huajun Chen"},{"@pid":"67/5160-2","text":"Xiaohong Jiang 0002"},{"@pid":"75/1078-4","text":"Hao Sheng 0004"},{"@pid":"93/7826","text":"Linhua Zhou"},{"@pid":"32/1593-3","text":"Tong Yu 0003"}]},"title":"Content-Based Trust Mechanism for E-commerce Systems.","venue":"APSCC","pages":"1181-1186","year":"2008","type":"Conference and Workshop Papers","access":"closed","key":"conf/apscc/ZhangCJSZY08","doi":"10.1109/APSCC.2008.86","ee":"https://doi.org/10.1109/APSCC.2008.86","url":"https://dblp.org/rec/conf/apscc/ZhangCJSZY08"}, "url":"URL#5297679" }, { "@score":"1", "@id":"5297680", "info":{"authors":{"author":[{"@pid":"17/739","text":"Huajian Zhang"},{"@pid":"06/209","text":"Xiaoliang Fan"},{"@pid":"73/401","text":"Ruisheng Zhang"},{"@pid":"17/7776","text":"Jiazao Lin"},{"@pid":"59/4635","text":"Zhili Zhao"},{"@pid":"57/1586-3","text":"Lian Li 0003"}]},"title":"Extending BPEL2.0 for Grid-Based Scientific Workflow Systems.","venue":"APSCC","pages":"757-762","year":"2008","type":"Conference and Workshop Papers","access":"closed","key":"conf/apscc/ZhangFZLZL08","doi":"10.1109/APSCC.2008.130","ee":"https://doi.org/10.1109/APSCC.2008.130","url":"https://dblp.org/rec/conf/apscc/ZhangFZLZL08"}, "url":"URL#5297680" }, { "@score":"1", "@id":"5297681", "info":{"authors":{"author":[{"@pid":"42/2750","text":"Haihui Zhang"},{"@pid":"88/20-1","text":"Xingshe Zhou 0001"},{"@pid":"67/75","text":"Zhiyi Yang"},{"@pid":"13/5168","text":"Xiaojun Wu"},{"@pid":"68/5714","text":"Ning Fu"}]},"title":"VGID: A Virtual Hierarchical Distributed Grid Information Database.","venue":"APSCC","pages":"21-26","year":"2008","type":"Conference and Workshop Papers","access":"closed","key":"conf/apscc/ZhangZYWF08","doi":"10.1109/APSCC.2008.148","ee":"https://doi.org/10.1109/APSCC.2008.148","url":"https://dblp.org/rec/conf/apscc/ZhangZYWF08"}, "url":"URL#5297681" }, { "@score":"1", "@id":"5297682", "info":{"authors":{"author":[{"@pid":"39/3694","text":"Wuqing Zhao"},{"@pid":"62/7560","text":"Xianbin Xu"},{"@pid":"x/NaixueXiong","text":"Naixue Xiong"},{"@pid":"77/7826","text":"Zhuowei Wang 0001"}]},"title":"A Weight-Based Dynamic Replica Replacement Strategy in Data Grids.","venue":"APSCC","pages":"1544-1549","year":"2008","type":"Conference and Workshop Papers","access":"closed","key":"conf/apscc/ZhaoXXW08","doi":"10.1109/APSCC.2008.41","ee":"https://doi.org/10.1109/APSCC.2008.41","url":"https://dblp.org/rec/conf/apscc/ZhaoXXW08"}, "url":"URL#5297682" }, { "@score":"1", "@id":"5297683", "info":{"authors":{"author":[{"@pid":"29/2670-1","text":"Yuan Zheng 0001"},{"@pid":"20/2039-2","text":"Ming Liu 0002"},{"@pid":"c/JiannongCao","text":"Jiannong Cao 0001"}]},"title":"RSQS: Resource-Saving Multi-query Scheduling in Wireless Sensor Networks.","venue":"APSCC","pages":"801-806","year":"2008","type":"Conference and Workshop Papers","access":"closed","key":"conf/apscc/ZhengLC08","doi":"10.1109/APSCC.2008.211","ee":"https://doi.org/10.1109/APSCC.2008.211","url":"https://dblp.org/rec/conf/apscc/ZhengLC08"}, "url":"URL#5297683" }, { "@score":"1", "@id":"5297684", "info":{"authors":{"author":[{"@pid":"121/0895","text":"Zhengdao Zhang"},{"@pid":"56/7827","text":"Zhumiao Peng"},{"@pid":"82/8078","text":"Zhiping Zhou"}]},"title":"The Study of Intrusion Prediction Based on HsMM.","venue":"APSCC","pages":"1358-1363","year":"2008","type":"Conference and Workshop Papers","access":"closed","key":"conf/apscc/ZhengdaoZZ08","doi":"10.1109/APSCC.2008.107","ee":"https://doi.org/10.1109/APSCC.2008.107","url":"https://dblp.org/rec/conf/apscc/ZhengdaoZZ08"}, "url":"URL#5297684" }, { "@score":"1", "@id":"5297685", "info":{"authors":{"author":[{"@pid":"23/740","text":"Cai Zhiming"},{"@pid":"99/4734","text":"Yin Jun"}]},"title":"The Process Conducting and Member Audit in the Distributed Enterprise Modeling.","venue":"APSCC","pages":"416-420","year":"2008","type":"Conference and Workshop Papers","access":"closed","key":"conf/apscc/ZhimingJ08","doi":"10.1109/APSCC.2008.219","ee":"https://doi.org/10.1109/APSCC.2008.219","url":"https://dblp.org/rec/conf/apscc/ZhimingJ08"}, "url":"URL#5297685" }, { "@score":"1", "@id":"5297686", "info":{"authors":{"author":[{"@pid":"48/4230","text":"Jiehan Zhou"},{"@pid":"85/2702","text":"Mika Rautiainen"},{"@pid":"34/76","text":"Mika Ylianttila"}]},"title":"P2P Service-Oriented Community Coordinated Multimedia: Modeling Multimedia Applications as Web Services and Experience.","venue":"APSCC","pages":"145-149","year":"2008","type":"Conference and Workshop Papers","access":"closed","key":"conf/apscc/ZhouRY08","doi":"10.1109/APSCC.2008.254","ee":"https://doi.org/10.1109/APSCC.2008.254","url":"https://dblp.org/rec/conf/apscc/ZhouRY08"}, "url":"URL#5297686" }, { "@score":"1", "@id":"5297687", "info":{"authors":{"author":[{"@pid":"99/4","text":"Zhengdong Zhu"},{"@pid":"65/3397","text":"Xuehan Dong"},{"@pid":"24/3235","text":"Yahong Hu"},{"@pid":"78/1632","text":"Weiguo Wu"},{"@pid":"59/2909","text":"Zengzhi Li"}]},"title":"A Minimum Coverage Dynamic Adaptive Method for Concurrent Web Service Composition.","venue":"APSCC","pages":"1083-1088","year":"2008","type":"Conference and Workshop Papers","access":"closed","key":"conf/apscc/ZhuDHWL08","doi":"10.1109/APSCC.2008.141","ee":"https://doi.org/10.1109/APSCC.2008.141","url":"https://dblp.org/rec/conf/apscc/ZhuDHWL08"}, "url":"URL#5297687" }, { "@score":"1", "@id":"5297688", "info":{"authors":{"author":[{"@pid":"91/5027","text":"Yong Zhu"},{"@pid":"x/NaixueXiong","text":"Naixue Xiong"},{"@pid":"01/1070","text":"Ruhan He"}]},"title":"A Two-Stage Image Segmentation Method Based on Watershed and Fuzzy C-Means.","venue":"APSCC","pages":"1550-1555","year":"2008","type":"Conference and Workshop Papers","access":"closed","key":"conf/apscc/ZhuXH08","doi":"10.1109/APSCC.2008.248","ee":"https://doi.org/10.1109/APSCC.2008.248","url":"https://dblp.org/rec/conf/apscc/ZhuXH08"}, "url":"URL#5297688" }, { "@score":"1", "@id":"5406855", "info":{"title":"Proceedings of the 3rd IEEE Asia-Pacific Services Computing Conference, APSCC 2008, Yilan, Taiwan, 9-12 December 2008","venue":"APSCC","publisher":"IEEE Computer Society","year":"2008","type":"Editorship","key":"conf/apscc/2008","ee":"https://ieeexplore.ieee.org/xpl/conhome/4780614/proceeding","url":"https://dblp.org/rec/conf/apscc/2008"}, "url":"URL#5406855" } ] } } } )