Vol. 3, No. 3, 2008
- Ubiquitous Web Access: Collaborative Optimization
and Dynamic Content Negotiation
DOI: http://dx.doi.org/10.14257/ijmue.2008.3.3.01
by: Xavier Sanchez-Loro, Victoria Beltran, Jordi Casademont, Marisa Catalan
- A Novel Technique for Real-Time Internet Radio Recorder
on Non-DSP Embedded System
DOI: http://dx.doi.org/10.14257/ijmue.2008.3.3.02
by: Lain-Jinn Hwang, Chien-Chou Shih, I-Ting Kuo
- Community based Context-aware Information for
the Intelligent Personalized Information Service
DOI: http://dx.doi.org/10.14257/ijmue.2008.3.3.03
by: Jae-gu Song, Seoksoo Kim
- Dynamic Multithreshold Signature without the Trusted Dealer
DOI: http://dx.doi.org/10.14257/ijmue.2008.3.3.04
by: Jacek Pomykała, Tomasz Warchoł
- Statistical Analysis towards Image Recognition
DOI: http://dx.doi.org/10.14257/ijmue.2008.3.3.05
by: Samir Kumar Bandyopadhyay, Poulami Das, Debnath Bhattacharyya
- Broadcasting with the least energy is an NP-complete problem
DOI: http://dx.doi.org/10.14257/ijmue.2008.3.3.06
by: Wuu Yang, Huei-Ru Tseng, Rong-Hong Jan, Bor-Yeh Shen
- Information Security Control Centralization
and IT Governance for Enterprises
DOI: http://dx.doi.org/10.14257/ijmue.2008.3.3.07
by: Rosslin John Robles, Ji-Yeu Park, Tai-hoon Kim
- Wireless Network Security:
Vulnerabilities, Threats and Countermeasures
DOI: http://dx.doi.org/10.14257/ijmue.2008.3.3.08
by: Min-kyu Choi, Rosslin John Robles,
Chang-hwa Hong, Tai-hoon Kim