Vol. 3, No. 1, 2008
- Evaluation of Radio Frequency Identification Library System
DOI: http://dx.doi.org/10.14257/ijmue.2008.3.1.01
by: Paul Golding and Vanesa Tennant
- Query Aggregation in Wireless Sensor Networks
DOI: http://dx.doi.org/10.14257/ijmue.2008.3.1.02
by: Min Meng, Jie Yang, Hui Xu, Byeong-Soo Jeong, Young-Koo Lee, Sungyoung and
Xiaobo Fan
- Design and Evaluation of Experiment Method for Improving Performance in GIS
Web Services
DOI: http://dx.doi.org/10.14257/ijmue.2008.3.1.03
by: Seung-jun Cha, Yun-young Hwang, Yoon-Seop Chang, Kyung-Ok Kim, Kyu-Chul Lee
- Constructing a Conversation Key in Three-Party Communication Environment
DOI: http://dx.doi.org/10.14257/ijmue.2008.3.1.04
by: Chin-Chen Chang, Yu-Wei Su and Chia-Yin Lee
- Desinging Agent Architecture for Security Medical System
DOI: http://dx.doi.org/10.14257/ijmue.2008.3.1.05
by: Jae-gu Song and Seoksoo Kim
- A Friendly Password Mutual Authentication Scheme for Remote-Login Network Systems
DOI: http://dx.doi.org/10.14257/ijmue.2008.3.1.06
by: Chin-Chen Chang and Chia-Yin Lee
- Performance Measurement using Hybrid Prediction Model in Ubiquitous Computing
DOI: http://dx.doi.org/10.14257/ijmue.2008.3.1.07
by: Giljong Yoo, Jeongmin Park, and Eunseok Lee
- Self-healing Mechanism for Reliable Computing
DOI: http://dx.doi.org/10.14257/ijmue.2008.3.1.08
by: Jeongmin Park, Jinsoo Jung, Shunshan Piao and Eunseok Lee
- A study on Security Level Management Model Description
DOI: http://dx.doi.org/10.14257/ijmue.2008.3.1.09
by: Tai-Hoon Kim, Kouichi Sakurai