Skip to content

Sources & References

The author of this blog seeks to cite all original content and ideas from which he has sourced material. He acknowledges from time to time mistakes or over sites may be made. If you feel this the case please email him to ensure a quick response.

Content:

Content on this blog is not syndicated, it is not paid for it, content on this blog can be republished using the open ( GNU Free Documentation License) please also email me so that I am aware of use of this material.

Where does content come from: Content on this blog is typically recharacterized from the many projects I have worked on over the last 15 years. As such it comes from a variety of different sources below is a list of those sources.

  • Corporate or Partner white papers and anlaysis
  • Project or client work involving systems or problem analysis
  • Academic study or reflection upon academic topics this may include an expression of opinion
  • Response to industry analysis this includes major vendors such as IDC, Jupiter, O’Neill, etc.
  • Readings and reviews of current periodicals I am in the process of exposing the blogs and periodicals I consult
  • Research I had performed and previously re-sold which may not have been published

Bibliography: A list of References

Aamodt, A., & Plaza, E. (1994). Case-based reasoning: Foundational issues, methodological variations, and system approaches. AI Communications, 7(1), 39-59.
Abad, C.,Taylor, J.,Sengul, C.,Yurcik, W.,Zhou, Y., & Rowe, K. (2003). Log correlation for intrusion detection: A proof of concept. In Proceedings of the 19’h Annual Computer Security Applications Conference (ACSAC2003). Los Alamitos, CA: IEEE Computer Society Press.
Abdennadher, S., & Schlenker, H. (1999). Nurse scheduling using constraint logic programming. Proceedings of the 11th Conference on Innovative Applications of Artificial Intelligence (IAAI-99) (pp. 838-843).
Abdul-Rahman, A., & Hailes, S. (1998). A distributed trust model. Workshop on New Security Paradigms, Langdale, Cumbria, UK, September 23-26 (pp. 48-60). New York: ACM Press.
Abiteboul, S., & Hull, R. (1988). Data functions, datalog and negation. In Proceedings of the ACM-SIGMOD Conference.
Abolhasan, M., Wysocki, T., & Dutkiewicz, E. (2004). A review of routing protocols for mobile ad hoc networks. Ad Hoc Networks, 2(1), 1-22.
About.com (2003). Definition of Java runtime environment (JRE). Retrieved April 27, 2006, from http://java.about.com/library/glossary/bldef-jre.htm
Abrial, J. (1996). The b-book: Assigning programs to meanings. Cambridge, England: Cambridge University Press.
Access Grid. (2001). Retrieved from http://www.accessgrid.org/
Achard, F., & Barillot, E. (1997). Ubiquitous distributed objects with CORBA. Pacific Symposium Biocomputing. London, World Scientific.
Achard, F., & Dessen, P. (1998). GenXref VI: Automatic generation of links between two heterogeneous databases. Bioinformatics, 14, 20-24.
Ackerman, M.S. (2004). Privacy in pervasive environments: Next generation labeling protocols. Personal and Ubiquitous Computing, 8(6), 430-439.
ACM Queue. (2005). Purpose of security. ACM Queue Magazine. Retrieved December 25, 2005, from http://www.acmqueue.org
ActivCard. (2005). How to catch a phish(Whits paper). Retrieved July 1,2006, from http://wp.bitpipe.com/resourse/org_975950994_468/Phishing_WP.pdf
Adams, D.A., Nelson, R.R., & Todd, P.A. (1992). Perceived usefulness, ease of use, and usage of information technology: A replication. MIS Quarterly, 16(2), 227-247.
Agarwal, R., & Prasad, J. (1998). A conceptual and operational definition of personal innovativeness in the domain of information technology. Information Systems Research, 9(2), 204-215.
Agassounon, W., & Martinoli, A. (2002). A macroscopic model of an aggregation simulation using embodied agents in groups of time-varying sizes. Proceedings of the 2002 Institute of Electrical and Electronics Engineers Systems, Man and Cybernetics Conference (pp. 250-255). Retrieved April 3, 2005, from http://swis.epfl.ch/backup_caltech/coro/People/alcherio/papers/SMC02.pdf
Aggélou, G. (2004). Mobile ad hoc networks. New York: McGraw-Hill Professional.
Aggelou, G., & Tafazolli, R. (1999). RDMAR: A bandwidth-efficient routing protocol for mobile ad-hoc networks. Proceedings of the 2nd ACM International Workshop on Wireless Mobile Multimedia (WOWMOM ), Seattle, Washington, August 20 (pp. 26-33). ISBN 1-58113-129-1. New York: ACM Press.
Aggélou, G., & Tafazolli, R. (2001). QoS support in 4th generation mobile multimedia ad hoc networks. Proceedings of the Second International Conference on 3 G Mobile Communication Technologies, London, March 26-28 (pp. 412-416). London: Institute of Electrical Engineers.
Aggélou, G.N. (2003). An integrated platform for quality-of-service support in mobile multimedia clustered ad hoc networks. In M.Ilyas (Ed.), The handbook of ad hoc wireless networks (pp. 443-465). Boca Raton, FL: CRC Press, Inc.
Aghito, S.M., & Forchhammer, S. (2006). Context based coding of bi-level images enhanced by digital straight line analysis. IEEE Transactions on Image Processing, 15(8), 2120-2130.
Agile Alliance (2001). Agile manifesto. http://agilemanifesto.org/principles.html
Agirre, E.,Ansa, O.,Hovy, E., & Martinez, D. (2000). Enriching very large ontologies using the WWW. In Proceedings of ECAI Workshop on Ontology Learning.
Aglets Project Homepage (2006). Retrieved April 27, 2006, from http://sourceforge.net/projects/aglets
Agrawal, R., & Srikant, R. (1994). Fast algorithms for mining association rules in large databases. In J.B. Bocca, M. Jarke, & C. Zaniolo (Eds.), International Conference on Very Large Databases (Vol. 20, pp. 487-499). SanFrancisco: Morgan Kaufmann Publishers.
Agrawal, R., & Srikant, R. (1995). Mining Sequential Patterns. In Proceedings of the 11th International Conference on Data Engineering (pp. 3-14).
Agrawal, R.,Imielinski, T., & Swami, A. (1993). Database mining: A performance perspective. IEEE Transactions on Knowledge and Data Engineering, 5(6), 914-925.
Agrawal, R.,Imielinski, T., & Swami, A. (1993). Mining association rules between sets of items in large databases. In P. Buneman & S. Jajodia (Eds.), ACM SIGMOD International Conference on Management of Data (Vol. 20, pp. 207-216). New York: ACM Press.
Agudo, I.,Lopez, J., & Montenegro, J. A. (2005, December). A representation model of trust relationships with delegation extensions. LectureNotes in Computer Science, 3477, 116-130.
Aha, D.W., Breslow, L.A., & Muñoz-Avila, H. (2000). Conversational case-based reasoning. Applied Intelligence, 14, 9-32.
Aha, D.W., Maney, T., & Breslow, L.A. (1998). Supporting dialogue inferencing in conversational case-based reasoning. Proceedings of EWCBR 98: Proceedings of the 4th European Workshop on Advances in Case-Based Reasoning (pp. 262-273). Springer.
Ahmed, T., Mehaoua, A., & Buridant, G. (2001). Implementing MPEG-4 video on demand over IP differentiated services. Global Telecommunications Conference, GLOBECOM, San Antonio, TX, November 25-29 (pp. 2489-2493). Piscataway, NJ: IEEE.
Ahuja, S., Carriero, N., & Gelernter, D. (1986). Linda and friends. IEEE Computer, 26-34.
Airscanner® Corp. (2005). Airscanner® Mobile Encrypter V2.2b (BETA) user’s manual. Retrieved July 8, 2005, from http://airscanner.com/downloads/encrypter/EncrypterManual.htm
AirSnort. (2006). Retrieved December 10, 2006, from http://airsnort.shmoo.com
Aitken, I. (2003). Value-driven IT management. D. Remenyi, Computer weekly professional series. Oxford, Butterworth-Heinemann.
Aizawa, K., Harashima, H., & Saito, T. (1989). Model-based analysis synthesis image coding (MBASIC) system for a person’s face. Signal Processing: Image Communication, 1(2), 139-152.
Ajzen, I. (1991). The theory of planned behavior. Organisational Behavior and Human Decision Process, 52(2), 179-211.
Akyildiz, I.F., McNair, J., Ho, J., Uzunalioglu, H., & Wang, W. (1999). Mobility management in next-generation wireless systems. Proceedings of the IEEE, 87(8), 1349-1351.
Alahuhta, P., Ahola, J., & Hakala, H. (2005). Mobilising business applications: a survey about the opportunities and challenges of mobile business applications and services in Finland (Technology Review No. 167/2005). Helsinki: Tekes.
Alani, H.,Kim, S.,Millard, D.E.,Weal, M. J.,Hall, W.,Lewis, P.H., et al. (2002). Automatic ontology-based knowledge extraction and tailored biography generation from the Web. Technical Report 02-049.
Alba, J.W., & Hasher, L. (1983). Is memory schematic? Psychological Bulletin, 93, 203-231.
Alba, J.W., & Hutchinson, J.W. (1987). Dimensions of consumer expertise. Journal of Consumer Research, 13(3), 411-454.
Albers, S. (2003). Online algorithms: A survey. Mathematical Programming, 97(1), 3-26
Aldinger, M. (1994). Multicarrier COFDM scheme in high bitrate radio local area networks. Proc. of Wireless Computer Networks 94, Den Haag, Netherlands (pp. 969-973). New York: IEEE.
Alexander, C., S. Ishikawa, et al. (1977). A pattern language: towns, buildings, construction. New York, Oxford University Press.
Al-Gahtani, S.S., & King, M. (1999). Attitudes, satisfaction and usage: Factors contributing to each in the acceptance of information technology. Behaviour & Information Technology, 18(4), 277-297.
Ali, M.A., Dooley, L.S., & Karmakar, G.C. (2006). Object based segmentation using fuzzy clustering. IEEE International Conference on Acoustics, Speech, and Signal Processing (ICASSP), Toulouse, France, May 15-19.
ALIVE IST Project. (2002a). Intellectual and industrial property rights (Tech. Rep. D13). Retrieved June 5th, 2006, from http://www.vive-ig.net/project/alive/docs.html
ALIVE IST Project. (2002b). VE model contracts (Tech. Rep. D17a). Retrieved June 5th, 2006, from http://www.vive-ig.net/project/alive/models.html
Allen, G., Dramlitsch, T., et al. (2001). Supporting efficient execution in heterogeneous distributed computing environments with Cactus and Globus. Proceedings of International Conference of Supercomputing.
Allen, G., Goodale T., Russell M., Seidel E., & Shalf, J. (2003). Classifying and enabling grid applications. In F.Berman, G.Fox, & T.Hey (Eds.), Grid computing: Making the global infrastructure a reality (pp. 601-614). John &Wiley Press.
Allen, R., & Garlan, D. (1996). The Wright architectural specification language (Tech. Rep. CMUCS -96-TB). Pittsburgh, PA: Carnegie Mellon University, School of Computer Science.
Almenarez, F., Marin, A., Campo, C., & Garcia, C. (2004). PTM: A pervasive trust management model for dynamic open environments. Pervasive Security, Privacy, and Trust. Retrieved December 2005, from http://jerry.c-lab.de/ubisec/publications/PSPT04_PTM.pdf
Almgren, M., & Jonsson, E. (2004). Using active learning in intrusion detection. In Proceedings of the 17th IEEE Computer Security Foundations Workshop (CSFW’04). Los Alamitos, CA: IEEE Computer Society Press.
Al-Mualla, M.E., Canagarajah, C.N., & Bull, D.R. (2001). Simplex minimization for single- and multiple-reference motion estimation. IEEE Transactions on Circuits and Systems for Video Technology, 11(12), 1209-1220.
Al-Mualla, M.E., Canagarajah, C.N., & Bull, D.R. (2002). Video coding for mobile communications: Efficiency, complexity, and resilience. Amsterdam: Academic Press.
Al-Muhtadi, J., Campbell, R., Kapadia, A., Mickunas, D., & Yi, S. (2002). Routing through the mist: Privacy preserving communication in ubiquitous computing environments. International Conference of Distributed Computing Systems (ICDCS 2002), Providence, Rhode Island, May 19-22 (pp. 74-83). USA: IEEE CS Press.
Alvares, L., Menezes, P, & Demazeau, Y. (1998). Problem decomposition: An essential step for multi-agent systems. Proceedings of 10th International Conference on Systems Research, Informatics and Cybernetics (ICSRIC’98), Baden-Baden.
Ambler, S. W., and P. J. Sadalage (2006). Refactoring databases: evolutionary database design. Indianapolis, Addison-Wesley Professional.
Amigo Project. (2004, December). Ambient intelligence for the networked home environment: Summary. Retrieved May 2,2006, from http://www.hitech-projects.com/euprojects/amigo/
Anand, S.S.,Bell, D.A., & Hughes, J.G. (1995, November 29-December 02, 1995). The role of domain knowledge in datamining. Paper presented at the Conference on Information and Knowledge Management, Baltimore.
Andersen, T.J. (2005). The performance effect of computer-mediated communication and decentralized strategic decision making. Journal of Business Research, 58(8), 1059-1067.
Anderson, A., Tenhunen, M., & Ygge, F. (2000). Integer programming for combinatorial auction winner determination. Proceedings of the 4th International Conference on Multi-Agent Systems (ICMAS2000) (pp. 39-46).
Anderson, J. P. (1980). Computer security threat monitoring and surveillance (Tech.l Rep.). Fort Washington, PA: James P. Anderson.
Anderson, M., Pose, R., & Wallace, C.S. (1986). A password-capability system. The Computer Journal, 29(1), 1-8.
Anderson, R., & Khattak, A. (1998). The use of information retrieval techniques for intrusion detection. Paper presented at the First International Workshop on Recent Advances in Intrusion Detection (RAID’98), Louvainla-Neuve, Belgium.
Andersson, C. (2001). GPRS and 3 G wireless applications. NY: John Wiley & Sons, Inc.
Andrews, J. (2005). Using SignLab for formative and summative assessment. The University of Bristol Learning Technology Support Service Fifth Annual National Conference, Bristol, June 20. Retrieved April 24, 2006, from http://www.ltss.bris.ac.uk/vleconf05/Speakers/andrews.doc
Andrews, K., & Turner-Stokes, L. (2005). Rehabilitation in the 21st century: Report of three surveys. London: Royal Hospital for Neuro-disability.
Angele, J., Fensel, D., & Studer, R. (1998). Developing knowledge-based systems with MIKE. Journal of Automated Software Engineering.
Annesley, C. (2005). Banks’ push to upgrade hampered by complexity of legacy systems. Computer Weekly, 14.
Anonymous. (2005). Malware report: The impact of malicious code attacks.Retrieved on July 7, 2006, from http://www.computereconomics.com/article.cfm?id=1090
ANSI/NISO. (1993). Guidelines for the construction, format, and management of monolingual thesauri. National Information Standards Organization.
Anti-Phishing Working Group. (2005, November). Phishing activity trends report. Retrieved July 1, 2006, from http://antiphishing.org/reports/apwg_report_Nov2005_FI-NAL.pdf
Antonioletti, M.,Krause, A.,Paton, N. W.,Eisenberg, A.,Laws, S.,Malaika, S., et al. (2006). The WS-DAI family of specifications for web service data access and integration. ACM SIGMOD Record, 35(1), 48-55.
Appenzeller, G., Baker, M., Lai, K., Maniatis, P., Roussopoulos, M., Swierk, E., & Zhao, X. (1999, July). The mobile people architecture. Mobile Computing and Communications Review, 3(3), 36-42.
Appice, A.,Berardi, M.,Ceci, M., & Malerba, D. (2005). Mining and filtering multilevel spatial association rules with ARES. In M. Hacid, N. V. Murray, Z. W. Ras, & S. Tsumoto (Eds.), Foundations of Intelligent Systems, 15th International Symposium ISMIS. Vol. 3488 (pp. 342-353). Berlin: Springer.
Apt, K. (1990). Logic programming. In J. van Leeuwen (Ed.), Handbook of theoretical computer science. Elsevier.
Apte, C.,Damerau, F., & Weiss, S.M. (1994). Automated learning of decision rules for text categorization. ACM Transactions on Information Systems, 12(3), 233-251.
APWG. (2005, July). APWG phishing activity report. Retrieved October 7, 2005, from http://anti-phising.org/APWG_Phishing_Activity_Report_Jul_05.pdf
Ariyoshi, M., Shima, T., Han, J., Karlsson, J., & Urabe, K. (2002). Effect of forward-backward filtering channel estimation in W-CDMA multi-stage parallel interference cancellation receiver. IEICE Trans. Commun., E85-B(10), 1898-1905.
Arkin, A. (2002). Business process modeling language (BPML). Specification. BPMI.org.
Arkin, A.,Askary, S.,Bloch, B.,Curbera, F.,Goland, Y.,Kartha, N., et al. (2005). Web services business process execution language version 2.0. wsbpel-specificationdraft-01, OASIS.
Armstrong, L. (1993). Assessing the older communication-impaired person. In J.R.Beech, & L.Harding (Eds.), Assessment in speech and language therapy (pp. 163- 166). London: Routledge.
Arnoux, M.,Lechevallier, Y.,Tanasa, D.,Trousse, B., & Verde, R. (2003). Automatic clustering for the Web usage mining. In D. Petcu, D. Zaharie, V. Negru, & T. Jebeleanu (Ed.). Proceedings of the 5th International Workshop on Symbolic and Numeric Algorithms for Scientific Computing (SYNASC03) (pp. 54-66). Editura Mirton, Timisoara.
Ars Technica. (2005). Malware: What it is and how to prevent it. Retrieved October 2005 from http://arstechnica/com/articles/paedia/malware.ars/1
Arthur B. SCULLEY, W. WILLIAMS, A. WOODS, B2B Exchanges, ISI Publications, 1999
Arumugam, S., Helal, A., & Nalla, A. (2002). aZIMAs: Web mobile agent system. Proceedings of 6th International Conference on Mobile Agents (MA’02) (LNCS 2535). Barcelona, Spain: Springer-Verlag.
AS/NZS 4360. (2004). Risk management. Standards Australia/Standards New Zealand.
Ashforth, B.E., & Humphrey, R.H. (1997). The ubiquity and potency of labeling in organizations. Organization Science, 8(1), 43-58.
Ashley, M. (2002). A guide to wireless network security. Latis Networks, 1-9.
ASL Foundation (2005a). Application Services Library. http://www.aslfoundation.org/
ASL Foundation (2005b). ASL in the forest of models. http://www.aslfoundation.org/
Aso, T. (2005, May). Message from the organizers. Minister of Internal Affairs and Communications, Japan. Tokyo Ubiquitous Network Conference, Tokyo, Japan, May 16-17. Retrieved May 5, 2006, from http://www.wsis-japan.jp/ministeriac_e.html
Atkins, D.E., et al. (1996). Toward inquiry-based education though interacting software agents. IEEE Computer, 29(5), 69-76.
Atluri, V.,Chun, S. A., & Mazzoleni, P. A (2001). Chinese wall security model for decentralized workflow systems. In Proceedings of the Eighth ACM conference on Computer and Communications Security, 48-57.
Atta, R., & Ghanbari, M. (2006). Spatio-temporal scalability-based motion-compensated 3-D subband/ DCT video coding. IEEE Transactions on Circuits and Systems for Video Technology, 16(1) 43-55.
Auckland City Council. (2005, March). Transport: Parking-Princess Street pay and display trial. Retrieved May 4, 2006, from http://www.aucklandcity.govt.nz/auckland/transport/parking/princesst.asp
Auernheimer, B. (1987). RT-ASLAN: A specification lan-guagefor real-time systems. Unpublished doctoral dissertation, University of California, Santa Barbara, CA.
Aurrecoechea, C,Campbell, A., & Hauw, L. (1996). A survey of quality of service architectures (Special issue). Multimedia Systems Journal.
Aussenac-Gilles, N., & Mothe, J. (2004). Ontologies as background knowledge to explore document collections. In Proceedings of RIAO (pp. 129-142)
Aussenac-Gilles, N.,Biébow, B., & Szulman, S. (2000). Revisiting ontology design: A method based on corpus analysis. In R. Dieng & O. Corby (Eds.), Proceedings of the 12′ European Knowledge Acquisition Workshop (EKAW’00) (pp. 172-188).
Aussenac-Gilles, N.,Biébow, B., & Szulman, S. (2002). Revisiting ontology design: A methodology based on corpus analysis. In Proceedings of the 12th International Conference in Knowledge Engineering and Knowledge Management (EKAW), Juan-Les-Pins, France.
Australian Computer Crime & Security Survey. (2004). AusCERT. Retrieved January 17, 2006, from http://www.auscert.org.au/download.html?f=114
Authentication Guidance. (2005, October). Authentication in an Internet banking environment. Retrieved January 26, 2006, from ww.ffiec.gov/pdf/authendication_guidance.pdf
Axelsson, S. (2000). Intrusion detection systems: A survey and taxonomy (Tech. Rep. No 99-15). Gothenburg, Sweden: Chalmers University of Technology, Department of Computer Engineering.
AxIS. (2005). 2005 AxIS research project activity report. Section ‘Overall Objectives.’ http://www.inria.fr/rapport-sactivite/RA2005/axis/axis_tf.html
Ayers, R., & Jansen, W. (2004). PDA forensic tools: An overview and analysis. Retrieved July 6, 2005, from http://csrc.nist.gov/publications/nistir/nistir-7100-PDA-Forensics.pdf
Azar, Y. (1998). On-line load balancing. In A.Fiat & G. Woeginger (Eds.), Online algorithms: The state of the art (pp. 178-195). Springer.
Ba, S., & Pavlou, P.A. (2002). Evidence of the effect of trust building technology in electronic markets: price premiums and buyer behavior. MIS Quarterly, 26(3), 243-268.
Baccarini, D., & Archer, R. (2001). The risk ranking of projects: A methodology. International Journal of Project Management, 19, 139-145.
Bace, R., & Mell, P. (2001). Intrusion detection systems. NIST special publication in intrusion detection systems. Retrieved from http://csrc.nist.gov/publications/nist-pubs/800-31/sp800-31.pdf
Bach, J. (1994). “The immaturity of CMM.” American Programmer (September 1994).
Backhouse, J., & Cheng, E.K. (2000). Signalling intentions and obliging behavior online: An application of semiotic and legal modeling in e-commerce. Journal of End User Computing, 12(2), 33-42.
Bahadur, K., D. Desment, et al. (2006). “Smart IT spending: Insights from European banks.” McKinsey Quarterly (January 2006).
Bailey, D. (2006). Versatile appliance guards branches. IT Week, 9(4), 27.
Baker, A.D., Parunak, H.V. D., & Erol, K. (1997). Manufacturing over the Internet and into your living room: Perspectives from the AARIA project (Tech. Rep. TR208-08-97). ECECS Dept.
Baker, F., Lindell, B., & Talwar, M. (2000). RSVP cryptographic authentication. RFC2747, IETF. Retrieved May 10, 2006, from http://www.ietf.org/rfc/rfc2747.txt
Bakker, R.R., Dikker, F., Tempelman, F.,& Wognum, P.M. (1993). Diagnosing and solving over-determined constraint satisfaction problems. Proceedings of the 13th International Joint Conference on Artificial Intelligence (IJCAI93) (pp. 276-281).
Balakrishnan, K., Deng, J., & Varhney, P.K. (2005). TWOACK: Preventing selfishness in mobile ad hoc networks. Proceedings of the IEEE Wireless Communications and Networking Conference (WCNC), 4, New Orleans, LA, March 13-17 (pp. 2137-2142). IEEE.
Balasubramanian, S., & Norrie, D.H. (1995). A multi-agent intelligent design system integrating manufacturing and ship-floor control. Proceedings of the First International Conference on Multi-Agent Systems. San Francisco: The AAAI press/The MIT Press.
Baldwin, Esther,Baldwin, Esther, and and Martin Curley. Managing IT Innovation for Business Value: Practical Strategies for IT and Business Managers. Intel Press
Banâtre, J.P. (1996). Parallel multiset processing: From explicit coordination to chemical reaction. In P.Ciancarini & C.Hankin (Eds.), Coordination languages and models, first international conference, COORDINATION’96 (pp. 1-11). Springer-Verlag.
Banâtre, J.P., & Mètayer, D.L. (1990). The GAMMA model and its discipline of programming. Science of Computer Programming, 15, 55-77.
Banâtre, J.P., & Mètayer, D.L. (1993). Programming by multiset transformation. Communications ACM, 36(1), 98-111.
Banâtre, J.P., Coutant, A., & Mètayer, D.L. (1988). A parallel machine for multiset transformation and its programming style. Future Generation Computer System, 4, 133-144.
Bandyopadhyay, S.K., & Kondi, L.P. (2005). Optimal bit allocation for joint contour-based shape coding and shape adaptive texture coding. International Conference on Image Processing (ICIP), I, Genoa, Italy, September 11-14 (pp. 589-592).
Bank of America, (n.d.). Here’s how sitekey works. Retrieved September 29, 2005, from http://www.bankofamerica.com/privacy/passmark/
Baratloo, A., et al. (1998, April 27-30). Filter fresh: Hot replication of Java RMI server objects. Proceedings of 4th USENIX Conference on Object-Oriented Technologies and Systems (COOTS), Santa Fe, NM.
Barkan, E.,Biham, E., & Keller, N. (2003). Instant ciphet-ext-onlycryptoanalysisofGSMencryptedcommunication. CRYPTO 2003, 600-616.
Barken, L. (2004). How secure is your wireless network? Upper Saddle River, NJ: Prentice Hall.
Barker, S. (2000). Data protection by logic programming. Lecture Notes in Computer Science, 1861, 1300-1314.
Barles, J., Dras, M., Kavakli, M., Richards, D., & Tychsen, A. (2005, July 25-26). An overview of training simulation research and systems, proceedings of the agent based systems for human learning (ABSHL). Proceedings of Workshop held in conjunction with the Fourth International Joint Conference on Autonomous Agents and Multi AgentSystems, Utrecht, The Netherlands. Retrieved from http://agents.cs.columbia.edu/abshl
Barnsley, M.F. (1988). Fractals everywhere. Boston: Academic Press.
Bartal Y., Fiat, A., & Rabani, Y. (1992). Competitive algorithms for distributed data management. Proceedings of the 24th Annual ACM Symposium on Theory of Computing (pp. 39-50; pp. 51-58). Retrieved March 20, 2003, from http://portal.acm.org
Barthel, K.U., Voye, T., & Noll, P. (1993). Improved fractal image coding. Picture Coding Symposium, Lausanne, Switzerland, March 17-19.
Barto, A.G. (1992). Reinforcement learning and adaptive critic methods. In D.A.White and D.A.Sofge (Eds.), Handbook of intelligent control: Neural, fuzzy, and adaptive approaches (pp. 469-491). New York: Van Nostrand Reinhold.
Barun, T., & Danzeisen, M. (2001). Secure mobile IP communication. In Proceedings of 26th Annual IEEE Conference on Local Computer Networks (LCN’01), Tampa, FL, November 14-16 (pp. 586-593). Washington DC, USA: IEEE Computer Society.
Barwinski, M. A. (2005). Taxonomy of spy ware and empirical study of network drive-by-download. Unpublished doctoral dissertation, Naval Postgraduate School, Monterey, California.
Barzilay, R., & Elhadad, M. (1997). Lexical chains for text summarization. Master’s thesis, Ben-Gurion University.
Basagni, S., Chlamtac, I., Syrotiuk, V.R., & Woodward, B.A. (1998). A distance routing effect algorithm for mobility (DREAM). Proceedings of the 4th International Conference on Mobile Computing and Networking (MobiCom), Dalla, Texas, October 25-30 (pp. 76-84). ISBN 1-58113-035-X. New York: ACM Press.
Basel II. (2005). International convergence of capital measurement and capital standards: A revised framework. Basel Committee on Banking Supervision.
Bass, L., Klein, M., & Bachmann, F. (2001, October 4). Quality attribute design primitives and the attribute driven design method. Proceedings of 4th Conference on Product Family Engineering, Bilbao, Spain.
Bates, R.J. (1995). Wireless networked communications: Concepts, technology, and implementations. NY; Singapore: McGraw-Hill, Inc.
Bauer, B., Muller, J.P., & Odell, J. (2001). Agent UML: A formalism for specifying multi-agent software systems. International Journal of Software Engineering and Knowledge Engineering, 11(3), 207-230.
Baugher, M., McGrew, S., Naslund, M., Carrara, E., & Norrman, K. (2004). RTP: The secure real-time transport protocol (SRTP). RFC3711, IETF. Retrieved May 9,2006, from http://www.ietf.org/rfc/rfc3711.txt
Baxevanis, A. (2002). The molecular biology datacollection: 2002 update. Nucleic Acids Research, 30, 1-12.
Bazaraa, M., & Shetty, C. (1979). Non-linear programming. New York: John Wiley and Sons.
BEA, IBM, Microsoft, SAP, & Siebel. (2003). Business process execution language for Web services. Version 1.1. Specification. Retrieved May 15, 2006, from ftp://www6.software.ibm.com/software/developer/library/ws-bpel.pdf
Bechhofer, S.,Moller, R., & Crowther, P. (2003). The DIG description logic interface. International Workshop on Description Logics, Rome, Italy.
Beck, K. (1999). “Embracing change with extreme programming.” IEEE Computer 32(10) (October 1999): 70-77.
Beck, K. (1999). eXtreme programming explained: Embrace change. Addison-Wesley.
Becker, E., Buhse, W., Giinnewig, D., & Rump, N. (Eds.). (2003). Digital rights management, technological, economic, legal and political aspects. LNCS, 2770.
Beckett, D. (2004). RDF/XML Syntax Specification (Revised), W3C Recommendation. http://www.w3.org/TR/rdf-syntax-grammar/
Beco, S.,Cantalupo, B.,Matskanis, N., & Surridge M. (2006). Putting semantics in Grid workflow management: The OWL-WS approach. GGF16 Semantic Grid Workshop, Athens, Greece.
Bellavista, P., Corradi, A., & Stefanelli, C. (1999). A secure and open mobile agent programming environment. Proceedings of the 4th International Symposium on Autonomous Decentralized Systems (ISADS’99), Tokyo, Japan.
Bellenger, D.N., Bernhardt, K.L., & Goldtucker, J.L. (1989). Qualitative research techniques: Focus group interviews. In T.J.Hayes, & C.B.Tathum (Eds.), Focus group interviews: A reader (pp. 7-28). Chicago: American Marketing Association.
Bellifemine, F., Poggi, A., & Rimassi, G. (1999). JADE: A FIPA-compliant agent framework. Proceedings of Practical Applications of Intelligent Agents and Multi-Agents (pp. 97-108).
Bello, P.A. (1963). Characterization of randomly timevariant linear channels. IEEE Transactions on Communications, 11, 360-393.
Bellur, B., & Ogier, R.G. (1999). A reliable, efficient topology broadcast protocol for dynamic networks. Proceedings of the 18th Annual Joint Conference of the IEEE Computer and Communications Societies (InfoCom) New York, March 21-25 (pp. 178-186). ISBN 0-7803-5417-6, 1. New York: IEEE.
Beltran, F., & Roggendorf, M. (2004, December). An incentive-compatible pricing scheme for competitive access to wireless networks (pp. 1-6). Auckland, New Zealand: PING Research Group.
Beltran, F., & Roggendorf, M. (2004, October). Innovative pricing and charging in next-generation wireless networks (pp. 1-4). Auckland, New Zealand: PING Research Group.
Beltran, F., & Roggendorf, M. (2005). A simulation model for the dynamic allocation of network resources in a competitive wireless scenario. Proceedings of the Second International Workshop, MATA 2005, Montreal, Canada, October 17-19. Lecture Notes in Computer Science 3744. Auckland, New Zealand: PING Research Group.
Ben-natan, R. (1995). CORBA. New York: McGraw Hill.
Benson, D.,Karsch-mizrachi, I.,Lipman, D.,Ostell, J.,Rapp, B., & Wheeler, D. (2000). GenBank. Nucleic Acids Research, 28, 8-15.
Benson, R. J., T. L. Bugnitz, et al. (2004). From business strategy to IT action: right decisions for a better bottom line. Hoboken, NJ, John Wiley & Sons.
Berendt, B.,Hotho, A., & Stumme. G. (2002). Towards Semantic Web mining. In Proceedings of the First International Semantic Web Conference on the Semantic Web (pp. 264-278). Springer.
Berendt, B.,Hotho, A., & Stumme. G. (2005, September 15-16). Semantic Web mining and the representation, analysis, and evolution of Web space. In Proceedings of RAWS ‘2005 – Workshop on the Representation and Analysis of Web Space, Prague-Tocna.
Berenji, H.R., & Khedkar, P. (1992). Learning and tuning fuzzy logic controllers through reinforcement. IEEE Transactions on Neural Networks, 3(5), 724-740.
Bergenti, F., Poggi, A., Rimassa, G., & Turci, P. (2000). Middleware and programming support for agent systems. Telecom Italia Labs.
Bernard H. BOAR, Strategic Thinking for Information Technology: How to Build the IT Organization for the Information Age, John Wiley & Sons, 1996
Bernard LIAUTAUD, e-Business Intelligence, McGraw-Hill, 2000
Bernstein, A.,Hill, S., & Provost, F. (2001). An intelligent assistant for the knowledge discovery process. In Proceedings of the IJCAI-01 Workshop on Wrappers for Performance Enhancement in KDD. Seattle, WA: Morgan Kaufmann.
Bernstein, F.C.,Koetzle, T.F.,Williams, G.J.,Meyer, E.F.,Brice, M.D.,Rodgers, J.R., et al. (1977). The protein data bank: A computer-based archival file for macromolecular structures. Journal of Molecular Biology, 112, 535-542.
Bernstein, P. A., and E. Newcomer (1997). Principles of transaction processing. Morgan Kaufmann series in data management systems. San Francisco, Morgan Kaufmann.
Berry, G., & Boudol, G. (1992). The chemical abstract machine. Theoretical Computer Science, 96, 217-248.
Bertino, E.,Bonatti, P. A., & Ferrari, E. (2001). TRBAC: A temporal role-based access control model. ACM Trans, on Information and System Security, 4(3), 191-233.
Bertino, E.,Catania, B.,Ferrari, E., & Perlasca, P. (2001). A logical framework for reasoning about access control models. In Proceedings of the Sixth A CM Symposium on Access Control Models and Technologies (SACMAT), 41-52.
Bertino, E.,Ferrari, E., & Atluri, V. (1999) The specification and enforcement of authorization constraints in workflow management systems. ACM Transactions on Information and System Security (TISSEC), 2(1), 65-104.
Bertsekas, D., & Gallager, R. (1987). Data networks (pp. 297-333). NJ: Prentice-Hall Inc.
Berzal, F.,Blanco, I.,Sanchez, D., & Vila, M.-A. (2001). Measuring the accuracy and interest of association rules: A new framework. Intelligent Data Analysis, 6(3), 221-235.
Beznosov, K. (2004). On the benefits of decomposingpolicy engines into components. Third Workshop on Adaptive and Reflect Middleware, Toronto, Canada.
Bhargava S., & Agrawal, D.P. (2001). Security enhancements in AODV protocol for wireless ad-hoc networks. Proceedings of the Vehicular Technology Conference, 4, Atlantic City, NJ, October 7-11 (pp. 2143-2147). IEEE.
Bhogal, S.J., Teasell, R.W., & Speechley, M.R. (2003). Intensity of Aphasia therapy, impact on recovery. Stroke, (34), 987-993.
Bidoit, M., & Mosses, P. (2003). CASL user manual. LNCS vol. 2900. Springer Berlin.
Bigun, J., Aguilar, J.F., Ortega-Garcia, J., & Gonzalez-Rodriguez, J. (2003). Multimodal biometric authentication using quality signals in mobile communications. International Conference on Image Analysis and Processing 2003 (pp. 2-12).
Bina, M., & Giaglis, G.M. (2005). Exploring early us age patterns of mobile data services. Paper presented at the International Conference on Mobile Business, Sydney, Australia, July 11-13.
Bingham, J. (1990, May). Multicarrier modulation for data transmission: An idea whose time has come. IEEE Communications Magazine, 28, 5-14.
Biometrics Research homepage, (n.d.) Retrieved February 5, 2006, from http://biometrics.cse.msu.edu/
Bisdikian, C. (2001). An overview of Bluetooth wireless technology. IEEE Communications Magazine, 86-90.
Biswas, G.,Weinberg, J., & Li, C. (1995). ITERATE: A conceptual clustering method for knowledge discovery in databases. Artificial Intelligence in the Petroleum Industry (pp. 111-139). Paris.
Biswas, P.K. (2005, April 18-21). Architecting multi-agent systems with distributed sensor networks. Proceedings of IEEE International Conference on Integration of Knowledge Intensive Multi-Agent Systems (KIMAS), Waltham, MA.
Biswas, P.K. (in press). Towards an agent-oriented approach to conceptualization. Applied Soft Computing.
BitDefender. (2007). BitDefender free edition for Windows CE-AntiVirus Freeware, BitDefender Free Edition for PALM OS-AntiVirus Freeware. Retrieved September 27, 2007, from http://www.johannrain-softwareentwicklung.de/bitdefender_antivirus_free_edition_pour_windows_ce.htm or http://www.johannrainsoftwareentwicklung.de/bitdefender_antivirus_free_edition_pour_palm_os.htm
Black, J.A., & Boal, K.B. (1994). Strategic resources: Traits, configurations, and paths to sustainable competitive advantage. Strategic Management Journal, 15, 131-148.
Blaze, M.,Feigenbaum, J., & Lacy, J. (1996). Decentralized trust management. In Proceedings of the IEEE Symposium on Security and Privacy, 164-173.
Blaze, M.,Feigenbaum, J.,Ioannidis, J., & Keromytis, A. (1999). The KeyNote trust-management system version 2. RFC, 2704.
Blaze, M.,Ioannidis, J., & Keromytis, A. (2000). DSA and RSA key and signature encoding for the KeyNote trust management system. RFC, 2792.
Blaze, M.,Ioannidis, J., & Keromytis, A. (2003, May). Experience with the KeyNote trust management system: Applications and future directions. In Proceedings of the First International Conference on Trust Management, 284-300.
Blobel, B. (2001). The European Trust Health project experiences with implementing a security infrastructure. International Journal of Medical Informatics, 60, 193-201.
Blobel, B. (2004). Authorisation and access control for electronic health record system. International Journal of Medical Informatics, 73, 251-257.
Blobel, B.,Hoepner, P.,Joop, R.,Karnouskos, S.,Kleinhuis, G., & Stassinopoulos, G. (2003). Using aprivilegemanagement infrastructure for secure Web-based e-health applications. Computer Communication, 26(16), 1863-1872.
Bloehdorn, S.,Cimiano, P.,Hotho, S., & Staab, S. (2005). An ontology-based framwork for text mining. LDVForum: GLDV Journal for Computational Linguistics and Language Technology, 20(1), 87-112.
Bluefire Security Technologies. (2005). Wireless device security products. Retrieved July 9, 2005, from http://www.bluefiresecurity.com/products.html
Bluetooth SIG. (2006). The official Bluetooth wireless info site. Retrieved February 5, 2006, from http://www.bluetooth.com
Blum, A., & Merrick, F. (1995). Fast planning through planning graph analysis. Proceedings of the 14th International Joint Conference on Artificial Intelligence (IJCAI 95) (pp. 1636-1642).
Bock, H.H. (1993). Classification and clustering: Problems for the future. In E. Diday, Y. Lechevallier, M. Schader, P. Bertrand, & B. Burtschy, (Eds.), New approaches in classification and data analysis (pp. 3-24). Springer, Heidelberg.
Bogorny, V,Camargo, S.,Engel, P., & Alvares, L. O. (2006c). Mining frequent geographic patterns with knowledge constraints. In 14th ACM International Symposium on Advances in Geographic Information Systems. Arlington, November (to appear).
Bogorny, V,Camargo, S.,Engel, P., M., & Alvares, L.O. (2006b). Towards elimination of well known geographic domain patterns in spatial association rule mining. In Proceedings of the 3rd IEEE International Conference on Intelligent Systems (pp. 532-537). London: IEEE Computer Society.
Bogorny, V,Engel, P. M., & Alvares, L.O. (2005a). A reuse-based spatial data preparation framework for data mining. In J. Debenham & K. Zhang (Eds.), 15th International Conference on Software Engineering and Knowledge Engineering (pp. 649-652). Taipei: Knowledge Systems Institute.
Bogorny, V., & Iochpe, C. (2001). Extending the opengis model to support topological integrity constraints. In M. Mattoso & G. Xexéo (Eds.), 16th Brazilian Symposium in Databases (pp. 25-39). Rio de Janeiro: COPPE/UFRJ.
Bogorny, V.,Engel, P. M., & Alvares, L.O. (2005b). Towards the reduction of spatial join for knowledge discovery in geographic databases using geo-ontologies and spatial integrity constraints. In M. Ackermann, B. Berendt, M. Grobelink, & V.Avatek (Eds.), ECML/PKDD2nd Workshop on Knowledge Discovery and Ontologies (pp. 51-58). Porto.
Bogorny, V.,Engel, P. M., & Alvares, L.O. (2006a). Geo-ARM: An interoperable framework to improve geographic data preprocessing and spatial association rule mining. In Proceedings of the 18th International Conference on Software Engineering and Knowledge Engineering (pp. 70-84). San Francisco: Knowledge Systems Institute.
Boland, R.J.J.,Singh, J.,Salipante, P.,Aram, J.,Fay, S.Y., & Kanawattanachai, P. (2001). Knowledge representations and knowledge transfer. Academy of Management Journal, 44, 393-417.
Bolle, R.M., Connell, J., Pankanti, S., Ratha, N.K., & Senior A.W. (2002). Biometrics 101. IBM Research Report. New York: T.J.Hawthorne.
Bonabeau, E., Dorigo, M., & Theraulaz, G. (1999). Swarm intelligence: From natural to artificial systems. New York: Oxford University Press.
Bonabeau, E., Theraulaz, G., & Dorigo, M. (1999). Swarm intelligence: From natural to artificial systems. Oxford University Press.
Bonatti, P., & Samarati, P. (2002). A unified framework for regulating access and information release on the Web. Journal of Computer Security, 10(3), 241-272.
Bonchi, F.,Giannotti, F.,Gozzi, C.,Manco, G.,Nanni, M.,Pedreschi, D., et al. (2001). Web log data warehousing and mining for intelligent web caching. Data Knowledge Engineering, 39(2), 165-189.
Booch, G. (1991). Object-oriented design with applications. Redwood City, CA: Benjamin/Cummings.
Booch, G.,Rumbaugh, J., & Jacobson, I. (1999). The unified software development process. Boston: Addison Wesley.
Bosworth, S., & Kabay, M. E. (2002). Computer security handbook (4th ed.). Wiley.
Boudol, G. (1993). Some chemical abstract machines. In J.W.d.Bakker, W.P.d.Roever & G.Rozenberg (Eds.), A decade of concurrency: Reflections and perspectives (pp. 92-123). Springer-Verlag.
Boukerche, A., Hong, S., & Jacob, T., (2003). A two-phase handoff management scheme for synchronizing multimedia units over wireless networks. Proc. Eighth IEEE International Symposium on Computers and Communication, Antalya, Turkey, June-July (pp. 1078-1084). Los Alamitos, CA: IEEE Computer Society.
Boukhonine, S.,Krotov, V., & Rupert, B. (2005). Future security approaches and biometrics. Communications of AIS, 16(48), 937-966.
Bourigault, D., & Fabre, C. (2000). Approche linguistique pourl’ analyse syntaxique decorpus, Cahiers de Grammaire, 25, Université Toulouse le Mirail (pp. 131-151).
Bowenm, J. (1996). Formal specification and documentation using Z: A case study approach. International Thomson Computer Press.
Bowker, G., & Star, S.L. (1994). Knowledge and infrastructure in international information management: Problems of classification and coding. In L. Bud-Frierman (Ed.), Information acumen: The understanding and use of knowledge in modern business (pp. 187-213). London: Routledge.
Bowling, M. (2004). Convergence and no-regret in multiagent learning. Advances in Neural Information Processing Systems, 17, 209-216.
Bowling, M., & Veloso, M. (2002). Multiagent learning using a variable learning rate. Artificial Intelligence, 136(2), 215-250.
Bowman, M. (2002). A methodology for modeling and representing expert knowledge that supports teaching-based intelligent agent development. Unpublished doctoral dissertation, George Mason University, Fairfax, VA.
Bowman, M., Tecuci, G., Boicu, M., &Commello, J. (2004). Information age warfare-Intelligent agents in the classroom and strategic analysis center. Proceedings of the 24th U.S. Army Science Conference, Orlando FL.
Box, D. (1997). Essential COM. Addison-Wesley.
Boyapati,V. (2002). Improving text classification using unlabeled data. In Proceedings of the ACM Special Interest Group in Information Retrieval (SIGIR) Conference (pp. 11-15).
Bozionelos, N. (1996). Psychology of computer use: Prevalence of computer anxiety in British managers and professionals. Psychological Reports, 78(3), 995-1002.
Bozsak, E.,Ehrig, M.,Handschuh, S.,Hotho, A.,Maedche, A.,Motik, B., et al. (2002). KAON: Towards a large scale Semantic Web. In Proceedings of the 3rd International Conference on E-Commerce and Web Technologies (Vol. 2455, pp. 304-313).
Brache, A. P. (2002). How organizations work: taking a holistic approach to enterprise health. New York, John Wiley & Sons.
Braden, R., Zhang, L., Berson, S., Herzog, S., & Jamin, S. (1997). Resource ReSerVation Protocol (RSVP). RFC 2205, IETF. Retrieved May 10, 2006, from http://www.ietf.org/rfc/rfc2205.txt
Bradley, W. B., & Maher, D. P. (2004). The NEMO P2P service orchestration framework. In Proceedings of the 37th Hawaii International Conference on System Science.
Bradshaw, J.M. (1997). An introduction to software agents. In J.M.Bradshaw (Ed.), Software agents (pp. 3-46). AAAI Press/The MIT Press.
Brady, N. (1999). MPEG-4 standardized methods for the compression of arbitrarily shaped video objects. IEEE Transactions on Circuits and Systems for Video Technology, 9(8), 1170-1189.
Brady, N., Bossen, F., & Murphy, N. (1997). Context-based arithmetic encoding of 2D shape sequences. International Conference on Image Processing (ICIP), I, Washington, DC, October 26-29 (pp. 29-32).
Brændeland, G., & Stølen, K. (2004). Using risk analysis to assess user trust – A net-bank scenario. In C. Jensen, S. Poslad, & T. Dimitrakos (Eds.), Proceedings of the Second International Conference on Trust Management (iTrust 2004) (pp. 146-160). Oxford, England: Springer LNCS 2995.
Braubach, L., Pokahr, A., & Lamersdorf, W. (2005) Jadex: A BDI agent system combining middleware and reasoning. In M.Klusch, R.Unland, & M.Calisti (Eds.), Software agent-based applications, platforms and development kits. Birkhäuser.
Brazier, F., Jonker, C., & Van Treur, J. (1998). Principles of compositional multi-agent system development. In Cuena, J. (Ed.), 15th IFIP World Computer Congress, WCC’98, Conference on Information Technology and Knowledge Systems, Evaluating PSMs for Adaptive Design 23 (IT&KNOWS’98) (pp. 347-360).
Brazier, F.M., Dunin-Keplicz, B.M., Jennings, N.R., & Treur, J. (1997). DESIRE: Modeling multi-agent systems in a compositional formal framework. International Journal of Cooperative Information Systems, 6(1), 67-94.
Brazier, F.M., Keplicz, B.D., Jennings N.R., & Treur, J. (1995, June 12-14). Formal specification of multi-agent systems: A real-world case. Proceedings of the 1st International Conference on Multi-agent Systems (ICMAS ’95), San Francisco.
Brezany, P.,Janciak, I.,Kloner, C., & Petz, G. (2006). Auriga – workflow engine for WS-I/WS-RF services. Retrieved September 15, 2006, from http://www.Gridminer.org/auriga/
Brezany, P.,Janciak, I.,Woehrer, A., & Tjoa, A.M. (2004). GridMiner: A Framework for knowledge discovery on the Grid -from a vision to design and implementation. Cracow Grid Workshop, Cracow, Poland: Springer.
Brezany, P.,Tjoa, A.M.,Rusnak, M., & Janciak, I. (2003). Knowledge Grid support for treatment of traumatic brain injury victims. International Conference on Computational Science and its Applications. Montreal, Canada.
Bridge, D., & Ferguson, A. (2002). Diverse product recommendations using an expressive language for case retrieval. In S.Craw and A.Preece (Eds.), Advances in Case-Based Reasoning, Proceedings of the 6th European Conference on Case Based Reasoning, ECCBR (pp. 43-57). Springer Verlag.
Brislen, P. (2005, April). RoamAD sells metro Wi-Fi to Perth ISP: Kiwi company transitions from carrier to vendor. Computerworld New Zealand. Retrieved May 3, 2006, from http://computerworld.co.nz/news.nsf/UNID2B8B78E695883CAFCC256FE80026A6DO?OpenDocument&Highlight=2,roamad
Britton D., Cass A.J., et al. (2005). GridPP: Meeting the particle physics computing challenge. Proceedings of UK e-Science All Hands Conference.
Broader, A.Z.,Glassman, S.C.,Manasse, M., & Zweig, G. (1997). Syntactic clustering of the web. In Proceedings of the 6th International World Wide Wweb (WWW) Conference (pp.1157-1166).
Broch, J., Maltz, D., Hu Y.-C., & Jecheva, J. (1998). A performance comparison of multi-hop wireless ad hoc network routing protocols. Proceedings of the 4th ACM/ IEEE International Conference on Mobile Computing and Networking (MobiCom), Dallas, Texas, October 25-30 (pp. 85-97). ISBN 1-58113-035-X. New York: ACM Press.
Brooks, F. P. (1995). The mythical man-month: essays on software engineering. Reading, MA, Addison-Wesley.
Brooks, P. (2006). Metrics for IT service management. The Netherlands, Van Haren.
Brooks, R.A. (1986). A robust layered control system for a mobile robot. IEEE Journal of Robotics and Automation, RA-2(1) 14-23.
Brown, M.C. (2005). What is the semantic grid. Retrieved from http://www-128.ibm.com/developerworks/grid/library/gr-semgrid/
Brown, W. J. (1998). Antipatterns: refactoring software, architectures, and projects in crisis. New York, John Wiley & Sons.
Brown, W. J., H. W. McCormick, et al. (1999). Antipatterns and patterns in software configuration management. New York, John Wiley & Sons.
Brown, W. J., H. W. McCormick, et al. (2000). Antipatterns in project management. New York, John Wiley & Sons.
Bruha, I. (2000). From machine learning to knowledge discovery: Survey of preprocessing and postprocessing. Intelligent Data Analysis, 4, 363-374.
Brunett, S., et al. (1998). Implementing distributed synthetic forces simulations in metacomputing environments. Proceedings of IPPS/SPDP Heterogeneous Computing Workshop.
Brüninghaus, K., & Rohling, H. (1997). On the duality of multi-carrier spread spectrum and single-carrier transmission. Zweites OFDM-Fachgespräch, Braunschweig, Germany (pp. 210-215). Braunschweig: TU Braunschweig.
Brüninghaus, K., & Rohling, H. (1998). Multi-carrier spread spectrum and its relationship to single carrier transmission. Proc. of the IEEE VTC’98, Ottawa, Canada (pp. 2329-2332). New York: IEEE.
BS7799-2:1999. (1999). British standard- Specificationfor information security management system.
Buchanman, W.J., Naylor, M., & Scott, A.V. (2000). Enhancing network management using mobile agents. The 7th IEEE International Conference and Workshop on the Engineering of Computer Based Systems (pp. 218-228). Retrieved April 5, 2002, from http://ieeexplore.ieee.org
Buchegger, S., & Boudec, J.-Y.L. (2002). Nodes bearing grudges: Towards routing security, fairness and robustness in mobile ad hoc networks. Proceedings of the 10th Euromicro Workshop on Parallel, Distributed and Network-based Processing, Canary Island, Spain, January 9-11 (pp. 403-410). IEEE Computer Society.
Buchegger, S., & Boudec, J.-Y.L. (2002). Performance analysis of the CONFIDANT protocol. Proceedings of the 3rd ACM International Symposium on Mobile Ad Hoc Networking and Computing (MobiHoc), Lausanne, Switzerland, June 9-11 (pp. 455-465). ISBN 1-58113-501-7. ACM Press.
Buchheim, T.,Erlinger, M.,Feinstein, B.,Matthews., G.,Pollock, R.,Betser, J., et al. (2001). Implementing the Intrusion detection exchange protocol. In Proceedings of 17th Annual Computer Security Applications Conference (ACSAC’01), IEEE Press, 32-41.
Buchheim, T.,Feinstein, B.,Gupta, D.,Matthews, G., & Pollock, R. (2001). IAP: Intrusion alert protocol, Internet engineering task force, draft-ietfidwg-iap-05.
Budagavi, M., & Gibson, J.D. (2001, February). Multiframe video coding for improved performance over wireless channels. IEEE Transactions on Image Processing, 10(2), 252-265.
Bull, D.R., Canagarajah, N.C., & Nix, A. (1999). Insights into mobile multimedia communications: Signal processing and its applications. San Diego, CA: Academic Press.
Bulthoff, H.H., Graf, A.B.A., Scholkopt, B., Simoncelli, E.P., & Wichmann, F.A. (2004). Machine learning applied to perception: Decision-images for gender classification. Advances in Neural Information Processing Systems, 17. Retrieved April 24, 2006, from http://www.cns.nyu.edu/pub/eero/wichmann04a.pdf
Bumpus, W. (2000). Common information model: implementing the object model for enterprise management. New York, John Wiley & Sons.
Bunge, M. (1977). Treatise on Basic Philosophy. Ontology I. The Furniture of the World. Vol. 3, Boston: Reidel.
Buracchini, E. (2000). The software radio concept. IEEE Communication Magazine, 38, 138-143.
Burileanu, C., Moraru, D., Bojan, L., Puchiu, M., & Stan, A. (2002). On performance improvement of a speaker verification system using vector quantisation, cohorts and hybrid cohort-word models. International Journal of Speech Technology, 5, 247-257.
Burke, R. (2000). Knowledge-based recommender systems. In J.E.Daily, A.Kent, & H.Lancour (Eds.), Encyclopedia of library and information science, vol. 69. Marcel Dekker.
Burke, R. (2002). Hybrid recommender systems: Survey and experiments. User Modeling and User-Adapted Interaction, 12(4), 331-370.
Burke, R. (2002). Interactive critiquing for catalog navigation in e-commerce. Artificial Intelligence Review, 18(3-4), 245-267.
Burke, R., Hammond, K., & Kozlovsky, J. (1995). Knowledge-based information retrieval for semi-structured text. Proceedings of the AAAI Fall Symposium on AI Applications in Knowledge Navigation and Retrieval (pp. 19-24). Menlo Park, CA: AAAI Press.
Burke, R., Hammond, K., & Young, B. (1996). Knowledge-based navigation of complex information spaces. Proceedings of the 13th National Conference on Artificial Intelligence (pp. 462-468). Menlo Park, CA: AAAI Press.
Burke, R., Hammond, K., & Young, B.C. (1997). The findme approach to assisted browsing. Journal of IEEE Expert, 12(4), 32-40.
Burkholder, P. (2002). SSL man-in-the-middle attacks (SANS report). Retrieved January 30,2006, from http://www.sans/org/rr/whitepapers/threats/480.php
Burlton, R. (2001). Business process management: profiting from process. Indianapolis, Sams.
Burnett, R. (2005). Legal risk management for the IT industry. Computer Law & Security Report, 21, 621-67.
Burton, E., Meeks, N., & Wright, K. (1991). Opportunities for using computers in speech and language therapy: A study of one unit. British Journal of Disorders in Communication, 26(2), 207-217.
Buschmann, F. (1996). Pattern-oriented software architecture: a system of patterns. Chichester, England; New York, John Wiley & Sons.
Bussler,C.,Davies, J.,Dieter, F., & Studer, R. (2004). The Semantic Web: Research and applications. In Proceedings of the 1st European Semantic Web Symposium, ESWS. Lecture Notes in Computer Science, 3053. Springer.
Bussmann, S. (1999). An agent-oriented architecture for holonic manufacturing control. Proceedings of the First International Workshop on IMS, Lausanne, Switzerland.
Butnariu, D., & Klement, E.P. (1993). Triangular norm based measures and games with fuzzy coalitions. Dordrecht, Netherlands: Kluwer Academic Publishers.
Cagdas, G., Kavakli, M., Ozsoy, A., Esin Altas, N., & Tong, H. (2000) Virtual design studio VDS2000 as a virtual construction site: Game-like learning versus traditional design education. International Journal of Design Computing, 3, 1-20.
Cai, C.H.,Fu, A.W.,Cheng, C.H., & Kwong, W.W. (1998). Mining association rules with weighted items. In Proceedings of 1998 Internatinal Database Engineering and Applications Symposium, (pp. 68-77).
Calder, B.J., & Staw, B.M. (1975). Self-perception of intrinsic and extrinsic motivation. Journal of Personality and Social Psychology, 31(4) 599-605.
Calhoun, P., Johansson, T., Perkins, C., Hiller, T., & McCann, Ed. P. (2005). Diameter mobile IPv4 application. IETF, RFC 4004. Retrieved May 8, 2006, from http://www.ietf.org/rfc/rfc4004.txt
Camarillo, G., Handley, M., Johnston, A., Peterson, J., Rosenberg, J., Schooler, E., Schulzrinne, H., & Sparks, R. (2002). RFC 3261-SIP: Session initiation protocol. IETF Internet Standard. Retrieved September 18, 2007, from http://www.ietf.org/rfc/rfc3261.txt
Camarinha-Matos, L.,Afsarmanesh, H.,Loh, H.,Sturm, F., & Ollus, M. (2004). A strategic road map for advanced virtual organizations. In L. Camarinha-Matos & H. Afsarmanesh (Eds.), Collaborative networked oganizations: A research agenda for emerging business models. New York: Springer.
Camazine S., Deneubourg, J.L., Franks, N., Sneyd, J., Theraulaz, G., & Bonabeau, E. (2001). Self-organization in biological systems. Princeton, NJ: Princeton University Press.
Camazine, S., & Sneyd, J. (1991). A model of collective nectar source selection by honey bees: Self-organization through simple rules. Journal of Theoretical Biology, 149(41), 547-571.
Camazine, S., Deneubourg, J.L., Franks, N.R., Sneyd, J., Theraulaz, G., & Bonabeau, E. (2003). Self-organization in biological systems. Princeton.
Campbell, R., & Qian, T. (1998). Dynamic agent-based security architecture for mobile computers. Second International Conference on Parallel and Distributed Computing and Networks (PDCN’98). Canada: The International Association of Science and Technology for Development. Retrieved December 2005, from http://srg.cs.uiuc.edu/Security/cherubim/slides/hpcn/index.htm.
Campbell, R.H., Al-Muhtadi, J., Naldurg, P., Sampemane, G., & Mickunas, M.D. (2002). Towards security and privacy for pervasive computing. In Proceedings of Theories and Systems, Next-NSF-JSPS International Sympsoium, Tokyo, Japan, November (pp. 1-15).
Cam-Winget, N., Housley, R., Wagner, D., & Walker, W. (2003). Security flaws in 802.11 data link protocols. Communication of the ACM, 46(5).
Canfora, G., and M. Di Penta (2006). “Testing services and service-centric systems: challenges and opportunities.” IEEE IT Professional (March/April 2006).
Canhoto, A.I., & Backhouse, J. (2005). Tracing the identity of a money launderer. In T. Nabeth (Ed.), Fidis d2.2: Set of use case and scenarios. Fontainebleau: Insead.
Cantor, S.,Kemp, J.,Philpott, R., & Maler, E. (2005). Security assertion markup language (SAML V2.0). Retrieved March 15, 2005, from http://docs.oasis-open.org/security/saml/v2.0/
Cao, J. (2001). Agent-based resource management for grid computing. Unpublished doctoral dissertation, University of Warwick, Coventry, UK.
Cao, J., Javis, S.A., & Asini S. (2002). An agent-based resource management system for grid computing. Scientific Programming, 10(2), 135-148.
Capkun, S., Buttyan, L., & Hubaux, J.-P. (2003). Self-organizing public-key management for mobile ad hoc networks. IEEE Transactions on Mobile Computing, 2(1), 52-64.
Cappella, & Pelachaud, C. (2001). Rules for responsive robots: Using human interactions to build virtual interactions. In Reis, Fitzpatrick, & Vangelisti (Eds.), Stability and change in relationships.
Capuano, N., Marsella, M., & Salerno, S. (2000). ABITS: An agent based intelligent tutoring system for distance learning. Proceedings of the International Workshop in Adaptive and Intelligent Web-Based Educational Systems.
Carbone, J. A. (2004). IT architecture toolkit. Enterprise computing series. Professional Technical Reference. Upper Saddle River, NJ, Prentice Hall.
Card, S.K., Moran, T.P., & Newell, A. (1983). The psychology of human-computer interaction. Hillsdale, NJ: Lawrence Earlbaum Associates.
Cardelli, L. (1995). A language with distributed scope. Computing Systems Journal, 8(1).
Carey, N.,Mohay, G., & Clark, A. (2003). Attack signature matching and discovery in systems employing heterogeneous IDS. In Proceedings of the 19’h Annual Computer Security Applications Conference (ACSAC 2003). Los Alamitos, CA: IEEE Computer Society Press.
Carlis, J. V., and J. D. Maguire (2001). Mastering data modeling: a user-driven approach. Boston, Addison-Wesley.
Carlson, J., & Murphy, R.R. (2003). Reliability analysis of mobile robot. Proceedings of the 2003 IEEE International Conference on Robotics and Automation, ICRA 2003. Taipei, Taiwan.
Carlsson, C., Hyvonen, K., Repo, P., & Walden, P. (2005). Adoption of mobile services across different platforms. Paper presented at the 18th Bled eCommerce Conference, Bled, Slovenia, June 6-8.
Carmichael, L.,Hogan, H.P., & Walter, A.A. (1932). An experimental study on the effect of language on the reproduction of visually perceived form. Journal of Experimental Psychology, 15, 73-86.
Carr, N. (2003). “IT doesn’t matter.” Harvard Business Review (May 2003): 5-12.
Carr, N. G. (2004). Does IT matter? Information technology and the corrosion of competitive advantage. Boston, Harvard Business School Press.
Carriero, N., & Gelernter, D. (1989). Linda in context. Communication ACM, 32(4), 444-458.
Carriero, N., Gelernter, D., Mattson, T., & Sherman, A. (1994). The Linda alternative to message-passing systems. Parallel Computing, 20, 632-655.
Carson, D., Gilmore, A., Gronhaug, K., & Perry, C. (2001). Qualitative research in marketing. London: Sage.
Carson, S.,Madhok, A.,Varman, R., & John, G. (2003). Information processing moderators of the effectiveness of trust based governance in interfirm R&D collaboration. Organization Science, 14, 45-56.
Carvey, H. (2005). Windows forensics and incident recovery. Addison-Wesley.
Casal, C.R., Burgelman, J.C., & Bohlin, E. (2004). Propects beyond 3 G. Info, 6(6), 359-362.
Casal, C.R., Schoute, F., & Prasad, R. (1999). A novel concept for fourth generation mobile multimedia communication. IEEE 50th Vehicular Technology Conference (VTC 1999-Fall), 1, Amsterdam, The Netherlands, September 19-22 (pp, 381-385). Piscataway, NJ: IEEE Service Center.
Cassell, J. (2000). More than just another pretty face: Embodied conversational interface agents. Communications of the ACM, 43(4), 70-78.
Castano, S.,Ferrara, A., & Montanelli., S. (2006). A matchmaking-based ontology evolution methodology. In Proceedings of the 3rd CAiSE INTEROP Workshop on Enterprise Modelling and Ontologies for Interoperability (EMOI – INTEROP 2006), Luxembourg.
Castelfranchi, C., Miceli, M., & Cesta, A. (1992). Dependence relations among autonomous agents. Proceedings of the 3rd European Workshop on Modeling Autonomous Agents and Multi-Agent Worlds (pp. 215-231). Amsterdam, The Netherlands: Elsevier Science Publishers.
Castelpietra, C., Guidotti, A., Iocchi, L., Nardi, D., & Rosati, R. (2002). Design and implemantation of cognitive soccer robots. In RoboCup 2001: Robot soccer World Cup V, vol. 2377 of Lecture Notes in Computer Science. Springer.
Castro, J. (1995). Fuzzy logic controllers are universal approximators. IEEE Trans. On Systems, Man, and Cybernetics, 25(4), 629-635.
Castro, M.D. (1996). The walnut kernel: A password-capability based operating system. Ph.D. Thesis, Monash University, Clayton, Australia.
Catania B.,Maddalena, A., & Mazza, M. (2005). PSYCHO: A prototype system for pattern management. In Proceedings of the International Conference on Very Large Data Bases 2005.
Catania, B., & Maddalena, A. (2006). Pattern Management: Practice and challenges. In J. Darmont & O. Boussaid (Eds.), Processing and managing complex data for decision support. Idea Group Publishing.
Cattell, R., & Inscore, J. (2001). J2EE technology in practice. Addison-Wesley.
Cazemier, J. A., P. L. Overbeek, et al. (1999). Security management. OGC, ITIL Managing IT Services (Information Technology Infrastructure Library). London, The Stationary Office.
CCITT. (1994). Facsimile coding schemes and coding functions for group 4 facsimile apparatus. CCITT Recommendation T.6.
Central Computer and Telecommunications Agency (1994). Data management. Information Management Library (ITIL Back Catalog). London, The Stationery Office.
CERT. (2005). CERT/CC Statistics. Retrieved December 2005 from http://www.cert.org/stats/
CERT. (2005). Denial of service attacks. Retrieved October 2005 from http://www.cert.org/tech_tips/denial_of_service.html
CFCU. (2005, January 24). CFCU credit union says customers received “phishing” scame-mails. Retrieved January 26, 2006, from http://today.14850.com/0124cfcuscam.html
Chadwick, D.,et. al. (2003, March-April). Role based access control with X.509 attribute certificates. IEEE Internet Computing, 62-69.
Chae, M., & Kim, J. (2003). What’s so different about the mobile Internet? Communications of the ACM, 46(12), 240-247.
Chae, M., & Kim, J. (2004). Do size and structure matter to mobile users? An empirical study of the effects of screen size, information structure, and task complexity on user activities with standard web phones. Behaviour & Information Technology, 23(3), 165-181.
Chakrabarti, S.,Dom, B., & Indyk, P. (1998b). Enhanced hypertext categorization using hyperlinks. In Proceedings of the ACM’s Special Interest Group on Data on Data Management (SIGMOD) Conference.
Chakrabarti, S.,Dom, B.,Agraval, R., & Raghavan, P. (1998a). Scalable feature selection, classification and signature generation for organizing large text databases into hierarchical topic taxonomies. Very Large DataBases (VLDB) Journal, 7, 163-178.
Chamberlin, D., & Boyce, R. (1974). SEQUEL: A structured English query language. International Conference on Management of Data ACMSIGFIDET (now SIGMOD) Workshop on Data Description, Access and Control, 249-264.
Chan, C., & Lewis, B. (2002). A basic primer on data mining. Information Systems Management, 19(4), 56-60.
Chan, T.W. (1996). Learning companion systems, social learning systems, and intelligent virtual classroom [Invited talk]. Conference on Artificial Intelligence in Education. Journal of Artificial Intelligence in Education, 7(2), 125-159.
Chang, R.W. (1966). Synthesis of band-limited orthogonal signals for multichannel data transmission. Bell Syst. Tech. J., 45, 1775-1796.
Chang, Y.H., & Kaelbling, L.P. (2001). Playing is believing: The role of beliefs in multi-agent learning. Advances in Neural Information Processing Systems, 14, 1483-1490.
Chapman, N., & Chapman, J. (2000). Digital multimedia. London: John Wiley & Sons.
Chapman, P.,Clinton, J.,Khabaza, T.,Reinartz, T., & Wirth. R. (1999). The CRISP-DMprocess model. Technical report, CRISM-DM consortium. Retrieved May 15, 2006, from http://www.crisp-dm.org/CRISPWP-0800.pdf
Charles, A.A., Menezes, R., & Tolksdorf, R. (2004). On the implementation of SwarmLinda. Proceedings of the 42nd Association for Computing Machinery Southeast Regional Conference (pp. 297-298). Retrieved July 15, 2006, from Association for Computing Machinery Digital Library Database.
Chatterjee, S.,Sabata, B., & Sydir, J. (1998). ERDoS QoS architecture (Tech. Rep. ITAD-1667-TR-98-075). Menlo Park, CA:
Chau, P.Y.K. (1996). An empirical assessment of a modified technology acceptance model. Journal of Management Information Systems, 13(2), 185-204.
Chau, P.Y.K., & Hu, P.J.-H. (2001). Information technology acceptance by individual professionals: a model comparison approach. Decision Science, 32(4), 699-719.
Chaumier, J. (1988). Le traitement linguistique de I’information. Entreprise moderne d’éd.
Chaves, M. S.,Silva, M. J., & Martins, B. (2005a). A geographic knowledge base for semantic web applications. In C. A. Heuser (Ed.), 20th Brazilian Symposium on Databases (pp. 40-54). Uberlandia: UFU.
Chaves, M.S.,Silva, M. J., & Martins, B. (2005b). GKB- Geographic Knowledge Base. (TR05-12). DI/FCUL.
Chavez, A., Moukas, A., & Maes, P. (1997). Challenger: A multiagent system for distributed resource allocation. Proceedings of the First International Conference on Autonomous Agents, Marina Del Ray, CA.
Chaw, D.L. (1981). Untraceable electronic mail, return addresses, and digital pseudonyms, Communications of the ACM, 24(2), 84-90.
Check Point Software Technologies LTD. (2007). Welcome Pointsec and Reflex Magnetics customers! Retrieved September 27, 2007, from http://www.checkpoint.com/pointsec/
Checkland, P., & Scholes, J. (1990). Soft systems methodology in action. New York: Wiley.
Chen, H., & Dumais, S. (2000). Bringing order to the web: Automatically categorizing search results. In Proceedings of the SIGCHI Conference on Human Factors in Computing Systems (pp. 145-152).
Chen, M.J., Chen, L.G., Chiueh, T.D., & Lee, Y.P. (1995). A new block-matching criterion for motion estimation and its implementation. IEEE Transactions on Circuits and Systems for Video Technology, 5(3), 231-236.
Chen, T.-W., & Gerla, M. (1998). Global state routing: A new routing scheme for ad-hoc wireless networks. Proceedings of the IEEE International Conference on Communications (ICC), Atlanta, Georgia, June 7-11 (pp. 171-175). New York: IEEE.
Chen, X.,Zhou, X.,Scherl, R., & Geller, J. (2003). Using an interest ontology for improved support in rule mining. In Proceedings of the 5th International Conference on Data Warehousing and Knowledge Discovery ser. Lecture Notes in Computer Science, Vol. 2738 (pp. 320-329). New York: Springer Verlag.
Cheng, A., & Shang, F. (2005). Priority-driven coding of progressive JPEG images for transmission in real-time applications, 11th IEEE International Conference on Embedded and Real-Time Computing Systems and Applications (RTCSA’05), Hong Kong, August 17-19 (pp. 129-134). Washington, DC: IEEE Computer Society.
Chess, D., Grossof, B., Harrison, C., Levine, D., Parris, C., & Tsudik, G. (1994). Mobile Agents: Are they are good idea? (RC19887). IBM Research.
Chess, D., Harrison, C., & Kershenbaum, A. (1995). Mobile agents: Are they a good idea. IBM Research Report RC 19887. Retrieved from http://mega.ist.utl.pt/~ic-arge/arge-96-97/artigos/mobile-ibm-7929.ps.gz
Cheswick, W. R.,Bellovin, S. M., & Rubin, A. D. (2003). Firewalls and Internet security: Repelling the wily hacker. Addison-Wesley.
Cheung, D.W.,Wang, L.,Yiu, S.M., & Zhou, B. (2000). Density based mining of quantitative association rules. PAKDD, LNAI, Vol. 1805 (pp. 257-268).
Cheung, S.,Lindqvist,U., & Fong, M. W. (2003). Modeling multistep cyber attacks for scenario recognition. DARPA Information Survivability Conference and Exposition, 284-292.
Chiang, C., Wu, H., Liu, W., & Gerla, M. (1997). Routing in clustered multihop, mobile wireless networks. Proceedings of the IEEE Singapore International Conference on Networks (SICON), Singapore, April 14-17 (pp. 197-211). New York: IEEE.
Choi, H.R., Kim, H.S., & Park, Y.S. (2002). Intelligent injection mold process planning system using case-based reasoning. Journal of Korea Intelligent Information Systems Society, 8(1), 159-171.
Choi, H.S., Kim, H.S., Park, B.J., & Park, Y.S. (2004). Multi-agent based integration scheduling system under supply chain management environment. In Innovations in applied artificial intelligence. Ottawa, Canada: Springer Verlag.
Choi, S.J., & Woods, J.W. (1999). Motion-compensated 3-D subband coding of video. IEEE Transactions on Image Processing, 8(2), 155-167.
Chou, P.A., Lookabaugh, T., & Gary, R.M. (1989). Entropy constrained vector quantisation. IEEE Transactions on Acoustics, Speech, and Signal Processing, 37(1), 31-42.
Christensen, E.,Curbera, F.,Meredith, G., & Weerawarana, S. (2001). Web Services Description Language (WSDL) 1.1. Retrieved May 10, 2006, from http://www.w3.org/TR/wsdl
Christianini, N., & Shawe-Taylor, J. (2000). An introduction to support vector machines. Cambridge University Press.
Christodorescu, M., & Jha, S. (2003, August). Static analysis ofexecutables to detect malicious patterns. Proceeds of the Usenix Security Symposium.
Chun, J.K., Cho, K.Y., & Cho, S.H. (2002). Network management based on pc communication platform with SNMP and mobile agents. Proceedings of the 22nd International Conference on Distributed Computing Systems Workshops (pp. 222-227). Retrieved May 16, 2003, from http://ieeexplore.ieee.org
Chung, H.M., & Gray, P. (1999). Data mining. Journal of Management Information Systems, 16(1), 11-16.
Chuter, C.J., Ramaswamy, S., & Baber, K.S. (1995). A virtual environment for construction and analysis of manufacturing prototypes. Retrieved from http://ksi.cpsc.ucalgaly.ca/projects/mediator
CIDF Working Group. (1999). A CISL tutorial. Retrieved December 2005 from http://www.isi.edu/gost/cidf/tutorial.html
CINQ (Consortium on Discovering Knowledge with Inductive Queries). (2001). http://www.cinq-project.org
CIO Magazine (2004). “Special report: How to run IT like a business.” CIO Magazine (May 2004).
CipherTrust. (n.d.). Sender policy framework statistics. Retrieved January 29, 2006, from http://www.ciphertrust.com/resources/statistics/spfstats.php
Clarke, E., Grumberg, O., & Long, D. (1993). Verification tools for finite-state concurrent systems. In J.W. de Bakker, W.P.d.Roever, & G.Rozenberg (Eds.), A decade of concurrency: Reflections and perspectives (pp. 125-175). Springer-Verlag.
Clarke, E.M., Grumberg, O., & Hiraishi, H. (1993). Verifying of the Futurebus+ cache coherence Protocol. In L.Claesen (Ed.), Proceedings of the Eleventh International Symposium on Computer Hardware Description Languages and Their Applications. North-Holland.
Clarke, R.J. (1995). Digital compression of still images and video. London: Academic Press.
Classen, F., & Meyr, H. (1994). Frequency synchronization algorithms for OFDM systems suitable for communication over frequency selective fading channels. Proc. IEEE VTC 94, Stockholm, Sweden (pp. 1655-1659). New York: IEEE.
Claus, C., & Boutilier, C. (1998). The dynamics of reinforcement learning in cooperative multiagent systems. In Proceedings of the 15th National/10th Conference on Artificial Intelligence/Innovative Applications of Artificial Intelligence (pp. 746-752). Madison, WI: American Association for Artificial Intelligence Press.
Clausewitz, von C. (1832). On war (M.Howard & P.Paret, Trans.). Princeton, NJ: Princeton University Press.
Clement, B.J., & Durfee, E.H. (1998). Scheduling high-level tasks among cooperative agents. International Conference on Multi Agent Systems (pp. 96-103). Retrieved March 3, 2002, from http://ieeexplore.ieee.org
Clementini, E.,Di Felice, P., & Van Ostern, P. (1993). A small set of formal topological relationships for end-user interaction. In D.J. Abel & B.C. Ooi (Eds.), Advances in Spatial Databases, 3rd International Symposium, 692 (pp. 277-295). Singapore: Springer.
Clementini, E.,Felice, Di, P., & Koperski, K. (2000). Mining multiple-level spatial association rules for objects with a broad boundary. Data & Knowledge Engineering, 34(3), 251-270.
Clements, P. (1996). A survey of architecture description languages. ACM/IEEEInternational Workshop on Software Specification and Design, 16-25.
Clements, P. (2003). Documenting software architectures: views and beyond. SEI series in software engineering. Boston, Addison-Wesley.
Clinger-Cohen (1996). Information Technology Management Reform Act (a.k.a. the Clinger-Cohen Act). http://www.cio.gov/documents/it_management_reform_act_ feb_1996.html
CMMI Product Team (2001). Capability Maturity Model Integration (CMMI), version 1.1. Pittsburgh, Software Engineering Institute, Carnegie Mellon University.
Cockcroft, S. (1997). A Taxonomy of spatial data integrity constraints. Geoinformatica, 1(4), 327-343.
CodeRed Worm. (2001). Retrieved November 22, 2005, from http://securityresponse.symantec.com/avcenter/venc/data/codered.worm.html
Cohen, P.R., & Levesque, H.J. (1990). Rational interaction as the basis for communication. In P.R. Cohen, J. Morgan, & M.E. Pollack (Eds.), Intentions in communication (pp. 221-256). Cambridge, MA: MIT Press.
Cohen, R., & Molinari, B. (1991). Implementation of C-Linda for the AP1000. Proceedings of the 2nd ANU/Fujitsu CAP Workshop.
Cohen, R., Allaby, C., Cumbaa, C., Fitzgerald, M., Ho, K., Hui, B., et al. (1998). What is initiative? User Modeling and User-Adapted Interaction, 8(3-4), 173.
Collberg, C. & Thomborson, C. (2002, August). Tamper-proofing, and obfuscation – tools for software protection. IEEE Transactions on Software Engineering 701-746.
Collberg, C.,Thomborson, C., & Low, D. (1997, July). A taxonomy of obfuscating transformations (Tech. Rep. 148).
Collins, F.S.,Morgan, M., & Patrinos, A. (2003). The human genome project: Lessons from large-scale biology. Science, 300, 286-290.
Columbitech AB. (2005). Columbitech wireless VPN, technical description. Retrieved September 26, 2007, from http://www.columbitech.eom/img/2007/5/7/5300.pdf
Comer, D.E. (2000). Internet working with TCP/IP (4th ed., vol. 1). Prentice Hall.
Commite Europen de Normalisation ENV 13729 Standard. (2002). Secure user identification.
Commite Europen de Normalisation ENV13606 Standard. (2002). Extended architecture.
Compeau, D.R., & Higgins, C.A. (1995). Computer self-efficacy: Development of a measure and initial test. MIS Quarterly, 23(2), 189-211.
Computer Network Defence Ltd. (2006). Network intrusion detection systems product descriptions. Retrieved from http://www.networkintrusion.co.uk.Lastaccess:2006/07/13
Conati, C., & Klawe, M. (2000). Socially intelligent agents to improve the effectiveness of educational games. Proceedings of AAAI Fall Symposium on Socially Intelligent Agents, The Human in the Loop.
Conchon S., & Fessant, F. (1999). Jocaml: Mobile agents for objective-caml. Proceedings of the Joint Symposium on Agent Systems and Applications/Mobile Agents (ASA/MA’99), Palm Springs, CA.
Condor System (1998). Retrieved from http://www.cs.wisc.edu/condor/
Condor-G System (2001). Retrieved from http://www.cs.wisc.edu/condor/condorg/
Condos, C., James, A., Every, P., & Simpson, T. (2002). Ten usability principles for the development of effective WAP and m-commerce services. Aslib Proceedings, 54(6), 345-355.
Conoise-G project. (2005). Retrieved from http://www.conoise.org
Conte, & Gilbert (1995). Computer simulation for social theory. In N.Gilbert & R.Conte (Eds.), Artificial societies: The computer simulation of social life (pp. 1-15). London: UCL Press.
Convolution With Gaussian Kernals. IICAI.
Cook, M. A. (1996). Building enterprise information architectures: reengineering information systems. Hewlett-Packard professional books. Upper Saddle River, NJ, Prentice Hall.
Cook, S.D.N., & Brown, J.S. (1999). Bridging epistemologies: The generative dance between organizational knowledge and organizational knowing. Organization Science, 10(4), 381-400.
Cooke, D.J., & Bez, H.E. (1984). Computer mathematics. Cambridge: Cambridge University Press.
Coppersmith, D., & Jakobsson, M. (2002). Almost optimal hash sequence traversal. Conference on Financial Cryptography (FC), Southampton, Bermuda, March 11-14, Lecture Notes in Computer Science (pp. 102-119). ISBN: 978-3-540-00646-6. Springer-Verlag.
CORAL. (2004). Coral consortium corporation. Retrieved January 26, 2006, from http://www.coral.introp.org/
Corson, M.S., & Ephremides. (1995). A distributed routing algorithm for mobile wireless networks. ACM/Baltzer Wireless Networks, 1(1), 61-81.
Cossentino, M., & Potts, V. (2002, June 24-27). A CASE tool supported methodology for the design of multi-agent systems. Proceedings of International Conference on Software Engmeering Research and Practice (SERP ’02), Las Vegas, NV.
Coull, S.,Branch, J.,Szymanski, B., & Breimer, E. (2003). Intrusion detection: A bioinformatics approach. In Proceedings of the 19th Annual Computer Security Applications Conference (ACSAC 2003., Los Alamitos, CA: IEEE Computer Society Press.
Coulouris, G., Dollimore, J., & Kindberg, T. (2000). Distributed systems: Concepts and design (3rd ed.). Addison-Wesley.
Coveney, P. (2005). Simulated pore interactive computing environment (SPICE): Using grid computing to understand DNA translocation across protein nanopores embedded in lipid membranes. Proceedings of International Conference on Supercomputing.
Cover, T.M., & Thomas, J.A. (1991). Elements of information theory. New York: Wiley.
Cox, B. (1994, September). Super distribution. Wired Magazine, pp 89-92.
Cox, B. (1996). Superdistribution objects as property on the electronic frontier. Addison-Wesley.
CRAMM. CCTA risk analysis and management method (version 5). Retrieved from http://www.cramm.com/
Crampton, J.,Loizou, G., & O’Shea, G. (2001). A logic of access control. The Computer Journal, 44, 54-66.
Craven, M.,DiPasquo, D.,Freitag, D.,McCallum, A.,Mitchell, T.,Nigam, K., et al. (2000). Learning to construct knowledge bases from the World Wide Web. Artificial Intelligence, 118(1-2), 69-113.
Crawford, A.M. (2002). International media habits on the rise. Ad Age Global, 2(11). Retrieved from http://web.ebscohost.com/ehost/detail?vid=3&hid=101&sid=ff86c2ae-e7f7-4388-96b4-7da9c1bc4eb3%40sessionmgr106
Cremonini, M., Damiani, E., De Capitani di Vimercati, S., Samarati, P., Corallo, A., & Elia, G. (2005). Security, privacy, and trust in mobile systems and applications. In M.Pagani (Ed.), Mobile and wireless systems beyond 3 G: Managing new business opportunities (pp. 312-340). Hershey, PA: IRM Press.
Cremonini, M.,Damiani, E.,De Capitani Vimercati, S.,Samarati, P.,Corallo, A., & Elia, G. (2005). Security, privacy, and trust in mobile systems and applications. In M. Pagani (Ed.), Mobile and wireless systems beyond 3G: Managing new business opportunities. USA: IRM Press.
Crochiere, R.E., Webber, S.A., & Flanagan, F.L. (1976). Digital coding of speech in sub-bands. IEEE International Conference on Acoustics, Speech, and Signal Processing, 1, April (pp. 233-236).
Crosbie, M.,Dole, B.,Ellis, T.,Krsul, I., & Spafford, E. (1996). IDIOT- User’s guide (Tech. Rep. TR-96-050). West Lafayette, IN: ,Purdue University, Department of Computer Science, The COAST Project.
Crouch, C.J., & Yang, B. (1992). Experiments in automatic statistical thesaurus construction. Conference on Research and Development in Information Retrieval (SIGIR) (pp. 77-88).
Crow, L., & Shadbolt, N. (2001). Extracting focused knowledge from the Semantic Web. International Journal of Human Computer Studies, 54(1), 155-184. Retrieved December 27, 2003, from Association for Computing Machinery Digital Library Database.
Crutchfield, S. (n.d.). Outsmarting the malware. EDPACS, 2006(33), 18-20.
CSI Publications. (2005). CSI/FBI computer crime and security survey. Retrieved from http://www.GoCSI.com
Csikszentmihalyi, M. (1975). Beyond boredom and anxiety. San Francisco: Jossey-Bass.
Cui, Z.,Jones, D., & O’Brien, P. (2002). Semantic B2B Integration: Issues in Ontology-based Approaches. ACM SIGMOD Record archive SPECIAL ISSUE: Data management issues in electronic commerce table of contents, 31(1), 43-48.
Cuppens, F., & Miege, A. (2002). Alert correlation in a cooperative intrusion detection framework. In Proceedings of the 2002 IEEE Symposium on Security and Privacy (S&P 2002). Los Alamitos, CA: IEEE Computer Society Press.
Cuppens, F., & Ortalo, R. (2000). LAMBDA: A language to model a database for detection of attacks. International Workshop on Recent Advances in Intrusion Detection,107, 197-216.
Curley, M. (2004). Managing information technology for business value: practical strategies for IT and business managers. Hillsboro, OR, Intel Press.
Curry, D. (2000). Intrusion detection message exchange format: Extensible markup language (XML) document type definition (Intrusion Detection Working Group IETF Internet draft). Retrieved from http://xml.coverpages.org/draft-ietf-idwg-idmef-xml-01.txt
Curry, H.B. (1963). Foundations of mathematical logic. McGraw-Hill.
CWM (Common Warehouse Model) (2001). homepage. http://www.omg.org/cwm
Cybertrust. (2005). Pervasive security. JHU. Retrieved December 25, 2005, from http://www.jhuisi.jhu.edu/institute/docs/CyberTrust_81403/pervasive-security-into.pdf
Czajkowski, K., Ferguson, D.F., Foster, I., et al. (2003). The WS-resource framework. Retrieved from http://www.globus.org
Dabholkar, P.A., & Bagozzi, R.P. (2002). An attitudinal model of technology-based self-service: Moderating effects of consumer traits and situational factors. Journal of Academy of Marketing Science, 30(3), 184-201.
Dahl, O.-J., Dijkstra, E.W., & Hoare, C.A. R. (1972). Structured programming. Academic Press.
Dai, J. (1995). Isolated word recognition using Markov chain models. IEEE Transactions on Speech and Audio Processing, 3(6).
Dale, J., & Mamdani, E. (n.d.). Open standards for interoperating agent-based systems. Software Focus, 2(1), 1-8.
Damiani, E.,DeCapitani, S.,Paraboschi, S.,Samarati, P, & Violante, F. (2002). A reputation-based approach for choosing reliable resources in peer-to-peer networks. Ninth ACM Conference on Computer and Communications Security.
Damianou, N.,Dulay, N.,Lupu, E., & Sloman, M. (2001). The Ponder policy specification language. In Proceedings of the International Workshop on Policies for Distributed Systems and Networks (POLICY), 18-38.
Daniel E. SICHEL, The Computer Revolution, an Economic Perspective, Brookings Institution Press, 1997
DARWIN. Retrieved June 23, 2005, from http://developer.apple.com/darwin/projects/streaming/
Das, S.R., Castaneda, R., & Yan, J. (2000). Simulationbased performance evaluation of routing protocols for mobile ad hoc networks. ACM/Baltzer Mobile Networks and Applications (MONET), 5(3), 179-189.
Data Management Association International (2000). Implementing data resource management. DAMA International.
Data Mining Group. (2004). Predictive model markup language. Retrieved May 10, 2006, from http://www.dmg.org/
Date, C. J., and H. Darwen (2000). Foundation for future database systems: the third manifesto. A detailed study of the impact of type theory on the relational model of data, including a comprehensive model of type inheritance. Reading, MA, Addison- Wesley Professional.
Daubechies, I. (1990). The wavelet transform, time-frequency localization and signal analysis. IEEE Transactions on Information Theory, 36(5), 961-1005.
Davé, R.N. (1991). Characterization and detection of noise in clustering. Pattern Recognition Lett, 12(11), 657-664.
David CAMINER, John ARIS, Peter HERMON and Frank LAND, LEO: The Incredible Story of the World’s First Business Computer
Davis, C., Philipp, A., & Cowen, D. (2005). Hacking exposed computer forensics (hacking exposed). McGraw-Hill.
Davis, F.D. (1989). Perceived usefulness, perceived ease of use, and user acceptance in information technology. MIS Quarterly, 13(3), 319-340.
Davis, F.D., Bagozzi, R.P., & Warshaw, P.R. (1989). User acceptance of computer technology: A comparison of two theoretical models. Management Science, 35(8), 982-1002.
Davis, F.D., Bagozzi, R.P., & Warshaw, P.R. (1992). Extrinsic and intrinsic motivation to use computers in the workplace. Journal of Applied Social Psychology, 22, 1111-1132.
Davulcu, H.,Vadrevu, S., & Nagarajan, S. (2003). On-toMiner: Bootstrapping and populating ontologies from domain specific websites. In Proceedings of the First International Workshop on Semantic Web and Databases (SWDB 2003), Berlin.
De Capitani Vimercati, S., & Samarati, P. (2001). Access control: Policies, models, and mechanism. In R. Focardi & F. Gorrieri (Eds.), Foundations of security analysis and designtutorial lectures (vol. 2171 of LNCS). Springer-Verlag.
de Haas, J. (2005, Septemeber15-16). Symbian phone security. Presentation on T2’05 Conference, Helsinki, Finland. Retrieved October 9, 2005, from http://www.symternals.com/downloads/T2-Symbian-Security-vl.l.pdf
de Kleer, J., & Williams, B.C. (1987). Diagnosing multiple faults. Artificial Intelligence, 32(1), 97-130.
Debar, H.,Curry, D., & Feinstein, B. (2005). The intrusion detection message exchange format, IETF, RFC Draft, draft-ietf-idwg-idmef-xml-14.
Deci, E.L., & Ryan, R.M. (1985). Intrinsic motivation and self-determination in human behavior. New York: Plenum Press.
Decker, R.J. (2001). Homeland Security: A Risk Management Approach Can Guide Preparedness Efforts, USA General Accounting Office, report no GAO-02-208T, October 31Carbonell, J.R. (1970) AI in CAI: An artificial intelligence approach to computer-assisted instruction. IEEE Transactions on Man-Machine Systems, 11(4), 190-202.
Decker, S.,Erdmann, M.,Fensel, D., & Studer, R. (1999). Ontobroker: Ontology based access to distributed and semi-structured information. In Semantic Issues in Multimedia Systems, Proceedings of DS-8 (pp. 351-369). Boston: Kluwer Academic Publisher.
Deelman, E.,Blythe, J.,Gil, Y., & Kesselman, C. (2003). Workflow management in GriPhyN. The Grid Resource Management. The Netherlands: Kluwer.
Deerwester, S., et al. (1990). Indexing by latent semantic analysis. Journal of the Society for Information Science, 41(6).
Deitel, A.C.,Faron, C. & Dieng, R. (2001). Learning ontologies from RDF annotations. In Proceedings of the IJCAI’01 Workshop on Ontology Learning, Seattle, WA.
Del Fabbro, B.,Laiymani, D.,Nicod, J. M., & Philippe, L. (2004). A data persistency approach for the DIET metacomputing environment. International. Conference on Internet Computing, IC’04, Las Vegas, NV, pp. 701-707.
del Galdo, E.M., & Nielsen, J. (Eds.) (1996). International user interfaces. London: John Wiley & Sons.
Delamaro, M., & Picco, G. (2002). Mobile code in .NET: A porting experience. Proceedings of 6th International Conference on Mobile Agents (MA’02) (LNCS 2535). Barcelona, Spain: Springer-Verlag.
DeLoach, S.A. (2001, May 28-June 1). Specifying agent behavior as concurrent tasks: Defining the behavior of social agents. Proceedings of the 5th Annual Conference on Autonomous Agents, Montreal, Canada
DeLoach, S.A., Wood, M.F., & Sparkman, C.H. (2001). Multiagent systems engineering. The International Journal of Software Engineering and Knowledge Engineering, 11(3).
DeMarco, T. (1979). Structured analysis and system specification. Englewood Cliffs, NJ, Yourdon Press.
DeMoor, A. (2002). Language/action meets organizational semiotics: Situating conversations with norms. Information Systems Frontiers, 4(3), 257-272.
Dempster, A.P., Laird, N.M., & Rubin, D.B. (1977). Maximum likelihood from incomplete data via the EM algorithm. Journal of the Royal Statistical Society, B(39), 1-38.
den Braber, F.,Lund, M. S.,Stolen, K., & Vraalsen, F. (2005). Integrating security in the development process with UML. In M. Khosrow-Pour (Ed.), Encyclopedia of information science and technology (pp. 1560-1566). USA: Information Resources Management Association.
Dennett, D.C. (1987). The intentional stance. Cambridge, MA: MIT Press.
Denning, A. (1997). ActiveX controls inside out (2nd ed.). Redmond, WA: Microsoft Press.
Denning, D. E. (1987). An intrusion-detection model. IEEE Transactions on Software Engineering, 13(2).
Dennis, J.B., & Misunas, D.P. (1975). A preliminary architecture for a basic dataflow processor. Proceedings of 2nd Symposium on Computer Architectures (pp. 126-132).
Dennis, J.B., Gao, G.R., & Todd, K.W. (1984). Modeling the weather with dataflow supercomputers. IEEE Transactions on Computer, 33, 592-603.
Denzin, N.K. (1989). The research act: A theoretical introduction to sociological methods (3rd ed.). Englewood Cliffs, N.J.: Prentice Hall.
Deo, S., Nichols, D.M., Cunningham, S.J., Witten, I. H., & Trujillo, M.F. (2004). Digital library access for illiterate users. Proceedings of the 2004 International Research Conference on Innovations in Information Technology, Dubai (UAE), October (pp. 506-516). United Arab Emirates: UAE University.
Deraison, R. (2000). The Nessus attack scripting language reference guide. Retrieved December 19, 2005, from http://www.nessus.org
Desouza, K.C., & Hensgen, T. (2002). On information in organizations: An emergent information theory and semiotic framework. Emergence, 4(3), 95-114.
Detlev J. HOCH, Cyriac R. ROEDING, Gert PURKERT, Sandro K. LINDER, Secrets of Software Success, Harvard Business School Press, 1999
DevX Portal. (2006). Wireless application security: What’s up with that? Retrieved February 6, 2006, from http://www.devx.com/Intel/Article/18013/0/page/1
Dhamija, R., & Tygar, J. D. (2005, July 6-8). The battle against phishing: Dynamic Security Skins. In Proceedings of the 2005 Symposium on Usable Privacy and Security, Pittsburgh, PA.
Dhillon, G.S. (1995). Interpreting the management of information systems security. London School of Economics.
Dholakia, R.R., & Dholakia, N. (2004). Mobility and markets: Emerging outlines for m-commerce. Journal of Business Research, 57(12), 1391-1396.
Di Stefano, A., & Santoro, C. (2002). Locating mobile agents in a wide distributed environment. Retrieved April 27, 2006, from http://www.cs.albany.edu/~mhc/Mobile/leena_Presentation1.ppt
Diallo, G.,Simonet, M., & Simonet, A. (2006). An approach to automatic semantic annotation of biomedical texts. In Proceedings of IEA/AIE’06, LNAI 4031 (pp. 1024-1033). Springer-Verlag.
Diday, E. (1975). Laméthode des nuées dynamiques. Revue de Statistique Appliquée, 19(2), 19-34.
Diener, E., & Suh, E. (1997). Measuring quality of life: Economic, social and subjective indicators. Social Indicators Research, 40(1-2), 189-216.
Dietl, M., Gutmann, J.S., & Nebel, B. (2001). Cooperative sensing in dynamic environments. Proceedings of the IEEE/RSJ International Conference on Intelligent Robots and Systems (IROS’01), Maui, HI.
Dietz, M., & Meltzer, S. (2002, July). CT-aacPlus: A state-of-the-art audio coding scheme. EBU Technical Review, (291), 1-7. Retrieved from http://www.ebu.ch/en/technical/trev/trev_291-dietz.pdf and http://www.ebu.ch/en/technical/trev/trev_index-digital.html
Dietz, P., & Leigh, D. (2001). DiamondTouch: A multi-user touch technology Proceedings of the 14th Annual ACMSymposium on User Interface Software Technology (pp. 219-226). New York: ACM Press.
Dietze, C. (2005). The smart card in mobile communication: Enabler of next-generation (NG) services. In M. Pagani (Ed.), Mobile and wireless systems beyond 3G: Managing new business opportunities (pp. 221-253). Hershey, PA: IRM Press.
DIGIA Inc. (2003). Programming for the series 60 platform and Symbian OS. England: Wiley.
Dijkstra, E.W. (1976). A discipline of programming. Prentice-Hall.
Dillon, A., & Morris, M. (1996). User acceptance of information technology: theories and models. Journal of American Society for Information Science, 31, 3-32.
Dimitrakos, T.,Goldby, D., & Kearney, P. (2004). Towards a trust and contract management framework for dynamic virtual organizations. In E-Adoption and the knowledge economy: eChallenges 2004. Vienna, Austria: IOS Press.
Ding, Y., & Foo, S. (2002). Ontology research and development: Part 1-A review of ontology generation. Journal of Information Science, 28(2).
Distasi, R., Nappi, M., & Riccio, D. (2006). A range/ domain approximation error-based approach for fractal image compression. IEEE Transactions on Image Processing, 15(1), 89-97.
Distributed Management Task Force (2000). Common information model (CIM) core model. http://www.dmtf.org
Distributed Management Task Force (2002a). CIM database model white paper 2003. http://www.dmtf.org/standards/documents/CIM/DSP0133.pdf
Distributed Management Task Force (2002b). Specification for the representation of CIM in XML. http://www.dmtf.org/standards/documents/WBEM/DSP201.html
Distributed Management Task Force (2003). Common information model schema. http://www.dmtf.org
Distributed Net. (2006). Distributed net, node zero. Retrieved April 27, 2006, from http://www.distributed.net/
Dittmann, J., Wohlmacher, P., & Ackermann, R. (2001). Conditional and user specific access to services and resources using annotation watermarks. In R.Steinmetz, J.Dittman, & M.Steinebach (Eds.), Communications and multimedia security issues of the new century (pp. 137-142). Norwell, MA: Kluwer Academic Publishers.
DMCA. (1998a). H.R.2281 Digital Millennium Copyright Act (enrolled as agreed to or passed by both house and senate). Retrieved January 26, 2006, from http://thomas.loc.gov/cgi-bin/query/z?c105:H.R.2281.ENR:
DMCA. (1998b). The Digital Millennium Copyright Act of 1998 – U.S. copyright office summary. Retrieved January 26, 2006, from http://www.copyright.gov/legislation/dmca.pdf
DMP. (2003). Digital media project. Retrieved January 26, 2006, from http://www.dmpf.org/
DMP. (2005). Digital media project (Approved document No 3). Retrieved January 26, 2006, from http://www.dmpf.org/open/dmp0653.zip
Doan, A.,Madhavan, J.,Domingos, P., & Halevy, A. (2003). Ontology matching: A machine learning Approach. In S. Staab & R. Studer (Eds), Handbook on ontologies in information systems. Springer-Velag.
Dodds, K., & Fletcher, A. (2004). Interval probability process mapping as a tool for drilling decisions analysis: The R&D perspective. The Leading Edge, 23(6), 558-564.
Dogherty, P, Driankov, D., & Heffendorn, H. (1993). Fuzzy if then unless rules and their implementation. International Journal of Uncertainty, Fuzziness and Knowledge Based Systems 1(2), 167-182.
Domenech, A.L. (2003). Port-based authentication for wireless LAN access control. Report of Graduation Degree. Department of Electrical Engineering Eindhoven University of Technology (TU/e), Eindhoven, Netherlands. Retrieved September 24, 2007, from http://people.spacelabs.nl/~alex/Port_Based_Authentication_for_Wireless_LAN_Access_Control.pdf
Don TAPSCOTT, Art CASTON, Paradigm Shift, The New Promise of Information Technology, McGraw-Hill, 1993
Don TAPSCOTT, Blueprint to the Digital Economy, Creating Wealth in the Era of E-Business, McGraw-Hill, 1998
Don TAPSCOTT, Growing Up Digital, The Rise of the Net Generation, McGraw-Hill, 1998
Don TAPSCOTT, The Digital Economy, Promise and Peril in the Age of Networked Intelligence, McGraw-Hill, 1996
Dorigo, M., & Caro, G.D. (1998). AntNet: Distributed stigmergetic control for communications network. Journal of Artificial Intelligence Research JAIR, 9, 317-365.
Douceur, J. (2002). The Sybil attack. 1st International Workshop Peer-to-Peer Systems (IPTPS), Cambridge, MA, March 7-8, Lecture Notes in Computer Science (pp. 251-260). ISBN 3-540-44179-4. Springer-Verlag.
Douglas, D. (2004). Windows mobile-based devices and security: Protecting sensitive business information. Retrieved July 1, 2005, from http://download.microsoft.com/download/4/7/c/47c9d8ec-94d4-472b-887d-4a9ccf194160/6.%20WM_Security_Final_print.pdf
Douglas, D. (2004). Windows mobile-based devices and security: Protecting sensitive business information. Retrieved October 9, 2005, from http://download.microsoft.com/download/4/7/c/47c9d8ec-94d4-472b-887d-4a9ccf194160/6.%20WM_Security_Final_print.pdf
Doyle, M., & Cunningham, P. (2000). A Dynamic approach to reducing dialog in on-line decision guides. In E.Blanzieri & L.Portinale (Ed.), Proceedings of the Fifth European Workshop on Case-Based Reasoning (pp. 49-60). Springer-Verlag.
Dras, M. (1998). Search in constraint-based paraphrasing. Proceedings of the Second International Conference on Natural Language Processing and Industrial Applications (pp. 213-219).
Dras, M., Kavakli, M., & Richards, D. (2005, July 25-26). Training for high-risk situations. Proceedings of The Agent Based Systems for Human Learning (ABSHL), Workshop to be held in conjunction with the Fourth International Joint Conference on Autonomous Agents and Multi Agent Systems, Utrecht, The Netherlands. Retrieved from http://agents.cs.columbia.edu/abshl
Drew, Jr., W. (2003, February). Wireless networks: New meaning to ubiquitous computing. The Journal of Academic Librarianship, 29(2), 1-11.
Drucker, Peter F. (1963). “Managing for business effectiveness,” Harvard Business Review May-June.
Dube, R., Rais, C.D., Kuang-Yeh, W., & Tripathi, S.K. (1997). Signal stability-based adaptive routing (SSA) for ad-hoc mobile networks. IEEE Personal Communications, 4(1), 36-45.
Dubois, D. & Prade, H. (1992). Gradual inference rules in approximate reasoning. Information Sciences, 61, 103-122.
Duda, R.O., & Hart, P.E. (1973). Pattern classification and sense analysis. Wiley & Sons.
Dudney, B. (2003). J2EE antipatterns. Indianapolis, John Wiley & Sons.
Dufaux, F., & Moscheni, F. (1995). Motion estimation techniques for digital TV: A review and a new contribution. Proceedings of the IEEE, 83(6), 858-876.
Dufaux, F., & Nicholson, D. (2004). JPWL: JPEG 2000 for wireless applications. Photonic devices and algorithms for Computing VI. In K.M.Iftekharuddin, & A.A.S. Awwal (Eds.), Proceedings of the SPIE, 5558, 309-318.
Dugmore, J. (2002). “A standard for IT service management.” The guide to IT service management. J. van Bon, ed. London, Addison-Wesley: 97-115.
Duham, K. (2006). The problem with P2P. EDPACS, 2006(33), 9-13.
Duncan, M. V.,Akhtari, M. S., & Bradford, P. G. (2004). Visual security for wireless handheld devices. JOSHUA, 2.
Duncan, M.V., Akhtari, M.S., & Bradford, P.G. (2004). Visual security for wireless handheld devices. In JOSHUA Journal of Science & Health at The University of Alabama, 2/2004. The University of Alabama.
Dunham, H.M. (2003). Data mining, introductory and advanced topics. Prentice Hall.
Dunlop, H., Cunningham, S.J., & Jones, M. (2002). A digital library of conversational expressions: Helping profoundly disabled users communicate. Proceedings of the 2nd ACM/IEEE-CS Joint Conference on Digital Libraries (JCDL), Portland (Oregon, USA), July 14-18 (pp. 273-274). New York: ACM Press.
Dunne, C.R. (2001). Using mobile agents for network resource discovery in peer-to-peer networks. ACM SIGecom Exchanges, 2(3), 1-9.
Dutta, A., Chen, J., Madhani, S., McAuley, A., NakaJima, N., & Schulzrinne, H. (2001). Implementing a testbed for mobile multimedia. In Proceedings of the IEEE Conference on Global Communications (GLOBECOM), San Antonio, Texas, November 25-29 (pp. 1944-1949). IEEE.
Dutta, A., Das, S., Li, P., McAuley, A., Ohba, Y., Baba, S., & Schulzrinne, H. (2004). Secured mobile multimedia communication for wireless Internet. ICNSC 2004, Taipei.
Dutta, A., Zhang, T., Madhani, S., Taniuchi, K., Fujimoto, K., Katsube, Y., Ohba, Y., & Schulzrinne, H. (2004). Secure universal mobility for wireless Internet. In Proceedings of the 2nd ACM International Workshop on Wireless Mobile Applications and Services on WLAN Hotspots (WMASH), Philadelphia, PA, October 1 (pp. 71-80). New York: ACM Press.
Dutton, J.E., & Jackson, S.E. (1987). Categorizing strategic issues: Links to organizational action. Academy of Management Review, 12(1), 76-90.
Duvigneau, M., & Moldt, D. (2002, July). Concurrent architecture for a multi-agent platform. Proceedings of the 3rd International Workshop on Agent-Oriented Software Engineering (AOSE-2002), Bologna, Italy.
Dylla, F., Ferrein, A., & Lakemeyer, G. (2002). Acting and deliberating using golog in robotic soccer-A hybrid approach. Proceedings of the 3rd International Cognitive Robotics Workshop (CogRob 2002). AAAI Press.
Earth System Grid. (2001). Retrieved from https://www.earthsystemgrid.org/ http://e-science.ox.ac.uk/oesc/projects/test/projects.xml.ID=body.1_div.12
Eatock, J.,Paul, R.J., et al. (2002). Developing a theory to explain the insights gained concering information systems and business process behaviour: The ASSESS-IT project. Information Systems Frontiers, 4(3), 303-316.
EBIOS. (2004, February). Expression of needs and identification of security objectives. Retrieved from http://www.ssi.gouv.fr/fr/confiance/ebiospresentation.html
Ebrahimi, T. (1997). MPEG-4 video verification model version 8.0. International Standards Organization, ISO/ IEC JTC1/SC29/WG11 MPEG97/N1796.
Eckmann, S. T.,Vigna, G., & Kemmerer, R. A. (2002). STATL: An attack language for state-based intrusion detection. Journal of Computer Security, 10(1/2), 71-104.
Eco, U. (1976). A theory of semiotics. Bloomington, IN: Indiana University Press.
Eden, M., & Kocher, M. (1985). On the performance of a contour coding algorithm in the context of image coding. Part i: Contour segment coding. Signal Processing, 8, 381-386.
Egan, M. (2005). The executive guide to information security. Indianapolis, IN: Addison-Wesley.
Egenhofer, M., & Franzosa, R. (1995). On the equivalence of topological relations. International Journal of Geographical Information Systems, 9(2), 133-152.
Elammari, M., & Lalonde, W. (1999). An agent-oriented methodology: High-level view and intermediate models. Proceedings of AOIS Workshop, Seattle, WA.
Electronic Communication Privacy Act. (2006). Retrieved December 10, 2006, from http://www.usna.org/legis/ecpa.html
Elfeky, M.G.,Saad, A.A., & Fouad, S.A. (2001). ODMQL: Object data mining query language. In Proceedings of the 2000 International Symposium on Objects and Databases (pp. 128-140). New York: Springer Verlag.
Elliot, G., & Phillips, N. (2004). Mobile commerce and wireless computing systems. Harlow: Pearson Education Limited.
Elliot, S., & Loebbecke, C. (2000). Interactive, interorganizational innovations in electronic commerce. Information Technology & People, 13(1), 46-66.
Ellison, C. (1999). SPKI Certificate Theory, RFC, 2693.
Ellison, C.,Frantz, B., & Lacy, J. (1996). Simple public key certificate. Internet draft available online from draft-ietf-spki-cert-structure-06.txt
Ellison, C.,Frantz, B.,Lampson, B.,Rivest, R.,Thomas, B. M., & Ylonen, T. (1999, September). SPKI certificate theory. IETF RFC, 2693.
Elsbach, K.D.,Barr, P.S., & Hargadon, A.B. (2005). Identifying situated cognition in organizations. Organization Science, (16), 4.
EMCC Software. (2005). Symbian OS v9 – Advances in Symbian OS. Retrieved October 12, 2005, from http://www.newlc.com/article.php3?id_article=959
Emigh, A. (2005). Online identity theft: Phishing technology, chokepoints and countermeasures (ITTC report on online identity theft technology and countermeasures). Retrieved on July 14, 2006, from http://www.anti-phishing.org/Phishing-dhs-report.pdf
English, L. P. (1999). Improving data warehouse and business information quality: methods for reducing costs and increasing profits. New York, John Wiley & Sons.
Englmeier, K., & Mothe, J. (2003). IRAIA: A portal technology with a semantic layer coordinating multimedia retrieval and cross-owner content building. In Proceedings of the International Conference on Cross Media Service Delivery, Cross-Media Service Delivery Series. The International Series in Engineering and Computer Science (Vol. 740, pp. 181-192).
ePanorama. (2006). Retrieved February 2007, from http://www.epanorma.net/links/tele_mobile.html
Erbeschloe, M. (2005). A computer security professional’s guide to malicious code. Oxford, England: Elsevier.
Erdmann, M., & Rudi, S. (2001). How to structure and access XML documents with ontology. IEEE Data & Knowledge Engineering, 36, 317-335.
Erdos, M., & Cantor, S. (2002) Shibboleth-architecture. Retrieved May 2, 2002, from http://shibboleth.internet2.edu/docs/draft-internet2-shibboleth-arch-v04.pdf
Ester, M.,Frommelt, A.,Kriegel, H.-P., & Sander, J. (2000). Spatial data mining: Database primitives, algorithms and efficient DBMS support. Journal of Data Mining and Knowledge Discovery, 4(2-3), 193-216.
Ethereal. (2006). Retrieved December 10, 2006, from http://www.ethereal.com
ETHEREAL. Retrieved June 30, 2005, from http://www.ethereal.com
ETSI EN 302 304. (2004). Digital video broadcasting (DVB): Transmission system for handheld terminals (DVB-H). Retrieved September 26, 2007, from http://pda.etsi.org/pda/queryform.asp
EURESCOM P1207 OPERA. (2002). Overview of state-of-the art DRM systems and standardisation activities. Retrieved January 26, 2006, from http://www.eurescom.de/public/projectresults/P1200-series/P1207-TI.asp
EURESCOM P1207 OPERA. (2003). An open DRM architecture. Retrieved January 26, 2006, from http://www.eurescom.de/public/projectresults/P1200-series/P1207-D2.asp
Euzenat, J. (1995). Building consensual knowledge bases: Context and architecture. In Proceedings of 2nd International Conference on Building and Sharing Very Large-Scale Knowledge Bases. Enschede, Amsterdam: IOS Press.
Everett, C. (2005). Ready for take-off? Infosecurity Today, 2(6), 44-5.
Ewalt, D. M. (2005). Citigroupblames UPS for customer data loss. Retrieved January 26, 2006, from http://www.forbes.com/facesinthenews/2005/06/06/0606autofacescan09.html
Faatz, A., & Steinmetz, R. (2002). Ontology enrichment with texts from the WWW. Semantic Web Mining 2nd Workshop at ECML/PKDD-2002. Helsinki, Finland.
Fairclough, C., & Cunningham, P. (2002). An interactive story engine. Computer Science Department, Trinity College, Dublin.
Faltings, B., Pu, P, Torrens, M., & Viappiani, P. (2004). Design example-critiquing interaction. Proceedings of the International Conference on Intelligent User Interface (pp. 22-29). New York: ACM Press.
Fan, L., Akhtar, N., Chew, K., Moessner, K., & Tafazolli, R. (2004). Network composition: A step towards pervasive computing. Fifth IEE International Conference on 3 G Mobile Communication Technologies, London, UK, October 18-20 (pp. 198-202).
Farmer, W., Guttman, J., & Swarup, V. (1996). Security for mobile agents: Issues and requirements. Proceedings of the 19th National Information Systems Security Conference (NISSC’96), Baltimore.
Farooq Ahmad, H., Ali, A., Suguri, H., Abbas Khan, Z., & Rehman, M.U. (2003). Decentralized multi agent system: Basic thoughts. Proceedings of 11th Assurance System Symposium (pp. 9-14).
Farooq Ahmad, H., Iqbal, K., Ali, A., & Suguri, H. (2003). Autonomous distributed service system: Basic concepts and evaluation. Proceedings of the 2nd International Workshop on Grid and Cooperative Computing, GCC 2003 (pp. 432-439).
Farooq Ahmad, H., Suguri, H., Ali, A., Malik, S., Mugal, M., Omair Shafiq, M., et al. (2005, July 25-29). Scalable fault tolerant Agent Grooming Environment: SAGE. Proceedings of the 4th International Joint Conference on Autonomous Agents and Multiagent Systems (AAMAS) 2005, The Netherlands.
Farooq Ahmad, H., Suguri, H., Omair Shafiq, M. & Ali, A. (2004, September). Autonomous distributed service system: Enabling Webs services communication with software agents. Proceedings of 16th International Conference on commuters and Communication (ICCC 2004), Beijing, China.
Farooq Ahmad, H., Sun, G., & Mori, K. (2001). Autonomous information provision to achieve reliability for users and providers. IEEE Proceedings of the 5th International Symposium on ADS (ISADS01) (pp. 65-72).
Fassbender, Richards, & Kavakli (2006, December 4-6). Usage of a 3D game engine to evaluate different styles of music and their effect on learning in virtual-immersive environments. Proceedings of the Joint International Conference on CyberGames and Interactive Entertainment 2006 (CGIE2006), Perth, Western Australia
Favela, J., Rodriguez, M., Preciado A., & Gonzalez, V. (2004). Integrating context-aware public displays into a mobile hospital information system. IEEE Transactions on Information Technology in Biomedicine, 8(3), 279-286.
Fayyad, U., Piatetsky-Shapiro, G., Smyth, P., & Uthurusamy, R. (Eds.). (1996). Advances in knowledge discovery and data mining. Cambridge, MA: AAAI / MIT Press.
Fayyad, U.,Haussler, D., & Stolorz, P. (1996). Mining scientific data. Communications of the ACM, 39(11), 51-57.
Fayyad, U.M.,Piatetsky-Shapiro, G., & Smyth, P. (1996). From data mining to knowledge discovery, an overview. In U.Fayyad, G. Piatetsky-Shapiro, P. Smyth, & R. Uthurusamy (Eds.), Advances in knowledge discovery and data mining (pp. 1-30). Menlo Park, CA: AAAI/MIT Press.
Featherstone, I., & Zhang, N. (2003). Towards a secure videoconferencing system for mobile users. In the 5th European Personal Mobile Communications Conference, Glasgow, Scotland, April 22-25 (pp. 477-481). London, UK: IEEE.
Feinstein, B.,Matthews, G., & White, J. (2002). The Intrusion detection exchange protocol (IDXP), Internet engineering task force, RFC Draft, draft-ietf-idwg-beep-idxp-07.
Feng, H. H.,Giffin, J. T.,Huang, Y.,Jha, S.,Lee, W., & Miller, B. P. (2004). Formalizing sensitivity in static analysis for intrusion detection. In Proceedings of the 2004 IEEE Symposium on Security and Privacy (S&P ’04), Los Alami-tos, CA: IEEE Computer Society Press.
Fensel, D., et al. (2003). The unified problem-solving method development language UPML. Knowledge and Information Systems, An International Journal, 5, 83-127.
Fensel, S.B. (1998). Knowledge engineering: Principles and methods. Data and Knowledge Engineering, 25, 161-197.
Ferrante J., Ottenstein K.J., & Warren J.D. (1987). The program dependence graph and its use in optimization. ACM Transactions on Programming Languages and Systems, 9(3), 319-349.
Ferraro, C.I. (2003). Choosing between IPsec and SSL VPNs. Retrieved July 10, 2005, from http://searchsecurity.techtarget.com/qna/0,289202,sid14_gci940324,00.html
Ferreira, P.R., Jr., Oliveira, D., & Bazzan, A.L. (2005). A swarm based approach to adapt the structural dimension of agents’ organizations [Special issue]. Journal of Brazilian Computer Society JBCS, 101-113.
Fesenmaier, D., Ricci, F., Schaumlechner, E., Wober, K., & Zanella, C. (2003). DIETORECS: Travel advisory for multiple decision styles. In A.J.Frew, M.Hitz, & P.O’Connors (Eds.), Information and communication technologies in tourism (pp. 232-241).
FFIEC Guidance. (2005, October 12). Authentication in an Internet banking environment (FIL-103-2005).Retrieved January 25, 2006 from http://www.fdic.gov/news/news/fi-nancial/2005/fill0305.pdf
Fiat, A., & Mendel, M. (2000). Better algorithms for unfair metrical task systems and applications. Proceedings of the 32nd Annual ACM Symposium on Theory of Computing (pp. 725-734). Retrieved June 20, 2003, from http://portal.acm.org
Figge, S. (2004). Situation-dependent services: A challenge for mobile operators. Journal of Business Research, 57(12), 1416-1422.
Fikes, R., & Nilsson, N. (1972). Strips: A new approach to the application of theorem proving to problem solving. Artificial Intelligence, 2(3-4), 189-208.
Finextra.com (2005). Phishers target Nordea’s one-time password system. Retrieved January 24, 2006, from http://www.finextra.com/fullstory.asp?id=14384
Finin, T., Labrou, Y., & Mayfield, J. (n.d.). KQML as an agent communication language. In J.Bradshaw (Ed.), Software agents (pp. 291-316). Cambridge, MA: MIT Press.
Finin, T.,Fritzson, R.,McKay, D., & McEntire, R. (1994). KQML as an agent communication language. International Conference on Information and Knowledge Management, 456-463.
Finkelstein, C. (1989). An introduction to information engineering: from strategic planning to information systems. Reading, MA, Addison-Wesley.
FIPA (1998b). FIPA 97 specification Part 1: Agent management, Version 2.0. Foundation for Intelligent Physical Agents. Retrieved from http://www.fipa.org
FIPA (1998c). FIPA 98 specification part 13: FIPA97 developers guide, Version 1.0. Foundation for Intelligent Physical Agents. Retrieved from http://www.fipa.org
FIPA (1998d). FIPA specification 11 V1. 0: Agent management support for mobility specification. Retrieved from http://www.fipa.org
FIPA (2003). FIPA Methodology: Glossary rel 1.0. Retrieved from http://www.pa.icar.cnr.it/~cossentino/FIPAmeth/glossary.htm
FIPA. (2000). FIPA agent management support for mobility specification. DC000087C. Geneva, Switzerland: Foundation for Intelligent Physical Agents.
FIPA. (2002). FIPA abstract architecture specification. SC00001L. Geneva, Switzerland: Foundation for Intelligent Physical Agents.
FIPA. (2006). Retrieved May 22, 2005, from http://www.fipa.org/
FIPA. (n.d.) The Foundation for Intelligent Physical Agents. Retrieved from http://www.fipa.org
FIPA-OS. (n.d.) Retrieved from http://fipa-os.sourceforge.net/features.htm
Fischer, D.H. (1998). From thesauri towards ontologies? In W.M. Hadi, J. Maniez, & S. Pollitt (Eds.), Structures and Relations in Knowledge Organization: Proceedings of the 5th International ISKO Conference (pp. 18-30). Würzburg: Ergon.
Fishbein, M., & Ajzen, I. (1975). Belief, attitude, intention and behaviour: An introduction to theory and research. Reading, MA: Addison-Wesley.
Fiske, S. T., & Taylor, S. E. (1991). Social cognition (2nd ed.). New York: McGraw-Hill.
FIVA (1998a). FIPA 97 specification Part 2: Agent communication language, Version 2.0. Foundation for Intelligent Physical Agents. Retrieved from http://www.fipa.org
Flouris, G. (2006). On belief change and ontology evolution. Doctoral Dissertation, Department of Computer Science, University of Crete.
Flouris, G., & Plexousakis, D.G. (2006). Evolving ontology evolution, Invited Talk. In Proceedings of the 32nd International Conference on Current Trends in Theory and Practice of Computer Science (SOFSEM 06) (p. 7). Merin, Czech Republic.
Fluhrer, S.,Mantin, I., & Shamir, A. (2001). Weaknesses in the key scheduling algorithm of RC4. In S. Vaudenay & A. Youssef (Eds.), Selected areas in cryptography (pp. 1-24). Springer.
Fonsecal, S.P., Griss, M.L., & Letsinger, R. (2001). Agent behavior architectures, A MAS framework comparison (Tech. Rep.HPL-2001-332). Hewlett-Packard Laboratories.
Ford, B., Hibler, M., Lepreau, J., Mccgrath, R., & Tullmann, P. (1999). Interface and execution models in the Fluke kernel. Operating Systems Design and Implementation, 101-115.
Forrest, S., & Longstaff, T. A. (1996). A sense of self for Unix processes. IEEE Symposium on Research in Security and Privacy, 120-128.
Fortin, S., & Liu, L. (1996). An object-oriented approach to multilevel association rule mining. In Proceedings of the 5th International Conference on Information and Knowledge Management (pp. 65-72). New York: ACM Press.
Foskett, D.J. (1980). Thesaurus. In A. Kent & H. Lancour (Eds), Encyclopedia of library and information science (pp. 416-463).
Foster, I. (2002). What is the grid? A three point checklist. GRIDToday.
Foster, I., & Kesselman, C. (1998). The globus project: A status report. In Proceedings of the IPPS/SPDP ’98 Heterogeneous Computing Workshop, pp. 4-18.
Foster, I., & Kesselman, C. (2005). The Grid: Blueprint for a new computing infrastructure, Morgan Kaufmann Publisher.
Foster, I., Frey, J., Graham, S, & Tuecke, S. (2004). Modeling stateful resources with Web services, Version 1.1.
Foster, I., Geisler, J., et al. (1997). Software infrastructure for the I-WAY high performance distributed computing experiment. Proceedings of IEEE Symposium on High Performance Distributed Computing (pp. 562-571).
Foster, I., Jenning, M., & Kesselman, C. (2004). Brain meets brawn: Why grid and agents need each other. Proceedings of Autonomous Agents and Multi-Agent Systems.
Foster, I., Kesselman, C., & Nick, J.M. (2002). Grid services for distributed system integration. IEEE Computer, 35(6), 37-46.
Foster, I., Kesselman, C., & Tuecke, S. (2001). The anatomy of the grid. International Journal of Super-computer Applications, 15(3).
Foster, I., Kesselman, C., & Tuecke, S. (2002). The physiology of the grid: An open grid services architecture for distributed systems integration. Open Grid Service Infrastructure WG, Global Grid Forum.
Foster, I.,Kesselman, C.,Tsudik, G., & Tuecke, S. (1998). A security architecture for computational grids. In Proceedings of the Fifth ACM Conference on Computer and Communications Security Conference, pp. 83-92.
Foundation for Assistive Technology (FAST). (2004, April). Reporting on assistive technology in a rapidly changing world (pp. 11-14). Retrieved April 24, 2006, from http://www.fastuk.org/RAPID.pdf
Foundation for Intelligent Physical Agents. (2000). Agent Management specification. Retrieved from http://www.fipa.org/
Foundation for Intelligent Physical Agents. (2001). FIPA interaction protocol library, Retrieved from http://www.fipa.org/repository/ips.html
Fowler, M. (1997). Analysis patterns: reusable object models. Menlo Park, CA, Addison- Wesley.
Fowler, M. (2003). Patterns of enterprise application architecture. Addison-Wesley signature series. Boston, Addison-Wesley.
Fowler, M., & Scott, K. (2001). UML distilled (2nd ed.). Addison-Wesley.
Fox, D., Burgard, W., Dellaert, F., & Thrun, S. (1999). Monte Carlo localization: Efficient position estimation for mobile robots. In AAAI/IAAI, 343-349.
Fox, M.S., Barbuceanu, M., & Teigen, R. (2000). Agent-oriented supply chain management. The International Journal of Flexible Manufacturing Systems, 12, 165-188.
Franke, H.,Hochschild, P.,Pattnaik, P., & Snir, M. (1994) An efficient implementation of MPI. International Conference on Parallel Processing.
Frankel, D. S. (2003). Model-driven architecture: applying MDA to enterprise computing. New York, John Wiley & Sons.
Frankfort-Nachmias, C., & Nachmias, D. (1996). Research methods in the social sciences (5th ed.). New York: St. Martin’s Press.
Fraser, G., Steinbauer, G., & Wotawa, F. (2004). A modular architecture for a multi-purpose mobile robot. In Innovations in Applied Artificial Intelligence, IEA/AIE, vol 3029, Lecture notes in artificial intelligence (pp. 1007-1014). Ottawa, Canada: Springer.
Fraser, G., Steinbauer, G., & Wotawa, F. (2005). Plan execution in dynamic environments. Proceedings of the 18th Conference on Industrial and Engineering Applications of Artificial Intelligence and Expert Systems, IEA/AIE, vol 3533. Lecture notes in artificial intelligence (pp. 208-217). Bari, Italy: Springer.
Frazier, M.E.,Johnson, G.M.,Thomassen, D.G.,Oliver, C.E., & Patrinos, A. (2003a). Realizing the potential of genome revolution: The genomes to life program. Science, 300, 290-293.
Frazier, M.E.,Thomassen, D.G.,Patrinos, A.,Johnson, G.M.,Oliver, C. E., & Uberbacher, E. (2003b). Setting up the pace of discovery: The genomes to life program. In Proceedings of the 2nd IEEE Computer Society Bioinformatics Conference (CSB 2003). Stanford, CA: IEEE CS Press.
Freeman, H. (1961). On the encoding of arbitrary geometric configurations. IRE Trans. Electronic Computers, EC-10, 260-268.
Freitas, A.A. (1999). On rule interestingness measures. Knowledge-Based Systems, 12(5-6), 309-315.
Frolund, S., & Koistinen, J. (1998). QML: A language for quality of service specification (Tech. Rep. HPL-98-10). Hewlett Packard Laboratories.
F-Secure. (2004, December). The malware attack against mobile phones is mounting. Retrieved December 19, 2005, from http://www.f-secure.com/news/items/news_2004122200.shtml
F-Secure. (2005a). F-secure virus description database. Retrieved November 2005 from http://www.f-secure.com/v-descs/
F-Secure. (2005b). F-Secure virus description: P2P worm. Retrieved October 2005 from http://www.f-secure.com/v-descs/p2pworm.shtml
F-Secure.(2005c). F-Secure virus description: Worm. Retrieved October 2005 from http://www.f-secure.com/v-descs/worm.shtml
Fu, S., Atiquzzaman, M., Ma, L., & Lee, Y. (2005, November). Signaling cost and performance of SIGMA: A seamless handover scheme for data networks. Journal of Wireless Communications and Mobile Computing, 5(7), 825-845.
Fu, S., Ma, L., Atiquzzaman, M., & Lee, Y. (2005). Architecture and performance of SIGMA: A seamless mobility architecture for data networks. 40th IEEE International Conference on Communications (ICC), Seoul, Korea, May 16-20 (pp. 3249-3253). Institute of Electrical and Electronics Engineers Inc.
Fu, Y.,Sandhu, K., & Shih, M. (2000). A generalization-based approach to clustering of web usage sessions. In Proceedings of the 1999 KDD Workshop on Web Mining (Vol. 1836, pp. 21-38). San Diego, CA: Springer-Verlag.
Fulton, J. (2006). Saving users from themselves. EDPACS, 2006(33), 20-21.
Funk, J.L. (2005). The future of the mobile phone Internet: An analysis of technological trajectories and lead users in the Japanese market. Technology in Society, 27(1), 69-83.
Furnkranz, J. (1999). Exploring structural information for text classification on the WWW. In Intelligent data analysis (pp. 487-498).
Furtado, V., & Vasconcelos, E. (2004). Geosimulation in education: The ExpertCop system. Proceedings of Agent-based Simulation Workshop, SCS European Publisher, Lisbon, Portugal.
Gabrielian, A., & Franklin, M. (1988). State-based specification of complex real-time systems. Real-Time Systems Symposium, 2-11.
Gabrilovich, E., & Markovitch, S. (2005, August). Feature generation for text categorization using world knowledge. In Proceedings of the 19th International Joint Conference in Artificial Intelligence (pp. 1048-1053).
Gafni, E., & Bertsekas, D. (1981). Distributed algorithms for generating loop-free routes in networks with frequently changing topology. IEEE Transactions on Communications, 29(1), 11-18.
Gal, A.,Modica, G., & Jamil, H.M. (2004). OntoBuilder: Fully automatic extraction and consolidation of ontologies from Web sources. In Proceedings of the 20th International Conference on Data Engineering. IEEE Computer Society.
Galanxhi-Janaqi, H., & Nah, F.F.-H. (2004). U-commerce: Emerging trends and research issues. Industrial Management & Data Systems, 104(9), 744-755.
Galda, D., Rohling, H., Costa, E., Haas, H., & Schulz, E. (2002). A low complexity transmitter structure for the OFDM-FDMA uplink. Proc. IEEE VTC’02 Spring, Birmingham, Alabama, May (pp. 1024-1028). New York: IEEE.
Gallie, W. B. (1956). “Essentially Contested Concepts.” Proceedings of the Aristotelian Society 56:167-198.
Galperin, M.Y. (2006). The molecular biology database collection: 2006 update. Nucleic Acids Research, 34, D3-D5.
Galstyan, A., Czajkowski, K., & Lerman, K. (2004). Resource allocation in the grid using reinforcement learning. Proceedings of International Conference on Autonomous Agents and Multi-agent Systems.
Galves, F., & Galves, C. (2004). Ensuring the Admissibility of Electronic Forensic Evidence and Enhancing its Probative Value at Trial. Criminal Justice Magazine, 19. Retrieved March 18, 2006, from http://www.abanet.org/crimjust/cjmag/19-1/electronic.html
Gambetta, D. (2000). Can we trust trust? In D.Gambetta (Ed.), Trust: Making and breaking cooperative relation (Chapter 13, pp. 213-237). UK: Department of Sociology, University of Oxford.
Gamma, E. (1995). Design patterns: elements of reusable object-oriented software. Reading, MA, Addison-Wesley.
Gangemi, A.,Guarino, N.,Masolo, C.,Oltramari, A., & Schneider, L. (2002). Sweetening ontologies with DOLCE. In Proceedings of the International Conference on Knowledge Engineering and Knowledge Management (pp. 166-181).
Garavelli, J.S. (2003). The RESID database of protein modifications: 2003 developments. Nucleic Acids Research, 31, 499-501.
Garcia-Luna-Aceves, J.J., & Spohn, M. (1999). Sourcetree routing in wireless networks. Proceedings of the 7th Annual International Conference on Network Protocols (ICNP), Toronto, Canada, October 31-November 3 (pp. 273-282). ISBN 0-7695-0412-4. Los Alamitos, CA: IEEE Computer Society Press.
Garfield, L. (2004). Infosync: Reporting from the digital. Retrieved May 2007, from http://www.infosyncworld.com/news/n/5048.html
Garfinkel, S. L.,Margrave D.,Schiller, J. I.,Nordlander, E., & Miller, R. C. (2005, April 2-7). How to make secure e-mail easier to user. In Proceedings of the ACM Conference on Human Factors in Computing Systems, Portland, OR.
Gartner report. (2005). Maintaining data quality. Retrieved from http://www.ebizq.net/views/download_raw?meta-dataid=6210&what=feature
Gartner Study. (2004). Gartner study finds significant increase in e-mail phishing attacks. Retrieved January 17, 2006, from http://www.gartner.com/5_about/press_releases/asset_71087_11.jsp
Gartner. (2005). Smart phones are favoured as thin clients for mobile workers. Retrieved May 2007, from http://www.nokia.com/NOKIA_COM_1/About_Nokia/Press/White_Papers/pdf_files/Whitepaper_TheMyth-sofMobility.pdf
Garvey, T. D., & Lunt, T. F. (1991). Model based intrusion detection. National Computer Security Conference. 372-385.
Gauch, S.,Chaffee, J., & Pretschner, A. (2003). Ontology-based personalized search and browsing. Web Intelligence and Agent System, 1(3-4), 219-234.
Geer, D. (June 2005). Security technologies go phishing. IEEE Computer, 38(6), 18-21.
Gefen, D., Karahanna, E., & Straub, D.W. (2003). Trust and TAM in online shopping: an integrated model. MIS Quarterly, 27(1), 51-90.
Gehrmann, C., Persson, J., & Smeet, B. (2004). Bluetooth security. Norwood, MA: Artech House, Inc.
Geldof, M. (2004). The semantic grid: Will semantic Web and grid go hand in hand? Retrieved from http://www.semanticgrid.org/documents/Semantic%20Grid%20report%20public.pdf
Gelernter, D., & Carriero, N. (1992). Coordination languages and their significance. Communication ACM, 35, 96-107.
Gelfond, M., & Lifschitz, V. (1988). The stable model semantics for logic programming. In Kowalski R., & Bowen, K.(Eds.), Proceedings of the Fifth International Conference on Logic Programming (ICLP’88), 1070-1080.
Gelfond, M., & Lifschitz, V. (1991) Classical negation in logic programs and disjunctive databases. New Generation Computing, 9, 365-385.
Geller, J.,Scherl, R., & Perl, Y. (2002). Mining the Web for target marketing information. In Proceedings of the Collaborative Electronic Commerce Technology and Research (CollECTeR) Workshop. Toulouse, France.
Geller, J.,Zhou, X.,Prathipati, K.,Kanigiluppai, S., & Chen, X. (2005). Raising data for improved support in rule mining: How to raise and how far to raise. Intelligent Data Analysis, 9(4), 397-415.
Genesereth, M.R., & Ketchpel, S.P. (1994). Software agents. Communications of the ACM, 37(7), 48-53.
Georgakopoulos, D.,Hornick, M. F., & Sheth, A. P. (1995, April). An overview of workflow management: From process modeling to workflow automation infrastructure. Distributed and Parallel Databases 3(2), 119-153.
George GILDER, Telecosm, The Free Press, 2000
George, D.G.,Mewes, H-W., & Kihara, H. (1987). A standardized format for sequence data exchange. protein Seq. Data Anal., 1, 27-29.
George, D.G.,Orcutt, B.C.,Mewes, H.-W., & Tsugita, A. (1993). An object-oriented sequence database definition language (sddl). protein Seq. Data Anal., 5, 357-399.
Georgievski, M., & Sharda, N. (2005). Enhancing user experience for net worked multimedia systems. Proceedings of the 4th International Conference on Information Systems Technology and its Applications (ISTA2005), Massey University, Palmerston North, New Zealand, May 23-25 (pp. 73-84). Bonn: Lecture Notes in Informatics (LNI), Gesellschaft für Informatik (GI).
Georgievski, M., & Sharda, N. (2005). Implementation and usability of user interfaces for quality of service management. Tencon’05: Proceedings of the Annual technical Conference of IEEE Region 10, Australia, November 21-24. New Jersey: IEEE.
Gerkey, B.P., Vaughan, R.T., Stroy, K., Howard, A., Sukhatme, G.S., & Mataric, M.J. (2001). Most valuable player: A robot device server for distributed control. Proceedings of the IEEE/RSJ International Conference on Intelligent Robots and Systems (IROS 2001) (pp. 1226-1231).
Gerla, M., Hong, X., & Guangyu, P. (2000). Landmark routing for large ad hoc wireless networks. Proceedings of the IEEE Global Telecommunications Conference (GLOBECOM), 3, San Francisco, November 27-December 1 (pp. 1702-1706). New York: IEEE.
Gerla, M., Lee Y.-Z., Park, J.-S., & Yi, Y. (2005). On demand multicast routing with unidirectional links. IEEE Wireless Communications and Networking Conference, 4, 2162-2167.
Germain, M., & Ferrero, A. (2006). English translation Michéle Germain. Les réseaux particuliers – La sécurité des réseaux sans fil. In La Sécurité à l’usage des décideurs (pp. 154 to 166). Paris: © Editions tenor 2006.
Gerstheimer, O., & Lupp, C. (2004). Needs versus technology: The challenge to design third-generation mobile applications. Journal of Business Research, 57(12), 1409-1415.
Gervais, M.P., & Muscutariu, F. (2001). Towards an ADL for designing agent-based systems. Proceedings of 2nd International Workshop on Agent-Oriented Software Engineering (AOSE’01), Montreal, Canada. To appear in Lecture Notes in Computer Science, Springer Verlag
Ghafoor, A., Rehman, M.U., Abbas Khan, Z., Farooq Ahmad, H., & Ali, A. (2004). SAGE: Next Generation multi-agent system. Proceedings of IEEE International Conference on Parallel and Distributed Processing Techniques and Applications (PDPTA’04) (Vol. 1, pp. 139-145).
Ghanbari, M. (1989). Two-layer coding of video signals for VBR networks. IEEE Journal on Selected Areas in Communications, 7(5), 771-781.
Ghanbari, M. (1991). Subband coding algorithms for video applications: Videophone to HDTV-conferencing. IEEE Transactions on Circuits and Systems for Video Technology, 1(2), 174-183.
Ghanbari, M. (1999). Video coding: An introduction to standard codecs. IEE Telecommunications Series, 42.
Ghanbari, M., & Seferides, V. (1993). Cell-loss concealment in ATM video codecs. IEEE Transactions on Circuits and Systems for Video Technology, 3(3), 238-247.
Gibbs, C. (2000). TEEMA reference guide version 1.0. Regina, Saskatchewan, Canada: TRLabs.
Gibert, J. (2006). IT physician, heal thyself. http://www.bita-center.com
Gibson, J.J. (1979). The ecological approach to visual perception. Boston: Houghton Mifflin.
Gibson, W. (2003). Burning chrome. New York, HarperCollins.
Gilbert, D.T. (1991). How mental systems believe. American psychologist, 46, 107-119.
Gilbert, R.,Liu, Y., & Abriel, W. (2004).Reservoir modeling: integrating various data at appropriate scales. The Leading Edge, 23(8), 784-788.
Giles, P., & Galvin, T. (1996). Center of gravity: Determination, analysis, and application. Carlisle Barracks, PA: Center for Strategic Leadership.
Gilliland, A. (2006). Understanding the IM security threat. EDPACS, 2006(33), 1-7.
Girod, B., & Farber, N. (1999). Feedback-based error control for mobile video transmission. Proceedings of the IEEE: Special Issue on Video for Mobile Multi-media, 97(10), 1707-1723.
Girod, B., Aaron, A., Rane, S., & Rebollo-Monendero, D. (2005). Distributed video coding. Proceedings of the IEEE, 93(1), 71-83.
Giunchiglia, F., Mylopoulos, J., & Perini, A. (2002). The Tropos software development methodology: Processes, models and diagrams. Proceedings of AOSE Workshop (pp. 162-173). Retrieved from http://www.jamesodell.com/AOSE02-papers/aose02-23.pdf
Gladwell, M. (2006). Troublemakers. The New Yorker.
Glass, G. (1997). ObjectSpace voyager core package technical overview. ObjectSpace.
Glass, R. L. (1998). Software runaways. Professional Technical Reference. Upper Saddle River, NJ, Prentice Hall.
Glass, S., Hiller, T., Jacobs, S., & Perkins, C. (2000). Mobile IP authentication, authorization, and accounting requirements. IETF, RFC 2977. Retrieved May 8,2006, from http://www.ietf.org/rfc/rfc2977.txt
Globus Alliance (2005). Globus Toolkit 4. http://www.globus.org
Globus Alliance, IBM, & HP (2004). The WS-Resource framework. Retrieved May 10, 2006, from http://www.globus.org/wsrf/
Glover, E.,Tsioutsiouliklis, K.,Lawrence, S.,Pennock, M., & Flake, G. (2002). Using web structure for classifying and describing Web pages. In Proceedings of the 11th International World Wide Web (WWW) Conference.
Glykas, M., & Chytas, P. (2004). Technology assisted speech and language therapy. International Journal of Medical Informatics, 73, 529-541.
Goff, T., Moronski, J., Phatak, D.S., & Gupta, V. (2000). Freeze-TCP: A true end-to-end TCP enhancement mechanism for mobile environments. IEEE INFOCOM, Tel Aviv, Israel, March 26-30 (pp. 1537-1545). NY: IEEE.
Goldberg, H. (2004). “Unleashing the Power of Data.” DB2 Magazine 9(2). http://www.db2mag.com/story/showArticle.jhtml?articleID=18901174
Goldberger, J., & Greenspan, H. (2006). Context-based segmentation of image sequences. IEEE Transactions on Pattern Analysis and Machine Intelligence, 28(3), 463-468.
Gòmez-Pérez, A., & Rojas, M.D. (1999). Ontological reengineering and reuse. In D. Fensel & R. Studer (Ed.), European Workshop on Knowledge Acquisition, Modeling and Management (EKAW). Lecture Notes in Artificial Intelligence LNAI 1621 (pp. 139-156). Springer-Verlag.
Gòmez-Pérez, A.,Fernandez, M., & de Vicente, A.J. (1996). Towards a method to conceptualize domain ontologies. In Proceedings of the European Conference on Artificial Intelligence (ECAI’96) (pp. 41-52).
Gonzalez, L.V., Ge, Y., & Lamont, L. (2005). HOLSR: A hierarchical proactive routing mechanism for mobile ad hoc networks. IEEE Communication Magazine, 43(7), 118-125.
Gonzalez-Castano, F.J., & Garcia-Reinoso, J. (2002). Bluetooth location networks. IEEE Global Telecommunications Conference (GlobeComm) 2002, Taipei, Taiwan, November 17-21 (pp. 233-237). New York: IEEE.
Goodman, J., Dickinson, A., & Syme, A. (2004). Gathering requirements for mobile devices using focus groups with older people. Designing a More Inclusive World, Proceedings of the 2nd Cambridge Workshop on Universal Access and Assistive Technology (CWUAAT), Cambridge, UK, March. Retrieved April 24,2006, from http://www.computing.dundee.ac.uk/projects/UTOPIA/publications/navigation_workshop.pdf
Gopalakrishna, R.,Spafford, E. H., & Vitek, J. (2005). Efficient Intrusion detection using automaton inlining. In Proceedings of the 2005 IEEE Symposium on Security and Privacy (S&P ’05). Los Alamitos, CA: IEEE Computer Society Press.
Gordon, A.D. (1981). Classification: Methods for the exploratory analysis of multivariate data. London: Chapman & Hall.
Gordon, D. (1996). The organization of work in social insect colonies. Nature, 380, 121-124.
Gordon, M.J. C. (1979). The denotational description of programming languages: An introduction. Springer-Verlag.
Gordon, S. (2006). Fighting spyware and adware in the enterprise. EDPACS, 2006(33), 14-18.
Gornik, D. (2000). Data modeling for data warehouses. A rational software white paper. Rational E-development Company.
Goth, G. (2005, January). Phishing attacks rising, but dollar losses down. IEEE Security & Privacy Magazine, 3(1), 8.
Gotzhein, R. (1992). Temporal logic and application: A tutorial. Computer Networks and ISDN Systems, 24, 203-218.
Gouy, M.,Gautier, C.,Attimonelli, M.,Lanave, C., & Di Paola, G. (1985). ACNUC: A portable retrieval system for nucleic acid sequence databases: Logical and physical designs and usage. Computer Applications in the Biosciences, 1, 167-172.
Govaert, G. (1977). Algorithme de classification d’un tableau de contingence. In Proceedings of first international symposium on Data Analysis and Informatics (pp. 487-500). INRIA, Versailles.
Govaert, G., & Nadif, M. (2003). Clustering with block mixture models. Pattern recognition. Elservier Science Publishers, 36, 463-473.
Grami, A., & Schell, B. H. (2005). Future trends in mobile commerce: Service offerings, technological advances and security challenges. Retrieved January 15, 2005, from http://dev.hil.unb.ca/Texts/PST/pdf/grami.pdf
Grance, T. (2004). Computer security incident handling guide (Special Publication 800-61). U.S. Department of Commerce, National Institute of Standards.
Grance, T.,Hash, H., & Stevens, M. (2004). Security considerations in the information development life cycle (NIST Special Publication 800-64 Rev.l). National Institute of Standards and Technology.
Gray, R., Kotz, D., Nog, S., Rus, D., & Cybenko, G. (1997). Mobile agents: The next generation in distributed computing. Proceedings of the Second Aizu International Symposium on Parallel Algorithms and Architectures Synthesis (pp. 8-24). Retrieved November 15, 2002, from Institute of Electrical and Electronics Engineers Digital Library Database.
Greenberg, M., Byington, J., & Harper, D. (1998). Mobile agents and security. IEEE Communications Magazine, 36(7).
Greenspan, A. (2005). Economic flexibility. Speech before the National Italian American Foundation, Washington, DC.
Greenspan, H., Goldberger, J., & Mayer, A. (2004). Probabilistic space-time video modeling via piecewise GMM. IEEE Transactions on Pattern Analysis and Machine Intelligence, 26(3), 384-396.
Greenwald, A., Hall, K., & Serrano, R. (2003). Correlatedq learning. In T. Fawcett and N.Mishra (Eds.), Proceedings of the 20th International Conference on Machine Learning (pp. 242-249). Washington, DC: American Association for Artificial Intelligence Press.
Grefenstette, G. (1992). Use of syntactic context to produce term association lists for retrieval. In Proceedings of the Conference on Research and Development in Information Retrieval (SIGIR) (pp. 89-97).
Grifin, P. (2002). Security flaws shut down Telecom’s mobile email. New Zealand Herald, April 28.
Grimson, J., Grimson, W., & Hasselbring, W. (2000). The SI challenge in health care. Communications of the Association for Computing Machinery, 43(6), 49-55. Retrieved May 27, 2003, from Association for Computing Machinery Digital Library Database.
Gross, J., Karl, H., Fitzek, F., & Wolisz, A. (2003). Comparison of heuristic and optimal subcarrier assignment algorithms. Proc. of Intl. Conf. on Wireless Networks (ICWN), Las Vegas, Nevada (pp. 249-255). Las Vegas: CSREA Press.
Grosso, W., Eriksson, H., Fergerson, R., Gennari, J., Tu, S., & Musen, M. (1999, October 16-21). Knowledge modeling at the millennium, The design and evolution of protégé-2000. Proceedings of the 12th Workshop on Knowledge Acquisition, Modeling and Management, Banff, Alberta, Canada.
Gruber, T. (1993). Toward principles for the design of ontologies used for knowledge sharing. In N. Guarino & R. Poli, (Eds.), International Journal of Human-Computer Studies, special issue on Formal Ontology in Conceptual Analysis and Knowledge Representation, LADSEB-CNR Int. Rep. ACM.
Gruber, T. R. (1993). A translation approach to portable ontologies. Knowledge Acquisition, 5(2), 199-220.
Gruber, T. R. (1993). Towards principles for the design of ontologies used for knowledge sharing. Formal ontology in conceptual analysis and knowledge representation. International Journal of Human-Computer Studies, 43, 907-928.
Grundström, C., & Wilkinson, I.F. (2004). The role of personal networks in the development of industry standards: A case study of 3 G mobile telephony. Journal of Business and Industrial Marketing, 19(4), 283-293.
Grüninger, M., & Fox, M.S. (1995). Methodology for the design and evaluation of ontologies. IJCAI’95 Workshop on Basic Ontological Issues in Knowledge Sharing, Montreal, Canada.
Gschwind, T., Feridun, M., & Pleisch, S. (1999). ADK: Building mobile agents for network and systems management from reusable components. Proceedings of the Joint Symposium on Agent Systems and Applications/Mobile Agents (ASA/MA’99), Palm Springs, CA.
GSM Security Portal. (2005). Retrieved July 11, 2005, from http://www.gsm-security.net/
GSM Security Portal. (2006). Retrieved February 5, 2006, from http://www.gsm-security.net/
Guan, S., & Zhu, F. (2004). Ontology acquisition and exchange of evolutionary product-brokering agents. Journal of Research and Practice in Information Technology, 36(1), 35-45.
Guangyu, P., Geria, M., & Hong, X. (2000). LANMAR: Landmark routing for large scale wireless ad hoc networks with group mobility. Proceedings of the 1st Annual Workshop on Mobile and Ad Hoc Networking and Computing (MobiHoc), Boston, MA, August 11 (pp. 11-18). Piscataway, NJ: IEEE Press.
Guarino, N. (1998). Formal Ontology in Information Systems. Guarino (Ed.), First International Conference on For-mal Ontology in Information Systems (pp. 3-15). Italy.
Guarino, N., & Giaretta, P. (1995). Ontologies and knowledge bases: Towards a terminological clarification. In N. Mars (Ed.), Towards very large knowledge bases: Knowledge building and knowledge sharing (pp. 25-32). Amsterdam: IOS Press.
Guarino, N.,Carrara, M., & Giaretta, P. (1994). Formalizing ontological commitments. In Proceedings of the AAAI Conference.
Guessoum, Z., & Briot, J.P. (1999). From active objects to autonomous agents. IEEE Concurrency, 7(3), 68-76.
Guha, S.,Rastogi, R., & Shim, K. (1999b). CURE: An efficient algorithm for clustering large databases. In Proceedings of ACM-SIGMOD International Conference on Management of Data.
Guidance Software, Inc. (2005). EnCase Forensic Version 5. Retrieved July 8, 2005, from http://www.guidancesoftware.com/products/ef_index.asp
Gunes, M., Sorges, U., & Bouazizi, I. (2002). ARA: The ant-colony based routing algorithm for MANETs. Proceedings of the International Conference on Parallel Processing (ICPP) Workshops, Vancouver, Canada, August 18-21 (pp. 79-85). Washington, DC: IEEE Computer Society.
Gupta, M. (2002). Building a virtual private network. Premier Press.
Gupte, S., & Singhal, M. (2003). Secure routing in mobile wireless ad hoc networks. Ad Hoc Networks, 1(1), 151-174.
Guttman, E., Perkins, C., Veizades, J., & Day, M. (1999). RFC 2608: Service location protocol, Version 2. Retrieved April 27, 2006, from http://www.ietf.org/rfc/rfc2608.txt
Gyssens, M.,Paredaens, P. & Gucht, D. (1990). A graph-oriented object database model. In Proceedings of the 9th ACMSIGACT-SIGMOD-SIGART symposium on Principles of database systems. Nashville, TN: ACM Press.
H’otter, M. (1990). Object-oriented analysis-synthesis coding based on moving two-dimensional objects. Signal Processing, 2, 409-428.
Haas, Z.J. (1997). A new routing protocol for the reconfigurable wireless networks. Proceedings of the 6th IEEE International Conference on Universal Personal Communications (ICUPC), 2, San Diego, October 12-16 (pp. 562-566). IEEE Computer Society.
Haas, Z.J., & Pearlman, M.R. (1998). The performance of a new routing protocol for the reconfigurable wireless networks. Proceedings of the IEEE International Conference on Communications (ICC), 1, Atlanta, Georgia, June 7-11 (pp. 156-160). New York: IEEE.
Haav, H.M., & Lubi, T.L. (2001). A survey of concept-based information retrieval tools on the web. In Proceedings of the 5th East-European Conference ADBIS (Vol. 2, pp. 29-41).
Habra, J.,Charlier, B. L.,Mounji, A.., & Mathieu, I. (1992). ASAX: Software architecture and rule-based language for universal audit trail analysis. European Symposium on Research in Computer Security, 648, 435-450.
Hackett, S. (2001). Agile com munication: m.Net Australia consortium wins federal funding for 3 G/WLL test bed and applications development environment. Retrieved May 2007, from http://www.agile.com.au/press/press-29-05-2001.htm
Hadzic, F.,Dillon, T.S.,Sidhu, A.S.,Chang, E., & Tan, H. (2006). Mining substructures in protein data. 2006 IEEE Workshop on Data Mining in Bioinformatics (DMB 2006) in conjunction with 6th IEEE ICDM 2006. Hong Kong: IEEE CS Press.
Hadzic, M., & Chang, E. (2005). Ontology-based support for human disease study. In Proceedings of the 38th Hawaii International Conference on System Sciences.
Hafner, C.D. & Fridman, N. (1996). Ontological foundations for biology knowledge models. In Proceedings of the 4th International Conference on Intelligent Systems for Molecular Biology. St. Louis: AAAI.
Hagan, M.T., Demuth, H.B., & Beale, M. (1995). Neural network design. Boston: PWS Publishing Company.
Hahn, U., & Schulz, S. (2004) Building a very large ontology from medical thesauri. In S. Staab & R. Stuber (Eds.), Handbook on ontologies (pp. 133-150).
Halpin, T. A. (2001). Information modeling and relational databases: from conceptual analysis to logical design. San Francisco, Morgan Kaufman.
Halsall, F. (2001). Multimedia communications: Applications, networks, protocols and standards. Harlow, England; NY: Addision-Wesley.
Hammer, M. (2005). “CIO Evolution.” CIO Magazine (August 1, 2005).
Hammond, K. (2001). B2C e-commerce 2000-2010: What experts predict. Business Strategy Review, 12(1), 43-50.
Han, J. (1995). Mining knowledge at multiple concept levels. In Proceedings of the 4th International Conference on Information and Knowledge Management (pp. 19-24). New York: ACM Press.
Han, J., & Fu, Y. (1995). Discovery of multiple-level association rules from large databases. In Proceedings of the 21st International Conference on Very Large Data Bases (pp. 420-431). Zurich, Switzerland.
Han, J., & Fu, Y. (1995). Discovery of multiple-level associa-tion rules from large databases. In U. Dayal, P.M.D. Gray, & S. Nishio (Eds.), International Conference on Very Large Data Bases (pp. 420-431). Zurich: Morgan-Kaufmann.
Han, J., & Kamber, M. (2001). Data mining: Concepts and techniques. San Francisco: Morgan Kaufmann.
Han, J.,Koperski, K., & Stefanvic, N. (1997). GeoMiner: a system prototype for spatial datamining. In J. Peckham (Ed.), ACMSIGMOD International Conference on Management of Data, 26 (pp. 553-556). Tucson: ACM Press.
Han, J.,Pei J., & Yin, Y. (2000). Mining frequent patterns without candidate generation. In J.Chen, F. Naughton, & P.A. Bernstein (Eds.), 20th ACMSIGMOD International Conference on Management of Data (pp. 1-12) Dallas: ACM.
Han, J.,Pei, J.,Yin, Y., & Mao, R. (2004). Mining frequent patterns without candidate generation: A frequent-pattern tree approach. Data Mining and Knowledge Discovery, 8(1), 53-87.
Hankin, C., Mètayer, D.L., & Sands, D. (1992). A calculus of GAMMA programs. Springer-Verlag.
Hantz, F., & Guyennet, H. (2005). HiPoP: Highly distributed platform of computing. In Proceedingss of the IEEE Joint Internationa Conference on Autonomic and Autonomous Systems (ICAS’05) and International Conference on Networking and Services (ICNS’05). Tahiti, French Polynesia.
Hantz, F., & Guyennet, H. (2006). A P2P Platform using sandboxing. WSHPCS (Workshop on Security and High Performance Computing Systems) in conjunction with the 20th European Conference on Modelling and Simulation (ECMS 2006), Bonn, Germany, pp. 736-739.
Hanzo, L. et al. (2003). OFDM and MC-CDMA for broadband multi-user communications, WLANs and broadcasting. New York: Wiley.
Hanzo, L., & Streit, J. (1995, August). Adaptive low-rate wireless videophone schemes. IEEE Trans. Circuits Syst. Video Technol., 5(4), 305-318.
Haque, M., & Ahamed, S. (2006). Security in pervasive computing: Current status and open issues. International Journal of Network Security, 3(3), 203-214.
Harel, D., & Pnueli, A. (1985). On the development of reactive systems. In K.R.Apt (Ed.), Logics and models of concurrent systems (pp. 477-498). Springer-Verlag.
Harman, D. (1992). The DARPA TIPSTER project. SIGIR Forum, 26(2), 26-28.
Harmelen, F.V.,Patel-Schneider, RE, & Horrocks, I. (2001). Reference Description of the DAML+ OIL Ontology Markup Langauge. Retrieved from http://www.daml.org/2001/03/daml+oil-index.html
Harmon, M., & Harmon, S. (1996). Reinforcement learning: A tutorial.
Harmon, P. (2003). Business process change: a manager’s guide to improving, redesigning, and automating processes. Amsterdam, Elsevier.
Harris, C. (2004). Progressing from paper towards technology. Communication Matters, 18(2), 33-37.
Hart, J., & Hannan, M. (2004). The future of mobile technology and mobile wireless computing. Campus-Wide Information Systems, 21(5), 201-204.
Harvey, W.D., & Ginsberg, M.L. (1995). Limited discrepancy search. Proceedings of the 14th International Joint Conference on Artificial Intelligence (IJCAI-95) (pp. 607-613).
Haskell, B.G., Mounts, F.W., & Candy, J.C. (1972). Interframe coding of videotelephone pictures. Proceedings of the IEEE, 60(7), 792-800.
Hasso PLATTNER, Anticipating Change, Secrets Behind the SAP Empire, Prima Tech, 2000
Havinga, P.J.M. (2000). Mobile multimedia systems. Ph.D. thesis, University of Twente, Netherlands, ISBN 90-365-1406-1.
Hay, D. C. (1996). Data model patterns: conventions of thought. New York, Dorset House.
Hay, D. C. (2006). Data model patterns: a metadata map. Morgan Kaufmann series in data management systems. Amsterdam, Morgan Kaufman.
Haykin, S. (1994). Neural networks: A comprehensive foundation. Macmillan College Publishing.
Hearst, M.A. (1992). Automatic acquisition of hyponyms from large text corpora. In Proceedings of the 14th International Conference on Computational Linguistics.
Heath, C. (2006). Symbian OS platform security: Software development using the Symbian OS security architecture. England: Wiley.
Hedeman, B., H. Frederiksz, et al. (2005). Project management based on Prince2: an introduction. The Netherlands, Van Haren.
Heeks, R. (2000). Information technology, information systems and public sector accountability. In C. Avgerou & G. Walsham (Eds.), Information technology in context (pp. 201-220). Aldershot, Hampshire: Ashgate.
Heffner, R. (2005). Does SOA make applications obsolete? Forrester Research.
Heine, C., Herrier, R., & Kirn, S. (2005). ADAPT@AGENT.HOSPITAL: Agent-based optimization and management of clinical processes. International Journal of Intelligent Information Technologies, 1(1). Retrieved July 10, 2006, from http://wi2.uni-hohenheim.de/team/documents/public/heine/%5BHeHK2005%5D.pdf
Hellendoorn, H., & Thomas, C. (1993). Defuzzification in fuzzy controllers. Journal of Intelligent and Fuzzy Systems, 1(2), 109-123.
Helsinki University of Technology. (2006). InfraHIP project portal. Retrieved May 10, 2006, from http://infrahip.hiit.fi
Henderson, J. C., and N. Venkatraman (1993). “Strategic Alignment: Leveraging Information Technology for Transforming Organizations.” IBM Systems Journal 32(1): 4-16.
Henning, M., & Vinoski, S. (1999). Advanced CORBA©Programming with C++ (1st ed.). Addison Wesley Professional.
Heracleous, L., & Barrett, M. (2001). Organizational change as discourse: Communicative actions and deep structures in the context of information technology implementation. Academy of Management Journal, 44, 755-778.
Hernandez, F., Gray, J., & Reilly, K. (2003). A multi-level technique for modeling agent-based systems. Proceedings of 2nd International Workshop on Agent-Oriented Methodologies (OOPSLA-2003) (pp. 33-42).
Hernandez, G., El Fallah-Seghrouchni, A., & Soldano, H. (2004, January 6-7). Learning in BDI multi-agent systems. Proceedings of 4th International Workshop on Computational Logic in Multi-Agent Systems (CLIMA IV), Florida.
Hernandez, N.,Mothe, J., & Poulain, S. (2005). Accessing and mining scientific domains using ontologies: The OntoExplo System. In Proceedings of the 28th Annual International ACM SIGIR (pp. 607-608).
Hertroys, P., and B. van Rooijen (2002). “Information technology process model.” The guide to IT service management. J. van Bon, ed. London, Addison-Wesley: 151-157.
Hewitt, C. (1977). Viewing control structures as patterns of passing messages. Artificial Intelligence, 8(3), 323-364.
Hewitt, C.,Bishop, P., & Steiger, R. (1973). A universal modular ACTOR formalism for artificial intelligence. International Joint Conference on Artificial Intelligence, 235-245.
Heymann, T. (2005). Outsourcing in Deutschland – eine Bestandsaufnahmezur Vertragsgestaltung. DieGrundtypen des Outourcing und ihre Konsequenzen für die Vertrags-gestaltung. Computer und Recht, 10, 706-710.
Hickey, R. A. (2005, November). Loss, theft still no. I threat to mobile data. Retrieved December 17, 2005, from “http://searchmobilecomputing.techtarget.com/originalContent/0,289142,sid40_gcill43983,00.html
Hicks, S. (2005). Mobile and malicious. Retrieved December 17, 2005, from http://www.ciostrategycenter.com/darwin/Threat/threat_strategies/mobile_malicious/
Higaki, H., & Umeshima, S. (2004). Multiple-route adhoc on-demand distance vector (MRAODV) routing protocol. Proceedings of the 18th International Parallel and Distributed Processing Symposium (IPDPS), Santa Fe, New Mexico, April 26-30. New York: IEEE.
Hildebrandt, M., & Backhouse, J. (2005). D7.2: Descriptive analysis and inventory of profiling practices. FIDIS Future of Identity in the Information Society.
Hill, F. (n.d.). JESS- Java expert system shell. Retrieved from http://herzberg.ca.sandia.gov/jess
Hinton, G.E., & Sejnowski, T.S. (1986). Learning and relearning in boltzmann machines. In D.E.Rumerhart, J.L.Mclelland, and the PDP Research Group (Eds.). Parallel distributed processing (pp. 282-317). Cambridge, MA: MIT Press.
Hoanca, B. (2006, Spring). How good are our weapons in the spam wars? A systems analysis of spam fighting techniques. IEEE Technology and Society Magazine, 25(1), 22-30.
Hoanca, B., & Mock, K. (2005, June 20-24). Screen oriented technique for reducing the incidence of shoulder surfing. Paper presented at Security and Management (SAM’05), Las Vegas, NV.
Hoefelmeyer, R. (2004). Malicious code: The threat, detection and protection. In H. F.Tipton & N. Krause (Eds.), Information security management handbook. Raton, FL: CRC Press.
Hofe, H.M. (1997). ConPlan/SIEDAplan: Personnel assignment as a problem of hierarchical constraint satisfaction. Proceedings of the 3rd International Conference on Practical Applications of Constraint Technologies (pp. 257-272).
Hoffer, J.A,Presscot, M.B., & McFadden, F.R. (2005). Modern database management (6th ed.). Prentice Hall.
Hofmann, P. (1996). MHEG-5 and MHEG-6: Multimedia standards for minimal resource systems (Tech. Rep.). Berlin, Germany: Technische Universitat Berlin.
Hogganvik, I., & Stølen, K. (2005). On the comprehension of security risk scenarios. In Proceedings of the 13th International Workshop on Program Comprehension (IWPC 2005), 115-124.
Hohl, F. (1998). A model of attack of malicious hosts against mobile agents. In Object-Oriented Technology, ECOOP’98 Workshop Reader/Proceedings of the 4th Workshop on Mobile Object Systems (MOS’98): Secure Internet Mobile Computations (LNCS 1543). Brussels, Belgium: Springer-Verlag.
Hohpe, G., and B. Woolf (2003). Enterprise integration patterns: designing, building, and deploying messaging solutions. Boston, Addison-Wesley.
Hong, J. I. (2005, December). Minimizing security risks in ubicomp systems. Computer, 118-119.
Hong, X., Xu, K., & Gerla, M. (2002). Scalable routing protocols for mobile ad hoc networks. Kluwer Wireless Networks, 16(4), 11-21.
Honkela, T.,Kaski S.,Lagus, K., & Kohonen, T. (1997, June). WEBSOM: Self-organizing maps of document collections. In Proceedings of WSOM’97, Workshop on Self-Organizing Maps. Helsinki University of Technology, Neural Networks Research Centre, Espoo, Finland.
Hopper, N., & Blum, M. (2000). A secure human-computer authentication scheme (CMUTech. Rep. CMU-CS-00-139). Retrieved October 5, 2005, from http://reports-archive.adm.cs.cmu.edu/anon/2000/CMU-CS-00-139.pdf
Hori, M., & Ohashi, M. (2005). Applying XML web services into health care management. In Proceedings of the 38th Hawaii International Conference on System Sciences.
Hornick, F. M., et al. (2005). Java data mining 2.0. Retrieved June 20, 2006, from http://jcp.org/aboutJava/community-process/edr/jsr247/
Horrocks, I., & Patel-Schneider, P.F. (2003). Three theses of representation in the Semantic Qeb. In Proceedings of the Twelfth International Conference on World Wide Web.
Horrocks, I.,Patel-Schneider, P. F.,Boley, H.,Tabet, S.,Grosof, B., & Dean, M. (2004). SWRL: A Semantic Web rule language combining OWL and RuleML. W3C Member Submission. Retrieved May 10, 2006, from http://www.w3.org/Submission/2004/SUBM-SWRL-20040521
Horton, R.P., Buck, T., Waterson, P.E., & Clegg, C. W. (2001). Explaining intranet use with the technology acceptance model. Journal of Information Technology, 16, 237-249.
Hosein, I. (2005). Researching the ethics of knowledge management: The case of data-mining. (Working paper). London School of Economics.
Hotho, A.,Maedche, A., & Staab, S. (2001, August). Ontology-based text clustering. In Proceedings of the IJCAI–2001 Workshop of Text Learning, Beyond Supervision. Seattle, USA.
Hotho, A.,Maedche, A.,Staab, S., & Zacharias, V. (2002, April 26-27). On knowledgeable unsupervised text mining. In Proceedings of the DaimlerChrysler Workshop on Text Mining, Ulm.
Hou, T.-C., & Li, V. (1986). Transmission range control in multihop packet radio networks. IEEE Transactions on Communications, 34(1), 38-44.
Housley, R., & Arbaugh, W. (2003). Security problems in 802.11-based networks. Communications of the ACM, 46(5).
Hsia, T.C. (1977). System identification: Least square methods. D.C.Heath and Company.
Hu, J., & Wellman, M. (1998). Multiagent reinforcement learning: theoretical framework and an algorithm. In J. Shavlik (Ed.), Proceedings of the 15th International Conference on Machine Learning (pp. 242-250). Madison, WI: Morgan Kaufmann Publishers.
Hu, J., & Wellman, M. (2003). Nash q-learning for general-sum stochastic games. Journal of Machine Learning Research, 4(11), 1039-1069.
Hu, Y.-C., & Johnson, D. (2000). Caching strategies in ondemand routing protocols for wireless ad hoc networks. Proceedings of the 6th International Conference on Mobile Computing and Networking (MobiCom), Boston, MA, August 6-11 (pp. 231-242). ISBN 1-58113-197-6. New York: ACM Press.
Hu, Y.-C., & Johnson, D. (2001). Implicit source routes for on-demand ad hoc network routing. Proceedings of the 2nd ACM International Symposium on Mobile Ad Hoc Networking and Computing (MobiHoc), Long Beach, CA, October 4-5 (pp. 1-10). ISBN 1-58113-428-2. New York: ACM Press.
Hu, Y.-C., Johnson, D.B., & Perrig, A. (2002). SEAD: Secure efficient distance vector routing for mobile wireless ad hoc networks. Proceedings of the 4th IEEE Workshop on Mobile Computing Systems and Applications (WMCSA), Callicoon, NY, June 20-21 (pp. 3-13). ISBN 0-7695-1647-5. IEEE.
Hu, Y.-C., Perrig, A., & Johnson, D.B. (2002). Ariadne: A secure on-demand routing protocol for ad-hoc networks. Proceedings of the 8th Annual International Conference on Mobile Computing and Networking (MobiCom), Atlanta, Georgia, September 23-28 (pp. 12-23). ISBN 1-58113-486-X. ACM Press.
Hu, Y.-C., Perrig, A., & Johnson, D.B. (2003). Packet leashes: A defense against wormhole attacks in wireless ad hoc networks. Proceedings of the 22nd IEEE Computer and Communications Societies (InfoCom), San Francisco, CA, April 1-3 (pp. 1976-86). IEEE.
Huang, C.C.,Chuang, S.L., & Chien, L.K. (2004). LiveClassifier: Creating hierarchical text classifiers through web corpora. In Proceedings of the 13th International World Wide Web (WWW) Conference (pp. 184-192).
Huang, Y.,Shekhar, S., & Xiong, H. (2004). Discovering colocation patterns from spatial datasets: A general approach. IEEE Transactions on Knowledge and Data Engineering, 16(12), 1472-1485.
Huang, Z. (1997). A fast clustering algorithm to cluster very large categorical data sets in data mining. In Proceedings of SIGMOD Workshop on Research Issues on Data Mining and Knowledge Discovery.
Hui, S.Y., & Yeung, K.H. (2003). Challenges in the migration to 4 G mobile systems. IEEE Communication Magazine, 41(12), 54-59.
Humby, C.,Hunt, T., & Phillips, T. (2003). Scoring points: How tesco is winning customer loyalty. London: Kogan Page.
Humphrey, W. S. (1989). Managing the software process. Reading, MA, Addison-Wesley.
Hung, S.-Y., Ku, C.-Y., & Chang, C.-M. (2003). Critical factors of WAP services adoption: An empirical study. Electronic Commerce Research and Applications, 2(1), 42-60.
Hunsberger, L., & Grosz, B.J. (2000). A combinatorial auction for collaborative planning. Proceedings of the 4th International Conference on Multi-Agent Systems (ICMAS2000) (pp. 151-158).
Hussein, M., & Zulkernine, M. (2006). UML intr: A UML profile for specifying intrusions. IEEE International Conference and Workshop on the Engineering of Computer-Based Systems. 279-286.
Huston, D.C.,Hunter, H., & Johnson, E. (2003). Geostatistical integration of velocity cube and log data to constrain 3D gravity modeling, Deepwater Gulf of Mexico. The Leading Edge, 23(4), 842-846.
Huston, T. (2001). Security issues for implementation of e-medical records. Communications of the Association for Computing Machinery, 44(9), 89-94. Retrieved January 9, 2005, from Association for Computing Machinery Digital Library Database.
HUT. Retrieved June 1, 2005, from http://www.cs.hut.fi/research/dynamics/
Hwu, J.-S., Chen, R.-J., & Lin, Y.-B. (2006). An efficient identity-based cryptosystem for end-to-end mobile security. IEEE Transaction on Wireless Communications, 5(9), 2586-2593.
I Am Not A Geek. (2005). Spyware removal guides. October 2005 http://www.iamnotageek.eom/a/spyware.php
IAIK. (2005). AES lounge. Retrieved from http://www.iaik.tugraz.ac.at/research/krypto/AES/
IBM Corporation (1980). A management system for the information business. White Plains, NY, International Business Machines.
IBM Corporation (2005). An architectural blueprint for autonomic computing, 3rd edition. White Plains, NY, International Business Machines.
IBM Report. (2006). IBM Report: Surge in CRIMINAL-DRIVEN CYBER ATTACKS Anticipated in 2006. Retrieved January 26, 2006, from http://www-03.ibm.com/press/us/en/pressrelease/19141.wss
IBM Software. (n.d.). IBM Lotus Notes. Retrieved April 27, 2006, from http://www.lotus.com/products/product4.nsf/wdocs/noteshomepage
IEC 61025. (1990). Fault tree analysis (FTA). International Electrotechnical Commission.
IFC. (2005). IFC: Universal mobile telecommunications system (UMTS) proto. Retrieved May 2007, from http://www.iec.org/online/tutorials/umts/topic01.html
Igbaria, M., Parasuraman, S., & Baroudi, J.J. (1996). A motivational model of microcomputer usage. Journal of Management Information Systems, 13(1), 127-143.
Ilgun, K. (1993). USTAT: A real-time intrusion detection system for Unix. IEEE Symposium on Security and Privacy, 16-28.
Ilgun, K., Kemmerer, R.A., & Porras, P.A. (1995). State transition analysis: A rule-based intrusion detection approach. IEEE Transactions on Software Engineering, 21(3), 181-199.
Illgner, R., & Lappe, D. (1995). Mobile multimedia communications in a universal telecommunications network. Proc. SPIE Conf. Visual Communication Image Processing, Taipei, Taiwan, May 23-26 (pp. 1034-1043). USA: SPIE.
INDICARE. (2004). The Informed dialogue about consumer acceptability of DRM solutions in Europe. Retrieved January 26, 2006, from http://www.indicare.org/
Information Systems and Information Technology Solutions, (n.d.). Sao Paolo University report. Retrieved June 10, 2006, from http://www.virtual.epm.br/material/health-care/B01.pdf
Ingber, L. (1989). Very fast simulated re-annealing. Mathematical and Computer Modeling, 12(8), 967-973.
Institute of Electrical and Electronics Engineers (2005). Guide to the software engineering body of knowledge: 2004 version. Los Alamitos, CA, IEEE Computer Society Press.
Intel. (2004). Intel wireless trusted platform: Security for mobile devices. White Paper. Retrieved September 26, 2007, from http://whitepapers.zdnet.co.uk/0,1000000651,260091578p,00.htm
Intertrust. (2004). Octopus principles of operation (Internal memo).
Intertrust. (2005). Reference technology. Retrieved January 26, 2006, from http://www.intertrust.com/main/research/reference.html
Intoto Inc. (2005), iGateway SSL-VPN. Retrieved January 21, 2006, from http://www.intoto.com/product_briefs/iGateway%20SSL%20VPN.pdf
Intoto Inc. (2005). iGateway SSL-VPN. Retrieved July 9, 2005, from http://www.intoto.com/product_briefs/iGateway%20SSL%20VPN.pdf
IPG project (1998). Retrieved from http://www.ipg.nasa.gov/
IS017799. (2000). Code of practice for information security management. International Organization for Standardization.
Ishii, K. (2004). Internet use via mobile phone in Japan. Telecommunications Policy, 28(1), 43-58.
Islam, M.M., Pose, R., & Kopp, C. (2004). A link layer security protocol for suburban ad-hoc networks. Australian Telecommunication Networks and Applications Conference (ATNAC), Sydney, Australia, December 8-10 (pp. 174-177). Australia.
Islam, M.M., Pose, R., & Kopp, C. (2005). An intrusion detection system for suburban ad-hoc networks. IEEE Tencon, Melbourne, Australia, November 12-14. ISBN: 0-7803-9312-0. IEEE Press.
Islam, M.M., Pose, R., & Kopp, C. (2005). Challenges and a solution to support QoS for real-time traffic in multihop ad-hoc networks. Proceedings of the 2nd IEEE and IFIP International Conference on Wireless and Optical Communications Networks (WOCN), Dubai, UAE, March 6-8. ISBN 0-7803-9019-9. New York: IEEE.
Islam, M.M., Pose, R., & Kopp, C. (2005). Link layer security for SAHN protocols. 3rd IEEE PerCom Workshops on PWN, Kauai Island, Hawaii, March 8-12 (pp. 279-283). IEEE Computer Society.
Islam, M.M., Pose, R., & Kopp, C. (2005). MAC layer support for real-time traffic in a SAHN. International Conference on Information Technology: Coding and Computing (ITCC), Las Vegas, NV, April 4-6 (pp. 639- 645). Washington, DC: IEEE Computer Society.
Islam, M.M., Pose, R., & Kopp, C. (2005). Making SAHN-MAC independent of single frequency channel and omnidirectional antennas. IASTED International Conference on Networks and Communication Systems (NCS 2005), Krabi, Thailand, April 18-20, 6pp. ISBN: 0-88986-490-X. ACTA Press.
Islam, M.M., Pose, R., & Kopp, C. (2005). Suburban ad-hoc networks in information warfare. Proceedings 6th Australian InfoWar Conference, Geelong, Australia, November 25-26 (pp. 71-80). ISBN: 1-74156-028-4. Australia: Deakin University.
Islam, R. (2005). Enhanced security in mobile IP communication. MSc Thesis, Department of Computer and Systems Sciences, Royal Institute of Technology, Stockholm, Sweden.
ISO 15048. (1999). Information technology-Security techniques-Evaluation criteria for IT security (common criteria). International Organization for Standardization.
ISO 15408. (2004). Information technology-Security techniques-Evaluation criteria for IT security (Common Criteria), International Organization for Standardization (version 2.2, ISO 15408). Retrieved from http://www.com-moncriteriaportal.org
ISO 17799. (2000). Code of practice for information security management (ISO/IEC 17799:2000). International Organization for Standardization.
ISO SQL/MM Part 6 (2001). http://www.sql-99.org/SC32/WG4/Progression_Documents/FCD/fcd-datamining-2001-05.pdf
ISO. (1992). Coded representation of picture and audio information-Progressive bi-level image compression. ISO Draft International Standard 11544.
ISO/IEC 13335. (2004). Information technology – Security techniques – Management of information and communications technology security – Part 1: Concepts and models for information and communications technology security management. International Organization for Standardization/International Electrotechnical Commission.
ISO/IEC 9000:2000. (1999). Quality management systems-Fundamentals and vocabulary. ISO/IEC 9000:2000, International Organization for Standardization.
ISO/IEC. (2002). Riskmanagement-Vocabulary-Guidelines for use in standards. ISO/IEC Guide, 73.
ISO/IEC14496-10&ITU-TRQC.(2003). H.264, Advanced video coding.
ISO/IEC14496-2. (2001). Coding of audio-visual objects -Part 2: Visual. Annex F.
IT Governance Institute (2006). Control objectives for Information Technology 4.0. http://www.itgi.org
Ito, T., Yokoo, M., Matsubara, S., & Iwasaki, A. (2005). A new strategy proof greedy-allocation combinatorial auction protocol and its extension to open ascending auction protocol. Proceedings of the 20th National Conference on Artificial Intelligence (AAAI-05) (pp. 261-266).
ITU [International Telecommunication Union]. (2005). New initiatives programmes, Feb 2005. Retrieved May 3, 2006, from http://www.itu.int/osg/spu/ni/
ITU [International Telecommunication Union]. (2005, April). ITU workshop on ubiquitous network societies: The case of the Italian Republic (pp. 25-50). Retrieved May 10, 2006, from http://www.itu.int/osg/spu/ni
ITU [International Telecommunication Union]. (2005, April). ITU workshop on ubiquitous network societies: The case of the Japan (pp. 13-45). Retrieved May 10, 2006, from http://www.itu.int/osg/spu/ni
ITU [International Telecommunication Union]. (2005, April). ITU workshop on ubiquitous network societies: The case of the Republic of Korea (pp. 10-45). Retrieved May 10, 2006, from http://www.itu.int/osg/spu/ni
ITU [International Telecommunication Union]. (2005, April). ITU workshop on ubiquitous network societies: The case of the Republic of Singapore (pp. 21-39). Retrieved May 10, 2006, from http://www.itu.int/osg/spu/ni
ITU-T Recommendation H.261. (1993). Video CODEC for audiovisual services at px64 kbit/s.
ITU-T Recommendation H.263. (1998). Video coding for low bit rate communication, Version 2.
ITU-T Recommendation X.509. (1997, June). Information technology-Open systems interconnection-The directory: Authentication framework.
ITU-T RecommendationX.509. (2000, March), Information technology-Open systems interconnection-The directory: Public-key and attribute certificate frameworks.
ITU-T Standard X. 509. (1995, October 24). Information technology-Open systems interconnection-The directory: Public-key and attribute certificate frameworks. Directive of the European Parliament and of the Council of 1995 on the protection of individuals with regard to the processing of personal data and on the free movement of such data. Retrieved January 10, 2006, from http://www.dsv.su.se/jpalme/society/eu-personal-privacy-directive.html
Jackson, M. (1983). System development. EnglewoodCliffs, NJ: Prentice Hall.
Jacobs, E.W., Fisher, Y., & Boss, R.D. (1992). Image compression: A study of the iterated transform method. Signal Processing, 29(3), 251-263.
Jacobson, I.,Booch, G., & Rumbaugh, J. (1999). The unified software development process. Addison Wesley Longman.
Jacobson, I.,Christerson, M.,Johnsson, P., & Overgaard, G. (1992). Object-oriented software engineering: A use case driven approach. Boston: Addison Wesley.
Jacquet, P., Muhlethaler, P., Clausen, T., Laouiti, A., Qayyum, A., & Viennot, L. (2001). Optimized link state routing protocol for ad hoc networks. Proceedings of the IEEE National Multi-Topic Conference (INMIC), Lahore, Pakistan, December 28-30 (pp. 62-68). New York: IEEE.
Jacquin, A.E. (1992). Image coding based on a fractal theory of iterated contractive image transformations. IEEE Transactions on Image Processing, 1(1), 18-30.
JADE – Java Agent DEvelopment Framework. (n.d.) Retrieved from http://jade.tilab.com/
Jagoto, A. (2000). Data analysis and classification for bioinformatics. CA: Bay Press.
Jain, A.K. (1989). Fundamentals of digital image processing. Englewood Cliffs, NJ: Prentice-Hall.
Jain, A.K.,Murty, M.N., & Flynn, P.J. (1999). Data clustering: a review. ACM Computing Surveys, 31(3), 264-323.
Jain, J., & Jain, A. (1981). Displacement measurement and its application in interframe image coding. IEEE Transactions on Communication, COMM-29(12), 1799-1808.
Jameson, A. (2004). More than the sum of its members: Challenges for group recommender systems. Proceedings of the International Working Conference on Advanced Visual Interfaces (pp. 48-54).
Jameson, A. (2005). User modeling meets usability goals. In L.Ardissono, P.Brna, & A.Mitrovic (Ed.), User Modeling: Proceedings of the Tenth International Conference (pp. 1-3). Springer.
Jammalamadaka, R. C.,Mehrotra, S., & Venkatasubramanian, N. (2005, November 11). Pvault: A client server system providing mobile access to personal data. In Proceedings of the 2005 ACM International Workshop on Storage Security and Survivability, Fairfax, VA.
Janet ABBATE, Inventing the Internet, The MIT Press, 1999
Jang, J.S. R. (1991). Fuzzy modeling using generalized neural networks and kalman filter algor ithm. Proceedings of the Ninth National Conference on Artificial Intelligence (AAAI-91), 762-767.
Jang, J.S. R. (1993). ANFIS: Adaptive network based fuzzy inference systems. IEEE Transactions on Systems, Man, and Cybernetics, 23(03), 665-685.
Jang, J.S. R., Sun, C.T., & Mizutani, E. (1997). Neurofuzzy and soft computing. NJ: Prentice Hall.
Jannink, J. (1999). Thesaurus entry extraction from an online dictionary. In Proceedings of Fusion 99, Sunnyvale CA.
Jansen, W. A. (2003, May 12-15). Authenticating users on handheld devices. The 15th Annual Canadian Information Technology Security Symposium (CITSS), Ottawa, Canada. Retrieved July 11, from http://csrc.nist.gov/mobilesecurity/publications.html#MD
Jansen, W.A. (2003). Authenticating users on handheld devices. In the 15th Annual Canadian Information Technology Security Symposium (CITSS), Ottawa, Canada, May 12-15. Ottawa, Canada: Communications Security Establishment. Retrieved September 24, 2007, from http://csrc.nist.gov/mobilesecurity/publications.html#MD
Jarvenpaa, S.L., Lang, K.R., Takeda, Y., & Tuunainen, V.K. (2003). Mobile commerce at crossroads. Communications of the ACM, 46(12), 41-44.
Jasper, R., & Uschold, M. (1999). A framework for understanding and classifying ontology applications., In Proceedings of the IJCAI-99 ontology workshop (pp. 1-20).
Java Agent Development Framework. (1998). http://sharon.cselt.it/projects/jade
Java. (1998). Programming Java threads in the real world: A Java programmer’s guide to threading architectures. Retrieved from http://www.javaworld/jw-09-1998/jw-09-threads_p.html
Javits, H. S., & Valdes, A. (1994). The NIDES statistical component: Description and justification (Tech. Rep.). Menlo Park, CA: SRI International.
Jennings, N.R. (2000). On agent-based software engineering. Artificial Intelligence, 117, 277-296.
Jennings, N.R. (2001). An agent-based approach for complex software systems. Communications of the ACM, 35-41.
Jennings, N.R., & Wooldridge, M.J. (1998). Agent technology: Foundations, applications and markets. Springer-Verlag.
Jennings, N.R., et al. (2000). Autonomous agents for business process management. International Journal of Applied Artificial Intelligence, 14(2), 145-189.
Jennings, N.R., Sycra, K., & Wooldridge, M. (1998). A roadmap of agent research and development. In M. Wooldridge (Ed.), Autonomous agents and multi-agent systems (pp. 275-306). Boston: Kluwer Academic Publisher.
Jerrold M. GROCHOW, Information Overload!, Yourdon Press Computing Series, 1996
Jiang, J.J., Hsu, M.K., Klein, G., & Lin, B. (2000). E-commerce user behaviour model: An empirical study. Human Systems Management, 19(4), 265-276.
Jiang, M., Li, J., & Tay, Y.C. (1999). Cluster based routing protocol. Draft-ietf-manet-cbrp-spec-01.txt, Internet Draft, August.
Jin, J., & Nahrstedt, K. (2004). QoS specification languages for distributed multimedia applications: A survey and taxonomy. IEEE Multimedia, IEEE Computer Society Press, 11(3), 74-87.
Jing, H., Netzer, Y.D., Elhadad, M., & McKeown, K. (2000). Integrating a large-scale, reusable lexicon with a natural language generator. Proceedings of the 1st International Conference on Natural Language Generation (pp. 209-216).
Joa-Ng, M., & Lu, I.-T. (1999). A peer-to-peer zone-based two-level link state routing for mobile ad-hoc networks. IEEE Journal on Selected Areas in Communications, 17(8), 1415-1425.
John THORP, The Information Paradox, McGraw-Hill Ryerson, 1998
Johnson, D., & Maltz, D. (1996). Dynamic source routing in ad hoc wireless networks. In T.Imielinski, & H. Korth (Eds.), Mobile computing (vol. 353, pp. 151-181). USA: Kluwer Academic Publishers.
Johnson, D., & Maltz, D. (1996). Dynamic source routing in ad hoc wireless networks. In T.Imielinski, & H. Korth (Eds.), Mobile computing (vol. 353, pp. 151-181). USA: Kluwer Academic Publishers.
Johnson, W., Rickel, J., & Lester, J. (2000). Animated pedagogical agents: Face-to-face interaction in interactive learning environments. International Journal of Artificial Intelligence in Education, 11, 47-78.
Johnston, D.H. (2004). 4D-gives reservoir surveillance. AAPG Explorer, 25(12), 28-30.
Johnston, J.D. (1980). A filter family designed for use in quadratic mirror filter banks. IEEE International Conference on Acoustics, Speech, and Signal Processing (ICASSP) (pp. 291-294).
Jones, A. K., & Lin, Y. (2001). Application intrusion detection using language library calls. In Proceedings of 17th Annual Computer Security Applications Conference (ACSAC’01). Los Alamitos, CA: IEEE Computer Society Press.
Jones, P.B., Blake, M.A., & Archibald, J.K. (2002). A real-time algorithm for task allocation. IEEE International Symposium on Intelligent Control, 672-677. Retrieved September 1, 2003, from http://ieeexplore.ieee.org
Joshi, J., et. al. (2004, November-December). Access control language for multidomain environments. IEEE Internet Computing, 40-50.
Julka, N., Karimi, I., & Srinivasan, R. (2002). Agent-based supply chain management-2: A refinery application. Computers and Chemical Engineering, 26, 1771-1781.
Jung, K.U. (2004, December). Community, S&A research group, research group notice board: Ubiquitous campus in Korea. Ubiquitous IT Korea Forum. Retrieved May 12,2006, from http://www.ukoreaforum.or.kr/bbs/view.php?code=c_rg01&page=1&number=2&keyfield=&key=
Junker, M.,Sintek, M., & Rinck, M. (1999). Learning for Text Categorization and Information Extraction with ILP. In J. Cussens (Eds.), Proceedings of the 1th Workshop on Learning Language in Logic (pp. 84-93). Bled: Slovenia.
Kadrovach, B.A., & Lamont, G.B. (2002). A particle swarm model for swarm-based networked sensor systems. In Proceedings of the 2002 ACM Symposium on Applied Computing (pp. 918-924). Retrieved June 19, 2004, from Association for Computing Machinery Digital Library Database.
Kaelbling, L.P., & Littman, M.L. (1996). Reinforcement learning: A survey. Journal of Artificial Intelligence Research, 4, 237-285.
Kaiser, S. (1998). Multi-carrier CDMA mobile radio systems: Analysis and optimization of detection, decoding and channel estimation. Fortschritt-Berichte VDI, Reihe 10, Nr. 531, VDI-Verlag, Düsseldorf, Germany.
Kaiser, S. (2002). OFDM code-division multiplexing in fading channels. IEEE Trans. on Communications, 50, 1266-1273.
Kamaci, N., Altunbasak, Y., & Mersereau, R.M. (2005). Frame bit allocation for the H.264/AVC video coder via Cauchy-density-based rate and distortion models. IEEE Transactions on Circuits and Systems for Video Technology, 15(8), 994-1006.
Kamp, M.,Korffer, B., & Meints, M. (forthcoming). Profiling of customers and consumers: Customer loyalty programs and scoring practices. In M. Hildebrandt & S. Gutwirth (Eds.), Profiling the european citizen: Cross-disciplinary perspectives (pp. 181-196). Spinger.
Kampmann, M. (2002). Automatic 3-D face model adaptation for model-based coding of videophone sequences. IEEE Transactions on Circuits and Systems for Video Technology, 12(3), 172-182.
Kang, M. H.,Park, J. S., & Froscher, J. N. (2001). Access control mechanisms for interorganizational workflow. In Proceedings of the Sixth ACMSymposium on Access Control Models and Technologies, 66-74.
Kaplan, J. D. (2005). Strategic IT portfolio management: governing enterprise transformation. Boston, Pittiglio Rabin Todd & McGrath.
Kaplan, M. A. (1996). IBMcryptolopesTM, superdistribution and digital rights management. Retrieved December 1996, from http://www.research.ibm.com/people/k/kaplan
Karkimo, A. (2005, October 13). Kännykkää tunnistaa kantajansa askelista. Tietokone computer science magazine on-line news. Retrieved February 1st, 2006, from http://www.tietokone.fi
Karlsson, G., & Vetterli, M. (1988). Three-dimensional subband coding of video. IEEE International Conference on Acoustics, Speech, and Signal Processing (ICASSP), New York, April (pp. 1100-1103).
Karmakar, G.C. (2002). An integrated fuzzy rule-based image segmentation framework. PhD Thesis. Gippsland School of Computing and Information Technology. Monash University: Australia.
Karoui, L.,Aufaure, M.-A., & Bennacer, N. (2004). Ontology discovery from web pages: Application to tourism. Workshop on Knowledge Discovery and Ontologies (KDO), co-located with ECML/PKDD, Pisa, Italy, pp. 115-120.
Karp, P.D. (1996). A strategy for database interoperation. Journal of Computational Biology, 2, 573-583.
Karygiannis, T., & Owens, L. (2002). Wireless Network Security. National Institute of Standard and technology, US Department of Commerce, Special Publication 800-48.
Kasera, K.K., & Ramanathan, R. (1997). A location management protocol for hierarchically organized multihop mobile wireless networks. Proceedings of the IEEE 6th International Conference on Universal Personal Communications (ICUPC), 1, San Diego, CA, October 12-16 (pp. 158-162). IEEE Communications Society.
Kaspersky Lab Products & Services. (2007). Kaspersky anti-virus mobile. Retrieved September 24, 2007, from http://www.kaspersky.com/antivirus_mobile
Kaspersky Lab. (2005). Worm.SymbOS.Cabir.a. Retrieved July 12, 2005, from http://www.viruslist.com/en/viruslist.html?id=1689517
Kaspersky Security for PDAs. (n.d.) Retrieved June 30, 2005, from http://anti-virusi.com/kaspersky/kaspersky_pda.html
Kaspersky. (2005). IRC worms. Retrieved October 2005 from http://www.avp.ch/avpve/worms/irc.stm
Katsaggelos, A.K., Kondi, L.P., Meier, F.W., Ostermann, J., & Schuster, G.M. (1998). MPEG-4 and rate-distortion-based shape-coding techniques. Proceedings of the IEEE, 86(6), 1126-1154.
Katsikas S.,Spinellis D.,Iliadis J.,Blobel B., 1998, Using trusted thirdparties for secure telemedical applications over the WWW: TheEUROMED -ETS approach, Intern. Journal of Medical Informatics, Elsevier, No.49, pp. 59-68
Katto, J., Ohki, J., Nogaki, S., & Ohta, M. (1994). A wavelet codec with overlapped motion compensation for very low bit-rate environment. IEEE Transactions on Circuits and Systems for Video Technology, 4(3), 328-338.
Katz, M.L., & Shapiro, C. (1986). Technology adoption in the presence of network externalities. Journal of Political Economy, 94(4), 822-841.
Kaufaris, M. (2002). Applying the technology acceptance model and flow theory to online consumer behaviour. Information Systems Research, 13(2), 205-223.
Kaufman, L., & Rousseeuw, P. J. (1990). Finding groups in data: An introduction to cluster analysis. New York: John Wiley & Sons.
Kaup, A. (1998). Object-based texture coding of moving video in MPEG-4. IEEE Transactions on Circuits and Systems for Video Technology, 9(1), 5-15.
Kavakli, M. (2005, June 27-July 1). Games of soldiers: A survey of military training & computer games. Proceedings of ISAGA 2005, 36th Annual Conference for the International Simulation and Gaming Association, Atlanta, GA.
Kavakli, M. (2006, July 10-13). Training simulations for crime risk assessment. Proceedings of ITHET 2006:7th International conference on Information Technology Based Higher Education and Training, Sydney, Australia.
Kavakli, M., & Gao, Y.F. (2005, June 15-18). Consistency of risk assessment in physical and virtual environments. Proceedings of INISTA 2005, Innovations in Intelligent Systems and Applications, IEEE Computational Intelligence Society Turkey Chapter, Istanbul, Turkey.
Kavakli, M., & Thorne, J. (2002, November 25-29). A cognitive modelling approach to capturing the context of complex behaviour in gameplay. Proceedings of The First International Conference on Information Technology & Applications (ICITA2002), Bathurst, Australia.
Kavakli, M., & Thorne, J. (2003, July 5-10). Knowledge acquisition in distance education. Proceedings of the 6th International Conference on Computer Based Learning in Science (CBLIS2003) Conference, Nicosia, Cyprus.
Kavakli, M., Akca, B., & Thorne, J. (2004a). The role of computer games in the education of history. Mugla University Journal of Institute of Social Sciences (Mug(la Üniversitesi Sosyal Bilimler Enstitüsü Dergisi), 13, 66-78.
Kavakli, M., Akca, B., & Thorne, J. (2004b, February 13). The role of computer games in learning history. Proceedings of Australian Workshop on Interactive Entertainment, University of Technology, Sydney, Australia. Retrieved from http://research.it.uts.edu.au/creative/ie
Kavakli, M., Kavakli, K., & Gao, Y.F. (2004c, September 13-16). Crime prevention through environmental design in virtual reality. Proceedings of the 9th Crime Prevention Through Environmental Design (CPTED) Conference, Brisbane, Australia.
Kay, J. (2005). Low volume viruses: New tools for criminals. Network Security, 2005(6), 16-18.
Kazienko, P., & Dorosz, P. (2004). Intrusion detection systems (IDS) Part 2 – Classification; methods; techniques (White paper).
Keil, M., Beranek, P.M., & Konsynski, B.R. (1995). Usefulness and ease of use: Field study evidence regarding task considerations. Decision Support Systems, 13(1), 75-91.
Keizer, G. (2005). Spam could cost businesses worldwide $50 billion. Information Week. Retrieved October 9, 2005, from http://www.informationweek.com/story/showArticle.jhtml?articleID=60403649
Kennedy, H. (2002). Computer games liven up military recruiting, training. National Defense Magazine, November.
Kephart, J.O., & Chess, D.M. (2003). The vision of autonomic computing. Computer, 36(1), 41-52.
Kern, H., R. Schiesser, et al. (2004). IT production services. Professional Technical Reference. Upper Saddle River, NJ, Prentice Hall.
Kern, H., S. Galup, et al. (2000). IT organization: building a world-class infrastructure. Professional Technical Reference. Upper Saddle River, NJ, Prentice Hall.
Khalifa, M., & Cheng, S.K.N. (2002). Adoption of mobile commerce: Role of exposure. Paper presented at the 35th Hawaii International Conference on System Sciences, Hilton Waikoloa Village, Hawaii, January 7-10 (pp. 46-52). IEEE Computer Society.
Khalique, S., Jamshed, M., Farooq Ahmad, H., Ali, A., & Suguri, H. (2005, September). Significance of semantic language in multi agent systems. Proceedings of 8th Pacific Rim Workshop on Agents and Multi-Agent Systems (PRIMA, 2005), Kuala Lumpur, Malaysia.
Khan, Z.A., Farooq Ahmad, H., Ali, A., & Suguri, H. (2005, April 5-7). Decentralized architecture for fault tolerant multi agent system. Proceedings of International Symposium on Autonomous Decentralized Systems, China.
Khansari, M., Jalai, A., Dubois, E., & Mermelstein, P. (1996, February). Low bit-rate video transmission over fading channels for wireless microcellular system. IEEE Trans. Circuits Syst. Video Technol., 6(1), 1-11.
Kharif, O. (2005). May I see your voice, please? In BusinessWeek online, April 20. Retrieved July 11, from http://www.businessweek.com/technology/content/apr2005/tc20050420_1036_tc024.htm?campaign_id=rss_techn
Kickinger, G.,Hofer, J.,Tjoa, A.M., & Brezany, P. (2003). Workflow mManagement in GridMiner. The 3rd Cracow Grid Workshop. Cracow, Poland: Springer.
Kienzle, D.M., & Elder, M.C. (2003). Recent worms: A survey and trends. Paper presented at the ACM Workshop on Rapid Malcode, WORM’03, Washington, DC.
Kietz, J.U.,Maedche, A., & Volz, R. (2000). A method for semiautomatic ontology acquisition from a corporate intranet. In Proceedings of EKAW-2000 Workshop Ontologies and Text. Lecture Notes in Artificial Intelligence (LNAI). France: Springer-Verlag.
Kim, C., & Hwang, J.-N. (2002). Fast and automatic video object segmentation and tracking for content-based applications. IEEE Transactions on Circuits and Systems for Video Technology, 12(2), 122-129.
Kimball, R. (1998). The data warehouse life cycle toolkit: expert methods for designing, developing, and deploying data warehouses. New York, Wiley Computer.
Kimball, R., and M. Ross (2002). The data warehouse toolkit: the complete guide to dimensional modeling. New York, John Wiley & Sons.
Kindberg, T., & Fox, A. (2002). System software for ubiquitous computing. IEEE Pervasive Computing, January, 70-81.
King, J.L., Gurbaxani, V., Kraemer, K.L., McFarlan, F.W., Raman, K.S., & Yap, C.S. (1994). Institutional factors in information technology innovation. Information Systems Research, 5(2), 139-169.
Kirda, E., & Kruegel, C. (2005, July, 26-28) Protecting users against phishing attacks with AntiPhish. In Proceedings of the 29th Annual International Conference on Computer Software and Applications, Edinburgh, Scotland.
Kirn, S. (2002). Ubiquitous healthcare: The OnkoNet mobile agents architecture. Paper presented at the 2002 Mobile Computing in Medicine, Heidelberg, Germany. Retrieved September 23, 2004, from http://www.old.netobjectdays.org/pdf/02/papers/node/0278.pdf
Kirton, M. (1976). Adopters and innovators: a description and measure. Journal of Applied Psychology, 61(5), 622-629.
Kismet. (2006). Retrieved December 10, 2006, from http://kismetwireless.net
Kitamura, M. (2002, September 1). NRI papers: Using ubiquitous networks to create new services based on the commercial and public infrastructure (pp. 1-14). NRI Papers No. 54. Japan: Nomura Research Institute.
Kivinen, T., & Tschofenig, H. (2006). Design of the IKEv2 Mobility and Multihoming (MOBIKE) Protocol, draftietf-mobike-design-08.txt. RFC 4621, IETF. Retrieved March 3, 2006, from http://www.ietf.org/internet-drafts/draft-ietf-mobike-design-08.txt
Kizza, J. M. (2005). Computer network security. Springer.
Klasen, L. (2002). Migrating an online service to WAP: Case study. The Electronic Library, 20(3), 195-201.
Kleijen, M., Wetzels, M., & de Ruyter, K. (2004). Consumer acceptance of wireless finance. Journal of Financial Services Marketing, 8(3), 206-217.
Klein, M., & Dellarocas, C. (1999, May 1-5). Exception handling in agent systems. Proceedings of the Third International Conference on Autonomous Agents, Seattle, WA.
Kleinrock, L., & Stevens, K. (1971). Fisheye: A lens like computer display transformation. Technical Report, UCLA Computer Science Department.
Klesen, M. (2002). Report on affective reasoning and cultural diversity (Tech. Rep. DFKI).
Klir, G.J. & Yuan, B. (1995). Fuzzy sets and fuzzy logic. Theory and applications. NJ: Prentice Hall.
Knight, W. (2005, July). Caught in the net. IEE Review, 51(7), 26-30.
Knutsen, L., Constantiou, I.D., & Damsgaard, J. (2005). Acceptance and perceptions of advanced mobile services: Alterations during a field study. Paper presented at the International Conference on Mobile Business, Sydney, Australia, July 11-13.
Ko, C. (2000). Logic induction of valid behavior specifications for intrusion detection. Los Alamitos, CA: IEEE Press.
Ko, C.,Ruschitzka, M., & Levitt, K. (1997). Execution monitoring of security critical programs in distributed systems: A specification-based approach. IEEE symposium on security and privacy, 175-187.
Ko, Y.B., & Vaidya, N.H. (1998). Location-aided routing (LAR) in mobile ad hoc networks. Proceedings of the 4th Annual ACM/IEEE International Conference on Mobile Computing and Networking (MobiCom), Dallas, Texas, October 25-30 (pp. 66-75). ISBN 1-58113-035-X. New York: ACM Press.
Kobourov, S.G., Pavlou, D., Cappos, J., Stepp, M., Miles, M., & Wixted, A. (2005). Collaboration with Diamond-Touch. Proceedings of the 10th International Conference on Human-Computer Interaction (pp. 986-990).
Koehler, J., Giblin, C., Gantenbein, D., & Hauser, R. (2003). On autonomic computing architectures (Research Report). IBM Research Zurich Research Laboratory.
Kohavi, R.,Rothleder, N. J., & Simoudis, E. (2002). Emerging trends in business analytics. Communications of the ACM, 45(8), 45-48.
Kohl, U.,Lotspiech, J., & Kaplan, A. (1997). Safeguarding digital library contents and users protecting documents rather than channels. Retrieved from http://www.dlib.org/dlib/september97/ibm/091otspiech.html
Kohonen, T. (1982). Self-organized formation of topologically correct feature maps. Biological Cybernetics, 43, 59-69.
Kohonen, T. (1998). Self-organization of very large document collections: State of the art. In L. Niklasson, M. Bod, & T. Ziemke, (Eds.), Proceedings of ICANN98, the 8th International Conference on Artificial Neural Networks (Vol. 1, pp. 65-74). London: Springer.
Kohonen, T.,Kaski, S.,Lagus, K.,Salojarvi, J.,Honkela, J.,Paatero, V., et al. (2000). Self organization of a massive document collection. IEEE Transactions on Neural Networks, 11(3) 574-585.
Koller, D., & Sahami, M. (1997). Hierarchically classifying documents using very few words. In Proceedings of the 14th International Conference on Machine Learning (ICML) (pp. 170-178).
Kolodner, J. (1993). Case-based reasoning. Morgan Kaufmann Publishers.
Kona, M.K., & Xu, C.Z. (2002). A framework for network management using mobile agents. Proceeding of the International Parallel and Distributed Processing Symposium (pp. 227-234). Retrieved October 15, 2002, from http://ieeexplore.ieee.org
Kondi, L.P. (2005). Transactions letters. A rate-distortion optimal hybrid scalable/multiple description video codec. IEEE Transactions on Circuits and Systems for Video Technology, 15(7), 921-927.
Kondi, L.P., Meier, F.W., Schuster, G.M., & Katsaggelos, A.K. (1998) Joint optimal object shape estimation and encoding. SPIE Visual Communication and Image Processing, San Jose, California, USA, January (pp. 14-25).
Kondi, L.P., Melnikov, G., & Katsaggelos, A.K. (2001). Jointly optimal coding of texture and shape. International Conference on Image Processing (ICIP), 3, Thessaloniki, Greece, October 7-10 (pp. 94-97).
Kondi, L.P., Melnikov, G., & Katsaggelos, A.K. (2004). Joint optimal object shape estimation and encoding. IEEE Transactions on Circuits and Systems for Video Technology, 14(4), 528-533.
Koonin, E. V., & Galperin, M.Y. (1997). Prokaryotic genomes: the emerging paradigm of genome-based microbiology. Current Opinions in Genetic Development, 7, 757-763.
Koperski, K., & Han, J. (1995). Discovery of spatial association rules in geographic information databases. In M.J. Egenhofer, J.R. Herring (Eds.), 4th International Symposium on Large Geographical Databases, 951 (pp. 47-66). Portland: Springer.
Kopp, C. (1997). An I/O and stream inter-process communications library for a password capability system. Masters Thesis, Monash University, Clayton, Australia.
Kopp, C., & Pose, R. (1998). Bypassing the home computing bottleneck: The suburban area network. 3rd Australasian Computer Architecture Conference (ACAC), 20(4), 87-100, Perth, Australia, February 2-3. ISBN: 981-3083-93-X. Springer-Verlag.
Kopp, C., & Pose, R. (1998). Bypassing the home computing bottleneck: The suburban area network. 3rd Australasian Computer Architecture Conference (ACAC), 20(4), Perth, Australia (pp. 87-100). ISBN: 981-3083-93-X. Springer-Verlag.
Kormann, D., & Rubin, A. (2000). Risks of the Passport single signon protocol. Computer Networks, 33, 51-58.
Kortenkamp, D., Bonasso, R.P., & Murphy, R. (Ed.). (1998). Artificial intelligence and mobile robots. Case studies of successful robot systems. MIT Press.
Kosala, R., & Blockeel, H. (2000). Web mining research: A survey. SIGKDD Explorations: Newsletter of the ACM Special Interest Group on Knowledge Discovery and Data Mining, 2(1), 1-5.
Koshutanski, H. (2005). Interactive access control for autonomic systems. Unpublished doctoral dissertation, University of Trento, Italy.
Koshutanski, H., & Massacci, F. (2007). A negotiation scheme for access rights establishment in autonomic communication. Journal of Network and System Management (JNSM) 15(1), 117-136. Springer press.
Kosko, B. (1991). Neural networks for signal processing. NJ: Prentice Hall.
Kotsifakos, E.,Ntoutsi, I., & Theodoridis, Y. (2005). Database support for data mining patterns. In Proceedings of PCI’05 (pp. 14-24). Springer Verlag.
Kotz, D., Gray, R., & Rus, D. (2002). Future directions for mobile agent research. IEEE Distributed Systems Online, 3(8).
Kotz, D., Gray, R., Nog, S., Rus, D., Chawla, S., & Cybenko, G. (1997). AGENT TCL: Targeting the needs of mobile computers. IEEE Internet Computing, 1(4).
Krebs, B. (2005). Conversation with a worm author. The Washington Post. Retrieved September 20, 2005, from http://blogs.washingtonpost.com/securityfix/2005/08/a_couple_of_wee.html
Krebs, B. (2006). Citibank phish spoofs 2-factor authentication. Retrieved July 23, 2006, from http://blog.washington-post.com/securityfix/2006/07/citibank_phish_spoofs_2factor_1.html
Kröger, F. (1987). Temporal logic of programs. Springer-Verlag.
Kruegel, C.,Mutz, D.,Robertson, W., & Valeur, F. (2003). Bayesian event classification for intrusion detection. In Proceedings of the 19th Annual Computer Security Applications Conference (ACSAC 2003). Los Alamitos, CA: IEEE Computer Society Press.
Kruegel, C.,Valeur, F.,Vigna, G., & Kemmerer, R. (2002). Stateful intrusion detection for high-speed networks. In Proceedings of the 2002 IEEE Symposium on Security and Privacy (S&P.02). Los Alamitos, CA: IEEE Computer Society Press.
Krutch, J. W. (1959). “The nemesis of power.” Human nature and the human condition. Greenwood Press Reprint (April 24, 1979).
Kumar, S., & Spafford, E. H. (1994). A pattern-matching model for misuse intrusion detection. National Computer Security Conference, 11-21.
Kumar, S., Cohen, P.R., & Levesque, H.J. (2000, July). The adaptive agent architecture: Achieving fault-tolerance using persistent broker teams. Proceedings of the 4th International Conference on Multi-Agent Systems (ICMAS2000), Boston.
Kunt, M., Ikonomopoloulos, A., & Kocher, R. (1985). Second generation image coding techniques. Proceedings of the IEEE, 73(4), 549-574.
Kuonen, D. (2003). Challenges in bioinformatics for statistical data miners. Bulletin of Swiss Statistical Society, 46, 10-17.
Kwon, T.T., Gerla, M., Das, S., & Das, S. (2002). Mobility management for VoIP service: Mobile IP vs. SIP. IEEE Wireless Communications, 9, 66-75.
Labrou, Y., & Finin, T. (1999). Yahoo! as an ontology: Using Yahoo! categories to describe documents. In 8’h International Conference on Knowledge and Information Management (CIKM-99 (pp.180-187). Kansas City, MO.
Labrou, Y., Finin, T., & Peng, Y. (1999). Agent communication languages: The current landscape. IEEE Intelligent Systems, 45-52.
Lame, G. (2003). Using text analysis techniques to identify legal ontologies components. In Workshop on Legal Ontologies of the International Conference on Artificial Intelligence and Law.
Lamport, L. (1993). Verification and specification of concurrent programs. In J.W.d.Bakker, W.P.d.Rover, & G.Rozenberg (Eds.), A decade of concurrency: Reflections and perspectives (pp. 347-374). Springer-Verlag.
Lampson, B. (2004). Computer security in the real world. IEEE Computer Society Press, 37(6), 37, 46.
Landesman, M. (2005, November). Best defenders. PC World.
Langa, F. (2002, August). Langa letter: A real-life GPS road test. InformationWeek. Retrieved May 11, 2006, from http://www.informationweek.com/story/showArticle.jhtml?articleID=6502601&pgno=1
Lange, D.B., & Oshima, M. (1998). Mobile agents with Java: The Aglet API. World Wide Web (Journal), 1(3), 111-121.
Lange, D.B., & Oshima, M. (1999). Seven good reasons for mobile agents. Communications of the ACM, 42(3), 88-89.
Lant, T. (2002). Organizational cognition and interpretation. In J. A. C. Baum (Ed.), Blackwell companion to organizations (pp. 344-362). Malden: Blackwell Publishers.
Laplante, P. A., and C. J. Neill (2005). Antipatterns: identification, refactoring, and management. Boca Raton, FL, Taylor & Francis.
Larsen, P. G., & Pawlowski, W. (1995). The formal semantics of ISO VDM-SL. Computer Standards and Interfaces, 17(5/6), 585-602.
Lassila, O., & McGuiness, D. (2001). The role of frame-based representation on the Semantic Web. Rapport technique KSL-01-02, Knowledge Systems Laboratory, Stanford University.
Lave, J., & Wenger, E. (1990). Situated learning: Legitimate peripheral participation. Cambridge, UK: Cambridge University Press.
Lave, J., & Wenger, E. (1991). Situated learning: Legitimate peripheral participation. Cambridge: Cambridge University Press.
Le Maistre, R. (2002). US to top 3 G chart in 2010 European editor, Unstrung. Retrieved May 2007, from http://www.unstrung.com/document.asp?doc_id=24887
Le, V., & Guyennet, H. (2002). IPSec and DNSSEC to support GRID Application Security. Workshop Security in the Second IEEE/ACM International Symposium on Cluster Computing and the GRID, CCGrid2002, Berlin, Germany, pp. 405-407.
Le, V., & Guyennet, V. (2003). A scalable security architecture for grid applications. GridSec, Second Workshop on Security and Network Architecture, Nancy, France, pp 195-202.
Lederer, S., Hong, J.I., Dey, A.K., & Landay, J.A. (2004). Personal privacy through understanding and action: Five pitfalls for designers. Personal and Ubiquitous Computing, 8(6), 440-454.
Lederer, S., Hong, J.I., Jiang, X., Dey, A.K., Landay, J.A., & Mankoff, J. (2003). Towards every day privacy for ub iquitous computing.Technical Report UCB-CSD-03-1283, Computer Science Division, University of California, Berkeley. Retrieved December 2005, from http://www.eecs.berkeley.edu/Pubs/TechRpts/2003/5774.html
Lee C., & Talia, D. (2003). Grid programming models: Current tools, issues and directions. In F.Berman, G.Fox and T.Hey (Eds.), Grid computing: Making the global infrastructure a reality (pp. 555-578). John & Wiley Press.
Lee, B.-G., Choi, D.-H., Kim, H.-G., Sohn, S.-W., & Park, K.-H. (2003). Mobile IP and WLAN with AAA authentication protocol using identity-based cryptography. 10th International Conference on Telecommunications ICT 2003, 1, Colmar, France, February 23-March 1 (pp. 597-603). USA: IEEE.
Lee, C.H., Lee, D., & Kim, J.W. (2004). Seamless MPEG-4 video streaming over Mobile-IP enabled wireless LAN. Proceedings of SPIE, Multimedia Systems and Applications, Philadelphia, Pennsylvania, October (pp. 111-119). USA: SPIE.
Lee, M.S.Y., McGoldrick, P.J., Keeling, K.A., & Doherty, J. (2003). Using ZMET to explore barriers to the adoption of 3 G mobile banking services. International Journal of Retail & Distribution Management, 31(6), 340-348.
Lee, S., Cho, D., Cho, Y., Son, S., Jang, E., Shin, J., & Seo, Y. (1999). Binary shape coding using baseline-based method. IEEE Transactions on Circuits and Systems for Video Technology, 9(1), 44-58.
Leeuwen, J.V. (l990). Handbook of theoretical computer science: Formal models and semantics (Vol. B). Elsevier, The MIT Press.
LeJeune, N. (2003). Story engine, software engineering practices project. Metropolitan State College, Denver.
Lemay, R. (2006). Perth, Adelaide get optus, Vodafone 3g. Retrieved May 2007, from http://www.zdnet.com.au/news/communications/soa/perth-adelaide-get-optus-vodafone-3g/0,130061791,139261668,00.htm
Lemos, R. (2003). Counting the cost of slammer. c|net News.Com. Retrieved October 11, 2005, from http://news.com.com/2102-1001_3-982955.html?tag=st.util.print
Leonard-Barton, D., & Deschamps, I. (1988). Managerial influence in the implementation of new technology. Management Science, 34(10), 1252-1265.
Lerman, K., & Galstyan, A. (2001). A methodology for mathematical analysis of multi-agent systems (Tech. Rep. No. ISI-TR-529). University of California Information Sciences Institute. Retrieved November 20, 2004, from http://www.isi.edu/%7Elerman/papers/isitr529.pdf
Lerman, K., & Shehory, O. (2000). Coalition formation for large-scale electronic markets. Proceedings of the Fourth International Conference on Multiagent Systems (pp. 167-175). Retrieved November 20, 2004, from http://www.isi.edu/%7Elerman/papers/LerShe99.pdf
Lewis, D.D. (1991). Evaluating text categorization. In Proceedings of the Speech and Natural Language Workshop (pp. 312-318).
Lewis, J., Tucker, W., & Blake, E. (2003). SoftBridge: A multimodal instant messaging bridging system. Proceedings of the Southern African Telecommunication Networks and Applications Conference (SATNAC) 2003, Southern Cape, South Africa, September 7-10 (pp. 255- 256). South Africa: SATNAC.
Leymann, F. (2001). Web services flow language (WSFL 1.0). Retrieved September 23, 2002, from www4.ibm.com/software/solutions/webservices/pdf/WSFL.pdf
Li, H., & Forchheimer, R. (1994). Two-view facial movement estimation. IEEE Transactions on Circuits and Systems for Video Technology, 4(3), 276-287.
Li, J., & Lei, S. (1997). Rate-distortion optimized embedding. In Proc. Picture Coding Symposium, Berlin, Germany, September (pp. 201-206).
Li, J.,Li, N., & Winsborough, W. H. (2005). Automated trust negotiation using cryptographic credentials. InProceedings of the 12’h ACM conference on Computer and communications security, 46-57.
Li, N., & Mitchell, J. C. (2003) Datalog with constraints: A foundation for trust management languages. In Proceedings of the Fifth International Symposium on Practical Aspects of Declarative Languages.
Li, N., & Mitchell, J. C. (2003). RT: A role-based trust-management framework. In Proceedings of the Third DARPA Information Survivability Conference and Exposition (DISCEXIII), 201-212.
Li, N.,Grosof, B. N., & Feigenbaum, J. (2003). Delegation logic: A logic-based approach to distributed authorization. ACM Transactions on Information and System Security (TISSEC), 6(1), 128-171.
Li, N.,Mitchell, J. C, & Winsborough, W. H. (2002). Design of a role-based trust management framework. In Proceedings of IEEE Symposium on Security and Privacy (S&P), 114-130.
Li, S., & Li, W. (1995). Shape-adaptive discrete wavelet transforms for arbitrarily shaped visual object coding. IEEE Transactions on Circuits and Systems for Video Technology, 10(5), 725-743.
Li, W., & Salari, W. (1995). Successive elimination algorithm for motion estimation. IEEE Transactions on Image Processing, 4(1), 105-107.
Li, Y., & Zhong, N. (2006). Mining ontology for automatically acquiring Web user information needs. IEEE Transactions on Knowledge and Data Engineering, 18(4), 554-568.
Li, Z., & Das, A. (2004). Visualizing and identifying intrusion context from system calls trace. In Proceedings of the 20th Annual Computer Security Applications Conference (ACSAC’04). Los Alamitos, CA: IEEE Computer Society Press.
Liberty Alliance Project. (2003). Liberty Alliance & WS-Fed-eration: A comparative overview (White Paper). Retrieved October 14, 2003, from http://www.liberty.org
Licari, J. (2006). Protecting the information workplace. EDPACS, 2006(33), 13-20.
Liebenau, J., & Harindranath, G. (2002). Organizational reconciliation and its implications for organizational decision support systems: A semiotic approach. Decision Support Systems, 33(4), 339-398.
Lieberman, H. (1997). Autonomous interface agents. Proceedings of CHI Conf. on Human Factors in Computing Systems (pp. 67-74).
Lientz, B. P., and L. Lee (2004). Manage IT as a business: how to achieve alignment and add value to the company. Amsterdam, Elsevier/Butterworth-Heinemann.
Lin, H., & Wang, Y. (2005). Predicting consumer intention to use mobile commerce in Taiwan. Paper presented at the International Conference on Mobile Business, Sydney, Australia, July 11-13.
Lind, J. (2000). General concepts of agents and multi-agent systems. Retrieved from http://www.agentlab.de
Linde, Y., Buzo, A., & Gary, R.M. (1980). An algorithm for vector quantization. IEEE Transactions on Communication, 28(1), 84-95.
Lindqvist, U., & Porras, P. (1999). Detecting computer and network misuse with the production-based expert system toolset (P-BEST). Oakland, CA: IEEE Computer Society Press.
Lindqvist, U., & Porras, P. A. (2001). eXpert-BSM: A Host-based intrusion detection solution for Sun Solaris. Los Alamitos, CA: IEEE Press.
Lininger, R., & Vines, R. D. (2005). Phishing: Cutting the identity theft line. Indianapolis, IN: Wiley.
Linnartz, J.P. (2000). Synchronous MC-CDMA in dispersive, mobile rayleigh channels. Proc. of 2nd IEEE Benelux Signal Processing Symposium (SPS-2000), Hilvarenbeek, The Netherlands (pp. 1-4). New York: IEEE.
Linthicum, D. S. (2004). Next generation application integration: from simple information to Web services. Addison-Wesley information technology series. Boston, Addison- Wesley.
Lipner, S., & Howard, M. (2005). The trustworthy computing security development life cycle. Retrieved December, 2005, from http://msdn.microsoft.com/security/default.aspx?pull=/library/en-us/dnsecure/html/sdl.asp
Liska, A. (2002). The practice of network security: Deployment strategies for production environments. Prentice Hall.
Litan, A. (2005a). Findings from Credit Reporting Agency: Authentication Practices (Gartner Rep. G00136618).
Litan, A. (2005b). Increased phishing and online attacks cause dip in consumer confidence (Gartner Rep. G00129146).
Littman, M.L. (1994). Markov games as a framework for multi-agent reinforcement learning. In W.Cohen and H.Hirsh (Eds.), Eleventh International Conference on Machine Learning (pp. 157-163). New Brunswick: Morgan Kaufmann Publishers.
Littman, M.L. (2001). Friend-or-foe q-learning in general-sum games. In C.E.Brodley & A.P.Danyluk (Eds.), Proceedings of the 18th International Conference on Machine Learning (pp. 322-328). Williamstown, MA: Morgan Kaufmann Publishers.
Litvak, M.,Last, M., & Kisilevich, S. (2005, October). Improving classification of multilingual Web documents using domain ontologies. The Second International Workshop on Knowledge Discovery and Ontologies. Porto, Portugal.
Liu, A., Martens, R., Paranjape, R., & Benedicenti, L. (2001). Mobile multi-agent system for medical image retrieval. Proceedings of the 2001 Institute of Electrical and Electronics Engineers Canadian Conference on Electrical and Computer Engineering Conference, Ontario, Canada. Retrieved October 15, 2003, from Institute of Electrical and Electronics Engineers Digital Library Database.
Liu, B., Luo, J., & Li, W. (2005). Multi-agent based network management task decomposition and scheduling. The 19th International Conference on Advanced Information Networking and Applications (pp. 41-46). Retrieved December 1, 2005, from http://ieeexplore.ieee.org
Liu, B.,Hsu, W.,Chen, S., & Ma, Y. (2000). Analyzing the subjective interestingness of association rules. IEEE Intelligent Systems, 15(5), 47-55.
Liu, K. (2000). Semiotics in information systems engineering. Cambridge: Cambridge University Press.
Liu, K., & Dix, A. (1997). Norm governed agents in cscw. Paper presented at the 1st International Workshop on Computational Semiotics, Paris.
Liu, L.,Buttler, D.T.C.,Han, W.,Paques, H.,Pu, C., & Rocco, D. (2003). BioSeek: Exploiting source-capability information for integrated access to multiple bioin formatic s data sources. In Proceedings of the 3rd IEEE Symposium on Bioinformatics and Bioengineering (BIBE2003). Bethesda, MD: IEEE CS Press.
Liu, Q., Reihaneh, S.-N., & Sheppard, N.P. (2003). Digital rights management for content distribution. In Proceedings of the Australasian Information Security Workshop Conference on ACSW Frontiers 2003, 21, Adelaide, Australia, February 1 (pp. 49-58). Darlinhurst, Australia: Australian Computer Society, Inc.
Liu, T., & Choudary, C. (2004). Content-aware streaming of lecture videos over wireless networks. IEEE Sixth International Symposium on Multimedia Software Engineering (ISMSE’04), Miami, FL, December 13-15 (pp. 458-465). Washington, DC: IEEE Computer Society.
Liu, W.,Guanglin, H.,Liu, X.,Zhang, M., & Xiaotie, D. (2005, May 10-14). Detection of phishing Web pages based on visual similarity. Special Interest Tracks and Posters of the 14th International Conference on World Wide Web, Chiba, Japan.
LKSCTP. Retrieved June 1, 2005, from http://lksctp.sourceforge.net
Lloyd, J.W. (1987). Foundations of logic programming. Springer Verlag.
Loftus, E. (1979). Eyewitness testimony. Cambridge, MA: Harvard University Press.
Loh, S.,Wives, L.K., & Oliveira, J.P.M. (2000). Concept-based knowledge discovery in texts extracted from the web. ACM SIGKDD Explorations, 2(1), 29-39.
Longley, I.M.,Bradshaw, M.T., & Hebberger, J. (2001). Australian petroleum provinces of the 21st century. In M.W. Downey, J.C. Threet, & W.A. Morgan (Eds.), Petroleum provinces of the 21st century, AAPG Memoir, 74, 287-317.
Lopez, I., Follen, et al. (2000). Using CORBA and Globus to coordinate multidisciplinary aeroscience applications. Proceedings of the NASA HPCC/CAS Workshop.
Lopez, Karen. (2005). “Re: Function and process.” http://groups.yahoo.com/group/dm-discuss/message/11646, accessed July 30, 2006. (Free registration required to access URL.)
Loureiro, S. (2001). Mobile code protection. Unpublished doctoral dissertation, Institut Eurecom, ENST, Paris.
Love Letter Worm. (2001). Retrieved November 22, 2005, from http://securityresponse.symantec.com/avcenter/venc/datat/vbs.loveletter.a.html
Lu, J., Yu, C., Liu, C., & Yao, J.E. (2003). Technology acceptance model for wireless Internet. Internet Research: Electronic Networking Applications and Policy, 13(3), 206-222.
Lu, S.,Dong, M., & Fotouhi, F. (2002). The Semantic Web: Opportunities and challenges for next-generation Web applications. Retrieved from http://informationr.net/ir/7-4/paperl34.html
Lu, S.,Hu, H., & Li, F. (2001). Mining weighted association rules. Intelligent Data Analysis, 5(3), 211-225.
Lu, W. W. (2002). Broadband wireless mobile, 3G and beyond. USA: Wiley.
Lu, W.,Han, J., & Ooi, B. C. (1993). Discovery of general knowledge in large spatial databases. In Far East Workshop on Geographic Information Systems (pp. 275-289). Singapore.
Lübke, D., & Marx Gómez, J. (2003). Designing a framework for mobile agents in peer-to-peer Networks. Proceedings of SCI 2003.
Lübke, D., & Marx Gómez, J. (2004). Applications for mobile agents in peer-to-peer-networks. Proceedings of the 11th IEEE International Conference and Workshop on the Engineering of Computer-Based Systems.
Lucent Technologies. (2000). ORiNOCO Manager Suite Users Guide.
Luck, M., d’Inverno, M., Fisher, M., & FoMAS ’97 Contributors. (1998). Foundations of multi-agent systems: Techniques, tools and theory. Knowledge Engineering Review, 13(3), 297-302.
Luck, M., McBurney, P., & Preist, C. (2002). Agent technology: Enabling next generation computing. AgentLink, software report.
Luckham, D. C. (2002). The power of events: an introduction to complex event processing in distributed enterprise systems. Boston, Addison-Wesley.
Lugmayr, W. (1999). Gypsy: A component-oriented mobile agent system. Unpublished doctoral dissertation, Technical University of Vienna, Austria.
Luke, S., & Heflin, J. (2000). SHOE 1.01 Proposed Specification, SHOE Project. Retrieved from http://www.cs.umd.edu/projects/plus/SHOE/spec.htm
Lund, M. S.,Hogganvik, I.,Seehusen, F., & Stølen, K. (2003). UML profile for security assessment (Tech. Rep. STF40 A03066). Oslo, Norway: SINTEF Telecom and Informatics.
Lundberg, J., & Candolin, C. (2003). Mobility in the host identity protocol (HIP). In Proceedings of the International Symposium on Telecommunications (IST2003), Isfahan, Iran, August (pp. 754-757). Iran: Iran Telecom Research Center.
Luo, H., & Lu, S. (2000). Ubiquitous and robust authentication services for ad hoc wireless networks. Technical Report, TR-200030, Department of Computer Science, UCLA.
Luo, H., Zerfos, P., Kong, J., Lu, S., & Zhang, L. (2002). Self-securing ad hoc wireless networks. Seventh International Symposium on Computers and Communications (ISCC’02), Italy, July 1-4 (pp. 567-574).
Luo, X., Huang, Z., & Li, L. (1995). A method for partitioning a sequential program into parallel tasks. Journal of HarBin Institute of Technology, 27(5), 46-50.
Lutchen, M. (2004). Managing IT as a business: a survival guide for CEOs. Hoboken, NJ, John Wiley & Sons.
Lymberopoulos, L.,Lupu, E., & Sloman, M. (2003). An adaptive policy based framework for network services management. lenum Press Journal of Network and Systems Management, 11(3), 277-303.
Lynn, L.H., Aram, J.D., Reddy, N.M., & Ostermann, J. (1997). Methodologies used for evaluation of video tools and algorithms in MPEG-4. Signal Processing: Image Communication, 9(4), 343-365.
Ma, W., & Orgun, M. (1996). Verifying multran programs with temporal logic. In M.Orgun & E.Ashcroft (Eds.), Intensional programming I (pp. 186-206). World-Scientific.
Ma, W., & Sharma, D. (2005, 14-16 September, 2005). A multiple agents based intrusion detection system. Paper presented at the Ninth International Conference on Knowledge-Based Intelligent Information & Engineering Systems (KES2005), Melbourne, Australia.
Ma, W., Johnson, C.W., & Brent, R.P. (1996a). Concurrent programming in T-Cham. In K.Ramamohanarao (Ed.), Proceedings of the 19th Australasian Computer Science Conference (ACSC’96), 291-300).
Ma, W., Johnson, C.W., & Brent, R.P. (1996b). Programming with transactions and chemical abstract machine. In G.-J.Li, D.F.Hsu, S.Horiguchi, & B.Maggs (Eds.), Proceedings of Second International Symposium on Parallel Architectures, Algorithms, and Networks (I-SPAN’96) (pp. 562-564).
Ma, W., Krishnamurthy, E.V., & Orgun, M.A. (1994). On providing temporal semantics for the GAMMA programming Model. In C.B.Jay (Ed.), CATS: Proceedings of computing: The Australian Theory Seminar (pp. 121-132). Sydney, Australia: University of Technology.
Ma, W., Orgun, M.A., & Johnson, C.W. (1998). Towards a temporal semantics for frame. Proceedings SEKE’98, Tenth International Conference on Software Engineering and Knowledge Engineering (pp. 44-51).
Mabuchi, S. (1993). A proposal for a defuzzification strategy by the concept of sensitivity analysis. Fuzzy Sets and Systems, 55(1), 1-14.
Maclagan, M. (2000). Where are we going in our language? New Zealand English today. New Zealand Journal of Speech-Language Therapy, 53-54, 14-20.
Mädche, A., & Volz, R. (2001). The ontology extraction and maintenance framework Text-To-Onto. In Proceedings of the ICDM’01 Workshop on Integrating Data Mining and Knowledge Management. San Jose, CA.
Maedche, A., & Staab, S. (2001). Ontology learning for the Semantic Web. IEEE Intelligent Systems, Special Issue on the Semantic Web, 16(2).
Maedche, A.,Motik, B.,Stojanovic, L.,Studer, R., & Volz, R. (2003). Ontologies for enterprise knowledge management. IEEE Intelligent Systems, 18(2), 26-33.
Maes, S., Tuyls, K., & Manderick, B. (2001). Modeling a multi-agent environment combining influence diagrams. M. Mohammadian (Ed.), Intelligent Agents, Web Technologies and Internet Commerce, IA WTIC2001, Las Vegas, NV.
Mahler, T. (Ed.). (2005). Report on legal issues (Tech. Rep. D15). Oslo, Norway: TrustCoM EU IST Project 01945.
Mahler, T., & Vraalsen,F. (2005). Legal risk analysis with respect to IPR in a collaborative engineering virtual organization. In Proceedings of the6thIFIP Working Conference on Virtual Enterprises (PRO-VE 2005). Valencia, Spain.
Maidak, B.L.,Olsen, G.J.,Larsen, N.,Overbeek, R.,Mc-caughey, M.J., & Woese, C.R. (1996). The ribosomal database project (RDP). Nucleic Acids Research, 24, 82-85.
MailFrontier. (2005). MailFrontier Phishing IQ Test II. Retrieved October 5, 2005, from http://surveymailfrontier.com/survey/quiztest.html
Maizlish, B., and R. Handler (2005). IT portfolio management step-by-step: unlocking the business value of technology. Hoboken, NJ, John Wiley & Sons.
Majithia, S.,Walker, D. W., & Gray, W.A. (2004). A frame-workfor automated service composition in service-oriented architectures (pp. 269-283). ESWS.
Malone, T.W., & Crowston, K. (1995). The interdisciplinary study of coordination. ACM Computing Survey, 26(1), 87-119.
Mamdami, E.H. (1977). Applications of fuzzy logic to approximate reasoning using linguistic systems. IEEE Trans. On Systems, Man, and Cybernetics, 26(12), 1182-1191.
Mamdami, E.H., & Gaines, B.R. (Eds.). (1981). Fuzzy reasoning and its applications. London: Academic Press.
Man, H., de Queiroz, R., & Smith, M. (2002). Three-dimensional subband coding techniques for wireless video communications. IEEE Transactions on Circuits and Systems for Video Technology, 12(3), 386-397.
Man, S.,Hong, D., & Matthews, M. (2003). A shoulder-surfing resistant graphical password scheme – WIW. In Proceedings of the International Conference on Security and Management, 105-111.
Man, S.,Hong, D.,Hayes, B., & Matthews, M. (2004). A password scheme strongly resistant to spyware. In Proceedings of the International Conference on Security and Management, 94-100.
Mangina, E. (2002). Review of software products for multi-agent systems. AgentLink, software report 2002.
Manjunath, R., & Gurumurthy, K. S. (2002). System design using differentially fed Artificial Neural networks. TENCON’02.
Manjunath, R., & Gurumurthy, K. S. (2004). Hyperplanes Generation Through
Manjunath, R., & Gurumurthy, K. S. (2005a). Bayesian estimator with differential feedback4. MWSCAS.
Manjunath, R., & Gurumurthy, K. S. (2005b). Learning algorithm with DANN. In Encyclopedia of Database Technologies and Applications. Hershey, PA: Idea Group.
Manjunath,R. (2006). Compact architecture for the analysis and processing of subnet signals using differentiators as building blocks. Unpublished doctoral dissertation, University of Bangalore, India.
Manna, Z., & Pnueli, A. (1983). How to cook a temporal proof system for your pet language. Proceedings of 10th Ann. ACM Symp. on Principles of Programming Language (pp. 141-154).
Manna, Z., & Pnueli, A. (1992). The temporal logic of reactive and concurrent systems: Specification. Springer-Verlag.
Mannan, M., & van Oorschot’ (2005,November). On instant messaging worms, analysis and countermeasures. In Proceedings of the 2005 ACM Workshop on Rapid Malcode.
Mannila, H.,Toivonen, H., & Verkamo, A. (1994). Improved methods for finding association rules. In Proceedings of the AAAI Workshop on Knowledge Discovery (pp. 181-192). Finland.
Manuel CASTELLS, End of Millennium, Blackwell Publishers, 1998
Manuel CASTELLS, The Power of Identity, Blackwell Publishers, 1997
Manuel CASTELLS, The Rise of the Network Society, Blackwell Publishers, 1996
Maojo, V. (2004). Domain specific particularities of data mining: Lessons learned. Paper presented at the ISB-MDA.
Marakas, M.G. (2003). Modern data warehousing, mining, and visualization core concepts. Prentice Hall.
Marco, D. (2000). Building and managing the meta data repository: a full lifecycle guide. New York, John Wiley & Sons.
Marco, D. (2003). “Meta data repository: a system that manages our systems.” The Data Administration Newsletter (#23). http://www.tdan.com
Marco, D., and M. Jennings (2004). Universal meta data models. Indianapolis, John Wiley & Sons.
Marina, M.K., & Das, S.R. (2001). On-demand multipath distance vector routing in ad hoc networks. Proceedings of the International Conference for Network Protocols (ICNP), Riverside, CA, November 11-14 (pp. 14-23). Washington, DC: IEEE Computer Society.
Marina, M.K., & Das, S.R. (2001). Performance of route caching strategies in dynamic source routing. Proceed ings of the International Works hop on Wireless Networks and Mobile Computing (WNMC) in Conjunction with International Conference on Distributed Computing Systems (ICDCS), Phoenix, Arizona, April 16-19 (pp. 425-432). Los Alamitos, CA: IEEE Computer Society.
Marina, M.K., & Das, S.R. (2003). Ad-hoc on-demand multipath distance vector routing. Technical Report, Computer Science Department, Stony Brook University.
Markman, A.B., & Gentner, D. (2001). Thinking. Annual Review of Psychology, 52(1), 223-247.
Markovski, J., & Gusev, M. (2003, April). Application level security of mobile communications (pp. 309 – 317). In Proceedings of the 1st International Conference Mathematics and Informatics for Industry MII 2003. Thessaloniki, Greece.
Marlin, J. D. A. (2005). CE and DRM technology leaders to create a DRM toolkit for consumer devices. Retrieved January 26, 2006, from http://www.intertrust.com/main/news/2003_2005/050119_marlin.html
Marques, P, Fonseca, R., Simões, P, Silva, L., & Silva, J. (2002a). A component-based approach for integrating mobile agents into the existing Web infrastructure. In Proceedings of the 2002 IEEE International Symposium on Applications and the Internet (SAINT’2002). Nara, Japan: IEEE Press.
Marques, P, Santos, P, Silva, L., & Silva, J.G. (2002b). Supporting disconnected computing in mobile agent systems. Proceedings of the 14th International Conference on Parallel and Distributed Computing and Systems (PDCS2002). Cambridge, MA.
Marques, P, Simões, P, Silva, L., Boavida, F., & Gabriel, J. (2001). Providing applications with mobile agent technology. Proceedings of the 4th IEEE International Conference on Open Architectures and Network Programming (OpenArch’01), Anchorage, AK.
Marques, P. (2003). Component-based development of mobile agent systems. Unpublished doctoral dissertation, Faculty of Sciences and Technology of the University of Coimbra, Portugal.
Martens, R. (2001). TEEMA TRLabs execution environment for mobile agents. Regina, Saskatchewan, Canada: TRLabs.
Marti, S., Giuli, T.J., Lai, K., & Baker, M. (2000). Mitigating routing misbehavior in mobile ad-hoc networks. Proceedings of the 6th International Conference on Mobile Computing and Networking (MobiCom), Boston, MA, August 6-11 (pp. 255-265). ISBN 1-58113-197-6. ACM Press.
Martin CAMPBELL-KELLY and William ASPRAY, Computer, a History of the Information Machine, BasicBooks, HarperCollins, 1996
Martin, D.,Paolucci, M.,McIlraith, S.,Burstein, M.,McDermott, D.,McGuinness, D., et al.(2004). Bringing semantics to Web services: The OWL-S approach. In Proceedings of the 1st International Workshop on Semantic Web Services and Web Process Composition. San Diego, California.
Martin, J. (1989). Information engineering book II: planning & analysis. Englewood Cliffs, NJ, Prentice Hall.
Masseglia, F.,Poncelet, P., & Cicchetti, R. (1999). An efficient algorithm for web usage mining. Networking and Information Systems Journal (NIS), 2(5-6), 571-603.
Masseglia, F.,Tanasa, D., & Trousse, B. (2004). Web usage mining: Sequential pattern extraction with a very low support. In Advanced Web Technologies and Applications: 6th Asia-Pacific Web Conference, APWeb 2004, vol. 3007 (pp. 513-522). Hangzhou, China: Springer-Verlag.
Massey, A.P., Khatri, V., & Ramesh, V. (2005). From the Web to the wireless Web: Technology readiness and usability. Paper presented at the 38th Hawaii International Conference on System Sciences, Hilton Waikoloa Village, Hawaii, January 3-6 (p. 32b). IEEE Computer Society.
Mathoff, J., Van Hoe, R., & Apeall. (1996). A multi agent approach to interactive learning environments. Proceedings of European Workshop on Modelling Autonomous Agents, MAAMAW, 6. Berlin: Springer Verlag.
Mathwick, C., Malhotra, N., & Rigdon, E. (2001). Experiental value: Conceptualization, measurement and application in the catalog and Internet shopping environment. Journal of Retailing, 77(1), 39-56.
Matsumoto, T. (1996, March). Human-computer cryptography: An attempt. In Proceedings of the Third ACM Conference on Computer and Communications Security, 68-75.
Matsuzawa, H., & Fukuda, T. (2000). Mining structured association patterns from databases. PAKDD, LNAI 1805, 233-244.
Mattison, R. (1996). Data ware housing strategies, technologies and techniques. Mc-Graw Hill.
Maturana, F., & Norrie, D.H. (1996). Multi agent mediator architecture for distributed manufacturing. Journal of Intelligent Manufacturing, 7, 257-270.
Maxam, A.M., & Gilbert, W. (1977). A new method for sequencing DNA. In Proceedings of National Academic of Science, 74 (pp. 560-564).
McBride, B. (2002). Jena: A Semantic Web toolkit. IEEE Internet Computing, November /December, 55-59.
McCamley, P. (2000). Companion to safer by design. Evaluation, Document 2, NSW Police Service, p. 36.
McCann, J.A., & Huebscher, M.C. (2004, October). Evaluation issues in autonomic computing. Proceedings of the 3rd International Conference on Grid and Cooperative Computing (GCC).
McCanne, S.,Leres, C, & Jacobson, V. (1998). Tcpdump 3.4 documentation. Retrieved December 19, 2005, from http://tcpdump.org
McCarthy, J., & Anagnost, T. (1998). Musicfx: An arbiter of group preferences for computer supported collaborative workouts. Proceedings of Conference on Computer Supported Cooperative Work (pp. 363-372).
McCarthy, K., McGinty, L., Smyth, B., & Reilly, J. (2005a). On the evaluation of dynamic critiquing: a large-scale user study. Proceedings 20th National Conference on Artificial Intelligence, (pp. 535-540). Menlo Park, CA: AAAI Press/The MIT Press.
McCarthy, K., Reilly, J., McGinty, L., & Smyth, B. (2004a). On the dynamic generation of compound critiques in conversational recommender systems. In P. De Bra (Ed.), Proceedings of the Third International Conference on Adaptive Hypermedia and Web-Based Systems (AH-04) (pp. 176-184). Springer.
McCarthy, K., Reilly, J., McGinty, L., & Smyth, B. (2004b). Thinking positively-Explanatory feedback for conversational recommender systems. Proceedings of the European Conference on Case-Based Reasoning (ECCBR-04) Explanation Workshop (pp. 115-124). Springer.
McCarthy, K., Reilly, J., McGinty, L., & Smyth, B. (2005b). Generating diverse compound critiques. Artificial Intelligence Review, 24(3-4), 339-357.
McCarthy, K., Salamó, M., Coyle, L., McGinty, L., Smyth, B., & Nixon, P. (2006a). Group recommender systems: A critiquing based approach. In C.Paris & C.Sidner (Eds.), Proceedings of the 10th International Conference on Intelligent User Interfaces (pp. 267-269). New York: ACM Press.
McCarthy, K., Salamó, M., McGinty, L., & Smyth, B. (2006b). CATS: A synchronous approach to collaborative group recommendation. Proceedings of the 19th International Florida Artificial Intelligence Research Society Conference (pp. 86-91). Menlo Park, CA: AAAI Press.
McClure, C. (1989). CASE is software automation. Englewood Cliffs NJ, Prentice Hall.
McConnell, S. (1996). Rapid development: taming wild software schedules. Redmond, WA, Microsoft Press.
McConnell, S. (1996). Rapid development: Taming wild software schedules. Redmond, WA: Microsoft Press.
McConnell, S. (1998). Software project survival guide. Redmond, WA, Microsoft Press.
McConnell, S. (1999). After the gold rush: creating a true profession of software engineering. Redmond, WA, Microsoft Press.
McCullough, J. (2004). 185 wireless secrets: Unleash the power of PDAs cell phones, and wireless networks. Indianapolis, IN: Wiley Publishing, Inc.
McFarlan, F. W. (1981). “Portfolio approach to information systems.” Harvard Business Review (September-October 1981): 142-150.
McGinty, L., & Smyth, B. (2002). Comparison-based recommendation. In Susan Craw (Ed.), Proceedings of the 6th European Conference on Case-Based Reasoning (pp. 575-589). Springer.
McGinty, L., & Smyth, B. (2003a). On the role of diversity in conversational recommender systems. In K. Ashley & D.Bridge (Eds.), Proceedings 5th International Conference on Case-Based Reasoning (pp. 276-291). Springer.
McGinty, L., & Smyth, B. (2003b). Tweaking critiquing. Proceedings of the Workshop on Personalization and Web Techniques at the International Joint Conference on Artificial Intelligence (pp. 20-27). Morgan Kaufmann.
McGuinness, D.L., & Harmelen, F.V. (2005). OWL Web ontology language overview. Retrieved Feburary 2005, from http://www.w3.org/TR/owl-features/
McGuinness, D.L.,van Harmelen F. (2004). OWL Web ontology language overview, W3C Recommendation. Retrieved February 10, 2004, from http://www.w3.org/TR/owl-features/
Mckusick, V.A. (1998). Mendelian inheritance in man: A catalog of human genes and genetic disorders. Baltimore: Johns Hopkins University Press.
McSherry, D. (2002). Diversity-conscious retrieval. Proceedings of the 6th European Conference on Case-Based Reasoning (pp. 219-233). Springer.
McSherry, D. (2003). Increasing dialogue efficiency in case-based reasoning without loss of solution quality. Proceedings of the 18th International Joint Conference on Artificial Intelligence (pp. 121-126). Morgan Kaufmann.
McSherry, D. (2003). Similarity and compromise. In A. Aamodt, D.Bridge, & K.Ashley (Eds.), ICCBR 2003, 5th International Conference on Case-Based Reasoning (pp. 291-305). Trondheim, Norway.
McSherry, D., & Stretch, C. (2005). Automating the Discovery of Recommendation Knowledge. In Proceedings of the 19th International Joint Conference on Artificial Intelligence (pp. 9-14). Morgan Kaufmann.
MEDIS technical report, (n.d.). Retrieved September 28, 2005, from http://www.imp.bg.ac.yu/dokumenti/MEDIS-TechnicalReport.doc
Meersman, R.A. (2004). Foundations, implementations and applications of Web semantics. Parts 1, 2, 3, lectures at School of Information Systems.
MEHARI. (2004, December). Harmonized method for risks analysis: Principles and mechanisms (CLUSIF, version 3). Retrieved from http://www.clusif.asso.fr/fr/production/mehari
Meier, F.W., Schuster, G.M., & Katsaggelos, A.K. (2000). A mathematical model for shape coding with B-splines. Signal Processing: Image Communications, 15(7-8), 685-701.
Meier, M.,Bischof, N., & Holz, T. (2002). SHEDEL – A simple hierarchical event description language for specifying attack signature. IFIP TC1117th International Conference on Information Security: Visions and Perspectives, 559-571.
Mendel, J.M. (2001). Uncertain rule-based fuzzy logic systems. NJ: Prentice Hall.
Mervis, C.B., & Rosch, E. (1981). Categorization of natural objects. Annual Review of Psychology, 32, 89-115.
Merwe, A. V. D.,Loock, M., & Dabrowski, M. (2005). Characteristics and responsibilities involved in a phishing attack. In Proceedings of the Fourth International Symposium on Information and Communication Technologies, 249-254.
Messai, R.,Simonet, M., & Mousseau, M. (2006). A breast cancer terminology for lay people. European Journal of Cancer EJC Supplements. 4(2), 179-180.
Meyer, U., & Wetzel, S. (2004). On the impact of GSM encryption and man-in-the-middle attacks on the security of interoperating GSM/UMTS networks. In the 15th IEEE International Symposium on Personal, Indoor and Mobile Radio Communications (PIMRC 2004), 4, Barcelona, Spain, September 5-8 (pp. 2876-2883). USA: IEEE. Retrieved July 12, 2005, from http://www.cdc.informatik.tu-darmstadt.de/~umeyer/UliPIMRC04.pdf
Meyer, U., & Wetzel, S. (2004, September 5-8). On the impact of GSM encryption and man-in-the-middle attacks on the security of interoperating GSM/UMTS networks. The 15th IEEE International Symposium on Personal, Indoor and Mobile Radio Communications (PIMRC 2004), Barcelona, Spain. Retrieved February 5, 2006, from http://www.cdc.informatik.tu-darmstadt.de/~umeyer/UliPIMRC04.pdf
Michael DERTOUZOS, The Unfinished Revolution, HarperCollins, 2001
Michael DERTOUZOS, What Will Be, HarperCollins, 1997
Michael LEWIS, The New New Thing, a Silicon Valley Story, W.W. Norton & Company, 2000
Michel, C, & Me, L. (2001). ADeLe: An attack description language for knowledge-based intrusion detection systems. IFIP TC11 International Conference on Information Security, 353-368.
Michiardi, P., & Molva, R. (2002). CORE: A collaborative reputation mechanism to enforce node cooperation in mobile ad hoc networks. Proceedings of the IF IP TC6/TC11 Sixth Joint Working Conference on Communications and Multimedia Security, Portoroz, Slovenia, September 26-27 (pp. 107-121). ISBN 1-4020-7206-6. Berlin: Springer.
Michiardi, P., & Molva, R. (2002). Simulation-based analysis of security exposures in mobile ad-hoc networks. Proceedings of the European Wireless Conference.
Microsoft and IBM white paper. (2005). Security in Web service world: A proposed architecture and roadmap. Retrieved September 28, 2005, from http://www-128.ibm.com/developerworks/webservices/library/ws-secmap
Microsoft Corporation (2005). Visual Studio 2005 team system modeling strategy and FAQ. http://msdn.microsoft.com/vstudio/default.aspx?pull=/library/en-us/dnvs05/html/vstsmodel.asp
Microsoft. (2002). NET Passport: Balanced authentication solutions. Retrieved December 1, 2002, from http://www.passport.com
Microsoft. (2003). Windows 2000 security event descriptions. Retrieved December 2005, from http://support.micro-soft.com/default.aspx?scid=kb;EN-US;299475#kbl
Microsoft. (2004). NET Passport review guide. Retrieved January 1, 2004, from http://www.passport.com
Microsoft. (2005). The abstract state machine language. Retrieved December 2005, from http://research.microsoft.com/fse/asml/docu.aspx
Microsoft. (2005).Retrieved on July 7, 2006, from http://www.microsoft.com/athome/security/spywarewhat.msx
Microsoft. (2005, November) Microsoft developer network library. Retrieved November 2005 from http://msdn.microsoft.com/library/
Microsoft. (2006). Microsoft exchange server. Retrieved April 27, 2006, from http://www.microsoft.com/exchange/
Microsoft. (2006). Network Security for the Windows Mobile Software Platform. Microsoft White Paper. Retrieved July 17, 2006, from http://www.microsoft.com
Middleton, S.E.,Shadbolt, N.R. & Roure, D.C.D. (2003). Capturing interest through inference and visualization: Ontological user profiling in recommender systems. In International Conference on Knowledge Capture KCAP’03, (pp. 62-69). New York: ACM Press.
Miles, A., & Brichley, D. (2005). SKOS Core GuideWSC Working Draft. Retrieved May 10, 2005, from http://www.w3.org/TR/swbp-skos-core-guide/
Milito, R. A. (2006). The inside-out approach to infection control. EDPACS, 2006(33), 9-14.
Miller, G.A. (1988). Nouns in WordNet. In C. Fellbaum (Ed.), WordNet. An electronic lexical database (pp. 23-46). MIT Press.
Miller, H. J., & Han, J. (2001). Fundamentals of spatial data warehousing for geographic knowledge discovery. Geographic Data Mining and Knowledge Discovery, 51-72.
Mills, D. (2006). Semantic waves 2006. Retrieved from http://www.ift.ulaval.ca/~kone/Cours/WS/WS-Plan-Cours2006.pdf
Milojicic, D., Chauhan, D., & la Forge, W. (1998). Mobile objects and agents (MOA), design, implementation and lessons learned. Proceedings of the 4th USENIX Conference on Object-Oriented Technologies (COOTS’98), Santa Fe, NM.
Ministry of Internal Affairs and Communications, Japan. (2005, May). Tokyo Ubiquitous Networking Conference: Program (Session 5) Ubiquitous Network Society, Tokyo, Japan, May 16-17. Retrieved May 12,2006, from: http://www.wsis-japan.jp/session5_e.html
Ministry of Internal Affairs and Communications, Japan. (2005, May). Towards realisation of ubiquitous networking society. Tokyo Ubiquitous Networking Conference, Tokyo, Japan, May 16-17. Retrieved May 12, 2006, from http://www.wsis-japan.jp/about_e.html
Minsky, M. (1985). The society of mind. New York: Simon and Schuster.
Minton, G.C., & Scheneider, F.W. (1980). Differential psychology. Prospect Heights, IL: Waveland Press.
MIP. Retrieved June 1, 2005, from opensource.nus.edu.sg/projects/mobileip/mip.html
Missikoff, M.,Velardi, P., & Fabriani, P. (2003). Text mining techniques to automatically enrich a domain ontology. Applied Intelligence, 18(3), 323-340.
MITA. (2002). Mobile Internet technical architecture: The complete package. Nokia, Finland, ISBN 951-826-669-7.
Miyazaki, S.,Sugawara, H.,Gojobori, T., & Tateno, Y. (2003). DNA Databank of Japan (DDBJ). Nucleic Acids Research, 31, 13-16.
Mizoguchi, M. et al. (1998). A fast burst synchronization scheme for OFDM. Proc ICUPC 98, Florence, Italy (pp. 125-129). New York: IEEE.
Mizutani, E., & Jang, J.S.R. (1995). Coactive neural fuzzy modeling. Proceedings of the International Conference on Neural Networks, 760-765.
Mizutani, E., Jang, J.S. R., Nishio, K., Takagi, H., & Auslander, D.M. (1994). Coactive neural networks with adjustable fuzzy membership functions and their applications. Proceedings of the International Conference on Fuzzy Logic and Neural Networks, 581-582.
Mladenic, D. (1998). Turning Yahoo into an automatic web page classifier. In Proceedings of the 13th European Conference on Artificial Intelligence (pp. 473-474).
MNET. Retrieved June 1, 2005, from http://mosquitonet.stanford.edu/
Mobile Broadcast/Multicast Service (MBMS). (2004, August). White Paper, TeliaSonera. Retrieved July 11, 2005, from http://www.medialab.sonera.fi/workspace/MBMSWhitePaper.pdf
Mobile. (2007). Mobile computing. Retrieved May 2007, from http://searchmobilecomputing.techtarget.com/sDefinition/0,,sid40_gci506042,00.html
MobileCloakTM Portal. Retrieved July 20, 2006, from http://www.mobilecloak.com/
MobileCloakTM Web Portal. (2005). Retrieved July 11, 2005, from http://www.mobilecloak.com
Mobiquitous (2005). Retrieved December 2005, from http://www.mobiquitous.org/2005/challenges.html
Montemerlo, M., Roy, N., & Thrun, S. (2003). Perspectives on standardization in mobile robot programming: The Carnegie Mellon navigation (CARMEN) toolkit. Proceedings of the Conference on Intelligent Robots and Systems (IROS).
Moon, J.-W., & Kim, Y.-G. (2001). Extending the TAM for a World-Wide-Web context. Information & Management, 38(4), 217-230.
Moore, B. (1996). Acceptance of information technology by health care professionals. Proceedings of the 1996 Symposium on Computers and the Quality of Life (pp. 57-60). Retrieved August 9, 2003, from Association for Computing Machinery Digital Library Database.
Moreau, C.P., Lehmann, D.R., & Markman, A.B. (2001). Entrenched knowledge structures and consumer response to new products. Journal of Marketing Research, 38(1), 14-29.
Moreau, L. (2002). Agents for the grid: A comparison with Web services (Part I: transport layer). Proceedings of 2nd IEEE/ACM International Symposium on Cluster Computing and the Grid (pp. 220-228).
Moreau, L. (2003). On the use of agents in a bioinformatics grid. Proceedings of 3rd IEEE/ACM International Symposium on Cluster Computing and the Grid.
Morel, B., & Alexander, P.A. (2003). Slicing approach for parallel component adaptation. The 10th IEEE International Conference and Workshop on the Engineering of Computer-Based Systems (pp. 108-114). Retrieved May 20, 2003, from http://ieeexplore.ieee.org
Moreno, A. (2003). Medical applications of multi-agent systems. Paper presented at the 2003 Intelligent and Adaptive Systems in Medicine Workshop, Praha, Czech Republic. Retrieved September 21, 2004, from http://cyber.felk.cvut.cz/EUNITE03-BIO/pdf/Moreno.pdf
Morgan, D.L., & Krueger, R.A. (1993). When to use focus groups and why. In D.L.Morgan (Ed.), Successful focus groups (pp. 1-19). London: Sage Publications.
Mori, K. (1993). Autonomous decentralized systems: Concept, data field architecture and future trends. Proceedings of the 1st International Symposium on Autonomous Decentralized Systems (ISADS93) (pp. 28-34). IEEE.
Mori, R., & Kawahara, M. (1990, July). Superdistribution: The concept and the architecture. Transaction of the IEICE, E73(7), 1133-1146.
Mori, R., & Tashiro, S. (1987, January). The concept of software service system (SSS). Transaction of the IEICE, J70(D1), 70-81.
Morin, J.-H., & Pawlak, M. (2005a, December 11). Towards a global framework for corporate and enterprise digital policy management. In Proceedings of the SoftWars Conference on Protecting the Intangible Organizational Assets, Las Vegas, NV.
Morin, J.-H., & Pawlak, M. (2005b, December 10). Acredential based approach to managing exceptions in digital rights management systems. In Proceedings of Fourth Pre-ICIIS Academic Workshop AIM on New trends in IT and New Challenges in IT Regulation, Las Vegas, NV.
Morreale, P. (1998, April). Agents on the move. IEEE Spectrum.
Morris, C.W. (1938/1970). Foundations of the theory of signs. Chicago University Press.
Moskowitz, R., & Nikander, P. (2006). Host Identity Protocol (HIP) Architecture. RFC 4423, IETF.
Moss & Davidson. (Eds.). (2001). Multi agent based simulation, LNAI Vol. 1979. Berlin: Springer.
MPEG. Retrieved June 1, 2005, from http://mpeg4ip.sourceforge.net/faq/index.php
MPEG-21. (2002). MPEG-21 multimedia framework. Retrieved January 26, 2006, from http://www.chiariglioneorg/mpeg/standards/mpeg-21/mpeg-21.htm
MPEG-RDD. (2004). Multimedia framework (MPEG-2T)-Part 6: Rights data dictionary. Retrieved January 26, 2006, from http://www.iso.ch/iso/en/CombinedQueryResult.CombinedQueryResult?queryString=21000-6
MPEG-REL. (2004). Multimedia framework (MPEG-21)-Part 5: Rights expression language. Retrieved January 26, 2006, from http://www.iso.ch/iso/en/CombinedQueryResult.CombinedQueryResult?queryString=21000-5
Muller, T. (1999). Bluetooth Security Architecture. White Paper. Retrieved July 20,2006, from http://www.bluetooth.com/Bluetooth/Apply/Technology/Research/BluetoothSe-curity_Architecture.htm
Muller, T. (1999). Bluetooth security architecture: Version 1.0. Bluetooth White Paper, Document # 1.C.116/1.0. Retrieved September 26, 2007, from http://www.bluetooth.com/NR/rdonlyres/C222A81E-D9F9-48CA-91DE-9C81F5C8B94F/0/Security_Architecture.pdf
Müller-Hengstenberg, C. D. (2005). Der Vertrag als Mittel des Risikomanagements. Ein Pladoyer fur die dynamische Projektbegleitung im Vertrag. Computer und Recht, 5, 385-392.
Muñoz, M., & Rubio, C.G. (2004). A new model for service and application convergence in B3 G/4 G networks. IEEE Wireless Communications, 35(5), 539-549.
Muñoz, M., Gonzalez, V., Rodríguez, M., & Favela, J. (2003). Supporting context-aware collaboration in a hospital: An ethnographic informed design. Lecture Notes in Computer Science, 2806, 330-344.
Muñoz, M.A., Rodriguez, M., Favela, J., MartinezGarcia, A.L., & Gonzalez, V. (2003). Context-aware mobile communication in hospitals. Computer IEEE, 36(9), 38-46.
Murakami, T. (2004, August 1). NRI papers: Ubiquitous networking: Business opportunities and strategic issues (pp. 1-24). NRI Papers No. 79. Japan: Nomura Research Institute.
Murphy, A.L., Picco, G.P., & Roman, G.C. (2001, May). Time: A middleware for physical and logical mobility. Proceedings of the 21st International Conference on Distributed Computing Systems., April (pp. 524-533).
Murphy, R.R. (2002). Introduction to AI Robotics. MIT Press.
Murphy, R.R., & Hershberger, D. (1996). Classifying and recovering from sensing failures in autonomous mobile robots. AAAI/IAAI, 2, 922-929.
Murthy, M., & Garcia-Luna-Aceves, J.J. (1995). A routing protocol for packet radio networks. Proceedings of the 1st Annual International Conference on Mobile Computing and Networking (MobiCom), Berkeley, CA, November 13-15 (pp. 86-95). ISBN 0-89791-814-2. New York: ACM Press.
Murty, K.G. (1978). Computational complexity of complementary pivot methods. In Mathematical programming study: vol. 7. Complementary and fixed point problems (pp. 61-73). Amsterdam: North-Holland Publishing Co.
Murzin, A.G.,Brenner, S.E.,Hubbard, T., & Chothia, C. (1995). SCOP: A structural classification of proteins database for the investigation of sequences and structures. Journal of Molecular Biology, 247, 536-540.
Mustafa, M. (1994). Methodology of inductive learning: Structural engineering application. Unpublished doctoral dissertation, Wayne State University, Detroit, MI.
Mustapha, N.,Aufaure, M-A., & Baazhaoui-Zghal, H. (2006). Towards an architecture of ontological components for the semantic web. In Proceedings of Wism (Web Information Systems Modeling) Workshop, CAiSE 2006, Luxembourg (pp. 22-35).
Mutz, D.,Vigna, G., & Kemmerer, R. (2003). An experience developing an IDS Stimulator for the black-box testing of network intrusion detection systems. In Proceedings of the 19,th Annual Computer Security Applications Conference (ACSAC 2003).Los Alamitos, CA: IEEE Computer Society Press.
Myers, D. (2004). Mobile video telephony. New York: McGraw-Hill Professional.
MyGrid project. (2001). Retrieved from http://www.mygrid.org.uk/
Myles, G., Friday, A., & Davies, N. (2003, January- March). Preserving privacy in environments with location-based applications. IEEE Pervasive Computing, 2(1), 56-64.
Nagumo, T. (2002, June 1). NRI papers: Innovative business models in the era of ubiquitous networks (pp. 1-13). NRI Papers No. 49. Japan: Nomura Research Institute.
Nakagawa, M., & Mobasher, B. (2003). Impact of site characteristics on recommendation models based on association rules and sequential patterns. In Proceedings of the IJCAI’03 Workshop on Intelligent Techniques for Web Personalization, Acapulco, Mexico.
Nake, F. (2002). Data, information, and knowledge: A semiotic view of phenomena of organization. In E. Liu, R.J. Clarke, P.B. Andersen, R. Stamper, & E.S. Abou-Zeid (Eds.), Organizational semitiocs: Evolving a science of information systems (pp. 41-50). London: Kluwer Academic Publishers.
Namboodiri, A.M., & Jain, A.K. (2004). On-line handwritten script recognition. IEEE Trans. on Pattern Analysis and Machine Intelligence, 26(1), 124-130.
Nanda, S., & Pearlman, W.S. (1992). Tree coding of image subbands. IEEE Transactions on Signal Processing, 1(2), 133-147.
Nanny. (2004, March 18). Police investigation of nanny widens. Retrieved January 30,2006, from http://www.sfgate.com/cgi-bin/article.cgi?file=/chronicle/archive/2004/03/18/BAG6S5MUE01.DTL
Narayan, R. (1988). Data dictionary: implementation, use, and maintenance. Prentice Hall mainframe software series. Englewood Cliffs, NJ, Prentice Hall.
Narayanan, A.,Keedwell, E.C., & Olsson, B. (2002). Artificial intelligence techniques for bioinformatics. Applied Bioinformatics, 1, 191-222.
Narula, A., & Lim, J.S. (1993). Error concealment techniques for an all-digital high-definition television system. In Proc. SPIE Conf. Visual Commun. and Image Proc., Chicago, IL, May (pp. 304-315).
Nasir, A., & Mah-Rukh, M.-R. (2006). Internet mobility using SIP and MIP. Proc. Third International Conference on Information Technology: New Generations ITNG’06, Las Vegas, NV, April 10-12 (pp. 334-339). USA: IEEE Computer Society.
Naur, P., & Randell, B. (1969). Software engineering: Report of a conference sponsored by the NATO Science Committee, Garmisch, Germany, 1968. Brussels, Belgium: NATO, Scientific Affairs Division.
Navakitkanok, P., & Aramvith, S. (2004). Improved rate control for advanced video coding (AVC) standard under low delay constraint. International Conference on Information Technology: Coding and Computing (ITCC’04), 2, Las Vegas, NV, April 5-7 (p. 664). Washington, DC: IEEE Computer Society.
Navigli, R., & Velardi, P. (2004). Learning domain ontologies from document warehouses and dedicated web sites. Computational Linguistics, 30(2), 151-179.
Nealon, J., & Moreno, A. (2003). Agent-based applications in health care. Paper presented at the 2003 EU-LAT Workshop, Mexico. Retrieved September 21, 2004, from http://www.etse.urv.es/recerca/banzai/toni/MAS/papers.html
Nelson, J. (1999). Programming mobile objects with Java. John Wiley & Sons.
NetStumbler. (2006). Retrieved December 10, 2006, from http://www.netstumbler.com
Nevis Network. (2006). Stopping malware spread from untrusted hosts. Retrieved July 7, 2006, from http://www.nevisnetworks.com
Newell, A., & Simon, H. (1972). Human problem solving. Englewood Cliffs, NJ: Prentice Hall.
Ng, R.T., & Han, J. (1994). Efficient and effective clustering methods for spatial data mining. In Proceedings of International Conference on Very Large Databases (VLDB’94) (pp. 144-155). Santiago, Chile.
Ng, S.K., & Wong, L. (2004). Accomplishments and challenges in bioinformatics. IT Professional, 6, 44-50.
Ngan, K.N., & Chooi, W.L. (1994). Very low bit rate video coding using 3D subband approach. IEEE Transactions on Circuits and Systems for Video Technology, 4(3), 309-316.
Nguyen, Q.N., Ricci, F., & Cavada, D. (2004). User preferences initialization and integration in critique-based mobile recommender systems. Proceedings of Artificial Intelligence in Mobile Systems 2004, in conjunction with UbiComp 2004 (pp. 71-78). Universitat des Saarlandes Press.
NHS. (2004). Allied health professionals. Retrieved April 24, 2006, from http://www.nhscareers.nhs.uk
Nielsen, B.,Ren, S., & Agha, G. (1998). Specification of real-time interaction constraints. International Symposium on Object-Oriented Real-Time Distributed Computing, 206-214.
Nigam, K.,McCallum, A.K.,Thrun, S., & Mitchell, T.M. (2000). Text classification from labeled and unlabeled documents using EM. In Machine Learning, 39(2-3) 103-134.
Nikaein, N., Bonnet, C., & Nikaein, N. (2001). HARP: Hybrid ad hoc routing protocol. Proceedings of the International Symposium on Telecommunications (IST), Tehran, Iran, September 1-3.
Nikaein, N., Labiod, H., & Bonnet, C. (2000). DDR: Distributed dynamic routing algorithm for mobile ad hoc networks. Proceedings of the 1st Annual Workshop on Mobile and Ad Hoc (MobiHoc), Boston, MA, August 11 (pp. 19-27). Piscataway, NJ: IEEE Press.
Nikander, P. (2001). Denial-of-service, address ownership, and early authentication in the IPv6 world. Retrieved May 10, 2006, from http://www.tml.tkk.fi/~pnr/publications/cam2001.pdf
Nikander, P., Ylitalo, J., & Wall, J. (2003). Integrating security, mobility, and multi-homing in a HIP way. Proceedings of Network and Distributed Systems Security Symposium (NDSS’03), San Diego, USA, February (pp. 87-99). Reston, USA: Internet Society.
Niles, I., & Pease, A. (2001). To ward a Standard Upper Ontology. In Proceedings of the 2nd International Conference on Formal Ontology in Information Systems (FOIS2001).
Niles, I., & Terry, A. (2004). The MILO: A general-purpose, mid-level ontology. In 2004 International Conference on Information and Knowledge Engineering (IKE’04).
Nilsson, N. (1984). Shakey the robot. (Tech. Rep. No. 325). Menlo Park, CA: SRI International.
Nilsson, U., & Maluszynski, J. (2000). Logic, Programming and prolog (2nd ed.).
Nimmagadda, S. L.,Dreher, H., & Rudra, A. (2005a, August). Ontology of Western Australian petroleum exploration data for effective data warehouse design and data mining. In Proceedings of the 3rd International IEEE Conference on Industry Informatics, Perth, Australia.
Nimmagadda, S. L.,Dreher, H., & Rudra, A. (2006, August). Mapping of oil and gas exploration business data entities for effective operational management. Paper presented in the 4th International Conference in IEEE Industry Informatics, Singapore.
Nimmagadda, S.L., & Dreher, H. (2006, August). Mapping and modeling of oil and gas relational data objects for warehouse development and efficient data mining. Paper presented in the 4th International Conference in IEEE Industry Informatics, Singapore.
Nimmagadda, S.L., & Rudra, A. (2004c). Applicability of data warehousing and data mining technologies in the Australian resources industry. In Proceedings of the 7th International Conference on IT, Hyderabad, India.
Nimmagadda, S.L., & Rudra, A. (2004d). Data sources and requirement analysis for multidimensional database modeling: An Australian Resources Industry scenario. In Proceedings of the 7th International Conference on IT, Hyderabad, India.
Nimmagadda, S.L.,Dreher, H., & Rudra, A. (2005b, August). Data warehouse structuring methodologies for efficient mining of Western Australian petroleum data sources. In Proceedings of the 3rd international IEEE conference on Industry Informatics, Perth, Australia
Nisenson, M., Yariv, I., El-Yaniv, R., & Meir, R. (2003). Towards behaviometric security systems: Learning to identify a typist. In N.Lavra’c et al. (Eds.), PKDD 2003, LNAI 2838 (pp. 363-374). Springer-Verlag, Berlin Heidelberg.
Nokia. (2006). State of workforce mobility. Retrieved May 2007, from http://www.nokia.com/NOKIA_COM_1/About_Nokia/Press/White_Papers/pdf_files/Whitepaper_TheMythsofMobility.pdf
Nolan, R. (1973). “Managing the computer resource: a stage hypothesis.” Communications of the ACM 16(7) (July 1973): 399-405.
Nolan, R., and F. W. McFarlan (2005). “Information technology and the board of directors.” Harvard Business Review (October 2005).
Noma, T., Zhao, L., & Badler, N. (2000). Design of a virtual human presenter. IEEE Journal of Computer Graphics and Applications, 20(4), 79-85.
Norman, M.S., David, W.H., Dag, K., & Allen, T. (1999). MASCOT: an agent-based architecture for coordinated mixed-initiative supply chain planning and scheduling. Proceedings of the Third International Conference on Autonomous Agent (Agents ’99), Seattle, WA.
Norman, T.J., et al. (2004). Agent-based formation of virtual organizations. Knowledge-based Systems, 17, 103-111.
Novacek, V. (1998). Data mining query language for object-oriented database. In Proceedings of the 2nd East European Symposium on Advances in Databases and Information Systems (pp. 278-283). New York: Springer Verlag.
Novak, T.P., Hoffman, D.L., & Yung, Y. (2000). Measuring the customer experience in online environments: A structural modeling approach. Marketing Science, 19(1), 22-42.
Noy, F.N., & McGuinnes, D.L. (2003). Ontology development 101: A guide to create your first ontology. Retrieved 2003 from http://ksl.stanford.edu/people/dlm/papers/ontology-tutorial-noy-mcguinnes.doc
Noy, N. F.,Sintek, M.,Decker, S.,Crubezy, M.,Fergerson, R. W., & Musen, M.A. (2001). Creating Semantic Web contents with Protege-2000. IEEE Intelligent Systems, 16(2), 60-71.
Noy, N.F., & Klein, M. (2004). Ontology evolution: Not the same as schema evolution. Knowledge and Information Systems, 6(4), 428-440.
Ntoulas, A.,Cho, J., & Olston, Ch. (2004). What’s new on the web? The evolution of the web from a search engine perspective. In Proceedings of the 13th InternationalWorld Wide Web (WWW) Conference (pp. 1-12).
Nunes, L., & Oliveira, E. (2003). Cooperative learning using advice exchange. In E.Alonso (Ed.), Adaptive agents and multiagent systems, lecture notes in computer science: Vol 2636 (pp. 33-48). Berlin, Heidelberg, Germany: Springer-Verlag.
Nunes, L., & Oliveira, E. (2005). Advice-exchange between evolutionary algorithms and reinforcement learning agents: Experiments in the pursuit domain. In D.Kudenko, D.Kazakov, & E.Alonso (Eds.), Adaptive agents and multi-agent systems: vol. 2. Adaptation and multi-agent learning (pp. 185-204).
Nwana, H., Nduma, D., Lee, L., & Collis, J. (1999). ZEUS: A toolkit for building distributed Multi-Agent Systems. Artificial Intelligence Journal, 13(1), 129-186.
Nwana, H.S. (1996). Software agents: An overview. Knowledge Engineering Review, 11(3), 1-40.
Nwana, H.S., Lee, L.C., & Jennings, N.R. (1996). Coordination in software agent systems. The British Telecom Technical Journal, 14(4), 79-88.
Nwana, H.S., Rosenschein, J., et al. (1998). Agent-mediated electronic commerce: Issues, challenges and some viewpoints. Proceedings of 2nd ACM International Conference on Autonomous Agents (pp. 189-196).
O’Connell, K.J. (1997). Object-adaptive vertex-based shape coding method. IEEE Transactions on Circuits and Systems for Video Technology, 7(1), 251-255.
O’Connor, M., Cosley, D., Konstan, K., & Riedln, J. (2001). Polylens: A recommender system for Groups of Users. In Proceedings of European Conference on Computer-Supported Cooperative Work (pp. 199-218).
O’Gorman, L. (2003). Comparing passwords, tokens, and biometrics for user authentication. Proceedings of the IEEE: 91(12), 2021-2040.
OASIS. (1993). Organization for the advancement of structured information standards. Retrieved March 28, 2006, from http://www.oasis-open.org/
Object Management Group (2002a). Common Warehouse Metamodel (CWM) specification. http://www.omg.org
Object Management Group (2002b). MetaObject Facility (MOF) specification, Version 1.4. http://www.omg.org
OCP. (2005). The secure video processor (SVP) initiative-SVP open content protection system: Technical overview. Retrieved January 26, 2006, from http://www.svpalliance.org/docs/e2e_technical_introduction.pdf
OCTAVE. (1999, June). Operationally critical threat, asset and vulnerability evaluation (version 2.0). Retrieved from http://www.cert.org/octave/methods
Odell, J., & Burkhart, R. (1998). Beyond objects: Unleashing the power of adaptive agents. Tutorial presented at OOPSLA, Vancouver, B.C.
Odell, J., Paranuk, H.V., & Bauer, B. (2000). Extending UML for agents. Proceedings of the AOIS Workshop at the 17th National Conference on Artificial Intelligence (pp. 3-17). Retrieved from http://www.jamesodell.com/extendingUML.pdf
Odell, J., Van Dyke, Parunak, H., & Bauer, B. (2001). Representing, agent interaction protocols in UML. Proceedings of the 1st International Workshop, AOSE2000 on Agent Oriented Software Engineering (pp. 121-140).
ODRL. (2002). The open digital rights language (ODRL) initiative. Retrieved January 26, 2006, from http://www.odrl.net/
Office of Government Commerce (2000). Service support: service desk and the process of incident management, problem management, configuration management, change management and release management. OGC, ITIL Managing IT Services (Information Technology Infrastructure Library). London, The Stationery Office.
Office of Government Commerce (2001). Service delivery: capacity management, availability management, service level management, IT service continuity, financial management for IT services and customer relationship management. OGC, ITIL Managing IT Services (Information Technology Infrastructure Library). London, The Stationery Office.
Office of Government Commerce (2002a). Application management. OGC, ITIL Managing IT Services (Information Technology Infrastructure Library). London, The Stationery Office.
Office of Government Commerce (2002b). ICT infrastructure management. OGC, ITIL Managing IT Services (Information Technology Infrastructure Library). London, The Stationery Office.
Office of Government Commerce (2002c). Planning to implement IT service management. OGC, ITIL Managing IT Services (Information Technology Infrastructure Library). London, The Stationery Office.
Office of Government Commerce (2003). Software asset management. OGC, ITIL Managing IT Services (Information Technology Infrastructure Library). London, The Stationery Office.
Office of Government Commerce (2004). Business perspective: the IS view on delivering services to the business. OGC, ITIL Managing IT Services (Information Technology Infrastructure Library). London, The Stationery Office.
Office of Government Commerce (2006). Business perspective: the business view. OGC, ITIL Managing IT Services (Information Technology Infrastructure Library). London, The Stationery Office.
Ogier, R., Templin, F., & Lewis, M. (2004, February). RFC 3684 on topology dissemination based on reversepath forwarding (TBRPF). Draft-ietf-manet-tbrpf-11.txt, Internet Draft, Network Working Group.
Ohkawa, H.,Ostell, J., & Bryant, S. (1995). MMDB: An ASN.1 specification for macromolecular structure. In Proceedings of the 3rd International Conference on Intelligent Systems for Molecular Biology. Cambridge, UK: AAAI.
Ohno-machado, L.,Vinterbo, S., & Weber, G. (2002). Classification of gene expression data using fuzzy logic. Journal of Intelligent and Fuzzy Systems, 12, 19-24.
Ohya, T., & Miki, T. (2005). Enhanced-reality multimedia communications for 4 G mobile networks. 1st International Conference on Multimedia Services Access Networks (MSAN ’05), Orlando, FL, June 13-15 (pp. 69- 72). Piscataway, NJ: IEEE Service Center.
Øien, G.E. (1993). L2-optimal attractor image coding with fast decoder convergence. PhD thesis. Trondheim, Norway.
Oinn, T. M.,Addis, M.,Ferris, J.,Marvin, D.,Senger, M.,Greenwood, R. M., et al. (2004). Taverna: A tool for the composition and enactment of bioinformatics workflows. Bioinformatics, 20(17), 3045-3054.
O’Leary, D.E. (2000). Different firms, different ontologies, and no one best ontology. IEEE Intelligent Systems, 72-78.
Olston, C., & Chi, E. (2003). ScentTrails: Intergrading browsing and searching. ACM Transactions on Computer-Human Interaction, 10(3), 1-21.
Olzak, T. (2005). Wireless handheld device security. Retrieved July 11, 2003, from http://www.securitydocs.com/pdf/3188.PDF
Olzak, T. (2005). Wireless Handheld Device Security. Retrieved October 12, 2005, from http://www.securitydocs.com/pdf/3188.PDF
OMA. (2002). Open mobile alliance. Retrieved January 26, 2006, from http://www.openmobilealliance.org/
OMA. (2004). Open mobile alliance. Retrieved January 26, 2006, from http://www.openmobilealliance.org/re-leaseprogram/drmvlO.html
OMA. (2006a). Open mobile alliance. Retrieved January 26, 2006, from http://www.openmobilealliance.org/re-lease_program/drm_v2_0.html
OMA. (2006b). Open mobile alliance. Retrieved January 26, 2006, from http://www.openmobilealliance.org/re-lease_program/drm_v2_0.html
Omair Shafiq, M., Ali, A., Tariq, A., Basharat, A., Farooq Ahmad, H., Suguri, H., et al. (2005). A distributed services based conference planner application using software agents, grid services and Web services. Proceedings of the Fourth International Joint Conference On Autonomous Agents and Multi Agent Systems (AAMAS) (pp. 137-138).
OMC. (2005). Open media commons. Retrieved March 28, 2006, from http://www.openmediacommons.org/
OMC. (2006a). Open media commons FAQ’s. Retrieved March 28, 2006, from http://www.openmediacommons.org/faqs.html
OMC. (2006b). Open media commons releases specifications and source code for open, royalty-free digital rights management. Retrieved March 28,2006, from http://www.openmediacommons.org/news/03212006-omcworkshop_press_release.html
Omelayenko, B. (2000). Integration of product ontologies for B2B marketplaces: A preview. ACMSIGecom Exchanges, 2(1), 19-25.
OMG. (1997). OMG mobile agent systems interoperability facilities specification (MASIF). OMG TC Document ORBOS/97-10-05. Retrieved from http://www.camb.opengroup.org/RI/MAF
OMG. (2000). Mobile agent facility, version 1.0. Formal/00-01-02: Object Management Group.
OMG. (2004). Common object request broker architecture (CORBA)specification4 (Tech. Rep. version3.0.3). Needham, MA: Object Management Group.
OMG. (2005). OCL 2.0 specification (Tech. Rep. version 2). Needham, MA: Object Management Group. Ostroff, J. S. (1992). Formal methods for the specification and design of real-time safety critical systems. Journal of Systems and Software, 18(1), 33-60.
OMG. (2005). Unified modeling language: Superstructure, version 2.0 (OMG Document: formal/2005-07-04).
OMG. (2006). UML profile for modeling quality of service and fault tolerance characteristics and mechanisms, available specification (OMG Document: ptc/2005-05-02) Author.
Ong, C.S., Nahrstedt, K., & Yuan, W. (2003). Quality of protection for mobile multimedia applications. In Proceedings of IEEE International Conference on Multimedia and Expo (ICME2003), Baltimore, MD, July 7-9 (pp. 137-140). IEEE. Retrieved July 11, 2005, from http://cairo.cs.uiuc.edu/publications/papers/ICME03chui.pdf
Onoe, Y., Atsumi, Y., Sato, F., & Mizuno, T. (2001). A dynamic delayed ack control scheme on Mobile IP networks. International Conference on Computer Networks and Mobile Computing, Los Alamitos, CA, October 16-19 (pp. 35-40). Los Alamitos, CA: IEEE Computer Society.
Open Gis Consortium. (1999a). Topic 5, the OpenGIS abstract specification-Open GIS features-Version 4. Retrieved August 20, 2005, from http://www.OpenGIS.org/techno/specs.htm
Open Gis Consortium. (1999b). Open GIS Simple Features Specification For SQL. Retrieved August 20, 2005, from http://www.opengeospatial.org/specs
Open Gis Consortium. (2001). Feature Geometry. Retrieved August 20, 2005, from http://www.opengeospatial.org/specs
Open Group (2002). The Open Group Architectural Framework (TOGAF), version 8. http://www.opengroup.org
Open Mobile Alliance (2006). WAP Forum. Retrieved February 6, 2006, from http://www.wapforum.org/
OR. (2002). Sense and respond business scenarios. OR/MS Today, April 2002. Retrieved from http://lionhrtpub.com/orms/orms-4-02/frvaluechain.html
Oram, A. (2001). Peer-to-peer: Harnessing the power of disruptive technologies. O’Reilly.
Ordentlich, E., Weinberger, M., & Seroussi, G. (1998). A low-complexity modeling approach for embeddded coding of wavelet coefficients. IEEE Data Compression Conference (DCC), Snowbird, Utah, March 30-April 1 (pp. 408-417).
Orebäck, A. (2004). A component framework for autonomous mobile robots. Unpublished doctoral thesis, KTH numerical and computer science.
Orebäck, A., & Christensen, H.I. (2003). Evaluation of architectures for mobile robotics. Autonomous Robots, 14, 33-49.
Orgun, M., & Ma, W. (1994). An overview of temporal and modal logic programming. In D.M. Gabbay & H. J.Ohlbach (Eds.), The first international conference on temporal logic (pp. 445-479). Springer-Verlag.
Origins of the Word. (n.d.). Origins of the word “phishing.” Retrieved January 5, 2006, from http://www.antiphishing.org/wordphish.html
Orlikowski, W. J. (1996a). Evolving with notes: Organizational change around groupware technology. In C. Ciborra (Ed.), Groupware and teamwork (pp. 23-60). London: John Wiley & Sons.
Orlikowski, W.J. (1996b). Improving organizational transformation over time: A situated action perspective. Information Systems Research, 7(1), 63-92.
Orr, E. (2004). 3 G-324M helps 3G live up to its potential Retrieved May 2007, from http://www.wsdmag.com/Articles/Print.cfm?ArticleID=7742
Ostell, J. (1990). GenInfo ASN.1 Syntax: Sequences. NCBI Technical Report Series. National Library of Medicine, NIH.
OTP. (1998). RFC 2289 – A one-time password system. Retrieved October 5, 2005, from http://www.faqs.org/rfcs/rfc2289.html%5D
Ott, T., & Swiaczny, F. (2001). Time-integrative geographic information systems. Management and analysis of spatio-temporal data. Springer.
Ousterhout, J.K. (1996). Why threads are a bad idea (for most purposes). Proceedings of USENIX Technical Conference.
Overeinder, B., & Brazier, F. (2003). Fault tolerance in scalable agent support system: Integrating DARX in the agentscape framework. Proceedings of the 3rd International Symposium on Cluster Computing and the Grid, Tokyo, Japan.
Padgham, L., & Winikoff, M. (2002, July 15-19). Prometheus: A methodology for developing intelligent agents. Proceedings of the 3rd AOSE Workshop at AAMAS’02, Bologna, Italy. Retrieved from http://www.cs.rmit.edu.au/agents/Papers/oopsla02.pdf
Padmanabhan, B., & Tuzhilin, A. (1998). A belief-driven method for discovering unexpected patterns. In Proceedings of the International Conference on Knowledge Discovery and Data Mining (pp. 94-100).
Pagani, M. (2004). Determinants of adoption of third generation mobile multimedia services. Journal of Interactive Marketing, 18(3), 46-59.
Pagel, S., & Westerfelhaus, R. (2005). Charting managerial reading preferences in relation to popular management theory books: A semiotic analysis. Journal of Business Communication, 42(4), 420-448.
Páircéir, R.,McClean, S., & Scotney, B. (2000). Discovery of multilevel rules and exceptions from a distributed database. In Proceedings of the 6th ACM SIGKDD International Conference on Knowledge Discovery and Data Mining (pp. 523-532). New York: ACM Press.
PalmSource, Inc. (2006). PalmSourceportal. Retrieved July 17, 2006, from http://www.palmsource.com.
Pan, Y., Lee, M., Kim, J.B., & Suda, T. (2004, May). An end-to-end multipath smooth handoff scheme for streaming media. IEEE Journal on Selected Areas in Communications, 22(4), 653-663.
PANDA (Patterns for Next-generation Database Systems). (2001). Project homepage. http://dke.cti.gr/panda
Panti, M., et al. (2000). A FIPA compliant agent platform for federated information systems. Computer Science Department-University of Ancona – 60131- Ancona – Italy. International Journal of Computer & Information Science, RY Lee and H. Fouchal (eds.), 1(3).
Papadimitratos, P., & Haas, Z.J. (2002). Secure routing for mobile ad hoc networks. Proceedings of the SCS Communication Networks and Distributed Systems Modelling and Simulation Conference (CNDS), San Antonio, Texas, January 27-31. USA: Society for Computer Simulation.
Papadimitratos, P., & Haas, Z.J. (2003). Secure link state routing for mobile ad hoc networks. Proceedings of the Symposium on Applications and the Internet Workshops (SAINT), Orlando, FL, January 27-31 (pp. 27-31). USA: IEEE Computer Society.
Papadimitratos, P., & Haas, Z.J. (2003). Secure message transmission in mobile ad hoc networks. Ad Hoc Networks, 1(1), 193-209.
Papaioannou, T. (2000). On the structuring of distributed systems: The argument for mobility. Unpublished doctoral dissertation, Loughborough University, Leicestershire, UK.
Papatheodrou, C.,Vassiliou, A., & Simon, B. (2002). C. Papatheodrou, Discovery of ontologies for learning resources using word-based clustering. In Proceedings of ED MEDIA 2002, Denver.
Papazoglou, M. P, & van den Heuvel, W.J. (2005). Service oriented architectures. Retrieved from http://infolab.uvt.nl/pub/papazogloump-2005-81.pdf
Papazoglou, M.P., & Georgakopoulos, D. (2003). Service-oriented computing. Communications of the ACM, 46(10), 25-28.
Paquette, J. (2000). A history of viruses. Retrieved July 7,2006, from http://www.securityfocus.com/infocus/1286
Paraben Corporation. (2007). Device seizure v1.2: Cell phone & PDA forensic software. Retrieved September 27, 2007, from http://www.paraben-forensics.com/catalog/product_info.php?cPath=25&products_id=405
Parasuraman, A. (2000). Technology readiness index: A multiple item scale to measure readiness to embrace new technologies. Journal of Service Research, 2(4), 307-320.
Park J. S. (2005). Security analyses for enterprise instant messenger (EIM) systems. EDPACS, 2005(32), 8-24.
Park, B.J. (1999). A development of hybrid genetic algorithms for scheduling of static and dynamic job shop. Unpublished doctoral thesis, Dong-A University, Busan, Korea.
Park, B.J., Choi, H.R., & Kim, H.S. (2001). A hybrid genetic algorithms for job shop scheduling problems. In E.Goodman (Ed.), Genetic and evolutionary computation conference late-breaking papers (pp. 317-324). San Francisco: ISGEC Press.
Park, V.D., & Corson, M.S. (1997). A highly adaptive distributed routing algorithm for mobile wireless networks. Proceedings of the 16th Annual Joint Conference of the IEEE Computer and Communications Societies (InfoCom), 3, Kobe, Japan, April 7-11 (pp. 1405-1413). ISBN 0-8186-7780-5. New York: IEEE.
Parkes, D.C., & Kalagnanam, J. (2005). Models for iterative multiattribute Vickrey auctions. Management Science, 51, 435-451.
Parkes, D.C., & Ungar, L.H. (2001). An auction-based method for decentralized train scheduling. Proceedings of the 5th International Conference on Autonomous Agents (Agents-01) (pp. 43-50).
Parunak, H., Brueckner, S., Fleischer, M., & Odell, J. (2002, July 15-19). Co-X: Defining what agents do together. Proceedings of AAMAS ’02, Bologna, Italy.
Parunak, V.D. (1987). Manufacturing experience with the contract net. In M.N.Huhns (Ed.), Distributed artificial intelligence (pp. 285-310). Pitman.
Parunak, V.D., Baker, A.D., & Clark, S.J. (1997). The AARIA agent architecture: An example of requirements-driven agent-based system design. Proceedings of the First International Conference on Autonomous Agent, Marina del Rey, CA.
Pasquier, N.,Bastide, Y.,Taouil, R., & Lakhal, L. (1999). In C. Beeri & P. Buneman (Eds.), 7th International Conference on Database Theory, 1540 (pp. 398-416). Jerusalem: Springer.
PassMark. (n.d.). PassMark security: Two-factor two-way authentication. Retrieved September 29, 2005, from http://www.passmarksecurity.com/main.jsp
Patanapongpibul, L., & Mapp, G. (2003). A client-based handoff mechanism for Mobile IPv6 wireless networks. Proc. Eighth IEEE International Symposium on Computers and Communications, Antalya, Turkey, June-July (pp. 563-568). Los Alamitos, CA: IEEE Computer Society.
Patel-Schneiderand, P.F., & Fensel, D. (2002). Layering the Semantic Web: Problems and directions. In Proceedings of the 1st International Semantic Web Conference. Springer.
Patton, M.Q. (1990). Qualitative evaluation and research methods (2nd ed.). London: Sage Publications.
Patton, S. (2006). “Beating the Boomer Brain Drain Blues.” CIO Magazine (January 15, 2006).
Pätzold, M. (2002). Mobile fading channels. New York: Wiley.
Paul E. CERUZZI, A History of Modern Computing, The MIT Press, 1998
Paul STRASSMANN, The Politics of Information Management, Policy Guidelines, The Information Economics Press, 1995
Paulk, M. (2001). Extreme programming from a CMM perspective. IEEE Software, 18(6), 19-26.
Paulk, M. C,Curtis, B.,Chrissis, M. B., & Weber, C. V. (1993). Capability maturity model (SE, version 1.1). Software Engineering Institute.
Paxson, V. (1998). Bro: A system for detecting network intruders in real-time. USENIX Security Symposium, San Antonio, TX. Computer Networks, 31(23-24), 2435-2463. Elsevier.
Pazzani, M., & Billsus, D. (1997). Learning and revising user profiles: The identification of interesting Web sites. Machine Learning Journal, 23, 313-331.
Pazzani, M.J. (2000). Knowledge discovery from data? IEEE Intelligent Systems & Their Applications, 15(2), 10-13.
Pazzani, M.J.,Mani, S., & Shankle, W.R. (2001). Acceptance by medical experts of rules generated by machine learning. Methods of information in medicine, 40(5), 380-385.
PC GuardianTechnologies. (2005). PDASecure-Powerful security. Simple to use. Superior service & support. Retrieved July 9, 2005, from http://www.pcguardiantechnologies.com/PDASecure/PDASecure_Brochure.pdf
Pearson, D.E. (1995). Developments in model-based video coding. Proceedings of the IEEE, 83(6), 892- 906.
Pedrycz, W., & Gomidt, F. (1998). An introduction to fuzzy sets analysis and design. Cambridge, MA: The M.I.T. Press.
Pei, G., Gerla, M., & Chen, T. (2000). Fisheye state routing in mobile ad hoc networks. Proceedings of the ICDCS Workshop on Wireless Networks and Mobile Computing, Taipei, Taiwan, April 10 (pp. 71-78). IEEE Computer Society.
Pei, G., Gerla, M., Hong, X., & Chiang, C.C. (1999). A wireless hierarchical routing protocol with group mobility. Proceedings of the IEEE Wireless Communications and Networking Conference (WCNC), 3, New Orleans, September 21-24 (pp. 1538-1542). Piscataway, NJ: IEEE Press.
Pei, J.,Han, J.,Mortazavi-asl, B., & Zhu, H. (2000). Mining access patterns efficiently from web logs. PAKDD, LNAI, 1805, 396-407.
Peikari, C., & Fogie, S. (2003). Maximum wireless security. SAMS Publishing.
Peirce, C.S. (1931-58). Collected writings. Cambridge, MA: Harvard University Press.
Pelachaud, C., & Poggi, I., (2001). Multimodal Embodied Agents. ACM.
Peled, A., & Ruiz, A. (1980). Frequency domain data transmission using reduced computational complexity algorithms. Proc. IEEE ICASSP, Denver, Colorado (pp. 964-967). New York: IEEE.
Peña, C.I., Marzo, J.L., & de la Rosa, J.L. (2002). Intelligent agents in a teaching and learning environment on the Web. Proceedings of the 2nd IEEE International Conference on Advanced Learning Technologies, ICALT2002.
Peng Xu, E., & Deters, R. (2005). Fault-management for multi-agent systems. Proceedings of SAINT 2005 (pp. 287-293).
Perelson, S., & Botha, R. (2004). An investigation into access control for mobile devices. In H.S.Venter, J.H. P.Eloff, L.Labuschagne, & M.M.Eloff (Eds.), ISSA 2004 Enabling Tomorrow Conference, Peer-Reviewed Proceedings of the ISSA 2004 Enabling Tomorrow Conference, Information Security South Africa (ISSA), Gallagher Estate, Johannesburg, South Africa, June 30- July 2. CDROM, ISBN 1-86854-522-9. ISSA. Retrieved July 11, 2005, from http://www.nmmu.ac.za/rbotha/Pubs/docs/LC_017.pdf
Perelson, S., and Botha, R. (2004). An Investigation Into Access Control for Mobile Devices. In H. S. Venter (Ed.), J. H. P. Eloff (Ed.), L. Labuschagne (Ed.), M.M. Eloff (Ed.), ISSA 2004 Enabling Tomorrow Conference. Peer-reviewed Proceedings of the ISSA 2004 Enabling Tomorrow Conference. Information Security South Africa (ISSA).
Perini, A., Pistore, M., Roveri, M., & Susi, A. (2003, 2004). Agent-oriented modeling by interleaving formal and informal specification. Paper presented at the 4th International Workshop on agent-oriented software engineering, AOSE 2003, LNCS 2935, Melbourne, Australia.
Perkins, C. (1996). IP mobility support. IETF RFC 2002, October.
Perkins, C. (2002). IP mobility support for IPv4, IETF. RFC 3344. Retrieved May 8, 2006, from http://www.ietf.org/rfc/rfc3344.txt
Perkins, C., & Bhagwat, P. (1994). Highly dynamic destination-sequenced distance-vector routing (DSDV) for mobile computers. Proceedings of the ACM Conference on Communications Architectures, Protocols and Applications (SIGCOMM), London, UK, August 31-September 2 (pp. 234-244). New York: ACM Press.
Perkins, C.E., & Royer, E.M. (1999). Ad-hoc on-demand distance vector routing. Proceedings of the 2nd IEEE Workshop on Mobile Computing Systems and Applications (WMCSA), New Orleans, LA, February 25-26 (pp. 90-100). IEEE Computer Society.
Perkins, E.C. (2002). RFC 3220-IP mobility support for IPv4. IETF Internet Standard. Retrieved September 18, 2007, from http://www.ietf.org/rfc/rfc3220.txt
Perrig, A., Canetti, R., Tygar, J.D., & Song, D. (2000). Efficient authentication and signing of multicast streams over lossy channels. Proceedings of the IEEE Symposium on Security and Privacy, Berkeley, CA, May 14-17 (pp. 56-73). IEEE Computer Society.
Pesty, S., & Webber, C. (2004). The Baghera multiagent learning environment: An educational community of artificial and human agents. Upgrade, Journal of CEPIS (Council of European Professional Informatics Societies), 4, 40-44.
Peter WEILL and Marianne BROADBENT, Leveraging the New Infrastructure, Harvard Business School Press, 1998
Peter, M. (2005). Guide to malware incident prevention and handling (Special Publication, pp. 800-83). U.S. Department of Commerce, National Institute of Standards.
Petrie, C. (2001) Agent-based software engineering. In The first International Workshop on agent-oriented software engineering (AOSE2000). LNCS 1957, Springer-Verlag.
Pfleeger, C.P., & Pfleeger, S.L. (2003). Security in computing (3rd ed.). Prentice Hall.
Phillips, A., Nelson, B., Enfinger, F., & Steuart, C. (2005). Guide to computer forensics and investigations (2nd ed.). USA: Course Technology Press.
Phobe.com. (2003). Yer latin lesson for today: Today’s latin lesson. Retrieved May 14, 2006, from http://www.phobe.com/octopusmotor/latin.html
Piatetsky-Shapiro, G. & Matheus, C. J. (1994). The interestingness of deviations. In Proceedings of KDD-94: AAAI-94 Knowledge Discovery in Databases Workshop (pp. 25-36). AAAI Press.
Piatetsky-Shapiro, G. (1991). Discovery, analysis, and presentation of strong rules. In G. Piatetsky-Shapiro & W.J. Frawley (Eds.), Knowledge discovery in databases (pp. 229-248). Cambridge, MA: AAAI/MIT Press.
Piatetsky-Shapiro, G. (2000). Knowledge discovery in databases: 10 years after. SIGKDD Explorations, 1(2), 59-61.
Picco, G. (1998). Understanding, evaluating,formalizing, and exploiting code mobility. Unpublished doctoral dissertation, Politecnico di Torino, Italy.
Pinto, H.S., & Martins, J.P. (2001) A methodology for ontology integration. In Proceedings of the 1st International conference on Knowledge Captur. (pp. 131-138).
Pirzada, A., & McDonald, C. (2004). Establishing trust in pure ad-hoc networks. 27th Conference on Australasian Computer Science, 26, Dunedin, New Zealand (pp. 47- 54). Australian Computer Society, Inc.
Plamer, G. (2005). De-peremetrization: Benefits and limitations. Information Security Technical Report 2005(10), 189-203.
Plaza, E., & Ontanon, S. (2003). Cooperative multiagent learning. In E.Alonso (Ed.), Adaptive agents and MAS, Lecture Notes on Artificial Intelligence: Vol. 2636 (pp. 1-17). Berlin, Heidelberg: Springer-Verlag.
Plua, C., & Jameson, A. (2002). Collaborative preference elicitation in a group travel recommender system. Proceedings of the AH 2002 Workshop on Recommendation and Personalization in eCommerce (pp. 148-154).
PMI. (2000). A guide to the project management body of knowledge. Author.
Podilchuk, C., Jayant, N., & Farvardin, N. (1995). Three dimensional subband coding of video. IEEE Transactions on Image Processing, 4(2), 125-39.
Poggi, I., & Pelachaud, C. (2000). Emotional meaning and expression in animated faces. In A.Paiva (Ed.), Affect in interactions. Berlin: Springer-Verlag.
Pohle, C. (2003) Integrating and updating domain knowledge with data mining. VLDB PhD Workshop.
Pohle, C., & Spiliopoulou, M. (2002). Building and exploiting ad hoc concept hierarchies for web log analysis. In Y. Kambayashi, W. Winiwarter, & M. Arikawa (Eds.), Proceedings of the 4th International Conference on Data Warehousing and Knowledge Discovery, DaWaK 2002, Vol. 2454 of Lecture Notes in Computer Science (pp. 83-93). Aix en Provence, France: Springer-Verlag.
Pohlman, N., & Crothers, T. (2002). Firewall architecture for the enterprise. Wiley.
Pokahr, L., Braubach, & Lamersdorf. (2003). Jadex: Implementing a BDI-Infrastructure for JADE Agents. EXP: In search of innovation, 3(3), 76-85.
Pongor, S. (1998) Novel databases for molecular biology. Nature, 332, 24-24.
Poole, J., D. Chang, et al. (2002). Common warehouse metamodel: an introduction to the standard for data warehouse integration. New York, John Wiley & Sons.
Poole, J., D. Chang, et al. (2003). Common warehouse metamodel: developer’s guide. New York, John Wiley & Sons.
Porras, P. A., & Kemmerer, R. A. (1992). Penetration state transition analysis- A rule-based intrusion detection approach. Annual Computer Security Applications Conference, 220-229.
Porras, P. A., & Neumann, P. G. (1997). EMERALD: Event monitoring enabling responses to anomalous live disturbances. National Information Systems Security Conference, 353-365.
Porter, M. (1980). An algorithm for suffix. Stripping Program, 14(3), 130-137.
Porter, M. E. (1998). Competitive advantage: creating and sustaining superior performance (with a new introduction). New York, Free Press.
Portscher, E.,Geller, J., & Scherl, R. (2003). Using internet glossaries to determine interests from home pages. In Proceedings of the 4th International Conference on Electronic Commerce and Web Technologies (pp. 248-258). Berlin: Springer Verlag.
Pose, R. (2001). Password-capabilities: Their evolution from the password-capability system into walnut and beyond. In G.Heiser (Ed.), 6th Australasian Computer Systems Architecture Conference (ACSAC), 23, Gold Coast, Australia, January 29-30 (pp. 105-113). IEEE Computer Society.
Poslad, S., Buckle, P., & Hadingham, R. (2000). The FIPA-OS agent platform: Open source for open standards. Proceedings of the 5th International Conference and Exhibition on the Practical Application of Intelligent Agents and Multi-Agents (pp. 355-368).
Pouzol, J. P., & Ducassé, M. (2001). From declarative signatures to misuse IDS. International Symposium on Recent Advances in Intrusion Detection, 2212, 1-21.
Prada, R., & Paiva, A. (2005). Believable groups of synthetic characters. Proceedings of the 4th International Joint Conference on Autonomous Agents and Multi-Agent Systems (pp. 37-43).
Pras, A. (1995). Network management architectures. Unpublished doctoral dissertation, Netherlands: Centre for Telematics and Information Technology of the University of Twente.
Prensky, M. (2001). Digital game-based learning. New York: McGraw Hill.
Price, G. (2005). Editorial: The security perimeter. Information Security Technical Report, 2005(10), 185.
Primode. (2005). Information security glossary. Retrieved July 7, 2006, from http://www.primode.com/glossary.html
Privacy Rights Clearinghouse. (2005). A chronology of data breaches reported since the ChoicePoint incident. Retrieved May 31, 2006, from http://www.privacyrights.org/
Privat, G. (2005, April). Ubiquitous network & smart devices: New telecom services & evolution of human interfaces. ITU Ubiquitous Network Societies Workshop, April 6. Retrieved May 20, 2006, from http://www.itu.int/osg/spu/ni/ubiquitous/Presentations/8_privat_applications.pdf
Project Management Institute (2004). A guide to the project management body of knowledge (PMBOK guide). Newtown Square, PA, Project Management Institute.
Prosise, C., Mandia, K., & Pepe, M. (2003). Incident response and computer forensics, 2nd ed. McGraw-Hill.
Psaila, G., & Lanzi, P. L. (2000). Hierarchy-based mining of association rules in data warehouses. In Proceedings of the 2000 ACM Symposium on Applied Computing (pp. 307-312). New York: ACM Press.
psearch (n.d.). Retrieved April 27, 2006, from http://www.people.iup.edu/vmrf/
Ptacek, T. (1998). Custom attack simulation language (CASE) (Tech. Rep.). Retrieved December 2005, from http://www.sockpuppet.org/tqbf/casl.html
Pu, P., & Kumar, P. (2004). Evaluating example-based search tools. Proceedings of the ACM Conference on Electronic Commerce (EC 2004) (pp. 208-217). New York: ACM Press.
Pujari, A.K. (2002). Data mining techniques. India: University Press Pty Limited.
Pulkkis, G., Grahn, K., Karlsson, J., Martikainen, M., & Daniel, D.E. (2005). Recent developments in WLAN security. In M.Pagani (Ed.), Mobile and wireless systems beyond 3 G: Managing new business opportunities (pp. 254-311). Hershey, PA: IRM Press
Pulkkis, G.,Grahn, K.,Karlsson, J.,Martikainen, M. & Daniel, D.E. (2005). Recent Developments in WLAN Security. In Pagani, M. (Ed.), Mobile and Wireless Systems Beyond 3G: Managing New Business Opportunities. USA: IRM Press
Puri, R., & Ramchandran, K. (2002). PRISM: A new robust video coding architecture based on distributed compression principles. Allerton Conference on Communication, Control, and Computing, Allerton, IL, October.
Pusara, M., & Brodley, C.E. (2004). User ReAuthentication via Mouse Movements. In VizSEC/DMSEC’04. Washington, DC.
Qiu, Y., & Frei, H.P. (1993). Concept based query expension. Conference on Research and Development in Information Retrieval (SIGIR), (pp. 160-169).
Queensland Aphasia Groups. (2001). Web developer’s guidelines. Retrieved April 24, 2006, from http://www.shrs.uq.edu.au/cdaru/aphasiagroups/Web_Development_Guidelines.html
Queensland Aphasia Groups. (2001). What is aphasiafriendly? Retrieved April 24,2006, from http://www.shrs.uq.edu.au/cdaru/aphasiagroups/Aphasia_Friendly.html
Quinlan, R. (1993). C4.5: Programs for machine learning. San Mateo, CA: Morgan Kaufmann Publishers.
Quisquater, J-J.,Quisquater, M.,Quisquater, M.,Quisqua-ter, M.,Guillou, L. Guillou, M. A., et al. (1990). How to explain zero-knowledge protocols to your children. In G. Brassard (Ed.), Advances in cryptology (vol. 435, pp. 628-631). Springer-Verlag.
Rabbani, M., & Jones, P.W. (1991). Digital image compression techniques. Bellingham, Washington: SPIE Optical Engineering Press.
Rabek, C,Lewandowski, M.,Khazan, I. & Cunningham, K. (2003). Detection of injected, dynamically generated, and obfuscated malicious code. In Proceedings of the 2003 ACM Workshop on Rapid Malcode.
Rabin, M.O. (1989). Efficient dispersal of information for security, load balancing, and fault tolerance. Journal of ACM, 36(2), 335-348.
Rabiner, L.R., & Juang, B.H. (1995). Fundamentals of speech recognition. Prentice Hall PTR
Rabiner, L.R., Levinson, S.E., & Sondhi, M.M. (1983). On the application of vector quantisation and hidden Markov models to speaker-independent, isolated word recognition. The Bell System Technical Journal, 62(4), 1075-1105.
Radhakrishnan, S., Racherla, G., Sekharan, C.N., Rao, N.S.V., & Batsell, S.G. (1999). DST-A routing protocol for ad hoc networks using distributed spanning trees. Proceedings of the IEEE Wireless Communications and Networking Conference, (WCNC), 3, New Orleans, September 21-24 (pp. 1543-1547). Piscataway, NJ: IEEE Operations Center.
Radhakrishnan, S., Racherla, G., Sekharan, C.N., Rao, N.S.V., & Batsell, S.G. (2003). Protocol for dynamic ad-hoc networks using distributed spanning trees. Kluwer Wireless Networks, 9(6), 673-686.
Raghunathan, A., Ravi, S., Hattangady, S., & Quisquater, J. (2003). Securing mobile appliances: New challenges for the system designer. Proceedings of the Design, Automation and Test in Europe Conference and Exhibition, 1 (pp. 10176).
Rahm, E., & Bernstein, P. (2001). A survey of approaches to automatic schema matching, The VLDB Journal, 334-350.
Raihan, M. (2006). AsmLx based intrusion-aware software systems. Unpublished master’s thesis, Queen’s University, Kingston, Ontario, Canada.
Ramabadran, T., & Gaitonde, S. (1988). A tutorial on CRC application. IEEE Micro, 8(4), 62-75.
Ramanujan, R., Ahamad, A., Bonney, J., Hagelstrom, R., & Thurber, K. (2000). Techniques for intrusion-resistant ad hoc routing algorithms (TIARA). Proceedings of the 21st Century Military Communications Conference (MILCOM), Los Angeles, CA, October 22-25 (pp. 660-664). ISBN 0-7803-6521-6. Piscataway, NJ: IEEE.
Ramasubramanian, V., Haas, Z.J., & Sirer, E.G. (2003). SHARP: A hybrid adaptive routing protocol for mobile ad hoc networks. Proceedings of the 4th ACM International Symposium on Mobile Ad Hoc Networking and Computing (MobiHoc), Annapolis, MD, June 1-3 (pp. 303-314). ISBN 1-58113-684-6. New York: ACM Press.
Ramkumar, G.D., & Swami, A. (1998). Clustering data without distance functions. Bulletin of IEEE Computer Society Technical Committee on Data Engineering.
Rana, O.F., & Pouchard, L. (2005). Agent based semantic grids: Research issues and challenges. Scalable Computing: Practice and Experience, 6(4), 83-94.
Rankl, W. & Effing, W. (2003). Smart Card Handbook. (3rd ed), USA: John Wiley & Sons.
Ranum, M. J.,Landfield, K.,Stolarchuck, M.,Sienkiewicz, M.,Lambeth, A., & Wall, E. (1997). Implementing a generalized tool for network monitoring. Systems Administration Conference, USENIX Association.
Rao, & Georgeff, M. (1991). Modeling rational agents within a BDI architecture. Proceedings of the Second International Conference on Principles of Knowledge Representation and Reasoning (pp. 473-484).
Rao, & Georgeff, M. (1995). BDI agents: From theory to practice. Proceedings of the First International Conference on Multi-Agent Systems (ICMAS-95) (pp. 312-319).
Rao, A.S., & Georgeff, M.P. (1995). BDI agents: From theory to practice. Australian Artificial Intelligence Institute.
Rao, M., & Mendoza, L. (Eds.) (2005). Asia unplugged: The wireless and mobile media boom in the Asia-Pacific. New Delhi: Response Books (A Division of Sage Publications).
Rassenti, S., Smith, V., & Bulfin, R. (1982). Combinatorial auction mechanism for airport time slot allocation. Bell Journal of Economics, 13(2), 402-417.
Ratliff, J.M. (2002). NTT DoCoMo and its i-mode success: Origins and implications. California Management Review, 44(3), 55-71.
Rawlings, C.J. (1998). Designing databases for molecular biology. Nature, 334, 447-447.
Ray KURZWEIL, The Age of Spiritual Machines, Penguin, 1999 (www.books.mcgraw-hill.com)
Ray, S.K. (2006). Fourth generation (4 G) networks: Roadmap-migration to the future. IETE Technical Review, 23, 253-265.
Raz, T., & Michael, E. (1999). Use and benefits of tools for project risk management. International Journal of Project Management, 19, 9-17.
RBD. (2000). Retrieved from http://www.reliabilityblock-diagram.info/http://www.staff.brad.ac.uk/ckarazai/ReliabilityModelling/Reliability%20Block%20Diagrams.pdf
Reaz, A.S., Atiquzzaman, M., & Fu, S. (2005). Performance of DNS as location manager. IEEE Globecom, St. Louis, MO, November 28-December 2 (pp. 359-363). USA: IEEE Computer Society.
Recommended for CIOs only:
Redmill, D.W. (1994). Image and video coding for noisy channels. PhD thesis. University of Cambridge. Signal Processing and Communications Laboratory.
Redmill, D.W., & Kingsbury, N.G. (1996). The EREC: An error resilient technique for coding variable-length blocks of data. IEEE Transactions on Image Processing, 5(4), 565-574.
Redmill, F.,Chudleigh, M., & Catmur, J. (1999). HazOp and software HazOp. Wiley.
Reichertz, P. (inpress). Hospital information systems-Past, present, future. International Journal of Medical Informatics.
Reilly, J., McCarthy, K., McGinty, L., & Smyth, B. (2004a). Incremental critiquing. In M.Bramer, F. Coenen, & T.Allen (Eds.), Research and development in intelligent systems XXI: Proceedings of AI-2004 (pp. 101-114). Springer.
Reilly, J., McCarthy, K., McGinty, L., & Smyth, B. (2004b). Dynamic critiquing. In P.A.Gonzalez Calero & P.Funk (Eds.), Proceedings of the European Conference on Case-Based Reasoning, (pp. 763-777). Springer.
Reingruber, M., and W. W. Gregory (1994). The data modeling handbook: a best-practice approach to building quality data models. New York, John Wiley & Sons.
Reiter, R. (1987). A theory of diagnosis from first principles. Artificial Intelligence, 32(1), 57-95.
Remenyi, D. (1999). IT investment: making a business case. Computer weekly professional series. Oxford; Boston, Butterworth-Heinemann.
Remenyi, D., A. H. Money, et al. (2000). The effective measurement and management of IT costs and benefits. Computer weekly professional series. Oxford; Boston, Butterworth-Heinemann.
Repo, P., Hyvonen, K., Pantzar, M., & Timonen, P. (2004). Users intenting ways to enjoy new mobile services: The case of watching mobile videos. Paper presented at the 37th Hawaii International Conference on System Sciences, Hawaii, January 5-8 (p. 40096.3). IEEE Computer Society.
Rescher, N., & Urquhart, A. (1971). Temporal logic. Springer-Verlag.
Resnik, Ph. (1999). Semantic similarity in a taxonomy: an information based measure and its application to problems of ambiguity innatural language. Journal of Artificial Intelligence Research, 11, 95-130.
Reynolds, D.A., Quatieri, T.F., & Dunn, R.B. (2000). Speaker verification using adapted Gaussian mixture models. Digital Signal Processing, 10, 19-41.
Rhodes, S.R. (1983). Age-related differences in work attitudes and behavior: A review of conceptual analysis. Psychological Bulletin, 93(2), 328-367.
Ricci, F., Venturini, A., Cavada, D., Mirzadeh, N., Blaas, D., & Nones, M. (2003) Product recommendation with interactive query management and twofold similarity. In A.Aamodt, D.Bridge, and K.Ashley (Eds), ICCBR 2003, 5th International Conference on Case-Based Reasoning (479-493). Trondheim, Norway.
Richards, D., & Busch, P. (2003) Acquiring and applying contextualised tacit knowledge. Journal of Information and Knowledge Management, 2(2), 179-190.
Richards, D., Barles, J., Szilas, N., Kavakli, M., & Dras, M. (2006, May 9). Human and software agents learning together. Proceedings of Agent Based Systems for Human Learning (ABSHL), workshop to be held at the 5th International Joint Conference on Autonomous Agents and Multiagent Systems (AAMAS 2006), Hakodate, Japan.
Richardson, I.E. (2003). H.264 and MPEG-4 video compression. Chichester: John Wiley & Sons.
Richter, A. (1998). Case-based reasoning technology from foundations to applications. Introduction chapter (pp. 1-15). Springer.
Riesbeck, C.K., & Schank, R.C. (1989). Inside case-based reasoning. Lawrence Erlbaum Associates.
Ritter, O. (1994). The integrated genomic database. In S. Suhai (Ed.), Computational methods in genome research. New York: Plenum.
Ritter, S., & Kodinger, K.R. (1996). An architecture for plug-in tutor agents. Journal of Artificial Intelligence in Education, 7, 315-347.
Rittinghouse, J.W. & Ransome, J.F. (2004). Wireless Operational Security. Amsterdam. Elsevier Digital Press.
Rivest, R., & Lampson, B. (1996). SDSI-A simple distributed security infrastructure (Working document). Presented at CRYPTO ’96.
Rivest, R.L., Shamir, A., & Adleman, L. (1978). A method for obtaining digital signatures and public-key cryptosystems. Communication ACM, 21(2), 120-126.
Rizzi, S.,Bertino, E.,Catania, B.,Golfarelli, M.,Halkidi, M.,Terrovitis, M., et al. (2003). Towards a logical model for patterns. In Proceedings of ER’03 Conference.
RMS. (2003). Microsoft Windows rights management services (RMS) for Windows server 2003. Retrieved May 31, 2006, from http://www.microsoft.com/rms
Roam AD. (2005, January). Products & services: Introduction. Retrieved May 16,2006, from http://www.roamad.com/prodservintro.htm
Robbins, J. (2005). An explanation of computer forensics. Retrieved July 11, 2005, from http://www.computerforensics.net/forensics.htm
Robbins, R.J. (1994). Genome informatics I: community databases. Journal of Computational Biology, 1, 173-190.
Roberts, P. (2004, September 13). Symantec launches antiphishing service. Retrieved January 25, 2006, from http://www.infoworld.com/article/04/09/13/HNsymanti-phishingl.html
Robertson, S.,Sparck, E., & Jones, K. (1976). Relevance weighting of search terms. Journal of the American Society for Information Sciences, 27(3), 129-146.
Robins, F. (2003). The marketing of 3 G. Marketing Intelligence & Planning, 21(6), 370-378.
Robinson, G.E. (1992). Regulation of division of labor in insect societies. Annual Review of Entomology, 37, 637-665.
Rodrigues, R.N., Yared, G.F.G., Costa, C.R., Do N., Yabu-Uti, J.B. T., Violaro, F., et al. (2006). Biometric access control through numerical keyboards based on keystroke dynamics. In D.Zhang and A.K.Jain (Eds.), ICB 2006, LNCS 3832 (pp. 640-646). Berlin/Heidelberg: Springer-Verlag.
Rodriguez, M., Favela, J., Gonzalez, V., & Muñoz, M.A. (2003). Agent-based mobile collaboration and information access in a healthcare environment. eHealth: Application of Computing Science in Medicine and Healthcare, Cambridge, UK, April 19-21 (pp. 133-148).
Roehm, M.L., & Sternthal, B. (2001). The moderating effect of knowledge and resources on the persuasive impact of analogies. Journal of Consumer Research, 28(2), 257-272.
Roesch, M. (1998). Writing Snort rules: How To write Snort rules and keep your sanity. Retrieved December 2005, from http://www.snort.Org/docs/snort_htmanuals/htmanual_2.4/snort_manual.html
Rogers, E.M. (1995). Diffusion of innovations. New York: Free Press.
Rohling, H., & Grünheid, R. (1997). Performance comparison of different multiple access schemes for the downlink of an OFDM communication system. Proc. IEEE VTC’97, Phoenix, Arizona (pp. 1365-1369). New York: IEEE.
Rohling, H., Galda, D., & Schulz, E. (2004). An OFDM based cellular single frequency communication network. Proc. of the Wireless World Research Forum ’04, Beijing, China (pp. 254-258). Zurich: WWRF.
Roiger, J.R., & Geatz, M.W. (2003). Data mining, A tutorial – Based primer. Addison Wesley.
Rokou, F.P., & Rokos, Y. (2004). Integral laboratory for creating and delivery lessons on the Web based on a pedagogical content repurposing approach. Fourth IEEE International Conference on Advanced Learning Technologies (ICALT’04), Joensuu, Finland, August 30-September 1 (pp. 732-734). Washington, DC: IEEE Computer Society.
Romsey Associates Ltd. (2005). Details-PDALok VI. 0…, PDALok-The technology behind the security software. Retrieved July 3, 2005, from http://www.pdalok.com/pda_security_products/PDALok_details.htm
Rosabeth MOSS KANTER, e-Volve!, Harvard Business School Press, 2001
Rosch, E. (1975). Cognitive reference points. Cognitive Psychology, 1, 532-547.
Rosch, E. (1978). Principles of categorization. In E. Rosch & B. Lloyd (Eds.), Cognition and categorization (pp. 27-47). Hillsdale, NJ: Erlbaum.
Rosch, E., & Mervis, C.B. (1975). Family resemblances: Studies in the internal structure of categories. Cognitive Psychology, 7, 573-605.
Rose, M. (2001). RFC 3080: The blocks extensible exchange protocol core. Internet Engineering Task Force.
Rosenberg, J., Schulzrinne, H., Camarillo, G., Johnston, A., Peterson, J., Sparks, R., Handley, M., & Schooler, E. (2002). SIP: Session initation protocol. RFC 3261, IETF. Retrieved May 9, 2006 from http://www.ietf.org/rfc/rfc3261.txt
Rosenberg, R.S. (2004). The social impact of computers (3rd ed.). USA: Elsevier Academic Press.
Rosenblatt, B.,Trippe, B., & Mooney, S. (2001). Digital rights management: Business and technology. New York: Hungry Minds/Wiley.
ROSISTEM. (2005). Biometric education»Fingerprint. Retrieved July 9, 2005, from http://www.barcode.ro/tutorials/biometrics/fingerprint.html
Ross, B.,Jackson, C,Miyake, N.,Boneh, D., & Mitchell, J. C. (2005). Stronger password authentication using browser extensions. In Proceedings of the 14’h Usenix Security Symposium.
Rossotto, C.M., Kerf, M., & Rohlfs, J. (2000). Competition in mobile telecommunications: Sector growth, benefits for the incumbent and policy trends. Info, 2(1), 67-73.
Roumeliotis, S.I., Sukhatme, G.S., & Bekey G.A. (1998). Sensor fault detection and identification in a mobile robot. Proceedings of IEEE Conference on Intelligent Robots and Systems (pp. 1383-1388).
Roure, D. D (2005). Agents and the grids: A personal view of the opportunity before us. AgentLink Newsletter, 17.
Royal College of Speech and Language Therapists (RCSLT). (2004). What do speech and language therapists do? Retrieved January 15, 2006, from http://www.rcslt.org/whatdo.shtml
Royce, W. (1970). Managing the development of large software systems. IEEE Wescon, Institute of Electrical and Electronics Engineers.
Royer, E.M., & Toh, C.-K. (1999). A review of current routing protocols for ad hoc mobile wireless networks. IEEE Personal Communications, 6(2), 46-55.
Ruan, C., & Varadharajan, V. (2003). A formal graph based framework for supporting authorization delegations and conflict resolutions. International Journal of Information Security 1(4), 211-222.
Ruan, C., & Varadharajan, V. (2004). A weighted graph approach to authorization delegation and conflict resolution. Lecture Notes in Computer Science, 3108, 402-413.
Ruan, C.,Varadharajan, V, & Zhang, Y (2002) Logic-based reasoning on delegatable authorizations. In Proceedings of the 13th International Symposium on Methodologies for Intelligent Systems, 185-193.
Ruan, C.,Varadharajan, V, & Zhang, Y (2003). A logic model for temporal authorization delegation with negation. In C. Boyd & W. Mao (Eds.), Proceedings of the Sixth International Conference on Information Security (ISC), 2851, 310-324.
Rubin, D.L.,Hewett, M.,Oliver, D.E.,Klein, T.E., & Altman, R.B. (2002). Automatic data acquisition into ontologies from pharmacogenetics relational data sources using declarative object definitions and XML. In Proceedings of the Pacific Symposium on Biology, Lihue, HI.
Rubin, S.,Jha, S., & Miller, B. P. (2004). Automatic @sis of NIDS attacks. In Proceedings of the 20th Annual Computer Security Applications Conference (ACSAC’04). Los Alamitos, CA:. IEEE Computer Society Press.
Rubin, S.,Jha, S., & Miller, B. P. (2005). Language-based generation and evaluation of NIDS signatures. In Proceedings of the 2005 IEEE Symposium on Security and Privacy (S&P’05). Los Alamitos, CA:. IEEE Computer Society Press.
Rudra, A., & Nimmagadda, S.L. (2005). Roles of multidi-mensionality and granularity in data mining of warehoused Australian resources data. In IEEE Proceedings of the 38th Hawaii International Conference on Information System Sciences.
Rudra, T., Kavakli, M., & Bossomaier, T. (2003, September 10-12). A game pidgin language for speech recognition in computer games. Proceedings of 3rd International Conference on Computational Semiotics for Games and New Media, Middleborough, Tees Valley, UK.
Rueppel, T. (1992). Stream ciphers. SIMM.
Ruijs, L., and A. Schotanus (2002). “Managing the delivery of business information.” The guide to IT service management. J. van Bon, ed. London, Addison-Wesley: 165-177.
Ruiz, F., M. Piattini, et al. (2002). “An integrated environment for managing software maintenance projects.” The guide to IT service management. J. van Bon, ed. London, Addison-Wesley: 460-477.
Ruiz, M.E., & Srinivasan, P. (1999). Hierarchical neural networks for text categorization. In Proceedings of the ACM’s Special Interest Group in Information Retrieval (SIGIR) Conference (pp. 281-282).
Ruiz, P.M. (2002). Beyond 3 G: Fourth generation wireless networks. Retrieved May 2007, from http://internetng.dit.upm.es/ponencias-jing/2002/ruiz/ruiz.PDF
Rumbaugh, J.,Blaha, M.,Premerlani, W.,Eddy, F., & Lo-rensen, W. (1991). Object-oriented modeling and design. Englewood Cliffs, NJ: Prentice Hall.
Rummler, G. A., and A. P. Brache (1995). Improving performance: how to manage the white space on the organization chart. Jossey-Bass management series. San Francisco, CA, Jossey-Bass.
Russell, S.J., & Norvig, P. (1995). Artificial intelligence, A modern approach. NJ: Prentice-Hall.
Russell, S.J., & Norvig, P. (2003). Artificial intelligence: A modern approach (2nd ed.). Prentice Hall.
Rzevski, G. (2003). On conceptual design of intelligent mechatronic systems. Mechatronics 13, 1029-1044.
Saaksjarvi, M. (2003). Consumer adoption of technological innovations. European Journal of Innovation Management, 6(2), 90-100.
Saaty, T.L. (1980). The analytic hierarchy process. New York: McGraw Hill.
Saias, J. (2003). Uma metodologia para a construcao automatica de ontologias e a sua aplicação em sistemas de recuperação de informaçãom (A methodology for the automatic construction of ontologies and applications in information retrieval systems). PhD thesis. University of Évora, Portugal (in Portuguese).
Said, A., & Pearlman, W. (1996). A new, fast, and efficient image codec based on set partitioning in hierarchical trees. IEEE Transactions on Circuits and Systems for Video Technology, 6(3), 243-250.
Sairafi, S., A.,Emmanouil, F. S.,Ghanem, M.,Giannadakis, N.,Guo, Y.,Kalaitzopolous, D., et al. (2003). The design of discovery net: Towards open Grid services for knowledge discovery. International Journal of High Performance Computing Applications, 17(3).
Sakurai, Y., Yokoo, M., & Kamei, K. (2000). An efficient approximate algorithm for winner determination in combinatorial auctions. Second ACM Conference on Electronic Commerce.
Salama, P., Shroff, N.B., Coyle, E.J., & Delp, E.J. (1995). Error concealment techniques for encoded video streams. IEEE International Conference on Image Processing (ICIP), Washington, DC, October 23-26 (pp. 9-12).
Salamó, M., Reilly, J., McGinty, L., & Smyth, B. (2005a). Improving incremental critiquing. 16th Artificial Intelligence and Cognitive Science (pp. 379-388).
Salamó, M., Reilly, J., McGinty, L., & Smyth, B. (2005b). Knowledge discovery from user preferences in conversational recommendation. In Knowledge Discovery in Databases: 9th European Conference on Principles and Practice of Knowledge Discovery in Databases (pp. 228-239). Springer.
Salamó, M., Smyth, B., McCarthy, K., Reilly, J., & McGinty, L. (2005c). Reducing critiquing repetition in conversational recommendation. Proceedings IX Workshop on Multi-agent Information Retrieval and Recommender Systems at the International Joint Conference on Artificial Intelligence (pp. 55-61).
Salsano, S., Veltri, L., & Papalilo, D. (2002). SIP security issues: The SIP authentication procedure and its processing load. IEEE Network, 16(6), 38-44.
Salton, G. (1971). The smart retrieval system. Englewood Cliffs, NJ: Prentice Hall.
Salton, G., & Buckley, C. (1988). Term-weighting approaches in automatic text retrieval. Information Processing and Management, 24, 513-523
Salton, G., & McGill, M. (1983). Introduction to modem information retrieval. McGraw-Hill.
Salton, G.,Wong, A., & Yang, C.S. (1975). A vector space model for automatic indexing. Communications of the ACM, 18(11), 613-620.
Saltzberg, B.R. (1967). Performance of an efficient parallel data transmission system. IEEE Trans. on Communications, 15, 805-811.
Saltzer, J., Reed, D., & Clark, D. (1984). End-to-end arguments in system design. ACM Transactions in Computer Systems, 2(4).
Salzman, M., Palen, L., & Harper, R. (2001). Mobile communications: Understanding users, adoption and design. CHI 2001, Seattle, WA, March 31-April 5.
SAML. (2004). Security assertion markup language (SAME). Retrieved from http://www.oasis-open.org/com-mittees/security
Sanchez, D., & Moreno, A. (2004). Automatic generation of taxonomies from the WWW. In Proceedings of the 5th International Conference on Practical Aspects of Knowledge Management (PAKM 2004). LNAI, Vol. 3336 (pp. 208-219). Vienna, Austria.
Sandholm, T. (1999). An algorithm for optimal winner determination in combinatorial auctions. Proceedings of the 16th International Joint Conference on Artificial Intelligence (IJCAI-99) (pp. 542-547).
Sandholm, T., Suri, S., Gilpin, A., & Levine, D. (2001). Cabob: A fast optimal algorithm for combinatorial auctions. Proceedings of the 17th International Joint Conference on Artificial Intelligence (IJCAI-01) (pp. 1102-1108).
Sandhu, R.,Coyne, E.,Feinstein, H., & Youman, C. (1996). Role-based access control models. IEEE Computer 39(2), 38-47.
Sanger, F.,Nicklen, S., & Coulson, A.R. (1977). DNA sequencing with chain-terminating inhibitors. In Proceedings of National Academic of Science, 74 (pp. 5463-5467).
Santa-Cruz, D., Grosbois, R., & Ebrahimi, T. (2002). JPEG 2000 performance evaluation and assessment. Signal Processing: Image Communication, 17(1), 113- 130.
Santivez, C., Ramanathan, R., & Stavrakakis, I. (2001). Making link-state routing scale for ad hoc networks. Proceedings of the 2nd ACM International Symposium on Mobile Ad Hoc Networking Computing (MobiHoc), Long Beach, CA, October 4-5 (pp. 22-32). ISBN 1-58113-428-2. New York: ACM Press.
Sanzgiri, K., Dahill, B., Levine, B.N., Shields, C. & Belding-Royer, E.M. (2002). A secure routing protocol for ad hoc networks. Proceedings of the 10th IEEE International Conference on Network Protocols (ICNP), Paris, France, November 12-15 (pp. 78-89). IEEE Computer Society.
Sanzgiri, K., Dahill, B., Levine, B.N., Shields, C., & Belding-Royer, E.M. (2005). Authenticated routing for ad hoc networks. IEEE Journals on Selected Areas in Communications, 23(3), 598-610.
Sarbanes-Oxley Act of 2002, 116 Stat. 745 (2002).
Satoh, I. (2002). A framework for building reusable mobile agents for network management. IEEE/IFIP Network Operations and Management Symposium (pp. 51-64). Retrieved May 20, 2005, from http://ieeexplore.ieee.org
Satyanarayanan, M. (1996). Fundamental challenges in mobile computing. Fifteenth ACM Symposium on Principles of Distributed Computing, 1(1), Philadelphia, PA, May, 7pp.
Satyanarayanan, M. (2001). Pervasive computing: Vision and challenges. IEEE Personal Communications, 8(4), 10-17.
Satyanarayanan, M. (2005). Metrics and benchmarks for pervasive computing. Pervasive Computing: IEEE, 4(3), 4-6.
Sauberlich, F., & Huber, K.-P. (2001). A framework for web usage mining on anonymous logfile data. In Schwaiger M. & O. Opitz (Eds.), Exploratory data analysis in empirical research (pp. 309-318). Heidelberg: Springer-Verlag.
Savage, S., & Voelker, G. M. (2004). NSF cybertrustcenter proposal: Center for Internet epidemiology and defenses.
Sawada, M., Tani, N., Miki, M., & Maruyama, Y. (1998). Advanced mobile multimedia services and applied network techniques. IEEE International Conference on Universal Personal Communications, 1, 79-85.
Saxena, N.,Tsudik, G., & Yi, J. H. (2003). Admission control in peer-to-peer: Design and performance evaluation. ACM Workshop on Security of Ad Hoc and Sensor Networks (SASN). USA
Saydjari, O.S. (2004). Cyber defense: Art to science. Communications of ACM, 47(3), 53-57.
Scherl, R., & Geller, J. (2002). Global communities, marketing and Web mining. Journal of Doing Business Across Borders, 1(2), 141-150.
Schmidt, D.C. (2000). TAO developer’s guide (1.1a ed.). Object Computing Inc.
Schmidt, J., and D. Lyle (2005). Integration competency center: an implementation methodology. Informatica.
Schneier, B. (April 2005). Two-factor authentication: Too little, too late. Communications of the ACM, 48(4), 136.
Schnorr, C.P. (1991). Efficient signature generation by smart cards. Journal of Cryptology, 4(3), 161-174.
Schoderbek, P.,Schoderbek, C, & Kefalas, A. (1990). Management systems-Conceptual considerations (4th ed.). Irwin.
Schopf, 1, & Nitzberg, B. (2003). Grids: The top ten questions. Retrieved from http://www.globus.org
Schrage, M. (2005). “Prune IT Systems, Not Budgets.” CIO Magazine (January 15, 2005).
Schreiber, A., Wielinga, B., & Breuker, J. (Eds.). (1993). KADS. A principled approach to knowledge-based system development, Knowledge-Based Systems, 11.
Schreiber, G., Akkermans, H., Anjewierden, A, de Hoog, R., Shadbolt, N., Van de Velde, W., et al. (2000). Knowledge engineering and management; The commonKADS methodology. Cambridge, MA: MIT Press.
Schulze-Kremer, S. (1998). Ontologies for molecular biology. Pacific Symposium of Biocomputing. In Proceedings of the PSB 1998 Electronic, Hawaii.
Schulzrinne, H., Casner, S., Frederick, R., & Jacobson, V. (2003). RTF: A transport protocol for real-time applications. RFC 3550, IETF. Retrieved May 8, 2006, from http://www.ietf.org/rfc/rfc3550.txt
Schuster, G.M., & Katsaggelos, A.K. (1997). Rate-distortion based video compression: Optimal video frame compression and object boundary encoding. Boston: Kluwer Academic Publishers.
Schuster, G.M., & Katsaggelos, A.K. (1998). An optimal boundary encoding scheme in the rate distortion sense. IEEE Transactions on Image Processing, 7(1), 13-26.
Schuster, G.M., & Katsaggelos, A.K. (2006). Motion compensated shape error concealment. IEEE Transactions on Image Processing, 15(2), 501-510.
Schuster, G.M., Katsaggelos, A.K., & Xiaohuan, L. (2004). Shape error concealment using Hermite splines. IEEE Transactions on Image Processing, 13(6), 808- 820.
Seaborne, A. (2004). RDQL: A query language for RDF. Retrieved May 10, 2006, from http://www.w3.org/Submis-sion/RDQL/
Seamons, K.,Winslett, M., & Yu, T. (2001). Limiting the disclosure of access control policies during automated trust negotiation. In Network and Distributed System Security Symposium. San Diego, CA.
Sebastiani, F. (1999). A tutorial on automated text categorization. In A. Amandi & Zunino (Eds.), Proceedings of ASAI-99, 1st Argentinian Symposium on Artificial Intelligence (pp 7-35). Buones Aires.
Seeker, A., & Taubman, D.S. (2004). Highly scalable video compression with scalable motion coding. IEEE Transactions on Image Processing, 13(8), 1029-1041.
Seeley, D., Camazine, S., & Sneyd, J. (1991). Collective decision-making in honey bees: How colonies choose nectar sources. Behavioral Ecology Sociobiology, 28, 277-290.
Seismo-Surfer. A Web GIS application for integrating, visualizing and analyzing seismic data. http://www.seismo.gr
Sekar, R., & Uppuluri,P. (1999). Synthesizing fast intrusion prevention/detection systems from high-level specifications. USENIXSecurity Symposium, (pp. 63-79). Berkley.
Sekaran, U. (2000). Research methods for business: A skill building approach. New York: John Wiley and Sons.
Sen, A., & Srivasta, M. (1990). Regression analysis: Theory, methods, and applications. London: Springer Verlag.
Seol, S., Kim, M., Yu, C., & Lee., J.H. (2002). Experiments and analysis of voice over MobileIP. 13th IEEE International Symposium on Personal, Indoor and Mobile Radio Communications (PIMRC), Lisboa, Portugal, September 15-18 (pp. 977-981). Piscataway, NJ: IEEE.
Servigne, S.,Ubeda, T.,Puricelli, A., & Laurini, R. (2000). A methodology for spatial consistency improvement of geographic databases. Geoinformatica, 4(1), 7-34.
Setec Portal. (2005). Retrieved July 11, 2005, from http://www.setec.fi
Setec Portal. (2006). Retrieved February 5th, 2006, from http://www.setec.fi
seti@home. (2006). Seti@home project. Retrieved April 27, 2006, from http://setiathome.ssl.berkeley.edu/
sfr Gesellschaft für Datenverarbeitung mbH. (2005). The patented technology in all of our visual key products. Retrieved July 3, 2005, from http://www.viskey.com/viskeypalm/index.html and http://www.viskey.com/tech.html
Shackman, M. (2005). Platform Security.’A Technical Overview. Retrieved October 11, 2005, from http://www.symbian.com/developer/techlib/papers/plat_sec_tech_overview/platformsecurityatechnicaloverviewvl.1.pdf
Shamir, A. (1979). How to share a secret. Communications of ACM, 22(11), 612-613.
Shanahan, M. (1989). Prediction is deduction but explanation is abduction. In Proceedings of IJCAI’89 (pp. 1055-1060). Morgan Kaufmann.
Shankar, U., & Paxson, V. (2003). Active mapping: Resisting NIDS evasion without altering traffic. In Proceedings of the 2003 IEEE Symposium on Security and Privacy (SP. 03). Los Alamitos, CA:. IEEE Computer Society Press.
Shanks, G.,Tansley, E., & Weber, R. (2003). Using ontology to validate conceptual models. Communications of the ACM, 46(10), 85-89.
Shanks, G.,Tansley, E., & Weber, R. (2004). Representing composites in conceptual modelling. Communications of the ACM, 47(7), 77-80.
Shapiro, J.M. (1993). Embedded image coding using zerotrees of wavelet coefficients. IEEE Transactions on Signal Processing, 41(12), 3445-3462.
Sharda, N. (1999). Multimedia information networking. New Jersey: Prentice Hall.
Sharda, N., & Georgievski, M. (2002). A holistic quality of service model for multimedia communications. International Conference on Internet and Multimedia Systems and Applications (IMSA2002), Kaua’i, Hawaii, August 12-14 (pp. 282-287). Calgary, Alberta, Canada: ACTA Press.
Sharmin, M., Ahmed, S., & Ahamed, S.I. (2006). MARKS (middleware adaptability for resource discovery, knowledge usability and self-healing) for mobile devices of computing environments. Proceedings of Third International Conference on Information Technology: New Generation (ITNG 2006), Las Vegas, NE, April (pp. 306-313).
Sharmin, M., Ahmed, S., Ahamed, S.I., Haque, M., & Khan, A. (2006, April). Healthcare aide: Towards a virtual assistant for doctors using pervasive middleware. To appear in Journal Springer e&i, 123(4).
Sharp, A., and P. McDermott (2001). Workflow modeling: tools for process improvement and application development. Boston, Artech House.
Shekhar, S., & Chawla, S. (2003). Spatial databases: a tour. Upper Saddle, NJ: Prentice Hall.
Shen, M., Li, G., & Liu, H. (2004). Design tradeoffs in OFDMA traffic channels. Proc. of IEEE ICASSP ’04, Montreal, Canada (pp. 757-760). New York: IEEE.
Shen, W., & Norrie, D.H. (1998). An agent-based approach for distributed manufacturing and supply chain management. In G.Jacucci (Ed.), Globalization of manufacturing in the digital communications era of the 21st century: Innovation (pp. 579-590). Kluwer Academic Publisher.
Shen, W., & Norrie, D.H. (1999a). Developing intelligent manufacturing systems using collaborative agents. Proceedings of the Second International Workshop on Intelligent Manufacturing Systems (pp. 157-166).
Shen, W., & Norrie, D.H. (1999b). Agent-based systems for intelligent manufacturing: A state-of-the-art survey. The International Journal of Knowledge and Information System
Shen, W., & Norrie, D.H. (1999c). An agent-based approach for manufacturing enterprise integration and supply chain management.
Shen, W., Norrie, D.H., & Kremer, R. (1999). Implementing Internet enabled virtual enterprises using collaborative agents, infrastructures for virtual enterprises. Kluwer Academic Publisher.
Shen, W., Ulieru, M., Norrie, D.H., & Kremer, R. (1999). Implementing the Internet enabled supply chain through a collaborative agent system. Proceedings of Workshop on Agent Based Decision-Support for Managing the Internet-Enabled Supply-Chain, Seattle.
Sheppard, B.H., Hartwick, J., & Warshaw, P.R. (1988). The theory of reasoned action: A meta-analysis of past research with recommendations for modifications and future research. Journal of Consumer Research, 15(3), 325-343.
Sherin, S., & Lieberman, H. (2001). Intelligent profiling by example. Proceedings of the International Conference on Intelligent User Interfaces (IUI 2001) (pp. 145-152). New York: ACM Press.
Shimazu, H. (2002). ExpertClerk: A conversational case-based reasoning tool for developing salesclerk agents in e-commerce Webshops. Artificial Intelligence Review, 18(3-4), 223-244.
Shin, C.C., & Johnson, D.M. (1978). Avowed happiness as an overall assessment of quality of life. Social Indicators Research, 5, 475-492.
Shirani, S., Kossentini, F., & Ward, R. (2000). A concealment method for video communications in an error-prone environment. IEEE Journal on Selected Areas in Communications, 18(6), 1122-1128.
Shoham, Y. (1993). Agent-oriented programming. Artificial Intelligence, 60(1), 51-92.
Siau, K., Lim, E.P., & Shen, Z. (2001). Mobile commerce: Promises, challenges, and research agenda. Journal of Databases Management, 12(2), 4-13.
Sibert, O.,Bernstein, D., & Van Wie,D. (1995, July 11-12,). The DigiBox: A self-protecting container for information commerce. In Proceedings of First USENIX Workshop on Electronic Commerce, NewYork, NY.
Sidhu, A.S.,Dillon, T.S., & Chang, E. (2005). Ontological foundation for protein data models. In Proceedings of the 1st IFIP WG 2.12 & WG 12.4 International Workshop on Web Semantics (SWWS 2005). In conjunction with On The Move Federated Conferences (OTM 2005). Agia Napa, Cyprus: Springer
Sidhu, A.S.,Dillon, T.S., & Chang, E. (2006a). protein ontology. In Z. Ma & J.Y. Chen (Eds.), Database modeling in biology: Practices and challenges. New York: Springer.
Sidhu, A.S.,Dillon, T.S., & Chang, E. (2006b). Advances in protein ontology project. In Proceedings of the 19thIEEE International Symposium on Computer-Based Medical Systems (CBMS 2006). Salt Lake City, UT: IEEE CS Press.
Sidhu, A.S.,Dillon, T.S.,Setiawan, H., & Sidhu, B.S. (2004c). Comprehensive protein database representation. In A. Gramada & P.E. Bourne (Eds.), 8th International Conference on Research in Computational Molecular Biology 2004 (RECOMB 2004). San Diego, CA: ACM Press.
Sidhu, A.S.,Dillon, T.S.,Sidhu, B.S., & Setiawan, H. (2004a). A unified representation of protein structure databases. In M.S. Reddy & S. Khanna (Eds.), Biotechnological approaches for sustainable development. India: Allied Publishers.
Sidhu, A.S.,Dillon, T.S.,Sidhu, B.S., & Setiawan, H. (2004b). An XML based Semantic protein map. In A., Zanasi, N.F.F. Ebecken, & C.A. Brebbia (Eds.), 5th International Conference on Data Mining, Text Mining and their Business Applications (Data Mining 2004). Malaga, Spain: WIT Press.
Siezen, S. (2005). Symbian OS Version 9.1, Product Description. Retrieved July 20th, 2006, from http://www.symbian.com/files/rx/file6965.pdf
Sikora, T., & Makai, B. (1995). Shape-adaptive DCT for generic coding of video. IEEE Transactions on Circuits and Systems for Video Technology, 5(3), 59-62.
Sikora, T., Bauer, S., & Makai, B. (1995). Efficiency of shape adaptive transforms for coding of arbitrarily shaped image segments. IEEE Transactions on Circuits and Systems for Video Technology, 5(3), 254-258.
Silberschatz, A. & Tuzhilin, A. (1996). What makes patterns interesting. In knowledge discovery systems. IEEE Transactions on Knowledge and Data Engineering, 8(6), 970-974.
Silva, L., Simões, P., Soares, G., Martins, P., Batista, V., Renato, C., et al. (1999). James: A platform of mobile agents for the management of telecommunication networks. Proceedings of the 3rd International Workshop on Intelligent Agents for Telecommunication Applications (IATA’99) (LNCS 1699). Stockholm, Sweden: Springer-Verlag .
Silva, P. F., & Westphall, C. P. (2005, July, 17-20). A model for interoperability of answers in intrusion detection systems. CD-ROMProceedings of the AdvancedInternational Conference on Telecomunications (AICT 2005), Lisbon, Portugal.
Silveira, R.A., & Vicari, R.M. (2002). Developing distributed intelligent learning environment with JADE-Java agents for distance education framework. Proceedings of International Conference on Intelligent Tutoring Systems, ITS 2002 (LNCS 2362, pp. 105-118).
Silver, C. (2005). Time Warner employee data missing. Retrieved January 26, 2006, from http://money.cnn.com/2005/05/02/news/fortune500/security_timewarner/?cnn=yes
Silverman, B., Andonyadis, C., & Morales, A. (1998). Web-based health care agents; The case of reminders and todos, too (R2Do2). Artificial Intelligence in Medicine, 14(3), 295-316. Retrieved May 29, 2003, from PubMed Database.
Simmons, R. (1994). Structured control for autonomous robots. IEEE Transactions of Robotics and Automation, 10, 34-43.
Simões, P., Reis, R., Silva, L., & Boavida, F. (1999). Enabling mobile agent technology for legacy network management frameworks. Proceedings of the 1999 International Conference on Software, Telecommunications and Computer Networks (SoftCOM1999), FESB-Split, Split/Rijeka Croatia, Trieste/Venice, Italy.
Simões, P., Rodrigues, J., Silva, L., & Boavida, F. (2002). Distributed retrieval of management information: Is it about mobility, locality or distribution? Proceedings of the 2002 IEEE/IFIP Network Operations and Management Symposium (NOMS2002), Florence, Italy.
Simon, H., (1977). The new science of management decision, rev. ed. Englewood Cliffs: Prentice Hall. Quoted in Van Gundy Jr. (1981), Techniques of Structured Problem Solving (p. 5). New York: Van Nostrand Reinhold Company.
Simonet, M.,Bernhard, D.,Diallo, G., & Gedzelman, S. (2005a). Building an ontology of cardio-vascular diseases for concept-based information retrieval. Computers in Cardiology, Lyon.
Simonet, M.,Bernhard, D.,Diallo, G.,Gedzelman, S.,Messai, R., & Patriarche, R. (2005b, December 14-16). An environment for ontology design and enrichment from texts. In Proceedings of SWAP 2005, the 2nd Italian Semantic Web Workshop, Trento, Italy, CEUR Workshop Proceedings, ISSN 1613-0073.
Simsion, G. C., and G. C. Witt (2005). Data modeling essentials. Amsterdam; Boston, Morgan Kaufmann.
Simson L. GARFINKEL, Architects of the Information Society, Thirty-five Years of the Laboratory for Computer Science at MIT, The MIT Press, 1999
Singh, A., & Pande, S. (2002). Compiler optimizations for Java aglets in distributed data intensive applications. The 17th ACMSymposium on Applied Computing, with a Neuro-Fuzzy Applications Track (pp. 87-92). Retrieved March 20, 2003, from http://portal.acm.org
Singh, M.P. & Huhns, M.N. (2005). Service-oriented computing. Wiley.
Singh, S., Kearns, M., & Mansour, Y. (2000). Nash convergence of gradient dynamics in general-sum games. In C.Boutilier and M.Goldszmidt (Eds.), Proceedings of the 16th Conference on Uncertainty in Artificial Intelligence (pp. 541-548). San Francisco: Morgan Kaufmann Publishers.
Singh, S., Woo, M., & Vaidya, N.H. (1998). Power-aware routing in mobile ad hoc networks. Proceedings of the 4th ACM/IEEE International Conference on Mobile Computing and Networking (MobiCom), Dallas, Texas, October 25-30 (pp. 181-190). ISBN 1-58113-035-X. New York: ACM Press.
Sirin, E., & Parsia, B. (2004). Pellet: An OWLDLReasoner, 3rd International Semantic Web Conference, Hiroshima, Japan. Springer.
Sirin, E.B.Parsia, B., & Hendler, J. (2004). Filtering and selecting Semantic Web services with interactive composition techniques. IEEE Intelligent Systems, 19(4), 42-49.
Slade, R. M. (2004). Malware and computer viruses. In H. F. Tipton & N. Krause (Eds.), Information security management handbook. Raton, FL: CRC Press.
Slammer Virus. (2003). Retrieved December 13, 2005 from http://securityresponse.symantec.com/avcenter/venc/data/w32.sqlexp.worm.html
Sleator, D.D., & Tarjan, R.E. (1985). Amortized efficiency of list update and paging rules. Communications of the ACM, 25, 202-208.
Slepian, J.D., & Wolf, J.K. (1973). Noiseless coding of correlated information sources. IEEE Transactions on Information Theory, IT-19, 471-480.
Slewe, T., & Hoogenboom, M. (2004, May). Who will rob you on the digital highway? Communications of the ACM, 47(5), 56-60.
Sloman, M., & Lupu, E. (1999). Policy specification for programmable networks. In Proceedings of the First International Working Conference on Active Networks, 73-84.
Small, P. (1996). Lists, objects and intelligent agents. Retrieved from http://www.obsolete.com/dug/sorcery/loops
Smirnov, A.,Pashkin, M.,Chilov, N.,Levashova, T.,Krizhanovsky, A., & Kashevnik, A. (2005). Ontology-based users and requests clustering in customer service management system. In V. Gorodetsky, J. Liu, & V. Skormin (Ed.), Autonomous intelligent systems: Agents and data mining. AIS-ADM.
Smirnov, M. (2003). Rule-based systems security model. In Proceedings of the Second International Workshop on Mathematical Methods, Models, and Architectures for Computer Network Security (MMM-ACNS), 135-146.
Smith, G. (2000). The Object-Z specification language. Advances in Formal Methods (vol. 1).Kluwer Academic.
Smith, G.,Blackman, D., & Good, B. (2003). Knowledge sharing and organizational learning: The impact of social architecture at ordnance survey. Journal of Knowledge Management Practice, 4(3), 18.
Smith, J.R., & Jabri, M.A. (2004). The 3 G-324M protocol for conversational video telephony. IEEE MultiMedia, 11(3), 102-105.
Smith, K., Paranjape, R., & Benedicenti, L. (2001). Agent behavior and agent models in unregulated markets. Association for Computing Machinery SIGAPP Applied Computing Review, 9(3), 2-12. Retrieved May 27, 2003, from Association for Computing Machinery Digital Library Database.
Smith, M.K.,Welty, C., & McGuinness, D.L. (2004). OWL Web ontology language guide. W3C Recommendation. Retrieved February 10, 2004, from http://www.w3.org/TR/owl-guide/
Smulders, T. H. (2004). Security threats of executing malicious applications on mobile phones. Masters thesis. Technische Universiteit Eindhoven, Department of Mathematics and Computer Science, Netherlands. Retrieved July 20th, 2006, from http://www.win.tue.nl/~ecss/intern-ships/reports/TSmulders2004.pdf
Smyth, B., & Cotter, P. (2000). A personalized TV listings service for the digital TV age. Journal of Knowledge-Based Systems, 13(2-3), 53-59.
Smyth, B., & McGinty, L. (2003a). An analysis of feedback strategies in conversational recommender systems. In P.Cunningham (Ed.), Proceedings of the 14th National Conference on Artificial Intelligence and Cognitive Science (pp. 211-216).
Smyth, B., & McGinty, L. (2003b). The power of suggestion. Proceedings of the International Joint Conference on Artificial Intelligence (pp. 127-132). Morgan-Kaufmann.
Snopes.com (2006). Boiled beef. http://www.uga.edu/srel/ecoview11-18-02.htm
Soares, L.D., & Pereira, F. (2004). Spatial shape error concealment for object-based image and video coding. IEEE Transactions on Image Processing, 13(4), 586- 599.
Soares, L.D., & Pereira, F. (2006). Temporal shape error concealment by global motion compensation with local refinement. IEEE Transactions on Image Processing, 15(6), 1331-1348.
Sobrado, L., & Birget, J.-C. (2002). Graphical passwords. Retrieved April 14,2005, from http://rutgersscholar.rutgers.edu/volume04/sobrbirg/sobrbirg.htm
Sobrado, L., & Birget, J.-C. (2005). Shoulder surfing resistant graphical passwords. Retrieved October 5,2005, from http://clam.rutgers.edu/~birget/grPssw/srgp.pdf
Socolofsky, T., & Kale, C. (1991). A TCP/IP tutorial. Retrieved April 27, 2006, from http://www.cis.ohio-state.edu/cgi-bin/rfc/rfc1180.html
Soergel, D.,Lauser, B.,Liang, A.,Fisseha, F.,Keizer, J., & Katz, S. (2004). Reengineering thesauri for new applications: The AGROVOC example, Journal of Digital Information, 4(4).
Software Engineering Institute (2004). What is a CASE environment? http://www.sei.cmu.edu/legacy/case/case_whatis.html
Sohel, F.A., Dooley, L.S., & Karmakar, G.C. (2005). A dynamic Bezier curve model. International Conference on Image Processing (ICIP), II, Genoa, Italy, September (pp. 474-477).
Sohel, F.A., Dooley, L.S., & Karmakar, G.C. (2005). A novel half-way shifting Bezier curve model. IEEE Region 10 Conference (Tencon), Melbourne, Australia, November.
Sohel, F.A., Dooley, L.S., & Karmakar, G.C. (2006). Accurate distortion measurement for generic shape coding. Pattern Recognition Letters, 27(2), 133-142.
Sohel, F.A., Dooley, L.S., & Karmakar, G.C. (2006). Variable width admissible control point band for vertex based operational-rate-distortion optimal shape coding algorithms. International Conference on Image Processing (ICIP), Atlanta, GA, October.
Sohel, F.A., Dooley, L.S., & Karmakar, G.C. (2007). New dynamic enhancements to the vertex-based rate-distortion optimal shape coding framework. IEEE Transactions on Circuits and Systems for Video Technology, 7(10).
Sohel, F.A., Karmakar, G.C., & Dooley, L.S. (2005). An improved shape descriptor using Bezier curves. First International Conference on Pattern Recognition and Machine Intelligence (PReMI). Lecture Notes in Computer Science, 3776, Kolkata, India, December (pp. 401-406).
Sohel, F.A., Karmakar, G.C., & Dooley, L.S. (2006). Dynamic sliding window width selection strategies for rate-distortion optimal vertex-based shape coding algorithms. International Conference on Signal Processing (ICSP), Guilin, China, November 16-20.
Sohel, F.A., Karmakar, G.C., & Dooley, L.S. (2007). Bezier curve-based character descriptor considering shape information. IEEE/ACIS International Conference on Computer and Information Science (ICIS), Melbourne, Australia, July.
Sohel, F.A., Karmakar, G.C., & Dooley, L.S. (2007). Fast distortion measurement using chord-length parameterisation within the vertex-based rate-distortion optimal shape coding framework. IEEE Signal Processing Letters, 14(2), 121-124.
Sohel, F.A., Karmakar, G.C., & Dooley, L.S. (2007). Spatial shape error concealment utilising image-texture. IEEE Transactions on Image Processing (revision submitted).
Sohel, F.A., Karmakar, G.C., Dooley, L.S. & Arkinstall, J. (2007). Quasi Bezier curves integrating localised information. Pattern Recognition (in press).
Sohel, F.A., Karmakar, G.C., Dooley, L.S., & Arkinstall, J. (2005). Enhanced Bezier curve models incorporating local information. IEEE International Conference on Acoustics, Speech, and Signal Processing (ICASSP), IV, Philadelphia, PA, March 18-23 (pp. 253-256).
Sommerville, I. (2004). Software engineering (7th ed.). Addison Wesley.
Song, Y.I.,Han, K.S., & Rim, H.C. (2004). A term weighting method based on lexical chain for automatic summarization. In Proceedings of the 5th Conference on Intelligent TextProcessing and Computational Linguistics (CICLing) (pp. 636-639).
Sonnenreich, W.,Albanese, J., & Stout, B. (2006, February). Return on security investment (ROSI)-A practical quantitative model. Journal of Research and Practice in Information Technology, 38(1), 99.
Sowa, J.F. (2000). Knowledge representation: logical, philosophical, and computational foundations. Pacific Grove, CA: Brooks/Cole Publishing.
SPARQL. Query Language for RDF, W3C Working Draft 4 October 2006. Retrieved October 8, 2006, from http://128.30.52.31/TR/rdf-sparql-query/
Spewak, S. H., and S. C. Hill (1993). Enterprise architecture planning: developing a blueprint for data, applications, and technology. Boston, QED Publishing Group.
Spiliopoulou, M.,Faulstich, L.C., & Winkler, K. (1999). A data miner analyzing the navigational behaviour of web users. In Proceedings of the Workshop on Machine Learning in User Modeling of the ACAI’99 Int. Conf, Creta, Greece.
SPKI. (1999). SPKI certificate theory. IETF RFC, 2693. Retrieved from, http://www.ietf.org/rfc/rfc2693.txt
Spurr, K., and P. Layzell, eds. (1990). CASE on trial. Chichester, England, John Wiley & Sons. Standish Group (2004). CHAOS report. http://www.standishgroup.com
Spyropoulos, CD.,Paliouras, G., & Karkaletsis, V. (2005, November 30-December 1). BOEMIE: Bootstrapping ontology evolution with multimedia information extraction. 2nd European Workshop on the integration of knowledge, Semantic and Digital Media Technologies, London.
Srikant, R. & Agrawal, R. (1995). Mining generalized association rules. In U. Dayal, P. M. D. Gray, S. Nishio (Eds.), Proceedings of the 21st International Conference on Very Large Databases (pp. 407-419). Zurich: Morgan Kaufmann.
Srini, V.P. (1986). An architecture comparison of dataflow systems. Computer, 68-88.
SSE-CMM Project. (2003). Systems security engineering capability maturity model (version 3.0).
Staab, S.,Schnurr, H.-P.,Studer, R., & Sure, Y. (2001). Knowledge processes and ontologies. IEEE Intelligent Systems Special Issue on Knowledge Management, January/February, 16(1).
Stajano, F., & Anderson, R. (1999). The resurrecting duckling: Security issues for ad-hoc wireless networking. 7th International Workshop on Security Protocols (pp. 172-194).
Stallings, W. (2000). Operating systems: Internals and design principles (4th ed). Alan Apt.
Stamou, S.,Krikos, V.,Kokosis, P., & Christodoulakis, D. (2005). Web directory construction using lexical chains. In Proceedings of the 10th International Conference on Applications of Natural Language to Information Systems (NLDB).
Stamp, M. (2003). Digital rights management: The technology behind the hype. Journal of Electronic Commerce Research, 4(3), 202-212. Long Beach, CA: California State University Long Beach. Retrieved May 12, 2006, from http://home.earth-link.net/~mstampl/DRMpaper.pdf
Stamper, R. (1996). Signs, information, norms and systems. In P. Holmqvist, P. B. Andersen, H. K. Klein, & R. Posner (Eds.), Signs of work: Semiotics and information processing in organizations: Walter de Gruyter.
Stamper, R.,Liu, K.,Hafkamp, M., & Ades, Y. (2000). Understanding the roles of signs and norms in organizations: A semiotic approach to information systems design. Behaviour and Information Technology, 19(1), 15-27.
Stedman, R., Gharavi, H., Hanzo, L., & Steele, R. (1993, February). Transmission of subband-coded images via mobile channels. IEEE Trans. Circuit Syst. Video Technol., 3, 15-27.
Stefik, M. (1996). Letting loose the light: Igniting commerce in electronic publication. In M. Stefic(Ed.), Internet dreams: Archetypes, myths and metaphors. Cambridge, MA.
Stein, L.D.,Cartinhour, S.,Thierry-mieg, D., & Thierry-Mieg, J. (1998). JADE: An approach for interconnecting bioinformatics databases. Gene, 209, 39-43.
Steinbauer, G., & Wotawa, F. (2005b). Detecting and locating faults in the control software of autonomous mobile robots. Proceedings of the 16th International Workshop on Principles of Diagnosis (DX-05) (pp. 13-18).
Steinbauer, G., & Wotawa, F. (2005c). Detecting and locating faults in the control software of autonomous mobile robots. Proceedings of 19th International Joint Conference on Artificial Intelligence (IJCAI-05), Edinburgh, UK.
Steinbauer, G., Weber, J., & Wotawa, F. (2005a). From the real-world to its qualitative representation-Practical lessons learned. Proceedings of the 18th International Workshop on Qualitative Reasoning (QR-05) (pp. 186-191).
Stevens, M. (2006). UTM: One-stop protection. Network Security, 2006(2), 12-14.
Stewart, R. (2005, June). Stream control transmission protocol (SCTP) dynamic address configuration. IETF DRAFT, draft-ietf-tsvwgaddip-sctp-12.txt.
Stoesser, G.,Baker, W.,Van Den Broek, A.,Garcia-Pastor, M.,Kanz, C., & Kulikova, T. (2003). The EMBL nucleotide sequence database: Majornew developments. Nucleic Acids Research, 31, 17-22.
Stojanovic, L.,Stojanovic,N., & Volz, R. (2002). Migrating data-intensive web sites into the semantic web. In Proceedings of the 17th ACM symposium on applied computing (SAC). ACM Press.
Stolze, M. (2000). Soft navigation in electronic product Catalogs. International Journal on Digital Libraries, 3(1), 60-66.
Stone, M., & Doran, C. (1997). Sentence planning as description using tree-adjoining grammar. Proceedings of ACL 1997 (pp. 198-205).
Stone, P, & Veloso, M. (n.d.). Multiagent systems: A Survey from a Machine Learning Perspective (Tech. Rep.CMU-CS-97-193). Pittsburgh, PA: Carnegie Mellon University, School of Computer Science.
Stone, P, & Veloso, M.M. (2000). Multiagent systems: A survey from a machine learning perspective. Autonomous Robots, 8(3), 345-383.
Stoy, J.E. (1977). Denotational semantics: The Scott-Strachey approach to programming language theory. The MIT Press.
Strobach, P. (1990). Linear prediction theory: A mathematical basis for adaptive systems. London: Springer Verlag.
Stubblefield, A., Ioannidis, J., & Rubin, A. (2002). Using the Fluhrer, Mantin and Shamir attack to break WEP. Proceedings of the Network and Distributed Systems Security Symposium (pp. 17-22).
Stubblefield,A.,Ioannidis, J., & Rubin, A. (2001). Using the Fluhrer, Mantin, and Shamir attack to break WEP. (Tech. Rep. TD-4ZCPZZ). AT&T Labs.
Sturm, R. (2005). IT life cycle management: from theory to practice. White Plains, NY, International Business Machines.
Sturm, R., and W. Bumpus (1999). Foundations of application management. New York, John Wiley & Sons.
Sturm, R., L. Erickson-Harris, et al. (2002). SLM solutions: a buyer’s guide. Boulder, CO, Enterprise Management Associates.
Sturm, R., W. Morris, et al. (2000). Foundations of service level management. Indianapolis, Sams.
Sucurovic, S., & Jovanovic Z. (in press). Java cryptography & attribute certificate management. San Francisco: Dr. Dobb’s Journal.
Sucurovic, S., & Jovanovic, Z. (2005, February). Java cryptography & X.509 authentication. San Francisco: Dr. Dobb’s Journal.
Sugawara, K., & Sano, M. (1997). Cooperative acceleration of task performance: Foraging behavior of interacting multi-robots system. Physica D, 100(3-4), 343-354. Retrieved November 27, 2004, from Association for Computing Machinery Digital Library Database.
Suguri, H. (1998). Integrated meta media environment based on FIPA agent platform (in Japanese). Proceedings of Symposium on Creative Software and E-Commerce Promotion (pp. 279-282).
Suguri, H., Farooq Ahmad, H., Omair Shafiq, M., & Ali, A. (2004, October). Agent Web gateway -enabling service discovery and communication among software agents and Web services. Proceedings of Third Joint Agent Workshops and Symposium (JAWS2004), Karuizawa, Japan.
Sun Microsystems Inc. (1991). Installing, administering, and using the basic security module (Tech. Rep.). Mountain View, CA.
Sun Microsystems. (1995-2003a). JAR files. Retrieved April 27, 2006, from http://java.sun.com/docs/books/tutorial/jar/index.html/
Sun Microsystems. (1995-2003b). JavaTM 2 platform. Retrieved April 27, 2006, from http://java.sun.com/java2/whatis
Sun Microsystems. (1995-2003c). The source for Java technology. Retrieved April 27, 2006, from http://java.sun.com
Sun Microsystems. (2005). Sun Microsystems president Jonathan Schwartz shares project dream. Retrieved January 26, 2006, from http://www.sun.com/smi/Press/sunflash/2005-08/sunflash.20050822.2.html
Sun, J., Howie, D., Koivisto, A., & Sauvola, J. (2001). A hierarchical framework model of mobile security. Proc. 12th IEEE International Symposium on Personal, Indoor and Mobile Radio Communication, 1, San Diego, CA, September 30-October 3 (pp. 56-60). USA: IEEE.
Sun, J., Howie, D., Koivisto, A., & Sauvola, J. (2001). Design, implementation, and evaluation of Bluetooth security. Proc. IEEE International Conference on Wireless LANs and Home Networks, Singapore, December 5-7 (pp. 121-130). USA: IEEE. Retrieved July 11, 2005, from http://www.mediateam.oulu.fi/publications/pdf/87.pdf
Sun, J.,Howie, D.,Koivisto, A., & Sauvola, J. (2001). Design, implementation, and evaluation of Bluetooth security. In Proceedings IEEE International Conference on Wireless LANs and Home Networks, Singapore, 121-130.
Sun, S., Haynor, D., & Kim, Y. (2003). Semiautomatic video object segmentation using v-snakes. IEEE Transactions on Circuits and Systems for Video Technology, 13(1), 75-82.
Sun, Y., Ahmad, I., Li, D., & Zhang, Y.-Q. (2006). Region-based rate control and bit allocation for wireless video transmission. IEEE Transactions on Multimedia, 8(1), 1-10.
Sundaresan, H. (2003). OMAPTM platform security features. White Paper. Retrieved July 1, 2005, from http://focus.ti.com/pdfs/wtbu/omapplatformsecuritywp.pdf
Sunderam V. S. (1990). A framework for parallel distributed computing. Concurrency: Practice and Experience, 2(4), 315-339
Sung, A. H.,Xu, J.,Chavez, P., & Mukkamala, S. (2004). Static analyzer for vicious executables (SAVE). In Proceedings of 20’h Annual Computer Security Applications Conference (ACSAC), 326-334.
Sunner, M. (2005). E-mail security best practice. Network Security, 2005(12), 4-6.
Suryanto, H., & Compton, P. (2001). Discovery of ontologies from knowledge bases. In Proceedingsofthe 1stInternational Conference on Knowledge Capture, the Association for Computing Machinery (pp. 171-178). New York.
SVP. (2004). The secure video processor (SVP) initiative. Retrieved January 26,2006, from http://www.svpalliance.org/
Sward, David S.. Measuring the Business Value of Information Technology: Practical Strategies for IT and Business Managers. Intel Press.
Swartout, W., Hill, R., Gratch, J., Johnson, W.L., Kyriakakis, C., & LaBore, et al. (2001). Toward the holodeck: integrating graphics, sound, character and story. Proceedings of the 5th International Conference on Autonomous Agents (pp. 409-416). Retrieved from http://citeseer.nj.nec.com/447724.html
Symantec Corporation. (2005). Symantec AntiVirusTM for handhelds annual service edition, Symantec antiVirus for handhelds safeguards Palm and Pocket PC mobile users. Retrieved July 9, 2005, from http://www.symantec.com/sav/handhelds/ and http://www. Symantec.com/press/2003/n030825.html
Symantec Corporation. (2005). Symantec security response. Retrieved November 2005 from http://securityresponse.symantec.com/avcenter/
Symantec Corporation. (2006). Symantec mobile security for Symbian. Retrieved January 15, 2006, from http://www.symantec.com/Products/enterprise?c=prodinfo&refId=921andhttp://eval.veritas.com/mktginfo/enterprise/factsheets/ent-factsheet_mobile_security_for_symbian_04-2005.en-us.pdf
Symantec. (2003). Wireless handheld and smartphone security. Retrieved September 26, 2007, from http://whitepapers.zdnet.co.uk/0,1000000651,260085794p,00.htm?r=1
Symantec. (2005). Wireless handheld and smartphone security. Retrieved December 16, 2005, from http://enterprisesecurity.symantec.com/Products/products.cfm?MenuItemNo=2&productID=663&EID=0
Symbian OS Version 9.3(2006).Retrieved July 20th, 2006,from http://www.symbian.com/files/rx/file7999.pdf
Symbian OS: Overview To Security (2006). Version 1.1, Retrieved January 26th, 2006 from http://sw.nokia.com/id/5e713b29-fe0e-488d-8fc6-b4ddl950f3c2/Symbian_OS_Overview_To_Security_vl_l_en.pdf
Symbian Signed Portal. Retrieved January 30th, 2006 from http://www.symbiansigned.com
Symbian. (2006). Symbian OS: The mobile operating system. Retrieved January 26th, 2006 from http://www.symbian.com
Szilas, N. (2003). IDtension: A narrative engine for interactive drama. In Göbel et al. (Eds.), Technologies for interactive digital storytelling and entertainment (TIDSE’03).
Szilas, N., & Kavakli, M. (2006, January 29-February 1). PastMaster@Storytelling: A controlled interface for interactive drama. Proceedings of IUI 2006: International Conference on Intelligent user Interfaces, CSIRO ICT Centre, Macquarie University, Sydney, Australia.
Szor, P.(2005). The art of computer virus research and defense. Upper Saddle River, NJ: Addison-Wesley.
Tabesh, A., Bilgin, A., Krishnan, K., & Marcellin, M. W. (2005). JPEG2000 and motion JPEG2000 content analysis using codestream length information. Proceedings of The Data Compression Conference (DCC’05), Snowbird, UT, March 29-31 (pp. 329-337). Washington, DC: IEEE Computer Society.
Takagi, H., & Hayashi, I. (1991). Nn-driven fuzzy reasoning. Proceedings of the International Journal of Approximate Reasoning, 5(3), 191-212.
Talukder, A. K. (2005). Clean and tidy. Communications Engineer, 5(4),38-41.
Talukder, A. K.,Rao V. B.,Kapoor, V., & Sharma, D. (2004). Artificial hygiene: A critical step towards safety from e-mail viruses. In Proceedings of the IEEE INDICON 2004, 484-489.
Talwar, V., & Nahrstedt, K. (2000). Securing RSVP for multimedia applications. Multimedia Security Workshop ACM Multimedia, Los Angeles, CA, October 30-November 3 (pp. 153-156). USA: ACM Press.
Tan, H.,Dillon, T.S.,Hadzic, F.,Chang, E., & Feng, L. (2005). MB3 Miner: Mining eMBedded sub-TREEs using tree model guided candidate generation. In Proceedings of the 1st International Workshop on Mining Complex Data, held in conjunction with ICDM 2005. Houston, TX: IEEE CS Press.
Tan, H.,Dillon, T.S.,Hadzic, F.,Chang, E., & Feng, L. (2006a). Mining induced/embedded subtrees using the level of embedding constraint. Knowledge and Information Systems An International Journal, Submitted.
Tan, H.,Dillon, T.S.,Hadzic, F.,Chang, E., & Feng, L. (2006b). IMB3-Miner: mining induced/embedded subtrees by constraining the level of embedding. In Proceedings of the 10’h Pacific-Asia Knowledge Discovery and Data Mining Conference (PAKDD 2006). Singapore: Springer.
Tan, H.,Dillon, T.S.,Hadzic, F.,Feng, L., & Chang, E. (2006c) Tree model guided candidate generation formining frequent subtrees from XML. Transactions on Knowledge Discovery from Data (TKDD), Submitted.
Tan, M. (1993). Multi-agent reinforcement learning: Independent vs. cooperative agents. In M.N.Huhns and M.P.Singh (Eds.), Proceedings of the Tenth International Conference on Machine Learning (pp. 330-337). Amherst, MA: Morgan Kaufmann Publishers.
Tanasa, D. (2005). Web usage mining: Contributions to intersites logs preprocessing and sequential pattern extraction with low support. PhD thesis, University of Nice Sophia Antipolis.
Tanasa, D., & Trousse, B. (2004). Advanced data preprocessing for intersites Web usage mining. IEEE Intelligent Systems, 19(2) 59-65.
Tanenbaum, A., & Steen, M. (2002). Distributed systems: Principles and paradigms. Prentice Hall.
Tang, C.-W., Chen, C.-H., Yu, Y.-H., & Tsai, C.-J. (2006). Visual sensitivity guided bit allocation for video coding. IEEE Transactions on Multimedia, 8(1), 11-18.
Tannenbaum, A. (1994). Implementing a corporate repository: the models meet reality. New York, John Wiley & Sons.
Tannenbaum, A. (2002). Metadata solutions: using metamodels, repositories, XML, and enterprise portals to generate information on demand. Boston, Addison-Wesley.
Tao, H., Sawhney, H.S., & Kumar, R. (2002). Object tracking with Bayesian estimation of dynamic layer representations. IEEE Transactions on Pattern Analysis and Machine Intelligence, 24(1), 75-89.
Tariq, A., Amna, B., Farooq Ahmad, H., Ali, A., & Suguri, H. (2005, April 12). S Agents: Next generation autonomic entities for FIPA-compliant multi-agent system. Proceedings of IADIS Virtual Multi Conference on Computer Science and Information Systems (MCCSIS 2005) under Intelligent Systems and Agents (ISA 2005).
Tariq, A., Basharat, A., Farooq Ahmad, H., Ali, A., & Suguri, H. (2005). A hybrid agent architecture for modeling autonomous agents in SAGE. Proceedings of Sixth International Conference on Data Engineering and Automated Learning (IDEAL 2005), Brisbane, Australia.
Taubman, D. (2000). High performance scalable image compression with EBCOT. IEEE Transactions on Image Processing, 9(7), 1158-1170.
Taubman, D., & Marcellin, M. (2002). JPEG2000: Image compression fundamentals, standards and practice. Netherlands: Kluwer Academic Publishers.
Taubman, D.S., & Marcellin, M.W. (2002). JPEG2000: Image compression fundamentals, standards and practice. Boston: Kluwer Academic Publishers.
Taubman, D.S., & Zakhor, A. (1994). Multirate 3-D subband coding of video. IEEE Transactions on Image Processing, 3(4), 572-88.
Taylor, L. (2004). Handheld security, part III: Evaluating security products. Retrieved July 1, 2005, from http://www.firewallguide.com/pda.htm
Taylor, L. (2004-2005). Handheld Security, Part I-V. Retrieved October 9, 2005, from http://www.firewallguide.com/pda.htm
Taylor, L. (2004-2005). Handheld security, part I-V. Retrieved September 25, 2007, from http://www.pdastreet.com/articles/2004/12/2004-12-6-Handheld-SecurityPart.html
Taylor, S., & Todd, P.A. (1995). Assessing IT usage: The role of prior experience. MIS Quarterly, 19(4), 561-570.
Taylor, S., & Todd, P.A. (1995). Understanding information technology usage: A test of competing models. Information Systems Research, 6(2), 144-176.
Tecchia, F., Loscos, C., Conroy, R., & Chrysanthou, Y. (2001). Agent behaviour simulator (ABS): A platform for urban behaviour development. Proceedings of the First International Game Technology Conference and Idea Expo (GTEC’01) in co-operation with ACMSIGGRAPH and EUROGRAPHICS (pp. 17-21). Retrieved January 9, 2005, from http://www.equator.ac.uk/var/uploads/TecchiaGTEC2001.pdf
Tecuci, G., (1998). Bwlding Intelligent Agents, San Diego, CA: Academic Press.
Tecuci, G., Boicu, M., Boicu, C., Marcu, D., Stanescu, B., & Barbulescu, M., (2005). The disciple-RKF learning and reasoning agent. Computational Intelligence, 21(4), 462-479.
Tecuci, G., Boicu, M., Bowman, M., & Marcu, D. (2001). An innovative application from the DARPA knowledge bases program, rapid development of a course of action critiquer. AI Magazine, 22(2), 43-61.
Tecuci, G., Boicu, M., Bowman, M., Marcu, D., Syhr, P., & Cascaval, C. (2000). An experiment in agent teaching by subject matter experts. International Journal of Human-Computer Studies, 53, 583-610.
Tekalp, A.M. (1995). Digital video processing. Prentice Hall Signal Processing Series. Prentice Hall, Englewood Cliffs: NJ.
Telecom New Zealand. (2004, June). Product finder: Internet and data, Telecom’s wireless hotspot service. Retrieved May 18, 2006, from http://www.telecom.co.nz/content/0,3900,204163-1487,00.html
Telford, W.M.,Geldart, L.P., & Sheriff, R.E. (1998). Applied geophysics (2nd ed.) (pp. 100-350 and 600-750).
Templeton, S. J., & Levitt, K. (2000). A requires/provides model for computer attacks. Workshop on New security paradigms, 31-38.
Tentori, M., Favela, J., & Gonzalez, V. (2005). Designing for privacy in pervasive hospital environments. Ubiquitous Computing & Ambient Intelligence. Retrieved December 2005, from http://www.isr.uci.edu/~vmgyg/documents/ucami.pdf
Tentori, M., Favela, J., Gonzalez, V., & Rodríguez, M. (2005). Supporting quality of privacy (QoP) in pervasive computing. Encuentro Internacional de Ciencias de la Computación (ENC), Pueblo, Mexico, September 26-30 (pp. 58-67). IEEE Computer Society.
Teo, T.S.H., & Pok, S.H. (2003). Adoption of WAP-enabled mobile phones among Internet users. Omega: The International Journal of Management Science, 31(6), 483-498.
Teorey, T. J. (1994). Database modeling & design: the fundamental principles. San Francisco, CA, Morgan Kaufmann.
Terry, D.J. (1993). Self-efficacy expectancies and the theory of reasoned action. In D.C.Terry, C.Gallois, & M.McCamish (Eds.), The theory of reasoned action: Its application to AIDS-preventive behaviour (pp. 135-152). Oxford: Pergamon.
Terveen, L., & Hill, W. (2001). Beyond recommender systems: helping people help each other. In J. Carroll (Ed.), Human computer interaction in the new millennium. Addison-Wesley.
Tesauro, G., Chess, D.M., Walsh, W.E., Das, R., Segal, A., Whalley, I., et al. (2004, July 19-23). A multi-agent systems approach to autonomic computing. Proceedings of AAMAS ’04. New York.
Thai, B., Wan, R., Seneviratne, A., & Rakotoarivelo, T. (2003, February). Integrated personal mobility architecture: A complete personal mobility solution. ACM Mobile Networks and Applications (MONET) Special Issue: Personal Environment Mobility in Multi-Provider and Multi-Segment Network, 8, 27-36.
Tham, J.Y., Ranganath, S., Ranganath, M., & Kassim, A.A. (1998). A novel unrestricted center-biased diamond search algorithm for block motion estimation. IEEE Transactions on Circuits and Systems for Video Technology, 8(4), 369-377.
Thatte, S. (2001). XLANG: Web services for business process design. Microsoft Corporation, Initial Public Draft.
The Familiar Project. (2005). The familiar project. Retrieved July 10, 2005, from http://familiar.handhelds.org/
The Internet Society. (1998). RFC 2440: OpenPGP message format. Retrieved April 27, 2006, from http://www.ietf.org/rfc/rfc2440.txt
The Internet Society. (1999a). RFC 2459: Internet X.509 public key infrastructure, certificate and CRL profile. Retrieved April 27, 2006, from http://www.ietf.org/rfc/rfc2459.txt
The Internet Society. (1999b). RFC 2633: S/MIME version 3 message specification. Retrieved April 27, 2006, from http://www.ietf.org/rfc/rfc2633.txt
The Miro Developer Team (2005). Miro Manual, 0.9.4ed. University of Ulm: Department of computer science.
Theodoridis, Y.,Marketos, G., & Kalogeras, I.S. (2004). Collecting and mining seismic data in Greek territory: The seismo-surfer tool. In Proceedings of the 7th Panhellenic Geographical Conference of the Hellenic Geographical Association (HGA’04), Mytilene, Lesvos, Greece.
Thomas H. DAVENPORT, Information Ecology, Oxford University Press, 1997
Thomas, L.C. (Ed.). (1984). Games, theory and applications. Chichester: Halsted Press.
Thompson, R., Higgins, C., & Howell, J. (1994). Influence of experience on personal computer utilization: Testing a conceptual model. Journal of Management Information Systems, 11(1), 167-187.
Thompson, R.L., Higgins, C.A., & Howell, J.M. (1991). Personal computing: Toward a conceptual model of utilization. MIS Quarterly, 15(1), 125-143.
Thomson, S., & Narten, T. (1998, December). IPv6 stateless address auto configuration. IETF RFC 2462.
TimeWarner. (2005). Time Warner statement on lost employee data tapes. Retrieved January 26, 2006, from http://www.timewarner.com/corp/newsroom/employee_data_tapes/press_release.html
Toh, C.K. (1996). A novel distributed routing protocol to support ad-hoc mobile computing. Proceedings of the 15th IEEE International Performance, Computing, and Communications Conference (IPCCC), Phoenix, Arizona, March 27-29 (pp. 480-486). New York: IEEE.
Toh, C.K. (1997). Associativity-based routing for ad hoc mobile networks. Journal of Wireless Personal Communications, 4(2), 103-139.
Toivonen, T., & Heikkilä, J. (2004). Fast full search block motion estimation for H.264/avc with multilevel successive elimination algorithm. In Proc. International Conference on Image Processing (ICIP), 3, Singapore, October (pp. 1485-1488).
Tombini, E.,Debar, H.,Me, L., & Ducassé, M. (2004). A serial combination of anomaly and misuse IDSes applied to HTTP traffic. In Proceedings of the 20th Annual Computer Security Applications Conference (ACSAC’04). Los Alamitos, CA:. IEEE Computer Society Press.
Tong, R.M. (1985). An annotated bibliography of fuzzy control. In M.Sugeno (Ed). Industrial applications of fuzzy control (pp. 249-269). New York: North Holland.
Topaz Systems Inc. (2005). Electronic signature pad with interactive LCD display. Retrieved July 7, 2005, from http://www.topazsystems.com/products/specs/TL462.pdf
Topiwala, P.N. (1998). Wavelet image and video compression. Boston: Kluwer Academic Publishers.
Toufik, I., & Knopp, R. (2004). Channel allocation algorithms for multi-carrier systems. Proc. of the IEEE VTC ’04, Los Angeles, CA, September (pp. 1129-1133). New York: IEEE.
Tran, D. (2004a). New background models for pattern verification. Proceedings of the INTERSPEECH, ICSLP Conference, Korea, 4, 2605-2608.
Tran, D. (2004b). Temporal hidden Markov models. Proceedings of the International Symposium on Intelligent Multimedia, Video and Speech Processing (pp. 137-140).
Tran, D. (2004c). Estimation of prior probabilities in speaker recognition. Proceedings of the International Symposium on Intelligent Multimedia, Video and Speech Processing, Hong Kong (pp. 141-144).
Tran, D., & Pham, T. (2005). Fuzzy estimation of priors in speaker recognition. WSEAS Transactions on Circuits and Systems, 4(4), 369-373.
Tran, D., & Wagner, M. (2002). A fuzzy approach to speaker verification. International Journal of Pattern Recognition and Artificial Intelligence (IJPRAI), 16(1), 913-925.
Tran, D., Pham, T., & Wagner, M. (1999). Speaker recognition using Gaussian mixture models and relaxation labelling. Proceedings of the World Multiconference on Systemetics, Cybernetics and Informatics/The International Conference of Information Systems Analysis and Synthesis (Vol. 6, pp. 383-389).
Tripathi, A., Karnik, N., Ahmed, T., Singh, R., Prakash, A., Kakani, V., et al. (2002). Design of the Ajanta system for mobile agent programming. Journal of Systems and Software, 62(2).
Trousse, B., Jaczynski, M. & Kanawati, R. (1999). Using user behavior similarity for recommandation computation: The broadway approach. In Proceedings of 8th International Conference on Human Computer Interaction (HCI’99) (pp. 85-89). Munich:Lawrence Erlbaum.
Trust Digital. (2005). Trust digital 2005TM. Retrieved July 5, 2005, from http://www.trustdigital.com/downloads/productsheet_trust2005.pdf
Trusted Computing Group. (2004). Security in mobile phones. Retrieved July 1, 2005, from http://www.trustedcomputinggroup.org/downloads/whitepapers/TCGSP-mobile-sec_final_10-14-03_V2.pdf
Truszkowski, W., Hinchey, M., Rash, J., & Rouff, C. (2004). NASA’s swarm missions: The challenge of building autonomous software. Institute of Electrical and Electronics Engineers Information Technology Professional, 6(5), 47-52. Retrieved August 5, 2006, from Institute of Electrical and Electronics Engineers Digital Library Database.
Tsalgatidou, A., & Pilioura, T. (2002). An overview of standards and related technology in web services. Distributed and Parallel Databases. 12(3).
Tsuchiya, P.F. (1988). The landmark hierarchy: A new hierarchy for routing in very large networks. Computer Communication Review, 18(4), 35-42.
Tsujii, J., & Ananiadou, S. (2005). Thesaurus or logical ontology, which one do we need for text mining? Language Resources and Evaluation, 39(1), 77-90.
Tsuruta, T., & Shintani, T. (2000). Scheduling meetings using distributed valued constraint satisfaction algorithm. Proceedings of the 14th European Conference on Artificial Intelligence (ECAI-00) (pp. 383-387).
Tsykin, M. (2002). “Service level measurement: checkpoint 2000.” The guide to IT service management. J. van Bon, ed. London, Addison-Wesley: 97-115.
Tudhope, D.,Alani, H., & Jones, C. (2001). Augmenting thesaurus relationships: Possibilities for retrieval. Journal of Digital Information, 1-8(41).
Turchin, V. (1993). The cybernetic ontology of action. Kybernetes, 22(2), 10-30.
Tychsen, A., Hitchens, M., Brolund, T., & Kavakli, M. (2005, December). The game master. Proceedings of 2nd International Workshop on Interactive Entertainment (IE2005), Sydney, Australia.
Ullman, J. D. (1988). Principles of database and knowledgebase systems: Vol. I. Computer Science Press.
Ullman, J. D. (1989). Principles of database andknowledge-base systems: Vol. II. Computer Science Press.
Uma, G., Prasad, B., & Kumari, O. (1993). Distributed intelligent systems-Issues, perspectives and approaches. Knowledge Based Systems, 6(2), 77-96.
UMTS World. (2003). 3 G applications. Retrieved May 2007, from http://www.umtsworld.com/applications/applications.htm
UMTS. (2003). Mobile evolution: Shaping the future. Retrieved August 28, 2005, from http://www.umts-forum.org/servlet/dycon/ztumts/umts/Live/en/umts/Resources_Papers_index
US-CERT. (2005). US-CERT vulnerabilities notes. Retrieved January 2006 from http://www.kb.cert.org/vuls/
Uschold, M. (1998). Knowledge level modeling: Concepts and terminology. Knowledge Engineering Review, 13(1).
Uschold, M., & Gruninger, M. (1996). Ontologies: Principles, methods and applications. Knowledge Engineering Review, 11(2).
Uschold, M., & King, M. (1995). Towards a methodology for building ontologies. In Proceedings of the Workshop on Basic Ontological Issues in Knowledge Sharing at the International Joint Conference on Artificial Intelligence (IJCAI1995).
Uther, W., & Veloso, M. (1997). Adversarial reinforcement learnmg (Tech. Rep. CMU-CS-03-107). Pittsburgh, PA: Carnegie Mellon University, School of Computer Science.
Utz, H. (2005). Advanced Software Concepts and Technologies for Autonomous Mobile Robotics. Unpublished doctoral dissertation, University of Ulm.
Utz, H., Sablatnüg, S., Enderle, S., & Kraetzschmar, G. (2002). Miro: Middleware for mobile robot applications [Special issue]. IEEE Transactions on Robotics and Automation, 18(4), 493-497.
Vaccaro, H. S., & Liepins, G. E. (1989). Detection of anomalous computer session activity. Symposium on Research in Security and Privacy, 280-289.
Vaishampayan, V.A. (1993). Design of multiple description scalar quantizers. IEEE Transaction on Information Theory, 39(3), 821-834.
van Bon, J., ed. (2002). The guide to IT service management 2002. London; Boston, Addison-Wesley.
van Bon, J., G. Kemmerling, et al. (2002). IT service management: an introduction. itSMF-Canada.
van de Sandt-Koenderman, M., Wiegers, J., & Hardy, P. (2005, May). A computerised communication aid for people with aphasia. Disability Rehabilitation, 27(9), 529-533.
van den Elskamp, H., W. J. J. Kuiper, et al. (2002). “Integrated service management (ISM).” The guide to IT service management. J. van Bon, ed. London, Addison- Wesley: 116-130.
Van Dyke, C., & Koc, C.K. (2003, February). On ubiquitous network security and anomaly detection. Proceedings of the Applications and the Internet Workshops, January 27-31 (pp. 374-378). Electrical & Computer Engineering, Oregon State University.
Van Eijk, P.,Vissers, C, & Diaz, M. (1989). The formal description technique LOTOS. Elsevier Science.
van Herwaarden, H., and F. Grift (2002). “IPW and the IPW stadia model (IPWSM).” The guide to IT service management. J. van Bon, ed. London, Addison-Wesley: 97-115.
van Steenderen, M. (2002). Business applications of WAP. The Electronic Library, 20(3), 215-223.
Van Wie, D.,Sibert, O., & Horning, J. (1997, October 7-10). Panel on the InterTrust commerce architecture. In Proceedings of the 20’h National Information Systems Security Conference, Baltimore, MD.
VanDeursen, A.,Klint, P., & Visser, J. (2000). Domain-specific languages: An annotatedbibliography. ACMSIGPLAN Notices, 35(6), 26-36.
VASCO. (2005, December). Avoid phishing – Use strong authentication. Retrieved July 1, 2006, from http://www.firewalls.com.au/docs/nophishing.pdf
Venkatesh, V., & Davis, F.D. (2000). A theoretical extension of the technology acceptance model: four longitudinal field studies. Management Science, 46(2), 186-204.
Venkatesh, V., & Morris, M.G. (2000). Why don’t men ever stop to ask for directions? Gender, social influence, and their role in technology acceptance and usage behavior. MIS Quarterly, 24(1), 115-139.
Venkatesh, V., Morris, M.G., Davis, G.B., & Davis, F. D. (2003). User acceptance of information technology: Toward a unified view. MIS Quarterly, 27(3), 425-478.
Venners, B. (1997). Java security: How to install the security manager and customize your security policy. Retrieved April 27, 2006, from http://www.javaworld.com/javaworld/jw-11-1997/jw-11-hood.html
Verde, R., & Lechevallier, Y. (2003). Crossed Clustering method on Symbolic Data tables. In M. Vichi, P. Monari, S. Migneni, & A. Montanari, (Eds.), New developments in classification, and data analysis (pp. 87-96). Heidelberg: Springer-Verlag.
Verhoef, C. (2002). “Quantitative IT portfolio management.” Science of Computer Programming 45:1-96.
Veridt, LLC. (2005). Veridt verification and identification, product information. Retrieved September 27, 2007, from http://www.veridt.com/Products.html
VeriSign. (2005, December). Unified authentication tokens. Retrieved July 1, 2006, from http://www.verisign.com/products-services/security-services/unified-authentication/usb-tokens/index.html
Verma, V., Gordon, G., Simmons, R., & Thrun, S. (2004). Real-time fault diagnosis. IEEE Robotics & Automation Magazine, 11(2), 56-66.
Vigna, G., Gwalani, S., Srinivasan, K., Belding-Royer, E. M., & Kemmerer, R.A. (2004). An intrusion detection tool for AODV-based ad hoc wireless networks. Proceedings of the Annual Computer Security Applications Conference (ACSAC), Miami Beach, FL, December 10-14 (pp. 16-27). IEEE Computer Society.
Vigna, G.,Eckmann, S. T., & Kemmerer, R. A. (2000). Attack languages. IEEE Information Survivability Workshop, 163-166.
Vigna, G.,Gwalani, S.,Srinivasan, K.,Belding-Royer, E. M., & Kemmerer, R. A. (2004). An intrusion detection tool for AODV-based ad hoc wireless networks. In Proceedings of the 20th Annual Computer Security Applications Conference (ACSAC’04). Los Alamitos, CA:. IEEE Computer Society Press.
Villamil, F. (2005). Firewall wizards: Looking for PDA firewall Retrieved July 10, 2005, from http://seclists.org/lists/firewall-wizards/2004/Jan/0031.html
Vitaglione, F., Quarta, E., & Cortese. (2002, July 16). Scalability and performance of JADE message transport system. Proceedings of AAMAS Workshop on AgentCities, Bologna, Italy. Retrieved from http://sharon.cselt.it/projects/jade
Viveros, S. (2005). Changing malware threats- AV vendors’s View. Network Security, 2005(12), 16-18.
Vodafone New Zealand. (2005, March). Business services: Paying with your mobile-TXT-a-Park. Retrieved May 20, 2006, from http://www.vodafone.co.nz/promos/txt-a-park/txt_a_park.jsp?item=txt_a_park
Volz, R.,Oberle, D.,Staab, S., & Studer, R. (2003). OntoLiFT Prototype. IST Project 2001-33052 WonderWeb Deliverable.
VQEG. (1998). Final report from the Video Quality Expert Group on the validation of objective models of video quality assessment.
Vraalsen, F. (Ed.). (2006). Methods and Tools for legal risk management (Tech. Rep. D17). Oslo, Norway: TrustCoM EU 1ST Project 01945.
Vraalsen, F.,den Braber, F,Lund, M. S., & Stolen, K. (2005). The CORAS tool for security risk analysis. In P. Herrmann, V Issarny, & S. Shiu, (Eds.), Proceedings of the 3rdInternational Conference on Trust Management (iTrust 2005) (pp. 402-405). Paris: Springer LNCS 3477.
Vraalsen, F.,Lund, M. S.,Mahler, T.,Parent, X., & Stolen, K. (2005). Specifying legal risk scenarios using the CORAS threat modelling language – experiences and the way forward. In P. Herrmann, V Issarny, & S. Shiu (Eds.), Proceedings of the 3rd International Conference on Trust Management (iTrust 2005) (pp. 45-60). Paris: Springer LNCS 3477.
W3C (1996). W3C: On mobile code. Retrieved April 27, 2006, from http://www.w3.org/MobileCode/
Wade, N., & Swanston, M. (2001). Visual perception: An introduction (2nd ed.). London: Psychology Press.
Wagner, R., & Sternberg, R. (1991). TKIM: The common sense manager: Tacit knowledge inventory for managers: Test Booklet The Psychological Corporation Harcourt Brace Jovanovich San Antonio.
Wahlqvist, M. et al. (1997). Capacity comparison of an OFDM based multiple access system using different dynamic resource allocation. Proc. IEEE VTC’97, Phoenix, Arizona (pp. 1664-1668). New York: IEEE.
Waker, J. (2005). The extended security perimeter. Information Security Technical Report, 2005(10), 220-227.
Walczak1, S. (2003). A multiagent architecture for developing medical information retrieval agents. Journal of Medical Systems, 27(5), 479-498. Retrieved July 29, 2005, from Association for Computing Machinery Digital Library Database.
Walker, G., and Harris Kern’s Enterprise Computing Institute. (2001). IT problem management. Professional Technical Reference. Upper Saddle River, NJ, Prentice Hall.
Walker, J. (2001, May). Unsafe at any key size: An analysis of the WEP encapsulation. IEEE 802.11 doc 00-362, grouper.ieee.org/groups/802/11.
Wallace, G.K. (1991). The JPEG still picture compression standard. Communications of the ACM, 34(4), 30-44.
Wan, P.-J., Calinescu, G., & Yi, C.-W (2004). Minimum-power multicast routing in static ad hoc wireless networks. IEEE/ACM Transactions on Networking, 12(3), 507-514.
Wan, T., & Yang, X. D. (2000). IntruDetector: A software platform for testing network intrusion detection algorithms.
Wang, B.B.,McKay, I.,Abbass, H.A., & Barlow, M. (2003). A comparative study for domain ontology guided feature extraction. In Proceedings of the 26th Australian Computer Science Conference (ACSC-2003) (pp. 69-78). Adelaide, Australia. Australian Computer Society, Inc.
Wang, H., Raman, B., Biswas, R., Chuah, C., Gummadi, R., Hohlt, B., Hong, X., Kiciman, E., Mao, Z., Shih, J., Subramanian, L., Zhao, B., Joseph, A., & Katz, R. (2000, August). Iceberg: An Internet-core network architecture for integrated communications. IEEE Personal Communications (2000): Special Issue on IP-based Mobile Telecommunication Networks, 7(4), 10-19.
Wang, H., Schuster, G.M., & Katsaggelos, A.K. (2005). Rate-distortion optimal bit allocation for object-based video coding. IEEE Transactions on Circuits and Systems for Video Technology, 15(9), 113-1123.
Wang, H.,Azuaje, F., & Bodenreider, O. (2005). An ontology-driven clustering method for supporting gene expression analysis. In Proceedings of the 18th IEEE Symposium on Computer-Based Medical Systems (pp. 389-394).
Wang, L., Zhang, L.F., Shu, Y.T., Dong, M., & Yang, O.W.W. (2001). Adaptive multi-path source routing in wireless ad-hoc networks. Proceedings of the IEEE International Conference on Communications (ICC), St. Petersburg, Russia, June 11-15 (pp. 867-871). New York: IEEE.
Wang, Q., & Abu-Rgheff, M.A. (2002). Integrated mobile IP and SIP approach for advanced location management. 4th International Conference on 3 G Mobile Communication Technologies, 2003, London, UK, June 25-27 (pp. 205-209). New York: IEEE.
Wang, W. et al. (2003). Impact of multiuser diversity and channel variability on adaptive OFDM. Proc. IEEE VTC 2003 Fall, Orlando, Florida, October (pp. 547-551). New York: IEEE.
Wang, W.,Yang, J., & Yu, P.S. (2000). Efficient mining of weighted association rules (WAR). In Proceedings of the Sixth ACM SIGKDD International Conference (pp. 270-274). Boston.
Wang, Y., & Zhu, Q. (1998). Error control and concealment for video communication: A review. Proceedings of the IEEE, 86(5), 974-997.
Wang, Y., Liu, J., & Jin, X. (2003). Modeling agent-based load balancing with time delays. Proceedings of the 2003 Institute of Electrical and Electronics Engineers/WIC International Conference on Intelligent Agent Technology, 189+. Retrieved December 15, 2004, from Institute of Electrical and Electronics Engineers Digital Library Database.
Wang, Y.-S., Wang, Y.-M., Lin, H.-H., & Tang, T.-I. (2003). Determinants of user acceptance of Internet banking: An empirical study. International Journal of Service Industry Management, 14(5), 501-519.
Waters, R. (2003). “Corporate computing tries to find a new path.” Financial Times.
Watkins, C.J., & Dayan, P. (1992). Q-learning. Machine Learning, 8, 279-292.
Watson, D. (2002, September). Auckland wireless net lures Asians: A firm planning a large wireless network around downtown Auckland is already claiming interest from Asia and the Pacific islands in its distance-boosting technology. Computerworld New Zealand. Retrieved May 20, 2006, from http://computerworld.co.nz/news.nsf/UNID/CC256CED0016AD1ECC256C3C007A6299?OpenDocument&Highlight=2,roamad
Watson, I. (1991). Applying case-based reasoning: Techniques for enterprise systems. Morgan Kaufmann.
Weatherall, J., & Jones, A. (2002, February). Ubiquitous networks and its applications. IEEE Wireless Communications, 9(1), 18-29.
Weber, S. (1983). A general concept of fuzzy connections, negations and implications based on t-norms. Fuzzy Sets and Systems 11, 115-134.
Webopedia, (2005). Trojan horse. Retrieved October 2005 from http://www.webopedia.com/TERM/T/Trojan_horse.html
Weeks, S. (2001). Understanding trustmanagementsystems. IEEE Symposium on Security and Privacy.
Wei, Z., & Meinl, Z. (2004). Implement role based access control with attribute certificates, ICACT 2004. International Conference on Advanced Communication Technology, Korea.
Weill, P., and J. W. Ross (2004). IT governance: how top performers manage IT decision rights for superior results. Boston, Harvard Business School Press.
Weimer, P., & Davis, T.L. (1995). Applications of 3D-seismic data to exploration and production, AAPG studies in geology, No.42, and SEG Geophysical Developments series, No. 5.
Weinberg, M., & Rosenschein, J. (2004). Best-response multiagent learning in non-stationary environments. In The Third International Joint Conference on Autonomous Agents and Multi-Agent Systems: Vol 2 (pp. 506-513). Washington, DC: IEEE Computer Society.
Weinstein, S.B., & Ebert, P.M. (1971). Data transmission by frequency-division multiplexing using the discrete fourier transform. IEEE Transactions on Communication Technology, 19, 628-634.
Weis, S.A. (2005). Security parallels between people and pervasive devices. Third International Conference on Pervasive Computing and Communications Workshops (PerCom 2005), Hawaii, March (pp. 105-109).
Weise, J. (2001). Public key infrastructure overview. Sun BluePrints Online. Retrieved December 2005, from http://www.sun.com/blueprints/0801/publickey.pdf
Weiser, M. (1991). The computer for the twenty-first century. Scientific American, 265, 66-75.
Weiser, M. (1993, July). Some computer science problems in ubiquitous computing. Communications of the ACM, 36(7), 75-84.
Weissig, H., & Bourne, P.E. (2002). Protein structure resources. Biological Crystallography, D58, 908-915.
Welch, T.A. (1984). A technique for high performance data compression. IEEE Computer, 17(6), 8-19.
Welch, V., Foster, Y., Kesselman, C, Mulmo, O., Pearlman, L., Tuecke, S., et al. (2004). X.509 proxy certificates for dynamic delegation. Third Annual PKI R&D Workshop.
Weld, D.S. (1999). Recent advances in AI planning. AI Magazine, 20(2), 93-123.
Wellington City Council. (2005, March). Technology & software, TXT-a-Park. Retrieved May 21, 2006, from http://www.wellington.govt.nz/innovation/details/txtapark.html
Wen, J., & Villasenor, J.D. (1997). A class of reversible variable length codes for robust image and video coding. In Proc. IEEE International Conference on Image Processing (ICIP), 2, Washington, DC, October (pp. 65-68).
WEPcrack. (2006). Retrieved December 10,2006, from http://www.wirelessdefence.org/contents/WEPcrackmain.htm
WEPCrack. (2007). Retrieved September 26, 2007, from http://wepcrack.sourceforge.net
WEPCrack. Retrieved March 3, 2004, from http://webcrack.sf.net
Wertheim, M. (1995). Call to desegregate microbial databases. Science, 269, 1516.
Wertz, C. J. (1989). The data dictionary: concepts and uses. Wellesley, MA, QED Information Sciences.
Wesbrook, J.,Feng, Z.,Jain, S.,Bhat, T.N.,Thanki, N.,Ravichandran, V., et al. (2002). The protein data bank: Unifying the archive. Nucleic Acids Research, 30, 245-248.
Wesel, E.K. (1998). Wireless multimedia communications: Networking video, voice, and data. Addison Wesley.
Wetzel, R. (2005, February). Tackling phishing. Business Communications Review, pp. 46-51.
Whalley, I.Arnold, B.,Chess, D.,Morar, J.,Segal, A., & Swimmer, M (2000). An environment for controlled worm replication & analysis (Internet-inna-box). Retrieved from http://www.research.ibm.com/anti-virus/SciPapers/VB2000INW.pdf
White, J. (1996). Telescript technology: Mobile agents. In J.Bradshaw (Ed.), Software agents. AAI/MIT Press.
Whitman, M. E., & Mattord, H. J. (2004). Management of information security. Course Technology.
Wielinga, B.,Schreiber, G.,Wielemaker, J., & Sandber, J.A.C. (2001). From thesaurus to ontology. In Proceedings of the International Conference on Knowledge Capture.
Wieringa, R. (1998). A survey of structured and object-oriented software specification methods and techniques. ACM Computing Surveys (CSUR), 30(4), 459-527.
Wieslander, J.,Boldt, M., & Carlsson, B. (2003). Investigating spyware on the Internet. In Proceedings of the Seventh Nordic Workshop on Secure IT Systems, Norway.
Wi-Fi Alliance Portal. (2005). Retrieved July 11, 2005, from http://www.wi-fi.org
Wi-Fi Alliance. (2003). Enterprise solutions for wireless LAN security.
Wi-FiAlliance Portal. (2006).Retrieved February5ft, 2006, from http//www.wi-fi.org
Wijngaards, N.J. E., et al. (2002). Supporting internet-scale multi-agent systems. Data & Knowledge Engineering, 41(2-3).
Wikipedia, the free encyclopedia. Retrieved July 11, 2005, from http://www.wikipedia.org
Wikipedia. (2005). Privacy. Retrieved December 25, 2005, from http://en.wikipedia.org/wiki/Privacy
Wikipedia. (2005). Secure sockets layer (SSL) and transport layer security (TLS). Retrieved July 10, 2005, from http://en.wikipedia.org/wiki/Secure_Sockets_Layer
Wikipedia. (2005). Security. Retrieved December 25, 2005, from http://en.wikipedia.org/wiki/Computer_security
Wikipedia. (2005). The free encyclopedia. Retrieved on July 7, 2006, from http://en.wikipedia.org/wiki/Mobile_code
Wikipedia. (2005). Trust. Retrieved December 25, 2005, from http://en.wikipedia.org/wiki/Trust
Wikipedia. (2005, May). Article: Ubiquitous computing. Wikipedia: The Free Encyclopaedia. Retrieved May 5, 2006, from http://mobileman.projects.supsi.ch/glossary.html
Wikipedia. (2006). Wikipedia, the free encyclopedia. Retrieved October 2006, from http://en.wikipedia.org/wiki/
Wikipedia. Computer forensics. Retrieved July 11, 2005, from http://en.wikipedia.org/wiki/Computer_forensics
Wildstrom, S. H. (2005, March 3). New weapons to stop identity threat. Businessweek.
Williams, B.C., Muscettola, N., Nayak, P.P., & Pell, B. (1998). Remote agent: To boldly go where no AI system has gone before. Artificial Intelligence, 103(1-2), 5-48.
Winikoff, M., Padgham, L., Harland, J., & Thangarajah, J. (2002, April 22-25). Declarative & procedural goals in intelligent agent systems. Paper presented at the Proceedings of the 8th International Conference on Principles and Knowledge Representation and Reasoning (KR- 02), Toulouse, France.
Winsborough, W., & Li, N. (2004). Safety in automated trust negotiation. In Proceedings of the IEEE Symposium on Security and Privacy, 147-160.
Wireless Developer Network. (2002, August). Wireless developer network-Daily news: RoamAD announces 802.11b breakthrough with metropolitan-wide Wi-Fi network. Wireless Developer Network. Retrieved May 9, 2006, from http://www.wirelessdevnet.com/news/2002/238/news1.html
Witten, I., Neal, R., & Cleary, J. (1987). Arithmetic coding for data compression. Communication of the ACM, 30(6) 520-540.
Witten, I.H., & Frank, E. (2000) Data mining, practical machine learning tools and techniques with java implementations. San Francisco: Morgan Kaufmann.
Witten, I.H., & Frank, E. (2005). Data Mining: Practical machine learning tools and techniques, (2nd ed.). San Francisco: Morgan Kaufmann.
Wojciechowski, P., & Sewell, P. (1999). Nomadic pict: Language and infrastructure design for mobile agents. Proceedings of the Joint Symposium on Agent Systems and Applications/Mobile Agents (ASA/MA’99), Palm Springs, CA.
Wolfe, S.T., Ahamed, S.I., & Zulkernine, M. (2006). A trust framework for pervasive computing environments. 4th ACS/IEEE International Conference on Computer Systems and Applications (AICCSA-06), Dubai, UAE, March (pp. 312-319). Dubai: IEEE CS Press.
Wong, L. (2000). Kleisli, a functional query system. Journal of Functional Programming, 10, 19-56.
Wong, L. (2002). Technologies for integrating biological data. Briefings in Bioinformatics, 3, 389-404.
Woo, S.-C.M., & Singh, S. (2001). Scalable routing protocol for ad hoc networks. Journal of Wireless Networks, 7(5), 513-529.
Woo, T. (2003). Dynamic security in pervasive computing. ECE750 Presentation, University of Waterloo. Retrieved December 2005, from http://www.vlsi.uwaterloo.ca/~thwoo/ece750/ece750-6report.pdf
Wood, M., & Erlinger, M. (2002). Intrusion detection message exchange requirements, IETF, RFC Draft, draft-ietfidwg-requirements-10.
Woods, J., & O’Neil, S. (1986). Subband coding of images. IEEE Trans. Acoustics, Speech, and Signal Processing, 34(5), 1278-1288.
Wooldridge, M. (1997). Agent-based software engineering. IEE Proceedings of Software Engineering 144 (pp. 26-37).
Wooldridge, M. (2000). Reasoning about rational agents. Cambridge, MA: The MIT Press.
Wooldridge, M. (2002). An introduction to multiagent systems. West Sussex, UK: John Wiley & Sons.
Wooldridge, M., & Ciancarini, P. (2001). Agent-oriented software engineering: The state of the art. The First International Workshop on agent-oriented software engineering (AOSE2000), LNCS 1957. Springer-Verlag.
Wooldridge, M., & Jennings, N. (1999). Software engineering with agents: Pitfalls and pratfalls. IEEE Internet Computing, 3(3).
Wooldridge, M., & Jennings, N.R. (1995). Intelligent agent: Theory and practice. Knowledge Engineering Review, 10(2), 115-152.
Wooldridge, M., & Jennings, N.R. (2000). Agent-oriented software engineering. In J Bradshaw (Ed.), Handbook of agent technology. AAAI/MIT Press.
Wooldridge, M., Jennings, N.R., & Kinny, D. (1999). Methodology for agent-oriented analysis and design. Proceedings of the 3rd International conference on Autonomous Agents (pp. 69-76).
Wooldridge, M., Jennings, N.R., & Kinny, D. (2000). The Gaia methodology for agent-oriented analysis and design. Journal of Autonomous Agents and Multi-agent Systems, 3(3), 285-312.
Wooldridge, M.J. (2002). An introduction to multi-agent systems. John Wiley & Sons.
WordSpy-Phishing. (n.d.). Phishing. Retrieved January 23, 2006, from http://www.wordspy.com/words/phishing.asp
World Wide Web Consortium. (2004). OWL Web ontology language semantics and abstract syntax. W3C Recommendation 10 Feb, 2004.
WS-Security. (2006). Web services security (WS-security). Retrieved from http://www.oasis-open.org/committees.wss
Wu, H.R., & Rao, K.R. (2006). Digital video image quality and perceptual coding. Boca Raton, FL: CRC Press: Taylor and Francis.
Wu, J. (2003). Towards a decentralized search architecture for the Web and P2P systems. Proceedings of the 2003 Adaptive Hypermedia and Adaptive Web-Based Systems Workshop. Retrieved August 5, 2006, from http://wwwis.win.tue.nl/ah2003/proceedings/paper18.pdf
Wu, J., Cobzaru, M., Ulieru, M., & Norrie, D.H. (2000). SC-web-CS: Supply chain Web-centric systems. Proceedings of the IASTED International Conference on Artificial Intelligence and Soft Computing (pp. 501-507).
Wu, M.,Miller R. C, & Garfmkel, S. L. (2006). Do security toolbars actually prevent phishing attacks? Retrieved July 14, 2006, from http://groups.csail.mit.edu/uid/projects/phishing/chi-security-toolbar.pdf
Wu, Q., & Shao, Z. (2005). Network anomaly detection using time series analysis. In Proceedings of the Joint International Conference on Autonomic and Autonomous Systems and International Conference on Networking and Services (ICAS/ICNS 2005).Los Alamitos, CA:. IEEE Computer Society Press.
Wu, S. H.,Tsai, T. H., & Hsu, W. L. (2003). Text categorization using automatically acquired domain ontology. In Proceedings of IRAL2003 Workshop on Information Retrieval with Asian Languages, Sapporo, Japan.
Wu, T., Wu, S., Huang, H., & Gong, F. (1999). Securing QoS: Threats to RSVP messages and their countermeasures. Proceedings of IWQoS ’99-Seventh International Workshop on Quality of Service, UCL, London, May 31-June 4 (pp. 62-64). USA: IEEE.
Wu, W., Banerjee, N., Basu, K., & Das, S.K. (2003). Network assisted IP mobility support in wireless LANs. Second IEEE International Symposium on Network Computing and Applications, NCA ’03, Cambridge, MA, April 16-18 (pp. 257-264). Los Alamitos, CA: IEEE Computer Society.
Wu, Y.-S,Foo, B.,Mei, Y, & Bagchi, S. (2003). Collaborative intrusion detection system (CIDS): A framework for accurate and efficient IDS. In Proceedings of the I9’h Annual Computer Security Applications Conference (ACSAC2003). Los Alamitos, CA:. IEEE Computer Society Press.
Wyner, A.D., & Ziv, J. (1976). The rate-distortion function for source coding with side information at the decoder. IEEE Transactions on Information Theory, IT-22(1), 1-10.
X.509. (2001). The directory: Public-key and attribute certificate frameworks. ITU-TRecommendationX.509:2000(E) | ISO/IEC 9594-8:2001(E).
XACML. (2004). extensible Access Control Markup Language (XACML). Retrieved from http://www.oasis-open.org/committees/xacml.
Xodo, D., & Nigro, H.O. (2005). Knowledge Management in Tourism. In L.C. Rivero, J.H. Doorn, & V.E. Ferraggine (Eds.). Encyclopedia of database technologies and applications (pp. 319-329). Hershey, PA: Idea Group Reference.
XrML. (2000). eXtendedrights markup language. Retrieved March 28, 2006, from http://www.xrml.org/
XrML. (2002). XrML 2.0 (Technical Overview Version 1.0). Retrieved March 28, 2006, from http://www.xrml.org/Reference/XrMLTechnicalOverviewV1.pdf
Xue, D., Yadav, S., & Norrie, D.H. (1999). Development of an intelligent system for building product design and manufacturing-Part I: Product modeling and design. Proceedings of the 2nd International Workshop on Intelligent Manufacturing Systems (pp. 367-376).
Xydis, T.G., & Blake-Wilson, S. (2002). Security comparision: BluetoothTM Communications vs. 802.11. Retrieved July 11, 2005, from http://ccss.isi.edu/papers/xydis_bluetooth.pdf
Xylomenos, G., & Polyzos, G.C. (2001). Quality and service support over multi-service wireless Internet links. Computer Networks, 37(5), 601-615.
Yager, R. (1984). Approximate reasoning as a basis for rule-based expert systems. IEEE Trans. On Systems, Man, and Cybernetics, 14(4), 636-643.
Yager, R., & Filer, D.P. (1993). On the issue of defuzzification and selection based on a fuzzy set. Fuzzy Sets and Systems, 55(3), 255-272.
Yamaguchi, N., Ida, T., & Watanabe, T. (1997). A binary shape coding method using modified MMR. In Proc. Special Session on Shape Coding (ICIP97), I, Washington, DC, October (pp. 504-508).
Yamakawa, T. (1989). Stabilization of an inverted pendulum by a high speed logic controller hardware system. Fuzzy Sets and Systems, 32(2), 161-180.
Yamauchi, T., & Markman, A.B. (2000). Inference using categories. Journal of Experimental Psychology: Learning, Memory, and Cognition, 26(3), 776-795.
Yan, W., & Wu, W. (Eds.). (2000). Datastructure. Beijing, China: Tsinghua University Press.
Yang, H., Luo, H., Ye, F., Lu, S., & Zhang, L. (2004). Security in mobile ad hoc networks: Challenges and solutions. IEEE Wireless Communications, 11(1), 38-47.
Yang, H., Luo, H., Ye, F., Lu, S., & Zhang, L. (2004). Security in mobile ad hoc networks: Challenges and solutions. IEEE Wireless Communications, 11(1), 38-47.
Yang, X., Ma, W., & You, J. (2002). On the dynamic allocation of mobile Agents by on-line task scheduling. The 16th Proceedings of the International Parallel and Distributed Processing Symposium (pp. 217-224). Retrieved April 19, 2003, from http://ieeexplore.ieee.org
Yao,Y.Y., & Zhong, N. (2000). On association, similarity and dependency attributes. PAKDD, LNAI, 1805, 138-141.
Yau, S., Karim, F., Wang, Y., Wang, B., & Gupta, S.K. S. (2002). Reconfigurable context-sensitive middleware for pervasive computing. IEEE Pervasive Computing, 1(3), 33-40.
Yau, S., Wang, Y., & Karim, F. (2002). Development of situation aware application software for ubiquitous computing environments. 26th Annual International Computer Software and Application Conference (pp. 233-238).
Ye, T. S. and Cheang, A.. (2005, September). The Mobility Threat. Retrieved December 18, 2005, from http://cio-asia.com/ShowPage.aspx?pagetype=2&articleid=2535&pubid=5&issueid=63
Ye, Z.,Smith, S., & Anthony, D. (2005). Trusted paths for browsers. ACM Transactions on Information and System Security, 8(2), 153-186.
Yegin, A., Ohba, Y., Penno, R., Tsirtsis, G., & Wang, C. (2005). Protocol for carrying authentication for network access (PANA) requirements. RFC 4058, IETF.
Yen, D.C., & Chou, D.C. (2000). Wireless communications: Applications and managerial issues. Industrial Management & Data Systems, 100(9), 436-443.
Yi, S., & Kravets, R. (2002). Key management for heterogeneous ad hoc wireless networks. 10th IEEE International Conference on Network Protocols, Paris, France, November 12-15 (pp. 202-203).
Yi, S., & Kravets, R. (2002). Key management for heterogeneous ad hoc wireless networks. Technical Report, UIUCDCS-R-2002-2290, Department of Computer Science, University of Illinois at Urbana-Champaign.
Yi, S., Naldurg, P., & Kravets, R. (2001). Security-aware ad hoc routing for wireless networks. Proceedings of the 2nd ACM International Symposium on Mobile Ad Hoc Networking and Computing (MobiHoc), Long Beach, CA, October 4-5 (pp. 299-302). ISBN 1-58113-428-2. ACM Press.
Yin, R.K. (1994). Case study research: Design and methods. Beverley Hills: Sage.
Yoo, J. S., & Shekhar, S. (2006). A join-less approach for mining spatial co-location patterns. IEEE Transactions on Knowledge and Data Engineering, 18(10).
Yoshihisa, I.,Miharu, S.,Shihong, L.,Masato, K. (2005). Face Recognition on Cellular Phone. Demo Proceedings of the 10th IEEE International Conference on Computer Vision (ICCV2005), Beijing, China, October 15-21, 2005. Demo Nr 13
Yourdon, E. (1989). Modern structured analysis. Englewood Cliffs, NJ, Yourdon Press.
Yourdon, E., and L. L. Constantine (1979). Structured design: fundamentals of a discipline of computer program and systems design. Englewood Cliffs, NJ, Prentice Hall.
Youssef, M., Agrawala, A., & Shankar, U. (2003). WLAN location determination via clustering and probability distributions. IEEE International Conference on Pervasive Computing and Communications (PerCom) 2003, Dallas, Texas, March 23-26 (pp. 143-150). New York: IEEE.
Yu, T., & Winslett, M. (2003). A unified scheme forresource protection in automated trust negotiation. In Proceedings of the IEEE Symposium on Security and Privacy, 110-122.
Yu, T.,Winslett, M., & Seamons, K. E. (2003). Supporting structured credentials and sensitive policies through interoperable strategies for automated trust negotiation. ACM Transactions on Information and System Security (TISSEC), 6(1), 1-42.
Yuefeng, L., & Ning, Z. (2006). Mining ontology for automatically acquiring web user information needs. IEEE Trans. Knowl. Data Eng., 18(4), 554-568.
Yuhan, A.H. (2003). Ubiquitous computing and its network requirements. Samsung Advanced Institute of Technology. Retrieved May 13, 2006, from http://www.t-engine.org/aucnc2003/yuhan.pdf
Yun, C.H., & Chen, M.S. (2000). Mining Web transaction patterns in an electronic commerce environment. PAKDD, LNAI, 1805, 216-219.
Zadeh, L.A. (1975a). Fuzzy logic and approximate reasoning. Synthese 30(1), 407-428.
Zadeh, L.A. (1975b). The concept of a linguistic variable and its application to approximate reasoning i, ii, iii. Information Sciences, 8, 199-251; 9, 43-80.
Zaki, M.J. (2005). Efficiently mining frequent trees in a forest: Algorithms and applications. IEEE Transaction on Knowledge and Data Engineering, 17, 1021-1035.
Zaki, M.J., & Hsiao, C. J. (2002). CHARM: An efficient algorithm for closed itemset mining. In Proceedings of the 2nd SIAM International Conference on Data Mining. SIAM.
Zaki. M. (2000). Generating nonredundant association rules. In S.J. Simoff & O. R. Zaïane (Eds.), Proceedings of the 6th ACM SIGKDD International Conference on Knowledge Discovery and Data Mining (pp. 34-43) Boston: ACM Press.
Zaki., M., & Hsiao, C. (2002). CHARM: An efficient algorithm for closed itemset mining. In R.L. Grossman, J. Han, V. Kumar, H. Mannila, & R. Motwani (Eds.), Proceeding of the 2nd SIAM International Conference on Data Mining (pp. 457-473). Arlington: SIAM.
Zambonelli, F., & Jennings, N.R. (2003). Developing multi-agent systems: The Gaia methodology. ACM Transactions on Software Engineering and Methodology, 12(3), 317-370. Retrieved from http://www.ecs.soton.ac.uk/~nrj/download-files/tosem03.pdf
Zander, J., & Kim, S.L. (2001). Radio resource management for wireless networks. London: Artech House Publishers, Mobile Communications Series.
Zapata, M.G., & Asokan, N. (2002). Securing ad hoc routing protocols. Proceedings of the 3rd ACM Workshop on Wireless Security (WiSe), Atlanta, Georgia, September 28 (pp. 1-10). ISBN 1-58113-585-8. ACM Press.
Zeithaml, V.A., & Gilly, M.C. (1987). Characteristics affecting the acceptance of retailing technologies: A comparison of elderly and nonelderly consumers. Journal of Retailing, 63(1), 49-68.
Zeng, W., Zhuang, X., & Lan, J. (2004). Network friendly media security: Rationales, solutions, and open issues. 2004 International Conference on Image Processing ICIP ’04, 1, Singapore, October 24-27 (pp. 565-568). USA: IEEE.
Zenith, S.E. (1991). A rationale for programming with ease. In J.P.Banâtre & D.L.Mètayer (Eds.), Research directions in high-level parallel programming languages (pp. 147-156). Springer-Verlag.
Zhang, F., Luh, P.B., & Santos, E. Jr. (2004). Performance study of multi-agent scheduling and coordination framework for maintenance networks. In K.Deguchi (Ed.), Sendai, Japan: Vol 3. Proceedings of 2004 IEEE/RSJ International Conference on Intelligent Robots and Systems (pp. 2390-2395). Sendai: Kyodo Printing Co.
Zhang, L., Lambertsen, G., & Yamada, T. (2003). Security scenarios within IP-based mobile multimedia metropolitan area network. In Proceedings of Global Telecommunications Conference, GLOBECOM ’03, 3, San Francisco, CA, December 1-5 (pp. 1522-1526). Piscataway, NJ: IEEE Operations Center.
Zhang, T.,Ramakrishnan, R., & Livny, M. (1996). Birch: An efficient data clustering method for very large databases. In H.V. Jagadish, & I.S. Mumick (Ed.), Proceedings of the 1996 ACM SIGMOD International Conference on Management of Data (pp. 103-114). Montreal, Quebec, Canada: ACM Press.
Zhang, Y., & Lee, W. (2000). Intrusion detection in wireless ad-hoc networks. Proceedings of the 6th International Conference on Mobile Computing and Networking (MobiCom), Boston, MA, August 6-11 (pp. 275-283). ISBN 1-58113-197-6. ACM Press.
Zhang, Y., Lee, W., & Huang, Y. (2003). Intrusion detection techniques for mobile wireless networks. Kluwer Wireless Networks, 9(5) 545-556.
Zhong, T.,Raghu, R., & Livny, M. (1996). An efficient data clustering method for very large databases. In Proceedings of ACM SIGMOD International Conference on Management of Data.
Zhou, L., & Haas, Z.J. (1999). Securing ad hoc networks. IEEE Networks, 13(6), 24-30.
Zhou, S.,Zhou, A.,Cao, J.,Wen, J.,Fan, Y., & Hu, Y. (1996). Combining sampling technique with DBSCAN algorithm for clustering large spatial databases. Springer.
Zhou, X. (2006). Enhancing web marketing by using an ontology. Doctoral dissertation, New Jersey Institute of Technology, Newark, NJ.
Zhou, X.,Geller, J.,Perl, Y., & Halper, M. (2006). An application intersection marketing ontology. Theoretical computer science: Essays in memory of Shimon Even. Lecture Notes in Computer Science, Vol. 3895 (pp. 143-153). Berlin: Springer-Verlag.
Zhou, Z.,Liu, H.,Li, S.Z., & Chua, C.S. (2001). Rule mining with prior knowledge: A belief networks approach. Intelligent Data Analysis, 5(2), 95-110.
Zhu, J.,Hong, J., & Hughes, J.G. (2002). Using Markov Chains for link prediction in adaptive Web sites. In Proceedings of Soft-Ware 2002: First International Conferance on Computing in an Imperfect World (pp. 60-73). Belfast, UK.
Zhu, Q.-F., Wang, Y., & Shaw, L. (1993). Coding and cell-loss recovery in DCT-based packet video. IEEE Transactions on Circuits and Systems for Video Technology, 3(3), 238-247.
Zhuang, X., & Pande, S. (2003). Compiler scheduling of mobile agents for minimizing overheads. Proceedings of the 23rd International Conference on Distributed Computing Systems (pp. 600-607). Retrieved September 1, 2003, from http://ieeexplore.ieee.org
Zimmermann, R. (2001). Lokalisierung Mobiler Geraete (german). Seminar Mobile Computing ETH Zuerich 2001. Technical report. Retrieved September 18, 2007, from http://www.vs.inf.ethz.ch/edu/SS2001/MC/beitraege/07-location-rep.pdf
Ziv, J., & Lempel, A. (1977). A universal algorithm for sequential data compression. IEEE Transactions on Information Theory, IT-23(3), 337-343.
Zobot Worm. (2005). Retrieved December 13, 2005 from http://securityresponse.symantec.com/avcenter/venc/data/w32.zotob.e.html
Zuccato, A. (2004). Holistic security requirement engineering for electronic commerce, Computers & Security, 23(1), 63-76.
Zuccato, A. (2005). Holistic information security managementframeworkfor electroni commerce. Unpublished doctoral dissertation, Karlstad University Studies, Sweden.
Zulkernine, M., & Ahamed, S. (2005). Software security engineering: Towards unifying software engineering with security engineering. In M. Warkentin & R. Vaughn (Eds.), Enterprise information systems assurance and system security: Managerial and technical issues (pp. 215-233). Hershey, PA: Idea Group.
Zviran, M., & Erlich, Z. (2006). Identification and authentication: Technology and implementation issues. Communications of AIS, 17(4), 90-105
No comments yet

Leave a Reply

Fill in your details below or click an icon to log in:

WordPress.com Logo

You are commenting using your WordPress.com account. Log Out / Change )

Twitter picture

You are commenting using your Twitter account. Log Out / Change )

Facebook photo

You are commenting using your Facebook account. Log Out / Change )

Google+ photo

You are commenting using your Google+ account. Log Out / Change )

Connecting to %s

%d bloggers like this: