WSEAS TRANSACTIONS on INFORMATION SCIENCE and APPLICATIONS Issue 4, Volume 1, October 2004 ISSN 1790-0832 http://www.wseas.org Fairness measurements about TCP flows in DS networks: comparison of per-flow and aggregate marking schemes Virpi Laatu, Jarmo Harju, Pekka Loula 949 Worms Containment Modeling And Analysis Under Active Worm Countermeasure Bailing Wang, Xiaochun Yun,Binxing Fang 958 The Propagation Model and Analysis of Worms Together with Anti-Worms Bai-Ling Wang, Xiao-Chun Yun, Bin-Xing FAng 967 Energy-aware Co-synthesis and Efficient Desing Space Exploration for Time-constrained Embedded Systems Amjad Mohsen and Richard Hofmann 977 Sensor Networking with Publish/Subscribe and IP Multicast Miroslav Sveda, Radimir Vrba 983 CMC based approach for route optimization in Mobile IP over Wireless LAN G.Kousalya, P. Narayanasamy 988 A large network malicious code detection system: VDS Ping Wang, Xiao-Chun Yun, Bin-Xing Fang 994 Delivering Ethernet services in the Metro Michael S. Berger 1004 PTD presence based authentication to linux workstation Pekka Jappinen, Tero Vilhu, Ilmari Laakkonen and Jari Porras 1010 Hybrid Electro-Optical Packet Switch performance evaluation Brian Bach Mortensen 1013 Hardware Scheduling of Action System Specifications Jussi Nykanen, Jarmo Takala, Sami Lahtinen, Harri Klapuri 1019 File System Driver Filtering Against Metamorphic Viral Coding Ruo Ando, Hideaki Miura, Yoshiyasu Takefuji 1026 Improving response capabilities to internet emergency through a high performance network resource platform Ni Zhang, Binxing Fang, Yao Wang 1035 Attacks on a Threshold Proxy Signature Scheme Based on the RSA Cryptosystem Ming-Luen Wu, Yuh-Dauh Lyuu 1041 Covert Channel Detection and Analysis System Based on Data Mining Yao Wang, Mingzeng Hu, Bin Li 1045 Personalized View of Personal Information Kari Heikkinen, Pekka Jäppinen, Jari Porras 1050 Bluetooth Device Surveillance and Its Implications Pekka Jäppinen, Ilmari Laakkonen, Ville Latva, Arto Hämäläinen, Jari Porras 1056 Evaluation of Failure Detectors: A Decision Theory Approach Yu Xiangzhan, Wang Shupeng, Zou Xin 1060 Personal Trusted Device Based Local Payment System Tuomo Repo, Arto Hämäläinen, Pekka Jäppinen, Jari Porras 1067 Machine Learning Algorithms in Chinese Web Filtering Problems Evaluation and Enhancement A-ning Du, Bin-Xing Fang 1072 Cryptanalysis of an ElGamal-like cryptosystem for enciphering large messages Yuh-Dauh Lyuu, Ming-Luen Wu 1079 A Formal Method to Tranform an Elementary Object Systems into a Colored Petri Net Fabiel Zuniga, Antinio Alcala, Ivan Piza, Felix Ramos 1082 Area-based Automatic image Registration Techniques and Quality Assessment Criteria Saqib Yousaf, Will Hossack 1088 Registration of Subpixel Translations Using a Piecewise Linear Approximation of PSF Erol Seke, Kemal Ozkan 1094 Multispectral image Classification Using Back-Propagation Neural Network in PCA Domain S. Chitwong, S. Witthayapradit, S. Intajag and F. Cheevasuvit 1100 Security Policy Distribution Using COPS-PR Seung-Yong Yoon, Gae-Il Ahn, Ki-Young Kim 1106 Decoupled Estimation of Nominal Direction and Angular Spread Based on Asymptotic Maximum Likelihood Approach Bamrung Tau Sieskul and Somchai Jitapunkul 1110 Active Routing Protocol for Mobile ad Hoc Network Z.A. Hani, M.D. Baba, R.A. Rahman 1114 Speaker Identification Using Wavelet and Feed Forward Neural Network Adznan B.J., M.A. Almashrgy, Elsadig Ahmed, Abd Rahman Ramli 1121