Workshop on CAD/CAM and Web Based Collaboration (CADCAM 07).- Framework of Integrated System for the Innovation of Mold Manufacturing Through Process Integration and Collaboration.- A Study on Automated Design System for a Blow Mould.- Development of an Evaluation System of the Informatization Level for the Mould Companies in Korea.- Framework of a Collaboration-Based Engineering Service System for Mould Industry.- Workshop on Component Based Software Engineering and Software Process Model (CBSE 07).- Meta-modelling Syntax and Semantics of Structural Concepts for Open Networked Enterprises.- Component Specification for Parallel Coupling Infrastructure.- Real-Time Navigation for a Mobile Robot Based on the Autonomous Behavior Agent.- Concurrent Subsystem-Component Development Model (CSCDM) for Developing Adaptive E-Commerce Systems.- A Quantitative Approach for Ranking Change Risk of Component-Based Software.- Relating Software Architecture Views by Using MDA.- Workshop on Distributed Data and Storage System Managemnt (DDSM 07).- Update Propagation Technique for Data Grid.- A Spatiotemporal Database Prototype for Managing Volumetric Surface Movement Data in Virtual GIS.- Query Distributed Ontology over Grid Environment.- Workshop on Embedded Systems for Ubiquitous Computing (ESUC 07).- CSP Transactors for Asynchronous Transaction Level Modeling and IP Reuse.- A Robust Real-Time Message Scheduling Scheme Capable of Handling Channel Errors in Wireless Local Area Networks.- Design and Implementation of a Tour Planning System for Telematics Users.- General Track.- Ionospheric F-Layer Critical Frequency Estimation from Digital Ionogram Analysis.- Study of Digital License Search for Intellectual Property Rights of S/W Source Code.- Creating Numerically Efficient FDTD Simulations Using Generic C++ Programming.- Mutual Authentication Protocol for RFID Tags Based on Synchronized Secret Information with Monitor.- Non-linear Least Squares Features Transformation for Improving the Performance of Probabilistic Neural Networks in Classifying Human Brain Tumors on MRI.- Adaptive Scheduling for Real-Time Network Traffic Using Agent-Based Simulation.- Defining Security Architectural Patterns Based on Viewpoints.- A New Nonrepudiable Threshold Proxy Signature Scheme with Valid Delegation Period.- Two-Stage Interval Krawczyk-Schwarz Methods with Applications to Nonlinear Parabolic PDE.- Red-Black EDGSOR Iterative Method Using Triangle Element Approximation for 2D Poisson Equations.- Performance of Particle Swarm Optimization in Scheduling Hybrid Flow-Shops with Multiprocessor Tasks.- Branch-and-Bound Algorithm for Anycast Flow Assignment in Connection-Oriented Networks.- Quasi-hierarchical Evolutionary Algorithm for Flow Optimization in Survivable MPLS Networks.- An Exact Algorithm for the Minimal Cost Gateways Location, Capacity and Flow Assignment Problem in Two-Level Hierarchical Wide Area Networks.- Implementing and Optimizing a Data-Intensive Hydrodynamics Application on the Stream Processor.- On Disconnection Node Failure and Stochastic Static Resilience of P2P Communication Networks.- An Efficient Sequence Alignment Algorithm on a LARPBS.- An Effective Unconditionally Stable Algorithm for Dispersive Finite Difference Time Domain Simulations.- A Novel Congestion Control Scheme for Elastic Flows in Network-on-Chip Based on Sum-Rate Optimization.- 3D Bathymetry Reconstruction from Airborne Topsar Polarized Data.- A Parallel FDTD Algorithm for the Solution of Maxwell’s Equations with Nearly PML Absorbing Boundary Conditions.- Application of Modified ICA to Secure Communications in Chaotic Systems.- Zero Memory Information Sources Approximating to Video Watermarking Attacks.- On Statistical Independence in the Logistic Map: A Guide to Design New Chaotic Sequences Useful in Cryptography.- FVM- and FEM-Solution of Elliptical Boundary Value Problems in Different Coordinate Systems.- Digital Simulation for Micro Assembly Arranged at Rectangular Pattern in Micro Factory.- A New Quantized Input RLS, QI-RLS, Algorithm.- Decentralized Replica Exchange Parallel Tempering: An Efficient Implementation of Parallel Tempering Using MPI and SPRNG.- Approximation Algorithms for 2-Source Minimum Routing Cost k-Tree Problems.- On the Expected Value of a Number of Disconnected Pairs of Nodes in Unreliable Network.- Linearization of Stream Ciphers by Means of Concatenated Automata.- Effective Quantification of Gene Expression Levels in Microarray Images Using a Spot-Adaptive Compound Clustering-Enhancement-Segmentation Scheme.- Biomarker Selection, Employing an Iterative Peak Selection Method, and Prostate Spectra Characterization for Identifying Biomarkers Related to Prostate Cancer.- Classic Cryptanalysis Applied to Exons and Introns Prediction.- Chronic Hepatitis and Cirrhosis Classification Using SNP Data, Decision Tree and Decision Rule.- Reconstruction of Suboptimal Paths in the Constrained Edit Distance Array with Application in Cryptanalysis.- Solving a Practical Examination Timetabling Problem: A Case Study.- A Geometric Design of Zone-Picking in a Distribution Warehouse.- Routing Path Generation for Reliable Transmission in Sensor Networks Using GA with Fuzzy Logic Based Fitness Function.- A Heuristic Local Search Algorithm for Unsatisfiable Cores Extraction.- ontoX - A Method for Ontology-Driven Information Extraction.- Improving the Efficiency and Efficacy of the K-means Clustering Algorithm Through a New Convergence Condition.- Modelling Agent Strategies in Simulated Market Using Iterated Prisoner’s Dilemma.- A Local Search Algorithm for a SAT Representation of Scheduling Problems.- A Context-Aware Solution for Personalized En-route Information Through a P2P Agent-Based Architecture.- A Survey of Revenue Models for Current Generation Social Software’s Systems.- Context-Driven Requirements Analysis.- Performance Analysis of Child/Descendant Queries in an XML-Enabled Database.- Diagonal Data Replication in Grid Environment.- Efficient Shock-Capturing Numerical Schemes Using the Approach of Minimised Integrated Square Difference Error for Hyperbolic Conservation Laws.- Improvement on Real-Time Face Recognition Algorithm Using Representation of Face and Priority Order Matching.- Modeling a Legged Robot for Visual Servoing.- Information Extraction in a Set of Knowledge Using a Fuzzy Logic Based Intelligent Agent.- Efficient Methods in Finding Aggregate Nearest Neighbor by Projection-Based Filtering.- On Multicast Routing Based on Route Optimization in Network Mobility.- An Effective XML-Based Sensor Data Stream Processing Middleware for Ubiquitous Service.- Opportunistic Transmission for Wireless Sensor Networks Under Delay Constraints.- Workflow-Level Parameter Study Support for Production Grids.- Certificate Issuing Using Proxy and Threshold Signatures in Self-initialized Ad Hoc Network.- XWELL: A XML-Based Workflow Event Logging Mechanism and Language for Workflow Mining Systems.- Workcase-Oriented Workflow Enactment Components for Very Large Scale Workflows.- A Workcase-Based Distributed Workflow Architecture and Its Implementation Using Enterprize Java Beans Framework.- Building Web Application Fragments Using Presentation Framework.- Three–Dimensional Bursting Simulation on Two Parallel Systems.- PAR Reduction Scheme for Efficient Detection of Side Information in OFDM-BLAST System.- Fuzzy PI Controller for Turbojet Engine of Unmanned Aircraft.- Implementation of QoS-Aware Dynamic Multimedia Content Adaptation System.- Experience of Efficient Data Transformation Solution for PCB Product Automation.- Performance Evaluation for Component Retrieval.- The Clustering Algorithm of Design Pattern Using Object-Oriented Relationship.- Modeling Parametric Web Arc Weight Measurement.- Performance Analysis of EPC Class-1 Generation-2 RFID Anti-collision Protocol.- Worst-Case Evaluation of Flexible Solutions in Disjunctive Scheduling Problems.- The Search for a Good Lattice Augmentation Sequence in Three Dimensions.- Tracing Illegal Users of Video: Reconsideration of Tree-Specific and Endbuyer-Specific Methods.- Rendering of Translucent Objects Based Upon PRT Techniques.- An Image-Adaptive Semi-fragile Watermarking for Image Authentication and Tamper Detection.- Identification of Fuzzy Set-Based Fuzzy Systems by Means of Data Granulation and Genetic Optimization.- Public Key Encryption with Keyword Search Based on K-Resilient IBE.- Efficient Partially Blind Signatures with Provable Security.- Study on Grid-Based Special Remotely Sensed Data Processing Node.- Novel Algorithms for Quantum Simulation of 3D Atom-Diatom Reactive Scattering.- An Algorithm for Rendering Generalized Depth of Field Effects Based on Simulated Heat Diffusion.- Fingerprint Template Protection Using Fuzzy Vault.- Design and Application of Optimal Path Service System on Multi-level Road Network.- Spatio-temporal Similarity Measure Algorithm for Moving Objects on Spatial Networks.- Efficient Text Detection in Color Images by Eliminating Reflectance Component.- Enhanced Non-disjoint Multi-path Source Routing Protocol for Wireless Ad-Hoc Networks.