| Mobile Code and Agent Technology | |
| Mobility Prediction-Based Wireless Resource Allocation and Reservation | p. 1 |
| An Agent-Enabled Content-Explicit Authorization Model for OGSA-Compliant Grid | p. 12 |
| A Predictable Mobile Agent Computation Model and Its Fabric Architecture | p. 18 |
| A Novel Reverse Rerouting Mechanism in Mobile Wireless Internet | p. 27 |
| An Agents Based Grid Infrastructure of Social Intelligence | p. 33 |
| Agent Aided Workflow Modeling | p. 39 |
| Content Sharing and Consistency Management | |
| An Improved Hybrid Method of Maintaining Content Consistency | p. 46 |
| Advanced Architecture for Distributed Systems with a Network Infrastructure Based on CAN and Internet for Content Distribution | p. 58 |
| Distributed Document Sharing with Text Classification over Content-Addressable Network | p. 70 |
| Content Distribution Stochastic Fluid Models for Multi-regions P2P Networks | p. 82 |
| Construct Campus Peer-to-Peer Networks | p. 88 |
| Networking Infrastructure and Performance | |
| Fractional Gaussian Noise: A Tool of Characterizing Traffic for Detection Purpose | p. 94 |
| Performance Analysis of Virtual Time Optimistic Transaction Processing | p. 104 |
| A Measurement-Based TCP Congestion Control Scheme | p. 112 |
| BM- VF-SBD: An Efficient Data Channel Scheduling Algorithm to Support QoS for Optical Burst Switching Networks | p. 120 |
| A Predictive Controller for AQM Router Supporting TCP with ECN | p. 131 |
| Content Aware Security (I) | |
| Enhancing the Content of the Intrusion Alerts Using Logic Correlation | p. 137 |
| Real-Time Emulation of Intrusion Victim in HoneyFarm | p. 143 |
| On the Formal Characterization of Covert Channel | p. 155 |
| Availability Analysis and Comparison of Different Intrusion-Tolerant Systems | p. 161 |
| Security Analysis of User Efficient Blind Signatures | p. 167 |
| Content Aware Security (II) | |
| A Novel DDoS Attack Detecting Algorithm Based on the Continuous Wavelet Transform | p. 173 |
| Enhancing the Scalability of the Community Authorization Service for Virtual Organizations | p. 182 |
| Securing Multicast Groups in Ad Hoc Networks | p. 194 |
| Improved Privacy-Protecting Proxy Signature Scheme | p. 208 |
| Improving Security Architecture Development Based on Multiple Criteria Decision Making | p. 214 |
| Multimedia Content | |
| A LSB Substitution Oriented Image Hiding Strategy Using Genetic Algorithms | p. 219 |
| A Prediction Scheme for Image Vector Quantization Based on Mining Association Rules | p. 230 |
| Fuzzy Logic-Based Image Retrieval | p. 241 |
| Deriving Facial Patterns for Specifying Korean Young Men's 3D Virtual Face from Muscle Based Features | p. 251 |
| A Content-Based Fragile Watermarking Scheme for Image Authentication | p. 258 |
| Content Mining and Knowledge Extraction | |
| A New FP-Tree Algorithm for Mining Frequent Itemsets | p. 266 |
| Evaluation Incompleteness of Knowledge in Data Mining | p. 278 |
| The Variable Precision Rough Set Model for Data Mining in Inconsistent Information System | p. 285 |
| Rule Discovery with Particle Swarm Optimization | p. 291 |
| Data Mining Service Based on MDA | p. 297 |
| Web Services and Content Applications (I) | |
| Web Service Composition Based on BPWS-Net | p. 303 |
| Testing Web Services Using Progressive Group Testing | p. 314 |
| XFCM - XML Based on Fuzzy Clustering and Merging -Method for Personalized User Profile Based on Recommendation System of Category and Product | p. 323 |
| Analyzing Web Interfaces of Databases for Retrieving Web Information | p. 331 |
| A New Universally Verifiable and Receipt-Free Electronic Voting Scheme Using One-Way Untappable Channels | p. 337 |
| Web Services and Content Applications (II) | |
| Ontology-Based Conceptual Modeling of Policy-Driven Control Framework: Oriented to Multi-agent System for Web Services Management | p. 346 |
| An Approach to Dynamically Reconfiguring Service-Oriented Applications from a Business Perspective | p. 357 |
| Dynamically Reconfiguring Sitemaps Using RDF | p. 369 |
| A General Model for Heterogeneous Web Services Integration | p. 374 |
| Methodology for Semantic Representing of Product Data in XML | p. 380 |
| Semantic Based Web Services Discovery | p. 388 |
| Content Retrieval and Management (I) | |
| What Are People Looking for in Your Web Page? | p. 394 |
| The Impact of OCR Accuracy on Automatic Text Classification | p. 403 |
| TSS: A Hybrid Web Searches | p. 410 |
| Determining the Number of Probability-Based Clustering: A Hybrid Approach | p. 416 |
| Categorizing XML Documents Based on Page Styles | p. 422 |
| Content Retrieval and Management (II) | |
| Generating Different Semantic Spaces for Document Classification | p. 430 |
| A Component Retrieval Method Based on Facet-Weight Self-learning | p. 437 |
| The Algorithm About Division and Reducts of Information System Based on Discernibility Index of Attribute | p. 449 |
| An Effective Document Classification System Based on Concept Probability Vector | p. 457 |
| Accuracy Improvement of Automatic Text Classification Based on Feature Transformation and Multi-classifier Combination | p. 463 |
| Ontology and Knowledge Conceptualization | |
| Risk Minimization Based Ontology Mapping | p. 469 |
| Evolutionary Parameter Estimation Algorithm for Combined Kernel Function in Support Vector Machine | p. 481 |
| Enriching Domain Ontology from Domain-Specific Documents with HowNet | p. 487 |
| A Framework of Extracting Sub-ontology | p. 493 |
| Ontology Based Sports Video Annotation and Summary | p. 499 |
| Author Index | p. 509 |
| Table of Contents provided by Publisher. All Rights Reserved. |