| The distributed sensor networks - an emerging technology | p. 1 |
| Distributed computing track chair's message | p. 2 |
| Efficient binding lifetime determination schemes in HMIPv6 | p. 3 |
| A fast search and advanced marking scheme for network IP traceback model | p. 15 |
| Design and performance evaluation of token-based MAC protocols in WDM burst switched ring networks | p. 21 |
| Self-stabilizing energy-aware routing algorithm in wireless sensor network with limited mobility | p. 27 |
| Position based gradient routing in mobile ad hoc networks | p. 39 |
| Distributed clustering algorithm for finding virtual backbone in ad hoc networks | p. 50 |
| Merging clustering algorithms in mobile ad hoc networks | p. 58 |
| Performance study and implementation of self organized routing algorithm for mobile ad hoc network using GloMoSim | p. 62 |
| Self-stabilizing deterministic TDMA for sensor networks | p. 69 |
| Effect of mobility on communication performance in overloaded one-dimensional cellular networks | p. 82 |
| Distributed time slot assignment in wireless ad hoc networks for STDMA | p. 93 |
| Efficient algorithm for placing base stations by avoiding forbidden zone | p. 105 |
| Secure two-party context free language recognition | p. 117 |
| Autonomous agent based distributed fault-tolerant intrusion detection system | p. 125 |
| Cleaning an arbitrary regular network with mobile agents | p. 132 |
| Multi-attribute hashing of wireless data for content-based queries | p. 143 |
| A tool for automated resource consumption profiling of distributed transactions | p. 154 |
| An efficient algorithm for removing useless logged messages in SBML protocols | p. 166 |
| Divide and concur : employing Chandra and Toueg's Consensus algorithm in a multi-level setting | p. 172 |
| Distributed multiple hypothesis testing in sensor networks under bandwidth constraint | p. 184 |
| A scalable multi-level distributed system-level diagnosis | p. 192 |
| Analysis of interval-based global state detection | p. 203 |
| A two-phase scheduling algorithm for efficient collective communications of MPICH-G2 | p. 217 |
| Towards an agent-based framework for monitoring and tuning application performance in grid environment | p. 229 |
| GDP : a paradigm for intertask communication in grid computing through distributed pipes | p. 235 |
| Internet technology track chair's message | p. 242 |
| Rewriting queries using view for RDF/RDFS-based relational data integration | p. 243 |
| An effective searching method using the example-based query | p. 255 |
| On communicating with agents on the network | p. 267 |
| Applying fuzzy logic to recommend consumer electronics | p. 278 |
| Generic XML schema definition (XSD) to GUI translator | p. 290 |
| Off-line micro-payment system for content sharing in P2P networks | p. 297 |
| FlexiRank : an algorithm offering flexibility and accuracy for ranking the Web pages | p. 308 |
| Adaptable Web browsing of images in mobile computing environment : experiments and observations | p. 314 |
| An incremental document clustering algorithm based on a hierarchical agglomerative approach | p. 321 |
| System security track chair's message | p. 333 |
| A game based model of security for key predistribution schemes in wireless sensor network | p. 334 |
| E-mail worm detection using the analysis of behavior | p. 348 |
| Verifiably encrypted signature scheme without random oracles | p. 357 |
| An improved intrusion detection technique for mobile adhoc networks | p. 364 |
| User revocation in secure adhoc networks | p. 377 |
| A hybrid method to intrusion detection systems using HMM | p. 389 |
| Enhanced network traffic anomaly detector | p. 397 |
| Statistically secure extension of anti-collusion code fingerprinting | p. 404 |
| An improvement of auto-correlation based video watermarking scheme using perceptual masking for motion | p. 410 |
| Validation of policy integration using alloy | p. 420 |
| Linking theories of concurrency by retraction | p. 432 |
| Software engineering track chair's message | p. 433 |
| Integrating architecture description languages : a semantics-based approach | p. 434 |
| Automated runtime validation of software architecture design | p. 446 |
| Analyzing loop paths for execution time estimation | p. 458 |
| A technique for early software reliability prediction | p. 470 |
| Executable requirements specifications using triggered message sequence charts | p. 482 |
| Efficient symmetry reduction for an actor-based model | p. 494 |
| Validated code generation for activity diagrams | p. 508 |
| Data mining track chair's message | p. 522 |
| An approach to find embedded clusters using density based techniques | p. 523 |
| Using sub-sequence information with kNN for classification of sequential data | p. 536 |
| Distance-based outliers in sequences | p. 547 |
| Capturing market intelligence from customer feedback E-mails using self-enhancing Bolztmann machine-based network of knowledge maps | p. 553 |
| Algorithm for fuzzy clustering of mixed data with numeric and categorical attributes | p. 561 |
| Dissemination of multidimensional data using broadcast clusters | p. 573 |
| Multidimensional frequent pattern mining using association rule based constraints | p. 585 |
| A classification based approach for root unknown phylogenetic networks under constrained recombination | p. 592 |
| Table of Contents provided by Blackwell. All Rights Reserved. |