| 2006 | 2-Connected Dominating Set inWireless Networks (Invited Talk Abstract). My T. Thai |
| 2006 | A Distributed Flocking Approach for Information Stream Clustering Analysis. Xiaohui Cui, Thomas E. Potok |
| 2006 | A Dynamic and Self-study Language Model Oriented to Chinese Characters Input. Peifeng Li, Ping Gu, Qiao-Ming Zhu |
| 2006 | A Graph Alorithm Based Approach to Recovery and Failover in Tactical Manets. Damian Watkins, Craig Scott, Darryn Randle |
| 2006 | A Novel Approach of Requirements Analysis for Agent Based System. Prabhat Ranjan, Arun Kumar Misra |
| 2006 | A Novel Generalized Particle Model for Lossless Data Compression. Dianxun Shuai, Qing Shuai |
| 2006 | A Parallel Local Search Algorithm for Euclidean Steiner Tree Problem. Rashid Bin Muhammad |
| 2006 | A QoS-aware Mobility Management Mechanism. Maher Kaddoura |
| 2006 | A Role-based PMI Authentication Model and its Application. Yanqin Zhu, Peide Qian, Yueqin Liu |
| 2006 | A Software Tool for Network Traffic Analysis. Fu-Shing Sun, H. Tzeng |
| 2006 | A Survey of Software Estimation Techniques and Project Planning Practices. Mehwish Nasir |
| 2006 | A Three-Layer Model for Software Engineering Metrics. Kiumi Akingbehin, Bruce R. Maxim |
| 2006 | A Web-based Cooperative Research Paper Edit System. Takayuki Fujimoto, Tokuro Matsuo |
| 2006 | A Wireless Grid Service Platform Using SIP and Agents. Fang-Yie Leu, Tai-Shiang Wang |
| 2006 | AFlexible Framework for Wireless-Based Intelligent Sensor with Reconfigurability , Dynamic adding , and Web interface. Hung-Chieh Yu, Shu-Ming Tseng |
| 2006 | Addressing Unbounded Parallelism in Verification of Software Components. Jirí Adámek |
| 2006 | An Early Binding Fast Handover for High-Speed Mobile Nodes on MIPv6 over Connectionless Packet Radio Link. Hocheal Kim, Youngtak Kim |
| 2006 | An Effective Authentication Scheme in Mobile Ad Hoc Network. Kiho Shin, Yoonho Kim, Yanggon Kim |
| 2006 | An Extension to Robustness Slicing Algorithm Based on Dynamic Array. Yancheng Wang, Bixin Li, Xufang Gong |
| 2006 | An NFR-Based Framework for Establishing Traceability between Enterprise Architectures and System Architectures. Nary Subramanian, Lawrence Chung, Yeong-Tae Song |
| 2006 | Applying Dynamic Change Impact Analysis in Component-based Architecture Design. Tie Feng, Jonathan I. Maletic |
| 2006 | Approximation Algorithm for Maximum Lifetime in Wireless Sensor Networks with Data Aggregation. Jeffrey Stanford, Sutep Tongngam |
| 2006 | Asynchronous Callback in Web Services. Kai Qian, Jigang Liu, Lixin Tao |
| 2006 | Broadcast with Hitch-hiking in Wireless Ad-Hoc Networks (Invited Talk Abstract). Gruia Calinescu |
| 2006 | Cross-Layer Design and Optimization forWireless Sensor Networks. Weilian Su, Tat L. Lim |
| 2006 | DCE-MRI Segmentation and Motion Correction Based on Active Contour Model and Forward Mapping. Wenzhu Lu, Jianhua Yao, Chao Lu, Sheila A. Prindiville, Catherine Chow |
| 2006 | DEEPS: Deterministic Energy-Efficient Protocol for Sensor networks. Dumitru Brinza, Alexander Zelikovsky |
| 2006 | Data Clustering of Tolerance Space in MATLAB. Fu-Shing Sun, Chun-Hung Tzeng |
| 2006 | Data-Logging and Supervisory Control in Wireless Sensor Networks. Aditya N. Das, Frank L. Lewis, Dan O. Popa |
| 2006 | Decision Table Based Analysis of Trading Models. Rajeshwar Prasad Srivastava |
| 2006 | Deployment Algorithms and In-Door Experimental Vehicles for Studying Mobile Wireless Sensor Networks. Muhammad Faizan Mysorewala, Dan O. Popa, Vincenzo Giordano, Frank L. Lewis |
| 2006 | Design Issues in a Bare PC Web Server. Long He, Ramesh K. Karne, Alexander L. Wijesinha, Sandeep Girumala, Gholam H. Khaksari |
| 2006 | Design Phase Analysis of Software Qualities Using Aspect-Oriented Programming. Daesung Park, Sungwon Kang, Jihyun Lee |
| 2006 | Development of a Honeynet Laboratory: a Case Study. Michael O'Leary, Shiva Azadegan, Jay Lakhani |
| 2006 | Effects of Computer Competency on Usability and Learning Experience in Online Learning Environments. Gabriele Meiselwitz, Goran Trajkovski |
| 2006 | Face Recognition by Spatiotemporal ICA Using Facial Database Collected by AcSys FRS Discover System. Jiajin Lei, Chao Lu |
| 2006 | Flexible Metadata Management for Block-level Storage System. Jie Xiao, Dan Feng, Zhan Shi, Mengfei Cheng |
| 2006 | From Stream Transformers to Moore State Transition Machines with Input and Output. Walter Dosch, Wuttipong Ruanthong, Annette Stümpel |
| 2006 | GSM Security Issues and Challenges. |
| 2006 | Genetic Algorithms for Hunting Snakes in Hypercubes: Fitness Function Analysis and Open Questions. Pedro A. Diaz-Gomez, Dean F. Hougen |
| 2006 | Identifying Critical Dependencies Using General Bayesian Network: An Application to Aviation Operation. Sung Woo Shin, Inwon Kang |
| 2006 | Improvement of Object Serialization in Java Remote Method Invocation. Hei Ning Helen Ma, Lan Yang |
| 2006 | Label-Based Access Control Policy Enforcement and Management. Wei Zhou, Vinesh H. Raja, Christoph Meinel, Munir Ahmad |
| 2006 | Maximum Lifetime of Sensor Networks with Adjustable Sensing Range. Akshaye Dhawan, Chinh T. Vu, Alexander Zelikovsky, Yingshu Li, Sushil K. Prasad |
| 2006 | Message from the Conference Co-chairs. |
| 2006 | Message from the Program Chair. |
| 2006 | Message from the SAWN 2006 Workshop Co-chairs. |
| 2006 | Minimizing Multicast Communication Latency in WAN-Based Environment. Kanchana Silawarawet, Natawut Nupairoj |
| 2006 | MyTwigStack: A Holistic Twig Join Algorithm with Effective Path Merging Support. Dunren Che |
| 2006 | Network Intrusion Detection Through Genetic Feature Selection. Chihoon Lee, Jin-Wook Chung, Sung Woo Shin |
| 2006 | New Generalized Cellular Automata to a Class of Optimization Problems. Dianxun Shuai, Liangjun Huang, Qing Shuai |
| 2006 | Node-Disjoint Multipath Routing and Distributed Cross-Layer QoS Guarantees in Mobile Ad hoc Networks. Xuefei Li, Laurie G. Cuthbert |
| 2006 | Offshore Outsourcing Bridge: Designing and Development A Model Applied Management Platform for Chinese Offshore Outsourcing. Shiying Li, Luo Yi |
| 2006 | Ontology-Based Knowledge Extraction-A Case Study of Software Development. Ruey-Shun Chen, Chan-Chine Chang, Isabel Chi |
| 2006 | Preventing Attacks on Back-End Servers using Masquerading/Honeypots. Theodor Richardson |
| 2006 | Pupil and Iris Localization for Iris Recognition in Mobile Phones. Dal Ho Cho, Kang Ryoung Park, Dae Woong Rhee, Yanggon Kim, Jonghoon Yang |
| 2006 | Reducing Test Cost and Improving Documentation In TDD (Test Driven Development). Taha Karamat, Atif Neuman Jamil |
| 2006 | Reliable Cost-based Data-centric Routing Protocol forWireless Sensor Networks. Jian Wu, Paul J. M. Havinga |
| 2006 | Routing Problems in Incomplete Pancake Graphs. Keiichi Kaneko |
| 2006 | SNPD 2006 Program Committee. |
| 2006 | Semantic Web Service Modeling using UML for e-business environment. Yan Ha, Roger Y. Lee |
| 2006 | Seventh International Conference on Software Engineering, Artificial Intelligence, Networking and Parallel/Distributed Computing (SNPD 2006), 19-20 June 2006, Las Vegas, Nevada, USA Yeong-Tae Song, Chao Lu, Roger Y. Lee |
| 2006 | Target Classification and Pattern Recognition Using Micro-Doppler Radar Signatures. Yinan Yang, Jiajin Lei, Wenxue Zhang, Chao Lu |
| 2006 | Text Classification by Combining Different Distance Functions withWeights. Takahiro Yamada, Kyohei Yamashita, Naohiro Ishii, Kazunori Iwata |
| 2006 | The global fault-tolerance of interconnection networks. Hovhannes A. Harutyunyan, Calin D. Morosan |
| 2006 | Topology Control and Mobility Management in Mobile Ad Hoc Networks (Invited Talk Abstract). Fei Dai |
| 2006 | Transforming Linear Terms of Algebraic Specifications Into Extended Pomsets. Bastian Dölle |
| 2006 | Transition from Requirements to Architecture: A Review and Future Perspective. Matthias Galster, Armin Eberlein, Mahmood Moussavi |
| 2006 | Transitioning from e-Learning to m-Learning: Present Issues and Future Challenges. Tsvetozar Georgiev, Evgeniya Georgieva, Goran Trajkovski |
| 2006 | Using Data Mining Technology to improve Manufacturing Quality - A Case Study of LCD Driver IC Packaging Industry. Ruey-Shun Chen, Kun-Chieh Yeh, Chan-Chine Chang, H. H. Chien |
| 2006 | Using Tools in Teaching University Courses in Information Technology. Yulia Nemchinova, Hasan H. Sayani |
| 2006 | Verifying and Fixing Password Authentication Protocol. Xiaoqi Ma, Rachel McCrindle, Xiaochun Cheng |
| 2006 | e- Oral: A Hypermedia Web Application for English Language Oral Exams within a Distance Education Environment. Ma Eugenia Lopez, Laura Alba-Juez, Mónica Aragonés, Beatriz Molina |