| 2008 | A Class of SIR Epidemic Model with Saturation Incidence and Age of Infection. Junyuan Yang, Fengqin Zhang, Xiaoyan Wang |
| 2008 | A Comparative Evaluation of Tests Generated from Different UML Diagrams. Supaporn Kansomkeat, Jeff Offutt, Aynur Abdurazik, Andrea Baldini |
| 2008 | A Comparison of Iterative Repair Strategies for Earth Observing Satellites Imaging Scheduling. Yu-Hua Guo, Ning Jing, Jun Li, Jun Wang |
| 2008 | A Crossover Game Routing Algorithm for Wireless Multimedia Sensor Networks. Zongwu Ke, Layuan Li, Nianshen Chen |
| 2008 | A Feature Selection for Malicious Detection. Yingxu Lai |
| 2008 | A Formal Approach for Design of Agent Based Earthquake Management System (EMS). Sarmad Sadik, M. Alade Rahman, Arshad Ali, Hafiz Farooq Ahmad, Hiroki Suguri |
| 2008 | A Formal Model of Dynamic Resource Allocation in Grid Computing Environment. Leila Ismail, Bruce Mills, Alain Hennebelle |
| 2008 | A Genetic Algorithm-aided Hidden Markov Model Topology Estimation for Phoneme Recognition of Thai Continuous Speech. Pattana Bhuriyakorn, Proadpran Punyabukkana, Atiwong Suchato |
| 2008 | A Hierarchical Cache Scheme for the Large-scale Web Search Engine. Sungchae Lim, Joonseon Ahn |
| 2008 | A Hybrid Text Classification Model based on Rough Sets and Genetic Algorithms. Xiaoyue Wang, Zhen Hua, Rujiang Bai |
| 2008 | A Multisecret Sharing Threshold Scheme. Yanyan Zhang |
| 2008 | A New Auto-Focusing Method Based on WBDCT for Many Object Situations. Ke Han, Xue-Mei Jiang, Quan Feng, Xiu-chang Zhu |
| 2008 | A New Classifier to Deal with Incomplete Data. Jun Wu, Yo Seung Kim, Chi-Hwa Song, Won Don Lee |
| 2008 | A New Hybrid Farsi Text Summarization Technique Based on Term Co-Occurrence and Conceptual Property of the Text. Azadeh Zamanifar, Behrouz Minaei-Bidgoli, Mohsen Sharifi |
| 2008 | A New Kind of Super-Resolution Reconstruction Algorithm Based on the ICM and the Constrained Cubic Spline Interpolation. Zhang Xiang-guang |
| 2008 | A New Model of Mine Hoist Fault Diagnosis Based on the Rough Set Theory. Xia Zhanguo, Wang Zhixiao, Wang Ke, Guan Hongjie |
| 2008 | A New PAPR Reduction Technique for OFDM-WLAN in 802.11a Systems. Chusit Pradabpet, K. Eupree, Sorawat Chivapreecha, Kobchai Dejhan |
| 2008 | A New Vocoder based on AMR 7.4kbit/s Mode in Speaker Dependent Coding System. Vu Thi Lan Huong, Byung-Jae Min, Dong-Chul Park, Dong-Min Woo |
| 2008 | A Novel Method for All Solutions SAT Problem. Xiuqin Wang, Guangsheng Ma, Hao Wang |
| 2008 | A Novel Voice Morphing System Using Bi-GMM for High Quality Transformation. Ning Xu, Xi Shao, Zhen Yang |
| 2008 | A Photonic-based Random Number Generator for Cryptographic Application. N. M. Thamrin, Gunawan Witjaksono, A. Nuruddin, M. S. Abdullah |
| 2008 | A Practical Certified E-Mail System with Temporal Authentication Based on Transparent TSS. Dongmei Liu, Sihan Qing, Pengfei Li, Chunyang Yuan |
| 2008 | A Preliminary Study on Portable Interceptor Mechanism to SOAP. Chen-Liang Fang, Deron Liang, Fengyi Lin, Chien-Cheng Lin |
| 2008 | A Review of Software Risk Management for Selection of Best Tools and Techniques. Md Forhad Rabbi, Khan Olid Bin Mannan |
| 2008 | A Secure Scheme for Image Transformation. Samir Kumar Bandyopadhyay, Debnath Bhattacharyya, Debashis Ganguly, Swarnendu Mukherjee, Poulami Das |
| 2008 | A Sequential Pattern Mining Algorithm Based on Improved FP-tree. Yi Sui, Fengjing Shao, Rencheng Sun, Jinlong Wang |
| 2008 | A Sound and Complete Reified Temporal Logic. Guoxing Zhao, Jixin Ma, Fuxing Shen, Miltos Petridis |
| 2008 | A Study of Classification Algorithm for Data Mining Based on Hybrid Intelligent Systems. Gang Wang, Chenghong Zhang, Lihua Huang |
| 2008 | A Tabu Search and Ant Colony System Approach for the Capacitated Location-Routing Problem. Lyamine Bouhafs, Amir Hajjam, Abderrafiaa Koukam |
| 2008 | A Traffic Modeling Method for MMOG. Xiangbin Shi, Du Ling, Liu Fang, Li Bao-long, Xian-min Chen |
| 2008 | A Two-Dimensionality Model for Providing End-to-End QoS CAC. Jiazheng Wang, Xiuhua Fu |
| 2008 | A Two-Stage Clustering Algorithm for Multi-type Relational Data. Ying Gao, Dayou Liu, Chengmin Sun, He Liu |
| 2008 | A Visualization Portal for a Tsunami Warning System on a Distributed Environment. Pemjit Aphimaeteethomrong, Veera Muangsin |
| 2008 | A Z-Specification of Classification and Relationships between Usecases. Durga Prasad Kakollu, B. D. Chaudhary |
| 2008 | AINAN: Collaborative Application for Protein Visualization & Analyses. Rauf Malick, Usama Khanzada, Athar Abbas, Waheed Iqbal, Kamran Azim |
| 2008 | Accuracy of an Icing On-line Monitoring System. Xinbo Huang, Qindong Sun |
| 2008 | Adaptive Evolvement of Query Plan Based on Low Cost in Dynamic Grid Database. Naijing Hu, Yuan Luo, Yingying Wang |
| 2008 | Adaptive Self-Organizing Overlay Network for Car-to-Car Communications. Mikio Aoyama, Hiroshi Takeichi |
| 2008 | Aggregate Congestion Control for Peer-to-Peer File Sharing Applications. Wei Li, Shanzhi Chen, Yaning Liu, Xin Li |
| 2008 | An Adaptive Performance Management Method for Failure Detection. Ke Liang, Xingshe Zhou, Kailong Zhang, Ruiqing Sheng |
| 2008 | An Algorithm of Level of Detail Terrain. Xiangbin Shi, Liu Fang, Du Ling, Bao Siqin, Xian-min Chen |
| 2008 | An Alternative Model for ERP Maintenance Strategy. Muhammad Rofi Imtihan, Mohd. Salihin Ngadiman, Habibollah Haron |
| 2008 | An Application Generator Framelet. Inggriani Liem, Yohanes Nugroho |
| 2008 | An Approach to Modeling Software Safety. M. Ben Swarup, P. Seetha Ramaiah |
| 2008 | An Automated Decision System for Computer Adaptive Testing Using Genetic Algorithms. Manop Phankokkruad, Kuntpong Woraratpanya |
| 2008 | An Effective Method for Chinese Related Queries Recommendation. Xiaoyan Shen, Bo Cheng, Junliang Chen, Xiangwu Meng |
| 2008 | An Efficient Key Distribution Method Applying to OMA DRM 2.0 with Device Identifier. Zonghua Liu, Guangqing Liu, Byungwook Lee |
| 2008 | An Efficient Parallel Eye Detection Algorithm on Facial Color Images. Jalal A. Nasiri, M. Amir Moulavi, Sepideh Nazemi Gelyan, Hossein Deldari, Hadi Sadoghi Yazdi, A. Eshghi Shargh |
| 2008 | An Ensemble of Complexity Metrics for BPEL Web Processes. Reza Meimandi Parizi, Abdul Azim Abdul Ghani |
| 2008 | An Improved ID-based Restrictive Partially Blind Signature Scheme. Shangping Wang, Pei Han, Yaling Zhang, Xiaofeng Wang |
| 2008 | An Interest Management Mechanism Based on N-Tree. Xiangbin Shi, Wang Yue, Li Qiang, Du Ling, Liu Fang |
| 2008 | An MDA Approach to Byte Code Level Cross-Compilation. Arno Puder, Sascha Häberling, Rainer Todtenhoefer |
| 2008 | An Optimal Data Center Availability and Investment Trade-Offs. Montri Wiboonrat |
| 2008 | Analytical Modeling of Task Scheduling for Master-Slave Super Hypercube Architecture. Maryam Amiripour, Hamid Abachi |
| 2008 | Application of Multi-layer Feed-forward Neural Network in Fault Diagnosis Based on FBP Algorithm. Bin Zhang, Jun Yan, Wei Zhang |
| 2008 | Architecture-aware Partial Order Reduction to Accelerate Model Checking of Networked Programs. Cyrille Artho, Watcharin Leungwattanakit, Masami Hagiya, Yoshinori Tanabe |
| 2008 | Background Subtraction Enhancement using Segmentation. Kyongil Yoon |
| 2008 | Bring Precision and Access Control to Business Document Search. Somchai Chatvichienchai, Katsumi Tanaka |
| 2008 | Byte Code Transformations using XSL Stylesheets. Arno Puder |
| 2008 | COS: A Frame Work for Clustered off-line Search. Sree Harsha Totakura, S. Venkata Nagendra, Rohit Indukuri, V. Vijayasherly |
| 2008 | Classification of Bio-Optical Signals using Soft Computing Tools. Subramanya G. Nayak, C. Puttamadappa, Akshata Kamath, B. Raja Sudeep, K. Kavitha |
| 2008 | Classification of Facial Expression Using SVM for Emotion Care Service System. Byungsung Lee, Junchul Chun, Peom Park |
| 2008 | Clustering ICT Indicators of Bhutan using Two Level HSOM Algorithm. Tshering, Somjit Arch-int |
| 2008 | Collation Strategy Based on Heuristics Chart for Myanmar Language. Yuzana, Khin Marlar Tun |
| 2008 | Combined Fuzzy State Q-learning Algorithm to Predict Context Aware User Activity under Uncertainty in Assistive Environment. Mohamed Ali Feki, Sang Wan Lee, Z. Zenn Bien, Mounir Mokhtari |
| 2008 | Comparison of Direct and Incremental Genetic Algorithm for Optimization of Ordinal Fuzzy Controllers. Khairulmizam Samsudin, Faisul Arif Ahmad, Syamsiah Mashohor, Norfadzilah Mohd Latif |
| 2008 | Comparison of the Mechanisms of the Zigbee's Indoor Localization Algorithm. Angela Song-Ie Noh, Woong Jae Lee, Jin Young Ye |
| 2008 | Conceptual Modeling for Safety Critical Computer Systems. P. Seetha Ramaiah, M. Ben Swarup, K. Raja Kumar |
| 2008 | Consideration of User Preference on Internet-based Overlay Network. Taewan Gu, Jae-Bong Yoo, Chan-Young Park |
| 2008 | Customer Value-based HW/SW Partitioning Decision in Embedded Systems. Neunghoe Kim, Taek Lee, Dong-hyun Lee, Keun Lee, Hoh Peter In |
| 2008 | DHA-KD: Dynamic Hierarchical Agent Based Key Distribution in Group Communication. M. Amir Moulavi, Jalal A. Nasiri, Behnam Bahmani, Hossein Parvar, M. Sadeghizadeh, Mahmoud Naghibzadeh |
| 2008 | Decision Tree-Based Model for Automatic Assignment of IT Service Desk Outsourcing in Banking Business. Padej Phomasakha Na Sakolnakorn, Phayung Meesad |
| 2008 | Design of MLP using Evolutionary Strategy with Variable Length Chromosomes. Abbas Sarraf Shirazi, Tahereh Seyedena |
| 2008 | Design of a Network Coverage Analyzer for Roadside-to-Vehicle Telematics Networks. Junghoon Lee |
| 2008 | Detecting Feature Interactions in Home Appliance Networks. Pattara Leelaprute, Takafumi Matsuo, Tatsuhiro Tsuchiya, Tohru Kikuno |
| 2008 | Detecting Semantic Mapping of Ontologies with Inference of Description Logic. Wenhui Ma, Guangping Xu, Gang Wang, Jing Liu |
| 2008 | Dynamic Data Feed to Bayesian Network Model and SMILE Web Application. Nipat Jongsawat, Pittaya Poompuang, Wichian Premchaiswadi |
| 2008 | E Commerce - Forward and Reverse Auction - A Managerial Tool to Succeed over Business Competitiveness. D. Ganguly, Samit Chakraborty |
| 2008 | E-Tax Invoice System Using Web Services Technology: A Case Study of the Revenue Department of Thailand. Sukanya Suwisuthikasem, Songsri Tangsripairoj |
| 2008 | ESnapII: A Writable Dependent Snapshot System with Shared Cache. Guangjun Xie, Lu Qi, Feng Wang, Gang Wang, Xiaoguang Liu, Jing Liu |
| 2008 | Early-Life Cycle Reuse Approach for Component-Based Software of Autonomous Mobile Robot System. Dayang N. A. Jawawi, Safaai Deris, Rosbi Bin Mamat |
| 2008 | Eclipse Project and Resource Tracking Plug-in. Kevin Li, Dwight Deugo |
| 2008 | Effect of Security Increment to Symmetric Data Encryption through AES Methodology. Md. Nazrul Islam, Md. Monir Hossain Mia, Muhammad F. I. Chowdhury, Mohammad Abdul Matin |
| 2008 | Efficient Object Recognition Using Parametric Eigenspace under Influence of Noise and Occlusion. Pravinkumar S. Revankar, Prabir Kumar Biswas, Sonali N. Deshpande |
| 2008 | Enhancing Service-Side QoS Monitoring for Web Services. Natee Artaiam, Twittie Senivongse |
| 2008 | Equalization for a Wireless ATM Channel with a Recurrent Neural Network Pruned by Genetic Algorithm. Dong-Chul Park |
| 2008 | Face Detection Based on Skin Gaussian Model and KL Transform. Chuanxu Wang, Zuoyong Li |
| 2008 | Face Detection using BP Network Combined with Gabor Wavelet Transform. Wang Chuan-xu, Li Xue |
| 2008 | Fast Preemptive Task Scheduling Algorithm for Homogeneous and Heterogeneous Distributed Memory Systems. Maruf Ahmed, Sharif M. H. Chowdhury, Masud Hasan |
| 2008 | Finding Causes of Software Failure Using Ridge Regression and Association Rule Generation Methods. Saeed Parsa, Mojtaba Vahidi-Asl, Somaye Arabi Naree |
| 2008 | ICLS : Intelligent Cricket-based Location Tracking System Using Sensor Fusion. Ho Min Jung, Byung Ki Kim, Wan Yeon Lee, Young Woong Ko |
| 2008 | Identification and Extraction of Design Pattern Information in Java Program. Chengwan He, Zheng Li, Keqing He |
| 2008 | Image Authentication Schemes against Key-Logger Spyware. M. N. Doja, Naveen Kumar |
| 2008 | Image Preprocessing and Trajectory Feature Extraction based on Hidden Markov Models for Sign Language Recognition. Duong Van Hieu, Supot Nitsuwat |
| 2008 | Implementation of Parallel Algorithms for LUC Cryptosystem. Zulkarnain Md Ali, Mohamed Othman, Mohd Rushdan Mohd Said, Md Nasir Sulaiman |
| 2008 | Improve Frequent Closed Itemsets Mining over Data Stream with Bitmap. Haifeng Li, Hong Chen |
| 2008 | Improved Nonce Construction Scheme for AES CCMP to Evade Initial Counter Prediction. Mansoor Ahmed Khan, Ahmad Raza Cheema, Aamir Hasan |
| 2008 | Information Flow based Ontology Mapping. Ye Liang, Hong Bao, Hongzhe Liu |
| 2008 | Information Value Evaluation Model for ILM. Hai Jin, Muzhou Xiong, Song Wu |
| 2008 | Intelligent Personalization Job Web Site. Wuttipol Wanarsup, Suwarin Pattamavorakun, Suwat Pattamavorakun |
| 2008 | Knowledge Representation and Query Process Based-on Semantic Web Technologies. Chenghong Zhang, Songran Liu, Zhengchuan Xu, Zhuojun Gu, Xiaoling Wang |
| 2008 | LMCM: Layered Multiple Chaining Model for Authenticating Multicast Streams. Jinxin He, Gaochao Xu, Xiaodong Fu, Zhiguo Zhou, Jianhua Jiang |
| 2008 | Lipschitz Continuity of Approximate Reasoning. Takashi Mitsuishi, Takanori Terashima, Toshimichi Homma, Yasunari Shidama |
| 2008 | Malicious Code Detection Architecture Inspired by Human Immune System. Mohd Fadzli Marhusin, David Cornforth, Henry Larkin |
| 2008 | Managing Quality Level for Developing Information Security System Adopting QFD. Pauline Kongsuwan, Sangmun Shin, Myeonggil Choi |
| 2008 | Mathematical Modelling for the Design of an Edge Router. Partha Bhattacharjee, Goutam Sanyal |
| 2008 | Message Sequence Charts to Specify the Communicating Threads for Concurrent Discrete Wavelet Transform Based Image Compression and a Verification Analysis. Kamrul Hasan Talukder, Koichi Harada |
| 2008 | Meta-heuristic Enabled MAS Optimization in Supply Chain Procurement. Xia Zhanguo, Wang Ke, Wang Zhixiao |
| 2008 | Mining Approximate Closed Frequent Itemsets over Stream. Haifeng Li, Zongjian Lu, Hong Chen |
| 2008 | Mixing Protocol based on the Cooperation and the Parallelism for the Distributed Environment. Belaid Saad, Francine Herrmann, Yann Lanuel, Thomas Tamisier |
| 2008 | Model Checking for Web Service Flow Based on Annotated OWL-S. Rujuan Liu, Changjun Hu, Chongchong Zhao |
| 2008 | Modified Method for Denoising Color Images using Fuzzy Approach. Madhu S. Nair, M. Wilscy |
| 2008 | Modular Matrix Cipher and Its Application in Authentication Protocol. Bao Ngoc Tran, Thuc Dinh Nguyen |
| 2008 | Multi Readers Detection in Adaptive RFID Middleware. Siti Zaiton Mohd Hashim, Mardiyono, Wan M. N. Wan-Kadir, Nurulhaini Anuar |
| 2008 | Multi-Agent System Model of a BitTorrent Network. Enrique Costa-Montenegro, Juan C. Burguillo-Rial, Pedro S. Rodríguez-Hernández, Francisco J. González-Castaño, Maria Curras-Parada, Patricia Gomez-Rana, Juan P. Rey-Souto |
| 2008 | Multi-signers Strong Designated Verifier Signature Scheme. Yaling Zhang, Jing Zhang, Yikun Zhang |
| 2008 | Multicasting Support for NEMO based on ODMRP. Seong-Yee Phang, Chee-Min Yeoh, Hoonjae Lee, Hyotaek Lim |
| 2008 | Multidisciplinary Design Approach Using Repetitive Response Surface Enhancement and Global Optimization. Kwon-Su Jeon, Jae-Woo Lee, Yung-Hwan Byun |
| 2008 | Neural Net Water Level Trend Prediction and Dynamic Water Level Sampling Frequency. Steven P. Sweeney, Sehwan Yoo, Albert Chi, Frank Lin, Taikyeong Jeong, Sengphil Hong, Sam Fernald |
| 2008 | Neuro Fuzzy Model Predictive Control of AQM Networks Supporting TCP Flows. A. R. Maghsoudlou, Roohollah Barzamini, S. Soleimanpour, Javid Jouzdani |
| 2008 | New Approaches for Software Watermarking by Register Allocation. Hakun Lee, Keiichi Kaneko |
| 2008 | Ninth ACIS International Conference on Software Engineering, Artificial Intelligence, Networking and Parallel/Distributed Computing, SNPD 2008, In conjunction with Second International Workshop on Advanced Internet Technology and Applications, August 6-8, 2008, Phuket, Thailand |
| 2008 | Novelty towards Hybrid Segmentation of Coronary Artery in CT Cardiac Images. Valliappan Raman, Patrick Hang Hui Then |
| 2008 | Omni-Directional Antenna for Wireless Access Point. Suwat Pattamavorakun, Wuttipol Wanarsup, Suwarin Pattamavorakun |
| 2008 | On Relaxing and Steady State Genetic Methods for Satellite Imaging Scheduling. Xiao-shan Jin, Jun Li, Ning Jing |
| 2008 | Parallel Implementation of the Novel Approach to Genome Assembly. Jacek Blazewicz, Marta Kasprzak, Aleksandra Swiercz, Marek Figlerowicz, Piotr Gawron, Darren Platt, Lukasz Szajkowski |
| 2008 | Placing a Liaison between Two Members of the Same Level in an Organization Structure of a Complete Binary Tree. Kiyoshi Sawada |
| 2008 | Prioritizing Default Rules Embedded in Description Logic Knowledge Base. Shaohua Liu, Junsheng Yu, Yinglong Ma, Xu Zhang, Xiaoming Liu, Hansheng Su |
| 2008 | Privacy Preserving of Associative Classification and Heuristic Approach. Nattapon Harnsamut, Juggapong Natwichai, Bowonsak Seisungsittisunti |
| 2008 | Prolonging Sensor Network Lifetime with Initial Energy Level Assignment. Lijie Ren, Zhongwen Guo, Renzhong Ma |
| 2008 | QoS Protocol Verification using Petri-Net for Seamless Mobility in a Ubiquitous Environment: A Case Study. Dalju Lee, Jongmoon Baik |
| 2008 | Ranking of Indian E-commerce Web-applications by Measuring Quality Factors. Priyanka Tripathi, M. Kumar, Namita Shrivastava |
| 2008 | Reinforcement Distribution in a Team of Cooperative Q-learning Agents. Zahra Abbasi, Mohammad Ali Abbasi |
| 2008 | Research on Mechanism of Agricultural FAQ Retrieval Based on Ontology. Fang Wang, Guifa Teng, Lisheng Ren, Jianbin Ma |
| 2008 | Research on UML-based Modeling of Workflow Manage System. Guan Hongjie, Meng Fan-rong, Xia Zhanguo |
| 2008 | Routing in General Incomplete Star Interconnection Network. Bao-Xing Chen, Wenjun Xiao |
| 2008 | SMILE Visualization with Flash Technologies. Anucha Tungkatsathan, Pittaya Poompuang, Wichian Premchaiswadi |
| 2008 | Security Analysis of Micali's Fair Contract Signing Protocol by Using Coloured Petri Nets. Panupong Sornkhom, Yongyuth Permpoontanalarp |
| 2008 | Security Enhancements for Privacy and Key Management Protocol in IEEE 802.16e-2005. Ayesha Altaf, M. Younus Javed, Attiq Ahmed |
| 2008 | Software Engineering Issues in Developing a Context-aware Exhibition Guide System. Jongmyung Choi, Hyun-Joo Moon |
| 2008 | Specifying and Verifying Timing Properties of a Time-triggered Protocol for In-vehicle Communication. Bo Zhang |
| 2008 | Static Hand Gesture Recognition and its Application based on Support Vector Machines. Yun Liu, Zhijie Gan, Yu Sun |
| 2008 | Stock Price Time Series Prediction using Neuro-Fuzzy with Support Vector Guideline System. Phayung Meesad, Tong Srikhacha |
| 2008 | Study on Ontology Partition Based on Ant Colony Algorithm. Lei Zhang, Shixiong Xia, Zhanguo Xia, Yong Zhou |
| 2008 | Test Sequence Generation from UML Sequence Diagrams. Philip Samuel, Anju Teresa Joseph |
| 2008 | Testing Component-Based Real Time Systems. Rachid Bouaziz, Ismail Berrada |
| 2008 | The Complexity of the Evolution of Graph Labelings. Geir Agnarsson, Raymond Greenlaw, Sanpawat Kantabutra |
| 2008 | The Complexity of the Grid Wireless Mobility Model. Sanpawat Kantabutra, Pattama Longani |
| 2008 | The Implementation and Execution Framework of a Role Model Based Language, EpsilonJ. Supasit Monpratarnchai, Tetsuo Tamai |
| 2008 | The Prototype of the Massive Events Streams Service Architecture and its Application. Kyungeun Park, Yanggon Kim, Juno Chang, Dae Woong Rhee, Jinkyu Lee |
| 2008 | The Study of a Financial Crisis Prediction Model based on XBRL. Fengyi Lin, Deron Liang, Shih-Jung Chiu |
| 2008 | The Upper Bound of Coverage on Fixed Energy Budget in Wireless Sensor Networks. Fang Wang, Lisheng Ren, Guifa Teng |
| 2008 | Tools and Techniques for Model Checking Networked Programs. Cyrille Artho, Watcharin Leungwattanakit, Masami Hagiya, Yoshinori Tanabe |
| 2008 | Towards Formal Modeling and Analysis of Networks of Embedded Medical Devices in Real-Time Maude. Peter Csaba Ölveczky |
| 2008 | Type Flaw Attacks and Prevention in Security Protocols. Juan Wang, Jingwei Zhang, Huanguo Zhang |
| 2008 | Using Social Network Analysis to Better Understand the Dependencies in UML Use Cases Collection. Phanarut Srichetta, Songsri Tangsripairoj |
| 2008 | Vulnerabilities Exposing IEEE 802.16e Networks to DoS Attacks: A Survey. Sheraz Naseer, Muhammad Younus, Attiq Ahmed |
| 2008 | Vulnerabilities of UMTS Access Domain Security Architecture. Muzammil Khan, Attiq Ahmed, Ahmad Raza Cheema |
| 2008 | Web Services Communication Model in Telecom Domain. Bo Cheng, Xiaoyan Shen, Xiangwu Meng, Junliang Chen |