Conferences in DBLP
Da Deng , Heiko Wolf POISE - Achieving Content-Based Picture Organisation for Image Search Engines. [Citation Graph (0, 0)][DBLP ] KES (2), 2005, pp:1-7 [Conf ] Masoumeh D. Saberi , Sergio Carrato , Irena Koprinska , James Clark Estimation of the Hierarchical Structure of a Video Sequence Using MPEG-7 Descriptors and GCS. [Citation Graph (0, 0)][DBLP ] KES (2), 2005, pp:8-15 [Conf ] Chotirat (Ann) Ratanamahatana , Eamonn J. Keogh Using Relevance Feedback to Learn Both the Distance Measure and the Query in Multimedia Databases. [Citation Graph (0, 0)][DBLP ] KES (2), 2005, pp:16-23 [Conf ] Dian Tjondronegoro , Yi-Ping Phoebe Chen Multi-level Semantic Analysis for Sports Video. [Citation Graph (0, 0)][DBLP ] KES (2), 2005, pp:24-30 [Conf ] Sang Kim , Sung Baik , Yung Jo , Seungbin Moon , Daewoong Rhee Aerial Photograph Image Retrieval Using the MPEG-7 Texture Descriptors. [Citation Graph (0, 0)][DBLP ] KES (2), 2005, pp:31-36 [Conf ] Jiyuan An , Yi-Ping Phoebe Chen Yet Another Induction Algorithm. [Citation Graph (0, 0)][DBLP ] KES (2), 2005, pp:37-44 [Conf ] An-Pin Chen , Mu-Yen Chen An Implementation of Learning Classifier Systems for Rule-Based Machine Learning. [Citation Graph (0, 0)][DBLP ] KES (2), 2005, pp:45-54 [Conf ] Pedro Pablo Gómez-Martín , Marco Antonio Gómez-Martín , Pedro A. González-Calero Learning-by-Doing Through Metaphorical Simulation. [Citation Graph (0, 0)][DBLP ] KES (2), 2005, pp:55-64 [Conf ] Kouji Harada Emergence of Immune Memory and Tolerance in an Asymmetric Idiotype Network. [Citation Graph (0, 0)][DBLP ] KES (2), 2005, pp:65-71 [Conf ] Yuji Watanabe , Shigeyuki Sato , Yoshiteru Ishida Mutual Repairing System Using Immunity-Based Diagnostic Mobile Agent. [Citation Graph (0, 0)][DBLP ] KES (2), 2005, pp:72-78 [Conf ] Yoshiteru Ishida , Toshikatsu Mori A Network Self-repair by Spatial Strategies in Spatial Prisoner's Dilemma. [Citation Graph (0, 0)][DBLP ] KES (2), 2005, pp:79-85 [Conf ] Yoshiteru Ishida A Critical Phenomenon in a Self-repair Network by Mutual Copying. [Citation Graph (0, 0)][DBLP ] KES (2), 2005, pp:86-92 [Conf ] Takeshi Okamoto A Worm Filter Based on the Number of Unacknowledged Requests. [Citation Graph (0, 0)][DBLP ] KES (2), 2005, pp:93-99 [Conf ] Seda Postalcioglu , Kadir Erkan , Emine Dogru Bolat Comparison of Wavenet and Neuralnet for System Modeling. [Citation Graph (0, 0)][DBLP ] KES (2), 2005, pp:100-107 [Conf ] Johan Iskandar , John D. Zakis Neurone Editor: Modelling of Neuronal Growth with Synapse Formation for Use in 3D Neurone Networks. [Citation Graph (0, 0)][DBLP ] KES (2), 2005, pp:108-115 [Conf ] Fariba Shadabi , Robert Cox , Dharmendra Sharma , Nikolai Petrovsky A Hybrid Decision Tree - Artificial Neural Networks Ensemble Approach for Kidney Transplantation Outcomes Prediction. [Citation Graph (0, 0)][DBLP ] KES (2), 2005, pp:116-122 [Conf ] S. Esugasini , Mohd. Yusoff Mashor , Nor Ashidi Mat Isa , Nor Hayati Othman Performance Comparison for MLP Networks Using Various Back Propagation Algorithms for Breast Cancer Diagnosis. [Citation Graph (0, 0)][DBLP ] KES (2), 2005, pp:123-130 [Conf ] Pramod K. Singh , Paul Compton Combining Machine Learned and Heuristic Rules Using GRDR for Detection of Honeycombing in HRCT Lung Images. [Citation Graph (0, 0)][DBLP ] KES (2), 2005, pp:131-137 [Conf ] Nor Ashidi Mat Isa , Shahrill Sabarudin , Umi Kalthum Ngah , Kamal Zuhairi Zamli Automatic Detection of Breast Tumours from Ultrasound Images Using the Modified Seed Based Region Growing Technique. [Citation Graph (0, 0)][DBLP ] KES (2), 2005, pp:138-144 [Conf ] Tien Dung Nguyen , Sang Hyun Kim , Nam Chul Kim An Automatic Body ROI Determination for 3D Visualization of a Fetal Ultrasound Volume. [Citation Graph (0, 0)][DBLP ] KES (2), 2005, pp:145-153 [Conf ] Rainer Unland , Mihaela Ulieru Swarm Intelligence and the Holonic Paradigm: A Promising Symbiosis for a Medical Diagnostic System. [Citation Graph (0, 0)][DBLP ] KES (2), 2005, pp:154-160 [Conf ] Mitsuhiro Ogasawara , Hiroki Sugimori , Yukiyasu Iida , Katsumi Yoshida Analysis Between Lifestyle, Family Medical History and Medical Abnormalities Using Data Mining Method - Association Rule Analysis. [Citation Graph (0, 0)][DBLP ] KES (2), 2005, pp:161-171 [Conf ] Song-yan Wang , Ming Yang , Zicai Wang A Moving-Mass Control System for Spinning Vehicle Based on Neural Networks and Genetic Algorithm. [Citation Graph (0, 0)][DBLP ] KES (2), 2005, pp:172-178 [Conf ] Juan Carlos Gomez , Olac Fuentes , Ivanio Puerari Two-Dimensional Fitting of Brightness Profiles in Galaxy Images with a Hybrid Algorithm. [Citation Graph (0, 0)][DBLP ] KES (2), 2005, pp:179-185 [Conf ] Yongguo Liu , Yan Liu , Libin Wang , Kefei Chen A Hybrid Tabu Search Based Clustering Algorithm. [Citation Graph (0, 0)][DBLP ] KES (2), 2005, pp:186-192 [Conf ] Feng Xia , Youxian Sun Neural Network Based Feedback Scheduling of Multitasking Control Systems. [Citation Graph (0, 0)][DBLP ] KES (2), 2005, pp:193-199 [Conf ] Yeon-Mo Yang , N. P. Mahalik , Sung-Cheal Byun , See-Moon Yang , Byung-Ha Ahn An HILS and RCP Based Inter-working Scheme for Computational Evaluation of Manipulators and Trajectory Controller. [Citation Graph (0, 0)][DBLP ] KES (2), 2005, pp:200-206 [Conf ] Dongwon Kim , Jang-Hyun Park , Sam-Jun Seo , Gwi-Tae Park Modeling of Nonlinear Static System Via Neural Network Based Intelligent Technology. [Citation Graph (0, 0)][DBLP ] KES (2), 2005, pp:207-213 [Conf ] Hyeun-Jeong Min , Sung-Bae Cho Bayesian Inference Driven Behavior Network Architecture for Avoiding Moving Obstacles. [Citation Graph (0, 0)][DBLP ] KES (2), 2005, pp:214-221 [Conf ] Dong Hwa Kim , Jin Ill Park Loss Minimization Control of Induction Motor Using GA-PSO. [Citation Graph (0, 0)][DBLP ] KES (2), 2005, pp:222-227 [Conf ] Xi Yong , Cungen Cao , Haitao Wang Context-Restricted, Role-Oriented Emotion Knowledge Acquisition and Representation. [Citation Graph (0, 0)][DBLP ] KES (2), 2005, pp:228-235 [Conf ] Zhiwen Yu , Daqing Zhang , Xingshe Zhou , Changde Li User Preference Learning for Multimedia Personalization in Pervasive Computing Environment. [Citation Graph (0, 0)][DBLP ] KES (2), 2005, pp:236-242 [Conf ] Rajiv Khosla , Chris Lai Emotion-Based Smart Recruitment System. [Citation Graph (0, 0)][DBLP ] KES (2), 2005, pp:243-250 [Conf ] Seong-Joo Kim , Jong-Soo Kim , Sung-Hyun Kim , Yong-Min Kim Evolvable Recommendation System in the Portable Device Based on the Emotion Awareness. [Citation Graph (0, 0)][DBLP ] KES (2), 2005, pp:251-257 [Conf ] Keiko Sato , Yasue Mitsukura , Minoru Fukumi Emotional Extraction System by Using the Color Combination. [Citation Graph (0, 0)][DBLP ] KES (2), 2005, pp:258-262 [Conf ] Lina Mi , Fumiaki Takeda Research on Individual Recognition System with Writing Pressure Based on Customized Neuro-template with Gaussian Function. [Citation Graph (0, 0)][DBLP ] KES (2), 2005, pp:263-269 [Conf ] Phill-Kyu Rhee , Mi Young Nam , In Ja Jeon Context-Aware Evolvable System Framework for Environment Identifying Systems. [Citation Graph (0, 0)][DBLP ] KES (2), 2005, pp:270-283 [Conf ] Tae-Seon Kim , Hyun Dong Kim Context-Aware Computing Based Adaptable Heart Diseases Diagnosis Algorithm. [Citation Graph (0, 0)][DBLP ] KES (2), 2005, pp:284-290 [Conf ] Woo-Kyung Choi , Seong-Joo Kim , Hong-Tae Jeon Multiple Sensor Fusion and Motion Control of Snake Robot Based on Soft-Computing. [Citation Graph (0, 0)][DBLP ] KES (2), 2005, pp:291-297 [Conf ] Mi Young Nam , Phill-Kyu Rhee Human Face Detection Using Skin Color Context Awareness and Context-Based Bayesian Classifiers. [Citation Graph (0, 0)][DBLP ] KES (2), 2005, pp:298-307 [Conf ] In Ja Jeon , Mi Young Nam , Phill-Kyu Rhee Adaptive Gabor Wavelet for Efficient Object Recognition. [Citation Graph (0, 0)][DBLP ] KES (2), 2005, pp:308-318 [Conf ] In Ja Jeon , Phill-Kyu Rhee , Hanho Lee An Evolvable Hardware System Under Uneven Environment. [Citation Graph (0, 0)][DBLP ] KES (2), 2005, pp:319-326 [Conf ] Mi Young Nam , Phill-Kyu Rhee An Efficient Face Location Using Integrated Feature Space. [Citation Graph (0, 0)][DBLP ] KES (2), 2005, pp:327-335 [Conf ] Lichang Che , Bin Qiu Fuzzy Predictive Preferential Dropping for Active Queue Management. [Citation Graph (0, 0)][DBLP ] KES (2), 2005, pp:336-342 [Conf ] Hsuan-Shih Lee , Pei-Di Shen , Wen-Li Chyr A Fuzzy Method for Measuring Efficiency Under Fuzzy Environment. [Citation Graph (0, 0)][DBLP ] KES (2), 2005, pp:343-349 [Conf ] Feng Xia , Youxian Sun Anytime Iterative Optimal Control Using Fuzzy Feedback Scheduler. [Citation Graph (0, 0)][DBLP ] KES (2), 2005, pp:350-356 [Conf ] Zhi Li , Zhongwei Zhang A Coupled Fuzzy Logic Control for Routers' Queue Management over TCP/AQM Networks. [Citation Graph (0, 0)][DBLP ] KES (2), 2005, pp:357-363 [Conf ] Hyoun-Joo Go , Keun Chang Kwak , Mann-Jun Kwon , Myung-Geun Chun Iris Pattern Recognition Using Fuzzy LDA Method. [Citation Graph (0, 0)][DBLP ] KES (2), 2005, pp:364-370 [Conf ] Jae-Soo Cho , Byoung-Ju Yun , Yun-Ho Ko Precision Tracking Based-on Fuzzy Reasoning Segmentation in Cluttered Image Sequences. [Citation Graph (0, 0)][DBLP ] KES (2), 2005, pp:371-377 [Conf ] Yasar Becerikli , M. Mucteba Tutuncu , H. Engin Demiray Fuzzy Lowpass Filtering. [Citation Graph (0, 0)][DBLP ] KES (2), 2005, pp:378-385 [Conf ] Sevinc Ilhan , Nevcihan Duru Fuzzy Logic Based Intelligent Tool for Databases. [Citation Graph (0, 0)][DBLP ] KES (2), 2005, pp:386-392 [Conf ] Anne Håkansson Modelling from Knowledge Versus Modelling from Rules Using UML. [Citation Graph (0, 0)][DBLP ] KES (2), 2005, pp:393-402 [Conf ] Anneli Edman Meeting the Need for Knowledge Management in Schools with Knowledge-Based Systems - A Case Study. [Citation Graph (0, 0)][DBLP ] KES (2), 2005, pp:403-409 [Conf ] Narin Mayiwar Aspects of Consideration When Designing Educational Knowledge Based Hypermedia Systems. [Citation Graph (0, 0)][DBLP ] KES (2), 2005, pp:410-415 [Conf ] Torsten Palm Semantic Tags: Evaluating the Functioning of Rules in a Knowledge Based System. [Citation Graph (0, 0)][DBLP ] KES (2), 2005, pp:416-421 [Conf ] Lars Oestreicher Knowledge Management for Robot Activities in a Real World Context. A Case for Task Pattern Analysis (TAPAS). [Citation Graph (0, 0)][DBLP ] KES (2), 2005, pp:422-429 [Conf ] Slobodan Ribaric Temporal Knowledge Representation and Reasoning Model for Temporally Rich Domains. [Citation Graph (0, 0)][DBLP ] KES (2), 2005, pp:430-436 [Conf ] Jingde Cheng Reciprocal Logic: Logics for Specifying, Verifying, and Reasoning About Reciprocal Relationships. [Citation Graph (0, 0)][DBLP ] KES (2), 2005, pp:437-445 [Conf ] Kyung-Soo Jang , Jang-Sub Kim , Jae Sang Cha , Dong Ryeol Shin A New Paradigm Vertical Handoff Algorithm in CDMA-WLAN Integrated Networks. [Citation Graph (0, 0)][DBLP ] KES (2), 2005, pp:446-452 [Conf ] Hak Soo Ju , Dae Youb Kim , Dong Hoon Lee , Jongin Lim , Kilsoo Chun Efficient Revocation of Security Capability in Certificateless Public Key Cryptography. [Citation Graph (0, 0)][DBLP ] KES (2), 2005, pp:453-459 [Conf ] Jang Mook Kang , Jo Nam Jung , Jae Sang Cha , Chun su Lee A Study on Privacy-Related Considerations in Ubiquitous Computing Environment. [Citation Graph (0, 0)][DBLP ] KES (2), 2005, pp:460-463 [Conf ] Phil-Hun Cho , Hak-Man Kim , Myong-chul Shin , Jae Sang Cha Optimal Operation for Cogenerating System of Micro-grid Network. [Citation Graph (0, 0)][DBLP ] KES (2), 2005, pp:464-469 [Conf ] Joon Heo , Choong Seon Hong An Efficient and Secured Media Access Mechanism Using the Intelligent Coordinator in Low-Rate WPAN Environment. [Citation Graph (0, 0)][DBLP ] KES (2), 2005, pp:470-476 [Conf ] Sang Soon Park , Juphil Cho , Heung Ki Baik Pilot-Symbol Aided SFBC-OFDM Channel Estimation for Intelligent Multimedia Service. [Citation Graph (0, 0)][DBLP ] KES (2), 2005, pp:477-482 [Conf ] Kyeongmo Park , Chuleui Hong Cryptographic Protocol Design Concept with Genetic Algorithms. [Citation Graph (0, 0)][DBLP ] KES (2), 2005, pp:483-489 [Conf ] Ho-Jin Shin , Jang-Sub Kim , Dong Ryeol Shin An Efficient Backoff Scheme for IEEE 802.11e EDCF Differential Service. [Citation Graph (0, 0)][DBLP ] KES (2), 2005, pp:490-499 [Conf ] Radoslaw Katarzyniak Some Properties of Grounding Modal Conjunctions in Artificial Cognitive Agents. [Citation Graph (0, 0)][DBLP ] KES (2), 2005, pp:500-506 [Conf ] Przemyslaw Kazienko Multi-agent System for Web Advertising. [Citation Graph (0, 0)][DBLP ] KES (2), 2005, pp:507-513 [Conf ] Grzegorz Kolaczek , Agnieszka Pieczynska-Kuchtiak , Krzysztof Juszczyszyn , Adam Grzech , Radoslaw Katarzyniak , Ngoc Thanh Nguyen A Mobile Agent Approach to Intrusion Detection in Network Systems. [Citation Graph (0, 0)][DBLP ] KES (2), 2005, pp:514-519 [Conf ] Maciej Kiewra , Ngoc Thanh Nguyen Non-textual Document Ranking Using Crawler Information and Web Usage Mining. [Citation Graph (0, 0)][DBLP ] KES (2), 2005, pp:520-526 [Conf ] Dariusz Król A Propagation Strategy Implemented in Communicative Environment. [Citation Graph (0, 0)][DBLP ] KES (2), 2005, pp:527-533 [Conf ] Mateusz Lenar , Janusz Sobecki Using Recommendation to Improve Negotiations in Agent-Based Systems. [Citation Graph (0, 0)][DBLP ] KES (2), 2005, pp:534-540 [Conf ] Iwan Tabakow Fault Diagnosis of Discrete Event Systems Using Place Invariants. [Citation Graph (0, 0)][DBLP ] KES (2), 2005, pp:541-547 [Conf ] Moussa Habib , Sami Sarhan , Lama Rajab A Robust-Fragile Dual Watermarking System in the DCT Domain. [Citation Graph (0, 0)][DBLP ] KES (2), 2005, pp:548-553 [Conf ] Jia-Hong Lee , Jyh-Wei Chen , Mei-Yi Wu A Data Hiding Scheme to Reconstruct Missing Blocks for JPEG Image Transmission. [Citation Graph (0, 0)][DBLP ] KES (2), 2005, pp:554-559 [Conf ] Yoon Ho Kim , Hag-hyun Song , Heau-Jo Kang Adaptive Selection of Coefficient's Portions in the Transform Domain Watermarking. [Citation Graph (0, 0)][DBLP ] KES (2), 2005, pp:560-566 [Conf ] Yangsun Lee , Heau-Jo Kang , Yoon Ho Kim Copyright Authentication Enhancement of Digital Watermarking Based on Intelligent Human Visual System Scheme. [Citation Graph (0, 0)][DBLP ] KES (2), 2005, pp:567-572 [Conf ] Zhe-Ming Lu , Henrik Skibbe , Hans Burkhardt Image Retrieval Based on a Multipurpose Watermarking Scheme. [Citation Graph (0, 0)][DBLP ] KES (2), 2005, pp:573-579 [Conf ] Hao-Xian Wang , Yue-Nan Li , Zhe-Ming Lu , Sheng-He Sun Compressed Domain Video Watermarking in Motion Vector. [Citation Graph (0, 0)][DBLP ] KES (2), 2005, pp:580-586 [Conf ] Shijun Xiang , Jiwu Huang , Xiaoyun Feng Analysis of Quantization-Based Audio Watermarking in DA/AD Conversions. [Citation Graph (0, 0)][DBLP ] KES (2), 2005, pp:587-592 [Conf ] Ping-Sung Liao , Jeng-Shyang Pan , Yen-Hung Chen , Bin-Yih Liao A Lossless Watermarking Technique for Halftone Images. [Citation Graph (0, 0)][DBLP ] KES (2), 2005, pp:593-599 [Conf ] Emine Dogru Bolat , H. Metin Ertunç Implementation of Current Mode Fuzzy-Tuning PI Control of Single Phase UPS Inverter Using DSP. [Citation Graph (0, 0)][DBLP ] KES (2), 2005, pp:600-607 [Conf ] Byong-Hee Jun , Jang-Hwan Park , Myung-Geun Chun Knowledge-Based Fuzzy Control of Pilot-Scale SBR for Wastewater Treatment. [Citation Graph (0, 0)][DBLP ] KES (2), 2005, pp:608-614 [Conf ] Avinash Keskar , Kishor Kadbe , Nikhil Damle , Pooja Deshpande Finely Tuned Cascaded Fuzzy Controllers with VHDL - A Case Study for Linerization of V-I Characteristics of a Convertor. [Citation Graph (0, 0)][DBLP ] KES (2), 2005, pp:615-621 [Conf ] Tapan Sharma , Cees Bil , Andrew Eberhard Control System for Optimal Flight Trajectories for Terrain Collision Avoidance. [Citation Graph (0, 0)][DBLP ] KES (2), 2005, pp:622-627 [Conf ] Hone-Jay Chu , Chin-Tsai Hsiao , Liang-Cheng Chang Optimal Remediation Design in Groundwater Systems by Intelligent Techniques. [Citation Graph (0, 0)][DBLP ] KES (2), 2005, pp:628-634 [Conf ] E. Ertugrul Karsak Choquet Integral-Based Decision Making Approach for Robot Selection. [Citation Graph (0, 0)][DBLP ] KES (2), 2005, pp:635-641 [Conf ] Shaun H. Lee , Robert J. Howlett , Simon D. Walters , Cyril Crua Fuzzy Logic and Neuro-fuzzy Modelling of Diesel Spray Penetration. [Citation Graph (0, 0)][DBLP ] KES (2), 2005, pp:642-650 [Conf ] Sun-Gwan Han , Hee-Seop Han Integrating Architecture of Digital Library and e-Learning Based on Intelligent Agent. [Citation Graph (0, 0)][DBLP ] KES (2), 2005, pp:651-657 [Conf ] Javier Andrade Garda , Juan Ares Casal , Rafael García Vázquez , Santiago Rodríguez Yánez , María Seoane , Sonia Suárez A Pedagogical Overview on e-Learning. [Citation Graph (0, 0)][DBLP ] KES (2), 2005, pp:658-664 [Conf ] Akira Komedani , Tomoko Kojiri , Toyohide Watanabe Modeling Understanding Level of Learner in Collaborative Learning Using Bayesian Network. [Citation Graph (0, 0)][DBLP ] KES (2), 2005, pp:665-672 [Conf ] Yosuke Murase , Tomoko Kojiri , Toyohide Watanabe Dynamic Generation of Diagrams for Supporting Solving Process of Mathematical Exercises. [Citation Graph (0, 0)][DBLP ] KES (2), 2005, pp:673-680 [Conf ] Su-Jin Cho , Seongsoo Lee MOLEAS: Information Technology-Based Educational Software Framework. [Citation Graph (0, 0)][DBLP ] KES (2), 2005, pp:681-687 [Conf ] Woochun Jun , Sung-Keun Cho A Web-Based Information Communication Ethics Education System for the Gifted Elementary School Students in Computer. [Citation Graph (0, 0)][DBLP ] KES (2), 2005, pp:688-693 [Conf ] Sujan Pradhan , Hongen Lu Design of a Web Based Lab Administration System. [Citation Graph (0, 0)][DBLP ] KES (2), 2005, pp:694-700 [Conf ] Maryam Purvis , Martin K. Purvis , Bastin Tony Roy Savarimuthu , Mark George , Stephen Cranefield Experiences with Pair and Tri Programming in a Second Level Course. [Citation Graph (0, 0)][DBLP ] KES (2), 2005, pp:701-707 [Conf ] Kazumi Nakamatsu , Seiki Akama , Jair Minoro Abe An Intelligent Safety Verification Based on a Paraconsistent Logic Program. [Citation Graph (0, 0)][DBLP ] KES (2), 2005, pp:708-715 [Conf ] Jair Minoro Abe , Neli Regina Siqueira Ortega , Maurício C. Mário , Marinho Del Santo Paraconsistent Artificial Neural Network: An Application in Cephalometric Analysis. [Citation Graph (0, 0)][DBLP ] KES (2), 2005, pp:716-723 [Conf ] Jair Minoro Abe , Kazumi Nakamatsu , Seiki Akama Non-alethic Reasoning in Distributed Systems. [Citation Graph (0, 0)][DBLP ] KES (2), 2005, pp:724-731 [Conf ] Sriram G. Sanjeevi , Pushpak Bhattacharyya A Connectionist Model for Predicate Logic Reasoning Using Coarse-Coded Distributed Representations. [Citation Graph (0, 0)][DBLP ] KES (2), 2005, pp:732-738 [Conf ] Shinsuke Nara , Takashi Omi , Yuichi Goto , Jingde Cheng A General-Purpose Forward Deduction Engine for Modal Logics. [Citation Graph (0, 0)][DBLP ] KES (2), 2005, pp:739-745 [Conf ] Grigoris Antoniou , Thomas Skylogiannis , Antonis Bikakis , Nick Bassiliades A Deductive Semantic Brokering System. [Citation Graph (0, 0)][DBLP ] KES (2), 2005, pp:746-752 [Conf ] Umberto Straccia Uncertainty Management in Logic Programming: Simple and Effective Top-Down Query Answering. [Citation Graph (0, 0)][DBLP ] KES (2), 2005, pp:753-760 [Conf ] Shujing Wang , Yan Zhang Specifying Distributed Authorization with Delegation Using Logic Programming. [Citation Graph (0, 0)][DBLP ] KES (2), 2005, pp:761-767 [Conf ] Fabio Zambetta , Fabio Abbattista The Design and Implementation of SAMIR. [Citation Graph (0, 0)][DBLP ] KES (2), 2005, pp:768-774 [Conf ] Masoud Mohammadian , Mark Kingham Intelligent Data Analysis, Decision Making and Modelling Adaptive Financial Systems Using Hierarchical Neural Networks. [Citation Graph (0, 0)][DBLP ] KES (2), 2005, pp:775-781 [Conf ] Masoud Mohammadian , Ric Jentzsch Electricity Load Prediction Using Hierarchical Fuzzy Logic Systems. [Citation Graph (0, 0)][DBLP ] KES (2), 2005, pp:782-788 [Conf ] Zul Waker Al-Kabir , Kim Le , Dharmendra Sharma MEDADVIS: A Medical Advisory System. [Citation Graph (0, 0)][DBLP ] KES (2), 2005, pp:789-795 [Conf ] Piraveenan Mahendra rajah , Mikhail Prokopenko , Peter Wang , Don Price Towards Adaptive Clustering in Self-monitoring Multi-agent Networks. [Citation Graph (0, 0)][DBLP ] KES (2), 2005, pp:796-805 [Conf ] Prasanna Lokuge , Damminda Alahakoon Shared Learning Vector Quantization in a New Agent Architecture for Intelligent Deliberation. [Citation Graph (0, 0)][DBLP ] KES (2), 2005, pp:806-813 [Conf ] Ivan Jureta , Manuel Kolp , Stéphane Faulkner , T. Tung Do Patterns for Agent Oriented e-Bidding Practices. [Citation Graph (0, 0)][DBLP ] KES (2), 2005, pp:814-820 [Conf ] Jeffrey Tweedale , Nikhil Ichalkaranje Innovations in Intelligent Agents. [Citation Graph (0, 0)][DBLP ] KES (2), 2005, pp:821-824 [Conf ] Nikhil Ichalkaranje , Jeffrey Tweedale Multi-agent Systems: New Directions. [Citation Graph (0, 0)][DBLP ] KES (2), 2005, pp:825-830 [Conf ] Jisun Park , Karen Fullam , David C. Han , K. Suzanne Barber Agent Technology for Coordinating UAV Target Tracking. [Citation Graph (0, 0)][DBLP ] KES (2), 2005, pp:831-837 [Conf ] Christos Sioutis , Nikhil Ichalkaranje Cognitive Hybrid Reasoning Intelligent Agent System. [Citation Graph (0, 0)][DBLP ] KES (2), 2005, pp:838-843 [Conf ] Bevan Jarvis , Dan Corbett , Lakhmi C. Jain Beyond Trust: A Belief-Desire-Intention Model of Confidence in an Agent's Intentions. [Citation Graph (0, 0)][DBLP ] KES (2), 2005, pp:844-850 [Conf ] Bevan Jarvis , Dan Corbett , Lakhmi C. Jain Reasoning About Time in a BDI Architecture. [Citation Graph (0, 0)][DBLP ] KES (2), 2005, pp:851-857 [Conf ] Stéphane Faulkner , Stéphane Dehousse A Delegation Model for Designing Collaborative Multi-agent Systems. [Citation Graph (0, 0)][DBLP ] KES (2), 2005, pp:858-865 [Conf ] Yuxin Mao , Zhaohui Wu , Huajun Chen , Xiaoqing Zheng An Interactive Visual Model for Web Ontologies. [Citation Graph (0, 0)][DBLP ] KES (2), 2005, pp:866-872 [Conf ] Huajun Chen , Zhaohui Wu , Yuxin Mao RDF-Based Ontology View for Relational Schema Mediation in Semantic Web. [Citation Graph (0, 0)][DBLP ] KES (2), 2005, pp:873-879 [Conf ] Patryk Burek Essentialized Conceptual Structures in Ontology Modeling. [Citation Graph (0, 0)][DBLP ] KES (2), 2005, pp:880-886 [Conf ] Jun Lai , Ben Soh Turning Mass Media to Your Media: Intelligent Search with Customized Results. [Citation Graph (0, 0)][DBLP ] KES (2), 2005, pp:887-893 [Conf ] Gordan Gledec , Maja Matijasevic , Damir Juric Improving Search on WWW.HR Web Directory by Introducing Ontologies. [Citation Graph (0, 0)][DBLP ] KES (2), 2005, pp:894-900 [Conf ] Diego Magro , Anna Goy Designing a Tool for Configuring an Intelligent and Flexible Web-Based System. [Citation Graph (0, 0)][DBLP ] KES (2), 2005, pp:901-907 [Conf ] Jong Woo Kim , Ju-Yeon Kim , Hyun-Suk Hwang , Chang Soo Kim Location-Sensitive Tour Guide Services Using the Semantic Web. [Citation Graph (0, 0)][DBLP ] KES (2), 2005, pp:908-914 [Conf ] Hongen Lu Semantic Discovery of Web Services. [Citation Graph (0, 0)][DBLP ] KES (2), 2005, pp:915-921 [Conf ] Osnat Horovitz , Mohamed Medhat Gaber , Shonali Krishnaswamy Making Sense of Ubiquitous Data Streams - A Fuzzy Logic Approach. [Citation Graph (0, 0)][DBLP ] KES (2), 2005, pp:922-928 [Conf ] Poh Hean Yap , Kok-Leong Ong sigma -SCLOPE: Clustering Categorical Streams Using Attribute Selection. [Citation Graph (0, 0)][DBLP ] KES (2), 2005, pp:929-935 [Conf ] Jae-Hong Eom , Byoung-Tak Zhang Extraction of Gene/Protein Interaction from Text Documents with Relation Kernel. [Citation Graph (0, 0)][DBLP ] KES (2), 2005, pp:936-942 [Conf ] Yi Feng , Zhaohui Wu , Zhongmei Zhou Combining an Order-Semisensitive Text Similarity and Closest Fit Approach to Textual Missing Values in Knowledge Discovery. [Citation Graph (0, 0)][DBLP ] KES (2), 2005, pp:943-949 [Conf ] Yali Ge , Rafal Rzepka , Kenji Araki Support for Internet-Based Commonsense Processing - Causal Knowledge Discovery Using Japanese "If" Forms. [Citation Graph (0, 0)][DBLP ] KES (2), 2005, pp:950-956 [Conf ] Yong-li Wang , Hong-bing Xu , Yisheng Dong , Xue-jun Liu , Jiang-bo Qian APForecast: An Adaptive Forecasting Method for Data Streams. [Citation Graph (0, 0)][DBLP ] KES (2), 2005, pp:957-963 [Conf ] Hai Wang , Wenyuan Li , Zeng-zhi Li , Lin Fan Finding Closed Itemsets in Data Streams. [Citation Graph (0, 0)][DBLP ] KES (2), 2005, pp:964-971 [Conf ] Wei Cheng , Heshui Lin , Yufang Sun An Efficient Schema Matching Algorithm. [Citation Graph (0, 0)][DBLP ] KES (2), 2005, pp:972-978 [Conf ] Huang-Cheng Kuo A Divisive Ordering Algorithm for Mapping Categorical Data to Numeric Data. [Citation Graph (0, 0)][DBLP ] KES (2), 2005, pp:979-985 [Conf ] Ka-man Lam , Ho-fung Leung A Mutual Influence Algorithm for Multiple Concurrent Negotiations - A Game Theoretical Analysis. [Citation Graph (0, 0)][DBLP ] KES (2), 2005, pp:986-992 [Conf ] Ho-Jun Na , Deok-Hyun Yoon , Chang Soo Kim , Hyun-Suk Hwang Vulnerability Evaluation Tools of Matching Algorithm and Integrity Verification in Fingerprint Recognition. [Citation Graph (0, 0)][DBLP ] KES (2), 2005, pp:993-999 [Conf ] Yulin Ding , Yan Zhang Algorithms for CTL System Modification. [Citation Graph (0, 0)][DBLP ] KES (2), 2005, pp:1000-1006 [Conf ] Yu-Min Chiang , Shih-Hsin Chen , Kuo-Chang Wu A Robust Approach for Improving Computational Efficiency of Order-Picking Problems. [Citation Graph (0, 0)][DBLP ] KES (2), 2005, pp:1007-1014 [Conf ] Yoshitatsu Matsuda , Kazunori Yamaguchi An Efficient MDS Algorithm for the Analysis of Massive Document Collections. [Citation Graph (0, 0)][DBLP ] KES (2), 2005, pp:1015-1021 [Conf ] Young Whan Lee , Byung Mun Choi (SE-33)Intelligent ID-Based Threshold System by an Encryption and Decryption from Bilinear Pairing. [Citation Graph (0, 0)][DBLP ] KES (2), 2005, pp:1022-1028 [Conf ] Il Seok Ko , Geuk Lee , Yun Ji Na Development of an Intelligent Information Security Evaluation Indices System for an Enterprise Organization. [Citation Graph (0, 0)][DBLP ] KES (2), 2005, pp:1029-1035 [Conf ] Dong-Young Lee A Study on the Centralized Database of the Multi-agents Based Integrated Security Management System for Managing Heterogeneous Firewalls. [Citation Graph (0, 0)][DBLP ] KES (2), 2005, pp:1036-1042 [Conf ] Jae Sang Cha , Juphil Cho Adaptive Modulation and Coding Scheme for Wireless Mobile Communication System. [Citation Graph (0, 0)][DBLP ] KES (2), 2005, pp:1043-1049 [Conf ] Sungsoo Ahn , Minsoo Kim , Jungsuk Lee , Dong-Young Lee Performance Analysis of a Antenna Array System Using a New Beamforming Algorithm in the CDMA2000 1X Wireless Communication. [Citation Graph (0, 0)][DBLP ] KES (2), 2005, pp:1050-1055 [Conf ] Youngsup Kim , Seung Yub Baek , Geuk Lee Intelligent Tool for Enterprise Vulnerability Assessment on a Distributed Network Environment Using Nessus and OVAL. [Citation Graph (0, 0)][DBLP ] KES (2), 2005, pp:1056-1061 [Conf ] Yan Ha , Hea-Sook Park , Soon-Mi Lee , Young-Whan Park , Young-Shin Han Design and Implementation of SMS Security System for Wireless Environment. [Citation Graph (0, 0)][DBLP ] KES (2), 2005, pp:1062-1068 [Conf ] Tai-Hoon Kim , Seung-youn Lee Intelligent Method for Building Security Countermeasures by Applying Dr. T.H. Kim's Block Model. [Citation Graph (0, 0)][DBLP ] KES (2), 2005, pp:1069-1075 [Conf ] Ping Chen , Kagenori Nagao , Yao Zhao , Jeng-Shyang Pan Print and Generation Copy Image Watermarking Based on Spread Spectrum Technique. [Citation Graph (0, 0)][DBLP ] KES (2), 2005, pp:1076-1082 [Conf ] Kotaro Sonoda , Ryouichi Nishimura , Yôiti Suzuki Audio CoFIP (Contents Fingerprinting) Robust Against Collusion Attack. [Citation Graph (0, 0)][DBLP ] KES (2), 2005, pp:1083-1089 [Conf ] Mohsen Ashourian , Reza Enteshari , Ioannis Lambadaris A Low Cost and Efficient Sign Language Video Transmission System. [Citation Graph (0, 0)][DBLP ] KES (2), 2005, pp:1090-1098 [Conf ] Seiichi Gohshi , Haruyuki Nakamura , Hiroshi Ito , Ryousuke Fujii , Mitsuyoshi Suzuki , Shigenori Takai , Yukari Tani A New Watermark Surviving After Re-shooting the Images Displayed on a Screen. [Citation Graph (0, 0)][DBLP ] KES (2), 2005, pp:1099-1107 [Conf ] Xiaoyun Wu , Hongmei Liu , Jiwu Huang Semi-fragile Watermarking Based on Zernike Moments and Integer Wavelet Transform. [Citation Graph (0, 0)][DBLP ] KES (2), 2005, pp:1108-1114 [Conf ] Feng-Hsing Wang , Kang K. Yen , Lakhmi C. Jain , Jeng-Shyang Pan Shadow Watermark Extraction System. [Citation Graph (0, 0)][DBLP ] KES (2), 2005, pp:1115-1121 [Conf ] Toshio Modegi Development of Nearly Lossless Embedding Technology of Contactless Sensible Watermarks for Audio Signals. [Citation Graph (0, 0)][DBLP ] KES (2), 2005, pp:1122-1128 [Conf ] Longjiang Yu , Xiamu Niu , Sheng-He Sun SVG-Based Countermeasure to Geometric Attack. [Citation Graph (0, 0)][DBLP ] KES (2), 2005, pp:1129-1133 [Conf ] Xinpeng Zhang , Shuozhong Wang Watermarking Protocol Compatible with Secret Algorithms for Resisting Invertibility Attack. [Citation Graph (0, 0)][DBLP ] KES (2), 2005, pp:1134-1144 [Conf ] Chaw-Seng Woo , Jiang Du , Binh Pham , Hamud Ali Abdulkadir System Architecture Analysis of a Hybrid Watermarking Method. [Citation Graph (0, 0)][DBLP ] KES (2), 2005, pp:1145-1151 [Conf ] Ryouichi Nishimura , Norihiro Fujita , Yôiti Suzuki Audio Secret Sharing for 1-Bit Audio. [Citation Graph (0, 0)][DBLP ] KES (2), 2005, pp:1152-1158 [Conf ] Jau-Ji Shen , Po-Wei Hsu Watermarking with Association Rules Alignment. [Citation Graph (0, 0)][DBLP ] KES (2), 2005, pp:1159-1167 [Conf ] YongJie Wang , Yao Zhao , Jeng-Shyang Pan , ShaoWei Weng A Reversible Watermark Scheme Combined with Hash Function and Lossless Compression. [Citation Graph (0, 0)][DBLP ] KES (2), 2005, pp:1168-1174 [Conf ] Zheng Liu Improved Method of Spread Spectrum Watermarking Techniques Using Pixel-Correlations. [Citation Graph (0, 0)][DBLP ] KES (2), 2005, pp:1175-1182 [Conf ] Tsong-Yi Chen , Da-Jinn Wang , Chih-Cheng Chiu , Chien-Hua Huang Apply Semi-fragile Watermarking to Authentication of Compressed Video Data. [Citation Graph (0, 0)][DBLP ] KES (2), 2005, pp:1183-1189 [Conf ] Hongli Xu , De Sun Zhijie Xu An Approach of Multi-level Semantics Abstraction. [Citation Graph (0, 0)][DBLP ] KES (2), 2005, pp:1190-1196 [Conf ] Yuliang Geng , De Xu , Aimin Wu Effective Video Scene Detection Approach Based on Cinematic Rules. [Citation Graph (0, 0)][DBLP ] KES (2), 2005, pp:1197-1203 [Conf ] Xu Yang , De Xu , Guan Tengfei , Aimin Wu , Congyan Lang 3-DWT Based Motion Suppression for Video Shot Boundary Detection. [Citation Graph (0, 0)][DBLP ] KES (2), 2005, pp:1204-1209 [Conf ] S. C. Chuang , Y. Y. Xu , Hsin-Chia Fu Neural Network Based Image Retrieval with Multiple Instance Leaning Techniques. [Citation Graph (0, 0)][DBLP ] KES (2), 2005, pp:1210-1216 [Conf ] Congyan Lang , De Xu , Wengang Cheng , Yiwei Jiang Shot Type Classification in Sports Video Using Fuzzy Information Granular. [Citation Graph (0, 0)][DBLP ] KES (2), 2005, pp:1217-1223 [Conf ] Chin-Chen Chang , Tzu-Chuen Lu Method for Searching Similar Images Using Quality Index Measurement. [Citation Graph (0, 0)][DBLP ] KES (2), 2005, pp:1224-1230 [Conf ] Hua Yan , Ju Liu , Jiande Sun Edge Projection-Based Image Registration. [Citation Graph (0, 0)][DBLP ] KES (2), 2005, pp:1231-1237 [Conf ] P. S. Lai , S. S. Cheng , S. Y. Sun , T. Y. Huang , J. M. Su , Y. Y. Xu , Y. H. Chen , S. C. Chuang , C. L. Tseng , C. L. Hsieh , Y. L. Lu , Y. C. Shen , J. R. Chen , J. B. Nie , F. P. Tsai , H. C. Huang , H. T. Pao , Hsin-Chia Fu Automated Information Mining on Multimedia TV News Archives. [Citation Graph (0, 0)][DBLP ] KES (2), 2005, pp:1238-1244 [Conf ] Huey-Ming Lee , Shih-Feng Liao An Emergency Model of Home Network Environment Based on Genetic Algorithm. [Citation Graph (0, 0)][DBLP ] KES (2), 2005, pp:1245-1251 [Conf ] Huey-Ming Lee , Cheng-Hsiung Yang A Distributed Backup Agent Based on Grid Computing Architecture. [Citation Graph (0, 0)][DBLP ] KES (2), 2005, pp:1252-1257 [Conf ] Huey-Ming Lee , Chao-Chi Hsu , Mu-Hsiu Hsu A Dynamic Supervising Model Based on Grid Environment. [Citation Graph (0, 0)][DBLP ] KES (2), 2005, pp:1258-1264 [Conf ] Huey-Ming Lee , Pin-Jen Chen , Yao-Jen Shih , Yuan-Chieh Tsai , Ching-Hao Mao An Intelligent Extracting Web Content Agent on the Internet. [Citation Graph (0, 0)][DBLP ] KES (2), 2005, pp:1265-1271 [Conf ] Chihaya Watanabe , Hisao Shiizuka A Rendering System for Image Extraction from Music and Dance. [Citation Graph (0, 0)][DBLP ] KES (2), 2005, pp:1272-1282 [Conf ] Junzo Watada Trend of Fuzzy Multivariant Analysis in Management Engineering. [Citation Graph (0, 0)][DBLP ] KES (2), 2005, pp:1283-1290 [Conf ] Motoki Kohritani , Junzo Watada , Hideyasu Hirano , Naoyoshi Yubazaki Kansei Engineering for Comfortable Space Management. [Citation Graph (0, 0)][DBLP ] KES (2), 2005, pp:1291-1297 [Conf ] Zhen Xu , Binheng Song , Liang Chen Fuzzy Logic Experience Model in Human Resource Management. [Citation Graph (0, 0)][DBLP ] KES (2), 2005, pp:1298-1304 [Conf ] Hojun Shin , Haeng-Kon Kim , Boyeon Shim Development of Business Rule Engine and Builder for Manufacture Process Productivity. [Citation Graph (0, 0)][DBLP ] KES (2), 2005, pp:1305-1311 [Conf ] Youngshin Han , Junghee Kim , Chilgee Lee Automatic Detection of Failure Patterns Using Data Mining. [Citation Graph (0, 0)][DBLP ] KES (2), 2005, pp:1312-1316 [Conf ] Haeng-Kon Kim , Deok-Soo Han Logic Frameworks for Components Integration Process. [Citation Graph (0, 0)][DBLP ] KES (2), 2005, pp:1317-1324 [Conf ] Youngshin Han , Chilgee Lee Automatic Classification Using Decision Tree and Support Vector Machine. [Citation Graph (0, 0)][DBLP ] KES (2), 2005, pp:1325-1330 [Conf ] Sun-Myung Hwang , Ki-Won Song Opportunity Tree Framework Design for Quality and Delivery of Software Product. [Citation Graph (0, 0)][DBLP ] KES (2), 2005, pp:1331-1337 [Conf ] M. Julia Flores , José A. Gámez Breeding Value Classification in Manchego Sheep: A Study of Attribute Selection and Construction. [Citation Graph (0, 0)][DBLP ] KES (2), 2005, pp:1338-1346 [Conf ] Hiroshi Echizen-ya , Kenji Araki , Yoshio Momouchi Learning Method for Automatic Acquisition of Translation Knowledge. [Citation Graph (0, 0)][DBLP ] KES (2), 2005, pp:1347-1353 [Conf ]