default search action
22nd AINA Workshops 2008: Gino-wan City, Okinawa, Japan
- 22nd International Conference on Advanced Information Networking and Applications, AINA 2008, Workshops Proceedings, GinoWan, Okinawa, Japan, March 25-28, 2008. IEEE Computer Society 2008
- M. V. Panduranga Rao, K. Chandrashekar Shet, R. Balakrishna, K. Roopa:
Development of Scheduler for Real Time and Embedded System Domain. 1-6 - Cai Zhiming, Yin Jun, Huang Liangli:
The Solution Modelling System with Grouped Agents. 7-11 - Min Peng, Laurence Tianruo Yang, Wuqing Zhao, Naixue Xiong:
Wireless Service Attributes Classification and Matching Mechanism Based on Decision Tree. 12-17 - Xuan Gu, Dong Wang, Huanye Sheng:
RFID-Based Locating Management. 18-23 - Li Han, Jyri P. Salomaa, Jian Ma, Kuifei Yu:
Research on Context-Aware Mobile Computing. 24-30 - Hiroyasu Mitsui, Hidetoshi Kambe, Satoshi Endo, Hisao Koizumi:
A Student Experiment Method for Learning the Basics of Embedded Software Development Including HW/SW Co-design. 31-37 - Hiroaki Yuze, Chaoqun Wang, Shigeki Sugiura, Takeshi Otofuji, Toshiki Aikawa:
A Prototype System to Support the KJ Method by Cooperation between Visually-Impaired Persons and Sighted Persons. 38-43 - Andreas Konstantinidis, Thrasyvoulos Tsiatsos:
Selecting a Networked Virtual Environment Platform and the Design of a Collaborative e-Learning Environment. 44-49 - Ming-Yang Su, Sheng-Cheng Yeh, Kai-Chi Chang, Hua-Fu Wei:
Using Incremental Mining to Generate Fuzzy Rules for Real-Time Network Intrusion Detection Systems. 50-55 - Jianhua Yang, Byong Lee, Stephen S. H. Huang:
Monitoring Network Traffic to Detect Stepping-Stone Intrusion. 56-61 - Nen-Fu Huang, Hsien-Wei Hung, Sheng-Hung Lai, Yen-Ming Chu, Wen-Yen Tsai:
A GPU-Based Multiple-Pattern Matching Algorithm for Network Intrusion Detection Systems. 62-67 - Jin-Cherng Lin, Chun-Lun Chou, Cheng-Hsiung Liu:
Performance Evaluation for Scheduling Algorithms in WiMAX Network. 68-74 - Sina Meraji, Hamid Sarbazi-Azad:
Empirical Performance Evaluation of Stretched Hypercubes. 75-79 - Priscila Solís Barreto, Paulo Henrique Portela de Carvalho:
Hybrid Traffic Model for Multimedia Network Performance Evaluation. 80-85 - Po-Cheng Chen, Cheng-I Lin, Sheng-Wei Huang, Jyh-Biau Chang, Ce-Kuen Shieh, Tyng-Yeu Liang:
A Performance Study of Virtual Machine Migration vs. Thread Migration for Grid Systems. 86-91 - Cameron Kiddle, Derek Kivi, Rob Simmonds:
Model-Driven Automation in Grid Environments. 92-99 - Xudong Ni, Junzhou Luo:
A Clustering Analysis Based Trust Model in Grid Environment Supporting Virtual Organizations. 100-105 - YongNyuo Shin, YongJun Lee, Woochang Shin, Jinyoung Choi:
Designing Fingerprint-Recognition-Based Access Control for Electronic Medical Records Systems. 106-110 - Giovanni Russello, Changyu Dong, Naranker Dulay:
A Workflow-Based Access Control Framework for e-Health Applications. 111-120 - Sekpon Juntapremjitt, Somchart Fugkeaw, Piyawit Manpanpanich:
An SSO-Capable Distributed RBAC Model with High Availability across Administrative Domain. 121-126 - Yinliang Yue, Fang Wang, Dan Feng:
DS-MOSD: A Dynamic Selectable Master OSD Model for Large-Scale Object-Based Storage System. 127-132 - Yusuke Murase, Ailixier Aikebaier, Tomoya Enokido, Makoto Takizawa:
Distributed Databases in Dynamic R-Tree for Vehicle Information Systems. 133-138 - Lubna K. Alazzawi, Ali M. Elkateeb, Aiyappa Ramesh, Waleed Aljuhar:
Scalability Analysis for Wireless Sensor Networks Routing Protocols. 139-144 - Jaiwant Mulik:
Maxflow Based Routing for Traffic Engineering and Sustained High Bitrate Applications. 145-150 - Xiangjiang Hu, Peidong Zhu, Kaiyu Cai, Zhenghu Gong:
AS Alliance in Inter-Domain Routing. 151-156 - Yong-Ju Lee, Hag-Young Kim, Cheol-Hoon Lee:
A Stochastic Availability Prediction Model for Head Nodes in the HA Cluster. 157-161 - Suzhen Wu, Dan Feng, Bo Mao, Jianxi Chen, Lingfang Zeng:
SOSRAID-6: A Self-Organized Strategy of RAID-6 in the Degraded Mode. 162-167 - Katsuyoshi Matsumoto, Shingo Nomoto, Minoru Uehara, Hideki Mori:
Fault Tolerant Small-World Cellular Neural Networks. 168-172 - Kenichi Tanaka, Minoru Uehara, Hideki Mori:
Parallel Computing of CG Using an Open Source Windows Grid. 173-180 - Yih-Jiun Lee, Kai-Wen Lien:
Script: Simulations from Grid to Ubiquitous Computing. 181-186 - Ke Xu, Junwei Cao, Lianchen Liu, Cheng Wu:
Performance Optimization of Temporal Reasoning for Grid Workflows Using Relaxed Region Analysis. 187-194 - Kenichi Tanaka, Minoru Uehara, Hideki Mori:
A Case Study of a Linux Grid on Windows Using Virtual Machines. 195-200 - Yongyi Zhao, Jin Li:
Research on Location Service Integration Strategy. 201-204 - Misbah Mubarak, Sara Sultana, Zarrar Abbas Khan, Hafiz Farooq Ahmad, Hajra Batool Asghar, Hiroki Suguri:
Strongly Instrumented Generic Mobility Architecture (SIGMA). 205-210 - Andre Elia Assad, Nelson Souto Rosa:
Device Middleware for Heterogeneous Access to Java Services. 211-216 - Eunyong Park, Sunyoung Han, Heemin Kim, Kiwon Son:
Cross-Correlated FEC Scheme for Multimedia Streaming over Wireless LAN. 217-222 - Razvan Beuran, Junya Nakata, Takashi Okada, Lan Tien Nguyen, Yasuo Tan, Yoichi Shinoda:
A Multi-Purpose Wireless Network Emulator: QOMET. 223-228 - Ngoc Bao Tran, Dinh Thuc Nguyen:
A Graph Isomorphism Based Authentication Protocol for Access Control in WLAN. 229-234 - Shingo Kawamura, Shinya Toji, Minoru Uehara, Hideki Mori:
A Method of Project Member Arrangement of Using SOM for a Web Community. 235-240 - Yufeng Wang, Yoshiaki Hori, Kouichi Sakurai:
Thoughts on Multi-Disciplinary Inspired Research on Open Network and Information System. 241-246 - Junze Wang, Yi Guo, Benxiong Huang, Jianhua Ma, Yijun Mo:
Delta Compression for Information Push Services. 247-252 - Boyoung Rhee, Kwangman Koh, Sunyoung Han:
Overlay Multicast Architecture Supporting QoS over NGN. 253-258 - Mohamed El Hachimi, Marc-Andre Breton, Maria Bennani:
Efficient QoS Implementation for MPLS VPN. 259-263 - Dan Feng, Chengtao Lu, Fang Wang:
eMuse: QoS Guarantees for Shared Storage Servers. 264-269 - Kuo-Qin Yan, Shun-Sheng Wang, Shu-Ching Wang:
An Optimal Solution of Byzantine Agreement in a Scale Free Network. 270-275 - Rashid Bin Muhammad:
A Parallel Computation of the Steiner Tree Algorithm on Server-Client Paradigm. 276-280 - Kai Han, Binoy Ravindran, E. Douglas Jensen:
LRTG: Scheduling Distributed Real-Time Tasks in Unreliable and Untrustworthy Systems. 281-287 - Zheng Da Wu:
Resource-Cost Analysis for Massively Multiplayer Online Games. 288-295 - Dan Gao, Jueping Cai, Zan Li, Xing Wei, Rei Chen:
Credit Token Based Dynamic Resource Renting and Offering Mechanism for Cognitive Radio WRAN BS Spectrum Sharing. 296-300 - Mohsen Taherian, Rasool Jalili, Morteza Amini:
PTO: A Trust Ontology for Pervasive Environments. 301-306 - Mingchu Li, Yizhi Ren, Kouichi Sakurai, Yongrui Cui, Zhi-Hui Wang:
Granularity Considering in a Trust Model for P2P Networks. 307-312 - Yoshio Nakajima, Alireza Goudarzi Nemati, Tomoya Enokido, Makoto Takizawa:
Trustworthiness and Confidence of Peers in Peer-to-Peer (P2P) Network. 313-318 - Alireza Goudarzi Nemati, Makoto Takizawa:
Application Level QoS in Multimedia Peer-to-Peer (P2P) Networks. 319-324 - Xuping Tu, Hai Jin, Xiaofei Liao, Weidong Wang, Sirui Yang, Qi Huang:
Collaboratively Scheduling to Decrease Inter-AS Traffic in P2P Live Streaming. 325-330 - Kai Hu, Yan Jiang, Zhibin Yang, Shiran Chen:
An Expanded Stochastic Model in DAG Schemes. 331-336 - Jing Du, Canqun Yang, Fujiang Ao, Xuejun Yang:
OSS: Efficient Compiler Approach for Selecting Optimal Strip Size on the Imagine Stream Processor. 337-342 - Yuehua Shi, Feng Zhao, Zhong Zhang:
Hardware Implementation of ADABOOST ALGORITHM and Verification. 343-346 - Mehrdad Manaffar, Hamidreza Bakhshi, Mostafa Pilevari:
A New Dynamic Pricing Scheme with Call Admission Control to Reduce Network Congestion. 347-352 - Mohammad Mirza-Aghatabar, Somayyeh Koohi, Shaahin Hessabi, Dara Rahmati:
An Adaptive Approach to Manage the Number of Virtual Channels. 353-358 - Muhammad Bilal Ali, Muhammad Kamran, Hafiz Farooq Ahmad, Hiroki Suguri, Ali Liaqat:
Cell Level Co-Operation for SLA Based Radio Resource Management. 359-364 - Ying Huang, Xiangsheng Fu, Qiang Hou, Zifan Yu:
The Early Detection of DDoS Based on the Persistent Increment Feature of the Traffic Volume. 365-370 - Tae-Hyung Kim, Young-Sik Choi, Jong Kim, Sung Je Hong:
Annulling SYN Flooding Attacks with Whitelist. 371-376 - Yacine Djemaiel, Noureddine Boudriga:
Dynamic Detection and Tolerance of Attacks in Storage Area Networks. 377-382 - Benting Wan:
Scheduling Strategy of Subtask Decomposed. 383-386 - Gonzalo Huerta Cánepa, Dongman Lee:
An Adaptable Application Offloading Scheme Based on Application Behavior. 387-392 - Pedro Nuno San-Bento Furtado:
Efficient Shared Computations over Distributed Sites. 393-398 - Yoshitaka Yokokawa, Koji Hashimoto, Yoshitaka Shibata:
PLEXCast: Peer-to-Peer Flexble Broadcast System. 399-406 - Keita Matsuo, Leonard Barolli, Fatos Xhafa, Akio Koyama, Arjan Durresi, Makoto Takizawa:
Design and Implementation of a JXTA-Overlay P2P System and Smart Box Environment. 407-412 - Ying Wang, Xinjun Du, Hui Li, Yumin Wang:
The Design of Optimal Period Interleaver. 413-415 - Ren-Chiun Wang, Wen-Shenq Juang, Chin-Laung Lei:
An Anonymous and Deniable Conversation for a Thin Client. 416-421 - Jingwei Liu, Rong Sun, Wenping Ma, Ying Li, Xinmei Wang:
Fair Exchange Signature Schemes. 422-427 - Guoyan Zhang, Shaohui Wang:
Aggregate and Separate of Signatures in Wireless Network. 428-433 - Joel J. P. C. Rodrigues, Mário M. Freire:
Performance Assessment of Enhanced Just-in-Time Protocol in OBS Networks Taking into Account Control Packet Processing and Optical Switch Configuration Times. 434-439 - Shu-Ming Tseng, Yu-Chin Kuo, Yueh-Teng Hsu:
Simpler and More Accurate Throughput Analysis of CDMA Pure ALOHA Networks with Variable Length Traffic. 440-444 - Cheng-Feng Tai, Lin-Huang Chang, Ting-Wei Hou:
Improvement of SCTP Performance during Handshake Process. 445-450 - Wu-Hong Tsai, Yuan-Sun Chu:
A Core Migration Method to Minimize Inter-Destination Delay Variation. 451-456 - R. Gunasundari, S. Shanmugavel, K. Bakyalakshmi:
Fault Tolerant HAWAII Protocol for IP services in Wireless Networks. 457-462 - Dai Bin, Furong Wang, Jianhua Ma, Liu Jian:
Enhanced Chord-Based Routing Protocol Using Neighbors' Neighbors Links. 463-466 - Ivan Tomek, Rick Giles, Hai Zhang, Li Di:
FVE - A Virtual Environment for Collaboration. 467-472 - Cin-Shung Yang, Pang-Chieh Wang, Cheng-Liang Lin, Ting-Wei Hou:
Personalized iDTV Program in Multimedia Home Platform. 473-476 - Akihiro Miyakawa, Tomoyuki Ishida, Yoshitaka Shibata:
Visual and Physical Feature Analysis for Kansei Retrieval Method in VR Japanese Crafting Presentation System. 477-482 - Atsushi Takeda, Kazuo Hashimoto, Gen Kitagata, Salahuddin Muhammad Salim Zabir, Tetsuo Kinoshita, Norio Shiratori:
A New Authentication Method with Distributed Hash Table for P2P Network. 483-488 - Jedsada Phengsuwan, Naiyana Sahavechaphan:
WindChimer: The Partially Centralized and Controlled P2P System for Better Discovery. 489-494 - Masakazu Maruoka, Alireza Goudarzi Nemati, Valbona Barolli, Tomoya Enokido, Makoto Takizawa:
Role-Based Access Control in Peer-to-Peer (P2P) Societies. 495-500 - Eiji Sugino, Katsuyoshi Onodera, Norihisa Segawa, Jun Sawamoto:
Construction of Distributed Terminal Management System in Consideration of Hierarchical Subnet in Intranet. 501-507 - Hoyoung Lee, Jing Liu, Sunyoung Han:
Practical Multicast Security Architecture Using Sleep State. 508-513 - Mohammad Mirza-Aghatabar, Arash Tavakkol, Hamid Sarbazi-Azad, Abbas Nayebi:
An Adaptive Software-Based Deadlock Recovery Technique. 514-519 - Yan Shi, Min Sheng:
Study of a Scheduling Algorithm Based on Simple Network Coding with High Throughput and Low Delay. 520-525 - Lechang Cheng, Norman C. Hutchinson, Mabo Robert Ito:
RealNet: A Topology Generator Based on Real Internet Topology. 526-532 - Masaaki Noro, Fumiaki Tameshige, Ken-ichi Baba, Shinji Shimojo:
Performance Evaluation of Advanced High-Speed Data Transfer Methods in Long-Distance Broadband Networks. 533-540 - Fan Zhang, Furong Wang, Bin Dai, Yafang Li:
Performance Evaluation of IEEE 802.15.4 Beacon-Enabled Association Process. 541-546 - Vasaka Visoottiviseth, Niwat Bureenok:
Performance Comparison of ISATAP Implementations on FreeBSD, RedHat, and Windows 2003. 547-552 - Koji Hashimoto, Yoshitaka Shibata:
Design and Implementation of Adaptive Streaming Modules for Multipoint Video Communication. 553-560 - Tarek R. Sheltami:
Neighbor-Aware Clusterhead for SNET. 561-566 - Bunthit Watanapa, Saowaluk Watanapa:
A Fuzzy Approach for Personalized Product Clustering with Flexible Discriminating Power. 567-572 - Wei-Hua Jiang, Jun Du, Feng Liu:
Research on System Integrative Evaluation Method Based on Survivability. 573-577 - Xin Xiao, Yuanchun Shi, Zhijia Chen, Baopeng Zhang:
On Constructing High Performance Overlay for Layered Streaming in Heterogeneous Networks. 578-584 - Jiandong Li, Xiaoyan Sun, Pengyu Huang, Jiyong Pang:
Performance Analysis of Active Target Localization Using TDOA and FDOA Measurements in WSN. 585-589 - Chun-Hsin Wang, Yen-Chih Chiang:
Multi-Layer Traceback under the Hierarchical Tracers Deployment. 590-595 - Ming Dong Wan, Han-Ching Wu, Ying-Wei Kuo, James Marshall, Shou-Hsuan Stephen Huang:
Detecting Masqueraders Using High Frequency Commands as Signatures. 596-601 - Jin-Cherng Lin, Jan-Min Chen, Cheng-Hsiung Liu:
An Automatic Mechanism for Adjusting Validation Function. 602-607 - Yong Liu, Zhong Chen, Yu Chen:
How to Optimize the Cryptographic Symmetric Primitives on Loongson-2E Microprocessor. 608-614 - Jongwoo Sung, Sungjin Ahn, Taesoo Park, Seonghun Jang, Dongheui Yun, Jonggu Kang, Seongeun Yoo, Pohkit Chong, Daeyoung Kim:
Wireless Sensor Networks for Cultural Property Protection. 615-620 - Emad A. El-Sebakhy:
New Computational Intelligence Paradigm for Estimating the Software Project Effort. 621-627 - Seongeun Yoo, Pohkit Chong, Taisoo Park, Youngsoo Kim, Daeyoung Kim, Changsub Shin, Kyungbok Sung, Hyunhak Kim:
DGS: Driving Guidance System Based on Wireless Sensor Network. 628-633 - Amirhosein Taherkordi, Reza Mohammadi, Frank Eliassen:
A Communication-Efficient Distributed Clustering Algorithm for Sensor Networks. 634-638 - Yi Wang, Furong Wang, Chunming Rong, Sufang Wang:
SPM: A Security Policy Based on Micropayment in Ad Hoc Networks. 639-643 - Jin-Hee Cho, Ing-Ray Chen, Phu-Gui Feng:
Performance Analysis of Dynamic Group Communication Systems with Intrusion Detection Integrated with Batch Rekeying in Mobile Ad Hoc Networks. 644-649 - Yu-Fang Chung, Tzer-Shyong Chen, Chia-Hui Liu, Tzu-Chi Wang:
Efficient Hierarchical Key Management Scheme for Access Control in the Mobile Agent. 650-655 - Himanshu Pagey:
Building User Confidence in RFID Technology for Mobile and Retail Environments. 656-661 - Taehong Kim, Young-Guk Ha, Jihoon Kang, Daeyoung Kim, Pohkit Chong, Joo-Chan Sohn:
Experiments on Building Ubiquitous Robotic Space for Mobile Robot Using Wireless Sensor Networks. 662-667 - Paul Werstein:
An Experimental Network Proxy for Power Managed End Nodes. 668-674 - Ali El Kateeb, Lubna Al Azzawi:
Hardware Reconfiguration Capability for Third Generation Sensor Nodes: Design and Challenges. 675-680 - Pedro N. E. S. Barbosa, Neil M. White, Nick R. Harris:
Wireless Sensor Network for Localized Maritime Monitoring. 681-686 - Soohong Park, Minho Lee, Cheolju Hwang:
Location Information Look-Up for Intelligent Handover Decision. 687-691 - Benting Wan:
Business-Based SMS Mobile Search. 692-695 - Rogério Luís de Carvalho Costa, Pedro Furtado:
Scheduling in Grid Databases. 696-701 - Haiyang Hu, Hua Hu:
Energy Optimization for Data Flow in Mobile Ad Hoc Wireless Networks Using Cooperative Communication. 702-707 - Snehasis Mukhopadhyay, Niranjan Jayadevaprakash:
Automated Metadata Generation and its Application to Biological Association Extraction. 708-713 - Hiram Firpi, Eunseog Youn, Sean Mooney:
Comparative Study of Particle Swarm Approaches for the Prediction of Functionally Important Residues in Protein Structures. 714-719 - Ping-Tsai Chung, Hsin-Hua Hsiao:
Probabilistic Relational Database Applications for Biomedical Informatics. 720-725 - Che-Lun Hung, Chun-Yuan Lin, Yeh-Ching Chung, Chuan Yi Tang:
Introducing Variable Gap Penalties into Three-Sequence Alignment for Protein Sequences. 726-731 - Dong Seong Kim, Sazia Parvin, Jong Sou Park:
Software Rejuvenation and Reconfiguration for Enhancing Survivability of Sensor Networks. 732-737 - Soonmok Kwon, Jeonggyu Kim, Cheeha Kim:
An Efficient Tree Structure for Delay Sensitive Data Gathering in Wireless Sensor Networks. 738-743 - Ben-Jye Chang, Yan-Min Lin, Ying-Hsin Liang:
Distributed Wireless Links Repair for Maximizing Reliability and Utilization in Multicast MANET. 744-749 - Kai Wang, Yan Sui, Xukai Zou, Arjan Durresi, Shiaofen Fang:
Pervasive and Trustworthy Healthcare. 750-755 - Mahmood Hasanlou, Ebrahim Fazli, Ali Movaghar, Hossein Mohammadi:
3MOKAN: A Novel Mobility Management Mechanism Based on Keeping Alternative Nodes. 756-761 - Jing Zuo, Xuefen Chi, Lin Guan, Hongxia Li:
Service-Aware Multi-Constrained Routing Protocol with QoS Guarantee Based on Fuzzy Logic. 762-767 - Jen-Yi Pan, Jing-Luen Lin, Kai-Fung Pan:
Multiple Care-of Addresses Registration and Capacity-Aware Preference on Multi-Rate Wireless Links. 768-773 - Jacques Demongeot:
Biological Boundaries and Biological Age: Solutions of Variational Problems. 774-781 - Jacques Demongeot, Michel Morvan, Sylvain Sené:
Impact of Fixed Boundary Conditions on the Basins of Attraction in the Flower's Morphogenesis of Arabidopsis Thaliana. 782-789 - Emmanuel Montseny, Andrei Doncescu:
Reduction of Complexity via Operatorial Parametric Formulations for Some Nonlinear Dynamic Problems of Biology. 790-795 - Tobias Sayre, Rahul Singh:
Protein Structure Comparison and Alignment Using Residue Contexts. 796-801 - Suk Hoon Jung, Desok Kim, Dong-Soo Han:
Conserved Domain Combination Identification in Human Proteins. 802-807 - Yoshitaka Yamamoto, Katsumi Inoue, Andrei Doncescu:
Estimation of Possible Reaction States in Metabolic Pathways Using Inductive Logic Programming. 808-813 - Connie Phong, Raul Singh:
Missing Value Estimation for Time Series Microarray Data Using Linear Dynamical Systems Modeling. 814-819 - Hong-Soog Kim, Woo-Hyuk Jang, Dong-Soo Han:
Communication Protocols and Message Formats for BLAST Parallelization on Cluster Systems. 820-825 - Hassan Sharabaty, Bruno Jammes, Daniel Esteve:
EEG Analysis Using HHT: One Step Toward Automatic Drowsiness Scoring. 826-831 - Dominique Dudkowski, Harald Weinschrott, Pedro José Marrón:
Design and Implementation of a Reference Model for Context Management in Mobile Ad-Hoc Networks. 832-837 - Somkiat Sae-Ueng, Sineenard Pinyapong, Akihiro Ogino, Toshikazu Kato:
Personalized Shopping Assistance Service at Ubiquitous Shop Space. 838-843 - Sébastien Duval, Christian Hoareau, Hiromichi Hashizume:
Design of a Ubiquitous System for Affective Bonding and Support within the Family. 844-849 - Sébastien Duval, Christian Hoareau, Hiromichi Hashizume:
Fundamental Needs in Intelligent Environments: Specificities for Older Adults. 850-855 - Akimitsu Kanzaki, Tetsuya Taniguchi, Takahiro Hara, Shojiro Nishio:
A Data Propagation Using Mobile Terminal in Locally Distributed Ad-Hoc Networks. 856-861 - Shahram Ghandeharizadeh, Shahin Shayandeh, Tooraj Helmi:
To Share or Not to Share Storage in Mesh Networks: A System Throughput Perspective. 862-867 - Lars Frank:
A Transaction Model for Mobile Atomic Transactions. 868-873 - Masako Shinohara, Takahiro Hara, Shojiro Nishio:
On Effective Data Transmission in Mobile Ad Hoc Networks. 874-879 - I-Shyan Hwang, Bor-Jiunn Hwang, K. Robert Lai, Ling-Feng Ku, Chien-Chieh Hwang:
Adaptive QoS-Aware Resource Management in Heterogeneous Wireless Networks. 880-885 - Rita de Cássia Acioli Lima, Nelson Souto Rosa, Igor Roberto L. Marques:
TS-Mid: Middleware for Wireless Sensor Networks Based on Tuple Space. 886-891 - Ali El Kateeb, Aiyappa Ramesh, Lubna Al Azzawi:
Wireless Sensor Nodes Processor Architecture and Design. 892-897 - Katsumi Onodera, Toshiaki Miyazaki:
An Autonomous Algorithm for Construction of Energy-conscious Communication Tree in Wireless Sensor Networks. 898-903 - Abbas Nayebi, Hamid Sarbazi-Azad, Kasra Alishahi:
Analysis of k-Neigh Topology Control Protocol for Wireless Networks. 904-909 - Ismat K. Maarouf, Tarek R. Sheltami:
Simulation-Based Analysis for GEAR Performance Optimization. 910-915 - Chiu-Kuo Liang, Yu-Jie Huang, Jian-Da Lin:
An Energy Efficient Routing Scheme in Wireless Sensor Networks. 916-921 - Cheng-Zen Yang, Chun-Ta Lin, I-Hsuan Huang:
TPSF+C: A Two-Phase On-Demand Scatternet Formation Algorithm Considering Route Stability. 922-927 - Jung-Hwan Kim, Sajjad Hussain Chauhdary, WenCheng Yang, Dong-Sub Kim, Myong-Soon Park:
PRODUCE: A Probability-Driven Unequal Clustering Mechanism for Wireless Sensor Networks. 928-933 - Ryouhei Kawano, Toshiaki Miyazaki:
Distributed Data Aggregation in Multi-sink Sensor Networks Using a Graph Coloring Algorithm. 934-940 - Seung-Joon Choi, Ki-Hyuk Kwon, Sang-Jo Yoo:
An Efficient Cross-Layer Based Flooding Algorithm with Retransmission Node Selection for Wireless Sensor Networks. 941-948 - Lei Chen, Chung-wei Lee:
The Effects of Mobility and Redundancy on Wireless Video Streaming over MANETs. 949-953 - Huafeng Wu, Chaojian Shi, Xi Zhou, Haiguang Chen, Chuanshan Gao:
eSeagull: Design of Mobile P2P File Sharing System at Sea. 954-959 - Eiji Takimoto, Yoshihisa Kondo, Satoko Itaya, Ryutaro Suzuki, Sadao Obana:
Evaluation of Multi-Channel Flooding for Inter-Vehicle Communication. 960-965 - Kuo-Hui Yeh, Nai-Wei Lo, Enrico Winata:
An Efficient Tree-Based Tag Identification Protocol for RFID Systems. 966-970 - Khurram Shahzad, Arshad Ali, Nasir D. Gohar:
ETSP: An Energy-Efficient Time Synchronization Protocol for Wireless Sensor Networks. 971-976 - Daishi Inoue, Tetsuya Shigeyasu, Hiroshi Matsuno, Norihiko Morinaga:
A New MAC Protocol for Avoiding Needless Transmission Deferment Induced by Missed RTS/CTS Handshake. 977-982 - Stéphane Maag, Cyril Grepet:
A Node Self Similarity Approach for Interoperability Testing of Ad Hoc Routing Protocols. 983-988 - I-Shyan Hwang, Bor-Jiunn Hwang, Ruey-Rong Su, K. Robert Lai, Chyi-Jy Lin:
An Integrated ISV Call Management Strategy in Heterogeneous Wireless Networks. 989-994 - Xiaoyan Sun, Jiandong Li, Pengyu Huang, Jiyong Pang:
Total Least-Squares Solution of Active Target Localization Using TDOA and FDOA Measurements in WSN. 995-999 - Yusuke Gotoh, Yasuo Ebara, Tomoki Yoshihisa, Koji Koyamada, Masanori Kanazawa:
Development of Tea Ceremony e-Learning Environment within Immersive Projection Technology. 1000-1005 - Satoshi Oonuki, Tetsuro Ogi:
VR BBS Using Immersive Virtual Environment. 1006-1011 - Go Chiba, Tomoyuki Ishida, Yoshitaka Shibata:
High-Resolution Presentation Environment Using Multi Displays. 1012-1016 - Yasuo Ebara, Nobuyuki Kukimoto, Koji Koyamada:
Evaluation Experiment on Eye-to-Eye Contact in Remote Communication with Tiled Displays Environments. 1017-1022 - Tomoyuki Ishida, Akihiro Miyakawa, Yoshitaka Shibata:
Proposal of Multimodal Communications System Using Tele-Immersion Technology. 1023-1028 - Hironori Kaida, Masahiro Okuda:
Image Compression Suitable for High Dynamic Range Image Rendering. 1029-1033 - Shunji Uchino, Norihiro Abe, Hiroshi Takada, Tetsuya Yagi, Hirokazu Taki, Shoujie He:
Virtual Reality Interaction System between User and Avatar with Distributed Processing. 1034-1039 - Hiroki Ogasawara, Yoshitaka Shibata:
Asynchronous Collaborative Virtual Environment Support System by Using Revision Tree Presentation Method. 1040-1045 - Shih Ta Kuan, Bang Ye Wu, Wan-Jui Lee:
Finding Friend Groups in Blogosphere. 1046-1050 - Nikolay N. Mirenkov, Kamen Kanev, Hiroshi Takezawa:
Quality of Life Supporters Employing Music Therapy. 1051-1056 - Tsutomu Okawa, Tsukasa Kaminishi, Syuichi Hirabayashi, Hisao Koizumi, Jun Sawamoto:
An Information System Development Method Based on the Link of Business Process Modeling with Executable UML Modeling and its Evaluation by Prototyping. 1057-1064 - Han-Bin Chang, Timothy K. Shih, Hui-Huang Hsu, Chun-Chia Wang:
An Interactive Video Course Platform with Authoring and Playback Systems. 1065-1070 - Nobuo Funabiki, Aki Mouri, Walaa Hassan, Toru Nakanishi:
A Lecture Scene Playback System Using Digital Picture-Card Show for Distance Learning. 1071-1076 - Yuka Kato:
A Rate Control Method for Subjective Video Quality on Mobile Data Terminals. 1077-1082 - Koichi Gyoda, Hoang Nam Nguyen, Kazunori Okada, Osamu Takizawa:
Analysis of Ad Hoc Network Performance in Emergency Communication Models. 1083-1088 - Kanae Sakamoto, Misako Urakami, Tetsuya Shigeyasu, Hiroshi Matsuno:
Disaster Information Service System for Relief Activities Using Ad-Hoc Network A Network Construction Algorithm and Results of Field Experiments. 1089-1094 - Takahiro Fujiwara, Takashi Watanabe:
A Scheme for Damage Information Gathering Based on Micro Perspective in Sensor Networks. 1095-1100 - Hiroyuki Echigo, Yoshitaka Shibata:
Performance Evaluation of Large Scale Disaster Information System over Japan Gigabit Network. 1101-1106 - Hiroaki Yuze, Zhengyi Zhang, Yuki Yoshida, Takashi Kawada, Chaoqun Wang:
Development of the Universal Safety Information Registration System for Vulnerable People Using a Mobile Phone. 1107-1112 - Nobuhiro Sawano, Tsuyoshi Hoshikawa, Takayuki Obata:
Web-Based Support Coordination by Using WIDIS - Case Study of Chuesu-oki Earthquake in 2007. 1113-1117 - Yoshitaka Shibata, Yosuke Sato, Naoki Ogasawara, Go Chiba:
Ballooned Wireless Mesh Network for Emergency Information System. 1118-1122 - Osamu Takizawa, Masafumi Hosokawa, Ken'ichi Takanashi, Yasushi Hada, Akihiro Shibayama, Byeong-pyo Jeong:
Pinpointing the Place of Origin of a Cellular Phone Emergency Call Using Active RFID Tags. 1123-1128 - Kazuo Takahata, Shinya Takada, Yoshitaka Shibata:
Disaster Communication Network by Combination of Different Wireless LANs. 1129-1133 - Nobuhiro Sawano:
Current Situation of Digitalized Ship Navigation System for Safety. 1134-1137 - Kulwadee Somboonviwat, Shinji Suzuki, Masaru Kitsuregawa:
Structure of the Thai Web Graph. 1138-1143 - Verayuth Lertnattee, Thanaruk Theeramunkong:
Improving Thai Academic Web Page Classification Using Inverse Class Frequency and Web Link Information. 1144-1149 - Kotaro Nakayama, Masahiro Ito, Takahiro Hara, Shojiro Nishio:
Wikipedia Mining for Huge Scale Japanese Association Thesaurus Construction. 1150-1155 - Akio Kitahara, Taichi Joutou, Keiji Yanai:
Associating Faces and Names in Japanese Photo News Articles on the Web. 1156-1161 - Masashi Toyoda:
Mining and Visualizing the Evolution of the Web Graph Structure. 1162 - Zhiling Hong, Qingshan Jiang:
Hybrid Content-Based Trademark Retrieval Using Region and Contour Features. 1163-1168 - Atsushi Fujii, Seiji Takegata:
A Question Answering System for the Operation of Software Applications. 1169-1174 - Chien-Chih Chen, Kai-Hsiang Yang, Hung-Yu Kao, Jan-Ming Ho:
BibPro: A Citation Parser Based on Sequence Alignment Techniques. 1175-1180 - Min-Feng Wang, Jui-Hwa Feng, Meng-Feng Tsai:
A Data Warehousing Approach to Discover Knowledge in Peer-to-Peer Application. 1181-1186 - Takahiro Hayashi, Koji Abe, Rikio Onai:
Retrieval of Personal Web Documents by Extracting Subjective Expressions. 1187-1192 - Kai Cheng, Xiaodong You, Yanchun Zhang:
Efficient Management of Semi-Persistent Data for the Evolving Web. 1193-1198 - Yasuaki Yoshida, Takanori Ueda, Takashi Tashiro, Yu Hirate, Hayato Yamana:
What's Going on in Search Engine Rankings? 1199-1204 - Minghua Pei, Kotaro Nakayama, Takahiro Hara, Shojiro Nishio:
Constructing a Global Ontology by Concept Mapping Using Wikipedia Thesaurus. 1205-1210 - Minghua Pei, Kotaro Nakayama, Takahiro Hara, Shojiro Nishio:
An Integrated Method for Web Resource Categorization. 1211-1216 - Lifei Chen, Yanfang Ye, Qingshan Jiang:
A New Centroid-Based Classifier for Text Categorization. 1217-1222 - Zhiwei Zhang, Xuan Hieu Phan, Susumu Horiguchi:
An Efficient Feature Selection Using Hidden Topic in Text Categorization. 1223-1228 - Haojun Sun, Zhihui Liu, Lingjun Kong:
A Document Clustering Method Based on Hierarchical Algorithm with Model Clustering. 1229-1233 - Toshihiko Yamakami:
A Weak-Tie Based Regularity Analysis of Mobile Clickstreams. 1234-1239 - Guangwei Wang, Kenji Araki:
A Graphic Reputation Analysis System for Mining Japanese Weblog Based on both Unstructured and Structured Information. 1240-1245 - Min-Feng Wang, Yen-Ching Wu, Meng-Feng Tsai:
Exploiting Frequent Episodes in Weighted Suffix Tree to Improve Intrusion Detection System. 1246-1252 - Saoucene Mahfoudh, Pascale Minet:
An Energy Efficient Routing Based on OLSR in Wireless Ad Hoc and Sensor Networks. 1253-1259 - Nagham H. Saeed, Maysam F. Abbod, Hamed S. Al-Raweshidy:
Intelligent MANET Routing System. 1260-1265 - Ehsan Ahvar, Mahmood Fathy:
Special Evaluation: A Practical Simulation-Based Method for Accurate Performance Evaluation of Routing Protocols in Wireless Sensor Networks. 1266-1271 - Chu-Hsing Lin, Wei-Shen Lai, Yen-Lin Huang, Mei-Chun Chou:
Secure Routing Protocol with Malicious Nodes Detection for Ad Hoc Networks. 1272-1277 - Siwaruk Siwamogsatham:
On Backoff Timer Scheduling for Smart-DCF and Performance Evaluation. 1278-1284 - S. A. Mahmud, Shahbaz Khan, Qiang Ni, Hamed S. Al-Raweshidy:
Capacity Issues in Meshed High Data Rate WPANs. 1285-1290 - Ji Zhang, Jouni Korhonen, SooHong Park, David A. J. Pearce:
TCP Quick-Adjust by Utilizing Explicit Link Characteristic Information. 1291-1298 - Okan Yilmaz, Ing-Ray Chen, Gregory Kulczycki, William B. Frakes:
Spillover-Partitioning Call Admission Control for Revenue Optimization with QoS Guarantees for Multiple Service Classes in Mobile Wireless Networks. 1299-1304 - Zhanqiang Huo, Naishuo Tian, Wuyi Yue, Shunfu Jin:
Simulation Study of a Connection-Oriented Internet Service Based on a Queueing Model. 1305-1310 - Song Guo, Mianxiong Dong, Minyi Guo:
Performance Analysis of Heuristic Algorithms for Lifetime-Aware Directional Multicasting in Wireless Ad Hoc Networks. 1311-1316 - Hao-Hsiang Hung, Ling-Jyh Chen:
An Analytical Study of Wireless Error Models for Bluetooth Networks. 1317-1322 - Mikko Multanen, Kimmo Raivio, Pasi Lehtimäki:
Outlier Detection in Cellular Network Data Exploration. 1323-1328 - Qingcheng Li, Jin Zhang, Xiaoli Gong, Zhenhua Zhang:
A Novel License Distribution Mechanism in DRM System. 1329-1334 - Mahmoud Nasreldin, Heba Kamal Aslan, Magdy El-Hennawy, Adel El-Hennawy:
WiMax Security. 1335-1340 - Tudor Joan Cerlinca, Cristina Elena Turcu, Marius Cristian Cerlinca:
Integrating Mobile Applications into RFID Based B2B Systems. 1341-1345 - Yawer Yousuf, Vidyasagar M. Potdar:
A Survey of RFID Authentication Protocols. 1346-1350 - Vasile Gaitan, Cornel Turcu, Alexandru Goloca:
High Complexity Control Gates with Advanced RFID Features for Production Process Monitoring. 1351-1356 - Atif Sharif, Vidyasagar M. Potdar:
A Critical Analysis of RFID Security Protocols. 1357-1362 - Stéphanie Chollet, Philippe Lalanda, André Bottaro:
Transparently Adding Security Properties to Service Orchestration. 1363-1368 - José L. Ruiz, Juan C. Dueñas, Félix Cuadrado:
A Service Component Deployment Architecture for e-Banking. 1369-1374 - Frank Bormann, Stephan Flake, Jürgen Tacken, Carsten Zoth:
Third-Party-Initiated Context-Aware Real-Time Charging and Billing on an Open SOA Platform. 1375-1380 - Elmar Zeeb, Steffen Prüter, Frank Golatowski, Frank Berger:
A Context Aware Service-Oriented Maintenance System for the B2B Sector. 1381-1386 - Hendrik Bohn, Andreas Bobek, Frank Golatowski:
WS-BPEL Process Compiler for Resource-Constrained Embedded Systems. 1387-1392 - Andre Pohl, Heiko Krumm, Felix Holland, Franz-Josef Stewing, Ingo Lück:
Service-Orientation and Flexible Service Binding in Distributed Automation and Control Systems. 1393-1398 - Félix Cuadrado, Boni García, Juan C. Dueñas, Hugo A. Parada G.:
A Case Study on Software Evolution towards Service-Oriented Architecture. 1399-1404 - Xiaorong Li, Stephen John Turner, Kok Heng Tong, Hoong-Maeng Chan, Terence Hung:
Design of an SLA-Driven QoS Management Platform for Provisioning Multimedia Personalized Services. 1405-1409 - Corina Popescu, Jose L. Martinez Lastra:
A Method for the Formal Representation of the Boolean Conditions of Orchestrated Services. 1410-1415 - Witold Abramowicz, Konstanty Haniewicz, Monika Kaczmarek, Raúl Palma, Dominik Zyskowski:
NFP Ontology for Discovery and Sharing Web Services in Distributed Registries. 1416-1421 - Félix Cuadrado, Juan C. Dueñas, José L. Ruiz, Jesús Bermejo Muñoz, Miguel García:
An Open Source Platform for the Integration of Distributed Services. 1422-1427 - Yaning Liu, Hongbo Wang, Yu Lin, Shiduan Cheng:
Modeling and Quantifying the Impact of P2P File Sharing Traffic on Traditional Internet Traffic. 1428-1433 - Sudath Indrasinghe, Rubem Pereira, John Haggerty:
Protocol Specification for Conflict Free MANET Address Allocation Mechanisms. 1434-1439 - Hung-Yi Chang, Pi-Chung Wang, Chia-Tai Chan, Chun-Liang Lee:
A New Service Level Agreement Model for Best-Effort Traffics in IP over WDM. 1440-1443 - Kenvi Wang, Tong-Tai Chiang, Lin-Yi Peng, Madjid Merabti:
A New Approach of Fuzzy-Clustered Channel Assignment Method Promoting Hierarchical Cellular Network Performance. 1444-1449 - Jen-Chun Chiang, Hsiang-Fu Lo, Wei-Tsong Lee:
Scalable Video Coding of H.264/AVC Video Streaming with QoS-Based Active Dropping in 802.16e Networks. 1450-1455 - Rubem Pereira, Ella Grishikashvili Pereira:
Packet Size Variability in Real Time Transmission of Smoothed MPEG-4 Streams. 1456-1461 - Yi-Ting Fang, Tzung-Chian Huang, Pi-Chung Wang:
Ternary CAM Compaction for IP Address Lookup. 1462-1467 - Stefan Wallin, Leif Landen:
Telecom Alarm Prioritization Using Neural Networks. 1468-1473 - Dong-Liang Lee, Lawrence Y. Deng:
Digital Certificate Mobile Agent Technologies in Distance Learning. 1474-1479 - Nobuyoshi Sato, Yoshitoshi Murata:
Quality Control Schemes for Industrial Production by Workers' Motion Capture. 1480-1485 - Sheng-Yuan Yang:
Developing of an Ontological Focused-Crawler for Ubiquitous Services. 1486-1491 - Shu-Cheng Lin, Hui-Min Tseng, Yi-Cheng Chang, Hui-Lan Lee, Te-Lung Liu, Chu-Sing Yang, C. Eugene Yeh:
TWAREN Optical Network Laboratory and Lightpath Control System. 1492-1498 - Chiou-Yng Lee:
Concurrent Error Detection in Digit-Serial Normal Basis Multiplication over GF(2m). 1499-1504 - Chun-Liang Hsu, Teng-Yaw Hsu, Kuan-Yen Ho, Wei-Bin Wu:
Practical Design of Intelligent Living-Space Based on Blue-Tooth System. 1505-1510 - Hideaki Yanagisawa, Minoru Uehara, Hideki Mori:
Interface Implementation Using Ajax for Web-Based Instruction Set Simulator. 1511-1516 - Lawrence Y. Deng, Yi-Jen Liu:
Semantic Analysis and Video Event Mining in Sports Video. 1517-1522 - Wun-She Yap, Swee-Huay Heng, Bok-Min Goi:
On the Security of an Identity-Based Aggregate Signature Scheme. 1523-1528 - Hangbae Chang, Jong Hyuk Park, Hongsuk Kang:
The Security System Design in Online Game for u Entertainment. 1529-1533 - Ryuzou Nishi, Yoshiaki Hori, Kouichi Sakurai:
Key Distribution Scheme Using Matched Filter Resistant against DoS Attack. 1534-1539 - Binod Vaidya, Byung-Lok Cho, Jong-An Park, Seung Jo Han:
Investigating Secure Framework for Hybrid Multipath Ad Hoc Network. 1540-1545 - Hye-Young Kim, Young-Sik Jeong, Laurence Tianruo Yang:
Intra Domain Route Optimization for Ubiquitous. 1546-1550 - Koichi Miyashita, Tsutomu Terada, Shojiro Nishio:
A Map Matching Algorithm for Car Navigation Systems that Predict User Destination. 1551-1556 - Jong-Hyouk Lee, Yeong-Deok Kim, Tai-Myoung Chung:
An Investigation of Distance-Based Proxy Mobile Client Selection Schemes for NetLMM. 1557-1560 - Nguyen Hoang Viet, Ngo Anh Vien, SeungGwan Lee, TaeChoong Chung:
Efficient Distributed Sensor Dispatch in Mobile Sensor Network. 1561-1566 - Ching-Hsien Hsu, Jong Hyuk Park, Chia-Hao Yu:
Adaptive Scheduling Mechanisms toward Intelligent Services in Mobile and Wireless RFID Environments. 1567-1572 - Hong Chen, Nozomi Ikeuchi, Qun Jin:
Implementation of Ubiquitous Personal Study Using Web 2.0 Mash-up and OSS Technologies. 1573-1578 - Yanxiang He, Haowen Liu, Naixue Xiong, Laurence Tianruo Yang:
Selecting News and Elders in Unstructured Peer-to-Peer Network under Churn. 1579-1584 - Hiroyuki Nakamura, Qiangfu Zhao:
Information Hiding Based on Image Morphing. 1585-1590 - Jung-Sik Cho, Sang-Soo Yeo, Su-Chul Hwang, Sang-Yong Rhee, Sung Kwon Kim:
Enhanced Yoking Proof Protocols for RFID Tags and Tag Groups. 1591-1596 - Kari Anne Haaland Thorsen, Chunming Rong:
Data Integration in Oil and Gas at Norwegian Continental Shelf. 1597-1602 - Said Elnaffar, Zakaria Maamar, Hamdi Yahyaoui, Jamal Bentahar, Philippe Thiran:
Reputation of Communities of Web Services - Preliminary Investigation. 1603-1608 - Dang Minh Quan, Jörn Altmann:
Bilateral Bargaining Game and Fuzzy Logic in the System Handling SLA-Based Workflow. 1609-1614 - Wei Shi, Jian Wu, Shaolin Zhou, Ling Zhang, Yuyu Yin, Zhaohui Wu:
Facilitating the Flexible Modeling of Human-Driven Workflow in BPEL. 1615-1624 - Toshihiko Yamakami:
A Long Interval Method to Identify Regular Monthly Mobile Internet Users. 1625-1630 - Luiz A. Paula Lima Jr., Alcides Calsavara:
A Paradigm Shift in the Design of Mobile Applications. 1631-1635 - Shou-Chih Lo, Jeng-Long Chiang, Shun-Ren Yang, Wen-Tsuen Chen:
Design of a Context-Aware Mobile Guiding Application. 1636-1641 - Nebrasse Ellouze, Mohamed Ben Ahmed, Elisabeth Métais:
Overview of Topic Map Construction Approaches. 1642-1647 - Vuong Xuan Tran, Hidekazu Tsuji:
Explaining Answers from Agent Communication of Semantic Web Information. 1648-1653 - Noriko Kitani, Shûichi Yukita:
Mathematical Ontology and a Software Tool for Semantic Retrieval of Exercise Problems. 1654-1659 - Saman Iftikhar, Hafiz Farooq Ahmad, Hiroki Suguri:
Agent Based Semantic Interoperability between Agents and Semantic Web Languages. 1660-1665 - Hyung-Lae Kim, Tae-Nyun Kim, Chang-Sung Jeong:
Grid Resource Management System and Semantic Information System. 1666-1671 - Chung-Ming Huang, Kun-Chan Lan, Chang-Zhou Tsai:
A Survey of Opportunistic Networks. 1672-1677 - Julien Haillot, Frédéric Guidec:
Towards a Usenet-Like Discussion System for Users of Disconnected MANETs. 1678-1683 - Jussi Kangasharju, Andreas Heinemann:
Incentives for Opportunistic Networks. 1684-1689 - Erik Kuiper, Simin Nadjm-Tehrani:
Geographical Routing in Intermittently Connected Ad Hoc Networks. 1690-1695 - Jonah P. Tower, Thomas D. C. Little:
A Proposed Scheme for Epidemic Routing with Active Curing for Opportunistic Networks. 1696-1701 - Chien-Shiu Lin, Wei-Shyh Chang, Ling-Jyh Chen, Cheng-Fu Chou:
Performance Study of Routing Schemes in Delay Tolerant Networks. 1702-1707 - Janico Greifenberg, Dirk Kutscher:
Efficient Publish/Subscribe-Based Multicast for Opportunistic Networking with Self-Organized Resource Utilization. 1708-1714 - Andreas Heinemann, Jussi Kangasharju, Max Mühlhäuser:
Opportunistic Data Dissemination Using Real-World User Mobility Traces. 1715-1720
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.