default search action
8th SNPD 2007: Qingdao, China
- Wenying Feng, Feng Gao:
Proceedings of the 8th ACIS International Conference on Software Engineering, Artificial Intelligence, Networking and Parallel/Distributed Computing, SNPD 2007, July 30 - August 1, 2007, Qingdao, China. IEEE Computer Society 2007, ISBN 0-7695-2909-7
Volume 1
- Mingyi Cui, Xinxiang Zhang, Huichao Mi:
Research on Threshold Denoising of FCGA. 3-8 - Junmin Wang, Jufang Li, Yujin Tan:
Study on Heuristic Algorithm for Dynamic Scheduling Problem of Earth Observing Satellites. 9-14 - Haifeng Shen, Suiping Zhou, Chengzheng Sun:
Leveraging Single-user OpenOffice Suite for Collaboration by Transparent Adaptation. 15-20 - Hongjun Su, Hong Zhang, Ray Hashemi:
Distributed and Integrated and and Collaborative Research Environment (DiCore): An Architectural Design. 21-26 - Tingting Fu, Yigang Wang, Peng Liu, Yehua Du:
Integrating Agents and Web Services into Cooperative Design Platform of Vehicles Headlight. 27-32 - Mingjun Xin, Quan Qian, Yingyong Chen, Weihua Li:
An Approach To QoS-Driven Knowledge Engine For Spatial Problem Collaborative Processing. 33-38 - Liqiang Zhang, Lu Chen, Huanguo Zhang, Fei Yan:
Trusted Code Remote Execution through Trusted Computing and Virtualization. 39-44 - Xinguo Wang, Aihua Li, Xiaogang Zhou, Hualong Xu:
Research of Real-time Forecast Technology in Fault of Missile Guidance System Based on Grey Model and Data Fusion. 45-49 - Xubao Sun, Xujian Li:
Comparison of Adaptive Receivers for DS-CDMA Systems. 50-53 - Wei Xu, Xingming Li:
A Shared-Path-Protection Based Heuristic Algorithm for the Capacity Placement Problem in Mesh Networks. 54-59 - Zongli Tang, Xingming Li:
A Mixed Shared and Multi Paths Protection Scheme with SRLG Constraints. 60-65 - Zhenqi Wang, Jin Liu:
Traffic measurement Mechanisms for high precision Internet Applications. 66-69 - Bo Chen, Zexun Geng, Yang Yang, Tianshuang Shen:
Dual-tree Complex Wavelets Transforms for Image Denoising. 70-74 - Bo Chen, Zexun Geng, Yang Yang, Xiaosong Liu:
Application of the Rough Set to Image Median Denoising. 75-78 - Weixin Gao, Nan Tang, Xiangyang Mu:
A Novel Algorithm for Detecting Air Holes in Steel Pipe Welding Based on Hopfield Neural Network. 79-83 - Shengmei Mou, Xiaodong Yang:
Design of a High-speed FPGA-based 32-bit Floating-point FFT Processor. 84-87 - Shengmei Mou, Xiaodong Yang:
Research on the RAW Dependency in Floating-point FFT Processors. 88-92 - Gannan Yuan, Fuyou Wang, Yanling Hao:
Research on Data Encryption Technology Based on Chaos Theory. 93-98 - Wenyuan Liu, Feng Tong, Yongan Luo, Feng Zhang:
A proxy blind signature scheme based on elliptic curve with proxy revocation. 99-104 - Feng Li, Jianwei Shang, Daxing Li:
A Proactive Secure Multisecret Sharing Threshold Scheme. 105-110 - Zhengjun Cao, Lihua Liu:
A Strong RSA Signature Scheme and Its Application. 111-115 - Huaqun Wang, Shuping Zhao, Guoxing Jiang:
Key management based on elliptic curve Paillier scheme in ad hoc networks. 116-119 - Chunyan Li, Yizun Guo:
Risk Evaluation for Host System Based on Theory of Evidence. 120-124 - Hongwei Zhao, Kechi Fang, Xuebai Zang:
Research of technology on making Linux interrupts tasked. 125-128 - Wei Zheng, Xiaofeng Meng, Qun Sun:
An Immune Middleware for Embedded System. 129-134 - J. H. Zhang, Z. D. Zhou:
Study on Modular Design-based Reconfigurable Embedded Network Numerical Control. 135-139 - Xiao Hu, Shuming Chen:
Applications of On-chip Trace on Debugging Embedded Processor. 140-145 - Junyuan Yang, Fengqin Zhang, Xiaoyan Wang:
A class of SIR epidemic model with saturation incidence and age of infection. 146-149 - Xinzhu Meng, Huidong Cheng, Lansun Chen:
Profitless delays for permanence in a pure-delayed nonautomous Lotka-Volterra competitive system with infinite delays and discrete delays. 150-153 - Huifeng Li, Jinliang Wang:
Asymptotic Weighted Periodic Oscillations for Dynamic Systems Caused by Impulse and Time Delay. 154-157 - Jinsheng Liu, Jietao Zou:
Existence of Three Solutions for a Fourth-order Two-point Boundary Value Problem. 158-161 - Yu Yuan, Jiang Dan:
A Camera Calibration Strategy in The Video-based Traffic Information Detection. 162-166 - Dejun Tang:
Design of Robust Observer for the Switched Discrete-Time Linear System with Time Delays. 167-173 - Zhifang Liu, Zhisheng You:
A Real-time Vision-based Vehicle Tracking and Traffic Surveillance. 174-179 - Haiyang Xu, Wenshan Cui, Ping Wang:
Probabilistic Logic Operator based on Zero-order N/T-Norms Complete Clusters. 180-184 - Fasheng Xu, Wei Chen, Ling Yang:
Improved Particle Swarm Optimization for Realistic Portfolio Selection. 185-190 - Zhifeng Wang, Xiaomao Li, Yandong Tang:
An Improved Anisotropic Diffusion PDE for Noise Removal. 191-195 - Ke Han, Quan Feng, Xiu-chang Zhu, Huiyuan Wang:
A New Face Recognition Method Based on 2DWPCA. 196-199 - Yunyang Yan, Zhibo Guo, Jingyu Yang:
Multi-view Face Detection Based on the Enhanced AdaBoost Using Walsh Features. 200-205 - Xuedong Tian, Yan Zhang:
Segmentation of Touching Characters in Mathematical Expressions Using Contour Feature Technique. 206-209 - Zhihua Jian, Zhen Yang:
Voice Conversion Using Canonical Correlation Analysis Based on Gaussian Mixture Model. 210-215 - Zhengdong Li, Xianwen Zeng, Zhongcheng Yin, Shaobin Hu, Lei Wang:
The Design and Optimization of H.264 Encoder Based on the Nexperia Platform. 216-219 - Dongshi Xia, Zongcai Ruan:
IR Image Based Eye Gaze Estimation. 220-224 - Ying Gao, Yue Li, Baojun Yang:
ICA based Noise Subtraction for Linear System Identification in Additive Noisy Output. 225-228 - Jinhe Wang:
A Topology Set Method for Vectorization. 229-234 - Meili Shen, Huajun Song, Weiwei Sheng, Zunnian Liu:
Fast Correlation Tracking Method based on Circular Projection. 235-238 - Jun Lai, Wu Ye, Suili Feng:
LQRD: An Improved ECN Algorithm. 239-244 - Xun Duan, Jian-shi Li:
Overlay Network Testing by OpenDHT. 245-248 - Yan Lu, Zhongxiao Hao, Ran Dai:
A Sufficient and Necessary Condition for the Absolute Consistency of XML DTDs. 249-254 - Pingping Lu, Bin Li, Maolin Xing, Liang Li:
D-S Theory-based Trust Model FIRE+ in Multi-agent Systems. 255-260 - Jianxin Li, Bin Li, Liang Li, Tongsheng Che:
A Policy Language for Adaptive Web Services Security Framework. 261-266 - Hui Zhang, Yuning Dong:
An Adaptive Stable Link Selection Algorithm for Mobile Ad Hoc Networks. 267-272 - Mary Mathews, Min Song, Sachin Shetty, Rick McKenzie:
Detecting Compromised Nodes in Wireless Sensor Networks. 273-278 - Zhiyuan Liu, Shejie Lu, Jun Yan:
Secure Routing Protocol based Trust for Ad Hoc Networks. 279-283 - Hongmei Wang, Zongpu Jia, Huan Zhao:
Novel Scheme based on Ping-pong Effect for Predictive Fast Handovers for Mobile IPv6. 284-287 - Bin Zeng, Jun Wei, Tao Hu:
Optimal Cluster-Cluster Design for Sensor Network with Guaranteed Capacity and Fault Tolerance. 288-293 - Yu-Mei Liu, Shoubao Yang, Leitao Guo:
A Distributed Trust-based Reputation Model in P2P System. 294-299 - Ya-tao Yang, Ping Zeng, Yong Fang, Yaping Chi:
An Feasible Key Management Scheme in Ad Hoc Network. 300-303 - Qiuna Niu:
Study and Implementation of a Improved Group Key Protocol for Mobile Ad Hoc Networks. 304-308 - Ye Liang, Hong Bao, Hongzhe Liu:
Hybrid Ontology Integration for Distributed System. 309-314 - Aizhong Mi, Jiquan Shen, Xuefeng Zheng, Xuyan Tu:
Applying Multiple Classifier Systems to SoftMan's Perception System. 315-320 - Lihua Yu, Gang Chen, Yijun Bei, Feng Shao, Jinxiang Dong:
OBSI: Object Based Storage System for Massive Image Databases. 321-326 - Feng Zhao, Peidong Zhu, Meng Wang, Baosheng Wang:
Optimizing Network Configurations Based on Potential Profit Loss. 327-332 - Bo Yang, Min Zhou, Guohuan Li:
A Reputation System with Privacy and Incentive. 333-338 - Fuxiong Sun, Ping Xiong, Tao Sun:
The Research of ID Strategy Based on Antigen Presenting Principle and its Adaptability. 339-344 - Yongquan Cai, Xiuying Li:
An Improved Identity-based Fault-tolerant Conference Key Distribution Scheme. 345-349 - Qiuyu Zhang, Lei Sun, Yanfeng Jin:
Description of Key Performance Index States based on Cloud Theory and the Weighted Mean method for Multi-sensor. 350-354 - Shidu Dong, Bo He, Qun Jiang, Huaqiu Wang, Tongyuan Huang:
A half face recognition scheme. 355-358 - Guoliang Wang, Dequn Liang, Yanchun Wang, Zhaohua Hu:
Algorithm for Tracking of Fast Motion Objects with Adaptive Mean Shift. 359-363 - Shuguo Yang, Chunxia Li, Sheng-He Sun, Rongsheng Xie:
A Fractal Watermarking Scheme for Image in DWT Domain. 364-368 - Muwei Jian, Junyu Dong, Dawei Gao, Zuojuan Liang:
New Texture Features Based on Wavelet Transform Coinciding with Human Visual Perception. 369-373 - Kun Li, Shuang Wang, Biao Hou, Licheng Jiao:
An Algorithm for SAR Image Embedded Compression Based on Wavelet Transform. 374-378 - Xiulan Hao, Xiaopeng Tao, Shuyun Wang, Yunfa Hu:
An Effective Method To Improve kNN Text Classifier. 379-384 - Jianqing Su, Gonggui Wang, Qiong Hu, Shouyi Li:
A Novel SVM Decision Tree and its application to Face Detection. 385-389 - Harry Zhou:
Intelligent Cultural Advisor System: an interactive on-line culture guidebook. 390-395 - Haibin Sun, Xin Chen:
Research on Technologies of Spatial Configuration Information Retrieval. 396-401 - Jiang Dan, Yu Yuan:
A Multi-object Motion-tracking Method for Video Surveillance. 402-405 - Zhenlai Han, Shurong Sun:
Oscillation Criteria of Second-Order Delay Dynamic Equations on Time Scales. 406-411 - Huting Yuan, Feng Mi:
Existence of Positive Solutions for Boundary Value Problems on a Measure Chain with a Parameter. 412-416 - Guang Zhang, Bao Shi:
Clever Uses of Matrices for Neutral Delay Difference Systems. 417-421 - Zhongwei Jia, Xiaowen Li, Zhen Jin, Dan Feng, Wuchun Gao:
A model for Tuberculosis with Various Latent Periods. 422-425 - Zhirou Zhang, Wengang Cheng, Dawei Dong:
Multi-Connection Mechanism of Mobile Agent in Grid. 426-430 - Yu Jin, Zhimin Gu, Zhijie Ban:
Using Trust and Reputation Information to Choose Both Request Responders and Servers in Peer-to-Peer Networks. 431-436 - Chunli Dong, Rongcai Zhao, Zhuojie Ma, Donghong Li:
Communication Optimization on Automatic Program Parallelization. 437-442 - Yongquan Liang, Jiancong Fan, Zhongying Zhao:
A New Clustering Algorithm Based on Token Ring. 443-446 - Liang Zhang, Fengming Zhang, Yongfeng Hu:
A Two-phase Flight Data Feature Selection Method Using both Filter and Wrapper. 447-452 - Zhenzhou Chen:
Feature Extraction by Foley-Sammon Transform with Kernels. 453-457 - Xiaofeng Liu, Chuanbo Chen, Yunsheng Liu:
Processing Global Nearest Neighbor Query. 458-462 - Ying Guo, Wenshan Cui, Yutao Zhang:
Signature of quantum message using quantum fingerprint and stabilizer code. 463-466 - Zhenjie Huang, Rufen Huang, Xuanzhi Lin:
Perfect Concurrent Signature Protocol. 467-472 - Yong Yu, Bo Yang, Ying Sun:
ID-based threshold signature and mediated signature schemes. 473-478 - Chongyu Wei, Chengjin Wang, Chunlin Zhou:
An Encryption solution in Digital Trunking System. 479-482 - Xiaosu Chen, Dali Zhu, Jian Liu:
A Practical Digital Watermarking Protocol Based On PKI-CA. 483-488 - Yanhong Zhao, Yinzhang Guo, Shangwang Bai:
Research of Asynchronous Communication Messaging Model Based on Time Decoupling in Distributed Object-Oriented Middleware. 489-493 - Quan Liu, Xinjuan Jin, Yihong Long:
Research on Ontology-based Representation and Retrieval of Components. 494-499 - Hong Ji, Xiaofeng Meng, Bo Zhong, Xiaomei Chen:
Component-based approach to develop integrated diagnostic platform. 500-504 - Youxin Meng, Aiguang Young, Xianwei Wang, Kun Shao:
Domain-Analysis in Software Reuse - Application in Warehouse Management. 505-510 - Pengcheng Zhang, Yu Zhou, Bixin Li:
A service-oriented methodology supporting automatic synthesis and verification of component behavior model. 511-516 - Lizheng Jiang, Xin Meng, Shuqian Liu, H. U. Shengbo Hu:
Research on Mobile IP Routing of Space Network that Based on IP over CCSDS. 517-520 - Haifeng Hu, Zhen Yang:
Mobile-Agent-Based Information-Driven Multiresolution Algorithm for target tracking in Wireless Sensor Networks. 521-525 - Shilun Cheng, Zhen Yang:
Energy-Efficient Power Control Game for Cognitive Radio Systems. 526-530 - Feng Tian, Zhen Yang:
A New Algorithm for Weighted Proportional Fairness Based Spectrum Allocation of Cognitive Radios. 531-536 - Yuqing Zhang, Qun Wang, Jianfeng Zou, Xuezhi Tao, Libin Zhang:
Research on User Applying Mode for Video Conference System. 537-542 - Lei Zhao, Yinqiu Gao:
Voice Conversion Adopting SOLAFS. 543-548 - Ling Zhang, X. Z. Zhang:
An RBF Network Based Beamformer for MIMO Wireless Communication Systems. 549-552 - Xin (Robert) Luo, Lei Guo, Zhen Liu:
Lossless Compression of Hyperspectral Imagery Using Integer Principal Component Transform and 3-D Tarp Coder. 553-558 - Zhenjie Hou, Shuoshi Ma, Xichun Pei, Wei Zhang:
Segmentation and Recognition of Mallow Cells Image Based on Wavelet and Genetic Cluster. 559-563 - Yong Yuan, Yong-quan Liang:
Multi-issue Negotiation Research based on Niched Co-evolutionary Genetic Algorithm. 564-569 - Xiangwei Zheng, Huichuan Duan, Hong Liu:
A Hybrid Multi-objective Evolutionary Algorithm and Its Application in Component-based Product Design. 570-575 - Qiang Liu, Hailin Zhang, Xiaoxian Ma, Qingzhen Zhao:
Genetic algorithm-based study on flow allocation in a multicommodity stochastic-flow network with unreliable nodes. 576-581 - Hong Wang, Peixin Zhao:
A New Hybrid Genetic Algorithm for the Stochastic Loader Problem. 582-586 - Li Li:
A Query Expansion Method Based On Semantic Element. 587-590 - Changhui Yang:
Research on Risk Control Model of Cooperatively Technical Innovation based on Wavelet and Nerve Network. 591-594 - Tao Ding, Hongfei Xiao:
Chaotic Time Series Prediction Based on Radial Basis Function Network. 595-599 - Hongmei Zhu, Yongquan Liang, Wenjuan Lian, Qijia Tian, Yong Zhang:
Study of Ontology-based Semantic Matching of Model Function. 600-604 - Dongyuan Ge, Shousheng Jiang:
Self-Adaptive PD Control of Robot Manipulator. 605-610 - Xiang Yin, Jianguo Jiang, Na Xia:
A Novel Strategy of Coalition Evolvement Based on Interest. 611-615 - Dongyong Yang, Jinyin Chen, Naofumi Matsumoto:
Particle Swarm Optimization with Adaptive Parameters. 616-621 - Xianwen Fang, Zhicai Xu, Zhixiang Yin:
A Study about the Mapping of Process- Processor based on Petri Nets. 622-626 - Jiajing Zhuo, Chen Meng, Minghu Zou:
A Task Scheduling Algorithm of Single Processor Parallel Test System. 627-632 - Xianwu Zeng, Cunchen Gao, Shuping Bao:
Research of multi-factors heuristics tasks scheduling model and its algorithms in grid environment. 633-639 - Wei Luo, Junlin Li, Fumin Yang, Gang Tu, Liping Pang, Lin Shu:
DYFARS: Boosting Reliability in Fault-tolerant Heterogeneous Systems Through Dynamic Scheduling. 640-645 - Yang Lu, Ming Chen:
A Cluster-Based and Routing Balanced P2P Lookup Protocol. 646-651 - Nitin, Vivek Kumar Sehgal, Nakul Sharma, Kunal Krishna, Abhishek Bhatia:
On Path-length and Routing-tag Algorithm for Hybrid Irregular Multi-stage Interconnection Networks. 652-657 - Yuehai Wang, Mengmeng Zhang:
Multiple Moving Prey Pursuit Algorithm Based on the Changeable Alliance. 658-662 - Jinhua Li, Zhenbo Guo, Yun Zhao, Zhenhua Zhang, Ruijuan Pang:
Towards Quantitative Evaluation of UML based Software Architecture. 663-669 - Jinkui Hou, Jiancheng Wan, Shuaiqiang Wang:
Formalization of Architecture-Centric Model Mapping Using Category Theory. 670-675 - Wenying Feng, Peter O'Keefe, Shushuang Man:
Modeling and Practice on Component Based Software Design - a Case Study. 676-681 - Yang Hu, Chen Hang:
A Dynamic Reconfigurable Adaptive Software Architecture for Federate in HLA-based simulation. 682-687 - Zhenyu Qi, Jing Xu:
Automatic Performance Evaluation Of Palm Recognition. 688-693 - Ahmed M. Mostafa, Manal Ahmed Ismail, Hatem El-Bolok, E. M. Saad:
Toward a Formalization of UML2.0 Metamodel using Z Specifications. 694-701 - Xufang Gong, Yanchen Wang, Ying Zhou, Bixin Li:
On Testing Multi-threaded Java Programs. 702-706 - Fusheng Qiu, Wenjian Liu:
Software Program Cohesion Notion Apply to Evaluating Product Process Assignment. 707-712 - Muwei Jian, Junyu Dong, Yang Zhang:
Image Fusion Based on Wavelet Transform. 713-718 - Qiang Zhang, Xiaolin Zhang, Xiaoming Chang:
Research on RAIM Algorithm under the Assumption of Simultaneous Multiple Satellites Failure. 719-724 - Linliang Chen, Yanping Yu, Kuang Wang:
Subframe Interpolation Optimized Coding of LSF Parameters. 725-728 - Yingjie Zhang, Liling Ge:
Region-based Image Fusion Using Energy Estimation. 729-734 - Yingjie Zhang, Liling Ge:
A Hierarchical Segmentation Algorithm Based on Mumford and Shah Model. 735-740 - Weina Lu, Haifang Wang, Qingzhu Wang:
A Synchronous Detection of the Road Boundary and Lane Marking for Intelligent Vehicles. 741-745 - Xiangbin Shi, Fang Liu, Ling Du, Xinghai Zhou, Yuansheng Xing:
An Event Correlation Synchronization Algorithm for MMOG. 746-751 - Yanfeng Wang, Yi Zheng:
One Solution for Accurate Collision Detection in Virtual Assembly Environment. 752-757 - Junyu Dong, Muwei Jian, Dawei Gao, Shengke Wang:
Reducing the Dimensionality of Feature Vectors for Texture Image Retrieval Based on Wavelet Decomposition. 758-763 - Muwei Jian, Junyu Dong, Ruichun Tang:
Combining Color and Texture and Region with Objects of User's Interest for Content-Based Image Retrieval. 764-769 - Lei Xu, Fengming Zhang:
Parallel Particle Swarm Optimization for Attribute Reduction. 770-775 - Baowen Wang, Qingda Zhang, Wenyuan Liu, Yan Shi:
Multidimensional Fuzzy Interpolative Reasoning Method Based on λ-Width Similarity. 776-781 - Lin Zhang:
SOSRA: Sewice-Oriented Semantic Representation Architecture. 782-787 - Yunxiang Liu, Weichang Wu, Jiajun Lin:
Research of Information Fusion Evaluation Methodology Based on Dominance relation. 788-793 - Luo Zhong, Shishi Huang, Peng Liu, Yi Yu:
A Design for an Online RSS Reader Based On AJAX. 794-798 - Wenyuan Liu, Yongan Luo, Yali Si, Baowen Wang, Feng Li:
An Off-Line Divisible E-Cash Scheme Based on Smart Card. 799-804 - Kazuya Odagiri, Rihito Yaegashi, Masaharu Tadauchi, Naohiro Ishii:
Information Usage System by Static Portal Page. 805-811 - Yanguang Shen, Lili Xing, Yiting Peng:
Study and Application of Web-based Data Mining in E-Business. 812-816 - Shanshan Li, Xiangke Liao, Shaoliang Peng, Peidong Zhu, Jie Jiang:
Credit based Fairness Control in Wireless Sensor Network. 817-822 - Qianqian Ren, Jianzhong Li, Jinbao Li:
An Efficient Clustering-Based Method for Data Gathering and Compressing in Sensor Networks. 823-828 - Huafeng Wu, Haiguang Chen, Qiang Zhou, Chuanshan Gao:
Throughput Performance of Marine STDMA Ad-hoc Network. 829-834 - Zongwu Ke, Layuan Li, Qiang Sun, Nianshen Chen:
A QoS Multicast Routing Algorithm for Wireless Mesh Networks. 835-840 - Zhengquan Li, Libing Pan:
Space-Time Codes Based On Bit Interleaved Quasi-Super-Orthogonal Designs. 841-842 - Yiwen Dou, Guobing Ma:
Segmentation of color images using multi-FART network. 843-847 - Sheng Fang, Xujian Li, Liwei Zhang:
A Lloyd-Max-based Non-Uniform Quantization Scheme for Distributed Video Coding. 848-853 - Yingjie Zhang, Liling Ge:
Region-based Image Fusion by Using Region Priorities. 854-859 - Xuefeng Liu, Guangrong Ji, Wencang Zhao, Junna Cheng:
Improved Approach of Seed Point Selection in RPCCL Algorithm for Aerial Remote Sensing Hyper-spectral Data Clustering with Data Dimensionality Reduction. 860-865 - Chengyu Hu, Daxing Li:
A New Type of Proxy Ring Signature Scheme with Revocable Anonymity. 866-868 - Chengyu Hu, Daxing Li:
Ring Blind Signature Scheme. 869-871 - Li Wang, Zhitang Li, Dong Li, Jie Lei:
Attack scenario construction with a new sequential mining technique. 872-877 - Chaokai He:
Design and implementation of a personal firewall Based on NDIS Intermediate Drivers. 878-882 - Yong Li, Huiyan Chen:
Efficient Identity-based Signature Scheme with Partial Message Recovery. 883-888
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.