Conferences in DBLP
Kate Smith-Miles Meta-Learning: From Classification to Forecasting, to Optimization, and Beyond. [Citation Graph (0, 0)][DBLP ] ACIS-ICIS, 2007, pp:2- [Conf ] Tsung-Yu Liu , Tan-Hsu Tan , Yu-Ling Chu 2D Barcode and Augmented Reality Supported English Learning System. [Citation Graph (0, 0)][DBLP ] ACIS-ICIS, 2007, pp:5-10 [Conf ] Abdusalam F. A. Nwesri , Seyed M. M. Tahaghoghi , Falk Scholer Answering English Queries in Automatically Transcribed Arabic Speech. [Citation Graph (0, 0)][DBLP ] ACIS-ICIS, 2007, pp:11-16 [Conf ] Gerhard Visser , David L. Dowe Minimum Message Length Clustering of Spatially-Correlated Data with Varying Inter-Class Penalties. [Citation Graph (0, 0)][DBLP ] ACIS-ICIS, 2007, pp:17-22 [Conf ] Cynthia Y. Lester Growing the Pipeline: Restructuring an Introductory Computer Programming Course. [Citation Graph (0, 0)][DBLP ] ACIS-ICIS, 2007, pp:23-28 [Conf ] Luke Bellamy , Damien Hutchinson , Jason Wells User Perceptions and Acceptance of Benevolent Worms -- A Matter of Fear? [Citation Graph (0, 0)][DBLP ] ACIS-ICIS, 2007, pp:29-36 [Conf ] Chien-Chuan Ko , Bo-Zhi Yang An Integrated Technique for Video Watermarking. [Citation Graph (0, 0)][DBLP ] ACIS-ICIS, 2007, pp:37-42 [Conf ] Gin-Der Wu , Zhen-Wei Zhu Chip Design of LPC-cepstrum for Speech Recognition. [Citation Graph (0, 0)][DBLP ] ACIS-ICIS, 2007, pp:43-47 [Conf ] Cong-Kha Pham CMOS Schmitt Trigger Circuit with Controllable Hysteresis Using Logical Threshold Voltage Control Circuit. [Citation Graph (0, 0)][DBLP ] ACIS-ICIS, 2007, pp:48-53 [Conf ] C. Y. Ho , Anthony Shi-Sheung Fong Combining Local and Global History Hashing in Perceptron Branch Prediction. [Citation Graph (0, 0)][DBLP ] ACIS-ICIS, 2007, pp:54-59 [Conf ] Mafijul Islam On the Limitations of Compilers to Exploit Thread-Level Parallelism in Embedded Applications. [Citation Graph (0, 0)][DBLP ] ACIS-ICIS, 2007, pp:60-66 [Conf ] Indra Seher , Athula Ginige , Seyed A. Shahrestani A Domain Identification Algorithm for Personalised Query Expansion with Contextual Information. [Citation Graph (0, 0)][DBLP ] ACIS-ICIS, 2007, pp:67-72 [Conf ] Robert Mattson , Somnath Ghosh A performance analysis of page and object retrieval using HTTP-MPLEX in symmetric network environments. [Citation Graph (0, 0)][DBLP ] ACIS-ICIS, 2007, pp:73-80 [Conf ] Kenneth Patrick Payne , Joarder Kamruzzman Service Oriented Architecture for Legal Web Portal. [Citation Graph (0, 0)][DBLP ] ACIS-ICIS, 2007, pp:81-86 [Conf ] Zakaria Maamar , Djamal Benslimane , Quan Z. Sheng Towards A Two-Layered Framework for Managing Web Services Interaction. [Citation Graph (0, 0)][DBLP ] ACIS-ICIS, 2007, pp:87-92 [Conf ] Manish Chhabra , Hongen Lu Towards Agent Based Web Service. [Citation Graph (0, 0)][DBLP ] ACIS-ICIS, 2007, pp:93-99 [Conf ] Gita Das , Sid Ray A Comparison of Relevance Feedback Strategies in CBIR. [Citation Graph (0, 0)][DBLP ] ACIS-ICIS, 2007, pp:100-105 [Conf ] Ranadhir Ghosh , Moumita Ghosh , John Yearwood , Subhasis Mukherjee A fully Automated CAD system using Multi-category Feature Selection with Restricted Recombination. [Citation Graph (0, 0)][DBLP ] ACIS-ICIS, 2007, pp:106-111 [Conf ] Andrew Skabar , Narendra Juneja A Kernel-Based Method for Semi-Supervised Learning. [Citation Graph (0, 0)][DBLP ] ACIS-ICIS, 2007, pp:112-117 [Conf ] Jan Carlo Barca , Grace W. Rumantir A Modified K-means Algorithm for Noise Reduction in Optical Motion Capture Data. [Citation Graph (0, 0)][DBLP ] ACIS-ICIS, 2007, pp:118-122 [Conf ] Yao-Hong Tsai A New Approach for Image Thresholding under Uneven Lighting Conditions. [Citation Graph (0, 0)][DBLP ] ACIS-ICIS, 2007, pp:123-127 [Conf ] Abbas Golestani , Kushan Ahmadian , Ali Amiri , Mohammad-Reza Jahedmotlagh A Novel Adaptive-Boost-Based Strategy for Combining Classifiers Using Diversity Concept. [Citation Graph (0, 0)][DBLP ] ACIS-ICIS, 2007, pp:128-134 [Conf ] Yong Qi , Min Xi , Saiyu Qi , Jizhong Zhao A Conflict Resolution Method in Context-Aware Computing. [Citation Graph (0, 0)][DBLP ] ACIS-ICIS, 2007, pp:135-140 [Conf ] Babak Pazand , Chris McDonald A Critique of Mobility Models for Wireless Network Simulation. [Citation Graph (0, 0)][DBLP ] ACIS-ICIS, 2007, pp:141-146 [Conf ] Kemeng Yang , Iqbal Gondal , Bin Qiu , Laurence S. Dooley A Fuzzy Adaptive Soft Handover Scheme Supporting Four Active Sets. [Citation Graph (0, 0)][DBLP ] ACIS-ICIS, 2007, pp:147-152 [Conf ] Zhitang Li , Shudong Shi A Secure Routing Protocol for Mobile Ad hoc Networks. [Citation Graph (0, 0)][DBLP ] ACIS-ICIS, 2007, pp:153-157 [Conf ] Henry Larkin Applying Concurrent Versioning to Serverless Mobile Device Synchronisation. [Citation Graph (0, 0)][DBLP ] ACIS-ICIS, 2007, pp:157-162 [Conf ] Guo Fang Mao , Alex Talevski , Elizabeth Chang Voice over Internet Protocol on Mobile Devices. [Citation Graph (0, 0)][DBLP ] ACIS-ICIS, 2007, pp:163-169 [Conf ] Dussadee Praserttitipong , Peraphon Sophatsathit A Framework for Deterministic Intention Specifications of an Agent toward an Incomplete Declared Intention. [Citation Graph (0, 0)][DBLP ] ACIS-ICIS, 2007, pp:170-175 [Conf ] Shaochun Xu , Zendi Cui , Yufeng Gui Cognitive Process during Incremental Software Development. [Citation Graph (0, 0)][DBLP ] ACIS-ICIS, 2007, pp:176-181 [Conf ] Phamorn Vantakavikran , Nakornthip Prompoon Constructing a Process Model for Decision Analysis and Resolution on COTS Selection Issue of Capability Maturity Model Integration. [Citation Graph (0, 0)][DBLP ] ACIS-ICIS, 2007, pp:182-187 [Conf ] Tien N. Nguyen Integration of Configuration Management and Hypermedia for Managing Changes in Database Applications. [Citation Graph (0, 0)][DBLP ] ACIS-ICIS, 2007, pp:188-193 [Conf ] Jinalben Patel , Roger Y. Lee , Haeng-Kon Kim Architectural View in Software Development Life-Cycle Practices. [Citation Graph (0, 0)][DBLP ] ACIS-ICIS, 2007, pp:194-199 [Conf ] Eun-Ju Park , Haeng-Kon Kim , Roger Y. Lee Frameworks of Integration Repository for Software Process Improvement using SOA. [Citation Graph (0, 0)][DBLP ] ACIS-ICIS, 2007, pp:200-206 [Conf ] Jun Li , Hong Peng , Zheng Pei Adaptive Watermarking Algorithm Using SVR in Wavelet Domain. [Citation Graph (0, 0)][DBLP ] ACIS-ICIS, 2007, pp:207-211 [Conf ] Ferdous Ahmed Sohel , Gour C. Karmakar , Laurence S. Dooley Bezier Curve-Based Character Descriptor Considering Shape Information. [Citation Graph (0, 0)][DBLP ] ACIS-ICIS, 2007, pp:212-216 [Conf ] Kushan Ahmadian , Abbas Golestani , Morteza Analoui , Mohammad R. Jahed Evolving Ensemble of Classifiers In Low-Dimensional Spaces Using Multi-Objective Evolutionary Approach. [Citation Graph (0, 0)][DBLP ] ACIS-ICIS, 2007, pp:217-222 [Conf ] Chensheng Sun , Kin-Man Lam The GVF Snake with a Minimal Path Approach. [Citation Graph (0, 0)][DBLP ] ACIS-ICIS, 2007, pp:223-228 [Conf ] Morshed U. Chowdhury , Rezwanur Rahman , Joydip Saha , S. M. Raiyan Kabir Fast Scene Change Detection Based Histogram. [Citation Graph (0, 0)][DBLP ] ACIS-ICIS, 2007, pp:229-233 [Conf ] Aliaa A. A. Youssif , Morshed U. Chowdhury , Sid Ray , Howida Youssry Nafaa Fingerprint Recognition System Using Hybrid Matching Techniques. [Citation Graph (0, 0)][DBLP ] ACIS-ICIS, 2007, pp:234-240 [Conf ] Mike Tyson , Carlo Kopp Defining Functional Requirements for a Lightweight GNSS Support Protocol (LGSP). [Citation Graph (0, 0)][DBLP ] ACIS-ICIS, 2007, pp:241-246 [Conf ] Ping Han , Yanqin Zhu , Yuemei Hu Design of Multi-signature Scheme in Wireless Networks. [Citation Graph (0, 0)][DBLP ] ACIS-ICIS, 2007, pp:247-251 [Conf ] David Kang , Wei Dai Development of Multimodal Ubiquitous System: A pilot study. [Citation Graph (0, 0)][DBLP ] ACIS-ICIS, 2007, pp:252-256 [Conf ] Suhaimi Bin Abd Latif , M. A. Rashid , F. Alam Effects of Varying Superframe Duration on Jitter in Interactive Multimedia Traffic Transmission over WLANs. [Citation Graph (0, 0)][DBLP ] ACIS-ICIS, 2007, pp:257-260 [Conf ] Anies Hannawati Purnamadjaja , Johan Iskandar , R. Andrew Russell Pheromone Communication Simulation for Mobile Robots Using Java 3D. [Citation Graph (0, 0)][DBLP ] ACIS-ICIS, 2007, pp:261-266 [Conf ] Nariaki Kato , Naohiro Ishii Cell Phone System for Tour & Information Guide. [Citation Graph (0, 0)][DBLP ] ACIS-ICIS, 2007, pp:267-273 [Conf ] Shirantha Wijesekera , Sajal Palit , Bala Balachandran Software Development for B92 Quantum Key Distribution Communication Protocol. [Citation Graph (0, 0)][DBLP ] ACIS-ICIS, 2007, pp:274-278 [Conf ] Yang Xu , Shengqun Tang , Youwei Xu , Zukai Tang Towards Aspect Oriented Web Service Composition with UML. [Citation Graph (0, 0)][DBLP ] ACIS-ICIS, 2007, pp:279-284 [Conf ] Giuseppe Vella , Nunzio Ingraffia , Marilia Liotta , Antonella Santangelo , Antonio Gentile XPL, a Presentation Language based on User Interface Design Pattern. [Citation Graph (0, 0)][DBLP ] ACIS-ICIS, 2007, pp:285-290 [Conf ] Alauddin Ahmed , Atiqur Rahman , Mohammed Anwer , Nazmul Haque , Morshed U. Chowdhury A Comparison of Bipartite N-Qubit States to Classify Entangled States under Symmetric Consideration. [Citation Graph (0, 0)][DBLP ] ACIS-ICIS, 2007, pp:291-295 [Conf ] Lianzhang Zhu , Yanchen Li Reliability Analysis of Component Software Based on Stochastic Petri Nets. [Citation Graph (0, 0)][DBLP ] ACIS-ICIS, 2007, pp:296-301 [Conf ] Theodore Van Toll III , Roger Lee , Tom Ahlswede Evaluating the Usefulness of Pair Programming in a Classroom Setting. [Citation Graph (0, 0)][DBLP ] ACIS-ICIS, 2007, pp:302-308 [Conf ] Madasu Hanmandlu , A. V. Nath , A. C. Mishra , Vamsi Krishna Madasu Fuzzy Model Based Recognition of Handwritten Hindi Numerals using Bacterial Foraging. [Citation Graph (0, 0)][DBLP ] ACIS-ICIS, 2007, pp:309-314 [Conf ] Gin-Der Wu , Pang-Hsuan Huang Image Watermarking Using Structure Based Wavelet Tree Quantization. [Citation Graph (0, 0)][DBLP ] ACIS-ICIS, 2007, pp:315-319 [Conf ] Manoranjan Paul , M. Manzur Murshed Impact of Clustering Techniques on Content-Based Pattern Generation Algorithm for Low Bit Rate Video Coding. [Citation Graph (0, 0)][DBLP ] ACIS-ICIS, 2007, pp:320-325 [Conf ] Ross Eldridge , Heiko Rudolph , Jonathan Duckworth , Peter H. Wilson Improved Background Removal through Polarisation in Vision-Based Tabletop Interface. [Citation Graph (0, 0)][DBLP ] ACIS-ICIS, 2007, pp:326-331 [Conf ] Tam P. Cao , Darrell M. Elton , John Devlin Real-time Linear Projection Speed Sign Detection System in Low Light Conditions. [Citation Graph (0, 0)][DBLP ] ACIS-ICIS, 2007, pp:332-338 [Conf ] Luke Domanski Slice and Blockwise Well-Composed Sets. [Citation Graph (0, 0)][DBLP ] ACIS-ICIS, 2007, pp:339-345 [Conf ] Yiling Wang , Phu Dung Le , Balasubramaniam Srinivasan Hybrid Group Key Management Scheme for Secure Wireless Multicast. [Citation Graph (0, 0)][DBLP ] ACIS-ICIS, 2007, pp:346-351 [Conf ] Jing He , Yanchun Zhang , Guangyan Huang , Yong Shi Network Lifetime of Application-Specific Randomly Deployed Wireless Sensor Networks in Arbitrary Sensor Density. [Citation Graph (0, 0)][DBLP ] ACIS-ICIS, 2007, pp:352-357 [Conf ] M. Mahbubur Rahman , M. Delowar Hossain , A. B. M. Shawkat Ali Performance Analysis of OFDM Systems with Phase Noise. [Citation Graph (0, 0)][DBLP ] ACIS-ICIS, 2007, pp:358-362 [Conf ] Belal Chowdhury , Rajiv Khosla RFID-based Hospital Real-time Patient Management System. [Citation Graph (0, 0)][DBLP ] ACIS-ICIS, 2007, pp:363-368 [Conf ] Ahadur Rahaman , Jemal H. Abawajy , Michael Hobbs Taxonomy and Survey of Location Management Systems. [Citation Graph (0, 0)][DBLP ] ACIS-ICIS, 2007, pp:369-374 [Conf ] Shawn Haggett , Greg Knowles , Graham Bignell Tokenisation of Class Files for an Embedded Java Processor. [Citation Graph (0, 0)][DBLP ] ACIS-ICIS, 2007, pp:375-381 [Conf ] Abu Saleh Shah Muhammad Barkat Ullah , Ruhul A. Sarker , David Cornforth A Combined MA-GA Approach for Solving Constrained Optimization Problems. [Citation Graph (0, 0)][DBLP ] ACIS-ICIS, 2007, pp:382-387 [Conf ] Mahmoud Tarokh A Genetic Robot Path Planner with Fuzzy Logic Adaptation. [Citation Graph (0, 0)][DBLP ] ACIS-ICIS, 2007, pp:388-393 [Conf ] Bager Zarei , M. R. Meybodi , Mortaza Abbaszadeh Meinagh A Hybrid Method for Solving Traveling Salesman Problem. [Citation Graph (0, 0)][DBLP ] ACIS-ICIS, 2007, pp:394-399 [Conf ] Mauritsius Tuga , Regina Berretta , Alexandre Mendes A Hybrid Simulated Annealing with Kempe Chain Neighborhood for the University Timetabling Problem. [Citation Graph (0, 0)][DBLP ] ACIS-ICIS, 2007, pp:400-405 [Conf ] Mohamed Shaarawy , Mohamed Belal , Ehab ElGindy A Neuro-Fuzzy Model for Motion Cognition. [Citation Graph (0, 0)][DBLP ] ACIS-ICIS, 2007, pp:406-411 [Conf ] Megan Woods , Iqbal Gondal A Procedural Approach to Forecasting Nocturnal Air Temperature for Frost Prediction. [Citation Graph (0, 0)][DBLP ] ACIS-ICIS, 2007, pp:412-418 [Conf ] Jia Rong , Yi-Ping Phoebe Chen , Morshed Chowdhury , Gang Li Acoustic Features Extraction for Emotion Recognition. [Citation Graph (0, 0)][DBLP ] ACIS-ICIS, 2007, pp:419-424 [Conf ] Mieng Quoc Phu , Peter E. Tischer , Hon Ren Wu Statistical Analysis of Impulse Noise Model for Color Image Restoration. [Citation Graph (0, 0)][DBLP ] ACIS-ICIS, 2007, pp:425-431 [Conf ] Prashan Premaratne , Farzad Safaei 2D Barcodes as Watermarks in Image Authentication. [Citation Graph (0, 0)][DBLP ] ACIS-ICIS, 2007, pp:432-437 [Conf ] Md. Shamsul Huda , John Yearwood , Ranadhir Ghosh A Hybrid Algorithm for Estimation of the Parameters of Hidden Markov Model based Acoustic Modeling of Speech Signals using Constraint-Based Genetic Algorithm and Expectation Maximization. [Citation Graph (0, 0)][DBLP ] ACIS-ICIS, 2007, pp:438-443 [Conf ] Carol Pedersen , Joachim Diederich Accent Classification Using Support Vector Machines. [Citation Graph (0, 0)][DBLP ] ACIS-ICIS, 2007, pp:444-449 [Conf ] Cheng-Hsiung Hsieh , Ren-Hsien Huang , Ting-Yu Feng One-Dimensional Grey Polynomial Interpolators for Image Enlargement. [Citation Graph (0, 0)][DBLP ] ACIS-ICIS, 2007, pp:450-456 [Conf ] Fenghui Ren , Minjie Zhang , Quan Bai A Fuzzy-Based Approach for Partner Selection in Multi-Agent Systems. [Citation Graph (0, 0)][DBLP ] ACIS-ICIS, 2007, pp:457-462 [Conf ] Ickjai Lee , Bayani Portier An Empirical Study of Knowledge Representation and Learning within Conceptual Spaces for Intelligent Agents. [Citation Graph (0, 0)][DBLP ] ACIS-ICIS, 2007, pp:463-468 [Conf ] Paola Flocchini , Amiya Nayak , Arno Schulz Decontamination of Arbitrary Networks using a Team of Mobile Agents with Limited Visibility. [Citation Graph (0, 0)][DBLP ] ACIS-ICIS, 2007, pp:469-474 [Conf ] Eduardo Rodrigues Gomes , Ryszard Kowalczyk Learning in Market-based Resource Allocation. [Citation Graph (0, 0)][DBLP ] ACIS-ICIS, 2007, pp:475-482 [Conf ] Sarmad Sadik , Arshad Ali , Hafiz Farooq Ahmad , Hiroki Suguri Policy based Ontology Framework for Mobile Agents. [Citation Graph (0, 0)][DBLP ] ACIS-ICIS, 2007, pp:483-488 [Conf ] Neeraj Nehra , R. B. Patel , V. K. Bhat Routing with Load Balancing in Ad Hoc Network: A Mobile Agent Approach. [Citation Graph (0, 0)][DBLP ] ACIS-ICIS, 2007, pp:489-495 [Conf ] Iqbal Gondal , Muhammad Shoaib B. Sehgal , Mudassar Iqbal , Joarder Kamruzzaman Ambient Cardiac Expert: A Cardiac Patient Monitoring System using Genetic and Clinical Knowledge Fusion. [Citation Graph (0, 0)][DBLP ] ACIS-ICIS, 2007, pp:496-501 [Conf ] Ru Nie , Jianhua Yue An Attribute Reduction Method Based on Rough Set and SVM and with Application in Oil-Gas Prediction. [Citation Graph (0, 0)][DBLP ] ACIS-ICIS, 2007, pp:502-506 [Conf ] Chinnu Subramaniam , Jiyuan An , Jayavardhana Gubbi , Yi-Ping Phoebe Chen Finding Motifs in miRNA Sequences. [Citation Graph (0, 0)][DBLP ] ACIS-ICIS, 2007, pp:507-512 [Conf ] Ickjai Lee , Kyungmi Lee Higher Order Voronoi Diagrams for Concept Boundaries and Tessellations. [Citation Graph (0, 0)][DBLP ] ACIS-ICIS, 2007, pp:513-518 [Conf ] S. M. Kamrul Hasan , Ruhul A. Sarker , David Cornforth Hybrid Genetic Algorithm for Solving Job-Shop Scheduling Problem. [Citation Graph (0, 0)][DBLP ] ACIS-ICIS, 2007, pp:519-524 [Conf ] Ramesh Ram , Madhu Chetty Learning Structure of a Gene Regulatory Network. [Citation Graph (0, 0)][DBLP ] ACIS-ICIS, 2007, pp:525-531 [Conf ] A. B. M. Shawkat Ali , Tony Dobele A Novel Classifier Selection Approach for Adaptive Boosting Algorithms. [Citation Graph (0, 0)][DBLP ] ACIS-ICIS, 2007, pp:532-536 [Conf ] Helyane Bronoski Borges , Júlio C. Nievola Gene-finding as an Attribute Selection Task. [Citation Graph (0, 0)][DBLP ] ACIS-ICIS, 2007, pp:537-542 [Conf ] Yu-lung Lo , Chun-Hsiung Wang Hybrid Multi-Feature Indexing for Music Data Retrieval. [Citation Graph (0, 0)][DBLP ] ACIS-ICIS, 2007, pp:543-548 [Conf ] M. H. Peyravi , P. Khosraviyan Dehkordi , Z. Davari Nejad Obtain Weather Data with Data Warehousing. [Citation Graph (0, 0)][DBLP ] ACIS-ICIS, 2007, pp:549-554 [Conf ] Bryon K. Ehlmann ORN Additive: Shrinking the Gap between Database Modeling and Implementation. [Citation Graph (0, 0)][DBLP ] ACIS-ICIS, 2007, pp:555-560 [Conf ] Hu Wang , Chunqiang Gong , Yan Li Service-mining Based on the Knowledge and Customer Databases. [Citation Graph (0, 0)][DBLP ] ACIS-ICIS, 2007, pp:561-568 [Conf ] Li Yi , Ji Hong A New Cooperative Communication MAC Strategy for Wireless Ad Hoc Networks. [Citation Graph (0, 0)][DBLP ] ACIS-ICIS, 2007, pp:569-574 [Conf ] Jun Han , Zhaohao Sun , Jinpeng Huai , Xian Li An Efficient Node Partitioning Algorithm for the Capacitated Minimum Spanning Tree Problem. [Citation Graph (0, 0)][DBLP ] ACIS-ICIS, 2007, pp:575-580 [Conf ] Iqbal Gondal , Mudassar Iqbal , Megan Woods , Muhammad Shoaib B. Sehgal Integrated Sensing and Diagnosis -- The next step in Real Time Patient Health Care. [Citation Graph (0, 0)][DBLP ] ACIS-ICIS, 2007, pp:581-586 [Conf ] Abolfazl Toroghi Haghighat , M. Esmaeili , A. Saremi , V. R. Mousavi Intrusion Detection via Fuzzy-Genetic Algorithm Combination with Evolutionary Algorithms. [Citation Graph (0, 0)][DBLP ] ACIS-ICIS, 2007, pp:587-591 [Conf ] Shui Yu , Zhongwen Li Massive Data Delivery in Unstructured Peer-to-Peer Networks with Network Coding. [Citation Graph (0, 0)][DBLP ] ACIS-ICIS, 2007, pp:592-597 [Conf ] Himanshu Agrawal , Melanie Grah , Mark Gregory Optimization of QoS Routing. [Citation Graph (0, 0)][DBLP ] ACIS-ICIS, 2007, pp:598-603 [Conf ] Fadi N. Sibai 3D Graphics Performance Scaling and Workload Decomposition and Analysis. [Citation Graph (0, 0)][DBLP ] ACIS-ICIS, 2007, pp:604-609 [Conf ] Hu Zhang , Weiguo Wu , Xiaoshe Dong , Depei Qian , Luogeng Dai A Study on Data Placement of Extensible Parallel Storage System. [Citation Graph (0, 0)][DBLP ] ACIS-ICIS, 2007, pp:610-615 [Conf ] John Casey , Ashley Chonka , Wanlei Zhou Adjacency Cache: Fast Web Cache Indexing and Lookup. [Citation Graph (0, 0)][DBLP ] ACIS-ICIS, 2007, pp:616-621 [Conf ] M. Amiripour , H. Abachi Average Routing Distance Analysis and Comparison of Master-Slave Super-Super-Hypercube 4-Cube Topology with different Message Passing Architectures. [Citation Graph (0, 0)][DBLP ] ACIS-ICIS, 2007, pp:622-626 [Conf ] Sun Yang , Tay Teng Tiow Improving Interactive Experience of Thin Client Computing by Reducing Data Spikes. [Citation Graph (0, 0)][DBLP ] ACIS-ICIS, 2007, pp:627-632 [Conf ] Thuy T. Le Approximate Element Computational Time for Domain Decomposition in Parallel Finite Element Code. [Citation Graph (0, 0)][DBLP ] ACIS-ICIS, 2007, pp:633-639 [Conf ] Yantao Guo , Aijun Wen , Zengji Liu , Zhiqing Zhang A Novel Differentiated Service Hybrid Signaling Protocol for Optical Burst Switching Networks. [Citation Graph (0, 0)][DBLP ] ACIS-ICIS, 2007, pp:640-645 [Conf ] Sunam Pradhan , Arkady B. Zaslavsky A Smart Proxy for a Next Generation Web Services Transaction. [Citation Graph (0, 0)][DBLP ] ACIS-ICIS, 2007, pp:646-651 [Conf ] Lau Cheuk Lung , Joni da Silva Fraga Adapting the FT-CORBA Replication Management Service for Large-scale Distributed Systems. [Citation Graph (0, 0)][DBLP ] ACIS-ICIS, 2007, pp:652-657 [Conf ] Cong-Kha Pham , Koutaro Yamano An Edge Extraction Method for Color Image Using Multiple-Valued LoG Filter and Color Space. [Citation Graph (0, 0)][DBLP ] ACIS-ICIS, 2007, pp:658-662 [Conf ] Leila Ismail Evaluation of Authentication Mechanisms for Mobile Agents on top of Java. [Citation Graph (0, 0)][DBLP ] ACIS-ICIS, 2007, pp:663-668 [Conf ] Wei Dai , Jonathan Liu Intelligent Adaptive Services for On-demand Systems Integration. [Citation Graph (0, 0)][DBLP ] ACIS-ICIS, 2007, pp:669-675 [Conf ] Iftekhar Ahmad , Joarder Kamruzzaman , Daryoush Habibi Rerouting Technique for Faster Restoration of Preempted Calls. [Citation Graph (0, 0)][DBLP ] ACIS-ICIS, 2007, pp:676-681 [Conf ] Atef Z. Ghalwash , Aliaa A. A. Youssif , Sherif M. Hashad , Robin Doss Self Adjusted Security Architecture for Mobile Ad Hoc Networks (MANETs). [Citation Graph (0, 0)][DBLP ] ACIS-ICIS, 2007, pp:682-687 [Conf ] Seungyeon You , Sungchun Kim The Virtual Topology Reconfiguration Controller for WDM Networks. [Citation Graph (0, 0)][DBLP ] ACIS-ICIS, 2007, pp:688-693 [Conf ] K. Sithitavorn , C. Wilson , B. Qiu Towards Multicast Delay Analysis for Ad hoc Wireless Networks. [Citation Graph (0, 0)][DBLP ] ACIS-ICIS, 2007, pp:694-699 [Conf ] Lin Zou , Zhongwei Zhang A Comparative Study on the Performance of Wireless Sensor Networks. [Citation Graph (0, 0)][DBLP ] ACIS-ICIS, 2007, pp:700-705 [Conf ] Ming Li Cross-layer Resource Control to Improve TCP Performance over Wireless Network. [Citation Graph (0, 0)][DBLP ] ACIS-ICIS, 2007, pp:706-711 [Conf ] Ashley M. Aitken Managing Unstructured and Semi-Structured Information in Organisations. [Citation Graph (0, 0)][DBLP ] ACIS-ICIS, 2007, pp:712-717 [Conf ] Chen-Yang Cheng , Vittal Prabhu Performance Modeling of Business Processes Enabled by RFID and Web Services. [Citation Graph (0, 0)][DBLP ] ACIS-ICIS, 2007, pp:718-723 [Conf ] L. R. Foulds , Mohammed Quaddus , M. West Structural Equation Modelling of Large-scale Information System Application Development Productivity: the Hong Kong Experience. [Citation Graph (0, 0)][DBLP ] ACIS-ICIS, 2007, pp:724-731 [Conf ] Jirawute Choungsirakulwit , Daricha Sutivong Portfolio Management of Option-Based Investment in Technology Research and Development. [Citation Graph (0, 0)][DBLP ] ACIS-ICIS, 2007, pp:732-737 [Conf ] Adriano Cavalcanti , Bijan Shirinzadeh , Declan Murphy , Julian Smith Nanorobots for Laparoscopic Cancer Surgery. [Citation Graph (0, 0)][DBLP ] ACIS-ICIS, 2007, pp:738-743 [Conf ] Gwo-Ruey Yu Robust-Optimal Control of a Nonlinear Two Degree-of-Freedom Helicopter. [Citation Graph (0, 0)][DBLP ] ACIS-ICIS, 2007, pp:744-749 [Conf ] Manoranjan Paul , Golam Sorwar Encoding and Decoding Techniques for Medical Video Signal Transmission and Viewing. [Citation Graph (0, 0)][DBLP ] ACIS-ICIS, 2007, pp:750-756 [Conf ] Md. Rafiqul Islam , Wanlei Zhou , Morshed U. Chowdhury Dynamic Feature Selection for Spam Filtering Using Support Vector Machine. [Citation Graph (0, 0)][DBLP ] ACIS-ICIS, 2007, pp:757-762 [Conf ] Daewook Lee , Joonho Kwon , SeungHoon Yang , Sukho Lee Improvement of the Recall and the Precision for Semantic Web Services Search. [Citation Graph (0, 0)][DBLP ] ACIS-ICIS, 2007, pp:763-768 [Conf ] Roula Michaelides , Dennis F. Kehoe Internet Communities and Open innovation: an Information System Design Methodology. [Citation Graph (0, 0)][DBLP ] ACIS-ICIS, 2007, pp:769-775 [Conf ] Soon-Keow Chong , Jemal H. Abawajy , Robert A. Dew A Multilevel Trust Management Framework. [Citation Graph (0, 0)][DBLP ] ACIS-ICIS, 2007, pp:776-781 [Conf ] Qiong Ren , Yi Mu , Willy Susilo SEFAP: An Email System for Anti-Phishing. [Citation Graph (0, 0)][DBLP ] ACIS-ICIS, 2007, pp:782-787 [Conf ] Wenying Feng , Hua Chen A Matrix Algorithm forWeb Cache Pre-fetching. [Citation Graph (0, 0)][DBLP ] ACIS-ICIS, 2007, pp:788-794 [Conf ] Atul Sajjanhar , Guojun Lu , Dengsheng Zhang , Wanlei Zhou A Composite Descriptor for Shape Retrieval. [Citation Graph (0, 0)][DBLP ] ACIS-ICIS, 2007, pp:795-800 [Conf ] Dengsheng Zhang , Melissa Chen Yi Lim An Efficient and Robust Technique for Region Based Shape Representation and Retrieval. [Citation Graph (0, 0)][DBLP ] ACIS-ICIS, 2007, pp:801-806 [Conf ] Rakib Ahmed , Gour C. Karmakar , Laurence S. Dooley Efficient Probabilistic Spatio-Temporal Video Object Segmentation. [Citation Graph (0, 0)][DBLP ] ACIS-ICIS, 2007, pp:807-811 [Conf ] Siddhivinayak Kulkarni Image Retrieval Based on Fuzzy Mapping of Image Database and Fuzzy Similarity Distance. [Citation Graph (0, 0)][DBLP ] ACIS-ICIS, 2007, pp:812-817 [Conf ] Mohan Ponnada , Nalin Sharda Model of a Semantic Web Search Engine for Multimedia Content Retrieval. [Citation Graph (0, 0)][DBLP ] ACIS-ICIS, 2007, pp:818-823 [Conf ] Wenxiong Kang , Feiqi Deng Research on Intelligent Visual Surveillance for Public Security. [Citation Graph (0, 0)][DBLP ] ACIS-ICIS, 2007, pp:824-829 [Conf ] Eun Seok Jeong , Chul Sur , Kyung Hyune Rhee A New DRM System Based on Graded Contents Sharing and Time-Block Distribution for Home Networks. [Citation Graph (0, 0)][DBLP ] ACIS-ICIS, 2007, pp:830-833 [Conf ] Yonghee You , Mee Young Sung , Kyungkoo Jun An Integrated Haptic Data Transmission in Haptic Collaborative Virtual Environments. [Citation Graph (0, 0)][DBLP ] ACIS-ICIS, 2007, pp:834-839 [Conf ] Tomoya Kobayashi , Kazushi Nishimoto Analysis of relations between spoken utterances and text messages in chat-augmented meetings. [Citation Graph (0, 0)][DBLP ] ACIS-ICIS, 2007, pp:840-843 [Conf ] Jizhong Zhao , Min Xi , Yong Qi Cache Predicting Algorithm Based on Context-Aware in Pervasive Computing. [Citation Graph (0, 0)][DBLP ] ACIS-ICIS, 2007, pp:844-849 [Conf ] Takayuki Fujimoto , Tokuro Matsuo A Campus Information Processing based on Educational Resources Reuse and Integration. [Citation Graph (0, 0)][DBLP ] ACIS-ICIS, 2007, pp:850-855 [Conf ] Gang Chen , Ruimin Shen , Jiajun Wang , Zeyu Chen Collaborative Education Model and Its Application in E-learning. [Citation Graph (0, 0)][DBLP ] ACIS-ICIS, 2007, pp:856-860 [Conf ] Jayamsakthi Shanmugam , M. Ponnavaikko A solution to block Cross Site Scripting Vulnerabilities based on Service Oriented Architecture. [Citation Graph (0, 0)][DBLP ] ACIS-ICIS, 2007, pp:861-866 [Conf ] Zhikun Zhao , Wei Li Dynamic Reconfiguration Planning with Influence Control. [Citation Graph (0, 0)][DBLP ] ACIS-ICIS, 2007, pp:867-872 [Conf ] Raymond Wu Validation process and component analysis in semantic mediation. [Citation Graph (0, 0)][DBLP ] ACIS-ICIS, 2007, pp:873-878 [Conf ] Gongzhu Hu , Ivan Milenkovic Collaborative File Editor Using Repository in a Box. [Citation Graph (0, 0)][DBLP ] ACIS-ICIS, 2007, pp:879-884 [Conf ] Dae Wan Cho , Hyeon Soo Kim , Seunguk Oh A new approach to detecting memory access errors in C programs. [Citation Graph (0, 0)][DBLP ] ACIS-ICIS, 2007, pp:885-890 [Conf ] Weiqun Zheng , Gary A. Bundell Model-Based Software Component Testing: A UML-Based Approach. [Citation Graph (0, 0)][DBLP ] ACIS-ICIS, 2007, pp:891-899 [Conf ] Xuemei Zhao , Karl Sammut , Fangpo He , Shaowen Qin Split Private and Shared L2 Cache Architecture for Snooping-based CMP. [Citation Graph (0, 0)][DBLP ] ACIS-ICIS, 2007, pp:900-905 [Conf ] Oluwafemi Ajayi , Richard O. Sinnott , Anthony Stell Trust Realisation in Multi-domain Collaborative Environments. [Citation Graph (0, 0)][DBLP ] ACIS-ICIS, 2007, pp:906-911 [Conf ] Dawei Jia , Kathy Blashki , Penelope Goward , Jim Eales Investigating the Shared Visual Context in Distributed Collaborative Work. [Citation Graph (0, 0)][DBLP ] ACIS-ICIS, 2007, pp:912-917 [Conf ] Samar Zutshi , Campbell Wilson , Bala Srinivasan Reduct-Based Result Set Fusion for Relevance Feedback in CBIR. [Citation Graph (0, 0)][DBLP ] ACIS-ICIS, 2007, pp:918-923 [Conf ] Zhou Wei , Wang Zengfu Speech Animation Based on Chinese Mandarin Triphone Model. [Citation Graph (0, 0)][DBLP ] ACIS-ICIS, 2007, pp:924-929 [Conf ] Gunwoo Kim , Yan Wang , Hyewon Seo Motion Control of a Dancing Character with Music. [Citation Graph (0, 0)][DBLP ] ACIS-ICIS, 2007, pp:930-936 [Conf ] Hyunja Lee , Junho Shim Conceptual Modeling of Product Information in e-Commerce. [Citation Graph (0, 0)][DBLP ] ACIS-ICIS, 2007, pp:937-942 [Conf ] Tokuro Matsuo , Takayuki Fujimoto A New Cooperative Communication System in Distance Education. [Citation Graph (0, 0)][DBLP ] ACIS-ICIS, 2007, pp:943-948 [Conf ] Jun Han , Xudong Liu , Jinpeng Huai , XueLian Lin , Xiaoxuan Ma , Xian Li InfoXP: An E-government Information eXchange Platform Based on Overlay Network. [Citation Graph (0, 0)][DBLP ] ACIS-ICIS, 2007, pp:949-954 [Conf ] Tae-Hum Lim , Sang-Uk Shin Intelligent Access Control Mechanism for Ubiquitous Applications. [Citation Graph (0, 0)][DBLP ] ACIS-ICIS, 2007, pp:955-960 [Conf ] Sun Yang , Tay Teng Tiow Long Distance Redundancy Reduction in Thin Client Computing. [Citation Graph (0, 0)][DBLP ] ACIS-ICIS, 2007, pp:961-966 [Conf ] Sajad Shirali-Shahreza , Mohammad Shirali-Shahreza , Ali Movaghar Restricted Access to Exam Grades on the Web by HIP. [Citation Graph (0, 0)][DBLP ] ACIS-ICIS, 2007, pp:967-971 [Conf ] A. B. M. Shawkat Ali , Yang Xiang Spam Classification Using Adaptive Boosting Algorithm. [Citation Graph (0, 0)][DBLP ] ACIS-ICIS, 2007, pp:972-976 [Conf ] Shangping Dai , Li Gao , Qiang Zhu , Changwu Zhu A Novel Genetic Algorithm Based on Image Databases for Mining Association Rules. [Citation Graph (0, 0)][DBLP ] ACIS-ICIS, 2007, pp:977-980 [Conf ] Wei Xie , Musa A. Mammadov , John Yearwood Using Links to Aid Web Classification. [Citation Graph (0, 0)][DBLP ] ACIS-ICIS, 2007, pp:981-986 [Conf ] Sol Hart , John Yearwood , Adil M. Bagirov Visual Tools for Analysing Evolution, Emergence, and Error in Data Streams. [Citation Graph (0, 0)][DBLP ] ACIS-ICIS, 2007, pp:987-992 [Conf ] Suriya Kaewarsa , Kitti Attakitmongcol , Thanatchai Kulworawanichpong Recognition of Power Quality Events by Using Multiwavelet-Based Neural Network. [Citation Graph (0, 0)][DBLP ] ACIS-ICIS, 2007, pp:993-998 [Conf ] Nazar M. Zaki , Safaai Deris , Saleh Alwahaishi SubSS: A Protein-Protein Interaction Detection Tool. [Citation Graph (0, 0)][DBLP ] ACIS-ICIS, 2007, pp:999-1004 [Conf ] ChunZhi Xie , Liangzhong Yi , Yajun Du , Zheng Pei The Research of Social Navigation based on Fuzzy Concept Lattice. [Citation Graph (0, 0)][DBLP ] ACIS-ICIS, 2007, pp:1005-1011 [Conf ] Kostadin Kratchanov , Tzanko Golemanov , Emilia Golemanova Control Network Programming. [Citation Graph (0, 0)][DBLP ] ACIS-ICIS, 2007, pp:1012-1018 [Conf ] Stephen Drape , Anirban Majumdar , Clark D. Thomborson Slicing Aided Design of Obfuscating Transforms. [Citation Graph (0, 0)][DBLP ] ACIS-ICIS, 2007, pp:1019-1024 [Conf ] Faisal Sana , Shakeel A. Khoja A Low Cost Interactive Distance Learning Solution. [Citation Graph (0, 0)][DBLP ] ACIS-ICIS, 2007, pp:1025-1029 [Conf ] H. Yu , X. Yuan , J. Xu , S. Providence , B. Chu , D. Gu Bridge Information Assurance Education Gap between the Majority and Minority Universities through Collaboration. [Citation Graph (0, 0)][DBLP ] ACIS-ICIS, 2007, pp:1030-1035 [Conf ] Bei-tseng Chu , Gail-Joon Ahn , Steven Blanchard , James Deese , Richard Kelly , Huiming Yu , Ashika Young Collegiate Cyber Game Design Criteria and Participation. [Citation Graph (0, 0)][DBLP ] ACIS-ICIS, 2007, pp:1036-1041 [Conf ] Grace W. Rumantir Information Technology Project Management Curriculum Practice. [Citation Graph (0, 0)][DBLP ] ACIS-ICIS, 2007, pp:1042-1048 [Conf ] B. Srikanth , D. Kirubakaran , N. Siddharth , Sudip Sanyal Software Installation on a Huge Heterogeneous Network using Mobile Agents. [Citation Graph (0, 0)][DBLP ] ACIS-ICIS, 2007, pp:1049-1052 [Conf ] Heung Seok Chae , Tae Yeon Kim , Woo-Sung Jung , Joon-Sang Lee Using Metrics for Estimating Maintainability of Web Applications: An Empirical Study. [Citation Graph (0, 0)][DBLP ] ACIS-ICIS, 2007, pp:1053-1059 [Conf ] Komsan Srivisut , Pornsiri Muenchaisri Bad-Smell Metrics for Aspect-Oriented Software. [Citation Graph (0, 0)][DBLP ] ACIS-ICIS, 2007, pp:1060-1065 [Conf ] Sean Thompson , Torab Torabi , Purva Joshi A Framework to Detect Deviations During Process Enactment. [Citation Graph (0, 0)][DBLP ] ACIS-ICIS, 2007, pp:1066-1073 [Conf ] Jeewani Anupama Ginige , Athula Ginige Challenges and Solutions in Process Automation in Tertiary Education Institutes: An Australian Case Study. [Citation Graph (0, 0)][DBLP ] ACIS-ICIS, 2007, pp:1074-1079 [Conf ] Jeewani Anupama Ginige , Athula Ginige , Uma Sirinivasan CAD model of Process Elements: Towards Effective Management of Process Evolution in Web-based Workflows. [Citation Graph (0, 0)][DBLP ] ACIS-ICIS, 2007, pp:1080-1086 [Conf ] Yousof Erfani , M. Shahram Moin , Mehdi Parviz New Methods for Transparent and Accurate Echo Hiding By Using the Original Audio Cepstral Content. [Citation Graph (0, 0)][DBLP ] ACIS-ICIS, 2007, pp:1087-1092 [Conf ] Cheng-Hsiung Hsieh , Ting-Yu Feng , Ren-Hsien Huang Voice Activity Detection Based on GM(1, 1) Model. [Citation Graph (0, 0)][DBLP ] ACIS-ICIS, 2007, pp:1093-1098 [Conf ] Christopher J. Page , Syed Mahfuzul Aziz Automated Speech Discrimination using Frequency Derivative Threshold Detection. [Citation Graph (0, 0)][DBLP ] ACIS-ICIS, 2007, pp:1099-1103 [Conf ] Abdul Hafeez-Baig , Shelly Grist , Raj Gururajan Technology Management, Data management, Improved outcomes, Efficiency and Software limitation influencing the use of wireless technology for healthcare in Pakistan. [Citation Graph (0, 0)][DBLP ] ACIS-ICIS, 2007, pp:1104-1110 [Conf ] Xinfeng Ye Providing Reliable Web Services through Active Replication. [Citation Graph (0, 0)][DBLP ] ACIS-ICIS, 2007, pp:1111-1116 [Conf ] Alex Ng Towards a Table Driven XML QoS Aware Transmission Framework. [Citation Graph (0, 0)][DBLP ] ACIS-ICIS, 2007, pp:1117-1123 [Conf ] Alauddin Ahmed , Atiqur Rahman , Mohammed Anwer , Nazmul Haque , Morshed U. Chowdhury Two Logical Verification of Quantum NOT Gate. [Citation Graph (0, 0)][DBLP ] ACIS-ICIS, 2007, pp:1124-1128 [Conf ] Omar Khadeer Hussain , Elizabeth Chang , Farookh Khadeer Hussain , Tharam S. Dillon Determining the Loss of Investment Probability for Risk based Decision Support System. [Citation Graph (0, 0)][DBLP ] ACIS-ICIS, 2007, pp:1129-1134 [Conf ] Wen-Shan Lin , Ming-fong Chen , Yan-Yan Chen Understanding Consumer Search Activity and Online Purchase Intensions for Improving the Product Recommendation Search. [Citation Graph (0, 0)][DBLP ] ACIS-ICIS, 2007, pp:1135-1140 [Conf ]