October 2004

advertisement
WSEAS TRANSACTIONS
on INFORMATION SCIENCE
and APPLICATIONS
Issue 4, Volume 1, October 2004
ISSN
1790-0832
http://www.wseas.org
Fairness measurements about TCP flows in DS networks: comparison of per-flow and aggregate marking
schemes
Virpi Laatu, Jarmo Harju, Pekka Loula
949
Worms Containment Modeling And Analysis Under Active Worm Countermeasure
Bailing Wang, Xiaochun Yun,Binxing Fang
958
The Propagation Model and Analysis of Worms Together with Anti-Worms
Bai-Ling Wang, Xiao-Chun Yun, Bin-Xing FAng
967
Energy-aware Co-synthesis and Efficient Desing Space Exploration for Time-constrained Embedded Systems
Amjad Mohsen and Richard Hofmann
977
Sensor Networking with Publish/Subscribe and IP Multicast
Miroslav Sveda, Radimir Vrba
983
CMC based approach for route optimization in Mobile IP over Wireless LAN
G.Kousalya, P. Narayanasamy
988
A large network malicious code detection system: VDS
Ping Wang, Xiao-Chun Yun, Bin-Xing Fang
994
Delivering Ethernet services in the Metro
Michael S. Berger
1004
PTD presence based authentication to linux workstation
Pekka Jappinen, Tero Vilhu, Ilmari Laakkonen and Jari Porras
1010
Hybrid Electro-Optical Packet Switch performance evaluation
Brian Bach Mortensen
1013
Hardware Scheduling of Action System Specifications
Jussi Nykanen, Jarmo Takala, Sami Lahtinen, Harri Klapuri
1019
File System Driver Filtering Against Metamorphic Viral Coding
Ruo Ando, Hideaki Miura, Yoshiyasu Takefuji
1026
Improving response capabilities to internet emergency through a high performance network resource
platform
Ni Zhang, Binxing Fang, Yao Wang
1035
Attacks on a Threshold Proxy Signature Scheme Based on the RSA Cryptosystem
Ming-Luen Wu, Yuh-Dauh Lyuu
1041
Covert Channel Detection and Analysis System Based on Data Mining
Yao Wang, Mingzeng Hu, Bin Li
1045
Personalized View of Personal Information
Kari Heikkinen, Pekka Jäppinen, Jari Porras
1050
Bluetooth Device Surveillance and Its Implications
Pekka Jäppinen, Ilmari Laakkonen, Ville Latva, Arto Hämäläinen, Jari Porras
1056
Evaluation of Failure Detectors: A Decision Theory Approach
Yu Xiangzhan, Wang Shupeng, Zou Xin
1060
Personal Trusted Device Based Local Payment System
Tuomo Repo, Arto Hämäläinen, Pekka Jäppinen, Jari Porras
1067
Machine Learning Algorithms in Chinese Web Filtering Problems Evaluation and Enhancement
A-ning Du, Bin-Xing Fang
1072
Cryptanalysis of an ElGamal-like cryptosystem for enciphering large messages
Yuh-Dauh Lyuu, Ming-Luen Wu
1079
A Formal Method to Tranform an Elementary Object Systems into a Colored Petri Net
Fabiel Zuniga, Antinio Alcala, Ivan Piza, Felix Ramos
1082
Area-based Automatic image Registration Techniques and Quality Assessment Criteria
Saqib Yousaf, Will Hossack
1088
Registration of Subpixel Translations Using a Piecewise Linear Approximation of PSF
Erol Seke, Kemal Ozkan
1094
Multispectral image Classification Using Back-Propagation Neural Network in PCA Domain
S. Chitwong, S. Witthayapradit, S. Intajag and F. Cheevasuvit
1100
Security Policy Distribution Using COPS-PR
Seung-Yong Yoon, Gae-Il Ahn, Ki-Young Kim
1106
Decoupled Estimation of Nominal Direction and Angular Spread Based on Asymptotic Maximum Likelihood
Approach
Bamrung Tau Sieskul and Somchai Jitapunkul
1110
Active Routing Protocol for Mobile ad Hoc Network
Z.A. Hani, M.D. Baba, R.A. Rahman
1114
Speaker Identification Using Wavelet and Feed Forward Neural Network
Adznan B.J., M.A. Almashrgy, Elsadig Ahmed, Abd Rahman Ramli
1121
Download