Mesh Simplification for QoS Control in 3D Web Environment | p. 1 |
Content Adaptation and Transmission Strategy of Spatial Information for WWW and Mobile Applications | p. 12 |
Web Caching Performance: How Much Is Lost Unwarily? | p. 23 |
A PKI-Based Authentication Framework for Next Generation Mobile Internet | p. 34 |
A Robust and Recoverable Tamper Proofing Technique for Image Authentication | p. 44 |
Efficient Distributed Reputation Scheme for Peer-to-Peer Systems | p. 54 |
A Study of the Conduct of Korean IT Participants in Ethical Decision Making | p. 64 |
Educational Use of E-mentoring to Encourage Women into Science and Engineering | p. 75 |
The Role of the Internet in the SME Hotel Sector in Austria | p. 85 |
A Study on Monitoring and Protecting Computer System against Interception Threat | p. 96 |
A Very Small Bytecode-Verifier Based on PCC Algorithm for Smart Card | p. 106 |
A Preliminary Study on Multiple Documents Access via Mobile Devices | p. 116 |
Practical Adaptive Routing Schemes Considering Load Balancing in WDM Networks | p. 128 |
A Practical RWA Algorithm Based on Lookup Table for Edge Disjoint Paths | p. 138 |
A Configuration Algorithm for Supporting VC-merge Concept under the Cell-Based MPLS Network | p. 148 |
Ill Effects of Broadband Internet under Flat Rate Pricing | p. 158 |
The Role of Government Policy for Diffusing the High-Speed Internet and the Spreading Economic Effects in Korea | p. 168 |
Flow in Computer Hacking: A Model | p. 176 |
Ambiguity Correction Method for Free-Form Annotation in XML Documents | p. 187 |
An XPATH Query Processor for a Decomposition Storage Scheme | p. 197 |
Fast Updatable Indexing Scheme for Structured XML Documents | p. 207 |
Collaborative Junk E-mail Filtering Based on Multi-agent Systems | p. 218 |
A Framework for Building Flexible Internet-Based Collaboration Environment | p. 228 |
A Chinese Automatic Interactive Feedback System for Applying in a Website | p. 238 |
The Virtual Enterprise: Redefining the Concept | p. 249 |
Compete with the Retailing Giants for Survival: A Procurement Alliance Approach Enabled by Internet Technology | p. 259 |
A Virtual Logistics Network and an E-hub as a Competitive Approach for Small to Medium Size Companies | p. 265 |
An Efficient Buffer Allocation Technique for Virtual Lanes in InfiniBand Networks | p. 272 |
Integrated Scheduling Using Rendezvous Window and Sniff Mode for Wireless Personal Area Networks | p. 282 |
Topological-Order Based Dynamic Polling Scheme Using Routing Path for Network Monitoring | p. 292 |
An On-Demand Energy-Efficient Routing Algorithm for Wireless Ad Hoc Networks | p. 302 |
A Grid Architecture for Building Hybrid Museums | p. 312 |
A Graph-Based Approach to Compute Multiple Paths in Mobile Ad Hoc Networks | p. 323 |
Computer Vision-Assisted Interaction in X3D Virtual Environment on WWW | p. 332 |
Implementation of a Web Robot and Statistics on the Korean Web | p. 341 |
DOC: A Distributed Object Caching System for Information Infrastructure | p. 351 |
Reliable Real-Time Transport of Stereo Video for Immersive Media Communication | p. 362 |
Development of a Multipurpose Audio Transmission System on the Internet | p. 372 |
Admission Control for TCP Connections in QoS IP Network | p. 383 |
A Study on Mobile Payment System with United Mileage Using USIM | p. 394 |
Peer-to-Peer Money: Free Currency over the Internet | p. 404 |
A Framework of Winner Determination Algorithms for Internet Auctions | p. 415 |
CESUE: A Cooking Education System in ubillome Environment | p. 425 |
Teaching Methods of Web Authoring | p. 432 |
Dynamic Conceptual Network Mechanism for a Web-Based Authoring System | p. 442 |
Mobility Agent with SIP Registrar for VoIP Services | p. 454 |
MAT: An End-to-End Mobile Communication Architecture with Seamless IP Handoff Support for the Next Generation Internet | p. 465 |
Flow Handoff Scheme to Support Group Mobility in Wireless Ad Hoc Networks | p. 476 |
A Flexible Transition Scheme within a Dual Stack Host in IPv4/IPv6 Coexistence Phase | p. 486 |
Design and Implementation of IPv6-IPv4 Protocol Translation System Using Dynamic IP Address | p. 496 |
TCP Performance Improvement with ACK Pacing in Wireless Data Networks | p. 507 |
Message Transferring Model between Mobile Agents in Multi-region Mobile Agent Computing Environment | p. 517 |
A Secure Mobile Agent System Using Multi-signature Scheme in Electronic Commerce | p. 527 |
A Nested Token-Based Delegation Scheme for Cascaded Delegation in Mobile Agent Environments | p. 537 |
New Mechanisms for End-to-End Security Using IPSec in NAT-Based Private Networks | p. 548 |
Network Management Services in GSMP Open Interface | p. 558 |
The Bitmap Trie for Fast Prefix Lookup | p. 566 |
Framework of Control Protocol for Relayed Multicast | p. 576 |
The Framework for the Message Transport Agent in a Web-Based Information System | p. 582 |
Semantic Web Search Model for Information Retrieval of the Semantic Data | p. 588 |
Building a Web-Enabled Multimedia Data Warehouse | p. 594 |
Dynamic Order of Rules for RBR Based Network Fault Diagnosis and Recovery System | p. 601 |
Symmetric and Asymmetric Cryptography Based Watermarking Scheme for Secure Electronic Commerce via the Internet | p. 607 |
Improving Disk I/O Performance by Using Raw Disk for Web Proxy Servers | p. 613 |
Superposed Multiple QoS Guarantee in Optical Access Networks | p. 619 |
A Selection Process of COTS Components Based on the Quality of Software in a Special Attention to Internet | p. 626 |
Robust Authentication of Multimedia Stream over Multicast Network | p. 632 |
Strong User Authentication in IEEE802.11 Wireless LAN | p. 638 |
Refundable Electronic Cash for Mobile Commerce | p. 644 |
Improved Client Authentication Using Session Authentication in the Internet | p. 650 |
Performance Analysis of MAC Protocol for EPON Using OPNET | p. 656 |
Constructing an Internet Chatting Dictionary for Mapping Chatting Language to Standard Language | p. 662 |
Speaker Verification System for PDA in Mobile-Commerce | p. 668 |
Efficient Change Detection in Tree-Structured Data | p. 675 |
Composition of MPEG-7 Visual Descriptors for Detecting Adult Images on the Internet | p. 682 |
Block Splitting Indexing for Supporting Containment Queries | p. 688 |
Dynamic Deployment of Software Defined Radio Components for Mobile Wireless Internet Applications | p. 694 |
Fostering Spatial Visualization Ability through Web-Based Virtual-Reality Program and Paper-Based Program | p. 701 |
Web-Based Instruction Model for Interactive Classroom Learning | p. 707 |
A Watermarking Method for Halftone Images Based on Direct Binary Search | p. 713 |
A Study on Mobile Commerce AAA Mechanism for Wireless LAN | p. 719 |
Analysis of User Utility Function in the Combined Cellular/WLAN Environments | p. 725 |
New Adaptive Trust Models against DDoS: Back-Up CA and Mesh PKI | p. 731 |
An Efficient Broadcast Scheme on a Single Broadcast Channel in a Wireless Internet Environment | p. 738 |
Experiences with Media-Integrated Distributed Control for C4I Applications in Global Military Infosphere | p. 744 |
TDM: Enforcement of Security Management System for XML-Centric Electronic Commerce | p. 751 |
A minimum-Bandwidth Guaranteed Scheduling Algorithm for Data Services in CDMA/HDR System | p. 757 |
Fair Real-Time Resource Allocation for Internet End System's QoS Support | p. 764 |
Author Index | p. 771 |
Table of Contents provided by Blackwell. All Rights Reserved. |